Peng Xu

ORCID: 0000-0001-8547-5344
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Data Storage Technologies
  • Caching and Content Delivery
  • Energy Efficient Wireless Sensor Networks
  • Parallel Computing and Optimization Techniques
  • Cloud Computing and Resource Management
  • Security in Wireless Sensor Networks
  • Indoor and Outdoor Localization Technologies
  • Water Quality Monitoring Technologies
  • Distributed and Parallel Computing Systems
  • IoT-based Smart Home Systems
  • Peer-to-Peer Network Technologies
  • IoT and Edge/Fog Computing
  • High Entropy Alloys Studies
  • Advanced MIMO Systems Optimization
  • Privacy-Preserving Technologies in Data
  • Educational Research and Pedagogy
  • Piezoelectric Actuators and Control
  • Mobile Ad Hoc Networks
  • Multimodal Machine Learning Applications
  • Advanced Memory and Neural Computing
  • Advanced ceramic materials synthesis
  • High-Temperature Coating Behaviors
  • Low-power high-performance VLSI design
  • Cryptography and Data Security
  • Adhesion, Friction, and Surface Interactions

Huazhong University of Science and Technology
2011-2024

Zhejiang Lab
2023-2024

Beijing Institute of Technology
2016-2023

Wuhan Donghu University
2022

Wuhan University
2022

Dalian University of Technology
2021

Wuhan National Laboratory for Optoelectronics
2016-2020

Qingdao Agricultural University
2013

Jilin University
2012

Chinese University of Hong Kong
2011

Recently academia and industry has growing interest in the sixth generation network, which aims to support a rich range of applications with higher capacity greater coverage than existing 5G connections. One such promising that can benefit from 6G is Decentralised Federated Learning, privacy-preserving machine learning paradigm. Also, it relies heavily on peer-to-peer mobile connection among edge devices, instead powerful central server cloud. However, data device heterogeneity, highly...

10.1109/tnse.2022.3185672 article EN IEEE Transactions on Network Science and Engineering 2022-06-23

Cloud storage is gaining popularity because features such as pay-as-you-go significantly reduce costs. However, the community has not sufficiently explored its contract model and latency characteristics. As LSM-Tree-based key-value stores (LSM stores) become building block for numerous cloud applications, how would impact performance of accesses vital. This study reveals significant variances Amazon Elastic Block Store (EBS) under various I/O pressures, which challenges LSM store read on...

10.1145/3643851 article EN ACM Transactions on Storage 2024-02-20

Nowadays we are witnessing rapid development of the Internet Things (IoT), machine learning, and cellular network technologies. They key components to promote wireless networks beyond 5G (B5G). The plenty data generated from numerous IoT devices, such as smart sensors mobile can be utilised train intelligent models. But it still remains a challenge efficiently utilise edge in B5G conduct model training. In this paper, propose parallel training method which uses operators scheduling units...

10.1109/jstsp.2022.3223759 article EN IEEE Journal of Selected Topics in Signal Processing 2022-11-21

Based on the summary of Wireless Sensor Networks' characteristics, we analyze applications and its development trends, put forward factors that restrict Networks. In this paper, Networks opportunities challenges in future, provide some new ideas enlightenment for comprehensive widely used.

10.4028/www.scientific.net/amm.475-476.520 article EN Applied Mechanics and Materials 2013-12-01

Sensor nodes carry limited, generally irreplaceable, power sources. Therefore, sensor network must focus on conservation. It is possible to extend the lifetime of a by controlling its topology through clustering. Overlapping Clustering find wide applications such as inter-cluster routing, discovery, node localization, and recovery from cluster head failure so on. Topology control target tracking-oriented based overlapping clustering in wireless proposed this paper. When move sensing filed,...

10.1109/icnsc.2010.5461567 article EN 2010-04-01

To satisfy the explosive growth of data in large-scale centers, where redundant arrays independent disks (RAIDs), especially RAID-5, are widely deployed, effective storage scaling and disk expansion methods desired. However, a way to reduce migration overhead maintain reliability original RAID major concerns scaling. address these problems, we propose new scheme, H-Scale, achieve fast via hybrid stripe layouts. H-Scale takes advantage loose restriction structures choose migrated create...

10.1145/2822895 article EN ACM Transactions on Storage 2016-04-29

The explosive growth of modern web-scale applications has made cost-effectiveness a primary design goal for their underlying databases. As backbone databases, LSM-tree based key–value stores (LSM store) face limited storage options. They are either designed local that is relatively small, expensive, and fast or cloud offers larger capacities at reduced costs but slower. Designing an LSM store by integrating with services promising way to balance the cost performance. However, such faces...

10.1145/3527452 article EN ACM Transactions on Architecture and Code Optimization 2022-03-31

Residual stress will be generated in capacitive micromachined ultrasonic transducer (CMUT) during standard CMOS fabrication process, which has great effect on the CMUT performance, such as collapse voltage, resonant frequency, transformer ratio, sensitivity and bandwidth. To meet requirements of design improvements sufficient considerations for effects residual stresses performances should taken. The finite element simulation methods (FEM) are used to investigate influences performance this...

