- Energy Harvesting in Wireless Networks
- IoT and Edge/Fog Computing
- Wireless Communication Security Techniques
- Advanced MIMO Systems Optimization
- Advanced Wireless Communication Technologies
- IoT Networks and Protocols
- Full-Duplex Wireless Communications
- Age of Information Optimization
- Cooperative Communication and Network Coding
- Advanced Wireless Network Optimization
- UAV Applications and Optimization
- Smart Grid Energy Management
- Network Traffic and Congestion Control
- Caching and Content Delivery
- Privacy-Preserving Technologies in Data
- Cloud Computing and Resource Management
- Power System Optimization and Stability
- Smart Parking Systems Research
- Power Line Communications and Noise
- Electric Vehicles and Infrastructure
- Molecular Communication and Nanonetworks
- Green IT and Sustainability
- Vehicular Ad Hoc Networks (VANETs)
- Environmental DNA in Biodiversity Studies
- Distributed and Parallel Computing Systems
Guangdong University of Technology
2025
Northeastern University
2018-2023
Yanshan University
2023
Shanghai University of Electric Power
2019
With the rapid development of Wireless Computing Power Network (WCPN), urgent need for data privacy protection and communication efficiency led to emergence Federated learning (FL) framework. However, time delay leads dragging problems reduces convergence performance FL in training process. In this article, we propose a resource scheduling strategy based on information age perception WCPN, which can effectively reduce enhance FL. Moreover, cache buffer model are set up at user central server...
With the rapid development of Wireless Computing Power Networks (WCPNs), urgent need for data privacy protection and communication efficiency has led to emergence federated learning (FL) framework. However, time delay leads dragging problems reduces convergence performance FL in training process. In this article, we propose an resource scheduling strategy based on information age perception WCPNs, which can effectively reduce enhance FL. Moreover, a cache buffer model are set up at user end...
The evolution of information and communication technology, besides the proliferation mobile devices, pushes horizon Internet Things. main challenges for devices are limited battery power insufficient computational resources. Multiaccess edge computing (MEC) is an emerging paradigm that can provide task offloading services in proximity to alleviate their load. In addition, cannot work emergency scenarios (e.g., post-earthquake, post-flood, post-hurricane) or areas without infrastructure....
The low computational capacity of mobile devices has become the main performance bottleneck for emerging computing-intensive and delay-sensitive applications. In this paper, we propose a peer-to-peer (P2P) enhanced task scheduling framework to minimize average duration in device-to-device (D2D) enabled edge computing (MEC) network by jointly optimizing decision resource allocation. Our proposed can work different modes application scenarios. MEC mode, an iterative algorithm is presented...
This paper focuses on a mobile edge-computing-enabled heterogeneous network. A battery level-aware task-scheduling framework is proposed to improve the energy efficiency and prolong operating hours of battery-powered devices. The formulated optimization problem typical mixed-integer nonlinear programming problem. To solve this nondeterministic polynomial (NP)-hard problem, decomposition-based algorithm proposed. Using an alternating technology, original divided into three subproblems. In...
This paper focuses on the design of a novel cooperative jamming strategy and resource allocation scheme in two-way energy harvesting (EH) relay networks. For solving security vulnerability challenges, backscatter is proposed by leveraging information signals as carrier, which can degrade eavesdropping link without extra consumption, delay strict synchronization requirement. Based above design, we formulate secure efficiency (SEE) maximization problem jointly optimizing transmission powers...
Abstract In the Vehicle‐to‐Vehicle‐ (V2V) and Vehicle‐to‐Infrastructure‐ (V2I) enabled edge computing networks, task vehicle may fail to offload tasks nodes outside one‐hop communication with high resources, resulting in longer offloading time. Therefore, this paper, we first construct a multihop V2V/V2I communications‐enabled architecture, which innovatively adopts vehicles roadside units (RSUs) jointly expand resources of vehicle. Then, for node selection strategy, create adjacency table...
Soft Open Point (SOP), which can accurately control the power flow on both sides and increase grid flexibility, is a electronic device replacing traditional tie switch. This paper considers application of SOP impact different load shedding scheme restoration in distribution network. A mixed integer second-order cone programming (MISOCP) used to solve problem. Finally, test implemented IEEE 33-bus system. The result demonstrates that conducive And completely better than part without...
