Tong Zhang

ORCID: 0000-0003-2989-256X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Error Correcting Code Techniques
  • Advanced Data Storage Technologies
  • Energy Efficient Wireless Sensor Networks
  • Service-Oriented Architecture and Web Services
  • Advanced Steganography and Watermarking Techniques
  • Chaos-based Image/Signal Encryption
  • Advanced Computational Techniques and Applications
  • Advanced Wireless Communication Techniques
  • DNA and Biological Computing
  • Cooperative Communication and Network Coding
  • Higher Education and Teaching Methods
  • Educational Technology and Assessment
  • Security in Wireless Sensor Networks
  • Cellular Automata and Applications
  • Web and Library Services
  • Noise Effects and Management
  • Cryptography and Residue Arithmetic
  • Caching and Content Delivery
  • Digital Rights Management and Security
  • graph theory and CDMA systems
  • Educational Technology and Pedagogy
  • Wireless Sensor Networks and IoT
  • Vehicle Noise and Vibration Control
  • Cloud Computing and Remote Desktop Technologies
  • Web Applications and Data Management

Chinese PLA General Hospital
2024

Changchun Institute of Technology
2024

Nanjing University of Finance and Economics
2023

Bohai University
2022

Xi'an University of Technology
2003-2020

Pingdingshan University
2018

State Key Laboratory of Information Engineering in Surveying Mapping and Remote Sensing
2012-2017

Wuhan University
2012-2017

Rensselaer Polytechnic Institute
2005-2014

Yunnan University
2013

Federated learning and analytics are a distributed approach for collaboratively models (or statistics) from decentralized data, motivated by designed privacy protection. The process can be formulated as solving federated optimization problems, which emphasize communication efficiency, data heterogeneity, compatibility with system requirements, other constraints that not primary considerations in problem settings. This paper provides recommendations guidelines on formulating, designing,...

10.48550/arxiv.2107.06917 preprint EN other-oa arXiv (Cornell University) 2021-01-01

The direct oxidation of C-H bonds in organic materials into necessary oxygen-containing compounds under mild conditions has attracted increasing attention. A Keggin-type polyoxometalate-based metal-organic complex (MOC), [CuII4CuI(H2trz)4(C2O4)(H2O)4(H3PW11.18CuII0.82O40)]·8H2O (1) (H3trz = 1,2,4-triazole), was designed and synthesized hydrothermal conditions, structurally characterized by single crystal X-ray diffraction, PXRD, IR spectroscopy, TGA, XPS. Complex 1 is a 3D 4,6,8-connected...

10.1039/d1dt03823k article EN Dalton Transactions 2022-01-01

Using commercial software for radio map generation and wireless network planning often require complex manual operations, posing significant challenges in terms of scalability, adaptability, user-friendliness, due to heavy operations. To address these issues, we propose an automated solution that employs large language model (LLM) agents. These agents are designed autonomously generate maps facilitate specified areas, thereby minimizing the necessity extensive intervention. validate...

10.48550/arxiv.2501.11283 preprint EN arXiv (Cornell University) 2025-01-20

The active involvement of a massive number tourists on social media such as TikTok may facilitate the popularity destination. However, there is an insufficient theoretical discussion how interact with TikTok, and further affects destination promotion. Based perspective value co-creation theory, this study took Chongqing, China, case location, exploring phenomenon between TikTok. findings reveal that interaction process ritualized experience in three stages where wander real imaginary, online...

10.1177/13567667231210591 article EN Journal Of Vacation Marketing 2023-11-07

Multi-secret sharing scheme has been well studied in recent years. In most multi-secret schemes, all secrets must be recovered synchronously; the shares cannot reused any more. 2017, Harn and Hsu proposed a novel reasonable feature multiple secret sharing, such that should reconstructed asynchronously recovering of previous do not leak information on unrecovered secrets. also (t,n) satisfies this feature. However, analysis Harn-Hsu's is wrong, their fails to satisfy If one reconstructed,...

10.1186/s13638-018-1086-5 article EN cc-by EURASIP Journal on Wireless Communications and Networking 2018-04-02

A novel hard-decision decoding algorithm for low-density parity-check (LDPC) codes is proposed in this paper. This employs the correlation information among column vectors of matrix and syndrome vector decoding. It does not require soft information, has low complexity. Simulation results show that could provide an effective tradeoff between error performance

10.1109/isit.2009.5205798 article EN 2009-06-01

Data centers traffic is composed by numerous latency-sensitive "mice" flows, which consisted of only several packets, and a few throughput-sensitive "elephant" occupy more than 80% overall load. Generally, the short-lived flows induce transient congestion long-lived cause persistent congestion. The network major performance inhibitor. Conventionally, hop-by-hop end-to-end flow control mechanisms are employed to relief congestion, respectively. However, in face mixture elephants mice, we find...

10.48550/arxiv.1605.07732 preprint EN other-oa arXiv (Cornell University) 2016-01-01

Abstract Internet‐based G eographical I nformation S ervices ( GIS ervices) have exploded in depth and variety over the past few years. More more academic institutions, private companies, even individuals publish their own geographical information resources form of on Internet. In today's resource‐rich environment, fast accurate service discovery is a significant problem for industry academia, as well regular users. To solve this problem, researchers introduced ervice‐ O riented A...

