- Energy Harvesting in Wireless Networks
- Wireless Networks and Protocols
- Indoor and Outdoor Localization Technologies
- Advanced SAR Imaging Techniques
- UAV Applications and Optimization
- Nanofluid Flow and Heat Transfer
- Heat Transfer Mechanisms
- Energy Efficient Wireless Sensor Networks
- Advanced MIMO Systems Optimization
- Wireless Body Area Networks
- Underwater Vehicles and Communication Systems
- IoT Networks and Protocols
- Context-Aware Activity Recognition Systems
- Fish biology, ecology, and behavior
- Cooperative Communication and Network Coding
- Water Systems and Optimization
- Alkaloids: synthesis and pharmacology
- Target Tracking and Data Fusion in Sensor Networks
- Fluid Dynamics and Turbulent Flows
- Healthcare Systems and Reforms
- Flow Measurement and Analysis
- Aerospace and Aviation Technology
- Radar Systems and Signal Processing
- Cognitive Radio Networks and Spectrum Sensing
- Retinopathy of Prematurity Studies
Tsinghua University
2021-2025
China Pharmaceutical University
2023
Beihang University
2022
Kunming Medical University
2019
Shijiazhuang Tiedao University
2012
Yichun University
2012
With the rapid development of Internet Things (IoT) and rise 5G communication networks automatic driving, millimeter wave (mmWave) sensing is emerging starts impacting our life workspace. mmWave can sense humans objects in a contactless way, providing fine-grained ability. In past few years, many techniques have been proposed applied various human applications (e.g., localization, gesture recognition, vital monitoring). We discover need comprehensive survey to summarize technology, platforms...
Backscatter is an enabling technology for battery-free sensing in today's Artificial Intelligence of Things (AIOT). Building a backscatter-based system, however, daunting task, due to two obstacles: the unaffordable power consumption microprocessor and coexistence with ambient carrier's traffic. In order address above issues, this paper, we present Leggiero, first-of-its-kind analog WiFi backscatter payload transparency. Leveraging specially designed circuit varactor diode, design avoids...
WiFi-based device localization is a key technology for smart applications, while most of which rely on LoS signals to work. However, in real-world indoor environments, very few are usable accurate localization. This paper presents Bifrost , novel hardware-software co-design cope with this practical problem. The core idea reinvent WiFi provide sufficient signals. Specifically, we present low-cost plug-in design leaky wave antenna (LWA) that can generate orthogonal polarized signals: On one...
Fish can perceive the surrounding flow field using their lateral line systems, consisting of canal neuromasts (CNs) for pressure gradient perception and superficial (SNs) velocity detection. Although various artificial (ALL) systems have been developed inspired by fish, few studies combined both sensors hydrodynamic perception, how to optimize sensor placement remains unanswered, particularly on three-dimensional models. Herein we proposed a maximized stimulation strategy optimization. We...
As a novel fluid of functional material, magnetohydrodynamic (MHD) micropolar has the special properties light, heat, magnetic and so on. It is highly practical significance. The characteristics flow, heat mass transfer in MHD nanofluid boundary layer past stretching plate are investigated based on theory present numerical work. In presence field, viscous dissipation cross-diffusion caused by Dufour effect Soret considered. First order slip velocity condition employed. Mathematical models...
Small Unmanned Aerial Vehicles (UAVs) are becoming potential threats to security-sensitive areas and personal privacy. A UAV can shoot photos at height, but how detect such an uninvited intruder is open problem. This paper presents mmHawkeye, a passive approach for detection with COTS millimeter wave (mmWave) radar. mmHawkeye doesn't require prior knowledge of the type, motions, flight trajectory UAV, while exploiting signal feature induced by UAV's periodic micro-motion (PMM) long-range...
iBeacon protocol is widely deployed to provide location-based services. By receiving its BLE advertisements, nearby devices can estimate the proximity or calculate indoor positions. However, open nature of these advertisements brings vulnerability impersonation attacks. Such attacks could lead spam, unreliable positioning, and even security breaches. In this paper, we propose Wi-attack, revealing feasibility using WiFi conduct on Different from compatible hardware, Wi-attack not restricted...
