Shengsuo Cai

ORCID: 0009-0007-3686-2170
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Mobile Ad Hoc Networks
  • Wireless Networks and Protocols
  • Cooperative Communication and Network Coding
  • Opportunistic and Delay-Tolerant Networks
  • UAV Applications and Optimization
  • Advanced Wireless Network Optimization
  • Distributed Control Multi-Agent Systems
  • Robotic Path Planning Algorithms
  • Reinforcement Learning in Robotics
  • Vehicular Ad Hoc Networks (VANETs)
  • Power Systems and Technologies
  • Network Time Synchronization Technologies
  • Smart Grid and Power Systems
  • IPv6, Mobility, Handover, Networks, Security
  • Digital Transformation in Industry
  • Energy Efficient Wireless Sensor Networks
  • Distributed and Parallel Computing Systems
  • RFID technology advancements
  • Advanced MIMO Systems Optimization
  • Optimal Power Flow Distribution
  • Scheduling and Optimization Algorithms
  • Biomimetic flight and propulsion mechanisms
  • Power Systems and Renewable Energy
  • Advanced Queuing Theory Analysis
  • Optimization and Search Problems

Shanghai Electric (China)
2025

Nanjing University of Aeronautics and Astronautics
2014-2025

University of Waterloo
2016

Over the past decades, unmanned aerial vehicles (UAVs) have been widely used in both military and civilian fields. In these applications, flocking motion is a fundamental but crucial operation of multi-UAV systems. Traditional methods usually designed for specific environment. However, real environment mostly unknown stochastic, which greatly reduces practicality methods. this article, deep reinforcement learning (DRL) to realize Considering that sim-to-real problem restricts application DRL...

10.1109/jiot.2021.3127873 article EN IEEE Internet of Things Journal 2021-11-15

This paper considers the cooperative search for stationary targets by multiple unmanned aerial vehicles (UAVs) with limited sensing range and communication ability in a dynamic threatening environment. The main purpose is to use UAVs find more unknown as soon possible, increase coverage rate of mission area, importantly, guide away from threats. However, traditional methods are mostly unscalable perform poorly environments. A new multi-agent deep reinforcement learning (MADRL) method,...

10.1109/tvt.2023.3245120 article EN IEEE Transactions on Vehicular Technology 2023-02-23

Unmanned aerial vehicle (UAV) swarm networking and collaboration have significant prospects in both civilian military applications, due to its remarkable properties cooperative efficiency, reduced risks, operational cost. Traditional algorithms challenging issues of high computational complexity low efficiency UAV collaboration, while intelligence (CI) has attracted increasing attention since it advantages solving complex optimization problems. The swarms serves as an essential foundation...

10.1109/comst.2024.3395358 article EN IEEE Communications Surveys & Tutorials 2024-01-01

Unmanned aerial vehicles (UAVs) deployed as a swarm can offer flexible and cost-efficient solution for surveillance missions in large-scale adversarial environments. UAV swarms possess superior real-time capabilities detecting time-sensitive targets with speed security, surpassing alternative techniques such satellites ground-based sensors. However, the area problem scenarios using necessitates careful consideration of factors positioning, flight attitudes, antenna directionality, threat...

10.1109/tvt.2023.3318641 article EN IEEE Transactions on Vehicular Technology 2023-09-28

Contention-based distributed synchronization (CDS) protocols, which first standardized in the IEEE 802.11 power saving mode (PSM), have been widely used wireless ad hoc networks. The time required to complete progress, i.e., efficiency, is obviously an important performance metrics for CDS protocols. However, few attempts focusing on modeling and analyzing efficiency of In this letter, we present a 2-D Markov chain model scheme PSM. purpose our determine relationship between process value...

10.1109/lcomm.2016.2633247 article EN IEEE Communications Letters 2016-11-29

The transmit power control schemes allow the wireless nodes to select a minimum required from all available levels access medium. In this paper, we focus on analysing saturation throughput performance of IEEE 802.11 DCF networks with heterogeneous node and capture effect. We first analyse effect among packets sent at different derive analytical expression probability. Then, propose three-dimensional Markov chain model backoff procedure performed by tagged sending under condition levels,...

10.1504/ijahuc.2017.085716 article EN International Journal of Ad Hoc and Ubiquitous Computing 2017-01-01

Radio frequency identification (RFID) has been widely used in various areas, such as logistics, healthcare, manufacture and so on. However, tag collision problem greatly affects the performance of RFID systems by reducing bandwidth utilization increasing delay etc. In this paper, we propose a dynamic query tree anti-collision (DQTA) protocol, which dynamically adjusts number subgroups each slot. Based on consecutive colliding bits response k, DQTA splits tags into 2^k subgroups. Dividing...

10.1109/icpads47876.2019.00115 article EN 2019-12-01

The transmit power control schemes allow the wireless nodes to select a minimum required from all available levels access medium. In this paper, we focus on analysing saturation throughput performance of IEEE 802.11 DCF networks with heterogeneous node and capture effect. We first analyse effect among packets sent at different derive analytical expression probability. Then, propose three-dimensional Markov chain model backoff procedure performed by tagged sending under condition levels,...

10.1504/ijahuc.2015.10001738 article EN International Journal of Ad Hoc and Ubiquitous Computing 2015-01-01

In wireless ad hoc networks, a suitable MAC protocol can provide better QoS (Quality of Service) guarantees. However, in modern warfare environment, the combat missions change rapidly. A fixed may be not for highly changeable environments and missions. To solve this problem, we propose neural network-based protocol-selection mechanism to select optimal new based on real-time environment information battlefield, i.e., intelligent selection (IS) algorithm. IS, prepare empirical data set with...

10.1109/icct46805.2019.8947101 article EN 2019-10-01

Directional antennas have numerous advantages over omnidirectional in CSMA/CA ad hoc networks. However, estimating the available bandwidth of a flow medium access process such network is very challenging. In this paper, we present passive estimation algorithm for directional networks, termed PABE-D. The consists two phases, i.e., preliminary and refined phases. phase, transmission/reception duration each beam node link are obtained by analyzing both sender receiver. analyze effect hidden...

10.1109/msn48538.2019.00032 article EN 2019-12-01

Using directional antennas in wireless Ad hoc networks has many superiorities, including reducing interference, extending transmission range, and increasing space division multiplexing.However, introduces two problems: deafness hidden terminals problems.We observe that these problems result saturation throughput disparity among the competing flows CSMA/CA based bring challenges for modeling of flows.In this article, we concentrate on how to model analyze different networks.We first divide...

10.3837/tiis.2021.04.007 article EN KSII Transactions on Internet and Information Systems 2021-04-30

This paper proposes TIE-MAC, tolerable interference estimation-based concurrent medium access control protocol for wireless local area network (WLAN) mesh networks. The goal is to increase spatial reuse, achieve high throughput and reduce average energy consumption through exploiting transmissions among neighbouring nodes. TIE-MAC confirms that the of receiver plays a key role in determining efficiency transmission scheduling, puts forward novel estimation mechanism, enabling receivers...

10.1504/ijahuc.2015.073437 article EN International Journal of Ad Hoc and Ubiquitous Computing 2015-01-01
Coming Soon ...