- Science Education and Pedagogy
- Cryptographic Implementations and Security
- Education, Safety, and Science Studies
- Physical Unclonable Functions (PUFs) and Hardware Security
- Innovative Teaching and Learning Methods
- Educational Systems and Policies
- Security and Verification in Computing
- Computational Geometry and Mesh Generation
- Educational Assessment and Pedagogy
- Energy Efficient Wireless Sensor Networks
- Education and Learning Interventions
- Plant Water Relations and Carbon Dynamics
- Atmospheric aerosols and clouds
- Mobile Ad Hoc Networks
- Education and Critical Thinking Development
- Advanced Numerical Analysis Techniques
- Indoor and Outdoor Localization Technologies
- Computer Graphics and Visualization Techniques
- Educational Strategies and Epistemologies
- Solar Radiation and Photovoltaics
- Coding theory and cryptography
- Network Packet Processing and Optimization
Chinese Academy of Sciences
2021
Northwest Institute of Eco-Environment and Resources
2021
Fudan University
2017-2020
Zhengzhou University of Light Industry
2019
Beijing Normal University
2014
Shandong University
2013
Aimed at improving the resistance against power analysis attacks, a systematic and architectural design approach for multicore processors is proposed in this article demonstrated an eight-core prototype platform with low performance overhead hardware cost. In order to introduce randomness both time dimension amplitude make realignment extremely difficult, leverages several methods together, such as random task scheduling (RTS), insertion of operations (RIO), frequency phase randomization...
Downward surface shortwave radiation (DSSR) plays an important role in the energy balance of earth’s surface. Accurate estimate DSSR is great significance for rational and effective use solar energy. Some parameterization schemes were proposed to using meteorological measurements given ground-based observation sites are scare uneven. With development remote sensing technique, remotely sensed data can be applied obtain continuous space. Commonly, spatial resolution most products relatively...
In August 2015, SHA-3 Standard was published as the next generation of Secure Hashing Algorithm. Several optimized implementations on a 24-core processor with software and hardware co-design are proposed in this paper. For designs, 4-core mapping scheme shared-memory reduces delay time by exploring internal parallelism algorithm; 5 cores packet router improves flexibility; circuit fully explores higher energy efficiency. Hardware approaches: specific instructions novel latch-based...
At the stage of data transmission in wireless sensor network, when node's transmitting give a change, it would make network topology unstable. Focusing on resolved this problem, An energy balanced routing mechanism EBRP-SPSO(Energy-balanced protocol based self-adaption particle swarm optimization) was proposed, first all, improved traditional clustering algorithm, by introduced two influence factors optimal number cluster heads and node election radius, head selection threshold to bunch...