Ping Xie

ORCID: 0000-0003-3460-5756
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Geophysics and Gravity Measurements
  • Caching and Content Delivery
  • Opportunistic and Delay-Tolerant Networks
  • Precipitation Measurement and Analysis
  • Meteorological Phenomena and Simulations
  • Network Security and Intrusion Detection
  • Cooperative Communication and Network Coding
  • Spam and Phishing Detection
  • Mobile Ad Hoc Networks
  • Internet Traffic Analysis and Secure E-voting
  • Mobile Agent-Based Network Management
  • Advanced Data Storage Technologies
  • Advanced MIMO Systems Optimization
  • Error Correcting Code Techniques
  • Cognitive Radio Networks and Spectrum Sensing
  • Wireless Communication Networks Research
  • Distributed Control Multi-Agent Systems
  • Satellite Communication Systems
  • Complex Network Analysis Techniques
  • UAV Applications and Optimization
  • Advanced Computational Techniques and Applications
  • Advanced Optical Network Technologies
  • Atmospheric Ozone and Climate
  • Distributed and Parallel Computing Systems
  • Stroke Rehabilitation and Recovery

Henan Agricultural University
2025

Henan University of Science and Technology
2014-2024

China People's Public Security University
2024

La Consolacion University Philippines
2024

Qinghai Normal University
2017-2023

Qinghai University
2023

Yanshan University
2022

Shanghai Dianji University
2018

China Aerospace Science and Technology Corporation
2018

Bentham Science Publishers (China)
2014

With the development of Unmanned Air Vehicle (UAV) communication, Flying Ad Hoc Network (FANET) has become a hot research area in recent years, which is widely used civil and military fields due to its unique advantages. FANET special kind networks are composed UAV nodes, can be implement data transfer certain scenarios. To achieve reliable robust communication among UAVs, routing algorithm key factor should designed elaborately. Because importance usefulness, this topic attracted many...

10.3390/sym12060971 article EN Symmetry 2020-06-08

In recent years, with the emergence of UAVs(Unmanned Aerial Vehicles) in military and civil applications, FANETs(Flying Ad-Hoc Networks) composed multiple UAVs has attracted extensive attention from researchers. As a new type airborne self-organizing network, particularity FANETs such as time-varying network topology dynamic link makes it difficult to maintain continuous communication when performing tasks. Therefore, is challenging design routing protocol for guarantee quality data...

10.1109/access.2020.3032956 article EN cc-by IEEE Access 2020-01-01

10.1016/j.jweia.2025.106047 article EN Journal of Wind Engineering and Industrial Aerodynamics 2025-02-17

Forest tourism is a vital avenue for promoting green consumption and constitutes significant part of ecotourism in China. Its development offers substantial economic, social, ecological benefits. Balancing regional economic growth conservation requires analyzing its spatiotemporal evolutionary patterns driving factors. This study established comprehensive dynamic index system to evaluate the forest level (FTDL) 18 prefecture-level cities Henan Province from 2018 2021. Exploratory spatial...

10.3390/f16030483 article EN Forests 2025-03-10

The precision of the conventional user identification algorithm is not satisfactory because it ignores role user-generated data in identity matching. In this paper, we propose a frequent pattern mining-based cross-social network that analyzes personalized manner. We adopt posterior probability-based information entropy weight allocation method improves rate and recall compared to empirical method. extensive simulations are provided demonstrate proposed can enhance rate, as well F-Measure (F1).

10.1109/access.2019.2909089 article EN cc-by-nc-nd IEEE Access 2019-01-01

Agile Earth Observing Satellite (AEOS) scheduling problem consists of selecting a subset tasks and developing observation plans for set agile satellite resources with the purpose maximizing total reward arranged mission observations. This has attracted much attention in recent years since AEOS is new generation being developed all over world. Due to its NP-hardness, heuristic methods are widely adopted when solving (AEOSSP). In this paper, we propose temporal conflict network-based algorithm...

10.1109/access.2019.2902669 article EN cc-by-nc-nd IEEE Access 2019-01-01

Social networking is an interactive Internet of Things. The symmetry the network can reflect similar friendships users on different social networks. A user’s behavior habits are not easy to change, and usually have same or display names published contents among multiple Therefore, concept be used analyze information generated by user for identification. User identification plays a key role in building better about profiles. As consequence, it has very important practical significance many...

10.3390/sym11091134 article EN Symmetry 2019-09-05

With the popularization of Internet and arrival big data era, numerous different social networks (SNs) have emerged to satisfy users' needs offer them rich content convenient services. Under these circumstances, identifying multiple accounts belonging same user across SNs is great importance for many applications. Across identification (ASNUI) can help perfect information, personalized service recommendation, mining, as well provide support scientific research. This paper first...

