- Distributed Control Multi-Agent Systems
- Neural Networks Stability and Synchronization
- Cloud Computing and Resource Management
- Mathematical and Theoretical Epidemiology and Ecology Models
- Advanced Data Storage Technologies
- Nonlinear Dynamics and Pattern Formation
- Complex Network Analysis Techniques
- IoT and Edge/Fog Computing
- Biometric Identification and Security
- Caching and Content Delivery
- Blind Source Separation Techniques
- Mobile Ad Hoc Networks
- Green IT and Sustainability
- Advanced Computational Techniques and Applications
- Software-Defined Networks and 5G
- Parallel Computing and Optimization Techniques
- Gene Regulatory Network Analysis
- Photosynthetic Processes and Mechanisms
- Machine Fault Diagnosis Techniques
- Spam and Phishing Detection
- Border Security and International Relations
- Bayesian Methods and Mixture Models
- Network Time Synchronization Technologies
- Opportunistic and Delay-Tolerant Networks
- Digital Games and Media
Fudan University
2020-2024
University of Electronic Science and Technology of China
2019-2024
China Electronics Technology Group Corporation
2021-2022
China National Space Administration
2022
University of Reading
2020
China University of Petroleum, Beijing
2020
Xi'an High Tech University
2017
Virginia Tech
2017
Anhui University
2009-2013
Anhui University of Traditional Chinese Medicine
2011
The edge-cloud hybrid environment requires complex deployment strategies to enable the smart Internet-of-Things (IoT) system. However, current service use simple, generalized heuristics and ignore heterogeneous characteristics in environment. In this article, we devise a method find microservice-based strategy that can reduce average waiting time of IoT devices For purpose, first propose problem (MSDP) based on dynamic environment, including heterogeneity edge server capacities, geographical...
The wide deployment of advanced robots with industrial IoT (IIoT) technologies in smart factories generates a large volume data during production and variety processing workloads are launched to maintain productivity safety manufacture. emerging fog computing paradigm offers promising solution enhancing performance factory environment while on the other hand brings new challenges resource management, which call for more effective approach recommending configurations heterogeneous workloads....
While non-negative blind source separation (nBSS) has found many successful applications in science and engineering, model order selection, determining the number of sources, remains a critical yet unresolved problem. Various selection methods have been proposed applied to real-world data sets but with limited success, both over- under-estimation reported. By studying existing schemes, we that unsatisfactory results are mainly due invalid assumptions, oversimplification, subjective...
Edge computing can provide high bandwidth and low-latency service for big data tasks by leveraging the edge side's computing, storage, network resources. With development of microservice docker technology, providers flexibly dynamically cache at side to respond efficiently with limited Automatically caching needed services on nearest nodes scheduling users' requests realize that power software flow users continuous services. However, achieving goal needs overcome many challenges, such as...
As a new distributed machine learning (ML) framework for privacy protection, federated (FL) enables substantial Internet of Things (IoT) devices (e.g., mobile phones, tablets, etc.) to participate in collaborative training an ML model. FL can protect the data IoT without exposing their raw data. However, diversity may degrade overall process due straggler issue. To tackle this problem, we propose gear-based asynchronous (AsyFed) architecture. It adds gear layer between clients and server as...
Dear editor, This letter puts forward a secure feedback control scheme to bipartite tracking consensus for set of generic linear autonomous agents subject aperiodic and unknown denial-of-service (DoS) attacks. In contrast the DoS attack model that disables all transmission channels simultaneously, we are concerned with general independent attacks over each channel. Such malicious not only destroy connectivity underlying network, but also induce dynamic reachable information. A time-varying...
Byte-addressable Persistent Storage (BPS), such as persistent memory and CXL-enabled SSDs, has become an extension of main memory. This opens up new possibilities for indexes that operate persist data directly on the bus. Recent learned exploit distribution have shown great potential some workloads. Despite work proposed integrating into BPS, they are mainly based Intel's first-generation The current design suffers from following problems: 1) Excessive storage line accesses due to large node...
Pervasive and useR fOcused biomeTrics bordEr projeCT (PROTECT) is an EU project funded by the Horizon 2020 research Innovation Programme. The main aim of PROTECT was to build advanced biometric-based person identification system that works robustly across a range border crossing types has strong user-centric features. This work presents case study multibiometric verification developed within PROTECT. been be suitable for different borders such as air, sea, land borders. covers two use cases:...
Bipartite consensus is a common collective behavior emerging from multiagent systems (MASs) when cooperative and hostile relationships are present simultaneously in the interaction network. The main focus of this study problem bipartite for high-order MASs subject to asynchronous communications, where instants each agent derive information neighboring agents adjust its state determined by exclusive clock. Through construction augmented system, we establish algebraic graph conditions...
Abstract This paper reports a new method for determination of VB6 (pyridoxine hydrochloride) by its perturbation effects on novel Belousov-Zhabotinskii (BZ) oscillating system. BZ system, in which malic acid serves as the substrate, contains an enzyme-like complex, macrocyclic complex {[CuL](ClO4)2}, catalyst. The ligand L is 5,7,7,12,14,14-hexamethyl-1,4,8,11-tetraazacyclotetradeca-4,11-diene. Results show that addition pyridoxine hydrochloride can perturb oscillation amplitude and period,...
New hardware, such as SmartNICs, has been released to offload network applications in data centers. Off-path a type of multi-core SoC have attracted the attention many researchers. Unfortunatelly, they lack fully exploration off-path SmartNICs. In this paper, we use BlueField SmartNIC an example conduct systematical study on advantages and disadvantages We make detailed performance characterization including computing power communication overhead, propose following advices: 1) Directly...
Continuous wave (CW) mud pulse telemetry technology has high-speed real-time data transmission that is widely used in drilling and logging measurements. It important to effectively eliminate the strong pump noise with frequency-variant channel extract extremely weak signal which carries downhole information. In this paper, an adaptive cancellation (ANC) system for processing designed based on main auxiliary dual sensors. addition, improved variable step-size iteration algorithm proposed a...
Fine-tuning pre-trained models with task-specific data can produce customized effective for downstream tasks. However, operating large-scale such fine-tuning tasks in real time the center faces non-trivial challenges, including unpredictable task arrival and system environment dynamics, complex deadline-driven scheduling, intertwined pricing cost management. In this paper, targeting popular Low-Rank Adaptation (LoRA) technique, we present design study of a novel auction-based mechanism to...
Multiple Intelligence Theory has innovated and improved the Previous Theory. It stressed multiplity, development, collaboration, diversity construction of intelligence development. This new perspective brings us inspiration for our designing game-learning. paper analyzed education superiority role playing game-learning, discussed its design flow from multi-dimensional theory. Combing characteristics game, aiming at constructing an game environment which can promote development intelligence,...
In this study, we focus on the bipartite containment control of a group networked agents with general linear dynamics and antagonistic interactions in DoS attack environment. Under attacks, communication links at each time change quite dynamically, which are captured by dynamic signed digraphs. By introducing transformation vectors designing feedback matrix, new time-varying augmented system is derived. Main analytical tools including edge composition properties related to product...