Skip to main content

Page of 3
and
  1. No Access

    Chapter and Conference Paper

    Application of Multitaper Method (MTM) to Identify the Heterogeneity of Karst Aquifers

    Karst aquifers supply drinking water for 25% of population on the earth. Better understanding of the heterogeneity of karst aquifers can help us develop karst groundwater sustainably. Karst hydrological proces...

    Baoju Zhang, Lixing An, Wei Wang in Communications, Signal Processing, and Sys… (2020)

  2. No Access

    Chapter and Conference Paper

    Data Stream Adaptive Partitioning of Sliding Window Based on Gaussian Restricted Boltzmann Machine

    In this paper, the adaptive partitioning problem of data stream under sliding window is discussed. Gaussian restricted Boltzmann machine (GRBM) model supporting decimal input is proposed, which can be trained ...

    Wei Wang, Mengjun Zhang in Artificial Intelligence in China (2020)

  3. No Access

    Chapter and Conference Paper

    A New Traffic Priority Aware and Energy Efficient Protocol for WBANs

    For long-term real-time monitoring of human parameters, providing effective treatment for patients and reduce medical costs WBANs emerged, electrical devices microminiaturization makes WBANs come true. The net...

    Wei Wang, Dunqiang Lu, **n Zhou, Baoju Zhang in Communications, Signal Processing, and Sys… (2020)

  4. No Access

    Chapter and Conference Paper

    Concept Drift Detection Based on Kolmogorov–Smirnov Test

    With the advancement of information society, a large amount of data, which is in the form of stream, has been produced in many fields. As a result of its extensive application in the fields of sensor networks,...

    Zhixiong Wang, Wei Wang in Artificial Intelligence in China (2020)

  5. No Access

    Article

    Load scheduling for distributed edge computing: A communication-computation tradeoff

    Due to the intensive computation requirements of emerging applications and the limited computational capability of edge computing servers, the computation task must be executed on multiple edge servers in a di...

    Minghui Zhao, Wei Wang, Yitu Wang in Peer-to-Peer Networking and Applications (2019)

  6. No Access

    Chapter and Conference Paper

    Modeling and Optimization for Sky Wave Propagation Loss Model Based on Enumerative Algorithm

    Sky wave propagation is one of the important methods to transmit signal and is widely used in ship broadcast communication. In order to analyze the multi-hop system and optimize the emission angle of sky-wave ...

    Yuming Gu, Zhenyu Na, **ao Liu, Huahan Zhang in Communications, Signal Processing, and Sys… (2019)

  7. No Access

    Article

    Secure ultra-lightweight RFID mutual authentication protocol based on transparent computing for IoV

    Transparent Computing (TC) has become a promising paradigm in the network computing era, the appearance of Transparent Computing have a real impact on the industry. A growing number of cars on the road, in ord...

    Kai Fan, Wei Wang, Wei Jiang, Hui Li in Peer-to-Peer Networking and Applications (2018)

  8. No Access

    Article

    VD-PSO: An efficient mobile sink routing algorithm in wireless sensor networks

    Efficient energy consumption is crucial for energy constrained networks such as Wireless Sensor Networks (WSN). Using a mobile sink to collect the data of the nodes is a good method to balance the energy level...

    Wei Wang, Haoshan Shi, Dajun Wu, Pengyu Huang in Peer-to-Peer Networking and Applications (2017)

  9. No Access

    Chapter and Conference Paper

    Research on Privacy Protection of WHOIS Information in DNS

    WHOIS service allows people to ask the current registrant some Internet resources. WHOIS service has become an indispensable information service in the DNS. Unfortunately, WHOIS information is often available ...

    Wei Zhang, Wei Wang, **nchang Zhang, Huiling Shi in Computer Science and its Applications (2015)

  10. No Access

    Book and Conference Proceedings

  11. No Access

    Chapter and Conference Paper

    The Design and Implementation of Linear Array Image Acquisition System

    The theory of Compressive Sensing is briefly introduced and the design of the linear array image acquisition system which is based on the Compressive Sensing is deduced. The system design includes two aspects:...

