- Privacy-Preserving Technologies in Data
- Indoor and Outdoor Localization Technologies
- Mobile Crowdsensing and Crowdsourcing
- Blockchain Technology Applications and Security
- Underwater Vehicles and Communication Systems
- Cooperative Communication and Network Coding
- Robotics and Sensor-Based Localization
- IoT and Edge/Fog Computing
- Error Correcting Code Techniques
- Advanced Algorithms and Applications
- Metaheuristic Optimization Algorithms Research
- Mobile Ad Hoc Networks
- Soil Mechanics and Vehicle Dynamics
- Advanced Wireless Communication Techniques
- Cryptography and Data Security
- Power Systems and Technologies
- Energy Efficient Wireless Sensor Networks
- Stochastic Gradient Optimization Techniques
- Advanced Sensor and Control Systems
- Electric Motor Design and Analysis
- Wireless Sensor Networks and IoT
- Neural Networks Stability and Synchronization
- Energy Harvesting in Wireless Networks
- Vehicular Ad Hoc Networks (VANETs)
- Advanced Wireless Communication Technologies
Zhengzhou University
2020-2025
Henan University
2006-2024
Qinghai University
2024
Toronto Metropolitan University
2024
Hubei University of Automotive Technology
2022-2024
Shandong University
2024
Beijing Aerospace Flight Control Center
2023
Changsha University of Science and Technology
2021-2023
Inner Mongolia Electric Power (China)
2022-2023
Shanghai Industrial Technology Institute
2023
A cyber physical system (CPS) is a complex that integrates computation, communication, and processes.Digital manufacturing method of using computers related technologies to control an entire production process.Industry 4.0 can make more efficient, flexible, sustainable through communication intelligence; therefore, it increase the competitiveness.Key such as Internet Things, cloud computing, machine-to-machine (M2M) communications, 3D printing, Big Data have great impacts on Industry 4.0.Big...
We introduce ART, a distribution-free and model-agnostic framework for changepoint detection that provides finite-sample guarantees. ART transforms independent observations into real-valued scores via symmetric function, ensuring exchangeability in the absence of changepoints. These are then ranked aggregated to detect distributional changes. The resulting test offers exact Type-I error control, agnostic specific or model assumptions. Moreover, seamlessly extends multi-scale settings,...
Privacy-preserving localization in crowdsourcing has drawn much attention recently. Under the classical nonadjacent subtraction-based (NSL) model, existing solutions based on homomorphic encryption techniques are of high computational and communication overheads. In this paper, an adjacent (ASL) model is first proposed. Then, efficient privacy-preserving (EPPL) algorithm developed under ASL without using any technique. terms correctness, privacy, efficiency, a comprehensive analysis...
Abstract The chirality-controlled two-mode Lipkin–Meshkov–Glick (LMG) models are mimicked in a potential hybrid quantum system, involving two ensembles of solid-state spins coupled to pair interconnected surface-acoustic-wave cavities. With the assistance dichromatic classical optical drives featuring chiral designs, it can simulate LMG-type long-range spin-spin interactions with left-right asymmetry. For applications, this unconventional LMG model not only engineer both collective into...
This paper investigates the problem of participant selection considering colluding attacks for crowdsourcing. Compared with existing work, a practical vulnerability-induced attack model is considered, where malicious participants different vulnerability levels collude each other to perform attacks, which makes more challenging. To address this problem, according structural characteristics model, we derive necessary condition and sufficient achieving possibility minimization selected...
Big Data analyzes correlations from huge raw data and predicts outcomes. It has great impacts on scientific discoveries value creation. High Performance Computing (HPC) uses parallel processing advanced programs or software packages to complete complicated jobs quickly. Finite Element Method (FEM) is very powerful in computation engineering analysis. created values almost every area of engineering. In a lot applications, Analysis (FEA) strongly relies computer technology HPC. will play an...
In this article, a novel multiple three-phase PM assisted synchronous reluctance machine with delta windings is proposed for enhanced fault tolerance. The connected offer an additional degree of freedom the phase currents. Hence, drive could provide higher torque under open-circuit condition. More importantly, inherently contain zero sequence current path and help reducing turn in event most challenging short-circuit fault. Owing to current, residual flux linkage more effectively nullified...
This paper presents a power electronic circuit used to extract usable electrical from backpack-based energy harvesting system. The rectified output of generator is connected SEPIC converter which emulates resistive load, resulting in efficient conversion. harvested stored ultracapacitors, where it then charge electrochemical batteries and/or an load. A switchable load engaged dissipate any excess that cannot be or stored. As shown experimental results presented this paper, 16 W electric...
This article proposes a decomposition-based multi-objective differential evolution particle swarm optimization (DMDEPSO) algorithm for the design of tubular permanent magnet linear synchronous motor (TPMLSM) which takes into account multiple conflicting objectives. In process, objectives are evaluated by an artificial neural network response surface (ANNRS), is trained samples TPMSLM whose performances calculated finite element analysis (FEA). DMDEPSO hybridizes (DE) and (PSO) together,...
In network function virtualization (NFV), implemented in software on the generally shared servers is called virtualized (VNF).The characteristics of provide service chain (SFC) provisioning with required flexibility by allowing for placing VNFs anywhere and anytime.However, there may be a large number low utilization across at low-load time, leading to enormous loss energy.VNF consolidation, as an effective way address this issue, allows energy saving consolidating into fewer...
Low-rank adaptation (LoRA) and its variants are widely employed in fine-tuning large models, including language models for natural processing diffusion computer vision. This paper proposes a generalized framework called SuperLoRA that unifies extends different LoRA variants, which can be realized under hyper-parameter settings. Introducing grouping, folding, shuffling, projecting, tensor factoring, offers high flexibility compared with other demonstrates superior performance transfer...
Model quantization has drawn much attention for federated learning (FL) over the Internet of Things (IoT) since it is an effective way to address critical bottleneck communication efficiency. State-of-the-art studies have generally assumed homogeneous model quantization, where all clients' updates are quantized using same number bits and aggregated with weight at server. However, in practical IoT scenarios, various devices may apply heterogeneous due their different hardware capabilities,...
Localization has drawn much attention in the Internet of Things (IoT) era. Under traditional multilateration techniques, existing solutions usually need multiple anchor nodes to perform localization, which introduces more system complexity and cost. In this paper, single localization (SAL) is first modeled, where a multi-antenna node able estimate location target using both angle distance information. Then, according SAL, we propose an accurate distributed (ADL) algorithm, can not only with...