- Mobile Ad Hoc Networks
- Energy Efficient Wireless Sensor Networks
- Cooperative Communication and Network Coding
- Opportunistic and Delay-Tolerant Networks
- IoT and Edge/Fog Computing
- Wireless Networks and Protocols
- Advanced Database Systems and Queries
- Caching and Content Delivery
- Underwater Vehicles and Communication Systems
- Neural Networks Stability and Synchronization
- Semantic Web and Ontologies
- Network Security and Intrusion Detection
- Distributed Control Multi-Agent Systems
- Nonlinear Dynamics and Pattern Formation
- Oil and Gas Production Techniques
- Drilling and Well Engineering
- Reservoir Engineering and Simulation Methods
- Indoor and Outdoor Localization Technologies
- IoT-based Smart Home Systems
- Energy Harvesting in Wireless Networks
- Geoscience and Mining Technology
- Hydraulic Fracturing and Reservoir Analysis
- Security in Wireless Sensor Networks
- Age of Information Optimization
- Vehicular Ad Hoc Networks (VANETs)
Zhengzhou University
2013-2025
Colorado State University
2024
Tebian Electric Apparatus (China)
2024
Harbin Institute of Technology
2020-2024
Shenzhen Institutes of Advanced Technology
2024
Nanjing University of Aeronautics and Astronautics
2018-2024
Henan University of Economic and Law
2018-2024
PLA Army Engineering University
2006-2024
Inner Mongolia University
2024
China Electronics Technology Group Corporation
2023-2024
In this paper, we present a minimum spanning tree (MST)-based algorithm, called local (LMST), for topology control in wireless multihop networks. each node builds its LMST independently and only keeps on-tree nodes that are one-hop away as neighbors the final topology. We analytically prove several important properties of LMST: 1) derived under preserves network connectivity; 2) degree any resulting is bounded by 6; 3) can be transformed into one with bidirectional links (without impairing...
Underwater acoustic sensor networks (UASNs) have become more and important in ocean exploration applications, such as monitoring, pollution detection, resource management, underwater device maintenance, etc. In networks, since the routing protocol guarantees reliable effective data transmission from source node to destination node, design is an attractive topic for researchers. There are many algorithms been proposed recent years. To present current state of development UASN protocols, we...
Topology control algorithms usually reduce the number of links in a wireless network, which turn decreases degree connectivity. The resulting network topology is more susceptible to system faults such as node failures and departures. In this paper, we consider k-vertex connectivity network. We first present centralized algorithm, Fault-tolerant Global Spanning Subgraph (FGSSk), preserves FGSSk min-max optimal, i.e., minimizes maximum transmission power used among all that preserve Based on...
This paper presents a 60-GHz direct-conversion RF front-end and baseband transceiver including analog digital circuitry for PHY functions. The 65-nm CMOS consumes 319 223 mW in transmitting receiving mode, respectively. It is capable of more than 7-Gb/s 16QAM wireless communication every channel the standards, which can be extended up to 10 Gb/s. 40-nm analog, digital, I/O 196 427 modes, In baseband, 5-b 2304-MS/s ADC 12 mW, 6-b 3456-MS/s DAC 11 mW. integrating all functions, (1440, 1344)...
Wireless sensor networks (WSNs) have gained considerable attention in the past few years. As such, there has been an increasing need for defining and developing simulation frameworks carrying out high-fidelity WSN simulation. In this paper, authors presented a modeling framework WSNs J-Sim - open-source, component-based compositional network environment that is developed entirely Java. This built upon autonomous component architecture (ACA) extensible internetworking (INET) of J-Sim,...
Most existing topology control algorithms assume homogeneous wireless networks with uniform maximal transmission power, and cannot be directly applied to heterogeneous where the power of each node may different. We present two localized for networks: Directed Relative Neighborhood Graph (DRNG) Local Spanning Subgraph (DLSS). In both algorithms, independently builds its neighbor set by adjusting defines network using only local information. prove that: 1) DRNG DLSS can preserve connectivity;...
In the vehicular ad hoc networks (VANETs), due to high mobility of vehicles, network parameters change frequently and information that sender maintains may outdate when it wants transmit data packet receiver, so for improving routing efficiency reliability, we propose probability prediction-based reliable efficient opportunistic (PRO) algorithm VANETs. The PRO can predict variation signal-to-interference-plus-noise ratio (SINR) queue length (PQL) receiver. prediction results are used...
