- Mobile Ad Hoc Networks
- Cooperative Communication and Network Coding
- Opportunistic and Delay-Tolerant Networks
- Software-Defined Networks and 5G
- Caching and Content Delivery
- Wireless Networks and Protocols
- Wireless Communication Networks Research
- IoT and Edge/Fog Computing
- Advanced Wireless Network Optimization
- Vehicular Ad Hoc Networks (VANETs)
- Energy Efficient Wireless Sensor Networks
- Network Security and Intrusion Detection
- Game Theory and Applications
- Advanced Data Storage Technologies
- Molecular Communication and Nanonetworks
- Network Traffic and Congestion Control
- Advanced Wireless Communication Techniques
- IoT Networks and Protocols
- Advanced MIMO Systems Optimization
- Evolutionary Psychology and Human Behavior
- Neural Networks Stability and Synchronization
- Microwave Imaging and Scattering Analysis
- IPv6, Mobility, Handover, Networks, Security
- Advanced SAR Imaging Techniques
- Recommender Systems and Techniques
Institute of Information Engineering
2024
University of Chinese Academy of Sciences
2024
Changchun University of Science and Technology
2023
Shandong Normal University
2019-2023
Northwestern Polytechnical University
2018-2023
Qiqihar Medical University
2022
Huawei Technologies (Canada)
2014-2020
Chengdu University of Information Technology
2020
Hebei Science and Technology Department
2013-2018
Communications Technology Laboratory
2018
Software defined networking (SDN) decouples control plane functionality from the data and features presence of programmable dumb network devices, which have no or little intelligence take commands a central controller at plane. The is responsible for controlling hardware optimizing operation. Centralized optimization impractical infeasible when becomes too large in size loading. Distributed comes into play under this circumstance. Fully distributed requires local individual elements, against...
Future 5G wireless networks will face new challenges, including increasing demand on network capacity to support a large number of devices running applications requiring high data rates and always-on connectivity; immensely diverse service requirements characteristics; supporting the emerging business models in market be more open. New challenges drive solutions require different strategies deployment, management, operation future compared those current networks. One key objectives is...
The overhead caused by broadcast schemes cannot be neglected in mobile ad hoc networks. It is known that the probabilistic scheme an effective approach to reduce overhead, which nodes forward packets with a probability redundant retransmissions. In hostile environments, malicious degrade network efficiency, and they should prevented from route discovery data transmission. this case, routing forwarded are redundant. This paper presents Trust-based Probabilistic Broadcast (TPB) focusing on...
Cognitive systems are dynamical that adapt their behavior to achieve sophisticated outcomes in nonstationary environments. This paper considers two cognitive aspects regarding the problem of distributed caching with limited capacity a content distribution network serves YouTube users multiple edge servers: first, theory revealed preference from microeconomics is used estimate human utility maximization behavior. In particular, nonparametric learning algorithm provided request probability...
Machine to machine (M2M) traffic is characterized as low-rate, small-packet with correlated transmissions. In this paper, we propose a two-phase control mechanism (2PTC) for carrying M2M in the future fifth generation (5G) networks. mechanism, packets from each are directed virtual serving gateway associated machine, which receives and aggregates multiple machines forwards aggregate sink. The first communication phase takes place through simple single-path routing technique, while second...
MAC (Media Access Control) protocols for wireless Ad hoc networks with directional antennas have been studied to increase network capacity years, since can offer long-range communications and enhance the possibility of spatial multiplexing. This paper proposes a TDMA (Time Division Multiple Access)-based algorithm antennas, which is named SDVCS (Slotted Directional Virtual Carrier Sensing). The in this similar method DTRA [1], [2] while performing neighbor discovery, but defers quite lot...
A hybrid spectrum access strategy which is different from traditional underlay or overlay proposed. In this strategy, the secondary users cooperatively sense states of primary in sharing band. Based on sensing results and an additional requirement bit error rate, transmitter adapts its transmit power modulation level. Specifically, if user detected to be inactive, allocates subject a peak constraint. Else active, average interference constraint would also imposed protect transmission. To...
