- Error Correcting Code Techniques
- Advanced Data Storage Technologies
- Energy Efficient Wireless Sensor Networks
- Service-Oriented Architecture and Web Services
- Advanced Steganography and Watermarking Techniques
- Chaos-based Image/Signal Encryption
- Advanced Computational Techniques and Applications
- Advanced Wireless Communication Techniques
- DNA and Biological Computing
- Cooperative Communication and Network Coding
- Higher Education and Teaching Methods
- Educational Technology and Assessment
- Security in Wireless Sensor Networks
- Cellular Automata and Applications
- Web and Library Services
- Noise Effects and Management
- Cryptography and Residue Arithmetic
- Caching and Content Delivery
- Digital Rights Management and Security
- graph theory and CDMA systems
- Educational Technology and Pedagogy
- Wireless Sensor Networks and IoT
- Vehicle Noise and Vibration Control
- Cloud Computing and Remote Desktop Technologies
- Web Applications and Data Management
Chinese PLA General Hospital
2024
Changchun Institute of Technology
2024
Nanjing University of Finance and Economics
2023
Bohai University
2022
Xi'an University of Technology
2003-2020
Pingdingshan University
2018
State Key Laboratory of Information Engineering in Surveying Mapping and Remote Sensing
2012-2017
Wuhan University
2012-2017
Rensselaer Polytechnic Institute
2005-2014
Yunnan University
2013
Federated learning and analytics are a distributed approach for collaboratively models (or statistics) from decentralized data, motivated by designed privacy protection. The process can be formulated as solving federated optimization problems, which emphasize communication efficiency, data heterogeneity, compatibility with system requirements, other constraints that not primary considerations in problem settings. This paper provides recommendations guidelines on formulating, designing,...
The direct oxidation of C-H bonds in organic materials into necessary oxygen-containing compounds under mild conditions has attracted increasing attention. A Keggin-type polyoxometalate-based metal-organic complex (MOC), [CuII4CuI(H2trz)4(C2O4)(H2O)4(H3PW11.18CuII0.82O40)]·8H2O (1) (H3trz = 1,2,4-triazole), was designed and synthesized hydrothermal conditions, structurally characterized by single crystal X-ray diffraction, PXRD, IR spectroscopy, TGA, XPS. Complex 1 is a 3D 4,6,8-connected...
Using commercial software for radio map generation and wireless network planning often require complex manual operations, posing significant challenges in terms of scalability, adaptability, user-friendliness, due to heavy operations. To address these issues, we propose an automated solution that employs large language model (LLM) agents. These agents are designed autonomously generate maps facilitate specified areas, thereby minimizing the necessity extensive intervention. validate...
The active involvement of a massive number tourists on social media such as TikTok may facilitate the popularity destination. However, there is an insufficient theoretical discussion how interact with TikTok, and further affects destination promotion. Based perspective value co-creation theory, this study took Chongqing, China, case location, exploring phenomenon between TikTok. findings reveal that interaction process ritualized experience in three stages where wander real imaginary, online...
Multi-secret sharing scheme has been well studied in recent years. In most multi-secret schemes, all secrets must be recovered synchronously; the shares cannot reused any more. 2017, Harn and Hsu proposed a novel reasonable feature multiple secret sharing, such that should reconstructed asynchronously recovering of previous do not leak information on unrecovered secrets. also (t,n) satisfies this feature. However, analysis Harn-Hsu's is wrong, their fails to satisfy If one reconstructed,...
A novel hard-decision decoding algorithm for low-density parity-check (LDPC) codes is proposed in this paper. This employs the correlation information among column vectors of matrix and syndrome vector decoding. It does not require soft information, has low complexity. Simulation results show that could provide an effective tradeoff between error performance
Data centers traffic is composed by numerous latency-sensitive "mice" flows, which consisted of only several packets, and a few throughput-sensitive "elephant" occupy more than 80% overall load. Generally, the short-lived flows induce transient congestion long-lived cause persistent congestion. The network major performance inhibitor. Conventionally, hop-by-hop end-to-end flow control mechanisms are employed to relief congestion, respectively. However, in face mixture elephants mice, we find...
