- Energy Efficient Wireless Sensor Networks
- Underwater Vehicles and Communication Systems
- Mobile Ad Hoc Networks
- Higher Education and Teaching Methods
- Indoor and Outdoor Localization Technologies
- Water Quality Monitoring Technologies
- Security in Wireless Sensor Networks
- Wireless Networks and Protocols
- Mobile Agent-Based Network Management
- Network Security and Intrusion Detection
- Advanced Algorithms and Applications
- Industrial Technology and Control Systems
- Opportunistic and Delay-Tolerant Networks
- Water Quality Monitoring and Analysis
- Advanced Computational Techniques and Applications
- Fault Detection and Control Systems
- Distributed Control Multi-Agent Systems
- Advanced Sensor and Control Systems
- Underwater Acoustics Research
- IoT and Edge/Fog Computing
- Anomaly Detection Techniques and Applications
- Network Traffic and Congestion Control
- Energy Harvesting in Wireless Networks
- Fish Ecology and Management Studies
- Software-Defined Networks and 5G
Shanghai Maritime University
2015-2024
Wuhan National Laboratory for Optoelectronics
2024
Huazhong University of Science and Technology
2024
Chengdu University of Technology
2024
Southeast University
2013-2024
Institute of Software
2024
State Key Laboratory of Digital Medical Engineering
2024
Hohai University
2024
Xi'an University of Architecture and Technology
2024
Nanjing University of Science and Technology
2024
With the advent of Internet Things (IoT), security network layer in IoT is getting more and attention. The traditional intrusion detection technologies cannot be well adapted complex environment IoT. For deep learning algorithm detection, a neural structure may have fine accuracy for one kind attack, but it not good effect when facing other attacks. Therefore, urgent to design self-adaptive model change different attack types. This paper presents an based on improved genetic (GA) belief...
Many applications of sensor networks require the base station to collect all data generated by nodes. As a consequence many-to-one communication pattern, referred as convergecast, is prevalent in networks. In this paper, we address challenge fast and reliable convergecast on top collision-prone CSMA MAC layer. More specifically, extend previous work considering following two situations: (1) length packets nodes much smaller than maximum frame that can be transmitted one time slot (2) not...
Software Defined Networking (SDN) and cloud automation enable a large number of diverse parties (network operators, application admins, tenants/end-users) control programs (SDN Apps, network services) to generate policies independently dynamically. Yet existing policy abstractions frameworks do not support natural expression automatic composition high-level from sources. We tackle the open problem automatic, correct fast multiple specified policies. first develop Policy Graph Abstraction...
ZmPTF1 regulates drought tolerance in maize by promoting root development and ABA synthesis, binding to the G-box promoter activating expression of NCEDs, CBF4, NAC081, NAC30.
Due to the problems of high bit error rate and delay, low bandwidth limited energy sensor nodes in underwater acoustic network (UASN), it is particularly important design a routing protocol with reliability, strong robustness, end-to-end delay efficiency which can flexibly be employed dynamic environment. Therefore, reinforcement learning-based opportunistic (RLOR) proposed this paper by combining advantages learning algorithm. The RLOR kind distributed approach, comprehensively considers...
Due to their special environment, Underwater Wireless Sensor Networks (UWSNs) are usually deployed over a large sea area and the nodes floating. This results in lower beacon node distribution density, longer time for localization, more energy consumption. Currently most of localization algorithms this field do not pay enough consideration on mobility nodes. In paper, by analyzing patterns water near seashore, method UWSNs based Mobility Prediction Particle Swarm Optimization algorithm...
Infrared ship detection has important application value for ensuring navigation safety and real-time monitoring of the sea surface. It is also great significance in marine intelligent defense become an research branch field computer vision. Affected by weather at limitations infrared cameras, images often have problems small targets being submerged noise low information entropy, which bring challenges to detection. In this article, rotating target algorithm FMR-YOLO based on synthetic fog...
In wireless sensor networks, some nodes are put in sleep mode while other active for sensing and communication tasks order to reduce energy consumption extend network lifetime. This approach is a special case (k=2) of randomized scheduling algorithm, which k subsets sensors work alternatively. this paper, we first study the algorithm via both analysis simulations terms coverage intensity, detection delay, probability. We further asymptotic properties. Finally, analyze problem maximizing...
