Li Fei

ORCID: 0000-0003-1981-5181
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cooperative Communication and Network Coding
  • Advanced Computational Techniques and Applications
  • Service-Oriented Architecture and Web Services
  • Energy Efficient Wireless Sensor Networks
  • Network Security and Intrusion Detection
  • Higher Education and Teaching Methods
  • Energy Harvesting in Wireless Networks
  • Cryptography and Data Security
  • Cloud Computing and Resource Management
  • Distributed and Parallel Computing Systems
  • Advanced Wireless Communication Technologies
  • Mobile Agent-Based Network Management
  • Simulation and Modeling Applications
  • Advanced MIMO Systems Optimization
  • Anomaly Detection Techniques and Applications
  • Blockchain Technology Applications and Security
  • Artificial Intelligence in Games
  • Peer-to-Peer Network Technologies
  • Natural Language Processing Techniques
  • Power Systems and Technologies
  • Wireless Communication Security Techniques
  • Cloud Data Security Solutions
  • Software-Defined Networks and 5G
  • Power Systems and Renewable Energy
  • Advanced Algorithms and Applications

East China University of Science and Technology
2006-2024

Chengdu University of Information Technology
2011-2024

Anhui Polytechnic University
2013-2023

University of Malaya
2023

Neijiang Normal University
2023

Yanshan University
2023

Shenyang Jianzhu University
2023

Jingdezhen Ceramic Institute
2020

Chongqing University of Posts and Telecommunications
2020

Siemens (Germany)
2019

In this paper, we investigate the hop distance optimization problem in ad hoc networks where cooperative multi-input-single-output (MISO) is adopted to improve energy efficiency of network. We first establish model multihop MISO transmission. Based on model, consumption per bit network with high node density minimized numerically by finding an optimal distance, and, get global minimum consumption, both and number cooperating nodes around each relay for transmission are jointly optimized....

10.1109/twc.2011.081011.102210 article EN IEEE Transactions on Wireless Communications 2011-08-25

In this paper, we study relay selection under outdated channel state information (CSI) in a decode-and-forward (DF) cooperative system. Unlike previous researches on communication CSI, consider that the varies continuously over time, i.e., not only changes between and data transmission but also during transmission. Thus level of accuracy CSI used degrades with We first evaluate packet error rate (PER) system continuous time-varying fading channel, find PER performance deteriorates more...

10.1016/j.cja.2016.12.021 article EN cc-by-nc-nd Chinese Journal of Aeronautics 2016-12-22

Quality of Service (QoS) characterizes the non-functional aspects Web service, which is key factor for satisfying service users and has to be carefully considered in oriented architecture. There been a lot works on QoS description selection by information. However, two issues have not substantially explored management-how collect information from running services, how dynamically adapt provisioning with run-time Moreover, current monitoring approaches are focused interaction single domain,...

10.1109/icws.2008.123 article EN 2008-09-01

The transformation and upgrading of the industrial manufacturing field brings important development opportunities for promotion deployment Industrial Internet Things (IIoT). How to connect huge number IIoT nodes current IP-based promoting integration industrialization informationization is a key issue towards IIoT. Targeting at insufficiency that existing algorithms only support single channel utilize limited time slots, which results in deteriorated performance solving problem resource...

10.1109/access.2020.2971228 article EN cc-by IEEE Access 2020-01-01

Nowdays, cloud storage technology has become a hot topic, and an increasing number of users are concerned with the security their data in cloud. Many auditing schemes on proposed introduction third-party auditor to assist verifying integrity data. As centralized node, communicate all service providers, which becomes bottleneck whole scheme. To solve this problem, we design blockchain-based flexible In our scheme, decentralized framework is eliminate dependency auditor, increases stability,...

10.1049/cje.2021.08.011 article EN Chinese Journal of Electronics 2021-11-01

Abstract The burgeoning interest in decentralized applications (Dapps), spurred by advancements blockchain technology, underscores the critical role of smart contracts. However, many Dapp users, often without deep knowledge contracts, face financial risks due to hidden vulnerabilities. Traditional methods for detecting these vulnerabilities, including manual inspections and automated static analysis, are plagued issues such as high rates false positives overlooked security flaws. To combat...

10.1049/blc2.12072 article EN cc-by-nc-nd IET Blockchain 2024-03-29

Abstract Addressing the scalability issues, excessive communication overhead, and challenges in adapting to large‐scale network node environments faced by Practical Byzantine Fault Tolerance (PBFT) consensus algorithm currently employed consortium blockchains, this paper proposes a Double Layer Consensus Algorithm Based on RAFT PBFT Algorithms (DLCA_R_P). The nodes blockchain are initially divided into several groups form lower‐layer network. Subsequently, leaders of these constitute...

