- Advanced SAR Imaging Techniques
- Advanced MIMO Systems Optimization
- Radar Systems and Signal Processing
- Indoor and Outdoor Localization Technologies
- Cooperative Communication and Network Coding
- Millimeter-Wave Propagation and Modeling
- Advanced Wireless Network Optimization
- Optical Network Technologies
- Target Tracking and Data Fusion in Sensor Networks
- Iterative Learning Control Systems
- Corporate Finance and Governance
- PAPR reduction in OFDM
- Underwater Vehicles and Communication Systems
- Advanced Photonic Communication Systems
- Advanced Measurement and Detection Methods
- Synthetic Aperture Radar (SAR) Applications and Techniques
- Speech and Audio Processing
- Antenna Design and Analysis
- Auditing, Earnings Management, Governance
- Financial Reporting and Valuation Research
- Wireless Sensor Networks and IoT
- Optical Wireless Communication Technologies
- Smart Grid and Power Systems
- Advanced Decision-Making Techniques
- Piezoelectric Actuators and Control
Taizhou Central Hospital
2025
Taizhou University
2025
Shanghai University
2015-2024
Beijing University of Posts and Telecommunications
2022
Nanjing University of Aeronautics and Astronautics
2022
Institute of Software
2022
Ocean University of China
2022
China Academy of Railway Sciences
2020
National University of Defense Technology
2009-2019
Qinghai University for Nationalities
2013-2019
We design and implement MobileInsight, a software tool that collects, analyzes exploits runtime network information from operational cellular networks. MobileInsight runs on commercial off-the-shelf phones without extra hardware or additional support operators. It exposes protocol messages both control plane (below IP) data the 3G/4G chipset. provides in-device analysis operation logic inference. further offers simple API, through which developers researchers obtain access to low-level for...
This paper considers the downlink of a cellular orthogonal frequency division multi-access (OFDMA) system, in which multiple base stations (BSs) are coordinated by centralized resource allocation algorithm. We address problem maximizing weighted sum minimal user rates (WSMR) cells subject to total power constraint at each BS, terms jointly optimizing BSs' subcarrier and allocation. In particular, solution this corresponds that guarantees similar all users cell. An iterative algorithm is...
Mainstream indoor localization technologies rely on RF signatures that require extensive human efforts to measure and periodically recalibrate signatures. The progress ubiquitous remains slow. In this study, we explore Sextant, an alternative approach leverages environmental reference objects such as store logos. A user uses a smartphone obtain relative position measurements static for the system triangulate location. Sextant image matching algorithms automatically identify chosen by...
The lack of floor plans is a critical reason behind the current sporadic availability indoor localization service. Service providers have to go through effort-intensive and time-consuming business negotiations with building operators, or hire dedicated personnel gather such data. In this paper, we propose Jigsaw, plan reconstruction system that leverages crowdsensed data from mobile users. It extracts position, size, orientation information individual landmark objects images taken by also...
In this paper, we present a WiFi-based intrusion detection system called Wi-Alarm. Motivated by our observations and analysis that raw channel state information (CSI) of WiFi is sensitive enough to monitor human motion, Wi-Alarm omits data preprocessing. The mean variance the amplitudes CSI are used for feature extraction. Then, support vector machine (SVM) algorithm applied determine results. We prototype on commercial devices evaluate it in typical indoor scenario. Results show reduces...
Medical image segmentation plays a crucial role in addressing emerging healthcare challenges. Although several impressive deep learning architectures based on convolutional neural networks (CNNs) and Transformers have recently demonstrated remarkable performance, there is still potential for further performance improvement due to their inherent limitations capturing feature correlations of input data. To address this issue, paper proposes novel encoder-decoder architecture called MedFuseNet...
This paper addresses a weighted sum rate (WSR) maximization problem for downlink OFDMA aided by decode-and-forward (DF) relay under total power constraint. A novel subcarrier-pair based opportunistic DF relaying protocol is proposed. Specifically, user message bits are transmitted in two time slots. subcarrier the first slot can be paired with second relay-aided transmission to user. In particular, source and transmit simultaneously implement beamforming at slot. Each unpaired either or used...
Abstract This article is concerned with the convergence performance of wireless networked iterative learning control (ILC) systems data dropouts and channel noises in both sensor‐to‐controller controller‐to‐actuator channels. In order to improve such ILC systems, an optimal input filter developed at actuator side estimate controller updated effect these network uncertainties. Specifically, a filtering model constructed only by using process P‐type controllers transmission measured output...
Key generation and distribution is a fundamental problem of communication security. To avoid the potential risk due to static key, physical-layer dynamic key encryption scheme proposed for orthogonal frequency division multiplexing passive optical network (OFDM-PON) systems. By exploiting inherent channel randomness, shared secret between OLT ONU generated renewed periodically, thereby effectively improving security against malicious attacks. The transmission experiment 3.5 Gb/s...
