- Energy Efficient Wireless Sensor Networks
- Mobile Agent-Based Network Management
- Security in Wireless Sensor Networks
- Underwater Vehicles and Communication Systems
- Network Security and Intrusion Detection
- IoT and Edge/Fog Computing
- Mobile Ad Hoc Networks
- Energy Harvesting in Wireless Networks
- Indoor and Outdoor Localization Technologies
- Software System Performance and Reliability
- Cloud Computing and Resource Management
- Privacy-Preserving Technologies in Data
- Satellite Communication Systems
- Network Traffic and Congestion Control
- Complex Network Analysis Techniques
- Advanced Computational Techniques and Applications
- Anomaly Detection Techniques and Applications
- Advanced Wireless Communication Techniques
- Advanced Battery Materials and Technologies
- Peer-to-Peer Network Technologies
- Error Correcting Code Techniques
- Advanced Malware Detection Techniques
- Fault Detection and Control Systems
- Distributed and Parallel Computing Systems
- Service-Oriented Architecture and Web Services
Shenyang Ligong University
2015-2025
International Bamboo and Rattan Organization
2025
University of Chinese Academy of Sciences
2010-2024
Beijing University of Technology
2016-2024
Baoji University of Arts and Sciences
2022-2024
Zhengzhou University
2023-2024
Shandong First Medical University
2024
Stanford University
2020-2024
Henan University
2022-2023
Taiyuan University of Technology
2023
Rechargeable solid-state lithium ion batteries (SSLB) require fast conducting solid electrolytes (SEs) to enable high charge and discharge rates. Li7P3S11 is a particularly promising electrolyte, exhibiting very room temperature conductivities of up 17 mS·cm–1 ductility, allowing transport through the bulk intimate contact surface electrodes. Here we present novel hot-press setup that facilitates synthesis by combining in situ electrochemical impedance spectroscopy (EIS) with simultaneous...
The localization of sensor nodes is a significant issue in wireless networks (WSNs) because many applications cannot provide services without geolocation data, especially during disaster management. In recent years, promising unknown-nodes positioning method has been developed that localizes unknown nodes, employing GPS-enabled mobile anchor node moving the network, and broadcasting its location information periodically to assist localization. contrast most studies on path planning assume...
Underwater acoustic sensor networks (UASNs) are widely used in a variety of ocean applications, such as exploring resources or monitoring abnormal environments. However, data collection schemes UASNs significantly different from those wireless due to high power consumption, severe propagation delay, and so on. Furthermore, previous research has overlooked practical conditions, characteristics water delamination energy constraint on autonomous underwater vehicles (AUVs). In this paper,...
In this paper, a high-availability data collection scheme based on multiple autonomous underwater vehicles (AUVs) (HAMA) is proposed to improve the performance of sensor network and guarantee high availability service. Multi-AUVs move in their trajectory predefined. The nodes near an AUV directly send while others transmit that are closer trajectory. Malfunction discovery repair mechanisms applied ensure operates appropriately when fails communicate with collecting data. Compared existing...
Energy constraint is a critical issue in the development of wireless sensor networks (WSNs) because nodes are generally powered by batteries. Recently, rechargeable (WRSNs), which introduce mobile chargers (MCs) to replenish energy for nodes, have been proposed resolve root cause limitations WSNs. However, existing charging algorithms cannot fully leverage mobility MCs unity between replenishment process and data collection has yet be realized. Thus, this paper, joint algorithm WRSNs...
Wireless rechargeable sensor networks (WRSN) have attracted considerable attention in recent years due to the constant energy supply for battery-powered nodes. However, current technologies only enable mobile charger replenish one single node at a time. This method has poor scalability and is not suitable large-scale WRSNs. Recently, wireless transfer technology based on multi-hop made great progress. It provides fundamental support alleviate problem. In this paper, replenishment problem...
Aiming at the problems of low mobility, location accuracy, high communication overhead, and energy consumption sensor nodes in underwater acoustic networks, MPL (movement prediction location) algorithm is proposed this article. The divided into two stages: mobile node location. In phase, a TOA (time arrival)-based ranging strategy first to reduce overhead consumption. Then, after dimension reduction processing, grey wolf optimizer (GWO) used find optimal secondary with accuracy. Finally,...
