Qian Li

ORCID: 0000-0001-8270-2425
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced MIMO Systems Optimization
  • Cooperative Communication and Network Coding
  • Advanced Thermoelectric Materials and Devices
  • Advanced Computational Techniques and Applications
  • Radiomics and Machine Learning in Medical Imaging
  • Advanced Wireless Network Optimization
  • Assembly Line Balancing Optimization
  • Millimeter-Wave Propagation and Modeling
  • Wireless Sensor Networks and IoT
  • Traffic Prediction and Management Techniques
  • Advanced Manufacturing and Logistics Optimization
  • 2D Materials and Applications
  • E-commerce and Technology Innovations
  • Artificial Intelligence in Healthcare and Education
  • Engineering and Test Systems
  • Reinforcement Learning in Robotics
  • Simulation and Modeling Applications
  • Advanced Data Storage Technologies
  • User Authentication and Security Systems
  • Manufacturing Process and Optimization
  • Grey System Theory Applications
  • Extenics and Innovation Methods
  • Hepatitis B Virus Studies
  • Dendrimers and Hyperbranched Polymers
  • Embedded Systems and FPGA Design

Liaocheng University
2023-2025

Southern Medical University
2024

Zhengzhou University
2006-2024

Southwest Petroleum University
2021-2023

Southern University of Science and Technology
2022-2023

Henan Institute of Technology
2023

Huawei Technologies (China)
2022

Northeastern University
2010-2020

Chongqing University of Posts and Telecommunications
2020

Shanghai Key Laboratory of Trustworthy Computing
2020

In recent years, with the rapid development of deep learning, artificial intelligence (AI) has gradually become a powerful assistant for humans in various aspects. The maturity and advancement natural language models led to birth Chat Generative Pre-Trained Transformer (ChatGPT), generating great potential healthcare applications. This review summarized possible application prospects ChatGPT healthcare, assessed limitations that still exist, suggested improvements. conclusion, current...

10.1016/j.gande.2023.07.002 article EN cc-by-nc-nd Gastroenterology & Endoscopy 2023-07-01

Abstract Structural dimensionality and electronic play a crucial role in determining the type of excitonic emission hybrid metal halides (HMHs). It is important but challenging to achieve free exciton (FE) zero‐dimensional (0D) HMHs based on control over dimensionality. In this work, quasi‐0D HMH (C 7 H 15 N 2 Br) PbBr 4 with localized prepared as prototype model. With increasing pressure onto , broad weak self‐trapped (STE) at ambient conditions considerably enhanced before 3.6 GPa, which...

10.1002/anie.202316348 article EN Angewandte Chemie International Edition 2023-11-16

With macro and micro base stations (BSs) of different transmission processing capabilities jointly deployed, heterogeneous networks effectively extend the coverage capacity wireless have been adopted as one key technologies in Fourth-Generation-Long-Term Evolution (4G-LTE). To fully exploit benefits networks, proper mobile association, interference management, radio resource management schemes need to be developed. In this paper, we investigate allocation for with cooperative relays, where...

10.1109/tvt.2012.2228511 article EN IEEE Transactions on Vehicular Technology 2012-11-21

In millimeter wave (mmWave) communications with possible gigabit-per-second data rate, the severe path loss can effectively be alleviated by adaptive beamforming using antenna arrays. However, this complicates initial access (IA), which a mobile user equipment (UE) establishes physical link connection mmWave base station (BS). The total duration of IA directional search very long since multiple preambles should repeatedly transmitted for all transmit and receive beam pairs. work, we focus on...

10.1109/wcnc.2017.7925666 article EN 2022 IEEE Wireless Communications and Networking Conference (WCNC) 2017-03-01

Secure protocol is a vital guarantee in all kinds of communication network environment. Designing on authenticated key exchange protocols hotspot the field information security at present, and related theories have been increasingly mature. However, there still scarcely any appropriate to wireless body area networks (WBANs). In this paper, according standards WBAN, we define layered model accordance with definition two-hop star topology firstly. line model, put forward two new based...

10.1186/s13638-015-0406-2 article EN cc-by EURASIP Journal on Wireless Communications and Networking 2015-07-02

As radio interface approaches its practical capacity limit given limited spectrum resource, network architecture innovation/revolution would play a key role in boosting wireless communication system and improving user experience. Deploying dense small cell networks overlaying the conventional macro is widely regarded as step towards revolution for improved energy efficiency. In this paper, we analytically investigate efficiency of densely deployed downlink using tools from stochastic...