10.1049/blc2.12073 article EN cc-by-nc IET Blockchain 2024-04-23

Relay selection has been considered as an effective method to improve the performance of cooperative communication. However, channel state information (CSI) used in relay can be outdated, yielding severe degradation communication systems. In this study, authors investigate how select relays under outdated CSI amplify-and-forward system its outage performance. The adopt maximum a posteriori (MAP) estimation predict actual signal-to-noise ratio (SNR) each during data transmission and propose...

10.1049/iet-com.2013.0055 article EN IET Communications 2013-09-01

The increasing use of the Internet with vehicles has made travel more convenient. However, hackers can attack intelligent through various technical loopholes, resulting in a range security issues. Due to these issues, safety protection technology in-vehicle system become focus research. Using advanced autoencoder network and recurrent neural deep learning, we investigated intrusion detection based on system. We combined two algorithms realize efficient learning vehicle's boundary behavior...

10.32604/cmc.2020.011264 article EN Computers, materials & continua/Computers, materials & continua (Print) 2020-01-01

Energy hole is an inherent problem in wireless sensor networks, which results from heavier traffic loads of nodes nearer to the sink, and leads significant network lifetime reduction. Cooperative communication can improve energy efficiency as well balance consumption. In this paper, we use cooperative mitigate extend lifetime. First, a transmission strategy proposed, each node helps its relay at next hop forward data through multi-input single-output (MISO) method. Second, obtain optimal...

10.1109/pimrc.2012.6362904 article EN 2012-09-01

In this paper, an improved Internet of Things (IoT) network security situation assessment model is designed to solve the problems arising from existing IoT approach regarding feature extraction, validity, and accuracy. Firstly, raw data are dimensionally reduced using independent component analysis (ICA), weights all features calculated fused maximum relevance minimum redundancy (mRMR) algorithm, Spearman’s rank correlation coefficient, extreme gradient boosting (XGBoost) importance method...

10.3390/math11163617 article EN cc-by Mathematics 2023-08-21

This demo presents an in-operation network slice resource allocator, which is able to consider networking and cloud infrastructure.Monitoring resources allows enhancing the (re-)allocation of slices, while accommodating novel requests.

10.1364/ofc.2018.tu3d.11 article EN Optical Fiber Communication Conference 2018-01-01

In this study, the authors investigate outage‐optimal relay strategy under outdated channel state information (CSI) in a decode‐and‐forward cooperative communication system. They first confirm mathematically that minimising outage probability CSI is equivalent to conditional on of all decodable relays’ links. then propose multiple‐relay with optimised transmitting power allocation (MRS‐OTPA) minimises probability. It shown MRS generalised approach achieve optimality CSI. To reduce...

10.1049/iet-com.2014.0579 article EN IET Communications 2014-12-12

Anaphora resolution plays an important role in nature language processing. According to features of Chinese personal pronoun, we present approach which adopts Conditional Random Fields do anaphora pronoun texts. The method takes into account all kinds anaphoric and those effects among each other. experimental results on the ACE training corpus demonstrate that proposed is feasible for pronoun.

10.1109/csse.2008.432 article EN 2008-01-01

In wireless sensor networks where nodes are powered by batteries, it is critical to prolong the network lifetime minimizing energy consumption of each node. this paper, cooperative multi-input-multi-output (MIMO) and data aggregation techniques jointly adopted improve efficiency in a cluster based network. Using model derived, average per node required send given number bits minimized through optimization size. As result, can be enhanced significantly MIMO systems with aggregation, compared...

10.1109/pimrc.2010.5671946 article EN 2010-09-01

In cluster-based wireless sensor networks, the energy could be saved when nodes that have data to transmit participate in cooperative multiple-input multiple-output (MIMO). this paper, by making idle no MIMO, it is found much more saved. The number of MIMO optimized minimize total consumption. It also optimal all participating communication does not vary with transmit. proposition proved mathematically. influence long-haul distance and modulation constellation size on consumption...

10.1109/jcn.2010.6388451 article EN Journal of Communications and Networks 2010-06-01

For the comprehensive evaluation index system of sports teaching quality, this paper first obtains five indicators, including average score representing overall level class, separation degree applying variance, students pass rate final exam, excellence and progress teachers. Objective value indicators quality are obtained through principal component analysis. Then test is conducted on model, finally obtained.

10.1109/icsgea.2017.106 article EN 2018 International Conference on Smart Grid and Electrical Automation (ICSGEA) 2017-05-01

We study the chaotic dynamics of a periodically modulated Josephson junction with damping. The general solution first-order perturbed equation is constructed by using direct perturbation technique. It theoretically found that boundedness conditions contain Melnikov criterion. When cannot be satisfied, numerical simulations demonstrate system can step into chaos through period doubling route increase amplitude modulating term. Regulating specific parameters effectively suppress chaos.

10.1088/0256-307x/24/3/015 article EN Chinese Physics Letters 2007-02-19
Coming Soon ...