- Mobile Agent-Based Network Management
- Energy Harvesting in Wireless Networks
- Advanced Computational Techniques and Applications
- Mobile Ad Hoc Networks
- Advanced MIMO Systems Optimization
- Network Traffic and Congestion Control
- Energy Efficient Wireless Sensor Networks
- Distributed and Parallel Computing Systems
- IoT and Edge/Fog Computing
- Wireless Sensor Networks and IoT
- Cooperative Communication and Network Coding
- Wireless Networks and Protocols
- Full-Duplex Wireless Communications
- Service-Oriented Architecture and Web Services
- Opportunistic and Delay-Tolerant Networks
- Caching and Content Delivery
- Simulation and Modeling Applications
- Cloud Computing and Resource Management
- Advanced Algorithms and Applications
- Metaheuristic Optimization Algorithms Research
- Distributed systems and fault tolerance
- Peer-to-Peer Network Technologies
- Power Systems and Technologies
- Wireless Communication Security Techniques
- Higher Education and Teaching Methods
Guangxi University
2015-2025
Nanning Normal University
2009-2025
Second Affiliated Hospital of Nanchang University
2020
Nanchang University
2020
South China University of Technology
2017
Harbin Engineering University
2013
Wuzhou University
2011
Beihang University
2011
People's Bank of China
2009
Guangxi Research Institute of Chemical Industry
2009
This research introduces a novel approach to enhance energy efficiency in Mobile-Edge Computing (MEC) systems by integrating Non-Orthogonal Multiple Access (NOMA) with harvesting full-duplex (FD) environment. The primary objective is optimize edge computing performance while minimizing consumption. A comprehensive resource allocation strategy proposed, considering CPU frequency, power control for both uplink and downlink, time scheduling, data offloading. Mobile users can offload...
ABSTRACT Mobile devices are affected by limited energy and channel resources in the dynamic scenarios with high mobility complexity, which will trigger risks such as task failure or low offloading efficiency. This article proposes a multiuser multiserver MEC network framework based on simultaneous wireless information power transfer (a.k.a., SWIPT). We first consider multiple mobile fixed tasks can be either processed in‐local offloaded to server for processing via uplink transmission. Our...
Abstract To screen the key immune genes in development of cervical cancer, construct related gene pairs (IRGPs), and evaluate their influence on prognosis cancer. Tumor Genome Atlas (TCGA) database geo were downloaded as training set validation respectively, data from immport. IRGPs model is established by machine learning, analyzed evaluated. Using Uclcan to analyze expression further explore association with level clinical stage According analysis set, we identified 29 constructed model....
As an irreversible trend, connected vehicles have become increasingly more popular. They depend on the generation and sharing of data between to improve safety efficiency transportation system. Due open feature vehicular ad hoc network (VANET), it is possible for dishonest misbehaving disrupt traffic by transmitting false information. In recent years, misbehavior detection systems been developed detect malicious behaviour, machine learning methods employed make accurately. However, existing...
The image reconstruction algorithm plays an important role in electrical capacitance tomography systems. linear back-projection method is simple and fast, but the reconstructed blurred, A based on revised regularization introduced this paper. preliminary experimental results show to have advantages as regards quality of rate.
Similar to traditional wireless sensor networks (WSN), the nodes only have limited memory and energy in low-duty-cycle (LDC-WSN). However, different from WSN, LDC-WSN often sleep most of their time preserve energies. The sleeping feature causes serious data transmission delay. each source node that has sensed needs quickly disseminate its other network for redundant storage. Otherwise, would be lost due possibly being destroyed by outer forces a harsh environment. quick dissemination...
MicroRNA(miRNA) is a small, single stranded non-coding RNA which plays an important regulatory role in gene expression. Additionally, miRNAs perform crucial functions wide range of biological processes. These may be exploited for miRNA-mediated regulation protein-protein interaction and thus protein function. Many computational methods have been developed to predict the miRNA targets explore mechanism between protein. However, efforts investigate positions within are not comprehensive. This...
Packet size is restricted due to the error-prone wireless channel which drops network energy utilization. Furthermore, frequent packet retransmissions also lead waste. In order improve efficiency of networks and save devices, EEFA (Energy Efficiency Frame Aggregation), a frame aggregation based energy-effcient scheduling algorithm for IEEE 802.11n network, proposed. changes aggregated dynamically according error rate, so as ensure data transmission completed during TXOP reduce consumption...
Trajectory prediction of surrounding vehicles is a critical task for connected and autonomous (CAVs), helping them to realize potential dangers in the traffic environment make most appropriate decisions. In practical environment, may affect each other, trajectories have multi-modality uncertainty, which makes accurate trajectory challenge. this paper, we propose an interactive network model based on long short-term memory (LSTM) convolutional neural (CNN) with correction mechanism, using our...
