Chenghui Zheng

ORCID: 0000-0003-4075-7430
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Minerals Flotation and Separation Techniques
  • Carbon Dioxide Capture Technologies
  • Advanced Steganography and Watermarking Techniques
  • Digital Media Forensic Detection
  • Chaos-based Image/Signal Encryption
  • Access Control and Trust
  • Network Security and Intrusion Detection
  • Regulation and Compliance Studies
  • Cognitive Radio Networks and Spectrum Sensing
  • Cognitive Computing and Networks
  • Legal Education and Practice Innovations
  • Phase Equilibria and Thermodynamics
  • Biofuel production and bioconversion
  • Advanced Graph Neural Networks
  • International Maritime Law Issues
  • Gas Dynamics and Kinetic Theory
  • Refrigeration and Air Conditioning Technologies
  • Caching and Content Delivery
  • Environmental law and policy
  • Vehicle License Plate Recognition
  • Business Process Modeling and Analysis
  • Microfluidic and Bio-sensing Technologies
  • Sex work and related issues
  • Coagulation and Flocculation Studies
  • Membrane Separation and Gas Transport

Fuzhou University
2018-2024

Guangdong Provincial Academy of Environmental Science
2017-2023

PLA Army Engineering University
2010-2015

Institute of Automation
2010

In large-scale wireless sensor networks, a low energy consumption requirement in data communication has become more prominent, but the currently existing solutions are unsatisfactory.Based on complexity and uncertainty node path this paper proposes adaptive clustering multi-hop routing protocol based fuzzy decision (FD-LEACH).In order to constitute dynamic network structure, introduces concept of set uses theory select excellent relay nodes.Analysis simulation results demonstrate that...

10.3233/ifs-151957 article EN other-oa Journal of Intelligent & Fuzzy Systems 2015-11-16

Recently, much attention has been devoted to cognitive radio network (CRN) and consequently, it renews the interest in improving performance of wireless mesh networks (WMNs). It proven that technology combined with multi-radio multi-channel is a promising way for improvement. At same time, they also lead some new challenges architecture design protocol optimization. This paper presents architecture-CRMesh, which integrates (CR) existing technologies seamlessly. A 3G Model proposed, can...

10.1109/icicee.2012.376 article EN International Conference on Industrial Control and Electronics Engineering 2012-08-01

10.1166/jmihi.2017.2056 article EN Journal of Medical Imaging and Health Informatics 2017-06-01

The purpose of this paper is to study the effect an innovative curriculum design on environmental education in China, specifically with regard Environmental Law Clinic (ELC) course, be run co-operation NGOs (ENGOs). Adopting a qualitative case method, our researchers investigated curriculum, including quantity student knowledge, level sense responsibility, and ability students solve disputes. We also each participant’s attitudes toward design. Our employed various methods analyze...

10.3390/su9030337 article EN Sustainability 2017-02-24

Over the past few years, China’s marine economy has been vigorously booming, while strong measures have equally undertaken to ensure superior quality of environment. However, country is still suffering illegal fishing problems, which hinder ecological environment and fishery resources from reaching sustainable development both internally globally. To this end, Chinese government ratified a series legal documents provide basis for judicial departments hold individuals groups responsible...

10.3390/laws9040021 article EN cc-by Laws 2020-10-10

The interacting entities in web service usually can't be predetermined and may different security domains. To address the access authorization for unknown users across domain borders, control of should performed based on domain-independent information but not identities. In this paper, a context role policy model is proposed that can appropriate environment. centered around contexts to define perform policies. It first bases execute dynamic roles assignment, then uses environment resource...

10.1109/isme.2010.51 article EN International Conference of Information Science and Management Engineering 2010-08-01

10.4156/ijact.vol5.issue7.96 article EN International Journal of Advancements in Computing Technology 2013-04-15
Coming Soon ...