Zhigang Li

ORCID: 0000-0003-1943-9999
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Human Mobility and Location-Based Analysis
  • Energy Efficient Wireless Sensor Networks
  • Opportunistic and Delay-Tolerant Networks
  • Cryptography and Data Security
  • Advanced Wireless Communication Technologies
  • Safety and Risk Management
  • Advanced MIMO Systems Optimization
  • Thermochemical Biomass Conversion Processes
  • Wireless Body Area Networks
  • Advanced Computational Techniques and Applications
  • Coal Combustion and Slurry Processing
  • Telecommunications and Broadcasting Technologies
  • Manufacturing Process and Optimization
  • Advanced Authentication Protocols Security
  • CO2 Sequestration and Geologic Interactions
  • Sustainable Industrial Ecology
  • Power Line Inspection Robots
  • Indoor and Outdoor Localization Technologies
  • Geomechanics and Mining Engineering
  • Mobile and Web Applications
  • Open Source Software Innovations
  • Image and Object Detection Techniques
  • Environmental Engineering and Cultural Studies
  • Electrical Contact Performance and Analysis
  • Software-Defined Networks and 5G

Changzhou University
2025

Zhengzhou University of Light Industry
2018-2024

ZTE (China)
2021-2024

State Key Laboratory of Mobile Networks and Mobile Multimedia Technology
2021-2024

First Affiliated Hospital of Zhengzhou University
2024

China Mobile (China)
2021

Hunan University of Arts and Science
2021

Northeast Petroleum University
2021

Kennesaw State University
2019

Northwestern Polytechnical University
2008-2016

Neighbor discovery is a fundamental service for initialization and managing network dynamics in wireless sensor networks mobile sensing applications. In this paper, we present novel design principle named Talk More Listen Less (TMLL) to reduce idle-listening neighbor protocols by learning the fact that more beacons lead fewer wakeups. We propose an extended model analyzing wakeup schedules which are not necessarily placed slots. Furthermore, first consider channel occupancy rate introducing...

10.1109/infocom.2016.7524336 preprint EN 2016-04-01

As more and undergraduate nursing programs (UNP) adopt the blended learning model, which combines traditional face-to-face e-learning, how it impacts on students’ academic performance comes into educators’ mind. The purpose of this study was to investigate whether model adopted by a UNP could yield same, if not better achievement as compared with classroom learning. Students enrolled in two courses fall 2008 spring 2009 semesters were taken convenient sample. Students’ achieve- ments before...

10.5430/jnep.v4n3p245 article EN Journal of Nursing Education and Practice 2014-01-16

The recent development of wireless body area network (WBAN) technology plays a significant role in the modern healthcare system for patient health monitoring. However, owing to open nature channel and sensitivity transmitted messages, data security privacy threats WBAN have been widely discussed must be solved. In years, many authentication protocols had proposed provide protection WBANs. these schemes are not computationally efficient process. Inspired by studies, lightweight secure...

10.1155/2021/4939589 article EN cc-by Security and Communication Networks 2021-07-22

The behavior of chloride (Cl) salts in high-temperature environments is critical for various industrial processes, including waste treatment and material synthesis. However, the influence different atmospheric conditions on volatilization interaction Cl with clay minerals remains poorly understood. Previous studies have primarily focused individual salt types under limited conditions, leaving a gap comprehensive understanding how atmosphere composition affects at high temperatures. This work...

10.3390/su17031110 article EN Sustainability 2025-01-29

Network Function Virtualization (NFV) allows for the dynamic provisioning of Virtual Functions (VNFs), adapting services to complex and network environment enhance performance. However, VNF migration energy consumption pose significant challenges due nature physical network. In order maximize acceptance rate Service Chain Requests (SFCR), reduce as much possible, we summarize several related factors such node hosting state, link consumption, migrated nodes, whether mapping is successful. We...

10.3390/electronics12204324 article EN Electronics 2023-10-18

In ophthalmology, the quality of fundus images is critical for accurate diagnosis, both in clinical practice and artificial intelligence (AI)-assisted diagnostics. Despite broad view provided by ultrawide-field (UWF) imaging, pseudocolor may conceal lesions necessary precise diagnosis. To address this, we introduce UWF-Net, a sophisticated image enhancement algorithm that takes disease characteristics into consideration. Using Fudan University Ultra-wide-field Image (FDUWI) dataset, which...

10.1016/j.eng.2024.05.006 article EN cc-by-nc-nd Engineering 2024-05-24

The development of the Internet Things has led to great data sharing and interaction, which made security privacy more a concern for users. How ensure safe data, avoid leakage sensitive information, protect users is serious challenge. Access control an important issue trust Things. This paper proposes access scheme based on ciphertext attribute authentication threshold policy, uses identity hidden attributes divides user's permission grade by setting function with attributes. Users obtain...