Abstract Internet‐based G eographical I nformation S ervices ( GIS ervices) have exploded in depth and variety over the past few years. More more academic institutions, private companies, even individuals publish their own geographical information resources form of on Internet. In today's resource‐rich environment, fast accurate service discovery is a significant problem for industry academia, as well regular users. To solve this problem, researchers introduced ervice‐ O riented A...
This paper researches and designs a digital controlled boost power factor correction (PFC) of 2kW on-board charger with the method continuous conduction mode (CCM), which is based on DSP TMS320F280. Multiple-loop control strategy instantaneous outer voltage loop inner current used in PFC converter. The results confirm that controllers are able to be for high performance converters.
Partial discharge (PD) localization in substations based on the ultra-high frequency (UHF) method can be used to efficiently assess insulation conditions. Localization accuracy is affected by of time delay (TD) estimation, which critical for PD substations. A review existing TD estimation methods indicates that there a need develop are both accurate and computationally efficient. In this paper, novel proposed improve efficiency. The calculated using an improved cross-correlation algorithm...
Due to the increasingly significant process variation and gradual Flash memory cell wear-out, worst-case-oriented error correction code (ECC) in solid-state drives (SSDs) is mostly underutilized throughout entire lifetime. Error-prone overclocking of chip I/O links can trade such ECC underutilization for opportunistically improving SSD speed performance, its effectiveness strongly depends on how well decoding handle overclocking-induced link errors. As SSDs are quickly adopting low-density...
High-capacity NAND flash memories use multi-level cells (MLCs) to store multiple bits per cell and achieve high storage densities. Higher densities cause increased raw bit error rates (BERs), which demand powerful correcting codes. Low-density parity-check (LDPC) codes are a well-known class of capacity-approaching in AWGN channels. However, LDPC traditionally soft information while the read channel provides only hard information. Low resolution may be obtained by performing reads with...
By implementing an FPGA-based simulator, we investigate the performance of high-rate quasi-cyclic (QC) LDPC codes for magnetic recording channel at very low sector error rates. Results show that error-floor-free can be realized by randomly constructed regular QC-LDPC with column weight 4 rates as 10/sup -9/. We also conjecture several rules designing floor. present a decoder architecture is well suited to achieving high decoding throughput these
Many pipelined adaptive signal processing systems are subject to a tradeoff between throughput and performance incurred by the adaptation feedback loops. In conventional synchronous design regime, such throughput/performance is typically fixed since pipeline depth usually determined in phase remains unchanged run time. Nevertheless, many real-life scenarios, overall system can be potentially improved if we run-time dynamically configure this tradeoff. With motivation, propose apply...
In this paper, we propose a new technology that improves Diffie-Hellman's safeness and keeps its good property.The is called "Hyperbolic Curve Cryptography System" (HCCS) which designed on hyperbolic curve over finite filed.HCCS has solid Abel group structure whose order diverse field the system secure mainly based discrete logarithm problem (DLP) hardness of solving fundamental solution.Compared with Diffie-Hellman, HCCS same calculation complexity, but it excellently flexible.Therefore,...
Large Language Models (LLMs) have advanced rapidly but face significant memory demands. While quantization has shown promise for LLMs, current methods typically require lengthy training to alleviate the performance degradation from loss. However, deploying LLMs across diverse scenarios with different resource constraints, e.g., servers and personal computers, requires repeated per application, which amplifies problem. Given that, it is advantageous train a once-for-all (OFA) supernet capable...
WinCE is a small footprint versatile operating system, which consists of full stack IP protocols, Win32 APIs, and relatively complete set graphics, windowing event handling subsystems. Therefore we choose to port this OS Philips broadband enabled set-top box (STB) for media streaming applications. In paper, describe the techniques steps involved in porting process. The experimental result demonstrated better choice support Internet Web browsing, MPEG video streaming, allow user have rich...
This paper puts forward a joint control protocol based on binary tree conflict-resolving algorithm combined probability detection and 1-persistent CSMA.Under the protocol, all terminals use of p-detection to access channel before sending information packets, transmit packets immediately when is idle, but there are any collisions channel, system will isolated technology decompose impacted packets.Meanwhile, analyzes gets computational formula throughput for by building mathematical model...