10.1109/iceice.2011.5777283 article EN International Conference on Electric Information and Control Engineering 2011-04-01

The explosive growth of modern web-scale applications has made cost-effectiveness a primary design goal for their underlying databases. As backbone databases, LSM-tree based key-value stores (LSM store) face limited storage options. They are either designed local that is relatively small, expensive, and fast or cloud offers larger capacities at reduced costs but slower. Designing an LSM store by integrating with services promising way to balance the cost performance. However, such faces...

10.1109/cluster48925.2021.00032 article EN 2021-09-01

A reduced model was used to simulate the CVI process from methane. The scale of preform 120mm in diameter and 90mm height. random pore describe evolution pores preform. Parameters such as temperatures pressures were studied research deposition process. Effects these two parameters are similar but have different impact mechanisms according analysis results. Temperature impacts reaction rate improve efficiency deposition, while pressure concentrations all hydrocarbon then improves total amount...

10.4028/www.scientific.net/amr.502.41 article EN Advanced materials research 2012-04-01

In a parity-based SSD RAID, small write requests not only accelerate the wear-out of SSDs due to extra writes for updating parities but also deteriorate performance associated expensive garbage collection. To mitigate problem writes, buffer is often added at RAID controller absorb overwrites and performed same stripe. However, this approach achieves suboptimal efficiency because file layout information invisible block level.This paper proposes RAFS, RAID-aware system, which utilizes...

10.23919/date.2019.8714938 article EN Design, Automation & Test in Europe Conference & Exhibition (DATE), 2015 2019-03-01

Log-Structured-Merge (LSM) tree-based key value stores are facing critical challenges of fully leveraging the dramatic performance improvements underlying storage devices, which makes compaction operations LSM become CPU-bound, and slow compactions significantly degrade store performance. To address this issue, we propose LUDA, an with CUDA, uses a GPU to accelerate stores. How efficiently parallelize procedures as well accommodate optimal contract architecture challenge LUDA. Specifically,...

10.48550/arxiv.2004.03054 preprint EN other-oa arXiv (Cornell University) 2020-01-01

Existing conventional RAID storage systems are unable to provide expected performance under the explosive growth in data volumes. One of solution is introducing SSDs (Solid State Drives), a promising medium which provides high and power efficiency, as cache loosen bottleneck systems. However, using DRAM universe buffer area roughly, regardless different characteristics between RAID, inefficient. This paper proposes SHA (SSD aware Heterogeneous Algorithm), divides into two regions: SSD region...

10.1109/icccbda.2016.7529536 article EN 2016-07-01

The endoscopic system is widely used in medical and industrial areas, but how to realize the high-precision three-dimensional measurement limited space scale still faces many challenges. A method based on four-step phase-shifting structured light illumination proposed this paper for 3D measurements. Structured of which adjacent phase shift 90 degrees generated by different parts time-sharing lighting stripe grating optical fiber bundle; CMOS camera collect four images with shift. Finally,...

10.1117/12.2244834 article EN Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE 2016-10-19

Target tracking in wireless sensor networks with limited recourses is a challenging problem. Thus, deployment of nodes must focus on power conservation. It possible to extend the lifetime network by controlling its topology through clustering. Topology control target tracking-oriented proposed this paper. When move sensing filed, cluster heads located fuzzy clustering, and then these invite their neighboring sensors form cluster. The trajectory targets estimated maximum entropy Utilizing...

10.1109/wicom.2009.5304199 article EN 2009-09-01

One of the most important constraints on wireless sensor network is low power consumption. Therefore, topology must focus conservation. It possible to extend lifetime a by controlling its through clustering. Overlapping clustering find wide applications such as inter-cluster routing, discovery, node localization, and recovery from cluster head failure so on. Topology control target tracking-oriented based overlapping in proposed this paper. When move sensing filed, heads located fuzzy...

10.1109/ical.2009.5262667 article EN 2009-08-01

The ability to plan online paths, that passes through points of interest for coverage an unknown environment is essential robot autonomy. Existing state the art path planning techniques active exploration (Frontier and Next-Best-View) are occupancy grid maps based, which do not scale well in large area environments, suffer from long term drift robust at values sensor range noise, address navigation safety. We proposed a Coverage Path Planning (CPP) algorithm, based on coordinate system...

10.1109/robio55434.2022.10012015 article EN 2021 IEEE International Conference on Robotics and Biomimetics (ROBIO) 2022-12-05

We analyze the solar-powered wireless sensor network's energy gathering techniques, aiming to prolong lifetime of network. summarize network node's autonomy system, its characteristics in detail and new technology adopts, provides some suggestions ideas design research networks.

10.4028/www.scientific.net/amm.477-478.396 article EN Applied Mechanics and Materials 2013-12-01

According to the energy constraints characteristics of Wireless Sensor Networks, how optimize clustering, reduce node consumption and balance network dissipation is an main target, we proposes Energy Efficient Clustering protocol based on Niching Particle Swarm Optimization (NPSO-EEC), algorithm considers factors such as nodes residual neighbor status, etc. The simulation results show that proposed can effectively, sensor death rate, prolong lifetime.

10.4028/www.scientific.net/amm.475-476.500 article EN Applied Mechanics and Materials 2013-12-01
Coming Soon ...