10.1109/pimrc.2013.6666617 article EN 2013-09-01

Abstract The presence of the van der Waals gap in layered materials creates a wealth intriguing phenomena different to their counterparts conventional materials. For example, pressurization can generate large anisotropic lattice shrinkage along stacking orientation and/or significant interlayer sliding, and many exotic pressure-dependent properties derive from these mechanisms. Here we report giant piezoresistivity pressurized β ′-In 2 Se 3 . Upon compression, six-orders-of-magnitude drop...

10.1038/s41467-023-37239-9 article EN cc-by Nature Communications 2023-03-18

Chest tomosynthesis (CTS) as a newly developed imaging technique can provide pseudo-3D volume anatomical information of the thorax from limited-angle projections. However, one drawback is that acquisition angle for CTS much less than 180°, so reconstructed image may be contaminated by structures behind and in front in-focus plane. To reduce noise, this study, we deep learning-based bone suppression model to remove these occluding bony projections images then using bone-suppressed...

10.1016/j.jrras.2024.100866 article EN cc-by-nc-nd Journal of Radiation Research and Applied Sciences 2024-02-28

In this work, based on current 5G New Radio (NR) SYNC/RACH slot structures, we focus initial access (IA) techniques when the base stations (BSs) and user equipments (UEs) are equipped with uniform planar array (UPA) antennas without context information from macro BSs. With different omni/beam exhaustive/iterative search, present five possible IA schemes: (i) BS omni/UE omni as a reference; (ii) Exhaustive Search 1; (iii) 2; (iv) Iterative 2. Through simulations comparisons, demonstrate...

10.1109/iccnc.2018.8390325 article EN 2016 International Conference on Computing, Networking and Communications (ICNC) 2018-03-01

Communication-Based Train Control System (CBTC) system is an automated for train control based on bidirectional train-ground communication. Safety-risk estimation a vital approach that strives to guide the CBTC guarantee safe operation of vehicles. We propose deep learning method predict safety-risk states combined with formal methods. First, impact factors are selected, and movement authorization (MA) failure rate calculated by statistical model checking. Then, we use neural network...

10.1109/access.2020.2967634 article EN cc-by IEEE Access 2020-01-01

An attempt is made to analysis the change trend of total cost spent on workers according workerspsila multi-functionality under conditions changeable and unchangeable in a cellular manufacturing, wherein, workerpsilas refers number machines that can be operated by worker. The manufacturing as main productive mode researched applied widely, researches field have gained many effective results when designing layout forming production scheduling. However, factors considered former papers mainly...

10.1109/ccdc.2008.4597461 article EN Chinese Control and Decision Conference 2008-07-01

Reinforcement learning aims to discover an optimal policy that maximizes reward based on the feedback signal. Although method succeeds in numerous systems, it may not apply safe-critical systems due absence of safety protection mechanism. Besides, agent is unable model environment accurately if getting biased observation. We present a safe algorithm called Safe Control with Supervisor (SCS) for addressing limitation. If accurate, supervisor monitors system and repairs action at runtime,...

10.1109/ijcnn48605.2020.9207384 article EN 2022 International Joint Conference on Neural Networks (IJCNN) 2020-07-01

In order to deepen the good role of electric vehicles in reducing carbon emissions transportation system and promote high proportion clean energy consumption, low-carbon economic operation park integrated (PIES) is realized, this paper establishes a optimal dispatch model for PIES considering trading vehicles. Firstly, vehicles(EVs) are introduced into cost mechanism, ladder-type calculation calculating costs by emission intervals constructed; Secondly, comprehensively maintenance costs,...

10.1109/pandafpe57779.2023.10141116 article EN 2023-04-01

In recent years, assembly cells as a new manufacturing system have clearly shown that it the ability to generate significant performance improvements over unbuffered, multi-model, linked lines and multi-model with finite buffer of inventory between stations. However, some effective methods for scheduling in real time this are sparse. paper, kind distributed arrival control strategy is introduced, which has been used single machine scenario. The algorithm modified adapt system. addition,...

10.1109/ccdc.2010.5499103 article EN Chinese Control and Decision Conference 2010-05-01

The energy internet is a cyber-physical system (CPS) to connect directly and indirectly the devices of information, communication, control, protection effectively generate, transmit, use, store various by merging new technologies such as artificial intelligence (AI), cloud computing, blockchain, etc. Recently, AI technology has become increasingly popular in many research industrial fields because it can perform tasks well. However, applying relatively less. Therefore, this paper, potential...

10.1109/yac51587.2020.9337503 article EN 2022 37th Youth Academic Annual Conference of Chinese Association of Automation (YAC) 2020-10-16
Coming Soon ...