- Cooperative Communication and Network Coding
- Advanced Computational Techniques and Applications
- Service-Oriented Architecture and Web Services
- Energy Efficient Wireless Sensor Networks
- Network Security and Intrusion Detection
- Higher Education and Teaching Methods
- Energy Harvesting in Wireless Networks
- Cryptography and Data Security
- Cloud Computing and Resource Management
- Distributed and Parallel Computing Systems
- Advanced Wireless Communication Technologies
- Mobile Agent-Based Network Management
- Simulation and Modeling Applications
- Advanced MIMO Systems Optimization
- Anomaly Detection Techniques and Applications
- Blockchain Technology Applications and Security
- Artificial Intelligence in Games
- Peer-to-Peer Network Technologies
- Natural Language Processing Techniques
- Power Systems and Technologies
- Wireless Communication Security Techniques
- Cloud Data Security Solutions
- Software-Defined Networks and 5G
- Power Systems and Renewable Energy
- Advanced Algorithms and Applications
East China University of Science and Technology
2006-2024
Chengdu University of Information Technology
2011-2024
Anhui Polytechnic University
2013-2023
University of Malaya
2023
Neijiang Normal University
2023
Yanshan University
2023
Shenyang Jianzhu University
2023
Jingdezhen Ceramic Institute
2020
Chongqing University of Posts and Telecommunications
2020
Siemens (Germany)
2019
In this paper, we investigate the hop distance optimization problem in ad hoc networks where cooperative multi-input-single-output (MISO) is adopted to improve energy efficiency of network. We first establish model multihop MISO transmission. Based on model, consumption per bit network with high node density minimized numerically by finding an optimal distance, and, get global minimum consumption, both and number cooperating nodes around each relay for transmission are jointly optimized....
In this paper, we study relay selection under outdated channel state information (CSI) in a decode-and-forward (DF) cooperative system. Unlike previous researches on communication CSI, consider that the varies continuously over time, i.e., not only changes between and data transmission but also during transmission. Thus level of accuracy CSI used degrades with We first evaluate packet error rate (PER) system continuous time-varying fading channel, find PER performance deteriorates more...
Quality of Service (QoS) characterizes the non-functional aspects Web service, which is key factor for satisfying service users and has to be carefully considered in oriented architecture. There been a lot works on QoS description selection by information. However, two issues have not substantially explored management-how collect information from running services, how dynamically adapt provisioning with run-time Moreover, current monitoring approaches are focused interaction single domain,...
The transformation and upgrading of the industrial manufacturing field brings important development opportunities for promotion deployment Industrial Internet Things (IIoT). How to connect huge number IIoT nodes current IP-based promoting integration industrialization informationization is a key issue towards IIoT. Targeting at insufficiency that existing algorithms only support single channel utilize limited time slots, which results in deteriorated performance solving problem resource...
Nowdays, cloud storage technology has become a hot topic, and an increasing number of users are concerned with the security their data in cloud. Many auditing schemes on proposed introduction third-party auditor to assist verifying integrity data. As centralized node, communicate all service providers, which becomes bottleneck whole scheme. To solve this problem, we design blockchain-based flexible In our scheme, decentralized framework is eliminate dependency auditor, increases stability,...
Abstract The burgeoning interest in decentralized applications (Dapps), spurred by advancements blockchain technology, underscores the critical role of smart contracts. However, many Dapp users, often without deep knowledge contracts, face financial risks due to hidden vulnerabilities. Traditional methods for detecting these vulnerabilities, including manual inspections and automated static analysis, are plagued issues such as high rates false positives overlooked security flaws. To combat...
Abstract Addressing the scalability issues, excessive communication overhead, and challenges in adapting to large‐scale network node environments faced by Practical Byzantine Fault Tolerance (PBFT) consensus algorithm currently employed consortium blockchains, this paper proposes a Double Layer Consensus Algorithm Based on RAFT PBFT Algorithms (DLCA_R_P). The nodes blockchain are initially divided into several groups form lower‐layer network. Subsequently, leaders of these constitute...
