Taoshen Li

ORCID: 0009-0005-9899-5214
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Mobile Agent-Based Network Management
  • Energy Harvesting in Wireless Networks
  • Advanced Computational Techniques and Applications
  • Mobile Ad Hoc Networks
  • Advanced MIMO Systems Optimization
  • Network Traffic and Congestion Control
  • Energy Efficient Wireless Sensor Networks
  • Distributed and Parallel Computing Systems
  • IoT and Edge/Fog Computing
  • Wireless Sensor Networks and IoT
  • Cooperative Communication and Network Coding
  • Wireless Networks and Protocols
  • Full-Duplex Wireless Communications
  • Service-Oriented Architecture and Web Services
  • Opportunistic and Delay-Tolerant Networks
  • Caching and Content Delivery
  • Simulation and Modeling Applications
  • Cloud Computing and Resource Management
  • Advanced Algorithms and Applications
  • Metaheuristic Optimization Algorithms Research
  • Distributed systems and fault tolerance
  • Peer-to-Peer Network Technologies
  • Power Systems and Technologies
  • Wireless Communication Security Techniques
  • Higher Education and Teaching Methods

Guangxi University
2015-2025

Nanning Normal University
2009-2025

Second Affiliated Hospital of Nanchang University
2020

Nanchang University
2020

South China University of Technology
2017

Harbin Engineering University
2013

Wuzhou University
2011

Beihang University
2011

People's Bank of China
2009

Guangxi Research Institute of Chemical Industry
2009

This research introduces a novel approach to enhance energy efficiency in Mobile-Edge Computing (MEC) systems by integrating Non-Orthogonal Multiple Access (NOMA) with harvesting full-duplex (FD) environment. The primary objective is optimize edge computing performance while minimizing consumption. A comprehensive resource allocation strategy proposed, considering CPU frequency, power control for both uplink and downlink, time scheduling, data offloading. Mobile users can offload...

10.1038/s41598-025-96272-4 article EN cc-by-nc-nd Scientific Reports 2025-04-21

ABSTRACT Mobile devices are affected by limited energy and channel resources in the dynamic scenarios with high mobility complexity, which will trigger risks such as task failure or low offloading efficiency. This article proposes a multiuser multiserver MEC network framework based on simultaneous wireless information power transfer (a.k.a., SWIPT). We first consider multiple mobile fixed tasks can be either processed in‐local offloaded to server for processing via uplink transmission. Our...

10.1002/cpe.70078 article EN Concurrency and Computation Practice and Experience 2025-04-09

Abstract To screen the key immune genes in development of cervical cancer, construct related gene pairs (IRGPs), and evaluate their influence on prognosis cancer. Tumor Genome Atlas (TCGA) database geo were downloaded as training set validation respectively, data from immport. IRGPs model is established by machine learning, analyzed evaluated. Using Uclcan to analyze expression further explore association with level clinical stage According analysis set, we identified 29 constructed model....

10.1038/s41598-020-70500-5 article EN cc-by Scientific Reports 2020-08-25

As an irreversible trend, connected vehicles have become increasingly more popular. They depend on the generation and sharing of data between to improve safety efficiency transportation system. Due open feature vehicular ad hoc network (VANET), it is possible for dishonest misbehaving disrupt traffic by transmitting false information. In recent years, misbehavior detection systems been developed detect malicious behaviour, machine learning methods employed make accurately. However, existing...

10.1109/tnsm.2022.3220779 article EN IEEE Transactions on Network and Service Management 2022-11-09

The image reconstruction algorithm plays an important role in electrical capacitance tomography systems. linear back-projection method is simple and fast, but the reconstructed blurred, A based on revised regularization introduced this paper. preliminary experimental results show to have advantages as regards quality of rate.

10.1088/0957-0233/13/4/329 article EN Measurement Science and Technology 2002-03-19

Similar to traditional wireless sensor networks (WSN), the nodes only have limited memory and energy in low-duty-cycle (LDC-WSN). However, different from WSN, LDC-WSN often sleep most of their time preserve energies. The sleeping feature causes serious data transmission delay. each source node that has sensed needs quickly disseminate its other network for redundant storage. Otherwise, would be lost due possibly being destroyed by outer forces a harsh environment. quick dissemination...

10.3390/s17051051 article EN cc-by Sensors 2017-05-06

MicroRNA(miRNA) is a small, single stranded non-coding RNA which plays an important regulatory role in gene expression. Additionally, miRNAs perform crucial functions wide range of biological processes. These may be exploited for miRNA-mediated regulation protein-protein interaction and thus protein function. Many computational methods have been developed to predict the miRNA targets explore mechanism between protein. However, efforts investigate positions within are not comprehensive. This...

10.2174/138920371506140818112552 article EN Current Protein and Peptide Science 2014-08-18

Packet size is restricted due to the error-prone wireless channel which drops network energy utilization. Furthermore, frequent packet retransmissions also lead waste. In order improve efficiency of networks and save devices, EEFA (Energy Efficiency Frame Aggregation), a frame aggregation based energy-effcient scheduling algorithm for IEEE 802.11n network, proposed. changes aggregated dynamically according error rate, so as ensure data transmission completed during TXOP reduce consumption...

10.1109/cc.2014.6825255 article EN China Communications 2014-03-01

Trajectory prediction of surrounding vehicles is a critical task for connected and autonomous (CAVs), helping them to realize potential dangers in the traffic environment make most appropriate decisions. In practical environment, may affect each other, trajectories have multi-modality uncertainty, which makes accurate trajectory challenge. this paper, we propose an interactive network model based on long short-term memory (LSTM) convolutional neural (CNN) with correction mechanism, using our...

