- Mobile Ad Hoc Networks
- Opportunistic and Delay-Tolerant Networks
- Caching and Content Delivery
- IoT and Edge/Fog Computing
- Blockchain Technology Applications and Security
- Cooperative Communication and Network Coding
- Energy Efficient Wireless Sensor Networks
- Wireless Networks and Protocols
- Advanced Optical Network Technologies
- Software-Defined Networks and 5G
- Network Traffic and Congestion Control
- Mobile Crowdsensing and Crowdsourcing
- Vehicular Ad Hoc Networks (VANETs)
- Privacy-Preserving Technologies in Data
- IoT Networks and Protocols
- HVDC Systems and Fault Protection
- Complex Network Analysis Techniques
- Human Mobility and Location-Based Analysis
- Power System Optimization and Stability
- Age of Information Optimization
- Advanced Text Analysis Techniques
- Microgrid Control and Optimization
- Mobile Agent-Based Network Management
- Text and Document Classification Technologies
- Security in Wireless Sensor Networks
Central South University
2016-2025
Hikvision (China)
2024
Shenzhen Technology University
2019-2023
Huawei Technologies (China)
2014-2021
Huawei Technologies (United Kingdom)
2016-2021
Xi'an Jiaotong University
2019-2020
Hunan University
2019
Chongqing University of Posts and Telecommunications
2013-2015
Beihang University
2010-2011
Hunan International Economics University
2011
As a promising new paradigm, Vehicular Edge Computing (VEC) can improve the QoS of vehicular applications by computation offloading. However, with more and computation-intensive applications, VEC servers face challenges limited resources. In this paper, we study how to effectively economically utilize idle resources in volunteer vehicles handle overloaded tasks servers. First, present model assisted edge computing, which cost utility functions are defined for requesting servers, encouraged...
The rapid development of mobile communication technologies prompts the emergence edge computing (MEC). As key technology toward 5th generation (5G) wireless networks, it allows users to offload their computational tasks nearby servers deployed in base stations alleviate shortage resource. Nevertheless, various challenges, especially edge-user-allocation problem, are yet be properly addressed. Traditional studies consider this problem as a static global optimization where user positions...
Geographic routing is a research hotspot of the Internet Vehicles (IoV) and intelligent traffic system (ITS). In practice, vehicle movement not only affected by its characteristics relationship between position but also some implicit factors. Pointing to this problem, we combine moving probability matrix, association factors study influence potential features propose algorithm based on (RAVP) analysis, which can obtain more accurate prediction trajectory. Then, distance obtained By...
Remote clouds are gradually unable to achieve ultra-low latency meet the requirements of mobile users because intolerable long distance between remote and network congestion caused by tremendous number users. Mobile edge computing, a new paradigm, has been proposed mitigate aforementioned effects. Existing studies mostly assume servers have deployed properly they just pay attention how minimize delay In this paper, considering practical environment, we investigate deploy effectively...
In vehicular edge computing (VEC), the execution of offloading task needs not only data uploaded by requesting vehicle, but also additional to support be executed successfully, and how efficiently cache access these supporting becomes key issue for in VEC. this paper, we study efficient caching mechanism minimize acquisition delay data. Firstly, with software defined network (SDN) based VEC framework, analyze ways collaboration between servers. Then, according density vehicles, divide...
In vehicular edge computing, the servers may be overloaded once too many vehicles request task offloading service, which will cause failure or high service delay. To provide high-quality VEC processing capabilities of vehicles, servers, and cloud should utilized simultaneously in offloading. this article, we focus on allocation for requesting vehicle pricing schemes server cloud. From a market perspective, model competition cooperation among vehicle, server, as Stackelberg game. Then, based...
Network virtualization is enabling infrastructure providers (InPs) to offer new services service (SPs). InPs are usually bound by level agreements ensure various levels of resource availability for different SPs' virtual networks (VNs). They provision redundant backup resources while embedding an SP's VN request conform the SLAs during physical failures in infrastructure. An extreme provisioning reserve a mutually exclusive each element request. Such dedicated protection scheme can enable...
