- Particle physics theoretical and experimental studies
- Quantum Chromodynamics and Particle Interactions
- High-Energy Particle Collisions Research
- Advanced MIMO Systems Optimization
- Advanced Wireless Network Optimization
- Advanced Wireless Communication Technologies
- Cooperative Communication and Network Coding
- Wireless Communication Networks Research
- UAV Applications and Optimization
- IoT and Edge/Fog Computing
- Caching and Content Delivery
- Video Coding and Compression Technologies
- Satellite Communication Systems
- Neutrino Physics Research
- Wireless Networks and Protocols
- Peer-to-Peer Network Technologies
- Advanced Wireless Communication Techniques
- Black Holes and Theoretical Physics
- Network Traffic and Congestion Control
- PAPR reduction in OFDM
- Energy Harvesting in Wireless Networks
- Dark Matter and Cosmic Phenomena
- Telecommunications and Broadcasting Technologies
- Advanced Vision and Imaging
- Privacy-Preserving Technologies in Data
PLA Academy of Military Science
2017-2025
University of California, Berkeley
2025
Chengdu University of Traditional Chinese Medicine
2024
Xi'an Jiaotong University
2017-2024
GS Engineering (United States)
2024
Northeastern University
2004-2024
Hunan University of Traditional Chinese Medicine
2024
China Guodian Corporation (China)
2024
Deleted Institution
2024
Tsinghua University
2014-2023
We study e+e-→π+π-hc at center-of-mass energies from 3.90 to 4.42 GeV by using data samples collected with the BESIII detector operating Beijing Electron Positron Collider. The Born cross sections are measured 13 and found be of same order magnitude as those e+e-→π+π-J/ψ but a different line shape. In π±hc mass spectrum, distinct structure, referred Zc(4020), is observed 4.02 GeV/c2. Zc(4020) carries an electric charge couples charmonium. A fit invariant neglecting possible interferences,...
The intensive computation of High Efficiency Video Coding (HEVC) engenders challenges for the hardwired encoder in terms hardware overhead and power dissipation. On other hand, constrains design seriously degrade efficiency software oriented fast coding unit (CU) partition mode decision algorithms. A algorithm is attributed as VLSI friendly, when it possesses following properties. First, maximum complexity encoding a tree (CTU) could be reduced. Second, parallelism should not deteriorated....
With the maneuverability and mobility control of unmanned aerial vehicle (UAV), carrying mobile edge computing (MEC) servers on UAVs is able to effectively alleviate explosive growth data traffic pressure. However, UAV adopts line-of-sight transmission which has broadcasting characteristics. Malicious eavesdroppers can easily take advantage characteristics eavesdrop information during computing. Therefore, security UAV-MEC systems a challenging problem. This article proposes secure...
Non-orthogonal multiple access (NOMA) allows users to share link resource for higher spectrum efficiency. It can be applied unmanned aerial vehicle (UAV) and mobile edge computing (MEC) networks provide convenient offloading service ground (GUs) with large-scale access. However, due the line-of-sight (LoS) of UAV transmission, information easily eavesdropped in NOMA-based UAV-MEC networks. In this paper, we propose a secure communication scheme system towards flying eavesdropper. proposed...
UAV communication has received widespread attention in MEC systems due to its high flexibility and line-of-sight transmission. Users can reduce their local computing pressures computation delay by offloading tasks the as an edge server. However, coverage capability of a single is very limited. Moreover, data offloaded will be easily eavesdropped. Thus, this paper, we propose two secure transmission methods for multi-UAV-assisted mobile based on single-agent multi-agent reinforcement...
Cooperative Vehicle-Infrastructure System (CVIS) can provide innovative services for traffic management and enable trips to be safer, more coordinated, smarter. In the CVIS, vehicles upload crowd sensing data Vehicular Edge Computing (VEC) server quick fusion informed decision-making. However, with ever-increasing number of vehicles, VEC cannot undertake massive computation-intensive tasks due limited edge computing capabilities. this paper, we propose a reverse offloading framework that...
Non-terrestrial network (NTN) is a trending topic in the field of communication, as it shows promise for scenarios which terrestrial infrastructure unavailable. Unmanned autonomous intelligent systems (UAISs), physical form artificial intelligence (AI), have gained significant attention from academia and industry. These various applications driving, logistics, area surveillance, medical services. With rapid evolution information communication technology (ICT), 5G beyond-5G enabled numerous...
To supporting the systematic requirements of higher spectrum efficiency and user deployment density in future Industrial Internet Things (IIoT), traditional orthogonal multiple access schemes, such as frequency-division multiplex, are quite limiting. Nonorthogonal (NoMA) has been recognized one enabling technologies for IIoT 5G network. In this paper, we have proposed an alternative NoMA scheme called interleave-grid (IGMA). Depending on interleaving grid-mapping process, IGMA is capable to...