In this paper, an autonomous underwater vehicle (AUV) location prediction (ALP)-based data collection scheme (ALP) has been proposed to overcome high and unbalanced energy consumption for wireless sensor networks. our scheme, AUV travels around the network, follows a predefined trajectory, collects from nodes. The nodes near trajectory send their directly, while others neighbors that are closer trajectory. To "hot region" problem, which means of consume faster die early, adjustment mechanism...
A heterogeneous ring domain communication topology with equal area in each is presented this paper an effort to solve the energy balance problem original IPv6 routing protocol for low power and lossy networks (RPL). new clustering algorithm event-driven cluster head rotation mechanism are also proposed based on topology. The information announcement message acknowledgment were designed according RFC RPL structure. An energy-efficient (E2HRC) wireless sensor then corresponding algorithms...
Disadvantages inherent to existing guidance systems for scenic areas can be reduced a partial point traversal problem in the connected graph. This paper presents an intelligent, ant-colony-based path planning algorithm that is applicable areas. The proposed modifies ants' ending tour achieve of graph by eliminating restriction ant colony taboo table. A temporary weight matrix introduced so avoids repeated selection smaller-weight paths, improving its overall efficiency. experimental results...
Source location privacy is a major problem in wireless sensor networks (WSNs). WSNs are usually deployed random areas with no protection. The source reveals valuable information about targets. If an adversary locates the node by analyzing traffic mode, target can be easily attacked. In this paper, scheme based on cloud using multi-sinks (CPSLP) proposed to address issue of privacy. authors propose that changes packet destinations randomly each transmission. addition, multiple sinks adopted...
While enjoying the convenience brought by Internet of Things (IoT), people also encounter many problems with wireless sensor networks (WSNs), foundation IoT. Security are especially concern. In this article, we focus on location privacy, which is a major security issue in WSNs, and propose k-means cluster-based privacy (KCLP) protection scheme for To protect source location, fake nodes used to simulate function real sources. Then, sink specific transmission pattern utilized. order improve...
The fault prediction problem for modern industrial equipment is a hot topic in current research. So, this paper first proposes dynamic cuckoo search algorithm. algorithm improves the step size and discovery probability. Then, it introduces change trend of fitness function value into update formula to balance speed accuracy. At same time, initial global larger, while local smaller latter part In process discovering optimal solution, probability preserving offspring with good increased,...
In wireless sensor networks, cross-layer optimization is a hot topic. order to balance energy consumption clustering based model established in this paper. model, the network layer could get related information from physical and datalink effectively route packets. Based on an energy-efficient ring algorithm proposed new routing called Leach-Cross-Layer Optimization (CLO) also for monitoring domain. This Leach-CLO typical Leach algorithm. The experiment results show that efficiently networks...
With the recent developments of wireless sensor networks (WSNs), computing and communication have experienced huge advancement. Meanwhile, security has not received same attention to go along with such developments. In this paper, we focus on source location privacy problem in WSNs, a hot research topic security, propose probabilistic (PSLP) protection scheme for WSNs. A more powerful adversary, which can use hidden Markov model estimate state source, is considered study. To cope type...
Wireless sensor networks (WSNs) are an important core of the Industrial Internet Things (IIoT). rechargeable (WRSNs) that charged by mobile chargers (MCs), and can achieve self-sufficiency. Therefore, development WRSNs has begun to attract widespread attention in recent years. Most existing energy replenishment algorithms for MCs use one or more serve whole network WRSNs. However, a single MC is not suitable large-scale environments, multiple make cost too high. Thus, this paper proposes...
Due to the harsh deployment environment of underwater coustic sensor networks (UASNs), a reliable and energy-saving routing algorithm has always been an important challenge hot topic. A Nonuniform clustering (NC) is designed first in which clusters are generated according different node densities. Based on NC, backbone acoustic network formed UASNs. To guarantee reliability data transmission network, NC based virtual gravitational potential field (NC_RVGPF) proposed. This algorithm: 1)...