- Advanced Authentication Protocols Security
- Privacy, Security, and Data Protection
- Hip and Femur Fractures
- Geomagnetism and Paleomagnetism Studies
- Vehicular Ad Hoc Networks (VANETs)
- Advanced X-ray and CT Imaging
- Image and Signal Denoising Methods
- Sparse and Compressive Sensing Techniques
- IPv6, Mobility, Handover, Networks, Security
- Advanced Data and IoT Technologies
- Speech and Audio Processing
- Software-Defined Networks and 5G
- Network Packet Processing and Optimization
- Algorithms and Data Compression
- Geophysical and Geoelectrical Methods
- Bone health and osteoporosis research
- Privacy-Preserving Technologies in Data
Second Affiliated Hospital & Yuying Children's Hospital of Wenzhou Medical University
2025
Wenzhou Medical University
2025
China Telecom
2022-2023
China Telecom (China)
2022-2023
Cloud Computing Center
2022
Abstract Introduction A large number of middle-aged and elderly patients have an insufficient understanding osteoporosis its harm. This study aimed to establish validate a convolutional neural network (CNN) model based on unenhanced chest computed tomography (CT) images the vertebral body skeletal muscle for opportunistic screening in with osteoporosis. Materials methods Our team retrospectively collected clinical information from participants who underwent CT dual-energy X-ray...
Data compression and encryption are required in wireless sensor networks (WSNs) for an acoustic signal. However, it is difficult the nodes with low configuration to support complex computation. In order solve mismatch between resources requirement, compressed sensing (CS) measurement matrix based on Logistic chaotic sequence applied The excellent performance of CS system can achieve data sampling, compression, at same time without experimental results show that most SNR all-acoustic frames...
The more complex 5G mobile communication network faces serious security challenges. authentication and key agreement (AKA) is utilized for user equipment (UE) the network. cryptographic functions in AKA protocol are foundation ensuring of existing uses AES algorithm as encryption core function by default. However, some special application requires autonomous controllable algorithms to diversify solutions. In light this, SM4 proposed China Cryptographic Administration programmed Python...
Abstract. IPSec protocol has been used to protect user plane transmission in the network layer of 5G mobile communication network. Compared protocols transport or higher, must deal with issues reliability and fragmentation, which increases its complexity overhead. Therefore, implementation is quite vital for application efficiency. In this paper, a kind method called packet slicing proposed promote processing efficiency principle segmentation parallel, can cut down time delay high traffic...
In recent years, the operation and maintenance (O&M) of wind farms has gradually developed towards intellectualization. However, due to fact that most are built in remote areas with backward network infrastructure, progress intelligent O&M is slow. Based on current situation requirements O&M, this paper proposes a hybrid networking mode 5G private traditional power communication network, integrates basis retaining original production network. This not only ensures safe access inspection...
In the evolution of mobile communications from 4G to 5G, concept security design and protection has been proposed. The wireless air interface may face risks, such as identity spoofing, service denial replay attacks. It is crucial protect confidentiality integrity data. this article, we analyze performances for three kinds algorithms 5G interface, put forward application strategies in different scenarios. beneficial popularize various cryptographic make mechanism customized network perfect.
Abstract Long-term geomagnetic data monitoring will generate a huge amount of data, and compression algorithms be required to reduce the save storage transmission expenses. To adapt application with limited resources, CCSDS lossless algorithm is applied measurement in our work. This made up two parts: preprocessor an adaptive entropy coder. In this study, unit-delay predictor chosen as based on properties signal, coder chooses suitable for data. A 14-hour continuous was performed. The...