- Advanced Wireless Communication Techniques
- Error Correcting Code Techniques
- Advancements in Semiconductor Devices and Circuit Design
- Underwater Vehicles and Communication Systems
- Semiconductor materials and devices
- Vehicular Ad Hoc Networks (VANETs)
- Silicon Carbide Semiconductor Technologies
- Coding theory and cryptography
- Advanced Authentication Protocols Security
- User Authentication and Security Systems
- DNA and Biological Computing
- Indoor and Outdoor Localization Technologies
- Advanced Chemical Sensor Technologies
- Network Security and Intrusion Detection
- Privacy-Preserving Technologies in Data
- Simulation and Modeling Applications
- Perovskite Materials and Applications
- Multi-Criteria Decision Making
- Underwater Acoustics Research
- Advanced Algorithms and Applications
- Fuzzy Logic and Control Systems
- Conducting polymers and applications
- Polymer composites and self-healing
- Multi-Agent Systems and Negotiation
- Wireless Sensor Networks and IoT
Huazhong University of Science and Technology
2009-2024
Wuhan National Laboratory for Optoelectronics
2023-2024
Shanghai Key Laboratory of Trustworthy Computing
2023
East China Normal University
2023
Dalian Polytechnic University
2021
Iraqi University
2019
Huawei Technologies (China)
2016
Beijing University of Posts and Telecommunications
2013-2014
University of Arizona
2014
University of Lübeck
2012
As improved versions of successive cancellation (SC) decoding algorithm, list (SCL) and stack (SCS) are used to improve the finite-length performance polar codes. Unified descriptions SC, SCL SCS algorithms given as path searching procedures on code tree Combining ideas SCS, a new algorithm named hybrid (SCH) is proposed, which can achieve better trade-off between computational complexity space complexity. Further, reduce complexity, pruning technique proposed avoid unnecessary operations....
Polar codes represent an emerging class of error-correcting with power to approach the capacity a discrete memoryless channel. This overview article aims illustrate its principle, generation and decoding techniques. Unlike traditional capacity-approaching coding strategy that tries make as random possible, polar follow different philosophy, also originated by Shannon, creating jointly typical set. Channel polarization, concept central codes, is intuitively elaborated Matthew effect in...
Abstract Due to the low cost and excellent potential for mass production, printable mesoscopic perovskite solar cells (p‐MPSCs) have drawn a lot of attention among other device structures. However, open‐circuit voltage ( V OC ) such devices restricts their power conversion efficiency (PCE). This limitation is brought by high defect density at grain boundaries in mesoporous scaffold, which results severe nonradiative recombination detrimental . To improve crystallization process, passivate...
CRC (cyclic redundancy check) concatenated polar codes are superior to the turbo under successive cancellation list (SCL) or stack (SCS) decoding algorithms. But code length of is limited power two. In this paper, a family rate-compatible punctured (RCPP) proposed satisfy construction with arbitrary length. We propose simple quasi-uniform puncturing algorithm generate table. And we prove that method has better row-weight property than random puncturing. Simulation results binary input...
Vehicles in a vehicular ad-hoc network (VANET) broadcast beacons giving safety-related and traffic information. In an open-access environment, this means that the VANET is susceptible to security privacy issues. paper, we propose new pseudo-identity-based scheme for conditional anonymity with integrity authentication VANET. The proposed uses pseudonym joining process road-side unit (RSU) protect real identity even from RSU, case it compromised. All previous identity-based schemes have been...
Abstract The oxidation of iodide ions during annealing in air and rich defects generated at crystal terminations perovskite are major limitations for achieving high photovoltaic performance printable mesoscopic solar cells (p‐MPSCs). Here, the dual role hydrazide derivatives inhibiting passivating termination is reported how affected by substituent studied. It's found that varying derivative from formylhydrazine (FH) to benzhydrazide (BH) then 4‐tert‐butylbenzhydrazide (TBBH) introducing...
A new physical and continuous BSIM (Berkeley Short-Channel IGFET Model) I-V model in BSIM3v3 is presented for circuit simulation. Including the major effects state-of-the art MOS devices, describes current characteristics from subthreshold to strong inversion as well linear saturation operating regions with a single expression, guarantees continuities of I/sub ds/, conductances their derivatives throughout all V/sub gs/, T/sub bs/, bias conditions. Compared previous models, improved...
A hybrid automatic repeat request (HARQ) scheme based on a novel class of rate-compatible polar (RCP) codes is proposed. The RCP are constructed by performing punctures and repetitions the conventional codes. Simulation results over binary-input additive white Gaussian noise channels show that, under low-complexity successive cancellation decoder, proposed HARQ can perform as well existing schemes turbo low-density parity-check transmission only about 1.0 to 1.5dB away from channel capacity...
