- Cooperative Communication and Network Coding
- Advanced MIMO Systems Optimization
- Advanced Wireless Network Optimization
- Full-Duplex Wireless Communications
- Advanced Wireless Communication Technologies
- Caching and Content Delivery
- Wireless Communication Networks Research
- IoT and Edge/Fog Computing
- Wireless Communication Security Techniques
- Insect symbiosis and bacterial influences
- Opportunistic and Delay-Tolerant Networks
- Satellite Communication Systems
- Energy Harvesting in Wireless Networks
- Advanced Wireless Communication Techniques
- Bone Tissue Engineering Materials
- Network Traffic and Congestion Control
- Robotics and Sensor-Based Localization
- Mobile Ad Hoc Networks
- Anomaly Detection Techniques and Applications
- IoT Networks and Protocols
- Advanced materials and composites
- Dental Implant Techniques and Outcomes
- Face and Expression Recognition
- Cognitive Radio Networks and Spectrum Sensing
- UAV Applications and Optimization
Nanjing Agricultural University
2024-2025
Beijing University of Posts and Telecommunications
2016-2025
Xi'an Shiyou University
2025
Peking University
2024
Southern Marine Science and Engineering Guangdong Laboratory (Zhuhai)
2024
Southern Marine Science and Engineering Guangdong Laboratory (Guangzhou)
2024
Sun Yat-sen University
2010-2024
China XD Group (China)
2024
Shandong Normal University
2023-2024
Zhejiang University
1998-2023
Fog computing is an extension of cloud computing, which emphasizes distributed and provides service closer to user equipments (UEs). However, due the limited coverage fog nodes (FCNs), moving users may be out coverage, would cause radio handover execution results migration when tasks are off-loaded FCNs. Furthermore, extra cost, including energy consumption latency, generated affects revenue UEs. Previous works rarely consider mobility UEs in networks. In this paper, a generic three-layer...
In this paper, we investigate the allocation of resource in D2D-aided Fog computing system with multiple mobile user equipments (MUEs). We consider each MUE has a request for task from library and needs to make decision on performing selection three processing modes which include local mode, fog offloading cloud mode. Two scenarios are considered mean caching its optimization off-peak time, offloading, immediate time. particular, refers cache completed application related data. first...
With the rapid development of Internet Things (IoT) in recent years, security IoT becomes more and prominent. To protect data privacy device availability, identity authentication technology has been applied to environment. However, although scholars have designed a variety protocols for environment, resource costs these are still expensive resource-constrained devices. In particular, when frequent upgrade computer hardware led gradual increase key length cryptosystem, devices hard keep up...
With the development of satellite-terrestrial network (STN), mobile edge computing (MEC) servers are deployed at low orbit earth (LEO) satellites to provide services for user devices (UEs) in areas without terrestrial coverage. There is symmetry between satellite networks and networks, but there asymmetry their resources. Computing resources satellites’ MEC may not be enough. The cooperation promising, where a migrates tasks base station (BS) an adjacent area, thus utilizing BS’s server....
Wolbachia is one of the most pervasive symbionts, estimated to infect ∼50% arthropod species. It primarily transmitted vertically, inducing a variety fascinating reproductive manipulations promote its spread within host populations. However, incongruences between and phylogenies indicate substantial horizontal transmissions, mechanisms which are largely unexplored. By systematically analyzing surface protein ( wsp ) sequences on NCBI, we found that parasitism, not predation, primary route...
Recent approaches to VO have significantly improved performance by using deep networks predict optical flow between video frames. However, existing methods still suffer from noisy and inconsistent matching, making it difficult handle challenging scenarios long-sequence estimation.To overcome these challenges, we introduce Spatio-Temporal Visual Odometry (STVO), a novel network architecture that effectively leverages inherent spatio-temporal cues enhance the accuracy consistency of...
Abstract Reservoir stimulation has driven efficient deep coalbed methane (CBM) development in China, but post-fracturing drainage technology remains a critical limiting factor. This study proposes an optimization method for key parameters by coupling fracturing effects. A geological model is established through rock mechanics experiments and data, combined with fracture network simulations to develop that reflects the characteristics of CBM production Ordos Basin. Based on this model,...
This paper presents the simulated and experimental results of propeller-rudder systems with propeller boss cap fins (PBCFs) analyzes hydrodynamic performance PBCFs in systems. The purpose is to study impact on rudders. Hydrodynamic experiments were carried out a cavitation tunnel. energy-saving effect PBCF without rudder was 1.47% at design advance coefficient J = 0.8. numerical simulation based Navier–Stokes equations solved sliding mesh SST (Shear Stress Transfer) k-ω turbulence model....
To mitigate the impact of dramatic growth wireless video traffic and provide users with heterogeneous services, a collaborative caching-transmission method in cache-enabled terahertz (THz) networks is studied this paper. We propose novel scalable coding (SVC)-based two-tier cooperative caching strategy that can services different perceptual qualities. In addition, we hierarchical hybrid transmission scheme where obtain requested layer files through cellular multicast-D2D THz transmissions. A...
In this paper a multicast concept for Device-to-Device (D2D) communication underlaying cellular infrastructure has been investigated. To improve system throughput and increase resource utilization, novel interference coordination scheme is proposed. The proposed includes two steps. First, in order to mitigate the from D2D transmission communication, we propose an efficient power control obtain upper bound of transmitter power. Next, based on bound, block (RB) allocation rules aiming networks...
Herein one proposes a mutual information-based registration method using pixel gradient information rather than intensity information. Special care is paid to finding the global maximum of function. In particular, uses simulated annealing speeded up by including statistical analysis reduce next search space across cooling schedule. An additional speed obtained combining this numerical strategy with hill-climbing method. Experimental results on limited database biological images illustrate...
In this paper, we propose a receiver energy efficient congestion control algorithm based on multipath transmission protocol (MPTCP) to enable the battery powered mobile devices receive more data than MPTCP with same consumption. First, consumption model of wireless interface, constrained optimization problem maximize efficiency is formed. With genetic algorithm, rate distribution vector obtained as near-optimal solution. Second, adjust windows acquired schedule packets over each path...
As the demand of data-hungry and computing intensive tasks grows dramatically, cache-aided device-to-device multicast (D2MD) networks are introduced, which can offload traffic from base stations to D2D users (DUEs) directly alleviate heavy burden on backhaul links improve energy spectrum efficiency. However, most previous works ignored limitation battery power scarce capabilities DUEs. In this paper, we study computation offloading in D2MD for content delivery delay sensitive task services....
Both Device-to-device (D2D) and full-duplex (FD) have been widely recognized as spectral efficient techniques in the fifth-generation wireless communications systems. By enabling FD mode D2D communications, attainable spectrum efficiency can be (in theory) up to twice high that of conventional half-duplex (HD) technology, provided self-interference signal former sufficiently suppressed. Considering fact technology does not always outperform HD arbitrary channel condition, we will delve into...