- Energy Efficient Wireless Sensor Networks
- Mobile Ad Hoc Networks
- Energy Harvesting in Wireless Networks
- Molecular Communication and Nanonetworks
- Product Development and Customization
- Wireless Body Area Networks
- Wireless Networks and Protocols
- Natural Language Processing Techniques
- Network Traffic and Congestion Control
- IoT and Edge/Fog Computing
- Privacy-Preserving Technologies in Data
- Mobile Crowdsensing and Crowdsourcing
- Human Mobility and Location-Based Analysis
- Topic Modeling
- IoT Networks and Protocols
- Vehicular Ad Hoc Networks (VANETs)
- Advanced Battery Materials and Technologies
- Distributed Sensor Networks and Detection Algorithms
- Manufacturing Process and Optimization
- Anomaly Detection Techniques and Applications
- Advancements in Battery Materials
- Intelligent Tutoring Systems and Adaptive Learning
- Design Education and Practice
- Advanced Battery Technologies Research
- Technology Assessment and Management
Shanghai Jiao Tong University
2010-2025
Donghua University
2015-2024
University of Illinois Urbana-Champaign
2024
Shanghai Sixth People's Hospital
2022
West China Medical Center of Sichuan University
2021
Sichuan University
2021
State Key Laboratory of Mobile Networks and Mobile Multimedia Technology
2020
ZTE (China)
2020
Jinan University
2019
Nanjing University of Information Science and Technology
2016-2017
The consideration of energy consumption in wireless ad hoc networks prevents the problem network exhausting batteries, thus partitioning entire network. Power-aware multicasting is proposed to reduce power consumption. This letter presents an energy-efficient genetic algorithm mechanism resolve quality service (QoS) multicast routing problem, which NP-complete. depends on bounded end-to-end delay and minimum cost tree. Simulation results show that effective efficient.
In wireless sensor networks, optimizing the network lifetime is an important issue. Most of existing works define as time when first node exhausts all its energy. However, such not necessarily important. This because a dies, whole likely to work properly. this article, we make overall consideration demand applications and in three aspects. Then, construct performance evaluation framework for routing protocols. To achieve optimization defined aspects, propose reinforcement-learning-based...
To gain competitive leverage, firms that design and develop complex products seek to optimize the organization structure in their new product development (PD) projects. The overlapped process is a fundamental feature of concurrent engineering, which not only reduces project duration but also increases coordination, communication, interaction between organizational units. In order reduce complexity this paper proposes matrix (DSM) method for measuring strength clustering This analyzes impact...
Background The emergence of immunotherapy has revolutionized the paradigm cancer treatment with immune checkpoint blockades (ICB) in solid cancers, including colorectal (CRC). However, only a small subset CRC patients harboring deficient mismatch repair (dMMR) or microsatellite instability-high (MSI-H) benefits from ICB therapy. A very limited response to therapy been achieved MMR-proficient CRC, representing significant challenge limiting clinical application immunotherapy. MMR is critical...
Rationale: Hepatocellular carcinoma (HCC) is one of the most severe cancers worldwide, with few effective targeted therapies for HCC.Lipid metabolic reprogramming emerged as a hallmark cancer metabolism that guides response to antitumoral therapies.Such lipid alteration in critically regulated by mammalian target rapamycin mTOR, which considered promising therapeutic target.Despite efforts, mTOR inhibitors (mTORi) have produced limited clinically, partly due incomplete knowledge mTORC1...
The proliferation of various mobile devices equipped with GPS positioning modules makes the collection trajectories more easier than ever before, and trajectory datasets have been available for business applications or academic researches. Normally, published are often anonymized by replacing real identities objects pseudonyms (e.g., random identifiers); however, privacy leaks can hardly be prevented. In this paper, we introduce a novel paradigm de-anonymization attack re-identifying victims...
The industrial Internet of things (IIoT) is an important engine for manufacturing enterprises to provide intelligent products and services. data analysis model represented by digital twins the core IIoT development in industry. With IIoT, more attention has been paid application ultra-reliable low latency communications (URLLC) field IIoT. This paper mainly introduces 3GPP URLLC reducing delay enhancing reliability, as well research on little jitter high transmission efficiency, further...
Antimicrobial resistance is an ongoing “one health” challenge of global concern. The acyl-ACP synthetase (termed AasS) the zoonotic pathogen Vibrio harveyi recycles exogenous fatty acid (eFA), bypassing requirement type II synthesis (FAS II), a druggable pathway. A growing body bacterial AasS-type isoenzymes compromises clinical efficacy FAS II-directed antimicrobials, like cerulenin. Very recently, acyl adenylate mimic, C10-AMS, was proposed as lead compound against AasS activity. However,...
Lifetime enhancement has been a hot issue in Wireless Sensor Networks (WSNs). To prolong the network lifetime of WSNs, this paper proposes an intelligent routing algorithm named RLLO. RLLO makes uses superiority reinforcement learning (RL) and considers residual energy hop count to define reward function. It is uniformly distribute consumption improve packet delivery without additional cost. This proposed compared with Energy Aware Routing (EAR) improved EAR (I-EAR). Simulation results show...
With the enhanced computing capabilities and a wide variety of functions available on smartphones, critical sensitive information, such as contact lists, messages, schedules, credit card numbers, is stored which makes preventing smartphone from being stolen an unprecedented importance. Loss smartphones not only causes economic loss but also jeopardizes privacy owners. Existing anti-theft schemes provide passive protection, remotely manipulates lost phones to lock delete private information....
With more and trajectory traces available, conducting analysis mining on those trajectories can obtain valuable information. Although the published are often made anonymous by substituting true identities of mobile nodes with random identifiers, privacy concern remains. In this paper, we propose a new de-anonymization attack based movement pattern moving objects. Since objects open to observe in public spaces, an attacker easily learn information about victim's either through direct...
The shuttle-carrier warehouse is a new kind of high-density intelligent high-bay warehouse. Based on existing research, the storage allocation problem this highbay has been studied, and an improved dynamic programming algorithm proposed based idea route selection. objective function designed in paper mainly considers "task completion time" "device busy level variance" for multiple pallets tasks which will be allocated into allows to allocate locations according current state optimized route,...