This paper derives a general expression for the Cramer-Rao bound (CRB) of wireless localization algorithms using range measurements subject to bias corruption. Specifically, priori knowledge about which are biased, and probability density functions (pdf) biases assumed be available. For each measurement, error due estimating time-of-arrival (TOA) detected signal is modeled as Gaussian distributed random variable with zero mean known variance. In general, derived CRB can evaluated...
The accumulated effect of channel noise, including sensor‐to‐controller (SC) noise and controller‐to‐actuator (CA) has a significant impact on the convergence performance iterative learning control (ILC) systems over wireless networks. In this study, relation between input error, gain is derived, which reveals fact that contribution SC CA to error are all influenced by gain. Based discovery, method proposed improve ILC system when independent Gaussian distributed. Specifically, adaptively...
The blockchain technology becomes a key facilitator for Intelligent Manufacturing as it enables intelligent nodes to participate in global manufacturing networks with secure ledgers and smart contracts features. However, Traditional centralized storage cannot meet performance security requirements fully distributed consumes large amount of computing, network resources, which is inefficient difficult implement. In this paper, we propose clustering strategy on node community by constructing...
This paper investigates the dynamic resource allocation (RA) problem in cooperative OFDMA systems to maximize average utility of all mobile stations (MSs) under different services. We propose a optimization framework for RA by considering three situations: time-varying fading channel, MSs' change states, and relay (RSs)' states. Moreover, algorithm based on discrete particle swarm (DPSO) is proposed. The correlation between adjacent frames exploited improve performance algorithm. Simulation...
In this paper, fast capacitor assignment algorithms capable of finding a decoupling solution scheme with minimum number components that meets predefined target impedance semi-arbitrary shape within few seconds to an hour for given power distribution network (PDN) are proposed. The proposed also provide identification shadowed decap ports in PDN based on inductance matrix extraction from the model. Elimination those enables more effective layouts and cost savings PCB designs.
High peak-to-average power ratio (PAPR) causes nonlinear impairments in intensity modulation direct detection (IM/DD) optical orthogonal frequency division multiplexing (O-OFDM) systems. Selective mapping (SLM) is a well-known effective PAPR reduction technique, but it suffers from high computational complexity due to the bank of inverse fast Fourier transforms (IFFTs) required generate set candidate signals. In this paper, we propose recombined SLM scheme that can up 2U2 symbol candidates...
This letter studies the performance of a multiple-input-multiple-output (MIMO) transmission method using single leaky coaxial cable (LCX) where two signals are fed at dual ports LCX simultaneously. The this scheme is evaluated in terms channel matrix rank, correlation, and capacity. First, keyhole effect slots studied analytically, closed-form expression correlation presented. Then, we concentrate on influence slot period which provides reference for design. Finally, both capacity simulated...
This study proposes a novel scheme for locating an asynchronous sensor with synchronised beacons using time-of-arrival (TOA) estimates. In this scheme, reference beacon initiates the localisation by emitting ranging signal, and position is estimated measuring length of signal propagation path from to every via sensor. The associated Cramér–Rao bound (CRB) derived, algorithm, which does not need priori knowledge about TOA estimation accuracy, proposed based on constrained least square (LS)...
Ultra-dense networks (UDN) have been considered as one of the best ways to improve network throughput and energy efficiency (EE). However, massive unplanned deployment small cells will cause severe intra-tier interference among then deteriorate EE. For this, a Cluster-based Energy-Efficient Resource Management (CEERM) scheme is proposed mitigate while guaranteeing quality service (QoS) user equipments (UEs) in this paper. Firstly, we propose cell clustering algorithm divide into disjoint...
From social networks to complex infrastructures, many systems could be described by multiplex formed a set of nodes connected via more than one type links. Network disintegration, which is the problem identifying or edges whose removal would maximize network collapse, significant for dismantling harmful networks. In this article, we consider optimal disintegration strategy in and extend attack mode layer node-based attack. An optimization model proposed search under with fix length. Two...
The author proposes a distributed localization scheme for an asynchronous wireless sensor network (WSN) consisting of at least two beacons as well some anchors, each collaborating with the to help sensors within corresponding service area self-localization. Most interestingly, does not need emit either ranging or communication signals neighbor in proposed scheme. Instead, only needs estimate time-of-arrivals (TOAs) incoming from and then time-difference-of-arrival (TDOA) between signal...
Heterogeneous networks, constituted by conventional macro cells and overlaying pico cells, have been deemed a promising paradigm to support the deluge of data traffic with higher spectral efficiency Energy Efficiency (EE). In order deploy in reality, density Pico Base Stations (PBSs) Cell Range Expansion (CRE) are two important factors for network as well EE improvement. However, associated range evolution, inter-tier interference within heterogeneous architecture will be challenging, time...
This paper analyzes the convergence of iterative learning control for a class discrete-time systems over networks with successive input data compensation. Specifically, successively dropped in current iterations are compensated by one actuator received correctly same time instant label latest iteration. Through analyzing variation elements transition matrices errors at controller side, output is addressed. The analysis shows selection range gain determined maximum number successively....