Mingwei Gong

ORCID: 0009-0004-4415-2142
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Wireless Network Optimization
  • Wireless Networks and Protocols
  • Network Traffic and Congestion Control
  • MicroRNA in disease regulation
  • Mobile Ad Hoc Networks
  • Copyright and Intellectual Property
  • Advanced biosensing and bioanalysis techniques
  • RNA Interference and Gene Delivery
  • Advanced Vision and Imaging
  • Digital Games and Media
  • Spam and Phishing Detection
  • Blockchain Technology Applications and Security
  • Distributed and Parallel Computing Systems
  • Robotics and Sensor-Based Localization
  • Advanced Queuing Theory Analysis
  • Energy Harvesting in Wireless Networks
  • IoT and Edge/Fog Computing
  • Sexuality, Behavior, and Technology
  • Peer-to-Peer Network Technologies
  • Scheduling and Optimization Algorithms
  • Smart Grid Energy Management
  • Teaching and Learning Programming
  • Signaling Pathways in Disease
  • Cloud Computing and Resource Management
  • Video Coding and Compression Technologies

Mount Royal University
2010-2023

Chongqing Medical University
2022-2023

The Affiliated Yongchuan Hospital of Chongqing Medical University
2022

University of Calgary
2004-2009

Fog computing is an emerging paradigm that has come into consideration for the deployment of Internet Things (IoT) applications amongst researchers and technology industries over last few years. highly distributed consists a wide number autonomous end devices, which contribute to processing. However, variety devices offered across different users are not audited. Hence, security major concern should consideration. Therefore, provide necessary there need understand what concerns with regards...

10.3390/electronics10101171 article EN Electronics 2021-05-14

Applications such as robot navigation and augmented reality require high-accuracy dense disparity maps in real-time online. Due to time constraint, most realtime stereo applications rely on local winner-take-all optimization the computation process. These approaches are generally outperformed by offline global based algorithms. However, recent research shows that, through carefully selecting aggregating matching costs of neighboring pixels, produced a approach can be more accurate than those...

10.1109/3dpvt.2006.78 article EN 2006-06-01

10.1016/j.comcom.2008.02.013 article EN Computer Communications 2008-03-05

Technological advancements have led to increased confidence in the design of large-scale wireless networks that comprise small energy constraint devices. Despite boost technological advancements, dissipation and fault tolerance are amongst key deciding factors while designing deploying sensor networks. This paper proposes a Fault-tolerant Energy-efficient Hierarchical Clustering Algorithm (FEHCA) for (WSNs), which demonstrates energy-efficient clustering fault-tolerant operation cluster...

10.3390/en14133935 article EN cc-by Energies 2021-07-02

Accumulating evidence has reported the role of microRNA-21-3p (miR-21-3p) in sepsis, and our objective was to discuss effect miR-21-3p/regulator calcineurin 1 (Rcan1) axis on cardiomyocyte apoptosis septic rats. miR-21-3p Rcan1 expression myocardial tissues lipopolysaccharide (LPS)-treated rats LPS-treated H9c2 cardiomyocytes determined. The influences downregulating or upregulating were then evaluated. target relation between verified. It observed that elevated reduced cardiomyocytes....

10.4149/gpb_2022066 article EN General Physiology and Biophysics 2023-01-01

Wireless Local Area Networks (WLANs) based on the IEEE 802.11 technology have become increasingly popular and ubiquitous. The standard allows each station in a WLAN equal opportunity to access wireless channel, which can result unfair sharing of network bandwidth between upstream downstream TCP flows at an AP. In this paper, we propose two different queue management techniques alleviate unfairness problem, with one Selective Packet Marking (SPM), other Least Attained Service (LAS)...

10.1109/wiopt.2006.1666503 article EN 2006-08-08

Abstract This paper presents an analytical approach to model the bi‐directional multi‐channel IEEE 802.11 MAC protocols (Bi‐MCMAC) for ad hoc networks. Extensive simulation work has been done performance evaluation of protocols. Since several limitations, this is primarily based on approach. The objective show analytically advantages Bi‐MCMAC protocol over classical protocol. distributed coordination function (DCF) mode medium access control (MAC) considered in modeling. Two different...

10.1002/dac.1183 article EN International Journal of Communication Systems 2010-10-07

This paper uses a probe-based sampling approach to study the behavioural properties of Web server scheduling strategies, such as processor sharing (PS) and shortest remaining processing time (SRPT). The is general purpose, in that it can be used estimate mean variance job response time, for arbitrary arrival processes, service distributions, policies. In paper, we apply trace-driven simulation compare contrast PS SRPT We identify two types unfairness, called endogenous exogenous unfairness....

10.1109/mascot.2003.1240650 article EN 2004-06-22

This paper uses trace-driven simulations to evaluate two novel Web server scheduling policies called K-SRPT and T-SRPT. is a multi-threaded version of SRPT (shortest remaining processing time) that can have up K jobs in service at time. T-SRPT hybrid policy dynamically switches from PS (processor sharing) when the number system exceeds T, back load diminishes. Slowdown profile plots are used analyze performance these relative PS, SRPT, FSP (fair sojourn protocol). Simulation results show new...

