- Cooperative Communication and Network Coding
- Distributed and Parallel Computing Systems
- Mobile Ad Hoc Networks
- Video Coding and Compression Technologies
- Energy Efficient Wireless Sensor Networks
- Wireless Networks and Protocols
- Scientific Computing and Data Management
- Network Security and Intrusion Detection
- Wireless Communication Security Techniques
- Advanced Wireless Network Optimization
- Parallel Computing and Optimization Techniques
- Security in Wireless Sensor Networks
- Indoor and Outdoor Localization Technologies
- Software-Defined Networks and 5G
- Advanced MIMO Systems Optimization
- Security and Verification in Computing
- Value Engineering and Management
- Sparse and Compressive Sensing Techniques
- Information and Cyber Security
- Peer-to-Peer Network Technologies
- Smart Grid and Power Systems
- IPv6, Mobility, Handover, Networks, Security
- Energy Harvesting in Wireless Networks
- Image Enhancement Techniques
- Model-Driven Software Engineering Techniques
Jilin Electric Power Research Institute (China)
2022
China Information Technology Security Evaluation Center
2018-2020
China Electronics Technology Group Corporation
2019-2020
Zhejiang University of Technology
2019
General Motors (United States)
2011
Beihang University
2011
Shanghai University
2010
Wuxi Municipal Product Quality Supervision and Inspection Institute
2010
Beijing University of Posts and Telecommunications
2008-2009
Xiamen University
2009
Robust streaming of video over 802.11 wireless local area networks poses many challenges, including coping with bandwidth variations, data losses, and heterogeneity the receivers. Currently, each network layer (including physical layer, media access control (MAC), transport, application layers) provides a separate solution to these challenges by providing its own optimized adaptation protection mechanisms. However, this layered strategy does not always result in an optimal overall...
For wireless sensor networks (WSNs), many factors, such as mutual interference of links, battlefield applications and nodes exposed to the environment without good physical protection, result in being more vulnerable be attacked compromised. In order address this network security problem, a novel trust evaluation algorithm defined NBBTE (Node Behavioral Strategies Banding Belief Theory Trust Evaluation Algorithm) is proposed, which integrates approach behavioral strategies modified evidence...
We propose a video streaming system that uses many ordinary computers (peers) as servers, which is less costly and more scalable than using single or few dedicated servers. To circumvent frequent peer disconnects limited up-link bandwidth, each coded into multiple descriptions, are distributed over peers. The serves client request by descriptions of the requested from separate Using MD-FEC coding scheme, simple models for disconnects, reconnects searching replacement serving peers after...
In wireless sensor networks (WSNs), there are numerous factors that may cause network congestion problems, such as the many-to-one communication modes, mutual interference of links, dynamic changes topology and memory-restrained characteristics nodes. All these result in a being more vulnerable to congestion. this paper, cross-layer active predictive control scheme (CL-APCC) for improving performance is proposed. Queuing theory applied CL-APCC analyze data flows single-node according its...
IEEE 802.11ax Wireless Local Area Networks (WLANs) introduce Orthogonal Frequency Division Multiple Access (OFDMA) physical layer technology to improve throughput in dense scenarios. In order save power of battery operated stations (STAs), a novel broadcast Target Wake Time (TWT) operation for negotiating wake time between an access point (AP) and group STAs is also proposed by making full use the new capability uplink OFDMA-based multiuser transmissions. However, if each STA which...
Cooperative techniques form a new wireless communication paradigm in which terminals help each other relaying information to combat the random fading and provide diversity radio channels. Past work has focused on improving channel reliability through cooperation. We propose jointly allocate bits among source coding, coding cooperation minimize expected distortion. Recognizing that not all are equal, we further protect more important user To evaluate gain of layered cooperation, simulate four...
Real-time streaming of audiovisual content over wireless LANs (WLANs) is emerging as an important technology area in multimedia communications. Due to the error-prone, time-varying characteristics channels, there a need for strong protection video bitstreams. To cope with variation channel conditions, we introduce novel cross-layer strategy that combines adaptive application-layer forward error correction (FEC) and physical-layer modulation fine-granular-scalability (FGS) coding improve...
Given the challenges facing cyberspace of nation, this paper presents tripartite theory cyberspace, based on status quo cyberspace. Corresponding strategies and a research architecture are proposed for common public networks (C space), secure classified (S key infrastructure (K their individual characteristics. The features security requirements these then discussed. Taking C space as an example, we introduce SMCRC (which stands "situation awareness, monitoring management, cooperative...
Robust streaming of video over the IEEE 802.11 wireless LANs (WLANs) poses many challenges, including coping with bandwidth variations and data losses. To address these we evaluate compare various error control strategies in this paper, namely, medium access (MAC) layer forward correction (FEC), MAC retransmission, application-layer FEC, combined FGS scalable coding to achieve reliable communication WLANs. Moreover, assess performance fine-grained loss protection (FGLP) for different...
Abstract Due to the broadcast nature of wireless communications, damage mobile ad hoc networks is becoming more and common. We propose a network stability model that can effectively reflect performance when damaged in real time. The Ad Hoc built by using node supporting IEEE802.11 standard provided OPNET software simulate under different degrees damage. This provides an effective way for simulation analysis condition
Abstract In recent years, SDN technology has developed rapidly, and the security of is key to its further development application. Intrusion prevention system possesses both features intrusion detection protection, which one important methods ensure network. this paper, we proposed a SDN-based scheme for security. The utilizes programmability create four modules on application plane controller, including network monitoring module, IP address destructive packets Snort linkage module. also...
With the rapid development and application of novel network information technologies, various radar and/or communication transmitters have become more intelligent networked in modern electromagnetic operational environment, which causes threat sensing architecture traditional electronic warfare system inadequate, especially encountering unknown signals or targets. In this case, becomes one biggest challenges that is facing. Therefore, paper proposed a heterogeneous for cognitive sensor...
Wireless communication network has such features as limited bandwidth, changeful channel and dynamic topology, etc. Ad hoc lots of difficulties in accessing control, bandwidth distribution, resource assign congestion control. Therefore, a wireless distributing algorithm based on transmission performance factors is proposed the paper. The makes quantitative qualitative analysis for influencing performance, result, node distribution "relative unfairness" introduced to realize re-distribution...
In order to accomplish IC design online and project management, an enhanced unified electronic automation (EDA) platform based on the WEB (abbreviated as WEB-EDA) is developed. The provides sharing of cross-domain EDA resources via shell mode desktop mode, management. And for purpose safeguarding environment, we adopt masquerade intrusion detection module role-based access control (RBAC) module. WEB-EDA has been used in our laboratory. experiences with applications show that highly effective...
Wireless video sensor networks (WVSNs) feature the characteristics of easy deployment and low maintenance cost therefore are suitable for a wide range important applications, including remote surveillance, health care delivery traffic control systems. Compared to traditional communication systems, Sensor nodes in WVSN operate under resource constrains such as power supply transmission bandwidth. The main object this paper is study allocation wireless node improve system performance, especial...