- Caching and Content Delivery
- Blockchain Technology Applications and Security
- Distributed systems and fault tolerance
- Peer-to-Peer Network Technologies
- E-commerce and Technology Innovations
- Cloud Data Security Solutions
- Energy Harvesting in Wireless Networks
- Wireless Networks and Protocols
- Energy Efficient Wireless Sensor Networks
- Biomedical Text Mining and Ontologies
- Privacy-Preserving Technologies in Data
- Advanced Wireless Network Optimization
- Service-Oriented Architecture and Web Services
- IoT and Edge/Fog Computing
- Robotic Path Planning Algorithms
- Wireless Power Transfer Systems
- Full-Duplex Wireless Communications
- Mobile Health and mHealth Applications
- Network Security and Intrusion Detection
- Advanced MIMO Systems Optimization
- Access Control and Trust
- Cloud Computing and Resource Management
- Opportunistic and Delay-Tolerant Networks
- DNA and Biological Computing
- Machine Learning in Materials Science
Southwest Minzu University
2024
Yunnan Forestry Vocational and Technical College
2024
Massachusetts Institute of Technology
2018-2024
Hebrew University of Jerusalem
2024
IIT@MIT
2022
Tianjin University of Technology
2020
Xingtai University
2020
Moscow Institute of Thermal Technology
2019
Peking University
2017-2018
State Street (United States)
2017
Backscatter presents an emerging ultralow-power wireless communication paradigm. The ability to offer submilliwatt power consumption makes it a competitive core technology for Internet of Things (IoT) applications. In this article, we provide tutorial backscatter from the signal processing perspective as well survey recent research activities in domain, primarily focusing on bistatic systems. We also discuss unique real-world applications empowered by and identify open questions domain....
We introduce the design and implementation of BackCam, a low-power wireless camera sensor platform that supports continuous realtime vision applications, all using commodity radios. In lowest power mode, our board consumes only 9.7mW continuously transmits images for over one month on two AA batteries. novel management system incorporates input from itself to increase battery life up 62%. Using metadata as input, we designed feedback between gateway. This allows dynamic application...
Spamming attacks are a serious concern for consensus protocols, as witnessed by recent outages of major blockchain, Solana. They cause congestion and excessive message delays in real network due to its bandwidth constraints. In contrast, longest chain (LC), an important family has previously only been proven secure assuming idealized model which all messages delivered within bounded delay. This model-reality mismatch is further aggravated Proof-of-Stake (PoS) LC where the adversary can spam...
The drawbacks of the traditional multi-hop structure wireless sensor networks (WSNS) are susceptible to reflection, scattering and diffraction, serious attenuation signal intensity phase deviation due various obstacles in cultivated land environment mountains. In this paper, is measured curve fitting done respectively both open obstacle-environment with sending receiving height 0 m, 1 2 m. It found out that packet loss probability too high when an obstacle exists. such a case, unmanned...
The success of blockchains has sparked interest in large-scale deployments Byzantine fault tolerant (BFT) consensus protocols over wide area networks. A central feature such networks is variable communication bandwidth across nodes and time. We present DispersedLedger, an asynchronous BFT protocol that provides near-optimal throughput the presence network bandwidth. core idea DispersedLedger to enable propose, order, agree on blocks transactions without having download their full content. By...
Set reconciliation, where two parties hold fixed-length bit strings and run a protocol to learn the they are missing from each other, is fundamental task in many distributed systems.We present Rateless Invertible Bloom Lookup Tables (Rateless IBLTs), first set reconciliation protocol, best of our knowledge, that achieves low computation cost near-optimal communication across wide range scenarios: differences one millions, few bytes megabytes, workloads injected by potential...
The integration of intelligent decision-making algorithms with urban cultural expression is becoming a hot topic in both academic and practical fields for exploring street landscapes. Exploring the application strategies regional landscape pattern recognition innovative design key step. single layout construction, deficiency, ecological imbalance, low resident participation seriously constrain overall quality improvement city. To address this dilemma, study delved into Kunming City selected...
Recent advances in intelligent mobile terminal result the rapid development of wireless networks, which has inherently properties high access time, low bandwidth and other shortcoming that pull down Quality Service (QoS). Cache technologies are considered as most favorable tools for dealing with problems traffic flow, having attracted tremendous interest from both engineering academic fields. However, algorithms developed essentially based on descriptive models instead predictive models, not...
Based on the Bayesian network trust model, an improved model is proposed in this paper. It includes two parts: one searching resource peers algorithm, which can reduce redundancy packages received by and enhance reliability of system; other computing updating method, applies logarithm for evaluation number services to compute update trust, so that it prevent malicious from attacking normal efficiently, meanwhile restrain increasing their respectively collusion its clique. The sketch maps...
With the development of science and technology, application information technology in logistics industry is becoming more mature. At present, order to improve safety, punctuality speediness cargo transportation, people have higher requirements on transportation. Therefore, wireless sensor network tracking management system promotes freight strengthens smooth progress reduces cost In this paper, author analyzes hardware software design based networks explore goods networks.
In order to solve the problems of lines and equipment inspection for distribution network traditional way at present, such as low level information technology, insufficient state acquisition, high management cost efficiency, This paper proposes an intelligent diagnosis system based on technology internet things. According layers things, is divided into three , namely, perception layer, application which has developed a kind terminal layer. Intelligent can be real-time position personnel,...
Internet of things are increasingly being deployed over the cloud (also referred to as things) provide a broader range services. However, there serious challenges CoT in data protection and security provenance. This paper proposes privacy provenance model (DPSPM) based on CoT. It can protect users trace source leaked data. In detail, encryption watermarking algorithms proposed. Meanwhile, we use improved k-anonymity masking algorithm pseudo-row this scheme. Those carry out control whole...
Performance of WLANs (Wireless Local Area Network) has been investigated for many years. However, most the investigations have performed on a single cell scenario. Realistic WLANs' deployment scenario are based multi-cell configuration, throughput per is considerably reduced compared to case. This paper proposes new WLAN model consisting four non overlapping channels instead well known three channels, which increases cell. The impact ACI (Adjacent Channel Interference) downlink assessed....
Streaming media over Internet is becoming one of the main services, but limitation network and server resource makes existing systems bottleneck servicing. In this paper, we propose scalable servicing system based on P2P networks. Through constructing model PeerMsm FSM public host, meanwhile, utilizing a new caching cluster scheduling algorithm, our high QoS low cost so as to satisfy demands more users.