- UAV Applications and Optimization
- Opportunistic and Delay-Tolerant Networks
- Distributed Control Multi-Agent Systems
- Cognitive Radio Networks and Spectrum Sensing
- Cooperative Communication and Network Coding
- Mobile Ad Hoc Networks
- Advanced MIMO Systems Optimization
- Energy Efficient Wireless Sensor Networks
- Advanced Decision-Making Techniques
- IoT and Edge/Fog Computing
- Water Quality Monitoring Technologies
- Geochemistry and Geologic Mapping
- Simulation and Modeling Applications
- Vehicular Ad Hoc Networks (VANETs)
- Microstructure and Mechanical Properties of Steels
- Magnetic Properties and Applications
- Video Surveillance and Tracking Methods
- Robotic Path Planning Algorithms
- Optimization and Variational Analysis
- Age of Information Optimization
- Air Traffic Management and Optimization
- Anomaly Detection Techniques and Applications
- Precipitation Measurement and Analysis
- Global Public Health Policies and Epidemiology
- RFID technology advancements
Peking University
2025
National University of Defense Technology
2014-2025
National Health and Family Planning Commission
2025
Anhui University of Technology
2009-2024
Yunnan University
2024
Yunnan Institute of Environmental Sciences
2024
China United Network Communications Group (China)
2023
Gansu Provincial Hospital
2021
Second Affiliated Hospital of Zhejiang University
2021
Jilin University
2021
Due to the flying nature of unmanned aerial vehicles (UAVs), it is very attractive deploy UAVs as base stations and construct airborne networks provide service for on-ground users at temporary events (such disaster relief, military operation, so on). In constructing UAV networks, a challenging problem how multiple on-demand coverage while same time maintaining connectivity among UAVs. To solve this problem, we propose two algorithms: centralized deployment algorithm distributed motion...
Unmanned aerial vehicle (UAV) networks are playing an important role in various areas due to their agility and versatility, which have attracted significant attentions from both the academia industry recent years. As integration of embedded systems with communication devices, computation capabilities control modules, UAV network could build a closed loop data perceiving, information exchanging, decision making final execution, tightly integrates cyber processes into physical devices....
Exploiting unmanned aerial vehicles (UAVs) as flying base stations (BSs) to assist the terrestrial cellular networks is promising in 5G and beyond. Despite inherent potentials, one challenging problem how optimally deploy multiple UAVs achieve on-demand coverage for ground user equipment (UE). In this article, we model deployment minimizing number of maximizing load balance among them, which subject two main constraints, i.e., should form a robust backbone network they keep connected with...
Due to the flexibility in 3-D space and high probability of line-of-sight (LoS) air-to-ground communications, unmanned aerial vehicles (UAVs) have been considered as means support energy-efficient data collection. However, emergency applications, mission completion time should be main concerns. In this article, we propose a UAV-aided collection design gather from number ground users (GUs). The objective is optimize UAV's trajectory, altitude, velocity, links with GUs minimize total time....
With the development of wireless communication and Internet Things (IoT), there are massive devices that need to share limited spectrum resources. Dynamic access (DSA) is a promising paradigm remedy problem inefficient utilization brought upon by historical command-and-control approach allocation. In this article, we investigate distributed DSA for multiusers in typical multichannel cognitive radio network. The formulated as decentralized partially observable Markov decision process...
With innovative applications of unmanned aerial vehicle (UAV) ad hoc networks in various areas, their demands on broad bandwidth, large capacity and low latency become prominent. The combination millimeter wave, directional antenna time division multiple access techniques, which enables concurrent transmissions, is promising to deal with it. In this paper, we study the resource allocation problem UAV networks. Specifically, slot assignment, boresight transmit power are jointly optimized...
Due to the flying nature of Unmanned Aerial Vehicles (UAVs), it is very attractive deploy UAV network as aerial base stations, relays or scouters. However, management airborne not easy due following two facts. First, massive information exits in networks including flight and control UAVs, protocol stack network, sensing obtained from ground terminals. Second, wireless links topologies are changing result motion. How manage utilize information, deal with intermittent links, at same time...