Vehicles authentication, the integrity of messages exchanged, and privacy-preserving are essential features in vehicular ad hoc network (VANETs) security. Most previously proposed VANETs security solutions do not sufficiently satisfy efficiency requirements. Besides, most those heavily dependent on system key long-term sensitive data stored an ideal tamper-proof device, which may be practical or for resource-constrained onboard units (OBUs), especially case unexpected cloning physical...
A rateless coding scheme transmits incrementally more and coded bits over an unknown channel until all the information are decoded reliably by receiver. We propose a new based on polar codes, we show that this is capacity-achieving, i.e. its rate as good best code specifically designed for channel. Previous schemes specific classes of channels such AWGN channels, binary erasure etc. but proposed capacity-achieving broad long they ordered via degradation. Moreover, it inherits conceptual...
Channel reassignment is to assign again on the assigned channel resources in order use more efficiently. Software-Defined Networking (SDN) based Internet of Things (SDN-IoT) a promising paradigm improve communication performance network, since it allows software-defined routers (SDRs) with help SDN controller appropriately schedule traffic loads meet better transaction corresponding channels one link. However, existing works have many limitations. In this paper, we develop joint...
An increasing number of sensors is being connected to the Internet and their output published on Web, resulting in formation a Web Things (WoT) that will soon connect tens Billions devices. As traditional web, search be key service also WoT enable users find with certain properties. We propose sensor similarity search, where given sensor, other are found produced similar past. At heart our approach an algorithm exploits fuzzy sets for efficiently computing score pair used obtain ranked list...
We address the problem of improving throughput and delay efficiency distributed multi-channel MAC (MMAC) protocols. design an MMAC protocol called FD-MMAC that exploits recent advances in full-duplex (FD) communications to coordinate channel access a manner. Compared with prior designs, eliminates use in-band or out-of-band control channels for combating hidden terminal problem, discovering resident destinations, performing load balancing. Furthermore, improves spectral by enabling operation...
Artificial Intelligence of Things (AIoT) is an emerging paradigm that integrates artificial intelligence (AI) and Internet (IoT) technologies to provide intelligent IoT solutions. The AIoT system acquires data in real time through sensors, performs analysis tasks anywhere the terminal–edge–cloud continuum, provides accurate decision-making services based on predictions. Cloud–edge collaboration can reduce security risks for prediction by sharing features instead raw data. However, sensitive...
The low-rate denial of service (LDoS) attacks reduce network services capabilities by periodically sending high intensity pulse data flows. For their concealed performance, it is more difficult for traditional DoS detection methods to detect LDoS attacks; at the same time accuracy current relatively low. As fact that led abnormal distribution ACK traffic, can be detected analyzing characteristics traffic. Then EWMA algorithm which smooth accidental error while being as exceptional mutation...
Analytical models on metal-oxide-semiconductor field-effect transistor (MOSFET) scaling and complementary (CMOS) ring oscillator performance developed recently are applied to revisit CMOS design guidelines because those based the basic long channel model obsolete. Handy empirical equations for deep submicrometer MOSFET drain saturation current developed. The differences between accurate highlighted. Design V/sub th/ dd/ as well interconnect loading effects presented.
An increasing number of sensors is being connected to the Internet and their output published on Web, resulting in formation a Web Things (WoT) that will soon connect tens Billions devices. We propose sensor similarity search, where given sensor, other WoT are found produced similar past. At heart our approach an algorithm exploits fuzzy sets for efficiently computing score pair used obtain ranked list matching sensors. Using data from real deployments, we find this results high accuracy.
Numerous privacy-preserving authentication schemes have been proposed but vehicular ad hoc networks (VANETs) still suffer from security and privacy issues as well computation communication overheads.In this paper, we a robust conditional privacypreserving scheme based on pseudonym root with cuckoo filter to meet requirements reduce our scheme, used new idea generate pseudonyms for vehicles where each on-board unit (OBU) saves one pseudonym, named "pseudonym root," generates all the same...
In addition to the security and privacy challenges in vehicular ad hoc network (VANET), computational communicational costs are huge challenges, since they increase latency, thus casing reduce network's communication efficiency, providing attacker with an opportunity penetrate network. this paper, we propose a new scheme eliminate mentioned VANET systems. first part of scheme, initialize register On-Board Units (OBUs) Road Side (RSUs). second part, exchange between RSU OBU mutual...
Polar codes have a regular recursive structure which is feasible for hardware implementation in practice. Quantization critical issue implementation. In this paper, quantization scheme successive-cancellation (SC) decoding of polar proposed based on the equivalent channel cutoff rate optimization. Moreover, modified Gaussian approximation (GA) method exploiting maximizing criterion brought forward to construct and estimate frame error (FER) performance under quantized algorithms. Utilizing...
An analytical inversion charge model, ICM, based on a surface potential solution and consideration of poly-gate depletion as well the correction quantum mechanical effects is presented. It continuous accurate from weak to strong inversion, including moderate region, growing importance for low voltage/power circuits. The model verified with extensive measured data applied modeling MOSFETs down 0.13 /spl mu/m channel length.