10.3390/s19235237 article EN cc-by Sensors 2019-11-28

Orthogonal frequency division multiplexing‐based pattern multiple access (PDMA) is considered as a promising scheme for future wireless communication systems due to its high spectral efficiency and powerful ability support massive users. In this study, it shown that two matrices with unequal diversity gain in the PDMA system have better convergence performance compared signature traditional low‐density by simulations extrinsic information transfer (EXIT) chart analysis. For parity check...

10.1049/iet-com.2018.5429 article EN IET Communications 2018-10-25

10.1007/s40032-021-00782-9 article EN Journal of The Institution of Engineers (India) Series C 2021-10-29

Abstract With the development of wireless mobile network and Internet Things (IoT), users enter with a large amount data information, including some important personal such as ID number, telephone number. Personal privacy disclosure has become one focuses attention. In this article, we propose an asymmetric group key agreement (GKA) protocol based on attribute threshold for IoT to protect user privacy. Users do not need expose any information in group, but only meet same number attributes...

10.1002/ett.4179 article EN Transactions on Emerging Telecommunications Technologies 2020-11-25

The easy scalability and low cost of range-free localization algorithms have led to their wide attention application in node wireless sensor networks.However, the existing still problems, such as large cumulative errors poor performance.To solve these an incremental strategy-based residual regression network is proposed for networks.The algorithm predicts coordinates nodes be solved by building a deep learning model fine-tunes prediction results based on intersection communication range...

10.3837/tiis.2022.08.009 article EN KSII Transactions on Internet and Information Systems 2022-08-31

10.3723/ut.31.093 article EN Underwater Technology The International Journal of the Society for Underwater 2013-03-01

With the drastic growth of Information and Communication Technology (ICT) industry, global energy consumption is exponentially increased by mobile communications.The huge environmental awareness have triggered great interests on research dynamic distribution cell user traffic, then designing efficient cellular network.In this paper, we explore temporal spatial characteristics human mobility traffic using real data set.The analysis results illustrate tidal effect in dimensions obvious...

10.3837/tiis.2021.01.007 article EN KSII Transactions on Internet and Information Systems 2021-01-31

Aiming at the problem of a small parameter value range when one-dimensional chaotic system presents state, this paper proposes new type hybrid power exponential (HPECS). HPECS combines classic Sine to form (HPECS-SS). Experiments show that obtained has better performance, more extensive range, and higher sensitivity. Simultaneously, on basis HPECS-SS, image encryption algorithm is proposed. The uses key generated by SHA-512 HPECS-SS iteratively output sequence, SFY sequence perform two...

10.1155/2021/7580971 article EN Security and Communication Networks 2021-12-30

10.23919/jcc.fa.2023-0378.202408 article EN China Communications 2024-08-01

10.1109/ijcnn60899.2024.10651314 article EN 2022 International Joint Conference on Neural Networks (IJCNN) 2024-06-30

The resource sharing of wireless sensor networks (WSNs) under the Internet environment is one key issues to be solved for application WSNs. It proposed a Web Services based network architecture, which can enlarge domain and increase scalability maintenance current solutions. In scheme, users conveniently access WSNs via web browser at anytime anywhere. design implementation gateway introduced in detail, has been applied monitor system northwest greenhouse very well.

10.1109/wicom.2008.952 article EN 2008-10-01

We consider a stochastic continuous submodular huge‐scale optimization problem, which arises naturally in many applications such as machine learning. Due to high‐dimensional data, the computation of whole gradient vector can become prohibitively expensive. To reduce complexity and memory requirements, we propose block‐coordinate projection algorithm for maximizing functions, chooses random subset updates estimates along positive direction. prove that all nodes generated by converge some...

10.1155/2018/2609471 article EN cc-by Complexity 2018-01-01

While a capstone experience is an important part of the IT curriculum, effectively managing large number projects can be challenging task for instructor. This paper describes authors' approach in building management system as list student undergraduate class. The authors first describe process and then present design considerations each component detail. Feedback comments from instructors, industry sponsors, well students are also discussed. lessons learned this endeavor may inspire other...

10.1145/3349266.3351403 article EN 2019-09-26

With the advent of 5G communications, internet vehicles technology has been widely used in vehicles.Then dynamic spread information between began to come into focus with more research.It is well known that identification nodes great influence always a hot topic field spreading.Most existing work measures propagation by degree centrality, betweenness centrality and closeness centrality.In this paper, we will identify influential vehicle based on mobility characteristics explore spreading...

10.3837/tiis.2021.02.023 article EN KSII Transactions on Internet and Information Systems 2021-02-28

Similarity measure is the base task of time series data mining tasks. LCSS method has obvious limitations in two different length selection a linear function. The ELCS proposed to normalize sequence, which introducing scale factor limit search path similarity matrix. Experiment hierarchical clustering algorithm shows that improved makes up for shortcomings LCSS, improves efficiency and accuracy complexity.

10.19026/rjaset.5.4928 article EN cc-by Research Journal of Applied Sciences Engineering and Technology 2013-02-11
Coming Soon ...