This paper proposes the minimum power configuration (MPC) approach to energy conservation in wireless sensor networks. In sharp contrast earlier research that treats topology control, power-aware routing, and sleep management isolation, MPC integrates them as a joint optimization problem which of network consists set active nodes transmission powers nodes. We show through analysis is inherently dependent on data rates sources. propose several approximation algorithms with provable...
We consider applications of sensor networks wherein data packets generated by every node have to reach the base station. This results in a many-to-one communication paradigm referred as convergecast. are interested determining TDMA schedule that minimizes total time required complete simple version problem generates exactly one packet. propose distributed convergecast scheduling algorithm requires at most 3N timeslots, where N represents number nodes network. Through extensive simulations,...
Internet interdomain routing is policy-driven, and thus physical connectivity does not imply reachability. On average, on today's works quite well, ensuring reachability for most networks achieving reasonable performance across paths. However, there a serious lack of understanding resilience to significant but realistic failures such as those caused by the 911 event, 2003 Northeast blackout, recent Taiwan earthquake in December 2006. In this paper, we systematically analyze how current...
Synthetic Aperture Radar (SAR) target detection is a significant research direction in radar information processing. Aiming at the poor robustness and low accuracy of traditional algorithms, SAR image based on Convolutional Neural Network (CNN) reviewed this paper. Firstly, algorithms are briefly discussed, their limitations pointed out. Secondly, CNN’s network principle, basic structure, development process computer vision introduced. Next, CNN emphatically analyzed, including some common...
Purpose The purpose of this paper is to examine stocks that are most actively discussed by online posters and see if the messages posted about these have information or they just noise. Design/methodology/approach This study uses on TheLion.com, which reports a real time list ten stocks. in at daily market close during 2005‐2006 examined. An event performed estimate abnormal returns Contemporaneous lead–lag regressions against message posting activities performed. Findings Online prefer...
This article proposes the minimum power configuration (MPC) approach to management in wireless sensor networks. In contrast earlier research that treats different radio states (i.e., transmission/reception/idle) isolation, MPC integrates them a joint optimization problem depends on both set of active nodes and transmission power. We propose four approximation algorithms with provable performance bounds two practical routing protocols. Simulations based realistic models show can conserve more...
In this paper, we investigate efficient strategies for supporting on-demand information dissemination and gathering in large-scale wireless sensor networks. particular, propose a "comb-needle" discovery support model resembling an ancient method: use comb to help find needle sand or haystack. The combines push pull gathering. component features data duplication linear neighborhood of each node. dynamic formation routing structure comb. comb-needle enables us the cost spectrum combinations...
One of the most common communication patterns in sensor networks is routing data to a base station, while station can be either static or mobile. Even cases, spanning tree may not survive for long time due failures nodes. In this paper, we present an adaptive mechanism, using real-time reinforcement learning strategies. We demonstrate via simulation that without additional control packets maintenance, trees maintain best connectivity spite node mobility station. And by general...
With the development of autonomous unmanned intelligent systems, such as boats, planes and underwater vehicles, studies on Wireless Sensor-Actor Networks (WSANs) have attracted more attention. Network connectivity algorithms play an important role in data exchange, collaborative detection information fusion. Due to harsh application environment, abnormal nodes often appear, network will be prone lost. self-healing mechanisms become critical for these systems. In order decrease movement...
Summary We propose a new sparse estimation method for Cox (1972) proportional hazards models by optimizing an approximated information criterion. The main idea involves approximation of the norm with continuous or smooth unit dent function. proposed bridges best subset selection and regularization borrowing strength from both. It mimics using penalized likelihood approach yet no need tuning parameter. further reformulate problem reparameterization step so that it reduces to one unconstrained...
Ocean wireless sensor networks (OWSNs) play an important role in marine environment monitoring, underwater target tracking, and defense. OWSNs not only monitor the surface information real time but also act as relay layer for to establish data communication between sensors ship-based base stations, land-based satellites. The destructive resistance of is closely related where they are located. Affected by dynamics seawater, location nodes extremely easy shift, resulting deterioration...