10.1111/j.1467-9671.2012.01363.x article EN Transactions in GIS 2012-12-01

This paper researches and designs a digital controlled boost power factor correction (PFC) of 2kW on-board charger with the method continuous conduction mode (CCM), which is based on DSP TMS320F280. Multiple-loop control strategy instantaneous outer voltage loop inner current used in PFC converter. The results confirm that controllers are able to be for high performance converters.

10.3390/wevj4010202 article EN cc-by World Electric Vehicle Journal 2010-03-26

Partial discharge (PD) localization in substations based on the ultra-high frequency (UHF) method can be used to efficiently assess insulation conditions. Localization accuracy is affected by of time delay (TD) estimation, which critical for PD substations. A review existing TD estimation methods indicates that there a need develop are both accurate and computationally efficient. In this paper, novel proposed improve efficiency. The calculated using an improved cross-correlation algorithm...

10.3390/s18103439 article EN cc-by Sensors 2018-10-13

Due to the increasingly significant process variation and gradual Flash memory cell wear-out, worst-case-oriented error correction code (ECC) in solid-state drives (SSDs) is mostly underutilized throughout entire lifetime. Error-prone overclocking of chip I/O links can trade such ECC underutilization for opportunistically improving SSD speed performance, its effectiveness strongly depends on how well decoding handle overclocking-induced link errors. As SSDs are quickly adopting low-density...

10.1109/tcsii.2014.2350377 article EN IEEE Transactions on Circuits & Systems II Express Briefs 2014-08-22

High-capacity NAND flash memories use multi-level cells (MLCs) to store multiple bits per cell and achieve high storage densities. Higher densities cause increased raw bit error rates (BERs), which demand powerful correcting codes. Low-density parity-check (LDPC) codes are a well-known class of capacity-approaching in AWGN channels. However, LDPC traditionally soft information while the read channel provides only hard information. Low resolution may be obtained by performing reads with...

10.48550/arxiv.1202.1325 preprint EN other-oa arXiv (Cornell University) 2012-01-01

By implementing an FPGA-based simulator, we investigate the performance of high-rate quasi-cyclic (QC) LDPC codes for magnetic recording channel at very low sector error rates. Results show that error-floor-free can be realized by randomly constructed regular QC-LDPC with column weight 4 rates as 10/sup -9/. We also conjecture several rules designing floor. present a decoder architecture is well suited to achieving high decoding throughput these

10.1109/iscas.2006.1693392 article EN 1993 IEEE International Symposium on Circuits and Systems 2006-09-22

Many pipelined adaptive signal processing systems are subject to a tradeoff between throughput and performance incurred by the adaptation feedback loops. In conventional synchronous design regime, such throughput/performance is typically fixed since pipeline depth usually determined in phase remains unchanged run time. Nevertheless, many real-life scenarios, overall system can be potentially improved if we run-time dynamically configure this tradeoff. With motivation, propose apply...

10.1109/tcsi.2005.851694 article EN IEEE Transactions on Circuits and Systems I Fundamental Theory and Applications 2005-07-01

In this paper, we propose a new technology that improves Diffie-Hellman's safeness and keeps its good property.The is called "Hyperbolic Curve Cryptography System" (HCCS) which designed on hyperbolic curve over finite filed.HCCS has solid Abel group structure whose order diverse field the system secure mainly based discrete logarithm problem (DLP) hardness of solving fundamental solution.Compared with Diffie-Hellman, HCCS same calculation complexity, but it excellently flexible.Therefore,...

10.2991/icmt-13.2013.26 article EN cc-by-nc Advances in intelligent systems research/Advances in Intelligent Systems Research 2013-01-01

Large Language Models (LLMs) have advanced rapidly but face significant memory demands. While quantization has shown promise for LLMs, current methods typically require lengthy training to alleviate the performance degradation from loss. However, deploying LLMs across diverse scenarios with different resource constraints, e.g., servers and personal computers, requires repeated per application, which amplifies problem. Given that, it is advantageous train a once-for-all (OFA) supernet capable...

10.48550/arxiv.2405.20202 preprint EN arXiv (Cornell University) 2024-05-30

WinCE is a small footprint versatile operating system, which consists of full stack IP protocols, Win32 APIs, and relatively complete set graphics, windowing event handling subsystems. Therefore we choose to port this OS Philips broadband enabled set-top box (STB) for media streaming applications. In paper, describe the techniques steps involved in porting process. The experimental result demonstrated better choice support Internet Web browsing, MPEG video streaming, allow user have rich...

10.1109/iecon.2002.1185372 article EN 2003-10-31

This paper puts forward a joint control protocol based on binary tree conflict-resolving algorithm combined probability detection and 1-persistent CSMA.Under the protocol, all terminals use of p-detection to access channel before sending information packets, transmit packets immediately when is idle, but there are any collisions channel, system will isolated technology decompose impacted packets.Meanwhile, analyzes gets computational formula throughput for by building mathematical model...

10.2991/icmt-13.2013.126 article EN cc-by-nc Advances in intelligent systems research/Advances in Intelligent Systems Research 2013-01-01
Coming Soon ...