- Network Packet Processing and Optimization
- Network Security and Intrusion Detection
- HIV, Drug Use, Sexual Risk
- Internet Traffic Analysis and Secure E-voting
- HIV/AIDS Research and Interventions
- Network Traffic and Congestion Control
- Software-Defined Networks and 5G
- HIV/AIDS drug development and treatment
- Adolescent Sexual and Reproductive Health
- Caching and Content Delivery
- Interconnection Networks and Systems
- IPv6, Mobility, Handover, Networks, Security
- Retinal Imaging and Analysis
- Mobile Agent-Based Network Management
- Natural Language Processing Techniques
- Neurosurgical Procedures and Complications
- Peer-to-Peer Network Technologies
- Glaucoma and retinal disorders
- Network Time Synchronization Technologies
- Opportunistic and Delay-Tolerant Networks
- Artificial Immune Systems Applications
- Regional Economic and Spatial Analysis
- Advanced Data Compression Techniques
- Advanced Optical Network Technologies
- Power Line Communications and Noise
Nanjing Normal University
2010-2024
Nanjing Medical University
2021-2022
The University of Sydney
2019
Southeast University
2017
Wuhan University of Science and Technology
2008-2011
Oral pre-exposure prophylaxis (PrEP) and antiretroviral therapy (ART) can effectively prevent HIV infections among men who have sex with (MSM), but the emergence transmission of drug-resistance (HIVDR) may compromise their benefits. The costs benefits expanding PrEP ART coverage in presence HIVDR China remain unknown.We developed a comprehensive dynamic model incorporating transmitted (TDR) acquired (ADR) drug resistance. was calibrated by surveillance data from 2009 to 2019 MSM Jiangsu...
Purpose: To establish an accurate risk prediction model of diabetic retinopathy (DR) using cost effective and easily available patients' characteristics clinical biomarkers. Patients Methods: Totally 18,904 cases diagnosed type 2 diabetes mellitus (T2DM) were collected, among which 13,980 selected after quality screening. The least absolute shrinkage selection operator (LASSO) regression models used for univariate analysis factors selection, the multi-factor logistic was to model....
Abstract Objective To predict the trend of AIDS in specific age groups and to determine objective population for screening, this study explored three transmission routes characterized each patient group using APC model based on whole, local, immigrant populations Zhejiang, China. Methods The data recruited paper was obtained from national Comprehensive Prevention Control Information System - Antiviral Therapy Management database Chinese Disease Statistical Yearbook An used estimate impact...
With rapid increase in the use of traffic-intensive applications, approaches that improve users experience by reducing delay are recently receiving enormous attention. Caching Device-to-Device (D2D) networks, particular, is considered as an effective technique to service quality network. In this paper, agglomerative hierarchical clustering algorithm proposed for a cache-assisted D2D communication The considers preferences and groups them into same cluster based on similarity their requested...
Firewalls play a vitally important role to network security. Packet filtering in firewall either accepts or denies packets based upon set of pre-defined rules called policy. Management policy is boring task and always prone error. There have been lot analysis methods for anomalies detection IPv4 But, the reason enormous address space, these could not be used deal with IPv6 directly, low effectiveness. In this work, we propose method by using formal that can analyze inclusion relations...
<abstract><p>This paper elucidates that the AIDS/HIV incidence rate differences exist among different population and regions, especially old college students. Due to effect of age, AIDS peak in males aged 20–35 years 50 both Chongqing Shenzhen, increasing spread was higher than females under period effect. In local over 40, below whole age groups are predicted increase sharply future six years, while females, rates 40-year-old were as well. The homosexually transmitted patients...
Varicella (chickenpox) is highly contagious among children and frequently breaks out in schools. In this study, we developed a dynamic compartment model to explore the optimal schedule for varicella vaccination Jiangsu Province, China. A susceptible-infected-recovered (SIR) was proposed simulate transmission of different age groups. The basic reproduction number computed by kinetic model, impact three prevention factors assessed through global sensitivity analysis. Finally, effect various...
To establish a machine learning model for identifying patients coinfected with hepatitis B virus (HBV) and human immunodeficiency (HIV) through two sexual transmission routes in Jiangsu, China.A total of 14197 HIV cases transmitted by homosexual heterosexual were recruited. After data processing, 12469 (HIV HBV, 1033; HIV, 11436) left further analysis, including 7849 4620 transmission. Univariate logistic regression was used to select variables significant P value odds ratio multivariable...
