- Energy Efficient Wireless Sensor Networks
- Mobile Ad Hoc Networks
- Indoor and Outdoor Localization Technologies
- Network Security and Intrusion Detection
- Opportunistic and Delay-Tolerant Networks
- Cooperative Communication and Network Coding
- Security in Wireless Sensor Networks
- Underwater Vehicles and Communication Systems
- IPv6, Mobility, Handover, Networks, Security
- Context-Aware Activity Recognition Systems
- Mobile Agent-Based Network Management
- Internet Traffic Analysis and Secure E-voting
- Cryptography and Data Security
- Security and Verification in Computing
- IoT and Edge/Fog Computing
- Advanced Malware Detection Techniques
- Topic Modeling
- Image Processing Techniques and Applications
- Energy Harvesting in Wireless Networks
- Cloud Data Security Solutions
- Peer-to-Peer Network Technologies
- Distributed systems and fault tolerance
- Advanced Authentication Protocols Security
- Video Surveillance and Tracking Methods
- Data Stream Mining Techniques
Northeastern University
2012-2024
Neusoft (China)
2007-2024
Universidad del Noreste
2023
Northeastern University
2006-2014
Ministry of Education of the People's Republic of China
2014
China Jiliang University
2007
Zhejiang University
2007
Software602 (Czechia)
2007
Smartphone-based pedestrian dead-reckoning (PDR) has become promising in indoor localization since it locates users with a smartphone only. However, existing PDR approaches are still facing the problem of accumulated errors due to low-cost noisy sensors and complicated human movements. This paper presents novel algorithm combined online sequential extreme learning machine (OS-ELM). By analyzing process localization, this first formulates as an approximation function, then,...
Abstract Large language models have achieved outstanding performance on various downstream tasks with their advanced understanding of natural and zero-shot capability. However, they struggle knowledge constraints, particularly in requiring complex reasoning or extended logical sequences. These limitations can affect question answering by leading to inaccuracies hallucinations. This paper proposes a novel framework called KnowledgeNavigator that leverages large graphs achieve accurate...
In recent years, with the development of cloud computing technology, size a data center is expanding rapidly. To minimize energy consumption center, we propose an energy-efficient virtual resource dynamic integration (VRDI) method. proposed VRDI method, first, by monitoring load patterns physical machines (PMs) and corresponding thresholds PMs calculated using statistical data, PM selection algorithm to find set PMs, which should be integrated. Furthermore, machine (VM) based on minimum...
This paper studies the performance of large-scale cache-enabled device-to-device (D2D) networks with homogeneous Poisson point process distributed mobile helpers(MHs) and user equipments (UEs). The MHs are assumed to have caching capabilities able serve random requests from UEs within collaboration distance D2D transmission. To avoid collisions among concurrent transmissions, a contention-based multimedia delivery protocol is proposed, under which MH allowed transmit only if its back-off...
Moving target tracking in wireless sensor networks is of paramount importance. This paper considers the problem state estimation for L-sensor linear dynamic systems. Firstly, establishes fuzzy model measurement condition estimation. Then, Generalized Kalman Filter design performed to incorporate novel neighborhood function and motion information, improving with an increasing number active sensors. The proposed selection approach has some advantages time cost. As such, if desired accuracy...
Multi-channel communication in a Wireless Mesh Network with routers having multiple radio interfaces significantly enhances the network capacity. Efficient channel assignment is critical for realization of optimal throughput such networks. In this paper, we investigate problem finding largest number links that can be connected overall interference minimized. Since radios on any node less than available channels, must obey constraint different channels assigned to incident at most node. The...
With the surge service requirements from vehicular users, especially for automated driving, providing real-time high-rate wireless connections to fast-moving vehicles is ever demanding. This motivates development of emerging LTE-V network, a 5G cellular-based technology. However, note that user group typically very large scale, whereas bandwidth spectrum available communications limited. To efficiently allocate and utilize slim resource vehicle users are therefore important. paper develops...
This letter introduces our initial results of target coverage model in wireless visual sensor networks (WVSNs). In this letter, we develop the Q-coverage for detection which is a basis application WVSNs, and propose novel degree (CD)-coverage model. First, present new concept CD-coverage formulate problem. Further, harmony search-based coverage-enhancing (HS-CE) approach to obtain an approximate optimal solution The extensive simulations show validity HS-CE approach.
Legal judgment prediction (LJP) is a crucial task in legal intelligence to predict charges, law articles and terms of penalties based on case fact description texts. Although existing methods perform well, they still have many shortcomings. First, the significant limitations understanding long documents, especially those RNNs BERT. Secondly, are not good at solving problem similar charges do fully effectively integrate information articles. To address above problems, we propose novel LJP...
To extend the lifetime of sensor networks as far possible while maintaining quality network coverage is a major concern in research control. A systematical analysis on relationship between and cover sets alternation given, by introducing concept time weight factor, maximization model presented. Through introduction solution granularity T, optimization problem transformed into sets. based NSGA-II proposed. Compared with previous method, which has additional requirement that being disjoint...
Wireless sensor networks are new integrative technologies arising from the development of wireless communication and tiny sensors. With reduction power consumption cost instruments maintenances, it's ready to install over large-scale traffic areas monitor roads in a much fine way, which is certain bring some breakthroughs field monitoring. Surveying vehicle detecting nodes, networks, forecasting algorithms architecture, this paper gives full view application monitoring systems. The key...
Wireless visual sensor networks (WVSNs) comprise a large number of camera-equipped sensors, which are often deployed densely to gain enhanced observations in field interest. Therefore, there exists abundant image redundancy caused by the content correlation (ICC) between cameras with overlapped views (FoVs). Image compression is an important method remove redundancy. Aiming at problem compression, this paper designs 3-D compression-oriented ICC (3D-COICC) model for WVSNs quantitatively...
Wireless Sensor Networks (WSNs) are vulnerable to various localization attacks where attackers intended provide improper beacons or manipulate the location determination. Attack classification for in WSNs is not only condition, prerequisite and premise of threat analysis, but, m ore significantly, a vital part security anomaly detection. In this paper, attack recognition method using deep learning architecture was proposed. To enhance performance, good feature representation established...
The target selection algorithm of passive worms makes them difficult to detect, and therefore they threaten the Internet greatly. Modeling propagation can provide profound insight into worm behavior. In this paper we present a mathematical model named as (PWP) model. Based on two-factor model, it represents worms. simulation indicates that spread is governed by initial value worms, infectious rate removal time delay. We also analyze feasibility one kind benign To best our knowledge, there no...