- Caching and Content Delivery
- Network Packet Processing and Optimization
- Peer-to-Peer Network Technologies
- Privacy-Preserving Technologies in Data
- Cooperative Communication and Network Coding
- Policing Practices and Perceptions
- Network Security and Intrusion Detection
- Environmental Changes in China
- Blockchain Technology Applications and Security
- Internet Traffic Analysis and Secure E-voting
- Coastal wetland ecosystem dynamics
- Network Traffic and Congestion Control
- Water Resources and Management
- Cryptography and Data Security
- Advanced Data Storage Technologies
- Wireless Networks and Protocols
- German Security and Defense Policies
- Global Security and Public Health
- Cognitive Radio Networks and Spectrum Sensing
- Martial Arts: Techniques, Psychology, and Education
- Mobile Ad Hoc Networks
- Smart Cities and Technologies
- PAPR reduction in OFDM
- Geographic Information Systems Studies
- Big Data Technologies and Applications
Ludong University
2024
State Grid Corporation of China (China)
2023-2024
Beijing University of Posts and Telecommunications
2020
Inner Mongolia Electric Power (China)
2019
Beijing Jiaotong University
2015
Yantai Institute of Coastal Zone Research
2013-2014
Kansas State University
2010-2014
University of Chinese Academy of Sciences
2014
Chinese Academy of Sciences
2013
Yunnan Academy of Forestry
2011
Routing in multi-hop cognitive radio net- works(CRN) should consider how to dynamically switch frequency band for either per flow throughput guarantee or global spectrum utilization. Previous research have offered both centralized and distributed solutions on combining the two, but since different nodes may sense availability, efficiently sharing this information dynamic environment still remains challenging. In paper, we propose an approach reactively initiate route computing selection. We...
In coastal area, salinization is a common and serious problem for crop cultivation ecological restoration of degraded wetlands. Therefore, the soil salinity has attracted increasing attention from farmers, government environmental scientists. The factors controlling distribution have become hot point in saline studies. this study, statistics geostatistics were used to explore Yellow River Delta (YRD) based on 150 samples that collected June 2010. Besides experimental work, geographical...
As a mode of processing task request, edge computing paradigm can reduce delay and effectively alleviate network congestion caused by the proliferation Internet things(IoT) devices compared with cloud computing. However, in actual construction network, there are various autonomous subnets adjacent areas, which leads to possibility unbalance server load among during peak period request. In this paper, deep reinforcement learning algorithm is proposed solve complex computation offloading...
The ecological problems caused by dry and wet deposition of atmospheric nitrogen have been widespread concern in the world. In this study, depositions were monitored plant growing season coastal zone Yellow River Delta (YRD) using automatic sampling equipment. results showed that<mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML" id="M1"><mml:mrow><mml:msup><mml:mrow><mml:msub><mml:mrow><mml:mtext>SO</mml:mtext></mml:mrow><mml:mrow><mml:mn...
In this paper, a new initial radius (IR) selection method of Sphere Decoding (SD), called IR-ZF-OSUC, for MIMO system is proposed. An significant merit that utilizes the result ofQR decomposition which inherent in SD to obtain suboptimal solution, and selects distance between received signal lattice point mapped by solution as IR, makes procedure can be embedded body SD. Unlike other approaches, it needs no extra processing, so lower computational complexity achieved. Additionally, includes...
Bloom filter is a fast and simple structure for string matching, but it allows false positives. Longest prefix matching bloom filters (LPM) with counter extended hash table can eliminate positives at the expense of double memory none wire-speed. Faster searching speed be achieved parallel LPMs (PLPM), using more memory. We present an algorithm named efficient (MEPBF) which will save (q-1)/(2q) reach nearly same performance compared PLPM q LPMs. With this new algorithm, either faster given...
Energy-constrained wireless sensor networks require robust and energy-efficient communication protocols to minimize the energy consumption as much possible. Cooperative MIMO transmission is one of new solutions this problem. In paper, we first analyze efficiency cooperative with consideration channel training overhead. Then, an cluster-based scheme (ECCM) proposed. An end-to-end optimization model developed find optimum number nodes, clusters rates. Simulation results show that tremendous...
Hash tables are fundamental components of several network processing algorithms and applications, including route lookup, intrusion detection, viruses, worms other malicious code detection filtering. Collisions exist in common hash tables, which can critically affect the worst-case throughput an application, since number memory accesses required for each lookup vary. A non-collision scheme was presented, assuring at most one access lookup. Using Bloom filter (BF) CAM, this new algorithm is...
Privacy preserving computing (PPC) allows participants with different local data to do computations without revealing their sensitive data. Hence, ensuring security and privacy is essential for PPC. SM9 a Chinese national standard international identity-based encryption (IBE). Compared other IBE schemes, has better performance. At present, there no proxy re-encryption scheme based on available sharing scenarios in cloud environments. In this paper, we introduce novel framework called...
With the acceleration of data opening and sharing process in power industry, risk sensitive leakage is also gradually increasing. Privacy protection one hot issues privacy control technology research release, k-anonymity topic recent years. In this paper, we propose a hierarchical DP-K anonymous release model based on binary tree clustering for existing scheme minimizing amount information loss. A tree-based algorithm (BTCA) proposed to classify similar records into same equivalent class,...
Deep packet inspection has become extremely important due to network security. In deep inspection, the payload is compared against a set of patterns specified as regular expressions. Regular expressions are often implemented deterministic finite automaton (DFA) for matching in linear time at high link rates. We proposed predict DFA which can accelerate processing speed DFA. A uses additional information several next transitions. tested our proposal on Layer7 rule-set and validated it real...
Poor data locality in high-speed networks leads to more memory accesses of connection management, which limits the throughput performance. In view above problem, this paper analyzed process management and access detail, put forward efficient solution improve on FPGA platform. This takes full advantage structural characteristics SDRAM. By controlling requests, it can make adjacent requests different banks, reduce hardware resource conflicts, shorten time interval between throughput. order...
Fairness is an important management issue for peer-to-peer file sharing systems. In this paper, we study the credit system of P2P network eMule (http://www.emule-project.net) through a simple queueing model. Numerical analysis and experimental results show that local strategy could effectively deal with free riders provide fairness during single exchange. Using model, also investigate different strategies dealing newcomer issue. We propose simple, private history-based scheme to balance...
IEEE 802.11 MAC standard and model are well researched. Although it supports multiple channels in physical layer, how to provide multi-channel support layer is still challenging. Most of current work on only evaluate by simulations. In this paper, we propose a simple but general scheme describe channel switching process. With its help, extend the into MAC, present three-dimensional Markov chain it. This analytical both access methods: basic RTS/CTS. Simulation results show that our can...
Demand response business is becoming more and complicated under the opening of retail side. It involves a large number capital flow operations in subsidy settlement, penalty for breach contract so on. needs kind technical means effective management protection. Based on possible problems multi-agent participation demand business, this paper analyzes matching point between blockchain technology finally designs mechanism. Finally, prospect future research proposed.