10.1109/mascot.2004.1348290 article EN 2004-11-08

10.1016/j.comnet.2005.08.005 article EN Computer Networks 2005-09-21

Cultural venues like museums increasingly seek to harness the value of data analytics make driven decisions related exhibitions duration, marketing campaigns, resource planning, and revenue optimization. One key priority is need understand influencing factors behind visitor attendance. Using collected from a large museum, we investigated whether weather has significant impact on attendance or that other are more important. We applied Cross Industry Standard Process for Data Mining (CRISP-DM)...

10.1109/isncc49221.2020.9297182 article EN 2022 International Symposium on Networks, Computers and Communications (ISNCC) 2020-10-20

10.1016/j.mcm.2010.10.004 article EN publisher-specific-oa Mathematical and Computer Modelling 2010-10-18

Small extracellular vesicles (sEVs) have been reported to play important roles in cell-to-cell communication and are promising biomarkers for the early diagnosis of infections. Therefore, it is high demand develop a method that can integrate easy-to-operate sEV isolation sensitive quantification. We herein propose novel detection scaffold via low-speed centrifugation quantification sEVs through DNAzyme-based signal amplification. The established dumbbell probe-based RCA (rolling circle...

10.1039/d2ay00019a article EN Analytical Methods 2022-01-01

Adult video content is considered to be responsible for a major portion of the Internet traffic. We present preliminary characterization study one largest and popular adult streaming service, xHamster. While there have been extensive analysis mainstream user generated sharing services such as YouTube, an underappreciated field researchers. Using metadata over 1.8 million videos we studied characteristics, interaction, popularity dynamics observe that garner more views per than YouTube. sites...

10.1109/lcn.2017.119 article EN 2017-10-01

Capstone projects/courses, in which students undertake a significant project under supervision, have been offered many computing programs In this paper, we present our experience for the senior course as by BCIS program at Mount Royal University, provides an environment to successfully complete capstone experience. This is student initiated, single semester, individual, open ended project. We include motivation and advantages of approach well details exemplar The shows initiated projects...

10.1145/2656450.2656475 article EN 2014-10-14

Pastures are a vital source of dairy products and cattle nutrition, as such, play significant role in New Zealand’s agricultural economy. However, weeds can be major problem for pastures, making it challenge farmers to monitor control them. Currently, most the tasks weed management done manually, lack persistent technology control. This motivated us design, implement, evaluate Decision Support System (DSS) detect pastures provide decisions cleanup weeds. Our proposed system uses two primary...

10.1109/access.2023.3307311 article EN cc-by-nc-nd IEEE Access 2023-01-01

Internet piracy is a significant ongoing problem for content producers and rights holders. Estimates of the cost copyright infringement to film music industries range in tens hundreds billions dollars every year. The vast majority this illegal shared using three key technologies: peer-to-peer (P2P) protocols such as BitTorrent, file streaming, one-click hosting services (OCHs). In paper, two OCH indexes were studied insights into uploader dynamics. Results suggest that traditional...

10.1109/lcn.2017.118 article EN 2017-10-01

Internet piracy is a significant ongoing problem for content producers and rights holders. Estimates of the cost copyright infringement to film music industries range in tens hundreds billions dollars every year. The vast majority this illegal shared using three key technologies: peer-to-peer (P2P) protocols such as BitTorrent, file streaming, one-click hosting services (OCHs). current dominant analogy file- sharing, promoted by holders industry lobby groups, one 'copyright theft'; with...

10.1109/icc.2018.8422248 article EN 2018-05-01

Pornography can be distributed in multiple forms on the Internet. Online pornography a non-negligible fraction of total Internet traffic, with adult video streaming gaining significant traction among most visited global websites. Similar to rise User Generated Content (UGC) general Web 2.0 services, service providers have also promoted social interaction and UGC what is called 'Porn 2.0'. Discovering characteristics Porn allows for better understanding both traffic specifically services. In...

10.1145/3341161.3342940 article EN 2019-08-27

This paper presents the design, implementation, and evaluation of an energy-efficient handover algorithm for wireless sensor networks (WSNs) that are main building block in creation Internet Things (IoT). Our low-power design is based on a careful breakdown analysis potential power consumption different components process. With scanning part process being identified as drain energy, designed to place majority responsibility mains powered access points, rather than mobile nodes. The proposed...

10.1109/pccc.2016.7820636 article EN 2016-12-01

Measuring quality of Internet access is important because it provides rich information on capability services and user experience. As actively evolve, users tend to spend more time require network capacity over time. To meet the needs consumers, there a wide mix ISPs technologies offered in New Zealand. Benchmarking Zealand for their service enables us predict what may experience among different ISPs. In this paper, we present study broadband performance Our results will provide accurate...

10.1109/pccc.2016.7820618 article EN 2016-12-01
Coming Soon ...