- IoT and Edge/Fog Computing
- Cooperative Communication and Network Coding
- Cloud Computing and Resource Management
- Advanced Wireless Communication Technologies
- Retinal Imaging and Analysis
- Advanced Optical Network Technologies
- Petroleum Processing and Analysis
- Advanced Algorithms and Applications
- Cloud Data Security Solutions
- Information Retrieval and Search Behavior
- Web Data Mining and Analysis
- Mobile Ad Hoc Networks
- Machine Learning and ELM
- Grey System Theory Applications
- Genetic diversity and population structure
- Advanced Software Engineering Methodologies
- Plant Reproductive Biology
- Wireless Networks and Protocols
- Cryptography and Data Security
- Wireless Communication Security Techniques
- Software Engineering Research
- Fault Detection and Control Systems
- Software-Defined Networks and 5G
- Advanced Multi-Objective Optimization Algorithms
- Molecular Communication and Nanonetworks
Beijing University of Posts and Telecommunications
2018-2023
Sichuan Agricultural University
2022
Institute of Pomology
2022
Shanghai Jiao Tong University
2019
Beijing University of Technology
2017
University of Science and Technology Beijing
2016
Beijing Institute of Technology
2015
Peking University
2009-2011
Nokia (United States)
2010
University of Delaware
2007-2009
An adaptive gradient multiobjective particle swarm optimization (AGMOPSO) algorithm, based on a (stocktickerMOG) method and self-adaptive flight parameters mechanism, is developed to improve the computation performance in this paper. In AGMOPSO stocktickerMOG devised update archive convergence speed local exploitation evolutionary process. Meanwhile, according diversity information of particles, then established balance AGMOPSO. Attributed algorithm not only has faster higher accuracy, but...
Chinese cherry (Cerasus pseudocerasus (Lindl.) G.Don) is an economically important tetraploid fruiting species native to China. Simple sequence repeats (SSRs)—due their codominance, polymorphism, and stability—have been widely applied in genetic identification trait-association analysis. In this study, using comparative genomics strategy the data of one high-quality whole genome seven preliminarily assembled sequences, we constructed a database containing 25,779 polymorphic SSR loci...
The computing first network (CFN) supported by the elastic optical (EON) is proposed as an innovative information infrastructure, where end users can access resources on demand. However, since link capacity limited, bottleneck may cause task offloading failures even with sufficient resources. This paper proposes a cost-efficient and spectrum resource scheduling scheme to solve above problem. goal determine decisions for dependent tasks minimizing completion delay energy consumption nodes...
Multi-access edge computing systems powered by elastic optical networks can allocate bandwidth flexibly and meet end users' low-latency requirements. However, servers links have limited resources. Sending tasks to local cannot always provide satisfactory computation service. A task may be blocked due insufficient resources if the server is heavy-loaded. also inadequate spectrum even transmitted another light-loaded server. In brief, imbalanced load distribution will affect service...
The fast-growing Internet of Things (IoT) and Artificial intelligence (AI) applications mandate high-performance edge data analytics. This requirement cannot be fully fulfilled by prior works that focus on either small architectures (e.g., accelerators) or large infrastructure cloud centers). Sitting in between the cloud, there have been many server-level designs for augmenting processing. However, they often require specialized hardware resources lack scalability as well agility.
A composite web service often interacts with several partner services hosted in different servers. These are represented as activities a WS-BPEL program describing the service. Invoking maximal number of these concurrently is essential for improving its performance. But complex message coupling and control dependency between may prevent them from being arranged correctly efficiently. In this paper, we propose an approach detecting problematic activity arrangement based on analyzing...
An online monitoring system of alumina concentration in aluminium electrolysis has been designed directing at the difficult measurement alumina. Firstly, a current-measuring instrument with anodic guide rod is developed to collect data about temperature and isometric pressure drop. Then set upper-computer software based on COM technology produced, which consists OPC server client software. Eventually, preliminary analysis collected conducted, least-square support vector machine algorithm...
Cooperation can provide significant benefits for wireless systems, but the overheads required could make it difficult to achieve these gains in practice. In most work this area, that may be incurred a networking context and interactions with higher layers have been ignored. paper, we outline methodology developing low-overhead cooperative protocols evaluating their performance realistic context. We first describe some of sources overhead implementing cooperation network. Then, present...
Certificateless cryptography is introduced to eliminate certificate management in traditional public key and escrow problem identity-based cryptography. In this paper, an efficient certificateless signature scheme proposed. It has the following advantages. First, pairing operations signing phrase are eliminated only two involved verifying phrase, length also reduced 160 bits. Second, user's bound with his/her private key, so replacement attack can hardly be implemented. Last, proven secure...
This paper proposes a cost-efficient computing offloading (CECO) scheme to determine decisions for requests arriving at EON-supported first networks. Results show CECO can improve acceptance ratio and reduce completion delay electricity charge.
We investigate distributed sub-tree based multicasting aggregation (DST-MA) scheme which applies multiple sub-trees with different source data centers to aggregation. The DST-MA outperforms other schemes in spectrum and transceiver consumptions.
Distributed space-time block coding (Dis-STBC) achieves diversity through cooperative transmission among geographically dispersed nodes. Several decentralized Dis-STBC schemes have been proposed to implement code-assignment at the relays without control signaling. Among power allocation strategies for Dis-STBC, constant-power strategy is but inefficient; near-optimal requires some type of In this paper, we propose a sub-optimal, Dis-STBC. strategy, used by each relay equal source divided...
In this paper, focusing on a multi-source, two-stage selective decode-and-forward (DF) relaying network in which the multiple sources have common destination, we propose an effective cooperative transmission scheme via exploiting decentralized distributed space-time block coding (Dis-STBC). This is unified multi-source scheme, regardless of number potential relays can recover messages from all active sources. particular, even if most or only subset sources, proposed work well without...