- UAV Applications and Optimization
- Satellite Communication Systems
- Opportunistic and Delay-Tolerant Networks
- Software Reliability and Analysis Research
- Advanced Computational Techniques and Applications
- Advanced Wireless Communication Technologies
- Caching and Content Delivery
- Advanced MIMO Systems Optimization
- Advanced Decision-Making Techniques
- Technology and Security Systems
- Educational Technology and Assessment
- IoT and Edge/Fog Computing
- Evolutionary Algorithms and Applications
- Software Engineering Research
- Energy Harvesting in Wireless Networks
- Software Testing and Debugging Techniques
- Simulation and Modeling Applications
- Telecommunications and Broadcasting Technologies
- Biometric Identification and Security
- Multimedia Communication and Technology
- Software System Performance and Reliability
- IoT Networks and Protocols
- Cryptography and Data Security
- Mobile Agent-Based Network Management
- Advanced Steganography and Watermarking Techniques
King Abdullah University of Science and Technology
2015-2024
Yanshan University
2024
University of Science and Technology Beijing
2022
Research Institute of Petroleum Exploration and Development
2020
State Grid Corporation of China (China)
2020
Beihang University
2018
Southwest University
2017-2018
Handan College
2012-2015
Software (Spain)
2012
Henan University
2012
Mobile-edge cloud computing (MEC) as an emerging and prospective paradigm, can significantly enhance computation capability prolong the lifetime of mobile devices (MDs) by offloading computation-intensive tasks to cloud. This paper considers applying simultaneous wireless information power transfer (SWIPT) technique a multi-user problem for mobile-edge computing, where energy-limited harvest energy form ambient radio-frequency (RF) signal. We investigate partial jointly optimizing MDs' clock...
Aerial relays have been regarded as an alternative and promising solution to extend improve satellite-terrestrial communications, the probability of line-of-sight transmissions increases compared with adopting terrestrial relays. In this paper, a cooperative satellite-aerial-terrestrial system including satellite transmitter (S), group receivers (D), aerial relay (R) is considered. Specifically, considering randomness S D employing stochastic geometry, coverage R-D links in non-interference...
Benefiting from the usage of high-frequency band, utilizing part large available bandwidth for wireless backhauling is feasible without considerable performance sacrifice. In this context, integrated access and backhaul (IAB) has been proposed by Third Generation Partnership Project (3GPP) to reduce expenses related deployment fiber optics 5G beyond networks. paper, first, a brief introduction IAB based on 3GPP release presented. Then, existing research networks specifications possible...
Lattice-polarity-driven epitaxy of hexagonal semiconductor nanowires (NWs) is demonstrated on InN NWs. In-polarity NWs form typical structure with pyramidal growth front, whereas N-polarity slowly turn to the shape pyramid and then convert an inverted growth, forming diagonal pyramids flat surfaces finally coalescence each other. This contrary behavior driven by lattice-polarity most likely due relatively lower rate (0001̅) plane, which results from fact that diffusion barriers In N adatoms...
This letter investigates the secrecy outage performance of satellite-to-terrestrial downlink transmissions consisting one legitimate receiver (D) and eavesdropper (E). To reflect practical application scenarios, it is assumed that D E are randomly distributed in footprint satellite. Furthermore, considered scenario, equipped with multiple antennas, maximal ratio combining (MRC) technique adopted at both them to seek maximum receiving diversity gain. reveal impacts randomness positions E, MRC...
Recently, the simultaneous wireless information and power transfer (SWIPT) technique has been regarded as a promising approach to enhance performance of sensor networks with limited energy supply. However, from green communication perspective, efficiency optimization for SWIPT system design not investigated in Wireless Rechargeable Sensor Networks (WRSNs). In this paper, we consider tradeoffs between three factors including spectral efficiency, transmit outage target rate two different...
In the 5G wireless networks, non‐orthogonal multiple access (NOMA) is a promising paradigm to improve its high spectrum efficiency. This study considers applying simultaneous information and power transfer (SWIPT) technique cooperative NOMA where energy‐constrained relay nodes harvest ambient radio‐frequency signal use harvested energy forward packets from sources destinations. To this end, authors first formulate energy‐efficient transmission problem for SWIPT in with imperfect channel...
