- Energy Efficient Wireless Sensor Networks
- Security in Wireless Sensor Networks
- Mobile Ad Hoc Networks
- Network Security and Intrusion Detection
- Metaheuristic Optimization Algorithms Research
- IoT and Edge/Fog Computing
- Adhesion, Friction, and Surface Interactions
- Smart Grid Security and Resilience
- Insect and Arachnid Ecology and Behavior
- Energy Harvesting in Wireless Networks
- Advanced Malware Detection Techniques
- Information and Cyber Security
- Force Microscopy Techniques and Applications
- Wireless Networks and Protocols
- Innovative Energy Harvesting Technologies
- Surface Modification and Superhydrophobicity
- Cybercrime and Law Enforcement Studies
- Robot Manipulation and Learning
- Cloud Data Security Solutions
- Indoor and Outdoor Localization Technologies
- Oral microbiology and periodontitis research
- Context-Aware Activity Recognition Systems
- Distributed Sensor Networks and Detection Algorithms
- Software-Defined Networks and 5G
- Millimeter-Wave Propagation and Modeling
Beijing Institute of Technology
2019-2025
Shandong University of Science and Technology
2022-2024
Stomatology Hospital
2024
Guangzhou Development Zone Hospital
2024
China Medical University
2022-2024
Wuhan Sports University
2023
Guangxi University
2022
Zhejiang A & F University
2021
Guiyang Medical University
2019
Affiliated Hospital of Guizhou Medical University
2019
In recent years, Internet of things (IoT) is widely used in various domains. However, the security IoT system becomes a challenge. If attacked, great property loss will happen. this paper, denial service (DoS) attack to an shown. The tool Kali Linux, A Denial Service (DOS) launched by using 3 different methods. comparison between DoS methods also given.
Solar interface water evaporation has been demonstrated to be an advanced method for freshwater production with high solar energy utilization. The development of evaporators lower cost and higher efficiency is a key challenge in the manufacture practical devices. Herein, bamboo leaf‐derived carbon‐based evaporator designed based on light trace simulation. And then, it manufactured by vertical arrangement carbonization leaves subsequent polyacrylamide modification. vertically arranged carbon...
Inverse Kinematics of robots is a fundamental problem in robotics that involves calculating the joint angles robot to achieve desired end-effector position and orientation. Analytical solutions are generally used when robots’ configurations consistent. However, practical applications, different manufacturers may have varying base coordinates, end axis rotation directions, which limits generality analytical solutions. This paper introduces general framework for solving inverse solution with...
In current medical diagnostics, skin patches often experience reduced adhesion forces or even complete failure due to perspiration, thereby compromising the quality and stability of biosignal monitoring. Inspired by hexagonal prism structure tree frogs frame honeybees, we designed a honeybee-treefrog bionic hierarchical patterned surface (HTP) fabricated with polydimethylsiloxane (PDMS), integrating advantages both organisms significantly enhance wet performance. The performance HTP under...
The most important goal in event-driven wireless sensor networks is to transmit the event information users as soon possible. One of factors that would make it possible reach this design efficient detecting protocols. In paper, we present an protocol (EEDP) specified for monitoring applications. occuring area, each node broadcasts its primary detection result a decision corporately. And then decision-made will choose next hop using underlying routing forward single alarm packet. To improve...
This study extends research on the relationship between physical activity and adolescent resilience by using cross-lagged analysis. Therefore, it used Adolescent Resilience Rating Scale Physical Activity to conduct a one-year longitudinal follow-up survey 818 adolescents (50.6% boys), aged 12–17. They completed questionnaires, providing data resilience. The results indicated there were significant gender differences in activity, but was no difference resilience; positive correlation had...
Biofilm formation constitutes the primary cause of various chronic infections, such as wound gastrointestinal inflammation and dental caries. While preliminary achievement biofilm inhibition is possible, challenge lies in difficulty eliminating bactericidal effects current drugs that lead to microbiota imbalance. This study, utilizing vitro vivo models caries, aims efficiently inhibit without inducing effects, even against pathogenic bacteria. The tetrahedral framework nucleic acid (tFNA)...
Accompanied with accelerated development of the Internet Things (IoT) and smart home industry, access control systems, e.g. locks, are getting popular in recent years. In this paper, we propose a system that allows users to enter buildings via mobile phones. Also,
Accompanied with accelerated development of the Internet Things (IoT) and smart home industry, access control systems, e.g. locks, are getting popular in recent years. In this paper, we propose a system that allows users to enter buildings via mobile phones. Also, protocol is designed secure communications system. addition, some investigation results regarding security usability found: (1) most people pay more attention system; (2) prefer using fingerprint as primary unlocking mechanism.
Antibiotic was detected in many environments, and it had posed a serious threat to human health. The advanced oxidation process has been considered an effective way treat antibiotics. In this work, using industrial waste red mud (RM) as raw material, series of modified RM (MRM-T; T donates the calcination temperature) obtained via facile method applied activate sodium bisulfite (NaHSO3) for lomefloxacin (LOM) degradation. Among all MRM-T, MRM-700 exhibited superior catalytic activity,...
In monitoring wireless sensor networks (WSNs), the occurrence of an emergency will generate a large amount data in very short time. Among them, some urgent information is more critical and needs to be transmitted out reliably as soon possible. this scenario, congestion inevitable due limited resources, especially near sink. To address problem, we propose novel reliable transmission protocol for (RETP-UI) WSNs. RETP-UI, not only current queue length but also ratio length's fluctuation adopted...
Risk assessment and management for information system are very important assuring the security. It requires not only careful but also systematic analysis of threat vulnerability information. Depending on result, we could determine extent to which events adversely impact organization likelihood that such will occur. Under FISMA(Federal Information Security Management Act) 2002, Technology Laboratory (ITL) at National Institute Standards (NIST) develops a series publications protect system. In...
Power control technology in wireless sensor network (WSN) is of great significance to ensure the coverage, reduce power consumption nodes, and optimize performance. In this paper, a new based on routing protocol (PCBRP) MAC layer proposed. It operates with help calculates optimal transmission according distance between neighbor nodes. A mapping table including node's address established during route building procedure. The can be gotten through searching next hop latter data transmission....
Due to flexibility, low cost and rapid deployment, wireless sensor networks (WSNs)have been drawing more interest from governments, researchers, application developers, manufacturers in recent years. Nowadays, we are the age of industry 4.0, which traditional industrial control systems will be connected with each other provide intelligent manufacturing. Therefore, WSNs can play an extremely crucial role monitor environment condition parameters for smart factories. Nevertheless, introduction...
ABSTRACT Protocols for sensor networks have traditionally been designed using the best effort delivery model. However, there are many specific applications that need reliable transmissions. In event‐driven wireless networks, occurrence of an event may generate a large amount data in very short time. Among them, some critical urgent information needs to be transmitted reliably timely manner. this scenario, congestion is inevitable because constraints available resources. How control important...
This paper gives out a survey on event monitoring in Event-driven wireless sensor networks (EWSNs). In EWSNs, there are mainly two tasks, one is accurate detection with higher probability and lower false-alarm probability. The other reliable dissemination of the information after detection. this paper, we firstly address design issues for dissemination, then some existing scheme protocols introduced compared. Finally, several problems to be solved outlined.
The dynamic adhesive systems in nature have served as inspirations for the development of intelligent surfaces. However, mechanisms underlying rapid controllable contact adhesion observed biological never been adequately explained. Here, control principle unfolding footpads (alterable area) honeybees is investigated. can passively unfold, even without neuro-muscular reflexes, response to specific dragging activity (generating shear force) toward their bodies. This passive attributed...