Xiaoxiang Wang

ORCID: 0000-0002-2924-2295
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cooperative Communication and Network Coding
  • Advanced MIMO Systems Optimization
  • Advanced Wireless Network Optimization
  • Full-Duplex Wireless Communications
  • Advanced Wireless Communication Technologies
  • Caching and Content Delivery
  • Wireless Communication Networks Research
  • IoT and Edge/Fog Computing
  • Wireless Communication Security Techniques
  • Insect symbiosis and bacterial influences
  • Opportunistic and Delay-Tolerant Networks
  • Satellite Communication Systems
  • Energy Harvesting in Wireless Networks
  • Advanced Wireless Communication Techniques
  • Bone Tissue Engineering Materials
  • Network Traffic and Congestion Control
  • Robotics and Sensor-Based Localization
  • Mobile Ad Hoc Networks
  • Anomaly Detection Techniques and Applications
  • IoT Networks and Protocols
  • Advanced materials and composites
  • Dental Implant Techniques and Outcomes
  • Face and Expression Recognition
  • Cognitive Radio Networks and Spectrum Sensing
  • UAV Applications and Optimization

Nanjing Agricultural University
2024-2025

Beijing University of Posts and Telecommunications
2016-2025

Xi'an Shiyou University
2025

Peking University
2024

Southern Marine Science and Engineering Guangdong Laboratory (Zhuhai)
2024

Southern Marine Science and Engineering Guangdong Laboratory (Guangzhou)
2024

Sun Yat-sen University
2010-2024

China XD Group (China)
2024

Shandong Normal University
2023-2024

Zhejiang University
1998-2023

Fog computing is an extension of cloud computing, which emphasizes distributed and provides service closer to user equipments (UEs). However, due the limited coverage fog nodes (FCNs), moving users may be out coverage, would cause radio handover execution results migration when tasks are off-loaded FCNs. Furthermore, extra cost, including energy consumption latency, generated affects revenue UEs. Previous works rarely consider mobility UEs in networks. In this paper, a generic three-layer...

10.1109/access.2019.2908263 article EN cc-by-nc-nd IEEE Access 2019-01-01

In this paper, we investigate the allocation of resource in D2D-aided Fog computing system with multiple mobile user equipments (MUEs). We consider each MUE has a request for task from library and needs to make decision on performing selection three processing modes which include local mode, fog offloading cloud mode. Two scenarios are considered mean caching its optimization off-peak time, offloading, immediate time. particular, refers cache completed application related data. first...

10.1109/access.2019.2929075 article EN cc-by IEEE Access 2019-01-01

With the rapid development of Internet Things (IoT) in recent years, security IoT becomes more and prominent. To protect data privacy device availability, identity authentication technology has been applied to environment. However, although scholars have designed a variety protocols for environment, resource costs these are still expensive resource-constrained devices. In particular, when frequent upgrade computer hardware led gradual increase key length cryptosystem, devices hard keep up...

10.1109/jiot.2021.3088641 article EN IEEE Internet of Things Journal 2021-06-11

With the development of satellite-terrestrial network (STN), mobile edge computing (MEC) servers are deployed at low orbit earth (LEO) satellites to provide services for user devices (UEs) in areas without terrestrial coverage. There is symmetry between satellite networks and networks, but there asymmetry their resources. Computing resources satellites’ MEC may not be enough. The cooperation promising, where a migrates tasks base station (BS) an adjacent area, thus utilizing BS’s server....

10.3390/sym14030564 article EN Symmetry 2022-03-12

Wolbachia is one of the most pervasive symbionts, estimated to infect ∼50% arthropod species. It primarily transmitted vertically, inducing a variety fascinating reproductive manipulations promote its spread within host populations. However, incongruences between and phylogenies indicate substantial horizontal transmissions, mechanisms which are largely unexplored. By systematically analyzing surface protein ( wsp ) sequences on NCBI, we found that parasitism, not predation, primary route...

10.7554/elife.97872.2 preprint EN 2025-02-07

Recent approaches to VO have significantly improved performance by using deep networks predict optical flow between video frames. However, existing methods still suffer from noisy and inconsistent matching, making it difficult handle challenging scenarios long-sequence estimation.To overcome these challenges, we introduce Spatio-Temporal Visual Odometry (STVO), a novel network architecture that effectively leverages inherent spatio-temporal cues enhance the accuracy consistency of...

