- Energy Efficient Wireless Sensor Networks
- Mobile Ad Hoc Networks
- Software-Defined Networks and 5G
- Network Traffic and Congestion Control
- Caching and Content Delivery
- Opportunistic and Delay-Tolerant Networks
- Interconnection Networks and Systems
- Wireless Networks and Protocols
- Cooperative Communication and Network Coding
- Network Packet Processing and Optimization
- Advanced Wireless Network Optimization
- Network Security and Intrusion Detection
- Cloud Computing and Resource Management
- Privacy-Preserving Technologies in Data
- Internet Traffic Analysis and Secure E-voting
- Security in Wireless Sensor Networks
- Mobile Agent-Based Network Management
- IPv6, Mobility, Handover, Networks, Security
- Energy Harvesting in Wireless Networks
- Wireless Communication Networks Research
- Advanced Optical Network Technologies
- Peer-to-Peer Network Technologies
- Advanced Malware Detection Techniques
- Underwater Vehicles and Communication Systems
- Embedded Systems and FPGA Design
Northwest University
2025
Peking University
2022-2025
Second Hospital of Shandong University
2025
Beijing Jiaotong University
2025
Jinan University
2025
Shandong University
2013-2025
Yale University
2025
Tianjin University of Commerce
2025
Nankai University
2025
Fujian Agriculture and Forestry University
2025
Abstract Shotgun metagenomics has become a pivotal technology in microbiome research, enabling in‐depth analysis of microbial communities at both the high‐resolution taxonomic and functional levels. This approach provides valuable insights diversity, interactions, their roles health disease. However, complexity data processing need for reproducibility pose significant challenges to researchers. To address these challenges, we developed EasyMetagenome, user‐friendly pipeline that supports...
In existing coverage challenges within wireless sensor networks, traditional perception models often fail to accurately represent the true transmission characteristics of signals. more complex application scenarios such as warehousing, residential areas, etc., this may lead a large gap between expected effect actual and simulated coverage. Additionally, these frequently neglect critical factors failures malfunctions, which can significantly affect signal detection. To address limitations...
Time synchronization is one of the most fundamental services for numerous wireless sensor network applications. In this article definition and basic concepts time are introduced, related work summarized in brief. Through analyzing characteristics existing typical protocols making a comprehensive comparison performance various algorithms, we present common guideline designing protocol WSN. Following guideline, develop new called Self-Correcting Synchronization (SCTS), which converts problem...
The ability to inspect both packet headers and payloads identify attack signatures makes network intrusion detection system (NIDS) a promising approach protect Internet systems. Since most of the known attacks can be represented with strings or combinations multiple substrings, string matching is key component, as well bottleneck in NIDS address requirement constantly increasing capacity. We propose memory-efficient multiple-character-approaching architecture consisting parallel...
The use of unmanned aerial vehicles (UAVs) as flying users provides various applications by exploiting machine learning (ML) algorithms. Recently, distributed algorithms, federated (FL) and split (SL), have been exploited to train ML models distributedly via sharing model parameters rather than large raw datasets in the conventional centralized Considering diversity with heterogeneous resources, computation capabilities, data distributions, we propose a hybrid (HSFL) framework that allows...
Underwater communication is a challenging topic due to its singular channel characteristics. Most protocols used in terrestrial wireless can not be directly applied the underwater world. In this paper, we focus on issue of energy efficient transmission sensor networks (UWSNs) and analyze problem rigorous theoretical way. We formalize an optimization which aims minimize consumption simultaneously accounts for other performance metrics such as data reliability delay. With help...
Serine-arginine protein kinases (SRPKs) play important roles in diverse biological processes such as alternative splicing and cell cycle. However, the functions of SRPKs DNA damage response remain unclear. Here we characterized function homolog Dsk1 regulating repair fission yeast Schizosaccharomyces pombe. We demonstrated that defective mutants loss gene, spacer domain, kinase activity well its overexpression mutant exhibited sensitivities replication stress. Genetic analysis revealed dsk1+...
Abstract Pore network modeling (PNM) with extracted from 3D images is widely used for studying mass transport in porous media, its accuracy heavily dependent on the precise determination of hydraulic and diffusive conductance values local pore pairs. Deep learning (DL) prediction based true geometry offers a promising approach estimation. However, due to arbitrarily orientation lack explicit inlet outlet surfaces pair geometries, existing studies [24,25] have relied only 2D cross section...
Background: The Shugan Lidan Decoction and Chaihu formula are traditional Chinese medicine formulas for treating liver diseases, with a history of over 1000 years. By comprehensively improving 2 medicinal formulas, Xiaoshi Granules (SLXG) has been developed the treatment nonalcoholic fatty disease (NAFLD) other liver-related metabolic diseases. Methods: First, effective active ingredients targets SLXG were determined using Traditional Medicine Systems Pharmacology Database Analysis Platform...
The technical requirements for securing safety-related applications in connected autonomous vehicles (CAVs) include security (e.g., authentication, integrity, non-repudiation depending on the specific applications), privacy anonymity and unlinkability) computing efficiency of solutions designed to address aspects. Several cryptographic techniques have been considered literature meet these requirements. A notable category is often referred as pseudonym schemes context CAVs, which aim...
Neurochemical imbalance is a contributing factor to neurological symptoms in multiple sclerosis (MS). The matured myelin sheath crucial for substance transportation within the extracellular space (ECS) and maintaining local homeostasis. Therefore, we hypothesize that disturbed ECS following demyelinating lesions might lead neurochemical MS. In current study, lysophosphatidylcholine-induced unilateral MS model was used investigate spatial alterations. results demonstrated 168 substances were...
<title>Abstract</title> Interspecific interactions are crucial for maintaining ecological balance. Foraging and food consumption fundamental the survival of animals. In natural environments, wild rodents feed on various insect species, including moth larvae, odor-guided evaluation potential resources is a critical step in initiating feeding behavior. However, mechanisms by which seek prey remain poorly understood. Herein, we employed laboratory-based predator-prey interaction system using...