- Human Mobility and Location-Based Analysis
- Energy Efficient Wireless Sensor Networks
- Opportunistic and Delay-Tolerant Networks
- Cryptography and Data Security
- Advanced Wireless Communication Technologies
- Safety and Risk Management
- Advanced MIMO Systems Optimization
- Thermochemical Biomass Conversion Processes
- Wireless Body Area Networks
- Advanced Computational Techniques and Applications
- Coal Combustion and Slurry Processing
- Telecommunications and Broadcasting Technologies
- Manufacturing Process and Optimization
- Advanced Authentication Protocols Security
- CO2 Sequestration and Geologic Interactions
- Sustainable Industrial Ecology
- Power Line Inspection Robots
- Indoor and Outdoor Localization Technologies
- Geomechanics and Mining Engineering
- Mobile and Web Applications
- Open Source Software Innovations
- Image and Object Detection Techniques
- Environmental Engineering and Cultural Studies
- Electrical Contact Performance and Analysis
- Software-Defined Networks and 5G
Changzhou University
2025
Zhengzhou University of Light Industry
2018-2024
ZTE (China)
2021-2024
State Key Laboratory of Mobile Networks and Mobile Multimedia Technology
2021-2024
First Affiliated Hospital of Zhengzhou University
2024
China Mobile (China)
2021
Hunan University of Arts and Science
2021
Northeast Petroleum University
2021
Kennesaw State University
2019
Northwestern Polytechnical University
2008-2016
Neighbor discovery is a fundamental service for initialization and managing network dynamics in wireless sensor networks mobile sensing applications. In this paper, we present novel design principle named Talk More Listen Less (TMLL) to reduce idle-listening neighbor protocols by learning the fact that more beacons lead fewer wakeups. We propose an extended model analyzing wakeup schedules which are not necessarily placed slots. Furthermore, first consider channel occupancy rate introducing...
As more and undergraduate nursing programs (UNP) adopt the blended learning model, which combines traditional face-to-face e-learning, how it impacts on students’ academic performance comes into educators’ mind. The purpose of this study was to investigate whether model adopted by a UNP could yield same, if not better achievement as compared with classroom learning. Students enrolled in two courses fall 2008 spring 2009 semesters were taken convenient sample. Students’ achieve- ments before...
The recent development of wireless body area network (WBAN) technology plays a significant role in the modern healthcare system for patient health monitoring. However, owing to open nature channel and sensitivity transmitted messages, data security privacy threats WBAN have been widely discussed must be solved. In years, many authentication protocols had proposed provide protection WBANs. these schemes are not computationally efficient process. Inspired by studies, lightweight secure...
The behavior of chloride (Cl) salts in high-temperature environments is critical for various industrial processes, including waste treatment and material synthesis. However, the influence different atmospheric conditions on volatilization interaction Cl with clay minerals remains poorly understood. Previous studies have primarily focused individual salt types under limited conditions, leaving a gap comprehensive understanding how atmosphere composition affects at high temperatures. This work...
Network Function Virtualization (NFV) allows for the dynamic provisioning of Virtual Functions (VNFs), adapting services to complex and network environment enhance performance. However, VNF migration energy consumption pose significant challenges due nature physical network. In order maximize acceptance rate Service Chain Requests (SFCR), reduce as much possible, we summarize several related factors such node hosting state, link consumption, migrated nodes, whether mapping is successful. We...
In ophthalmology, the quality of fundus images is critical for accurate diagnosis, both in clinical practice and artificial intelligence (AI)-assisted diagnostics. Despite broad view provided by ultrawide-field (UWF) imaging, pseudocolor may conceal lesions necessary precise diagnosis. To address this, we introduce UWF-Net, a sophisticated image enhancement algorithm that takes disease characteristics into consideration. Using Fudan University Ultra-wide-field Image (FDUWI) dataset, which...
