- Advanced Wireless Communication Technologies
- Advanced MIMO Systems Optimization
- Energy Harvesting in Wireless Networks
- UAV Applications and Optimization
- Cooperative Communication and Network Coding
- Wireless Communication Security Techniques
- Medical Imaging Techniques and Applications
- Antenna Design and Analysis
- Advanced X-ray and CT Imaging
- Millimeter-Wave Propagation and Modeling
- Advanced Wireless Network Optimization
- Full-Duplex Wireless Communications
- Photonic and Optical Devices
- Advanced MRI Techniques and Applications
- Parallel Computing and Optimization Techniques
- Advanced Antenna and Metasurface Technologies
- Satellite Communication Systems
- Optical Wireless Communication Technologies
- Indoor and Outdoor Localization Technologies
- Meningioma and schwannoma management
- Radiation Dose and Imaging
- Underwater Vehicles and Communication Systems
- Sparse and Compressive Sensing Techniques
- Advanced Vision and Imaging
- Advanced Data Storage Technologies
South China University of Technology
2016-2025
Guangdong Polytechnic Normal University
2025
Jiangsu University
2020-2024
Nanjing Institute of Technology
2024
National Engineering Research Center of Electromagnetic Radiation Control Materials
2024
Zhejiang University
2022-2024
Chinese University of Hong Kong, Shenzhen
2022-2024
Capital Normal University
2023
Nanjing University
2005-2023
Xi'an Jiaotong University
2023
OpenAI Gym is a toolkit for reinforcement learning research. It includes growing collection of benchmark problems that expose common interface, and website where people can share their results compare the performance algorithms. This whitepaper discusses components design decisions went into software.
Reliable and flexible emergency communication is a key challenge for search rescue in the event of disasters, especially case when base stations are no longer functioning. Unmanned aerial vehicle (UAV)-assisted networking emerging as promising method to establish networks. In this article, unified framework UAV-assisted network established disasters. First, trajectory scheduling UAVs jointly optimized provide wireless service ground devices with surviving BSs. Then transceiver design UAV...
The purpose of this study was to report preliminary results an ongoing prospective trial ultralow-dose abdominal MDCT.
Unmanned aerial vehicles (UAVs) can help small-cell base stations (SBSs) offload traffic via wireless backhaul to improve coverage and increase rate. However, the capacity of is limited. In this paper, UAV assisted secure transmission for scalable videos in hyper-dense networks caching studied. proposed scheme, UAVs act as SBSs provide mobile users some small cells. To reduce pressure backhaul, are both equipped with caches store at off-peak time. facilitate UAVs, a single antenna each thus,...
Of all available reconstruction methods, statistical iterative algorithms appear particularly promising since they enable accurate physical noise modeling. The newly developed compressive sampling/compressed sensing (CS) algorithm has shown the potential to accurately reconstruct images from highly undersampled data. CS can be implemented in framework as well. In this study, we compared performance of two standard (penalized weighted least squares and q-GGMRF) algorithm. assessing image...
We propose a consumption scheduling mechanism for home area load management in smart grid using integer linear programming (ILP) technique. The aim of the proposed is to minimise peak hourly order achieve an optimal (balanced) daily schedule. able schedule both power and operation time power-shiftable appliances time-shiftable respectively according patterns all individual appliances. Simulation results based on neighbourhood scenarios have been presented demonstrate effectiveness
Unmanned aerial vehicle (UAV) can be utilized as a relay to connect nodes with long distance, which achieve significant throughput gain owing its mobility and line-of-sight (LoS) channel ground nodes. However, such LoS channels make UAV transmission easy eavesdrop. In this paper, we propose novel scheme guarantee the security of UAV-relayed wireless networks caching via jointly optimizing trajectory time scheduling. For every two users that have cached required file for other, broadcasts...
Thanks to their flexibility and mobility, unmanned aerial vehicles (UAVs) have been widely applied in wireless networks. However, UAV communications may suffer from blockage eavesdropping practical scenarios due the complex environment. Taking recent advances intelligent reflecting surface (IRS) reconfigure propagation environments, this article, we employ IRS enhance performance of UAV-aided air-ground First, overview combination IRS, by introducing diverse applications appealing advantages...
Despite the wide utilization of unmanned aerial vehicles (UAVs), UAV communications are susceptible to eavesdropping due air-ground line-of-sight channels. Intelligent reflecting surface (IRS) is capable reconfiguring propagation environment, and thus an attractive solution for integrating with facilitate security in wireless networks. In this paper, we investigate secure transmission design IRS-assisted network presence eavesdropper. With aim at maximizing average secrecy rate, trajectory...
The combination of simultaneous wireless information and power transfer (SWIPT) non-orthogonal multiple access (NOMA) is a potential solution to improve spectral efficiency energy (EE) the upcoming fifth generation (5G) networks, especially in order support functionality Internet things (IoT) massive machine-type communications (mMTC) scenarios. In this paper, we investigate joint allocation time switching (TS) control for EE optimization TS-based SWIPT NOMA system. Our aim optimize system...
