- Indoor and Outdoor Localization Technologies
- Energy Efficient Wireless Sensor Networks
- Advanced Image Fusion Techniques
- Electrostatic Discharge in Electronics
- Microgrid Control and Optimization
- Speech and Audio Processing
- Image and Signal Denoising Methods
- Power Systems and Renewable Energy
- Blockchain Technology Applications and Security
- User Authentication and Security Systems
- Mobile Ad Hoc Networks
- Underwater Vehicles and Communication Systems
- Robotics and Sensor-Based Localization
- Molecular Communication and Nanonetworks
- Digital Media and Visual Art
- Industrial Automation and Control Systems
- Synthetic Aperture Radar (SAR) Applications and Techniques
- Control and Dynamics of Mobile Robots
- Welding Techniques and Residual Stresses
- Cryptography and Data Security
- Physical Unclonable Functions (PUFs) and Hardware Security
- Cultural Industries and Urban Development
- Advanced Authentication Protocols Security
- Islanding Detection in Power Systems
- Advanced Vision and Imaging
Jiangnan University
2014-2025
Shandong University
2024
Chongqing University
2023-2024
Changchun Institute of Technology
2024
Harbin Institute of Technology
2021
Chongqing University of Posts and Telecommunications
2020
Beijing Institute of Technology
2019
National University of Defense Technology
2013-2016
Hong Kong University of Science and Technology
2010-2015
University of Hong Kong
2010-2015
Indoor localization has enabled a great number of mobile and pervasive applications, attracting attentions from researchers worldwide. Most current solutions rely on Received Signal Strength (RSS) wireless signals as location fingerprint, to discriminate locations interest. Fingerprint uniqueness with respect is basic requirement in these fingerprinting-based solutions. However, due insufficient signal sources, temporal variations signals, rich multipath effects, such not always met complex...
Smart home is one of the key applications Internet Things (IoT), which allows users to control smart devices in their houses through Internet. However, a system also faces severe challenges terms privacy and confidentiality when are allowed remotely access it. Despite recent research efforts on authentication schemes improve security aspects home, there still unsolved problems. On hand, most existing focus secure communication via trusted third party without taking its leakage into...
This paper proposes a monolithic electrostatic discharge/electrical overstress (ESD/EOS) co-protection device featuring gradual triggering by silicon-controlled rectifier (SCR) and metal–oxide semiconductor (MOS) structures, demonstrating enhanced voltage clamping current-conducting capabilities. Compared with conventional PMOS-triggered SCR (PMOS-SCR) for ESD protection, the proposed dual-PMOS-triggered (DPMOS-SCR) architecture within compact area achieves ESD/EOS protection performance due...
In low-duty-cycle networks, sensors stay dormant most of time to save their energy and wake up based on needs. Such a technique, while prolonging the network lifetime, sets excessive challenges for efficient flooding within network. Tailored obtaining short delay in recently proposed protocols have achieved some initial success. Many fundamental problems however, are still not well understood. this paper, we thoroughly investigate how behaviors fundamentally affected from theory practice...
To improve safety, a warning message in VANETs should be delivered both reliably and urgently. Existing solutions either tend to compromise propagation delay or do not reach high reliability due broadcast storm problem caused by excessive retransmissions. We propose ReC, which exploits geographical information help nodes autonomously achieve agreement on forwarding strategies. Each candidate ranks itself its neighbors (who affirmatively potentially received the already) distance centroid of...
Jump point search algorithm (JPS algorithm) is widely used in mobile robot path planning. In view of the long time and poor security JPS planning, this paper proposes a Bidirectional JPS+ algorithm. This method adopts bidirectional alternate orthogonal mechanism to ensure that searches can meet improve safety during movement. The map preprocessed speed up speed, performance more obvious large maps. order verify effectiveness algorithm, compared with A* simulation results show speeds improves...
Regulating illegal activities in cyberspace to balance user privacy and governance has been a non-trivial challenge when designing anonymous authentication solutions. For example, while several existing protocols support accountability, they either risk leaking users' private keys or incur significant overhead for accountability each ongoing authentication, including cloud service-based schemes. Seeking address these limitations, this paper proposes an auditable (A2UA) protocol based on...
Accurate localization is crucial for wireless ad-hoc and sensor networks. Among the schemes, component-based approaches specialize in performance, which can properly conquer network sparseness anchor sparseness. However, such design sensitive to measurement errors. Existing robust methods focus on eliminating positioning error of a single node. Indeed, node has two dimensions freedom 2D space only suffers from one type transformation: translation. As rigid structure, component three possible...
The fusion of digital art and cultural tourism has emerged as a trend presents an opportunity for future growth. This article delves into the design research in realm urban tourism. Urban tourism, crucial component modern is confron
Abstract The trade-off between breakdown voltage (BV) stability and electrostatic discharge (ESD) robustness in n-channel laterally diffused metal-oxide-semiconductor (nLDMOS) devices was investigated, by utilizing computer-aided design (TCAD) simulations charge-pumping (CP) measurements. BV ESD were improved enlarging the key parameter Lj of drift region, introducing step-graded doping respectively. proposed novel nLDMOS device demonstrates superior performance, exhibiting an excellent 2.0...
In this paper, a new denoising algorithm based on translation-invariant nonsubsampled Shearlet transform (NSST) using multiscale products threshold is proposed. After analyzing the dependence of NSST coefficients across scales, space, and directions, adaptive then applied to not directly coefficients. The approach introduced here presents two major advantages: (a) gets more directional subbands which capture anisotropic information natural image; (b) multiplicating operation enhances...
The paper analyzed the abuses of integrated administration separate in external water affairs, profession internal successive time small-town, and etc., existing traditional affairs planning village system town. Aiming at aspects above, author concludes that social engineering, including source supply wastewater town should carry through interrelated planning, constructions administration.
Surface defect detection uses advanced machine vision inspection technology to detect defects such as spots, pits, scratches and chromatic aberrations on the surface of workpiece. The traditional method requires manual selection features basis identification, which is time-consuming laborious has low accuracy in detection. To overcome aforementioned deficiencies, convolutional neural network (CNN) proposed a deep learning model extract autonomously an elegant way. In this paper, two smaller...
The motion dynamics and geometric information are considered to be one of the most useful features for infrared (IR) targets recognition. Especially exo-atmospheric target, when a target undergoes micro-motion in outer space, such as mechanical vibrations or rotations, it would induce amplitude modulations on signature projected area along Line-of-Sight (LOS) IR detection. aim this article is estimate parameters from area. For that, we introduce projection model targets, derive formulas...
In this paper, we investigate the predictability of packet arrivals in asynchronous duty-cycling wireless sensor networks (WSNs). We conduct statistical analysis on data traces collected both outdoor large-scale and indoor testbed WSN to show that traditional well-known traffic models, e.g., Poisson process Self-similarity process, do not fit well for modeling networks. According our observations, some key characteristics such as sleeping interval sampling rate have significant impact...
Aiming at the characteristics of big elevation difference terrain and complex topography in mountain mining area, The author recognized importance water supply security for economy pointed out some key problems that need to be paid attention process planning design area. In addition this, also introduces programs district optimal operation area with specific project.