- Higher Education and Teaching Methods
- Distributed and Parallel Computing Systems
- IoT and Edge/Fog Computing
- Opportunistic and Delay-Tolerant Networks
- Video Surveillance and Tracking Methods
- Cooperative Communication and Network Coding
- Caching and Content Delivery
- Technology and Security Systems
- Chinese history and philosophy
- Immune cells in cancer
- Nonlinear Partial Differential Equations
- Machine Fault Diagnosis Techniques
- Brain Tumor Detection and Classification
- Digital Transformation in Industry
- Global Maternal and Child Health
- Image and Video Quality Assessment
- Software Reliability and Analysis Research
- Wound Healing and Treatments
- Neutrophil, Myeloperoxidase and Oxidative Mechanisms
- Engineering and Test Systems
- Literature, Film, and Journalism Analysis
- Indigenous and Place-Based Education
- Geoscience and Mining Technology
- Advanced Computing and Algorithms
- Wireless Body Area Networks
Wenzhou Medical University
2025
Beijing University of Posts and Telecommunications
2024-2025
Nanjing University of Chinese Medicine
2025
Nanjing Drum Tower Hospital
2025
Jilin Electric Power Research Institute (China)
2024
Huizhou University
2023
Sichuan Agricultural University
2023
Northwestern Polytechnical University
2021
Cerritos College
2021
Chongqing University of Posts and Telecommunications
2019-2020
As a promising architecture in the future networks, fog radio access network (F-RAN) can effectively improve performance due to advantages both communication and computation aspects. In this paper, data caching scheme is studied device-to-device (D2D) enabled F-RAN from social point of view. First, we help each (AP) ascertain its best belonging community terms content preference based on projective adaptive resonance theory neural (PART NN). The APs within identical cache cooperatively,...
Abstract We derive a priori interior Hessian estimates for special Lagrangian equations when the potential is convex. When phase very large, we show that continuous viscosity solutions are smooth in of domain. © 2008 Wiley Periodicals, Inc.
Digital twins and the physical assets of electric power systems face potential risk data loss monitoring failures owing to catastrophic events, causing surveillance energy loss. This study aims refine maintenance strategies for an digital twin system post disasters. Initially, research delineates along with its counterpart post-disaster restoration processes. Subsequently, it delves into communication processing mechanisms, specifically focusing on central (CDP), routers (CRs), phasor...
Abstract Background Over the past few decades, a series of major challenges to global health have successively emerged, which call for China’s deeper engagement in governance. In this context, China-UK Global Health Support Programme (GHSP) was launched 2012 with about 12 million pounds funded by United Kingdom. Objectives The GHSP expected explore new type partnership strengthen cooperation health, and enhance capacity engage governance provide effective development assistance (DAH), order...
With the rapid development of 5G NR (New Radio), explosive increment traffic amount is calling utilization unlicensed band. 3GPP has proposed LAA (Licensed Assisted Access) to use LTE in band and pointed out that NR-U (NR-Unlicensed) can reuse most designs it. However, existing channel access mechanism conservative under coexistence scenario NR-U, which leads waste time resource. To address problem this paper proposes a hybrid take advantage LBT (Listen-Before-Talk) when quite busy transmit...
Since its inception in the United States 1960s, legal clinic has developed rapidly Kingdom, Finland and other countries due to characteristics of significantly improving students' practical ability. China also joined this trend. 2000, seven universities, including Peking University Tsinghua University, have taken lead introducing clinics, universities followed suit. Although application major been quite mature, limited general undergraduate courses rather than vocational courses. Therefore,...
Reconfiguration is a crucial method to improve the fault-tolerant capability of integrated modular avionics (IMA) system. The quality blueprints has substantial influence on operational performance after system reconfiguration. Hence, this letter proposes an intelligent reconfiguration algorithm, which applies reinforcement learning (RL) IMA proposed algorithm combines critical elements RL model with established generate low-cost and high-quality blueprints. experiment results demonstrate...
With the development of mobile Internet, number applications has increased dramatically. The core application is interface interaction, and robots can be used to operate for GUI automation testing. recognition elements basis test applications. models built based on results existing methods are too simple positions identified not accurate, which cannot meet testing requirements robots. Hence, we propose an improved algorithm YOLOv3 solve these problems. experiment demonstrate that effectively...
With Hadoop been widely used, job scheduling technology, as a key technology in Hadoop, has developed rapidly.However, Hadoop's default algorithm Fair Scheduler when performing the task scheduler does not consider load balancing status of each node cluster system, leading to low efficiency great job.For defect fair share algorithm, and combined LATE based on share.Experimental results show that can be improved taking into account situation balancing, improve large jobs.
Real-time monitoring and instantaneous tracking of stray cats dogs within a specific area using image recognition object detection in computer vision technology is currently the predominant trend. Cat dog recognition, as classic project, serves purpose identifying quantity categories single or video frame. This study builds upon YOLOv5 framework addresses practical challenges cat detection, such overlapping occlusion. To enhance accuracy stability, Soft-NMS Merge-NMS algorithms are...