- Security in Wireless Sensor Networks
- Energy Efficient Wireless Sensor Networks
- Mobile Ad Hoc Networks
- Higher Education and Teaching Methods
- Advanced Authentication Protocols Security
- Cryptography and Data Security
- Educational Reforms and Innovations
- Education and Work Dynamics
- Ideological and Political Education
- Second Language Learning and Teaching
- Educational Technology and Pedagogy
- Target Tracking and Data Fusion in Sensor Networks
- Catalytic C–H Functionalization Methods
- Distributed Sensor Networks and Detection Algorithms
- User Authentication and Security Systems
- Indoor and Outdoor Localization Technologies
- EFL/ESL Teaching and Learning
- Time Series Analysis and Forecasting
- AI in cancer detection
- Chaos-based Image/Signal Encryption
- Advanced Malware Detection Techniques
- Radical Photochemical Reactions
- Medical Research and Treatments
- Environmental and Social Impact Assessments
- Cruise Tourism Development and Management
Fujian Normal University
2025
Henan University
2019-2024
Michigan State University
2024
Zhejiang University of Technology
2013-2023
Jiangsu University of Science and Technology
2010-2023
Jingdezhen University
2022-2023
Shanghai Jiao Tong University
2022
Nanfang Hospital
2021
Nanfang College Guangzhou
2021
Zhejiang Yuexiu University
2021
We describe a cobalta-electro-catalyzed enantioselective C–H annulation of arylphosphinamides with alkynes for P-stereogenic compounds via desymmetrization and kinetic resolution processes.
Aiming at high network energy consumption and data delay induced by mobile sink in wireless sensor networks (WSNs), this paper proposes a cluster-based optimization algorithm called Cluster-Based Energy Optimization with Mobile Sink (CEOMS). CEOMS constructs the density function of nodes firstly then assigns higher remaining as cluster heads according to function. Meanwhile, directivity motion performance is constructed enhance probability remote being assigned heads. Secondly, based on Low...
Energy efficiency is an essential requirement for wireless sensor networks while security must also be ensured mission-critical applications. In this paper, we present energy-efficient distributed deterministic key management scheme (EDDK) resource-constrained networks. EDDK mainly focuses on the establishment and maintenance of pairwise keys as well local cluster can fix some flaws in existing schemes. Not only neighbor table constructed during provide data transfer, but it used to...
Hybrid-field channel estimation for extremely large-scale massive MIMO (XL-MIMO) system is discussed in this letter. By exploiting the structural characteristics of far-field path components angle domain and sparsity near-field polar domain, a algorithm combining support detection orthogonal matching pursuit (SD-OMP) proposed. Specifically, supports are firstly detected according to structure XL-MIMO then can be used obtain components. Next, effect on induced by removed OMP employed its...
Festivals provide some of the best unscripted encounters between residents and visitors in a destination. Within this article, theoretical framework emotional solidarity is applied expanded an effort to explain complex relationship that exists community festival Caldwell, Texas. Results confirm factor structure scale (ESS), exhibiting sound psychometric properties way numerous reliability validity measures. Length residence number years attending were considered explaining variance three...
In wireless sensor networks (WSNs), finding the best transmission route from each node to mobile sink is not a simple task because of dynamic characteristics and cluster transmission. order balance energy consumption reduce collisions in transmissions, this paper proposes Dynamic Spanning Tree with Mobile Sink (DSTMS) routing algorithm. Firstly, based on Low Energy Adaptive Clustering Hierarchy Protocol (LEACH), multi-layer framework minimum spanning tree (MST) constructed optimize data...
Current range-free node localization method experiences low accuracy in sparse anchors wireless sensor networks (WSN). To this end, a novel model based on minimize maximum error criterion is proposed letter. Moreover, an iterative algorithm called MinMax-DV-hop to tackle the nonconvex and non-differentiable objective function of too. Specifically, auxiliary variable introduced recast minimum-maximum optimization into one with linear object function, convex constraints constraints. And then,...
In this paper we firstly describe the importance of study on forensics analysis physical memory. Further introduce some tools and techniques commonly used in Lastly present an example forensic to illustrate how do memory a windows system by using existing tools.