Packet filtering in firewall either accepts or denies network packets based upon a set of pre-defined filters called policy. Firewall policy is designed under the instruction security A generic document that outlines needs for computer access permissions. And it determines how are designed. If inconsistencies, such as redundant filters, insufficient contradict exist between and policy, could not filter exactly, protected by will be affected. To resolve this problem, we propose an...
Firewalls have been a very important secure tool to protect networks against attacks, which usually filter the unauthorized traffic entering secured network. The packet filtering based on predefined collection of ordered rules. Along with IPv6 protocol is widely used, and security issues comes it. Firewall for network, as an element network security, it will be not able packets correctly if there are conflicts that caused by same matching two or more In addition, new kind firewall time...
Snort is the most popular Intrusion Detection Systems (IDS). It will generate alert messages when an arrival packet matches some of pre-defined rules. has problems as follows: it tries matching for all rules even never in case other rules, and provides contradictory redundant a set erroneous poorly-organized given. This paper proposes method characterizing relations between towards solutions above problems. The proposed calculates topological based on theory.
Available bandwidth estimation is useful for route selection in overlay networks, QoS, and traffic engineer-ing. Many measurement algorithms, such as Pathload, Pathchar, Packet Transmission Rate (PTR) method, etc. have been proposed. PTR method sends a sequence of packet trains to characterize the interac-tion between probing packets competing traffic, uses average rate train an estimate available bandwidth. However, this algorithm does not fully consider situation that detection lost...
Background: Oral pre-exposure prophylaxis (PrEP) and antiretroviral therapy (ART) can effectively prevent HIV infections among men who have sex with (MSM), but the emergence transmission of drug-resistance (HIVDR) may compromise their benefits. The costs benefits expanding PrEP ART coverage in presence HIVDR China remain unknown.Methods: We developed a comprehensive dynamic model incorporating transmitted (TDR) acquired (ADR) drug resistance. was calibrated by surveillance data from 2009 to...
Input-queued scheduling algorithms are designed to improve the throughput which use input and output terminal in router obtain maximum packets. And length of queue is an important target, that can decides superiority-inferiority about capability algorithm. With existing algorithms, main content algorithm ensuring packets' high priority low level. But most these do not consider queue. In this paper, we change when packets enter channel at router, put forward a shortest time-slot adapting...
Objective To identify independent risk factor(s) in deaths of patients with primary brainstem hemorrhage. Methods A total 132 hemorrhage (survival 88 cases and death 44 cases) were retrospectively enrolled into this study who admitted to Department Neurosurgery, Southwest Hospital, Army Medical University from January 2000 December 2016. Chi-square test for age, sex, medical history, vital signs at admission or the rank sum hematoma volume was performed between two groups affecting...
Firewall is the first defense line for network security. Packet filtering a basic function in firewall, which filter packets according to series of rules called firewall policy. The design policy invariably under instruction security policy, generic guideline that lists needs access permissions. should observe regulations However, even IPv4 it extremely difficult keep consistency between and Some decision methods were proposed. address space IPv6 very large, existing can not be directly used...
As the network service have been increased fleetly, packets in conversion process are not resolved forward direction by uncontrolled situation. That means traditional single-hop routing has satisfied increasing of applications. Therefore, based on multi-hop mechanism, a distinguish queuing which product forwarding control mechanism could be propounded this paper. This can use coordination scheduling with single output port, and method match distributed dynamic matching. The simulation...
360-degree video has been steadily gaining popularity in recent years for its ability to offer users a more immersive viewing experience. However, streaming over the current best-effort Internet with single network path poses challenges meeting high bandwidth and low motion-to-photon (MTP) delay requirements.This paper addresses these by advocating adoption of multi-path (multiple access network) approaches enhance performance streaming. The proposed solution introduces scheduling algorithm,...
TCP-shape algorithm is used to control the network congestion and regulate transmission rate of packets based on available bandwidth. The sends dummy probes detect background flow obtains status with return value. But cannot consider some relationship between probe. This paper improves algorithm. First, we adjust probe's sending time record probe number. Second, match number gap source destination resolve problem lost. Finally, do experiments compare improved value can be observed favorably,...