- Distributed and Parallel Computing Systems
- Seismic Waves and Analysis
- Mobile Agent-Based Network Management
- IPv6, Mobility, Handover, Networks, Security
- Peer-to-Peer Network Technologies
- Data Quality and Management
- Network Security and Intrusion Detection
- Caching and Content Delivery
- Underwater Vehicles and Communication Systems
- Bayesian Modeling and Causal Inference
- Mobile Ad Hoc Networks
- Advanced Decision-Making Techniques
- Advanced Malware Detection Techniques
- Advanced Computational Techniques and Applications
- Ionosphere and magnetosphere dynamics
- Robotic Mechanisms and Dynamics
- Pulsars and Gravitational Waves Research
- Model-Driven Software Engineering Techniques
- GNSS positioning and interference
- Geophysics and Sensor Technology
- Robotic Path Planning Algorithms
- Opportunistic and Delay-Tolerant Networks
- Cloud Data Security Solutions
- Distributed systems and fault tolerance
- Software System Performance and Reliability
International Centre for Theoretical Physics Asia-Pacific
2025
Lanzhou University of Technology
2012-2022
Shaanxi Normal University
2020
Beijing Information Science & Technology University
2018
Shanghai Jiao Tong University
2003
Caching the popular files in mobile terminal equipments and transferring those via Device-to-Device (D2D) communication technology can offload traffic from Base Station(BS) over edge computing wierless network. The user equipments(UE) are D2D links may drop any instant. In addition, UEs carried by people with social attributes. Considering information about terminals when we study caching content deployment strategy improve efficiency. order to reduce probability of requesting BS, design an...
In space-based gravitational wave observatories such as Taiji, LISA, and TianQin, data gaps are inevitable due to mission design, implementation, the long duration of observations. These degrade quality cause spectral leakage during Fourier transformations. Since ringdown signals a key scientific objective for these observatories, it is crucial assess impact on signal This study employs LISA's science requirement maintaining duty cycle at least 75% evaluate worst-case gaps, uses massive...
Bayesian networks is a widely used formalism for representing uncertain knowledge in artificial intelligence. It has become the standard methodology construction of systems relying on probabilistic and been applied variety real-worlds tasks. In this work, we first present an index system evaluating network information resource according to study predecessors as well our own views. addition, method using proposed construct assessment model effectively aggregate expertspsila experience,...
Aiming at multiple-replica data integrity check in cloud storage environment, a Provable Data Possession (PDP) algorithm named MRPDP-BAT is proposed the paper, which composed of seven phases: key generation, replica block signature, challenge information evidence verification, and dynamic operation. In algorithm, tag generated by vector dot product with less computation, replacing original complex power exponent tag. Besides, it combined multi branch authentication tree to support...
With the advancement of modern technology and improvement level social productivity, people are paying more attention to reduction labor intensity change working environment. At same time, in order explore application multisensor fusion design operation algorithm manipulator mechanical system, we first introduced big data fusion, proposed algorithm, analyzed gradient descent method, auxiliary filtering Kalman filter. Finally, rated motion parameters each axis motor analyzed, at state under...