- Advanced Computational Techniques and Applications
- Advanced MIMO Systems Optimization
- Opportunistic and Delay-Tolerant Networks
- Wireless Communication Networks Research
- Advanced Sensor and Control Systems
- Caching and Content Delivery
- Chinese history and philosophy
- Advanced Data Compression Techniques
- Antenna Design and Analysis
- Cooperative Communication and Network Coding
- IoT and Edge/Fog Computing
- Video Coding and Compression Technologies
- Service-Oriented Architecture and Web Services
- Optical Network Technologies
- Image and Signal Denoising Methods
- Evaluation and Optimization Models
- Advanced Wireless Communication Techniques
- Technology and Security Systems
- Privacy-Preserving Technologies in Data
- Mobile Crowdsensing and Crowdsourcing
- Advanced Decision-Making Techniques
- graph theory and CDMA systems
- Access Control and Trust
- Advanced Photonic Communication Systems
- Ethics and Social Impacts of AI
University of Malaya
2023-2024
Chongqing University of Posts and Telecommunications
2008-2023
China Automotive Technology and Research Center
2022
Chongqing Science and Technology Commission
2021-2022
Inner Mongolia University of Science and Technology
2021
Shanghai Maritime University
2009-2013
Guangxi Agricultural Machinery Research Institute
2012
China National Institute of Standardization
2012
Tongren University
2007-2011
University of Finance and Economics
2011
Chatbots have become increasingly popular in recent years, but they also present security risks and vulnerabilities that need to be addressed. This systematic literature review examines the existing research relating information chatbots, identifying potential threats, proposed solutions, future directions for research. The finds chatbots face various including malicious input, user profiling, contextual attacks, data breaches, solutions such as blockchain technology, end-to-end encryption,...
The fifth generation (5G) mobile communication system is regard as a key enabler in promoting the deployment of Internet Things (IoT), which accompanied by increasing service demands such like high data rate, enormous connection, and low latency. To meet these demands, network slicing has been envisioned an efficient technology to customize infrastructures allocate resources for 5G IoT services. However, due various application backgrounds ubiquitous social interactions services,...
To investigate the epidemiology, risk factors, fungal spectrum and to test antifungal drug susceptibility of these isolates at a tertiary eye care referral centre in central China.The medical microbiology records 2064 culture-proven cases (2064 eyes) keratitis diagnosed Henan Eye Institute between January 2000 March 2009 was retrospectively reviewed. The were identified subgroup 103 subjected tests for amphotericin B, fluconazole ketoconazole by broth microdilution method.A total confirmed...
As technology continues to evolve, the need for robust and user-friendly authentication methods becomes increasingly vital safeguarding sensitive information. Graphical passwords, a contemporary approach authentication, utilize images, patterns, or graphical elements as means of access control. This systematic literature review delves into dynamic realm focusing on myriad security attacks they face, diverse countermeasures devised mitigate these threats. The password scheme is one most...
Abstract Optical surface measurement and characterization precision are significantly influenced by the performance of registration methods. Most existing optical methods suffer from poor efficiency or lower precision. To address these challenges, this investigation proposes a hierarchical method based on meta - heuristic algorithm, primarily targeting freeform grid surfaces(relatively simple non-rotationally symmetric surfaces) rotationally surfaces in applications. First, to enhance avoid...
SUMMARY Energy efficiency is a key requirement for the design of short‐range network. In order to alleviate energy consumption constraint, two‐layer communication architecture proposed in this paper. We designed an energy‐efficient scheme on basis joint mobile nodes (MNs) grouping and data packet fragmentation, analyzed corresponding different length group sizes, established appropriate model. Simulation results show that when MNs system are grouped by MN algorithm all each operating with...
By collecting and processing smart healthcare data in real-time, mobile edge networks can bridge the gap between doctors patients, which is a representative consumer-level interaction scenario Industry 5.0. To improve flexibility timeliness of suchlike 5.0 services, microservices are deployed extensively on servers. The major challenge facing microservice deployment how to reduce cost. However, cost quality service (QoS) pair contradictory objectives, different scenarios have preferences for...
A large number of participants are required to complete specific tasks sense data and obtain the sensing information in Mobile Crowdsensing. In order ensure real-time effectiveness comprehensiveness information, this paper proposes a participant service quality aware collecting mechanism with high coverage. Firstly, is measured by willingness regional preference analyze data. Then coverage evaluated according target points covered during execution tasks. Furthermore, efficiency determined...