    Baoju Zhang, **ang Tong, Wei Wang, Jiazu **e in The Proceedings of the Second Internationa… (2014)

  12. No Access

    Chapter and Conference Paper

    Real Time Routing Optimization in ZigBee Hierarchical Networks

    ZigBee hierarchical routing protocol (HRP) provides a simple but reliable topology. However, the transmission paths in HRP are always not efficient, and the links keep invariant since they were determined when...

    Wei Song, Jiasong Mu, Wei Wang, Baoju Zhang in The Proceedings of the Second Internationa… (2014)

  13. No Access

    Chapter and Conference Paper

    Image Fusion Based on Compressed Sensing

    Compressive sensing (CS) has received a lot of interest due to its compression capability and lack of complexity on the sensor side. This paper presented a new image fusion based on compressed sensing. The met...

    **n Zhou, Wei Wang, Rui-an Liu in The Proceedings of the Second Internationa… (2014)

  14. No Access

    Chapter and Conference Paper

    Research on Time Triggered Ethernet Based on Deterministic Network Calculus

    In this paper, we present a service-performance network calculus model based on Time-Triggered Ethernet, a deterministic safety critical real-time network protocol, which is used in avionics systems. We firstl...

    Yu **ang, **ang Zhang, Zhenwei Li, Wei Wang in The Proceedings of the Second Internationa… (2014)

  15. No Access

    Chapter and Conference Paper

    Improved Hierarchical Topic Detection

    Due to characteristics of low centralization and the topic drift, how to analyze Internet news reports timely and effectively is more and more concerned. An improved hierarchical topic detection method is prop...

    Wei Wang, Mingyan Jiang, Dongfeng Yuan in Proceedings of the 2012 International Conf… (2014)

  16. No Access

    Chapter and Conference Paper

    Through Wall Human Detection Using Compressed UWB Radar Data

    The technology for through wall human detection with UWB radar was discussed. Due to the large amount of UWB radar data, compressive sensing theory was introduced and compressed UWB radar data can be collected...

    Wei Wang, Baoju Zhang, Jiasong Mu in The Proceedings of the Second Internationa… (2014)

  17. No Access

    Chapter and Conference Paper

    Storage and Analysis of Simulation Data Based on ADO and Visual C++

    The purpose of simulation is to reduce the number of actual experiments, and to minimize development costs and improve development efficiency. Simulation system is an integrated, complex system. Each parameter...

    Wei Wang in Proceedings of the 2012 International Conference on Cybernetics and Informatics (2014)

  18. No Access

    Chapter and Conference Paper

    Simplified Hybrid Routing Protocol in Low Complexity ZigBee Network

    The hierarchical routing protocol (HRP) and Z-AODV routing are two options in ZigBee networks. However, the advantages of them, such as the simplicity in HRP and the global shortest path in Z-AODV, are alterna...

    Jiasong Mu, Wei Wang, Baoju Zhang in The Proceedings of the Second Internationa… (2014)

  19. No Access

    Chapter and Conference Paper

    Minimal Global Hops Algorithm for Energy Balancing in ZigBee Hierarchical Network

    Low power consumption is one of the most significant property and pursuing object for ZigBee networks. Because of the multi-hop mechanism in wireless communication, the nodes are always uneven used from the ov...

    Jiasong Mu, Wei Wang, Baoju Zhang, Wei Song in The Proceedings of the Second Internationa… (2014)

  20. No Access

    Chapter and Conference Paper

    On-Line Anomaly Detection in Big Data Based on Compressive Sensing

    The definitions of anomaly detection and big data were presented. Due to the sampling and storage burden of anomaly detection in big data, compressive sensing theory was introduced and used in anomaly detectio...

    Wei Wang, Dunqiang Lu, **n Zhou, Baoju Zhang in The Proceedings of the Second Internationa… (2014)

Page of 3