- Advanced Optical Network Technologies
- Optical Network Technologies
- Software-Defined Networks and 5G
- Energy Efficient Wireless Sensor Networks
- Advanced Photonic Communication Systems
- Network Traffic and Congestion Control
- Internet Traffic Analysis and Secure E-voting
- Caching and Content Delivery
- Network Security and Intrusion Detection
- Opportunistic and Delay-Tolerant Networks
- Distributed and Parallel Computing Systems
- Mobile Agent-Based Network Management
- IoT and Edge/Fog Computing
- Energy Harvesting in Wireless Networks
- Advanced Wireless Network Optimization
- IPv6, Mobility, Handover, Networks, Security
- Privacy-Preserving Technologies in Data
- Cloud Computing and Resource Management
- Cryptography and Data Security
- Cooperative Communication and Network Coding
- Advanced MIMO Systems Optimization
- Telecommunications and Broadcasting Technologies
- Advanced Wireless Communication Technologies
- Wireless Networks and Protocols
- Peer-to-Peer Network Technologies
Beijing University of Posts and Telecommunications
2013-2024
Shandong Provincial QianFoShan Hospital
2022
Shandong First Medical University
2022
Wuhan University of Technology
2021
NARI Group (China)
2021
Carnegie Mellon University
2010-2019
Collaborative Innovation Center of Chemistry for Energy Materials
2019
Xiamen University
2019
Shandong University
2018
Ames Research Center
2017
The enormous potential for wireless sensor networks to make a positive impact on our society has spawned great deal of research the topic, and this is now producing environment-ready systems. Current technology limits coupled with widely-varying application requirements lead diversity hardware platforms different portions design space. In addition, unique energy reliability constraints system that must function months at time without human intervention mean demands network are from standard...
Oriented external electric fields (OEEFs) offer a unique chance to tune catalytic selectivity by orienting the alignment of field along axis activated bond for specific chemical reaction; however, they remain key experimental challenge. Here, we experimentally and theoretically investigated OEEF-induced selective catalysis in two-step cascade reaction Diels-Alder addition followed an aromatization process. Characterized mechanically controllable break junction (MCBJ) technique nanogap...
ZebraNet is a mobile, wireless sensor network in which nodes move throughout an environment working to gather and process information about their surroundings[10]. As many or systems, have critical resource constraints such as processing speed, memory size, energy supply; they also face special hardware issues sensing device sample time, data storage/access restrictions, transceiver capabilities. This paper discusses evaluates ZebraNet's system design decisions the of range real-world...
Software Defined Network (SDN) has been widely used in modern network architecture. The SD-WAN is considered as a technology that potential to revolutionize the WAN service usage by utilizing SDN philosophy. Attacking router and controller can affect block entire services. In this paper, we propose machine learning based anomalous traffic detection framework named OADSD over achieve task independent ability of adapting environment. adopts Distributed Dynamic Feature Extraction (DDFE) extract...
Neurotoxicity can be resulted from many diverse clinical drugs, which has been a cause of concern to human populations across the world. The detection drug-induced neurotoxicity (DINeurot) potential with biological experimental methods always required lot budget and time. In addition, few studies have addressed structural characteristics neurotoxic chemicals. this study, we focused on computational modeling for machine learning insights into Based drug data effects, developed 35 different...
The articles in this special section focus on the Internet of things (IoT) as it relates to people. is state-of-the-art research and development activities contributing all aspects people-centric IoT, which include, but are not limited to, people-IoT interactions, social network applications mobile computing, context-aware services, human loop, big data analysis cloud-based IoT environments, security privacy, prototypes, field experiments, testbeds.
Mobile edge computing (MEC) is considered to be a promising paradigm enable the new generation of wireless networks. Meanwhile, inspired by great potential non-orthogonal multiple access (NOMA) technique improve spectrum efficiency, this letter jointly considers these two technologies and studies partial computation offloading scheme. Specifically, uplink NOMA used in MEC where mobile devices (MDs) partially offload their tasks server on same time-frequency resource block, distinguishing...
One of the main features future networks will be heterogeneity in wireless access environment, and consequently, network selection mechanisms play an important role ensuring QoS for users this environment. In paper, we propose a novel mechanism, goal which is to guide select Always-most-Suitable-Connection (ASC) network, realizing well tradeoff between performance optimization single application efficient utilization resources. Besides, give comprehensive decision criteria set including...
Urban environment has significant impacts on the health of city dwellers. To understand these impacts, planners have to obtain fine-grained environmental information, however such information is not available with traditional systems. address this problem, we present Gotcha, a taxi-based mobile sensing system for data acquisition. Gotcha utilizes taxi cabs serve as sensor that collects variety (such concentrations carbon-dioxide, carbon-monoxide, ozone, particulate matter, etc.). We aim...