10.1609/aaai.v39i10.33125 article EN Proceedings of the AAAI Conference on Artificial Intelligence 2025-04-11

Abstract Reservoir stimulation has driven efficient deep coalbed methane (CBM) development in China, but post-fracturing drainage technology remains a critical limiting factor. This study proposes an optimization method for key parameters by coupling fracturing effects. A geological model is established through rock mechanics experiments and data, combined with fracture network simulations to develop that reflects the characteristics of CBM production Ordos Basin. Based on this model,...

10.1093/jge/gxaf027 article EN cc-by Journal of Geophysics and Engineering 2025-03-03

This paper presents the simulated and experimental results of propeller-rudder systems with propeller boss cap fins (PBCFs) analyzes hydrodynamic performance PBCFs in systems. The purpose is to study impact on rudders. Hydrodynamic experiments were carried out a cavitation tunnel. energy-saving effect PBCF without rudder was 1.47% at design advance coefficient J = 0.8. numerical simulation based Navier–Stokes equations solved sliding mesh SST (Shear Stress Transfer) k-ω turbulence model....

10.1080/19942060.2015.1121838 article EN cc-by Engineering Applications of Computational Fluid Mechanics 2016-01-01

To mitigate the impact of dramatic growth wireless video traffic and provide users with heterogeneous services, a collaborative caching-transmission method in cache-enabled terahertz (THz) networks is studied this paper. We propose novel scalable coding (SVC)-based two-tier cooperative caching strategy that can services different perceptual qualities. In addition, we hierarchical hybrid transmission scheme where obtain requested layer files through cellular multicast-D2D THz transmissions. A...

10.1109/tvt.2022.3141335 article EN IEEE Transactions on Vehicular Technology 2022-01-07

In this paper a multicast concept for Device-to-Device (D2D) communication underlaying cellular infrastructure has been investigated. To improve system throughput and increase resource utilization, novel interference coordination scheme is proposed. The proposed includes two steps. First, in order to mitigate the from D2D transmission communication, we propose an efficient power control obtain upper bound of transmitter power. Next, based on bound, block (RB) allocation rules aiming networks...

10.1109/vtcfall.2012.6398945 article EN 2012-09-01

10.1016/j.conbuildmat.2018.04.224 article EN Construction and Building Materials 2018-05-04

Herein one proposes a mutual information-based registration method using pixel gradient information rather than intensity information. Special care is paid to finding the global maximum of function. In particular, uses simulated annealing speeded up by including statistical analysis reduce next search space across cooling schedule. An additional speed obtained combining this numerical strategy with hill-climbing method. Experimental results on limited database biological images illustrate...

10.5566/ias.v24.p1-7 article EN cc-by Image Analysis & Stereology 2011-05-03

In this paper, we propose a receiver energy efficient congestion control algorithm based on multipath transmission protocol (MPTCP) to enable the battery powered mobile devices receive more data than MPTCP with same consumption. First, consumption model of wireless interface, constrained optimization problem maximize efficiency is formed. With genetic algorithm, rate distribution vector obtained as near-optimal solution. Second, adjust windows acquired schedule packets over each path...

10.1109/access.2017.2785849 article EN cc-by-nc-nd IEEE Access 2017-12-27

As the demand of data-hungry and computing intensive tasks grows dramatically, cache-aided device-to-device multicast (D2MD) networks are introduced, which can offload traffic from base stations to D2D users (DUEs) directly alleviate heavy burden on backhaul links improve energy spectrum efficiency. However, most previous works ignored limitation battery power scarce capabilities DUEs. In this paper, we study computation offloading in D2MD for content delivery delay sensitive task services....

10.1109/access.2018.2876893 article EN cc-by-nc-nd IEEE Access 2018-01-01

Both Device-to-device (D2D) and full-duplex (FD) have been widely recognized as spectral efficient techniques in the fifth-generation wireless communications systems. By enabling FD mode D2D communications, attainable spectrum efficiency can be (in theory) up to twice high that of conventional half-duplex (HD) technology, provided self-interference signal former sufficiently suppressed. Considering fact technology does not always outperform HD arbitrary channel condition, we will delve into...

10.1109/tvt.2020.2968053 article EN cc-by IEEE Transactions on Vehicular Technology 2020-01-28
Coming Soon ...