With the development of unmanned aerial vehicles (UAVs), currently it is a prominent problem to support large-scale UAV networking. Millimeter wave (mmWave) with directional communication offers advantage high-speed anti-jamming transmission, while sub-6 GHz omni-directional demonstrates better performance in maintaining and controlling network. In this research, Dual-frequency Cooperation MAC protocol (DC-MAC) designed integrate both advantages from mmWave communication. DC-MAC, criterion...
Abstract Utilizing innovative methods to advance the research and development (R&D) of health products enhance their accessibility has become crucial achieving universal coverage, addressing public emergencies, promoting population wellbeing. However, structural contradictions do exist in supply demand Association Southeast Asian Nations (ASEAN). With joint support Ministry Science Technology China, Education, China-ASEAN Center, Peking University established Cooperation Center for...
To improve the user experience, an increasing number of mobile applications offload their computing tasks to servers with powerful capabilities. The fog radio access network (F-RAN) incorporates concept "fog computing" into architecture, endowing edge computing, storage, communication and control functions. In this paper, we consider a multiple point (F-AP) multiuser F-RAN, where each generates two different tasks: computation. satisfy diverse quality service requirements users, jointly...
In order to study the effects of rare earth La–Ce alloying treatment on characteristics inclusions in non-oriented silicon steels, industrial experiments were conducted studying composition, morphology, size and quantity W350 steel during RH (Ruhrstahl-Hereaeus) refining process tundish process, after treatment. The products analyzed by means ICP-MS (inductively coupled plasma mass spectrometry), SEM/EDS (scanning electron microscope-energy dispersive ASPEX (automated inclusion analysis)....
The cold-rolled non-oriented silicon steel sheets with a Si content of 2.4 wt.%, produced by continuous and reversible cold rolling, were used as the experimental material. effects annealing temperature on microstructure, texture, magnetic properties studied optical microscopy, an X-ray diffractometer, property measuring instrument. results showed that dominant texture components at surface both almost same, i.e., α γ fibers. After 920 °C for 30 s, complete recrystallization occurred in...
When monitoring the environment with wireless sensor networks, data sensed by nodes within event backbone regions can adequately represent events. As a result, identifying is key issue for networks. With this aim, we propose distributed and morphological operation-based collection algorithm. Inspired use of erosion dilation on binary images, proposed algorithm calculates structuring neighbors each node based element, it produces an event-monitoring map less cost then determines whether to...
Intrusion Detection System (IDS) typically generates a huge number of alerts with high false rate, especially in the large scale network, which result challenge on efficiency and accuracy network attack detection. In this paper, an entropy-based method is proposed to analyze numerous IDS detect real attacks. We use Shannon entropy examine distribution source IP address, destination threat datagram length alerts; employ Renyi cross fuse vector attack. experiment, we deploy Snort monitor part...
Detection and parameter retrieval of aircraft wake vortices have attracted much attention in air traffic management related fields. In foggy weather conditions, the scattering a vortex is mainly determined by fog drops carried velocity field wake. By taking drops' property weak inertia into account, new theoretical method to retrieve circulation generated proposed this paper. method, an upward-looking monostatic radar employed obtain Doppler velocities cells along symmetric line vortex, then...
Microsatellite instability (MSI) is a common genomic alteration in colorectal cancer, endometrial carcinoma, and other solid tumors. MSI characterized by high degree of polymorphism microsatellite lengths owing to the deficiency mismatch repair system. Based on degree, can be classified as instability-high (MSI-H) stable (MSS). predictive biomarker for immunotherapy efficacy advanced/metastatic tumors, especially cancer patients. Several computational approaches based target panel sequencing...
Abstract. Tobacco grading is the first step in transfer of tobacco leaves from agricultural products to commodities and key determining quality tobacco. Manual conventionally used for grading. However, it time-consuming, expensive, may require specialized labor. To overcome these limitations, a method grade identification based on machine vision proposed this article. Based fuzzy pattern recognition algorithm, leaf samples model set prediction could be classified by extracting appearance...
This article is devoted to sensitivity analysis for vector equilibrium problems under functional perturbations. We show that the solution mapping upper semicontinuous. Sufficient conditions lower semicontinuity and Hölder continuity of are established. Finally, we derive some corollaries special cases as examples.