Accurate perception of flight parameters is essential for the safe and stable small unmanned aerial systems (SUASs). However, traditional flush air data sensing (FADS) require complex tubing fuselage openings. Herein this study, a flexible skin system integrated with pressure thermal flow sensor array, dual‐sensor fusion algorithm determining angle attack (AOA) airspeed ( V ∞ ), are proposed. By establishing an error back‐propagation neural network, modality demonstrates higher estimation...
Time-Slotted Channel Hopping (TSCH) is a popular link-layer pro-tocol defined in the IEEE 802.15.4e standard that improves reli-ability and throughput of wireless sensor networks by exploiting diversity both time frequency. Despite body literature proposing several scheduling schemes for TSCH, gap yet to be filled design an effective way deal with internal external interference, which are known strongly affect communication performance. In fact, existing works either make use fixed schedule...
Introduction Enhancing the wellbeing of residents through universal health coverage (UHC) is a long-term policy goal for China. In 2016, China integrated New Rural Cooperative Medical Scheme (NRCMS) and Urban Resident Basic Insurance (URBMI) into (URRBMI) to address problem fragmentation. Objective The objective this study was investigate whether integration basic medical insurance had an impact on subjective Chinese residents. Methods Using Household Finance Survey data 2015 2019, we...
Cross-Technology Communication (CTC) emerges as a technology to enable direct communication across different wireless technologies. The state of the art on CTC employs physical-level emulation. Due protocol incompatibility and hardware restriction, there are intrinsic emulation errors between emulated signals legitimate signals. Unresolved hurt reliability achievable throughput, but how improve remains challenging problem. Taking from WiFi BLE an example, this work first presents...
Small Unmanned Aerial Vehicles (UAVs) are becoming potential threats to security-sensitive areas and personal privacy. A UAV can shoot photos at height, but how detect such an uninvited intruder is open problem. This article presents mmHawkeye, a passive approach for non-cooperative detection identification with commercial off-the-shelf millimeter wave (mmWave) radar. mmHawkeye does not require prior knowledge of the type, motions, flight trajectory UAV, while exploiting signal feature...
The paper discusses the instrumentation of leak detection and location on underground water supply pipelines based adaptive algorithms. equipment is designed to be self-contained portably mobile with sensors, signal conditioning data acquisition units a laptop PC operating processing, information analysis instrument control. vibrational acoustic signals collected tubular are used for pinpointing or leaks in buried pipelines. Because complexity heavy corruption ambient noises, it essential...
The ever-developing Internet of Things (IoT) brings the prosperity wireless sensing and control applications. In many scenarios, different technologies coexist in shared frequency medium as well physical space. Such coexistence may lead to serious cross-technology interference (CTI) problems, e.g. channel competition, signal collision, throughput degradation. Compared with traditional methods like avoidance, tolerance, concurrency mechanism, direct timely information exchange among...
Small Unmanned Aerial Vehicles (UAVs) are becoming potential threats to security-sensitive areas and personal privacy. A UAV can shoot photos at height, but how detect such an uninvited intruder is open problem. This paper presents mmHawkeye, a passive approach for detection with COTS millimeter wave (mmWave) radar. mmHawkeye doesn't require prior knowledge of the type, motions, flight trajectory UAV, while exploiting signal feature induced by UAV's periodic micro-motion (PMM) long-range...
In the process of scientific and technical awarding review each phase involves a lot score information. order to embody fairness impartiality process, safety protection data is particularly important. Through research system’s characteristics, this paper adopts tamper resistant technology suitable for system guarantee security scores. Practice proves that use these techniques greatly enhance stability system.