- Caching and Content Delivery
- Peer-to-Peer Network Technologies
- Cloud Computing and Resource Management
- Software-Defined Networks and 5G
- Cryptography and Data Security
- Optical measurement and interference techniques
- Advanced Wireless Communication Techniques
- Cloud Data Security Solutions
- Privacy-Preserving Technologies in Data
- Advanced Vision and Imaging
- Neural Networks and Applications
- Robotic Mechanisms and Dynamics
- Algorithms and Data Compression
- Advanced Database Systems and Queries
- Satellite Communication Systems
- Advanced Optical Network Technologies
- Opportunistic and Delay-Tolerant Networks
- Matrix Theory and Algorithms
- Distributed systems and fault tolerance
- Blind Source Separation Techniques
- Technology and Security Systems
- Smart Grid and Power Systems
- Impact of Light on Environment and Health
- Stochastic Gradient Optimization Techniques
- Image Enhancement Techniques
Beijing University of Posts and Telecommunications
2007-2019
The University of Sydney
2017-2019
Hangzhou Dianzi University
2006-2012
Dezhou University
2011
Peking University
2009
Attribute-based encryption has been a promising technology to secure personal health records (PHRs) sharing in cloud computing. PHRs consist of the patient data often collected from various sources including hospitals and general practice centres. Different patients' access policies have common sub-policy. In this paper, we propose novel attribute-based scheme for fine-grained flexible control The generates shared information by sub-policy, which is based on different policies. Then,...
Mobile edge computing has significantly reduced the response time of mobile applications by executing services in close proximity to consumers. However, capabilities and resources servers are typically limited; additionally, service requirements environments becoming increasingly complex diverse. In this context, properly dispatching requests cloud improve quality become a crucial problem. paper, we focus on problem aim minimize invocations systems. The is formulated as an optimization...
An extended robot–world and hand–eye calibration method is proposed in this paper to evaluate the transformation relationship between camera robot device. This approach could be performed for mobile or medical robotics applications, where precise, expensive, unsterile objects, enough movement space, cannot made available at work site. Firstly, a mathematical model established formulate robot-gripper-to-camera rigid robot-base-to-world using Kronecker product. Subsequently, sparse bundle...
BitTorrent is one of the most well known peer-to-peer file sharing applications, accounting for a significant proportion Internet traffic. Current system builds its overlay network by randomly selecting peers, fact that has potential to seriously handicap both individual performance and generate amount cross-ISP In this paper, we propose novel peer selection algorithm called UTAPS which could selects peers within small hop counts low round trip time (RTT) range utilizing knowledge underlying...
Broadcasting has become a basic service that adds to existing DHT systems the ability search using arbitrary queries as well disseminate/collection global information. However, phenomenon of system churn, continuous process needs joining and leaving networks, degrades broadcast performance adversely impact applications built on top them. In this paper, we present an efficient algorithm for performing operation in under churn. It is suitable most such Chord, Tapestry, etc. Through proposed...
Point system is a common application in loyalty marketing programs. However, points are usually difficult to be obtained so that consumers have small amount of and participate campaigns rarely. To promote consumer engagement, this paper proposes new method combines point trading with third-party payment, supporting more forms strategy. Trading subsystem the core part system. Traditional architecture faced resource competition database deadlock problems it cannot meet performance...
In order to overcome the restrictions of traditional robot-sensor calibration method which solve tool-camera transformation and robot-world rely on target, a calibration-free approach that problem form AX = YB based Second-Order Cone Programming is proposed. First, Structure-From-Motion was used recover camera motion matrix up scaling. Then rotation translation in equation were parameterized by dual quaternion theory. Finally, simultaneously optimal solution scale factor, hand-eye relation....
Telcos and cloud service providers are keen to exploit virtual network functions (VNF) because it has the potential reduce reliance on expensive proprietary networking gear increase elasticity. In this paper, we propose a NFV Orchestration Rapid Migration (NORM) architecture system realize complete layout through SDN NFV. Through port MAC address mapping, NORM can physical nodes accessing Virtual Networks (VNs), while deploying related VNFs Docker. At same time, set up white list function...
A network testbed with high flexibility plays an important role in testing and evaluating new technology. Both researchers engineers always need a which can customize experiment on demand. Some of the existing cloud computing platforms lack customization while some experimental platform not provide convenient virtual machine management functions. In this paper, we propose preliminary implementation elastic customized (ECCN) based Openstack project provides supports Openflow protocol. This...
The widespread introduction of white LEDs has brought an unprecedented opportunity to create a ubiquitous indoor visible light communication system. In order satisfy the illumination requirements, signals from multiple are always superposed on receiving surface which causes severe inter-cell interference and leads critical demand for cell identification scheduling handoff. this paper, we propose (VLCID) scheme based cumulative space time coding (CSTC) solve problem. main idea CSTC-based...
Due to inevitable cross-layer conflict existing in route objectives of overlay routing and traffic engineering, the interaction between two selfish players causes oscillations network performance loss. The is investigated as a Nash game with best-reply, where have equal status, take turn optimize their routes. Overlay aims minimize total latency all paths, while engineering maximum link utilization native network. We propose simple strategies for layers. simulation results under various...
A new iterative Zero-Forcing BLAST with QR Decomposition algorithm improving the performance over error propagation is proposed in this paper. In algorithm, much effort made on several iterations to obtain high substreams. Simulation results show that greatly improve of traditional detection reasonable increase computation complexity. This also has better and lower complexity than another Detection approach [3].