A common pain point for physical retail stores is live inventory monitoring, i.e. knowing how many items of each product are left on the shelves. About 4% sales lost due to an average 5-10% out-of-shelf stockout rate, while additional supplies existed in warehouse. Traditional techniques rely manual inspection, per-item tagging using RFIDs, or human-in-the-loop systems such as Amazon Go. These approaches, effective, either have poor accuracy, long delays between results cost prohibitive.
The hierarchical network is the more effective platform, which provides multiple channels for various worm propagation. Thus, emerging worms can infect vulnerable hosts by scanning strategy and social media. However, spread of scan-based restrained due to uneven distribution NAT (Network Address Translation) technique. Meanwhile, topological dependency dictates topology-based only infecting those in networks. To avoid their respective disadvantages, modern hybrid worm, combines above two...
A lot of traffic anomalies, such as flash crowds, denial-of-service attacks, port scans, can often span multiple ISP networks. Cooperatively detecting and diagnosing these anomalies is critical for network operators to choose the appropriate response. However, legitimate concerns about privacy, topology link loads, inhibit in collaborative detection. In this paper, we propose a privacy-preserving mechanism that allows ISPs cooperatively detect without requiring them reveal private...
Dynamic resource allocation (DRA) is a key technology to improve system performances in GEO multi-beam satellite systems. And, since the cache on very valuable and limited, DRA problem under restricted resources also an important issue be studied. This paper mainly investigates of carrier certain constraints. What's more, with aim satisfy all users' traffic demands as more possible, maximize utilization bandwidth, we formulate multi-objective optimization (MOP) where satisfaction index...
Segment routing (SR) is a new network paradigm to optimize performance. Through leveraging source routing, SR able achieve more fine-grained control of data flow in the domain. However, it difficult introduce large-scale full into existing traditional due economic constraints and immature operation technology. Thus, incrementally deploying nodes an preferred, which forms hybrid IP/SR scenario. In network, with enabled devices, path can be dynamically adjusted. Network utility important...
We study the problem of deploying a high number low-cost, low-complexity robots inside known environment with objective that at least one robotic platform reaches each N preassigned goal locations. Our is inspired by SensorFly, micro-aerial vehicle successfully used for mobile sensor network applications. SensorFly nodes feature limited on-board sensors, so has to rely on simple navigation strategies and increase performance through redundance in team. introduce simple, fully scalable...
In the inter-domain network, route leaks can disrupt Internet traffic and cause large outages. The accurate detection of requires sharing AS business relationship information. However, information between ASes is confidential. are usually unwilling to reveal this other ASes, especially their competitors. paper, we propose a method named FL-RLD detect while maintaining privacy relationships by using blockchain-based federated learning framework, where collaboratively train global model...
With the proliferation of mobile devices, an increasing number sensing applications are using sensor networks. These networks severely energy-constrained, and energy usage is one most common causes failure in their deployments. In these networks, nodes that exhaust before targeted system lifetime degrade performance; run past cannot fully utilize stored energy. Although much work has focused on policies to reduce regulate fixed dense intermittently connected have been largely overlooked. Due...
The path computation element (PCE) is used for the traffic engineering systems such as multi-protocol label switching (MPLS) and Generalized MPLS networks. It offers a good architecture centralized routing control. classic policy aims to select one "best" traffic, which may cause network congestion in best link. How adjust alleviate or avoid an important issue operating In this paper, according topology model of China Telecom's network, we propose practical control scheme with load balancing...
Abstract This paper proposes a dust sensor monitoring system using Wi-Fi mesh network, including wireless node and networking procedure. The is made by integrating based on GP2Y1010AU0F chip, STM32F103ZET6 chip as its MCU, module transceiver, LCD screen user-interface. takes the light scattering method, measuring flash frequency duration reflected particles in air flow. Dust nodes are network. Practical experiments validate effectiveness of proposed system. error concentration less than 5%....
This paper proposes a new method for transient stability analysis in terms of measuring critical clearing time using grid-computing technology. Grid computing is highly developed system jointly solving collaborative complex problems; those are required to solve limited and therefore they need high performance computing. Probabilistic one such application, which requires lot computation accurate results. presents the grid based approach this purpose, able measure through domain simulation by...
This paper proposes applying the statistical analysis method for determination of static thermal conductor rating. The spectrum maximum current carrying capability a over year is first calculated using Typical Meteorological Year (TMY2) data set as weather and IEEE Standard 738-1993 computation engine. then performed to calculate cumulative distribution function capability. Finally, rating can be determined based on risk level which utilities are willing take. proposed applied determine...
In modern embedded systems, the C2RTL (high-level synthesis) technology helps designer to greatly reduce time-to-market, while satisfying performance and cost constraints. To attack challenges in complex designs, we propose a FIFO-connected hierarchical approach replace traditional flatten one stream applications. Furthermore, develop an analytical algorithm find optimal FIFO capacity connect multiple modules efficiently. Finally, prove advantages of proposed method feasibility our seven...