10.3390/electronics11142149 article EN Electronics 2022-07-09

Data gathering in wireless sensor network (WSN) has attracted a lot of attention research. can be done with or without aggregation, depending on the degree correlation among source data. In this paper, we study problem data aiming to conserving energy nodes so as maximize lifetime. We model one finding min-max-weight spanning tree (MMWST) , which is shown NP-complete. MMWST, maximum weight minimized. The node equals ratio number node's descendants energy. propose Ω(log n/ log...

10.12785/amis/070508 article EN Applied Mathematics & Information Sciences 2013-06-16

Based on the good characteristics of dual-tree complex wavelet transform (DT-CWT), an improved digital watermarking algorithm is presented in paper. The improves embedding scheme by selecting channels and using visual masking HVS. In order to increase robustness against common attacks such as JPEG, JPEG2000 compressions, different filtering attack etc., this uses spread spectrum RS-Error correction code. experimental results show that increases performance watermark has better attacks....

10.1109/icycs.2008.418 article EN 2008-11-01

Wireless mesh networks gradually become the core of next generation wireless technology and provide ubiquitous network connectivity to Internet. However, in process transmission, interference severely limits capacity. Therefore, many channel assignment algorithms are recently proposed for WMNs improve overall capacity, but most them make an assumption that traffic proflie is given. In this paper, we design a centralized maxflow-based algorithm(CMCA) above problem. Finally, use ns-2...

10.4304/jnw.6.6.879-882 article EN Journal of Networks 2011-06-03

The anycast is a new network addressing and routing scheme, has been defined as standard communication model in IPv6. By analyzing the characters of service, an with multiple QoS constraints felicitous estimate function optimal route path are presented this paper, algorithm based adaptive genetic proposed. This uses probabilities crossover mutation to solve problem computing over again simple algorithm. Using fitness scaling can guarantee diversity populations process running, beneficial...

10.1109/wgec.2009.148 article EN 2009-10-01

An indoor radio frequency (RF) energy harvesting module using dual-band rectenna array has been developed for powering an Internet of Things (IoT) sensor node containing a low-power temperature/humidity sensor. It is composed and power management unit with 10mF capacitance to produce 2.5-3.3 V output voltage 33 mA pulse current up 100ms. The radiates at 895-925 MHz 1.6-2.65GHz effectively. RF-to-DC rectifier specially optimized low density operation. efficiency 55% was observed...

10.1109/iaeac47372.2019.8998043 article EN 2022 IEEE 6th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC ) 2019-12-01

Leveraging energy harvesting abilities in wireless network devices has emerged as an effective way to prolong the lifetime of constrained systems. The system gains are usually optimized by designing resource allocation algorithm appropriately. However, few works focus on interaction that channel's time-vary characters make transfer inefficiently. To address this, we propose a novel operation sequence for sensor-cloud where Sinks provide SWIPT sensor nodes opportunistically during downlink...

10.23919/jcc.2021.01.019 article EN China Communications 2021-01-01

In this paper, we propose a novel and efficient fault tolerant routing algorithm for mesh networks based on the concept of k-submesh without virtual channels not sacrifice non-faulty nodes. Our is distributed local information based. Due to fact that our designed structure, apply probabilistic analysis tolerance algorithm. Suppose each node has an independent failure probability, derive probability successfully returns fault-free path. For example, formally prove as long bounded by 0.35%,...

10.1109/icpads.2004.10 article EN International Conference on Parallel and Distributed Systems 2004-07-07

Fingerprint enhancement plays a key role in the fingerprint identification system, and it directly influences final accuracy of identification. An improved image method based on Gabor filter is presented realized this paper. In our method, after Fourier transforming transforms from spatial domain to frequency domain, images are enhanced by directional domain. The experimental results demonstrate that can enhance processing effects images, has advantages better good effect faster operating speed.

10.1109/mace.2011.5987818 article EN 2011-07-01

Different from the traditional wired network, fundamental cause of transmission congestion in wireless ad hoc networks is medium contention. How to utilize state MAC (Media Access Control) layer adjust rate core work for transport protocol design. However, recent works have shown that existing cross-layer detection solutions are too complex be deployed or not able characterize accurately. We first propose a new metric called frame efficiency (i.e., ratio successful delay service delay),...

10.3390/s17071637 article EN cc-by Sensors 2017-07-15

Many applications in Multi-access Edge Computing (MEC) consist of interdependent tasks where the output some is input others. Most existing research on computational offloading does not consider dependency task and uses convex relaxation or heuristic algorithms to solve problem, which lacks adaptability suitable for dynamic environment fast fading channels. Therefore, this paper, optimization problem modeled as a Markov Decision Process (MDP) multi-user multi-server MEC environments,...

10.3390/app13010191 article EN cc-by Applied Sciences 2022-12-23

Anycast is proposed in IPv6 as a new communication model and becoming increasingly important. refers to the transmission of data from source node (any) one member group designed recipients network. The QoS anycast routing problem nonlinear combination optimization problem, which proved be NP complete problem. A hybrid algorithm combines genetic particle swarm solve with multiple constraints. uses an update operator paths can learn other bester paths, so that whole population tends best path...

10.1109/icicisys.2009.5357837 article EN 2009-11-01

A novel parallel predictor-corrector interior-point algorithm (P-PCIPA) is proposed. The uses technique of to improve the centrality iterate point reduce number iterations. Corrector equation, which has special structure, our for a class large scale optimization problems been presented. And this structured corrector equation can be solved in with factorization-backsolve technique. good speedup, nearly equaling processors, got from analysis time complexity.

10.1109/wgec.2009.68 article EN 2009-10-01
Coming Soon ...