Skin cancer is a prevalent and perilous form of presents significant diagnostic challenges due to its high costs, dependence on medical experts, time-consuming procedures. The existing process inefficient expensive, requiring extensive expertise time. To tackle these issues, researchers have explored the application artificial intelligence (AI) tools, particularly machine learning techniques such as shallow deep learning, enhance for skin cancer. These tools employ computer algorithms neural...
The detection of malware attacks remains a significant challenge due rapid increase in variety malicious files. An efficient system is crucial to ensure robust protection and support post-attack recovery systems. In response this challenge, we propose novel deep learning-based framework which designed improve the accuracy effectiveness detection. employes two advanced pre-trained models including InceptionV3 MobileNetV2, are known for their feature extraction capabilities. To make...
Using Google cluster traces, the research presents a task offloading algorithm and hybrid forecasting model that unites Bidirectional Long Short-Term Memory (BiLSTM) with Gated Recurrent Unit (GRU) layers along an attention mechanism. This predicts resource usage for flexible scheduling in Internet of Things (IoT) applications based on edge computing. The suggested improves distribution to boost performance reduce energy consumption. system’s design includes collecting data, fusing preparing...
With the emergence of computation-intensive applications such as face recognition, natural language processing, etc., performance mobile devices appears to be weak. Mobile cloud computing is extensively used cover aforementioned shortage. However, distance between remote and might too far tolerable. Cloudlet computing, fog edge are proposed bring resources near reduce high delay caused by long distance. Although there exist tremendous studies focused on offloading strategies, where how place...
Word-of-Mouth (WoM) mode, as a new mode of task sensing in crowdsourcing, shows high efficiency building contributor groups. To better tap the potential WoM mobile underlying rationale interactions among contributors needs to be well understood. In this article, we analyze behavior based on Stackelberg game, and find optimal strategies for contributors. We consider two different crowdsourcing tasks announcement methods: 1) one-time parallel 2) multitime sequential ways, which form market...
In vehicular edge computing, network performance and computing resources dynamically change, vehicles should find the optimal strategy for offloading their tasks to servers achieve a rapid service. this paper, we address multi-layered vehicle edge-computing framework, where each can choose one of three strategies task offloading. For best performance, propose prediction-based task-offloading scheme vehicles, in which deep-learning model is designed predict result (success/failure) service...
In this paper, we present the results of comparison three reactive routing protocols for Wireless sensor networks (WSNs), AODV, DYMO and RPL. For purpose performance evaluation, detailed comparisons are made with AODV DYMO. Simulations run to estimate network topology change, overhead average packet End-to-End Delay. We simulate RPL COOJA based on contiki operating system. It is showed that protocol offers adaptation changing performances superior other two in 6lowpan, it has a higher stability than
Mobile edge computing (MEC) is concerned with moving complex tasks from data sources to nearby resources, which can reduce latency and remote cloud workload. Although there has been significant research in the field of MEC, on server placement wireless metropolitan area networks (WMANs) overlooked, load balancing problem servers seldom discussed. From a practical perspective, how place efficiently WMANs while considering between studied. A greedy algorithm proposed that balance workload more...
In mobile opportunistic networks, the social relationship among nodes has an important impact on data transmission efficiency. Motivated by strong share ability of "circles friends" in communication networks such as Facebook, Twitter, Wechat and so on, we take a real-life example to show that relationships consist explicit implicit parts. The part comes from direct contact nodes, can be measured through friends". We present definitions between two adaptive weights parts are given according...
Traditional underground coalmine monitoring systems are mainly based on the use of wired transmission. However, when cables damaged during an accident, it is difficult to obtain relevant data environmental parameters and emergency situation underground. To address this problem, wireless sensor networks (WSNs) has been proposed. shape tunnels not conducive deployment WSNs as they long narrow. Therefore, issues with network arise, such extremely large energy consumption, very weak...
This paper addresses Connectivity-aware Virtual Network Embedding (CoViNE) problem, which consists in embedding a virtual network (VN) on substrate while ensuring VN connectivity (without any bandwidth guarantee) against multiple link failures. CoViNE provides weaker form of survivability incurring less resource overhead than traditional models. To optimally solve CoViNE, we present an Integer Linear Program (ILP), namely CoViNE-opt. CoViNE-opt enumerates exponential number edge-cuts...