Data gathering in wireless sensor network (WSN) has attracted a lot of attention research. can be done with or without aggregation, depending on the degree correlation among source data. In this paper, we study problem data aiming to conserving energy nodes so as maximize lifetime. We model one finding min-max-weight spanning tree (MMWST) , which is shown NP-complete. MMWST, maximum weight minimized. The node equals ratio number node's descendants energy. propose Ω(log n/ log...
Based on the good characteristics of dual-tree complex wavelet transform (DT-CWT), an improved digital watermarking algorithm is presented in paper. The improves embedding scheme by selecting channels and using visual masking HVS. In order to increase robustness against common attacks such as JPEG, JPEG2000 compressions, different filtering attack etc., this uses spread spectrum RS-Error correction code. experimental results show that increases performance watermark has better attacks....
Wireless mesh networks gradually become the core of next generation wireless technology and provide ubiquitous network connectivity to Internet. However, in process transmission, interference severely limits capacity. Therefore, many channel assignment algorithms are recently proposed for WMNs improve overall capacity, but most them make an assumption that traffic proflie is given. In this paper, we design a centralized maxflow-based algorithm(CMCA) above problem. Finally, use ns-2...
The anycast is a new network addressing and routing scheme, has been defined as standard communication model in IPv6. By analyzing the characters of service, an with multiple QoS constraints felicitous estimate function optimal route path are presented this paper, algorithm based adaptive genetic proposed. This uses probabilities crossover mutation to solve problem computing over again simple algorithm. Using fitness scaling can guarantee diversity populations process running, beneficial...
An indoor radio frequency (RF) energy harvesting module using dual-band rectenna array has been developed for powering an Internet of Things (IoT) sensor node containing a low-power temperature/humidity sensor. It is composed and power management unit with 10mF capacitance to produce 2.5-3.3 V output voltage 33 mA pulse current up 100ms. The radiates at 895-925 MHz 1.6-2.65GHz effectively. RF-to-DC rectifier specially optimized low density operation. efficiency 55% was observed...
Leveraging energy harvesting abilities in wireless network devices has emerged as an effective way to prolong the lifetime of constrained systems. The system gains are usually optimized by designing resource allocation algorithm appropriately. However, few works focus on interaction that channel's time-vary characters make transfer inefficiently. To address this, we propose a novel operation sequence for sensor-cloud where Sinks provide SWIPT sensor nodes opportunistically during downlink...
In this paper, we propose a novel and efficient fault tolerant routing algorithm for mesh networks based on the concept of k-submesh without virtual channels not sacrifice non-faulty nodes. Our is distributed local information based. Due to fact that our designed structure, apply probabilistic analysis tolerance algorithm. Suppose each node has an independent failure probability, derive probability successfully returns fault-free path. For example, formally prove as long bounded by 0.35%,...
Fingerprint enhancement plays a key role in the fingerprint identification system, and it directly influences final accuracy of identification. An improved image method based on Gabor filter is presented realized this paper. In our method, after Fourier transforming transforms from spatial domain to frequency domain, images are enhanced by directional domain. The experimental results demonstrate that can enhance processing effects images, has advantages better good effect faster operating speed.
Different from the traditional wired network, fundamental cause of transmission congestion in wireless ad hoc networks is medium contention. How to utilize state MAC (Media Access Control) layer adjust rate core work for transport protocol design. However, recent works have shown that existing cross-layer detection solutions are too complex be deployed or not able characterize accurately. We first propose a new metric called frame efficiency (i.e., ratio successful delay service delay),...
Many applications in Multi-access Edge Computing (MEC) consist of interdependent tasks where the output some is input others. Most existing research on computational offloading does not consider dependency task and uses convex relaxation or heuristic algorithms to solve problem, which lacks adaptability suitable for dynamic environment fast fading channels. Therefore, this paper, optimization problem modeled as a Markov Decision Process (MDP) multi-user multi-server MEC environments,...
Anycast is proposed in IPv6 as a new communication model and becoming increasingly important. refers to the transmission of data from source node (any) one member group designed recipients network. The QoS anycast routing problem nonlinear combination optimization problem, which proved be NP complete problem. A hybrid algorithm combines genetic particle swarm solve with multiple constraints. uses an update operator paths can learn other bester paths, so that whole population tends best path...
A novel parallel predictor-corrector interior-point algorithm (P-PCIPA) is proposed. The uses technique of to improve the centrality iterate point reduce number iterations. Corrector equation, which has special structure, our for a class large scale optimization problems been presented. And this structured corrector equation can be solved in with factorization-backsolve technique. good speedup, nearly equaling processors, got from analysis time complexity.