Relay selection has been considered as an effective method to improve the performance of cooperative communication. However, channel state information (CSI) used in relay can be outdated, yielding severe degradation communication systems. In this study, authors investigate how select relays under outdated CSI amplify-and-forward system its outage performance. The adopt maximum a posteriori (MAP) estimation predict actual signal-to-noise ratio (SNR) each during data transmission and propose...
The increasing use of the Internet with vehicles has made travel more convenient. However, hackers can attack intelligent through various technical loopholes, resulting in a range security issues. Due to these issues, safety protection technology in-vehicle system become focus research. Using advanced autoencoder network and recurrent neural deep learning, we investigated intrusion detection based on system. We combined two algorithms realize efficient learning vehicle's boundary behavior...
Energy hole is an inherent problem in wireless sensor networks, which results from heavier traffic loads of nodes nearer to the sink, and leads significant network lifetime reduction. Cooperative communication can improve energy efficiency as well balance consumption. In this paper, we use cooperative mitigate extend lifetime. First, a transmission strategy proposed, each node helps its relay at next hop forward data through multi-input single-output (MISO) method. Second, obtain optimal...
In this paper, an improved Internet of Things (IoT) network security situation assessment model is designed to solve the problems arising from existing IoT approach regarding feature extraction, validity, and accuracy. Firstly, raw data are dimensionally reduced using independent component analysis (ICA), weights all features calculated fused maximum relevance minimum redundancy (mRMR) algorithm, Spearman’s rank correlation coefficient, extreme gradient boosting (XGBoost) importance method...
This demo presents an in-operation network slice resource allocator, which is able to consider networking and cloud infrastructure.Monitoring resources allows enhancing the (re-)allocation of slices, while accommodating novel requests.
In this study, the authors investigate outage‐optimal relay strategy under outdated channel state information (CSI) in a decode‐and‐forward cooperative communication system. They first confirm mathematically that minimising outage probability CSI is equivalent to conditional on of all decodable relays’ links. then propose multiple‐relay with optimised transmitting power allocation (MRS‐OTPA) minimises probability. It shown MRS generalised approach achieve optimality CSI. To reduce...
Anaphora resolution plays an important role in nature language processing. According to features of Chinese personal pronoun, we present approach which adopts Conditional Random Fields do anaphora pronoun texts. The method takes into account all kinds anaphoric and those effects among each other. experimental results on the ACE training corpus demonstrate that proposed is feasible for pronoun.
In wireless sensor networks where nodes are powered by batteries, it is critical to prolong the network lifetime minimizing energy consumption of each node. this paper, cooperative multi-input-multi-output (MIMO) and data aggregation techniques jointly adopted improve efficiency in a cluster based network. Using model derived, average per node required send given number bits minimized through optimization size. As result, can be enhanced significantly MIMO systems with aggregation, compared...
In cluster-based wireless sensor networks, the energy could be saved when nodes that have data to transmit participate in cooperative multiple-input multiple-output (MIMO). this paper, by making idle no MIMO, it is found much more saved. The number of MIMO optimized minimize total consumption. It also optimal all participating communication does not vary with transmit. proposition proved mathematically. influence long-haul distance and modulation constellation size on consumption...
For the comprehensive evaluation index system of sports teaching quality, this paper first obtains five indicators, including average score representing overall level class, separation degree applying variance, students pass rate final exam, excellence and progress teachers. Objective value indicators quality are obtained through principal component analysis. Then test is conducted on model, finally obtained.
We study the chaotic dynamics of a periodically modulated Josephson junction with damping. The general solution first-order perturbed equation is constructed by using direct perturbation technique. It theoretically found that boundedness conditions contain Melnikov criterion. When cannot be satisfied, numerical simulations demonstrate system can step into chaos through period doubling route increase amplitude modulating term. Regulating specific parameters effectively suppress chaos.