Zhiyong Wang

ORCID: 0009-0009-9717-0826
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Caching and Content Delivery
  • Mobile Ad Hoc Networks
  • Opportunistic and Delay-Tolerant Networks
  • Mobile Agent-Based Network Management
  • Peer-to-Peer Network Technologies
  • IoT and Edge/Fog Computing
  • Mathematical and Theoretical Epidemiology and Ecology Models
  • Software-Defined Networks and 5G
  • Video Surveillance and Tracking Methods
  • Structural Response to Dynamic Loads
  • Neural Networks Stability and Synchronization
  • Indoor and Outdoor Localization Technologies
  • Sparse and Compressive Sensing Techniques
  • Network Security and Intrusion Detection
  • Spinal Fractures and Fixation Techniques
  • Education and Work Dynamics
  • Innovative concrete reinforcement materials
  • Matrix Theory and Algorithms
  • Higher Education and Teaching Methods
  • Differential Equations and Boundary Problems
  • Advanced Database Systems and Queries
  • Mobile Crowdsensing and Crowdsourcing
  • Smart Grid Security and Resilience
  • Differential Equations and Numerical Methods
  • Scoliosis diagnosis and treatment

Chinese University of Hong Kong
2024

Taiyuan University of Technology
2024

Hubei University of Science and Technology
2022-2023

Anhui University
2023

Beijing University of Posts and Telecommunications
2020

Wuhan University
2014-2016

Thoracolumbar kyphosis in ankylosing spondylitis poses multiple hazards to patients. To optimize the surgical correction of internal fixation, biomechanical characteristics and corrective efficacy different strategies for were analyzed based on finite element analysis. The outcome revealed that there significant deformational displacement differences stress between orthopedic fixation schemes. Cortical bone track screw significantly reduced deformation flexion-extension lateral flexion...

10.62617/mcb1478 article EN Molecular & cellular biomechanics 2025-03-24

With the growing number of smartphone users, peer-to-peer ad hoc data forwarding is expected to occur more often. The performance improves when knowledge regarding topology and social context information networks. In this paper, we introduce a new metric for based on information, in which node's used calculate similarity utility between node destination, connection networks betweenness centrality node. We combine two functions derive strength among users their importance. also present...

10.1109/compem.2016.7588639 article EN 2016-02-01

To explore and compare the failure modes, deformation behaviors, load-bearing capacities of single-edge notched (SEN) beams strengthened with carbon fiber-reinforced polymer (CFRP) steel bars, static dynamic three-point bending tests on both types concrete have been carried out in this study. During tests, electro-hydraulic servo machine served as a loading device to apply pressure CFRP reinforced (RC) beams. impact experiments, different velocities were imparted by adjusting drop hammer's...

10.3390/ma17102216 article EN Materials 2024-05-08

In this paper, the game theoretical analysis method is presented to provide optimal strategies for anomaly-based intrusion detection systems (A-IDS). A two-stage model established represent interactions between attackers and defenders. first stage, players decide do actions or keep silence, in second attack intensity threshold are considered as two important strategic variables defenders, respectively. The existence, uniqueness, explicit computation of Nash equilibrium analyzed obtained by...

10.1155/2020/8824163 article EN cc-by Security and Communication Networks 2020-09-04

Because the phases of policy management in Mobile ad hoc network (MANET) and procedure context awareness cognitive wireless are very unclear complicated.We aim to provide a useful description way analyze mechanism policy-based (PBNM) MANET, structure cross-layer components context-aware distributed PBM system distinctly.In this paper, we propose novel Colored Time Petri Net (CTPN) Model describe awareness.According definition CTPN self-management policies is divided into 3 phases,...

10.2991/scict-14.2014.39 article EN cc-by-nc Advances in intelligent systems research/Advances in Intelligent Systems Research 2014-01-01

Routing in disconnected delay-tolerant mobile ad hoc networks (MANETs) continues to be a challenging issue. Several works have been done address the routing issues using social behaviors of each node. Mobile Social Networks (MSNs) are increasingly popular type Delay Tolerant (DTNs). The performance improves when knowledge regarding expected topology and context information networks. In this paper, we introduce new metric for data forwarding based on information, which node’s is used...

10.14257/ijsh.2016.10.6.01 article EN International Journal of Smart Home 2016-06-30

Distributed optimization is a powerful paradigm to solve various problems in machine learning over networked systems. Existing first-order methods perform cheap gradient descent by exchanging information per iteration only with single-hop neighbours network. However, many agent networks such as sensor and robotic networks, it prevalent that each can interact other agents multi-hop communication. Therefore, distributed method an important but overlooked topic clearly needs be developed....

10.1109/access.2023.3297112 article EN cc-by-nc-nd IEEE Access 2023-01-01

Data information is important strategic enterprise resources, rational and effective use of the correct data to guide business leaders make right decision-making, enhance competitiveness enterprises. The quality integration, very speaking enterprise, innovation development power. In order improve efficiency we must permit multiple applications share computing resources. grid technology may step isomerism platform resource carry on work distribution out, uses existing hardware property...

10.5539/cis.v2n4p175 article EN cc-by Computer and Information Science 2009-10-15

This paper proposes and evaluates a new sensor data distribution system, based on the content network technology. system is an overlay XML-based content-based routing over plain unicast IP network. As application of prototype we have selected Live E! project, whose object collecting weather information from various stations distributing these digital to appropriate receiver nodes using multicast service. We designed (1) representation format with XML, (2) algorithm XPath. implemented...

10.1109/saint-w.2007.27 article EN 2007-01-01

Aiming at the problems of sensor accuracy, LAN and WAN communication, system scheduling, cost expenditure so on, a mountain forest edge early warning control based on AIOT is proposed. The uses multi node sensors to collect environment information, adopts curve fitting method ensure accuracy collected data. Based 4G/NB-IOT/WIFI other communication modules, it MQTT protocol COAP upload data cloud platform. platform receives stores security stability Through middleware transition Internet...

10.1109/iccc56324.2022.10066010 article EN 2022-12-09
Coming Soon ...