- RFID technology advancements
- Energy Harvesting in Wireless Networks
- Optical measurement and interference techniques
- Advanced Measurement and Detection Methods
- Indoor and Outdoor Localization Technologies
- Image and Object Detection Techniques
- Advanced Measurement and Metrology Techniques
- Advanced Vision and Imaging
- Railway Engineering and Dynamics
- Antenna Design and Analysis
- Mobile Ad Hoc Networks
- IoT and Edge/Fog Computing
- Energy Efficient Wireless Sensor Networks
- Simulation and Modeling Applications
- QR Code Applications and Technologies
- Civil and Geotechnical Engineering Research
- Industrial Technology and Control Systems
- Astronomy and Astrophysical Research
- Context-Aware Activity Recognition Systems
- Remote-Sensing Image Classification
- Biometric Identification and Security
- Anomaly Detection Techniques and Applications
- Advanced Authentication Protocols Security
- Security in Wireless Sensor Networks
- Galaxies: Formation, Evolution, Phenomena
Nanjing University of Information Science and Technology
2017-2025
University of Electronic Science and Technology of China
2008-2024
Yibin University
2024
Johns Hopkins University
2011-2023
Harbin Engineering University
2023
Jilin University
2011-2022
Shaanxi University of Science and Technology
2022
Second Hospital of Liaohe Oilfield
2022
China State Shipbuilding (China)
2019-2022
Xiamen University
2021-2022
RFID is widely applied in massive tag based applications, thus effective anti-collision algorithms to reduce communication overhead are of great importance achieving energy and time efficiency. Existing MAC primarily focusing on improving system throughput or reducing total identification time. However, with the advancement embedded systems mobile consumption aspect increasingly important should be considered new design. In this article, we start a comprehensive review analysis...
Efficient and effective objects identification using radio frequency (RFID) is always a challenge in large-scale industrial commercial applications. Among existing solutions, the tree-based splitting scheme has attracted increasing attention because of its high extendibility feasibility. However, conventional tree algorithms can only solve tag collision with counter value equals to zero usually result performance degradation when number tags large. To overcome such drawbacks, we propose...
Emotion is the human brain reacting to objective things. In real life, emotions are complex and changeable, so research into emotion recognition of great significance in life applications. Recently, many deep learning machine methods have been widely applied based on EEG signals. However, traditional method has a major disadvantage that feature extraction process usually cumbersome, which relies heavily experts. Then, end-to-end emerged as an effective address this with help raw signal...
Identification efficiency is a key performance metrics to evaluate the ultra high frequency (UHF) based radio identification (RFID) systems. In order solve tag collision problem and improve rate in large scale networks, we propose arbitration strategy termed as group-based binary splitting algorithm (GBSA), which an integration of efficient cardinality estimation method, optimal grouping modified splitting. GBSA, tags are properly divided into multiple subsets according strategy. case that...
In the process of road pavement health and safety assessment, crack detection plays a pivotal role in preventive maintenance strategy. Recently, Convolutional Neural Networks (CNNs) have been applied to automatically identify cracks on concrete pavements. The effectiveness CNN-based measurement method depends several factors, including image segmentation with complex topology, inference noises similar texture distress, sensitivity thin cracks. presence shadows, strong light reflections,...
Lyman-break galaxy (LBG) samples observed during reionization (z ≳ 6) with the Hubble Space Telescope's Wide Field Camera 3 are reaching sizes sufficient to characterize their clustering properties. Using a combined catalog from eXtreme Deep and CANDELS surveys, containing N = 743 LBG candidates at z ⩾ 6.5 mean redshift of , we detect clear signal in angular correlation function (ACF) 4σ, corresponding real-space length cMpc. The derived bias is that dark matter halos 7.2, highlights...
The tag collision problem is considered as one of the critical issues in RFID system. To further improve identification efficiency an UHF system, a frame breaking policy proposed with dynamic framed slotted aloha algorithm. Specifically, reader makes effective use idle, successful, and statistics during early observation phase to recursively determine optimal size. Then collided tags each slot will be resolved by individual frames. Simulation results show that algorithm achieves better...
