Xiongyan Tang

ORCID: 0009-0000-2151-2679
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Software-Defined Networks and 5G
  • Optical Network Technologies
  • Advanced Optical Network Technologies
  • Advanced Photonic Communication Systems
  • IoT and Edge/Fog Computing
  • Peer-to-Peer Network Technologies
  • Network Security and Intrusion Detection
  • Advanced Data and IoT Technologies
  • Technology and Security Systems
  • Optical Wireless Communication Technologies
  • Mobile Agent-Based Network Management
  • E-commerce and Technology Innovations
  • Advanced Fiber Laser Technologies
  • Advanced Research in Systems and Signal Processing
  • Distributed and Parallel Computing Systems
  • Advanced Computing and Algorithms
  • Cloud Computing and Resource Management
  • Network Traffic and Congestion Control
  • Nonlinear Photonic Systems
  • Semiconductor Lasers and Optical Devices
  • Neural Networks and Reservoir Computing
  • Caching and Content Delivery
  • Power Systems and Renewable Energy
  • Semiconductor Quantum Structures and Devices
  • IPv6, Mobility, Handover, Networks, Security

China United Network Communications Group (China)
2009-2025

Shenyang Aerospace University
2025

China Internet Network Information Center
2024

Beijing University of Posts and Telecommunications
2002-2016

In 6G era, service forms in which computing power acts as the core will be ubiquitous network. At same time, collaboration among edge computing, cloud and network is needed to support with strong demand for power, so realize optimization of resource utilization. Based on this, article discusses research background, key techniques main application scenarios Through demonstration, it can concluded that technical solution effectively meet multi-level deployment flexible scheduling needs future...

10.23919/jcc.2021.02.011 article EN China Communications 2021-02-01

A support vector machine (SVM)-based data detection for 8-superposed pulse amplitude modulation in visible light communication is proposed and experimentally demonstrated. In this work, the SVM detector contains three binary classifiers with different classification strategies. And separating hyperplane of each constructed by training data. The experiment results show that offers 35% higher rates when compared traditional direct decision method.

10.1109/csndsp.2016.7573898 article EN 2022 13th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP) 2016-07-01

In this paper, we analyze the channel estimation technique for OFDM (orthogonal frequency division multiplexing) used in VLC (Visible Light Communication system). A Post-Processing DFT (Discrete Fourier Transformation) method was proposed to improve system performance by eliminating noise outside maximum delay. After linear interpolation, is transformed into time domain and truncate according delay, then goes back domain. LS (Least Square) algorithm comb-type pilot simulation validate...

10.1109/csndsp.2012.6292673 article EN 2012-07-01

We propose a non-imaging MIMO-OFDM based VLC, and analyzed its bit-error-rate (BER) performance for different LED arrangements. Rectangular arrangement offers improved BER compared to the linear range of higher-order modulation schemes.

10.1109/oecc.2015.7340270 article EN 2015-06-01

Based on the analysis of basic concepts, characteristics and type service cloud computing through study IT industrial chain, construction services platform for telecom operators is put forward. The layers various in different are also detailed analyzed from point view operators.

10.1109/icbnmt.2009.5347793 article EN 2009-10-01

This paper explores the most urgent task to initialize a virtual network in virtualization environment, which always called embedding. Different previous works take embedding process as two steps: node mapping stage and then edge stage, this contribute solve these processes all one discrete nonlinear combined optimization. Based on modeling (VN) request substrate (SN), proposed mathematical description building relationship between stages. After that, cost is introduced an objective...

10.1109/icecc.2011.6067925 article EN 2011-09-01

10.4156/aiss.vol4.issue1.2 article EN INTERNATIONAL JOURNAL ON Advances in Information Sciences and Service Sciences 2012-01-31

In the upcoming 6G era, edge artificial intelligence (AI), as a key technology, will be able to deliver AI processes anytime and anywhere by deploying of models on devices. As hot issue in public safety, person re-identification (Re-ID) also needs its urgently deployed devices realize real-time accurate recognition. However, due complex scenarios other practical reasons, performance model is poor practice. This especially case places, where most people have similar characteristics, there are...

10.3390/electronics12102266 article EN Electronics 2023-05-17

The 5th Generation mobile system was featured as ultra-reliable and low-latency communications, which could support applications for industrial verticals. However, to control scenarios, it necessary ensure the deterministic data transmission. Therefore, 5G Rel.16 proposed Time-Sensitive Network technology integrating with cellular enhance transmission capability of networks. In cooperation architecture Network, should capabilities both core network access fulfill cross-network time-sensitive...

10.1109/icccs57501.2023.10151189 article EN 2022 7th International Conference on Computer and Communication Systems (ICCCS) 2023-04-21

Computing Power Networks (CPN) is the next stage of cloud network development. The emergence computing power to improve collaborative work efficiency and end, edge, computing. problem integration scheduling has become one hot points. This paper describes concept SID as a Service (SIDaaS) based on SRv6, Programmable System (PSS) SIDaaS proposed. PSS core technologies for development CPN, which provides an important implementation method in service orchestration scheduling. experiment shows...

10.1109/hoticn57539.2022.10036217 article EN 2022-11-24

10.1016/j.aeue.2013.12.013 article EN AEU - International Journal of Electronics and Communications 2014-01-08

10.4156/ijact.vol3.issue11.50 article EN International Journal of Advancements in Computing Technology 2011-12-29

The current computing form is developing towards ubiquitous distribution of Cloud-edge-device. Based on the trend, network convergence (CNC) can achieve unified scheduling heterogeneous resources through communication network. Through convergence, end users access cloud resource pools and obtain different value-added on-demand services. In this paper, two deployment scenarios SFC based SRv6 technology will be analyzed in detail under China Unicom's architecture: one scheme implemented...

10.1109/hoticn57539.2022.10036213 article EN 2022-11-24

10.12267/j.issn.2096-5931.2021.03.002 article EN Information and Communications Technology and Policy 2021-03-15

10.1016/j.aeue.2012.11.005 article EN AEU - International Journal of Electronics and Communications 2012-12-23

10.1109/wcnc57260.2024.10571005 article EN 2022 IEEE Wireless Communications and Networking Conference (WCNC) 2024-04-21

The development of large language models (LLM) has revolutionized various fields and is anticipated to drive the advancement autonomous systems. In context optical networks, creating a high-level cognitive agent in control layer remains challenge. However, LLM primarily developed for natural processing tasks, rendering them less effective predicting physical dynamics communications. Moreover, networks demand rigorous stability, where direct deployment strategies generated from poses safety...

10.48550/arxiv.2411.00473 preprint EN arXiv (Cornell University) 2024-11-01

Due to the rapid development of quantum computing, many classical blockchain technologies are now considered insecure. The emergence holds promise for addressing this issue. Various consensus algorithms have been proposed so far, but there has not yet a algorithm tailored specifically consortium scenarios. In paper, we propose novel mechanism, named Q-PnV. This mechanism is based on Proof Vote (PoV), integrating voting, digital signature and random number generators (QRNGs). By combining...

10.48550/arxiv.2412.06325 preprint EN arXiv (Cornell University) 2024-12-09
Coming Soon ...