The development of the Internet Things has led to great data sharing and interaction, which made security privacy more a concern for users. How ensure safe data, avoid leakage sensitive information, protect users is serious challenge. Access control an important issue trust Things. This paper proposes access scheme based on ciphertext attribute authentication threshold policy, uses identity hidden attributes divides user's permission grade by setting function with attributes. Users obtain...
Orthogonal frequency division multiplexing‐based pattern multiple access (PDMA) is considered as a promising scheme for future wireless communication systems due to its high spectral efficiency and powerful ability support massive users. In this study, it shown that two matrices with unequal diversity gain in the PDMA system have better convergence performance compared signature traditional low‐density by simulations extrinsic information transfer (EXIT) chart analysis. For parity check...
Abstract With the development of wireless mobile network and Internet Things (IoT), users enter with a large amount data information, including some important personal such as ID number, telephone number. Personal privacy disclosure has become one focuses attention. In this article, we propose an asymmetric group key agreement (GKA) protocol based on attribute threshold for IoT to protect user privacy. Users do not need expose any information in group, but only meet same number attributes...
The easy scalability and low cost of range-free localization algorithms have led to their wide attention application in node wireless sensor networks.However, the existing still problems, such as large cumulative errors poor performance.To solve these an incremental strategy-based residual regression network is proposed for networks.The algorithm predicts coordinates nodes be solved by building a deep learning model fine-tunes prediction results based on intersection communication range...
With the drastic growth of Information and Communication Technology (ICT) industry, global energy consumption is exponentially increased by mobile communications.The huge environmental awareness have triggered great interests on research dynamic distribution cell user traffic, then designing efficient cellular network.In this paper, we explore temporal spatial characteristics human mobility traffic using real data set.The analysis results illustrate tidal effect in dimensions obvious...
Aiming at the problem of a small parameter value range when one-dimensional chaotic system presents state, this paper proposes new type hybrid power exponential (HPECS). HPECS combines classic Sine to form (HPECS-SS). Experiments show that obtained has better performance, more extensive range, and higher sensitivity. Simultaneously, on basis HPECS-SS, image encryption algorithm is proposed. The uses key generated by SHA-512 HPECS-SS iteratively output sequence, SFY sequence perform two...
The resource sharing of wireless sensor networks (WSNs) under the Internet environment is one key issues to be solved for application WSNs. It proposed a Web Services based network architecture, which can enlarge domain and increase scalability maintenance current solutions. In scheme, users conveniently access WSNs via web browser at anytime anywhere. design implementation gateway introduced in detail, has been applied monitor system northwest greenhouse very well.
We consider a stochastic continuous submodular huge‐scale optimization problem, which arises naturally in many applications such as machine learning. Due to high‐dimensional data, the computation of whole gradient vector can become prohibitively expensive. To reduce complexity and memory requirements, we propose block‐coordinate projection algorithm for maximizing functions, chooses random subset updates estimates along positive direction. prove that all nodes generated by converge some...
While a capstone experience is an important part of the IT curriculum, effectively managing large number projects can be challenging task for instructor. This paper describes authors' approach in building management system as list student undergraduate class. The authors first describe process and then present design considerations each component detail. Feedback comments from instructors, industry sponsors, well students are also discussed. lessons learned this endeavor may inspire other...
With the advent of 5G communications, internet vehicles technology has been widely used in vehicles.Then dynamic spread information between began to come into focus with more research.It is well known that identification nodes great influence always a hot topic field spreading.Most existing work measures propagation by degree centrality, betweenness centrality and closeness centrality.In this paper, we will identify influential vehicle based on mobility characteristics explore spreading...
Similarity measure is the base task of time series data mining tasks. LCSS method has obvious limitations in two different length selection a linear function. The ELCS proposed to normalize sequence, which introducing scale factor limit search path similarity matrix. Experiment hierarchical clustering algorithm shows that improved makes up for shortcomings LCSS, improves efficiency and accuracy complexity.