The secure full-duplex (FD) simultaneous wireless information and power transfer (SWIPT) system non-orthogonal multiple access (NOMA) have been deemed two promising technologies for the next generation of communication. In this paper, network is combined with device-to-device (D2D) a practical bounded channel state (CSI) estimation scheme. A total transmit minimization problem studied formulated as multi-objective optimization (MOO) via weighted Tchebycheff approach. set linear matrix...
In this paper, we propose a joint power allocation, time switching (TS) factor and relay selection scheme for an energy harvesting two-way relaying communication network (TWRN), where two transceivers exchange information with the help of wireless-powered relay. By exploiting TS architecture at node, node needs to use additional slots transmission, reducing transmission rate. Thus, resource allocation algorithm maximize max-min bidirectional instantaneous To solve original non-convex...
In this paper, a new communication model is built named grouping D2D (GD2D). Different from the traditional coordination, we proposed GD2D in licensed and unlicensed spectrum simultaneously. We formulate resource allocation problem, which aims at maximizing energy efficiency (EE) of system while guaranteeing quality-of-service (Qos) users. To efficiently solve non-convex optimization problem first transformed into convex problem. By transforming fractional-form an equivalent subtractive-form...
To guarantee secure information transmission within two sources, a full-duplex (FD) relay jamming scheme for two-way energy harvesting (EH) cooperative networks is proposed, in which the can achieve simultaneous reception and transmission. The EH node scavenges from source signals, then, uses harvested relaying by power splitting (PS) protocol. Considering multiple eavesdroppers, non-convex optimization maximizing smaller bidirectional secrecy rates formulated jointly optimizing allocation...
For the self-energy recycling (SER) untrusted relay network, a two-phase destination-based jamming (DBJ) protocol is proposed, in which destination transmits signal to reduce received SNR of node first phase and operated full-duplex (FD) mode for simultaneous energy transfer information relaying second phase. In addition, loopback interference (LI) generated by FD can be reused as part energy. To satisfy some practical application scenarios, we consider imperfect channel estimation error at...
Aiming to provide low-cost MEC services for mobile devices in areas without/lacking infrastructure, we propose a renewable-energy-driven energy-harvesting-based task scheduling and energy management framework. First, devices, the constructed consumption minimization problem is solved by an alternating-optimization-based algorithm. Then, design algorithm based on sampling average approximation derive optimal charging/discharging strategies, number of storage units, renewable utilization. The...
This paper investigates the energy efficiency of harvesting (EH) bidirectional cooperative sensor networks, in which considered system model enables uplink information transmission from (SN) to access point (AP) and supply for amplify-and-forward (AF) relay SN using power-splitting (PS) or time-switching (TS) protocol.Considering minimum EH activation constraint quality service (QoS) requirement, is maximized by jointly optimizing resource division ratio power.To cope with non-convexity...
In this paper1, power allocation problem is studied in non-orthogonal multiple access (NOMA) heterogeneous network (HetNet), which base stations with NOMA protocol can communicate users cell. The main aim of paper to maximize the energy efficiency (EE) by considering imperfect channel state information (CSI). It proved that optimization non-convex due constraint outage probability limit. Therefore, it's essential transform probabilistic theoretical derivation. Then, an optimal search...
In response to the explosive growth of mobile users and smart devices, demand for data traffic is expected grow. Deploying low-power small base stations (BSs) overlaid with a macro station promising strategy improve capacity cellular system. Therefore, we propose user scheduling scheme based on 0-1 convex programming knapsack problem algorithm (KPA). On this basis, present user-centric satisfaction perception, which used enhance service quality perception experience in Heterogeneous Networks...
In this paper, the secure information transmission of an energy harvesting (EH) cooperative network is considered, in which multiple eavesdroppers can overhear forwarded relay signal. To prevent from decoding confidential signals, destination transmits jamming signal while source to relay. Simultaneously, harvest more signals and by power splitting (PS) protocol, depicted as a non-linear EH process. Considering imperfect self-interference cancellation (SIC) at destination, secrecy rate...