Concurrent recording of EEG/fMRI signals reveals cross-scale neurovascular dynamics that are crucial for elucidating fundamental linkage between function and behaviors. However, MRI scanners generate tremendous artifacts EEG detection. Despite existing denoising methods, cabled connections to receivers susceptible environmental fluctuations inside scanners, creating baseline drifts complicate signal retrieval from the noisy background. Here, a Wireless Integrated Sensing Detector...
Email is ubiquitous in the contemporary commercial environment, providing a convenient and efficient method for communication. However, involving email-related disputes crime problems have become increasingly prominent. Many cases of inability to determine authenticity result lack effectiveness evidence. In order email evidence, scientific appraisal very important. This paper analyzes working principle an email, discusses construction mechanism keywords commonly used header field, applies...
Alumina concentration is an important parameter in the production process of aluminum electrolysis. Due to complex environment industrial field and physical chemical reactions reduction cell, nowadays it still unable carry out online measurement real-time monitoring. For solving this problem, a soft-sensing model alumina based on deep belief network (DBN) proposed. However, may have some limitations for different cells periodic working conditions such as local anode effect, pole changing,...
Each member entering into a confidential group is unwilling to make the private information, i.e., which he wants join, who manager and issues admission token, available general public hence any adversary. The key initial distribution based on basic signature can not efficiently protect privacy of since be verified by anyone using corresponding key. In this paper, we propose directed scheme elliptic curve ElGamal cryptosystems apply it for communication. Through comparing digital in terms...
In wireless sensor networks (WSNs), due to the limited energy of nodes, how design efficient hierarchical routing algorithms balance network resources and extend life is an important problem be solved. Aiming at problems such as random selection cluster head, redundancy working node, construction head transmission path, which affect consumption, this paper proposes a multihop algorithm based on path tree (MHRA‐PT) optimize energy. Firstly, some nodes are those close base station have large...
Herein, we reported an efficient and straightforward method to realize desaturated β-C(sp3)-H sulfonylation phosphonylation of cyclic amines driven by electrochemistry using catalytic amounts CP2Fe as the redox mediator. This protocol which had good functional group compatibility, provided desired enaminyl sulfone phosphine oxide products with high chemo- regio-selectivity under mild conditions. Several mechanistic studies have suggested that underwent multiple single-electron oxidation...
Wireless sensor networks have been used widely in many application fields, whereas such applications as battlefield information obtaining, disaster survivor rescuing, etc. need an immediate and fast route that is simultaneously secure energy-efficient. In this paper, by constructing a neighbor table, we build tree-structure can meet all the above requirements for large-sized wireless with only resource-constrained sink node. Our proposed routing scheme has salient features: light overhead,...
Localization technology in wireless sensor networks has great significance for theoretical study and practical applications. However, most current localization schemes have failed to pay enough attention security issues. In this paper, we propose a novel secure algorithm named signcryption-based scheme (SSLS) that allows sensors ensure the confidentiality integrity of their location information. Analysis shows SSLS can enhance robustness through signcryption mechanism while simulation...
Considering the important applications of wireless sensor networks in target monitoring, it has received attention civil and military fields. For problem that working nodes die early, network energy consumption is large, node distribution uneven, especially impact monitored on performance, this study based traditional low-energy adaptive clustering hierarchy (LEACH) location constraint, an improved LEACH constraint (LEACH-TLC) algorithm proposed. First, under premise monitoring accuracy,...
Current key management schemes only consider the security of newly deployed nodes in wireless sensor networks, whereas mobile is ignored. In order to ensure data transfer secure node mobility scenarios, we propose a composite mechanism based on elliptic curve digital signature algorithm help scenarios authenticate their identities and establish pairwise keys. Analysis shows that this scheme very low storage, computation, communication overhead.
With the requirements of mobility, flexibility, and rapid response, wireless mesh networks are widely used for emergency services to improve efficiency public safety communication prevent or respond incidents that harm endanger persons property. In this paper, we propose a practical scheme key agreement with asymmetric encryption based on station-to-station protocol privacy enhanced directed signature using elliptic curve ElGamal cryptography in networks. result, only both participants can...
In sensor networks characterized by irregular layouts and poor connectivity, anisotropic properties can significantly reduce the accuracy of distance estimation between nodes, consequently impairing localization precision unidentified nodes. Since is contingent upon multi-hop paths anchor node pairs, assigning differential weights based on reliability these could enhance accuracy. To address this, we introduce an adaptive weighted method, termed AW-MinMax, for range-free localization. This...