Mobile edge computing (MEC) can dramatically promote the computation capability and prolong lifetime of mobile users (MUs) by offloading computation-intensive tasks to cloud. In this paper, a spatial-random two-tier heterogeneous network (HetNet) is modelled feature random node distribution, where small-cell base stations (SBSs) macro (MBSs) are cascaded with servers different levels storage capacity. Only certain type application services finite number offloaded be cached processed in...
The high altitude platform (HAP) network has been regarded as a cost-efficient solution for providing access to rural or remote areas. Apart from connectivity, areas are predicted have demands diverse real-time intelligent communication services, such smart agriculture and digital forestry. effectiveness of decision-making applications depends on the timely updating sensing data measurements used in generating decisions. As performance metric capable quantifying freshness transmitted...
In this paper, a wireless fingerprint attendance management system is designed and implemented .This based biometrics technique solves the problem of spurious trouble laying corresponding network. It can make users' attendances more easily effectively.
At present, most of software reliability models have to build on certain presuppositions about fault process, which also brings the incongruence application. To solve these problems and cast off traditional models' multi-subjective assumptions, this paper adopts genetic programming (GP) evolution algorithm establishing model based mean time between failures' (MTBF) series. The GP is then analyzed appraised according five characteristic criteria for some common-used testing cases. Meanwhile,...
A third party-based data storage audit service is a developing branch where user may use its mobile devices with limited energy to trigger party the user's in cloud provider. basic tool for check integrity of designated verifier signature (DVS), which allows simulate signer's signatures. However, computing technique that be used long time future, development quantum computation shows threats building blocks services. It then desirable design DVS schemes potentially secure against attacks. We...
As cloud data center consumes more and energy, both researchers engineers aim to minimize energy consumption while keeping its services available. A good model can reflect the relationships between running tasks consumed by hardware be further used schedule for saving energy. In this paper, we analyzed linear nonlinear regression based on performance counters system utilization proposed a support vector model. For counters, gave general framework compared three models. utilization, our with...
The present study aims at improving the ability of canonical genetic programming algorithm to solve problems, and describes an improved (IGP). proposed method can be described as follows: first inves-tigates initializing population, second investigates reproduction operator, third crossover fourth mutation operation. IGP is examined in two domains results suggest that more effective efficient than one applied different domains.
Millimeter-wave (mmWave) integrated access and backhaul (IAB) has recently received considerable interest for its advantage in reducing the expenses related to deployment of fiber optics, such as Terragraph proposed by Meta's Connectivity Lab. networks aim provide high-speed internet dense urban environments. However, due vulnerability blockages high path loss associated with mmWave frequencies, proper planning is required achieve desired service quality. By obtaining a stable power supply...
In the paper, an algorithm is put forward based on fuzzy logic for real-time matching of GPS positioning results, which integrated with DR in intelligent transportation system. Besides, at junctions this makes use road network topological structure and continuity vehicles' track to choose continuing route maximum possibility as a matched result from multiple candidates. The can be widely used its computation easy more accurate.
Abstract The wave of big data has promoted the transformation auditing technology, which brought about tremendous changes to models and methods. traditional audit analysis methods cannot analyze semi-structured unstructured data, nor can they meet requirements development informatization in context data. New ideas for are urgently needed. In this context, article proposes an framework based on text mining, describes detailed process collecting storing, mining analysing, summarizing...
ASF is widely used in the distance learning area as a streaming media format. Each file composed of header object; data object and index. The format lucubrated this paper. On basis researching result, solution to synchronization proposed realized platform network courseware development. includes mainly two steps: firstly, needs be modified by adding some control information time break inside file; secondly, script language such JavaScript multimedia synchronization.
To solve the problems of incongruence software reliability models and cast off traditional models' multi-subjective assumptions, this paper adopts Genetic Programming evolution algorithm which has adaptive genetic operators (for short AGP) to establish model based on failure time series. The individual population is according case fitness generation adjust probability crossover mutation by sigmoid curve. By evaluating data series testing in Armored Force Engineering Institute, results...