- Topic Modeling
- Technology Adoption and User Behaviour
- Advanced Wireless Network Optimization
- Artificial Intelligence in Law
- Mobile Ad Hoc Networks
- Natural Language Processing Techniques
- Advanced MIMO Systems Optimization
- Big Data and Business Intelligence
- Complex Network Analysis Techniques
- Energy Efficient Wireless Sensor Networks
- Digital Marketing and Social Media
- Job Satisfaction and Organizational Behavior
- Structural Health Monitoring Techniques
- scientometrics and bibliometrics research
- Wireless Communication Networks Research
- Security in Wireless Sensor Networks
- Business Strategy and Innovation
- Cryptography and Data Security
- Network Time Synchronization Technologies
- Network Packet Processing and Optimization
- Consumer Market Behavior and Pricing
- Computational and Text Analysis Methods
- Leadership, Courage, and Heroism Studies
- Seismic Waves and Analysis
- Information Technology Governance and Strategy
Tongji University
2023-2024
Huazhong University of Science and Technology
2007-2023
Charles River Laboratories (Netherlands)
2016-2018
Shanghai University of Engineering Science
2014
California State University, Long Beach
2005
National Changhua University of Education
2004
It is widely recognized that besides the quality of service (QoS), energy efficiency also a key parameter in designing and evaluating mobile multimedia communication systems, which has catalyzed great interest recent literature. In this paper, an model first proposed for multiple-input multiple-output orthogonal-frequency-division-multiplexing (MIMO-OFDM) systems with statistical QoS constraints. Employing channel matrix singular-value-decomposition (SVD) method, all subchannels are...
Abstract Much of the technology diffusion research has focused on "intention to adopt" an adopting unit explain its adoption behavior; opportunity for and underlying propensity are often not differentiated. However, adopt need be uniform among units. From perspective organizational learning, we argue that differential originates from knowledge barriers (KB) varied degrees involvement supply-side institutions (SSI) can lower these barriers. In this article, investigate effect such KBs SSIs...
Broadcasting of emergency message (EM) in the vehicular Ad hoc networks (VANETs) plays a significant role safety applications, which require immediate broadcasting EM to relevant vehicles located risk zone (RZ). This paper proposes an efficient (EEMB) scheme VANETs. aims at avoiding multiple accidents and reducing traffic jams by high speed with low overhead. When accident takes place, crashed vehicle (CV) will choose best relayer(s) broadcast EM. The relayer also next rebroadcast further....
Although unethical behaviors are prevalent in the workplace, little is known about behavior aiming at benefiting one’s family (unethical pro-family behavior, UPFB). In this paper, we leverage self-determination theory to explore association between work-to-family conflict and UPFB. Specifically, hypothesize corroborate a positive relationship UPFB, such mediated by motivation. Moreover, identify two conditional factors, guilt proneness (at first stage) ethical leadership second stage),...
Motivated by the demand for energy efficiency improvement in mobile communication industry, we explore an idea of optimizing MIMO-OFDM wireless systems while maintaining users' quality service (QoS) requirement. Based on binary power control scheme,a allocation criterion optimization is derived under total constraint. From a bit error rate (BER) point view, protection constraint configured to guarantee system QoS. With aim QoS systems, energy-efficient with BER (EBPCB) algorithm proposed...
While machine learning has been increasingly incorporated into structural damage detection, most existing methods still rely on hand-crafted features. For a given structure, the performance of detection is heavily impacted by quality features, and choosing optimal features may be difficult time-consuming. Various time series classification algorithms studied in are able to classify responses conditions without feature engineering; however, them only deal with univariate either inapplicable...
Based on analyzing three representative multicast rekeying scheme, such as LKH, OFT and OKD, in this paper, a M-dimensional sphere scheme for dynamics is put forward. In new GC (group key controller) can utilize the cooperation of sibling nodes by one common father rekeying, when member joins or old leaves, all will generate KEK (key encrypt key) their node. By way, our improve communication cost special leaving, at same time forward backward security ensured. geometry we batch simulation,...
The Internet offers new ways of bringing consumers and businesses together for commerce. These are examined in a series papers spread over two sessions this mini-track. range issues run from entirely forms commerce such as dynamic group buying discounts to reexamination market power electronic retailing.Dynamic discounting based on size current buyers is form that would be hard implement without the Internet. Vendors post declining price schedule web can see decrease more them commit...
The energy efficiency optimization of the binary power control scheme for MIMO-OFDM wireless communication systems is formulated, and then a global solution allocation derived. Furthermore, new (EEBPC) algorithm designed to improve systems. Simulation results show that EEBPC has better spectrum than average in
In the family, if only child unfortunately died, family is thus called “loss of independence families”. recent years, with increasing loss-of-single-child society has paid more and attention to pension problems. Based on a perspective public policy, combined specific practices Chinese central government some provinces cities, this paper uses policy analysis theory elite analyze status give corresponding countermeasures about problem from three aspects: economic support, life care, spiritual support.
Legal question answering is a critical task in artificial intelligence. Since most legal data are presented text, using natural language processing (NLP) to solve current research direction. Compared with traditional tasks, often contains some potential information, such as events, crime process, litigants, and victims. This information suggests the model reasoning's theme can help improve its reasoning ability. In addition, must answer based on relevant clauses, number of clauses usually...
To provide communication confidentiality in multicasting applications, traffic data secure multicast is encrypted with a session key known only by certificated group members. Whenever there change the membership, must be updated dynamically. Previous work has been focused on individual rekeying, are two problems rekeying: inefficiency and an out of sync problem between keys data. This paper devises batch rekeying scheme based iterated hash function which can improve efficiency server,and...
Examples in practice that employees engaged creative deviance after their ideas have been rejected by leaders are not rare, whereas it is naive to assume leader’s idea rejection will lead employee’s for every employee. In the current research, we invoke identity theory disentangle when and why deviance. Specifically, posit with high role experience greater threat encountering rejection, as transmits feedback inconsistent expectations. Furthermore, senses of prompt them reconfirm threatened...