The tag collision avoidance has been viewed as one of the most important research problems in RFID communications and bit tracking technology widely embedded query tree (QT) based algorithms to tackle such challenge. Existing solutions show further opportunity greatly improve reading performance because queries empty are not fully explored. In this paper, a (BQ) strategy M-ary protocol (BQMT) is presented, which can only eliminate idle but also separate collided tags into many small subsets...
Radio frequency identification (RFID) is widely applied in massive items tagged domains. Existing medium access control (MAC) solutions primarily focus on improving slot efficiency or reducing the total number of slots. However, with pervasive applications RFID, time and energy consumption are increasingly important should be considered new design. In this paper, we re-exam problem tag UHF RFID system from perspective consumption. The presented work comprehensively reviews analyzes prior...
Lifetime is one of the most critical indexes Wireless Sensor Network (WSN). In this paper, we propose a clustering protocol based on meta-heuristic approach (CPMA). CPMA takes network lifetime as primary consideration and consists two parts. The first part focuses online cluster head selection communication coordination. Harmony Search (HS) Algorithm, which aims to reduce total energy dissipation smooth distribution throughout network. Currently, protocols cannot automatically tune...
The emergence of Software Defined Networking (SDN) overcomes the limitations traditional networking architectures.There are some advantages in SDN which centralized global network view, programmability, and separation data plane control plane.Due to limitation storage capacity SDN, it is necessary process redundancy rules switch.In this paper, we propose a method for active detection processing redundant rules.We use result generated by customized probe package detect rules.And checking...
The remote sensing scene images classification has been of great value to civil and military fields. Deep learning models, especially the convolutional neural network (CNN), have achieved success in this task, however, they may suffer from two challenges: firstly, sizes category objects are usually different, but conventional CNN extracts features with fixed convolution extractor which could cause failure multi-scale features; secondly, some image regions not be useful during feature...
We study the bivariate size-luminosity distribution of Lyman Break Galaxies (LBGs) selected at redshifts around 4 and 5 in GOODS HUDF fields. model as a combination log-normal (in size) Schechter function luminosity), therefore it enables more detailed selection effects. perform extensive simulations to quantify dropout-selection completenesses measurement biases uncertainties two-dimensional size magnitude bins, transform theoretical expected for observed data. Using maximum-likelihood...
In this article, a new Aloha-based tag identification protocol is presented to improve the reading efficiency of EPC C1 Gen2-based UHF RFID system.Collision detection (CD) plays vital role in process which determines anti-collision protocols since most optimize incoming frame length based on collisions current frame.Existing CD methods are ineffective identifying collision, resulting degradation performance.Our proposed algorithm adopts an enhanced (ECD) scheme Gen2 standard performance.The...
Radio-frequency identification (RFID) is a major enabler of Internet Things (IoT), and has been widely applied in tag-intensive environments. Tag collision arbitration considered as crucial issue such RFID system. To enhance the reading performance RFID, numerous anti-collision algorithms have presented previous literatures. However, most them suffer from slot efficiency bottleneck 0.368. In this paper, we revisit tag Aloha-based approaches perspective time efficiency. Based on comprehensive...
Attributable to the emergence of mobile edge computing (MEC), hardware-constrained industrial devices have further computational and service capability in Internet Things (IIoT) systems. Nevertheless, unreliable network environments unpredictable processing delays are intolerable factors for any application. Therefore, this article studies associated constraint problem how optimize offloading decision resource allocation collaborative networks with multiple IIoT MEC servers. In order attain...
The development and applications of mobile communication technologies in intelligent autonomous transportation systems have led to an extraordinary rise the mount connected vehicles (CAVs). Ensuring security in-vehicle data is basis for safety cooperative systems. An controller area network (CAN) bus important issue security, some hackers mastered remote vehicle control methods through CAN network. This paper proposes improved isolation forest method with mass (MS-iForest) tampering attack...
In the industrial Internet of things (IIoT), various applications generate a large number interactions and are vulnerable to attacks, which difficult be monitored in sophisticated way by traditional network architectures. Therefore, deploying software-defined (SDN) IIoT is essential defend against attacks. However, SDN has draw-back: there security problem distributed denial-of-service (DDoS) attacks at control layer. This paper proposes an effective solution: DDoS detection within domain...