- Distributed and Parallel Computing Systems
- Peer-to-Peer Network Technologies
- Mobile Agent-Based Network Management
- Energy Efficient Wireless Sensor Networks
- Cloud Computing and Resource Management
- Service-Oriented Architecture and Web Services
- Indoor and Outdoor Localization Technologies
- Context-Aware Activity Recognition Systems
- IoT and Edge/Fog Computing
- Topic Modeling
- Underwater Vehicles and Communication Systems
- Distributed systems and fault tolerance
- Natural Language Processing Techniques
- Neural Networks and Applications
- Software Engineering Research
- Software-Defined Networks and 5G
- Advanced Graph Neural Networks
- Complex Network Analysis Techniques
- Human Pose and Action Recognition
- Robotics and Sensor-Based Localization
- Scientific Computing and Data Management
- Data Mining Algorithms and Applications
- Scheduling and Timetabling Solutions
- Reinforcement Learning in Robotics
- Adversarial Robustness in Machine Learning
Shenzhen University
2011-2024
Guangdong-Hongkong-Macau Joint Laboratory of Collaborative Innovation for Environmental Quality
2023
Zhangjiakou Academy of Agricultural Sciences
2023
PLA Information Engineering University
2014
National Supercomputing Center in Shenzhen
2011
Nanyang Technological University
2004-2009
University Town of Shenzhen
2009
Hong Kong Polytechnic University
2008
In traditional radio-based localization methods, the target object has to carry a transmitter (e.g., active RFID), receiver 802.11 × detector), or transceiver sensor node). However, in some applications, such as safe guard systems, it is not possible meet this precondition. paper, we propose model of signal dynamics allow tracking transceiver-free object. Based on radio strength indicator (RSSI), which readily available wireless communication, three centralized algorithms, and one...
Data locality has recently been extensively exploited in Cloud computing to improve system performance. However, when schedule Map tasks Hadoop MapReduce framework working a heterogeneous environment, existing methods either cannot reduce the occurrence of these or injure fairness, thus degrading In order address this problem, paper proposes data aware scheduling method performance environments. After receiving request from requesting node, our preferentially schedules task whose input is...
Many applications and protocols in wireless sensor networks need to know the locations of nodes. A low-cost method localize nodes is use received signal strength indication (RSSI) ranging technique together with least-squares trilateration. However, average localization error this large due RSSI technique. To reduce error, we propose a algorithm based on maximum posteriori. This uses Baye's formula deduce probability density each node's distribution target region from values. Then, node...
This paper is concerned with the design, implementation, and evaluation of a novel extension FCMs, temporal fuzzy cognitive maps (tFCMs). FCMs have advantages such as simplicity, supporting inconsistent knowledge, circle causalities for knowledge modeling inference. However, lack time dimension limits usage from long term inference related modeling. In order to narrow down gap, temporalized FCM proposed define complete discrete FCM. To reduce complexities brought by temporalization, design...
With the development of digital economy technologies, mobile edge computing (MEC) has emerged as a promising paradigm that provides devices with closer resources. Because high mobility, unmanned aerial vehicles (UAVs) have been extensively utilized to augment MEC improve scalability and adaptability. However, more UAVs or devices, search space grows exponentially, leading curse dimensionality. This paper focus on combined challenges deployment task offloading in large-scale UAV-assisted MEC....
With the rapid development of autonomous driving and SLAM technology, perception system a vehicle heavily relies on laser image sensors to capture real-world scenario avoid obstacles autonomously. To achieve accurate robust multi-sensor fusion computation, high-precision extrinsic calibration camera scanner is necessary requirement. Traditional methods based manual features rely specific scenarios may not provide feature information over long distances. In this paper, we present novel...
League of Legends, a well-known and popular online PC game developed published by Riot Games, is the most played in North America Europe. In this paper, decision tree will be main model used to analyze which features champion are Legal Legends how these affect champion's popularity. Other supervised learning methods including logistic regression, trees, KNN naïve Bayes compare justify why optimal paper. Not only has high accuracy validation among all models but also, gives more information...
Human activity, which usually consists of several actions (sub-activities), generally covers interactions among persons and/or objects. In particular, human involve certain spatial and temporal relationships, are the components more complicated evolve dynamically over time. Therefore, description a single action modeling evolution successive two major issues in activity recognition. this paper, we develop method for recognition that tackles these issues. proposed method, an is divided into...
Service providers tend to deploy application services several different virtual machines (VMs) improve the scalability and manageability of cloud data center (CDC). Therefore, high frequency communication traffic is always involved among those VMs that are deployed same service. In order reduce cost (CC) CDC, all running service should be redeployed in subnet as much possible by using live migration technology, because CC between subnets higher than within subnet. On other hand, time (MT)...
Automated weighted graph construction from massive data is essential to theory based mining processes, where the edge weight computation time consuming or even fails complete on a single machine when necessary resources are exhausted. In addition, existing work lacks of measurement accuracy weights, which represents and affects following results. This paper describes classification, implementation evaluation algorithms with MapReduce Framework, powerful parallel distributed processing model....
Mobile agent technologies have been widely used in distributed computing to take care of the task execution for user. However, pervasive presents new challenges existing mobile systems, especially need context-aware self-configuring collaboration with services provided by physical objects. In order address problem, this paper a personal platform enable adapt on-demand services. The consists Ubiquitous Intelligent Object (UIO) model environment modeling, code repository provide executable...