- Distributed Control Multi-Agent Systems
- Neural Networks Stability and Synchronization
- Adaptive Control of Nonlinear Systems
- Mobile Ad Hoc Networks
- Wireless Networks and Protocols
- Advanced Wireless Network Optimization
- Advanced Memory and Neural Computing
- Opportunistic and Delay-Tolerant Networks
- Cooperative Communication and Network Coding
- Software-Defined Networks and 5G
- Neural Networks and Applications
- Internet Traffic Analysis and Secure E-voting
- Wireless Communication Security Techniques
- Brain Tumor Detection and Classification
- Bluetooth and Wireless Communication Technologies
- AI in cancer detection
- Network Security and Intrusion Detection
- Advanced Computational Techniques and Applications
- Cultural Heritage Materials Analysis
- User Authentication and Security Systems
- Metaheuristic Optimization Algorithms Research
- Pigment Synthesis and Properties
- Quantum-Dot Cellular Automata
- Iterative Methods for Nonlinear Equations
- DNA and Biological Computing
State Grid Corporation of China (China)
2020-2021
Hunan Normal University
2014-2020
Tianjin University of Technology and Education
2013-2020
Beijing University of Posts and Telecommunications
2012-2018
Tianjin University
2007-2018
Changsha Normal University
2014
Jiangnan University
2014
Nankai University
2010-2013
Guilin University of Electronic Technology
2013
Nokia (China)
2012
In this letter, an analytical model is proposed for 3-channel-based neighbor discovery in Bluetooth Low Energy (BLE) networks. The can be used to determine some important performance metrics, such as average latency or energy consumption during the course of discovering neighbors. Since intermittent connections are frequently encountered practical scenarios BLE, modeling results provide a beneficial guidance customize advertising scanning behavior towards user desired performance.
Bluetooth Low Energy (BT LE) is a low power air interface technology recently released by the Special Interest Group SIG). As promising radio, BT LE realizes many designing features to fulfill foreseeable requirements of short range communication, such as fast device discovery, power-saving transmitting, encryption and authentication, etc. In this paper, we focus on modeling performance analyzing discovery process in networks. A general model for multi-channel proposed primarily, which then...
Abstract By numerical propagation of the coupled Gross-Pitaevskii equations, ground state phase a SU(3) spin-orbit Bose gas with nonlocal soft-core interactions has been investigated within all parameter space, showing strong dependence on strength coupling, interactions, spin-exchange and Rydberg blockade radius. More specially, we also perform detailed study interaction radius at point rotational symmetry breaking. Our results show that under combined effects such parameters, shows...
Journal Article Leader-following consensus of multi-agent systems with delayed impulsive control Get access Jia Liu, Liu School Science, Jiangnan University, Wuxi 214122, China Search for other works by this author on: Oxford Academic Google Scholar Liuxiao Guo, Guo * *Corresponding author: guo_liuxiao@126.com Manfeng Hu, Hu Zhenyuan Xu, Xu Yongqing Yang IMA Mathematical Control and Information, Volume 33, Issue 1, March 2016, Pages 137–146, https://doi.org/10.1093/imamci/dnu037 Published:...
The traditional IC card authentication method is single, once set, that can not be modified. In this paper, we propose an attack defense used to define the algorithm. set according user's own algorithm authentication. This paper supports divided into 8-byte packet and 16-byte length of two algorithms, certification specified by type complete in order achieve a certain security permissions need Operation authority certification. defense, which limit maximum number external key attempts ensure...
This paper addresses relay selection(RS) and power allocation(PA) issues for a physical-layer network coding (PNC) based secondary user (SU) communication in cognitive radio networks, which two transceiver nodes exchange their information with the assistance of under interference threshold (IPT) constraints. We propose an optimal energy-efficient RS PA (OE-RS-PA) scheme to minimize total energy consumption per bit sum rate constraint IPT A closed-form solution allocation transmit among SU...
Download This Paper Open PDF in Browser Add to My Library Share: Permalink Using these links will ensure access this page indefinitely Copy URL DOI
Quasi-Newton (QN) methods are now widely used for NN training due to their high effectiveness. In practice, the iterative process of QN implemented in software is often very time-consuming. To accelerate process, floating-point BFGS-QN implementation has been realized on FPGA. By analyzing performance implementation, it found that updating inverse approximate Hessian matrix B most computation and memory intensive part. Therefore, a fixed-point hardware design proposed this paper. The...
The key technology of data fusion and mining in wireless sensor network has been addressed, then the tropical crop monitoring system based on is proposed, which can collect perception information from source node efficiently. To real-time monitor control within regional, knowledge technologies, such as timing associated, genetic classification, isolated points detection, have implemented system. Simulations show that reduce consumption energy extend lifetime.
This paper combines the traditional output regulation (OR) theory with fuzzy identification method, and designs a distributed regulator for multi-agent system (MAS). In view of situation that follower model in MAS cannot be obtained accurately, is established to make it approximate considered nonlinear discrete agent first. By employing method OR theory, controller proposed, agents track reference signal given by dynamic leader. Two numerical examples demonstrate results.