Combination of unmanned aerial vehicle (UAV) and non-orthogonal multiple access (NOMA) is deemed as an promising solution to achieving massive connectivity in future wireless networks. In this paper, a UAV-aided NOMA scheme proposed achieve simultaneous information power transfer (SWIPT) guarantee the secure transmission for ground passive receivers (PRs), which nonlinear energy harvesting model applied. Each time frame divided into two phases. first phase, received at each PR maximized...
This paper studies an unmanned aerial vehicle (UAV)-assisted wireless powered IoT network, where a rotary-wing UAV adopts fly-hover-communicate protocol to successively visit devices in demand. During the hovering periods, works on full-duplex mode simultaneously collect data from target device and charge other within its coverage. Practical propulsion power consumption model non-linear energy harvesting are taken into account. We formulate multi-objective optimization problem jointly...
The intelligent reflecting surface (IRS)-assisted millimeter wave (mmWave) communication system has emerged as a promising technology for coverage extension and capacity enhancement. Prior works on IRS have mostly assumed perfect channel state information (CSI), which facilitates in deriving the upper-bound performance but is difficult to realize practice due passive elements of without signal processing capabilities. In this paper, we propose compressive estimation techniques IRS-assisted...
In this paper, we investigate the fundamental multiple access (MA) scheme in an active intelligent reflecting surface (IRS) aided energy-constrained Internet-of-Things (IoT) system, where IRS is deployed to assist uplink transmission from IoT devices point (AP). Our goal maximize sum throughput by optimizing beamforming vectors across time and resource allocation. To end, first study two typical MA schemes, namely division (TDMA) non-orthogonal (NOMA), analytically comparing their achievable...
Runtime and memory consumption are two important aspects for efficient image super-resolution (EISR) models to be deployed on resource-constrained devices. Recent advances in EISR [16], [32] exploit distillation aggregation strategies with plenty of channel split concatenation operations fully use limited hierarchical features. In contrast, sequential network avoid frequently accessing preceding states extra nodes, thus beneficial reducing the runtime overhead. Following this idea, we design...
Deep learning can enable Internet of Things (IoT) devices to interpret unstructured multimedia data and intelligently react both user environmental events but has demanding performance power requirements. The authors explore two ways successfully integrate deep with low-power IoT products.
Spectral efficiency (SE) and energy (EE) are the main metrics for designing wireless networks. Rather than focusing on either SE or EE separately, recent works have focused relationship between provided good insight into joint EE-SE tradeoff. However, such assumed that bandwidth was fully occupied regardless of transmission requirements therefore only valid this type scenario. In paper, we propose a new paradigm tradeoff, namely resource (RE) orthogonal frequency division multiple access...
In this paper, we develop a non-orthogonal multiple access (NOMA)-based two-way relay network with secrecy considerations, in which two users wish to exchange their NOMA signals via trusted the presence of single and eavesdroppers. To ensure secure communications, not only forwards confidential information legitimate but also keeps emitting jamming all time degrade performance any potential eavesdropper. Moreover, equip each user full-duplex technique multiple-access phase combat...
Purpose: To reduce radiation dose in CT imaging, the statistical model based iterative reconstruction (MBIR) method has been introduced for clinical use. Based on principle of MBIR and its nonlinear nature, noise performance is expected to be different from that well‐understood filtered backprojection (FBP) method. The purpose this work experimentally assess unique characteristics using a state‐of‐the‐art system. Methods: Three physical phantoms, including water cylinder two pediatric head...
Security is a challenging issue for cognitive radio (CR) to be used in future 5G mobile systems.Conventionally, interference will degrade the performance of primary user (PU) when spectrum shared with secondary users (SUs).However, properly designed, SUs can serve as friendly jammers guarantee secure transmission PU.Thus, this paper, we propose two schemes improve sum rate while guaranteeing secrecy PU.In first scheme, transceivers are jointly designed maximize their satisfying threshold on...
Simultaneous wireless information and power transfer (SWIPT) multi-carrier non-orthogonal multiple access (MC-NOMA) are promising technologies for future fifth generation beyond networks due to their potential capabilities in energy-efficient spectrum-efficient system designs, respectively. In this paper, the joint downlink resource allocation problem a SWIPT-enabled MC-NOMA with time switching-based receivers is investigated, where pattern division (PDMA) technique employed. We focus on...
The interference alignment (IA) is a promising technique to efficiently mitigate and enhance capacity of wireless communication network. This paper proposes an scheme for network with multiple cells multiple-input multiple-output (MIMO) users under Gaussian broadcast channel (IFBC) scenario. We first extend grouping method already known in the literature multiple-cells scenario jointly design transmit receiver beamforming vectors using closed-form expression without iterative computation....