We measure the branching fractions for $\ensuremath{\psi}(3770)\ensuremath{\rightarrow}{D}^{0}{\overline{D}}^{0}$, ${D}^{+}{D}^{\ensuremath{-}}$, $D\overline{D}$, and non-$D\overline{D}$ to be $(46.7\ifmmode\pm\else\textpm\fi{}4.7\ifmmode\pm\else\textpm\fi{}2.3)%$, $(36.9\ifmmode\pm\else\textpm\fi{}3.7\ifmmode\pm\else\textpm\fi{}2.8)%$, $(83.6\ifmmode\pm\else\textpm\fi{}7.3\ifmmode\pm\else\textpm\fi{}4.2)%$, $(16.4\ifmmode\pm\else\textpm\fi{}7.3\ifmmode\pm\else\textpm\fi{}4.2)%$,...
An enhancement near threshold is observed in the omega(phi) invariant mass spectrum from doubly Okubo-Zweig-Iizuka-suppressed decays of J/psi-->gamma(omega)phi, based on a sample 5.8 x 10(7) J/psi events collected with BESII detector. A partial wave analysis shows that this favors JP=0+, and its width are M=1812(+19)(-26)(stat)+/-18(syst) MeV/c2 Gamma=105+/-20(stat)+/-28(syst) MeV/c2. The product branching fraction determined to be...
By analyzing the large-angle Bhabha scattering events e+e− → (γ)e+e− and diphoton (γ)γγ for data sets collected at center-of-mass (c.m.) energies between 2.2324 4.5900 GeV (131 energy points in total) with upgraded Beijing Spectrometer (BESIII) Electron-Positron Collider (BEPCII), integrated luminosities have been measured different c.m. energies, individually. The results are important inputs R value J/ψ resonance parameter measurements.
Using a total of 11.0 fb^{-1} e^{+}e^{-} collision data with center-of-mass energies between 4.009 and 4.6 GeV collected the BESIII detector at BEPCII, we measure fifteen exclusive cross sections effective form factors for process e^{+}e^{-}→Ξ^{-}Ξ[over ¯]^{+} by means single baryon-tag method. After performing fit to dressed section ¯]^{+}, no significant ψ(4230) or ψ(4260) resonance is observed in Ξ^{-}Ξ[over final states, upper limits 90% confidence level on Γ_{ee}B processes...
Based on electron-positron collision data collected with the BESIII detector operating at Beijing Electron-Positron Collider II storage rings, value of R≡σ(e^{+}e^{-}→hadrons)/σ(e^{+}e^{-}→μ^{+}μ^{-}) is measured 14 center-of-mass energies from 2.2324 to 3.6710 GeV. The resulting uncertainties are less than 3.0% and dominated by systematic uncertainties.
With the merits of high mobility and easy deployment, mounting mobile edge computing (MEC) servers on unmanned aerial vehicles(UAVs) can efficiently fulfill task offloading ground users (GUs) over a large area. Nevertheless, data security is challenging issue for computation in UAV-MEC networks, especially when there exist flying eavesdroppers. An intelligent reflecting surface (IRS) assisted secure communication scheme network proposed this paper, wherein multiple IRSs are utilized to help...
We report an observation of the process J/ψ→γX(1835)→γK_{S}^{0}K_{S}^{0}η at low K_{S}^{0}K_{S}^{0} mass with a statistical significance larger than 12.9σ using data sample 1.31×10^{9} J/ψ events collected BESIII detector. In this region phase space system is dominantly produced through f_{0}(980). By performing partial wave analysis, we determine spin parity X(1835) to be J^{PC}=0^{-+}. The and width observed are 1844±9(stat)_{-25}^{+16}(syst) MeV/c^{2}...
Using a low background data sample of 9.7×10^{5} J/ψ→γη^{'}, η^{'}→γπ^{+}π^{-} events, which are 2 orders magnitude larger than those from the previous experiments, recorded with BESIII detector at BEPCII, decay dynamics studied both model-dependent and model-independent approaches. The contributions ω ρ(770)-ω interference observed for first time in decays Additionally, contribution box anomaly or ρ(1450) resonance is required approach, while process specific part amplitude determined approach.
Using e^{+}e^{-} annihilation data of 2.93 fb^{-1} collected at center-of-mass energy sqrt[s]=3.773 GeV with the BESIII detector, we measure absolute branching fraction D^{0}→K^{-}μ^{+}ν_{μ} significantly improved precision: B_{D^{0}→K^{-}μ^{+}ν_{μ}}=(3.413±0.019_{stat}±0.035_{syst})%. Combining our previous measurement B_{D^{0}→K^{-}e^{+}ν_{e}}, ratio two fractions is determined to be B_{D^{0}→K^{-}μ^{+}ν_{μ}}/B_{D^{0}→K^{-}e^{+}ν_{e}}=0.974±0.007_{stat}±0.012_{syst}, which agrees...
Although layered streaming in heterogeneous peer-to-peer networks has drawn great interest recent years, there's still a lack of systematical studies on its data scheduling issue. In this paper, we propose new approach for video streaming, called LayerP2P. The key idea and main contributions LayerP2P come two-fold: 1) According to the characteristics caused by coding, four objectives that should be achieved scheduling: high throughput, layer delivery ratio, low useless packets subscription...
The increasing demand in 5G wireless systems has brought significant improvement transmission speed with lower latency, especially ultra-dense networks. of privacy and security are becoming more critical such large scale Different from traditional encryption methods, this paper, we discussed the physical layer features social opportunities networks summarized physical, link upper using cross optimization, will meet new problems pending to be tackled. Also, challenges due some ideal...