The development of edge computing based autonomous and connected vehicles (CAVs) provides a very promising solution for the construction intelligent transportation system. Unfortunately, existing methods are difficult to predict traffic flow accurately in such case due not only dynamic nature CAVs but also considerable amount missing data. Based on this, we propose an online rolling prediction method provide support can be seen into practice. new matrix factorization techniques proposed...
The security of information over wireless channels has always been an important aspect communication research. In this paper, the secrecy performance a spatial modulated system with artificial noise is investigated Rayleigh channel, and corresponding rate analyzed in presence imperfect channel state (CSI). Based on analysis, ergodic rates lower bounds legitimate receiver eavesdropper are, respectively, derived. As result, closed-form bound obtained, (ESR) can be achieved by calculating mean...
For improving the efficiency and reliability of opportunistic routing algorithm, in this paper, we propose cross-layer reliable algorithm (CBRT) for Mobile Ad Hoc Networks, which introduces improved fuzzy logic humoral regulation inspired topology control into algorithm. In CBRT, inputs system are relative variance (rv) metrics rather than values metrics, reduces number rules dramatically. Moreover, does not increase when increases. reducing cost, node degree candidate relays set is a range...
The computation task offloading and resource management in mobile edge computing (MEC) become attractive recent years. Many algorithms have been proposed to improve the performance of MEC system. However, research on power control systems is just starting. single-user an interference-free multi-user has investigated; but interference-aware systems, this issue not learned detail. Therefore, a game theory-based approach for system paper. In algorithm, both interference scenario are considered....
Abstract Multi-access edge computing (MEC) has unique interests in processing intensive and delay-critical computation tasks for vehicular application through offloading. However, due to the spatial inhomogeneity dynamic mobility of connected vehicles (CVs), servers (ESs) must dynamically adjust their resource allocation schemes effectively provide offloading services CVs. In this case, we propose a MEC framework supporting collaboration CVs, incorporate digital twins (DTs) into wireless...
Recently, the cross-layer design for wireless sensor network communication protocol has become more and important popular. Considering disadvantages of traditional routing algorithms, in this paper we propose a new fuzzy logic-based algorithm, named Balanced Cross-layer Fuzzy Logic (BCFL) algorithm. In BCFL, use parameters' dispersion as logic inference system inputs. Moreover, give each parameter dynamic weight according value dispersion. For getting balanced solution, whose is large will...
The aim of the Smart and Networking Underwater Robots in Cooperation Meshes (SWARMs) project is to make autonomous underwater vehicles (AUVs), remote operated (ROVs) unmanned surface (USVs) more accessible useful. To achieve cooperation communication between different AUVs, these must be able exchange messages, so an efficient reliable network necessary for SWARMs. In order provide mission execution, one important issues topology control AUVs that are cooperating underwater. However, due...
Sea cucumber detection represents a significate step in underwater environmental perception, which is an indispensable part of the intelligent subsea fishing system. However, various complex factors such as water turbidity declines clarity images, presenting challenge to vision-based target detection. Therefore, accurate, real-time and lightweight models are required. First all, development summarized this presented work. Besides, since methods based on deep learning YOLOv5 DETR,...
In underwater acoustic sensor networks (UASNs), the spatially and temporally varying channel causes random route interruptions transmission void region. Further, long propagation delay of links complicated randomness packet collisions. Inspired by unpredictability both collisions in UASNs, a collision interruption tolerant protocol (CITP) is proposed to jointly address two challenges smart way. By exploiting opportunistic strategy, CITP forms optimized on fly, which bypasses nodes that...
A novel circuit for inductive sensing that was constructed using a quartz crystal resonator and an inductance element in series proposed. Resonant frequency expression of equivalent model the derived. The experimental results resonant responses versus changes were coincident with theoretical derivation, which proved could be tuned by element. displacement sensor utilizing planar spiral inductor developed based on earlier theories. measurement exhibited highly sensitive response 1 Hz/μm wide...
Nowadays, competition of Web-based communities has become very fierce, network are seeking for new growth point. Undoubtedly, mobile social service (MSNS) is one the most important directions. Few paper about MSNS focus on development trend or technical implementation MSNS, but not design and management which MSNS. This analyzes compares existing society Websites, proposes concept original Combining with author¿s experiences this schemes out a pattern Website points its five basic...
Many content-oriented applications require a scalable text index. Building such an index is challenging. In addition to the logic of inserting and searching documents, developers have worry about issues in typical distributed environment, as fault tolerance, incrementally growing cluster, load balancing. We developed called HIndex, by judiciously exploiting control layer HBase, which open source implementation Google's Bigtable. Such leverage enables us inherit support on availability,...