Device-to-device (D2D) cooperative communication is regarded as a technology which can significantly improve the spectrum efficiency and network capacity. However, high dependence of on user participation makes design incentive mechanism become an issue great concern. In this paper, contract-based benefit allocation firstly proposed to optimize benefits sending users users. such mechanism, contract principal agent, by formulating utility function both parties, maximum between them be...
Cooperative multipoint transmission (CoMP) is one of the most promising paradigms for mitigating interference in cloud radio access networks (C-RAN). It allows multiple remote units (RRUs) to transmit same data flow a user further improve signal quality. However, CoMP may incur redundant over fronthaul network C-RAN. In C-RAN employing CoMP, key problem how coordinate heterogeneous resource allocation maximize cooperation gain while reducing load. this paper, based on multi-dimensional...
Energy efficiency (EE) is a key requirement for the design of short-range communication network. In order to alleviate energy consumption (EC) constraint, novel layered heterogeneous mobile cloud architecture proposed in this paper. Based on architecture, we establish an appropriate model, and scheme based joint data packet fragmentation cooperative transmission analyze corresponding different sizes size. Simulation results show that, when all nodes are accessing same size fragmentation, can...
According to the idea, which application of smart multi-beam antennas in mobile communication systems should be blended well with cellular configuration, a novel circular layered configuration model is proposed, where region divided into zones by means vertical splitting radiation pattern antenna. All numerical simulation results illuminate an attractive one, including performance carrier interference ratio and covering optimization based on CIR resulting form users' position distribution.
Security has become an important issue in Web Services application, which been widely concerned. This paper introduces several security policy models that applied and analyzes the basic principles. And then a simple comparison was made for scope merits of these models, finally this points out research.
With the Web Services widely used in distributed systems, demand for cross-domain authentication is increasing day by day, its security issues become more and prominent. Aiming at disadvantages of authentication, this article presents a dynamic mechanism crossing domains based on SAML. It can achieve single sign-on improve interoperability Services. At same time it meets demands certificate under applications environmental.
In the face of global warming, air pollution, and other difficulties, electric vehicles have become an industry strongly supported by various countries due to their good environmental protection characteristics. context big data, people are exposed more information, convenience brought data is also increasing. Based on this background, development green intelligent getting faster faster. This paper aimed at studying application machine learning algorithms in consumption trends data. proposes...
With the rapid development of 5G and Internet Things, video has gained broad application space as a carrier information, codec technology can reduce storage space, save transmission bandwidth, provide possibility for promotion applications. Versatile Video Coding (VVC), latest generation coding standard today, still uses block-based coding, which inevitably introduces artifacts, deblocking filters effectively artifacts improve quality compressed video. The filter in VVC adopts method based...
A new multi-cell cellular configuration networks is provided for analysis of handover initiation probability, which based on multi-beam base-station antenna splitting in the elevation-radiating plane. The sum mobile received signal power including desired and interference has been introduced into algorithm, along with idea, we present three models algorithm shadowing process Gaussian distribution. formulation probability those algorithms also analyzed. validity presented checked through a...
Based on the requirements of LTE-Advanced standardization, this paper provides an 8-Tx diversity scheme for downlink. The proposed considers complexity, compatibility, performance and etc. together. What's more, gives simulation results shows feasibility scheme.
This paper proposed a hierarchical cellular system based on the adaptive multi-beam antenna along with channel assignment scheme. The is formed from mechanism that beams of radiate in vertical plane, to say, base station can generate cluster concentric circles. channels assigned vary layer varied according traffic density unit area. simulation results show scheme be fit for system.
The security of optical code division multi-access (OCDMA) system was analyzed, and the results indicate hidden trouble security. A scheme multi-codes to be transmitted single-user information has been proposed, eavesdropping model simulated. soft platform simulation built by optisystem3.0 MATLAB. analysis accomplished on platform. brute-force searching a interception have studied. shown that this better
To collect data efficiently and reliably in Mobile Crowd Sensing (MCS), a Participant Service Ability Aware (PSAA) collecting mechanism is proposed. First, participants select the best sensing task according to complexity desired reward multitasking scenario. Second, Stackelberg Game model established based on mutual choice of platform maximize their utilities evaluate service ability participants. Finally, transmit directly or indirectly through relay from with better selected complete...