Due to the characteristics of mobile ad-hoc networks (MANETs) such as distributed self-organizing nature and multi-hops communication, bio-inspired approaches proposed address challenges in these networks. Like all communication networks, one major MANETs is security pro
In this paper, we formulate and study a capacity allocation game between set of receivers (players) that are interested in receiving multicast data (video/multimedia) being streamed from server through multihop network. We consider fractional streaming, where the stream source (origin-server) to any particular receiver (end-user) can be split over multiple paths. The selfish noncooperative, but must collaboratively purchase capacities links network, as necessary for delivery individual...
Previous studies have found that P1 and P2 components were more sensitive to configural featural face processing, respectively, when attentional resources sufficient, suggesting processing follows a coarse-to-fine sequence. However, the role of working memory (WM) load in time course is poorly understood, especially whether it differs during encoding retrieval stages. This study employed delayed recognition task with varying WM spatial frequency (SF). Our behavioral ERP results showed...
As mobile ad hoc networks (MANETs) grow more popular and are deployed as solutions in various applications such road safety (vehicular networks), wildlife tracking (wireless sensor networks) device-to-device communications 5G, the need for efficient routing that is robust against malfunctioning or malicious network nodes increasing. We propose a security aware fuzzy enhanced ant colony optimization (SAFEACO) algorithm, which makes use of logic module to identify misbehaving exclude them from...
In Mobile Ad hoc NETworks (MANETs), characteristics such as increased complexity with large scaled network, dynamic topology, absence of infrastructure and centralized control need for survivability unpredicted failures pose significant challenges to these environments. The presence unpredictable behavior in mobile ad environment makes the security provision a very challenging task. Therefore, self-organizing self-healing algorithms are appropriate autonomous operation Recently there has...
Mobile Ad hoc NETtworks (MANETs) are infrastructureless and self-configuring networks which consist of wireless mobile devices. Due to these properties, routing in such is a challenging task. Developing highly efficient protocols for MANETs an important issue, with solutions havi
In this work we focus on investigating the learning phase of an autonomous authentication mechanism. Through a series simulation, experimental best cutoff point and aggression threshold values for different network size were calculated. test phase, those found are proved by
MTC services are undergoing rapid increase; billions of connections can be anticipated in a few years. When supporting telecommunications networks, traffic characteristics and its unique service requirements should exploited order to optimize resource utilization offer satisfactory quality for all devices. In this paper, we present an Information-Centric Virtual Network Architecture (IC-VNA) that allows meticulously combine both the customer operator specific virtual functions along with...
It is known that a typical hyper-spectral image consists of sequence wavelength bands and each band illustrates two-dimensional image. This paper presents HSI classification method including two approaches. The first approach probabilistic algorithm for object based on the illustrated by single bands, respectively, which generate registered images. Since images (HSIs) obtained air-borne or satellite-borne remote sensors has limited size, may affect accuracy, especially small objects due to...
Network coding (NC) is a promising method used to achieve the channel capacity and enhance reliability of multicast networks. However, general wireless networks based on NC are facing big problems such as long delays large computational complexities. We propose network Batched sparse (BATS) codes which can efficiently solve these problems. Since fountain also improve thoroughly compare performance BATS with that under our proposed Simulation findings indicate scheme results in much less...
Traffic identification is a vital technology in network security. Currently, the of mobile traffic based on downlink data air interface. This because it difficult to synchronize uplinks and obtain uplink real-world environments. We propose utilize communication sideband resource occupancy for identification. method captures IQ draws time-frequency map. In order reduce computational complexity, we only use portion map Based different colors reflected by users' transmitting power, distinguish...
We consider traffic engineering (TE) in networks where quality of service (QoS)-guaranteed as well best effort (BE) services are present. propose a joint TE optimization technique for both QoS and BE using multi-objective framework. show that results more efficient network resource usage compared to sequential methodology decision (finding paths splitting among paths) is made QoS-guaranteed first by assigning appropriate resources then according remaining resources. Furthermore, we demand...