10.1109/access.2019.2942840 article EN cc-by IEEE Access 2019-01-01

This paper considers a multi-depot heterogeneous vehicle routing problem (MDHVRP) with time windows, which is very crucial for hazardous materials transportation. For this reason, we formalize as multi-objective MDHVRP optimization model, where the actual load dependent risk of transportation considered. To solve problem, propose hybrid evolutionary algorithm (HMOEA) and two-stage (TSA). In addition, verify performance proposed algorithms by experiments on modified Solomon's VRPTW examples....

10.1109/access.2023.3300041 article EN cc-by-nc-nd IEEE Access 2023-01-01

In this paper, we pay our attention towards the noncoherent demodulation aspect of binary phase shift keying (BPSK) receivers for IEEE 802.15.4 wireless sensor networks (WSNs), and a carrier frequency offset invariant as well error-floor free multiple-symbol differential detection (MSDD) strategy is proposed over flat fading channel. This detector an alternative to that has been considered almost exclusively in past. new configuration, do not perform chip-level precompensation conventional...

10.1155/2019/5409612 article EN Wireless Communications and Mobile Computing 2019-11-26

Distant supervision relation extraction is an effective method to extract the real between entities from unstructured corpus. However, affected by hypothesis of distant mechanism, model often faces disturbance mislabeled data and noise samples. In order alleviate above problems improve performance, we propose a framework based on Bert-based pre-trained models, Bert for Relation Extraction (BRE). BRE uses BERT as feature extractor loads parameters fine-tuning. It integrates external semantic...

10.1109/iwcmc48107.2020.9148384 article EN 2022 International Wireless Communications and Mobile Computing (IWCMC) 2020-06-01

This study was carried out with the intention of developing a complete management intervention program for purpose managing issues that arise in schools. For this study, descriptive documentary-developmental research approach executed. The investigated behavioral and academic students attending public high schools relation to their performance English Mathematics. As result, chosen conduct evaluation. stated by Travers (1978), primary objectives conducting are offer description nature...

10.32996/jweep.2024.6.1.3 article EN Journal of World Englishes and Educational Practices 2024-01-11

With the rapid development of Internet Things (IoT) in 4G/5G deployments, massive amount network data generated by users has exploded, which not only brought a revolution to human’s living, but also caused some malicious actors utilize these attack privacy ordinary users. Therefore, it is crucial identify entity behind multiple virtual accounts. Due low precision user identification many-to-many mechanism identification, random forest confirmation algorithm based on stable marriage matching...

10.1155/2019/6974809 article EN Wireless Communications and Mobile Computing 2019-05-02

In this paper, we propose an adaptive single differential coherent detection (SDCD) scheme for the binary phase shift keying (BPSK) signals in IEEE 802.15.4 Wireless Sensor Networks (WSNs). particular, residual carrier frequency offset effect (CFOE) is adaptively estimated, with only linear operation, according to changing channel conditions. It was found that (CFO) and chip signal-to-noise ratio (SNR) conditions do not need a priori knowledge. This partly benefits from combination of...

10.3390/s18010052 article EN cc-by Sensors 2017-12-26

The space segment of the navigation satellite constellation is a time-varying dynamic inter-satellite information network. This paper intends to address routing design issues networks. Firstly, we introduce two combinatorial strategies hop-count and time factors by analyzing characteristics transformation. Then considering complexity algorithm under strategies, propose Inter-Satellite Routing Algorithm Searching Global Neighborhood (ISRA-SGN), which embedded into different leading their...

10.1109/icaci.2018.8377540 article EN 2018-03-01

We consider a distributed constrained optimization problem over graphs, where cost function of each agent is private. Moreover, we assume that the graphs are time‐varying and directed. In order to address such problem, fully decentralized stochastic subgradient projection algorithm proposed directed graphs. However, since directed, weight matrix may not be doubly matrix. Therefore, overcome this difficulty by using weight‐balancing technique. By choosing appropriate step‐sizes, show...

10.1155/2019/8030792 article EN cc-by Complexity 2019-01-01

As the popularity of online social networks has grown, more and users now hold multiple virtual accounts at same time. Under these circumstances, identifying belonging to user across different is great importance for many applications, such as recommendation, personalized services, information fusion. In this paper, we mainly aggregate profile behavior information, then measures analyzes attributes contained in two types implement identification. Moreover, have effects on identification,...

10.1155/2021/1082391 article EN cc-by Wireless Communications and Mobile Computing 2021-01-01

This paper proposes a new algorithm to extract the rectangle in images. It’s goal is meet requirement of truck’s compartment positioning and assure that some works are done inside compartment. Firstly, Canny operator used calculate edge image, because it sensitive image texture features. Secondly, transformed with Hough transform algorithm. The peak points parameter space indicate straight lines which may be elements sides conditions actual size Finally, four vertices solved accordance...

10.2174/1874155x01408010058 article EN cc-by The Open Mechanical Engineering Journal 2014-03-21
Coming Soon ...