Skip to main content

and
  1. No Access

    Article

    Volatile-compound fingerprinting and discrimination of positional isomers in stamp-pad ink tracing using HS-GC-IMS combined with multivariate statistical analysis

    The rising crime rate associated with document forgery has a significant impact on public safety and social stability. In document fraud cases, determining the origin of a particular stamp-pad ink is the most ...

    Yinghua Qi, **nhua Lv, Junchao Ma, Mingyuan Lei in Analytical and Bioanalytical Chemistry (2024)

  2. No Access

    Chapter and Conference Paper

    Multi-GPU Parallel Pipeline Rendering with Splitting Frame

    In order to achieve real-time rendering of cloud gaming, a large amount of computing resources of graphics processing units (GPU) are required. In this paper, we propose a multi-GPU parallel pipeline rendering...

    Haitang Zhang, Junchao Ma, Zixia Qiu, Junmei Yao in Advances in Computer Graphics (2024)

  3. No Access

    Chapter and Conference Paper

    Integrated Planning for Water Pollution Control in Suburban Regions in South-Eastern China

    Water pollution caused by agricultural runoff and domestic sewage discharge is a critical issue for surface water quality and ecosystem health in develo** regions worldwide. This paper focuses on a suburban ...

    Hailan Yu, Huabin Shentu, Shaoyi Wang in Proceedings of The 9th International Confe… (2024)

  4. No Access

    Chapter and Conference Paper

    Packet Replays Prevention Protocol for Secure B5G Networks

    The beyond 5G networks (B5G) are characterized by high throughputs at extremely low latencies and better energy consumptions. This has seen them being deployed as the backbone of numerous Internet of Things (I...

    Vincent Omollo Nyangaresi, Junchao Ma in Proceedings of Seventh International Congr… (2023)

  5. No Access

    Chapter and Conference Paper

    Transient Session Key Derivation Protocol for Key Escrow Prevention in Public Key Infrastructure

    The Internet of Things (IoT) devices have been deployed to realize smart environments such as smart cities, smart homes, smart health and smart grids. In these domains, the IoT devices collect and forward high...

    Vincent Omollo Nyangaresi, Zaid Ameen Abduljabbar in Internet of Everything (2023)

  6. Article

    Open Access

    Unveiling Weyl-related optical responses in semiconducting tellurium by mid-infrared circular photogalvanic effect

    Elemental tellurium, conventionally recognized as a narrow bandgap semiconductor, has recently aroused research interests for exploiting Weyl physics. Chirality is a unique feature of Weyl cones and can suppor...

    Junchao Ma, Bin Cheng, Lin Li, Zipu Fan, Haimen Mu, Jiawei Lai in Nature Communications (2022)

  7. Article

    Open Access

    Ultrafast photothermoelectric effect in Dirac semimetallic Cd3As2 revealed by terahertz emission

    The thermoelectric effects of topological semimetals have attracted tremendous research interest because many topological semimetals are excellent thermoelectric materials and thermoelectricity serves as one o...

    Wei Lu, Zipu Fan, Yunkun Yang, Junchao Ma, Jiawei Lai in Nature Communications (2022)

  8. No Access

    Chapter and Conference Paper

    Evaluation of Topology-Aware All-Reduce Algorithm for Dragonfly Networks

    Dragonfly is a popular topology for current and future high-speed interconnection networks. The concept of gathering topology information to accelerate collective operations is a very hot research field. All-r...

    Junchao Ma, Dezun Dong, Cunlu Li, Ke Wu, Liquan **ao in Network and Parallel Computing (2022)

  9. No Access

    Chapter and Conference Paper

    Stochastic Security Ephemeral Generation Protocol for 5G Enabled Internet of Things

    To ensure secure access to the data held in internet of things, many lightweight authentication schemes have been developed using approaches such as symmetric cryptography or hashing operations. Although these...

    Mustafa A. Al Sibahee, Vincent Omollo Nyangaresi, Junchao Ma in IoT as a Service (2022)

  10. No Access

    Chapter and Conference Paper

    MAC-Based Symmetric Key Protocol for Secure Traffic Forwarding in Drones

    Unmanned aerial vehicles have been deployed for surveillance in highly sensitive domains such as in the military. As such, the data exchanged between the operators and these aerial vehicles must be protected a...

    Zaid Ameen Abduljabbar in Future Access Enablers for Ubiquitous and … (2022)

  11. Article

    Open Access

    Dynamical evolution of anisotropic response of type-II Weyl semimetal TaIrTe4 under ultrafast photoexcitation

    Layered type-II Weyl semimetals, such as WTe2, MoTe2, and TaIrTe4 have been demonstrated as a supreme photodetection material with topologically enhanced responsivity and specific sensitivity to the orbital angul...

    **ao Zhuo, Jiawei Lai, Peng Yu, Ze Yu, Junchao Ma, Wei Lu in Light: Science & Applications (2021)

  12. No Access

    Article

    Is fractal dimension a reliable imaging biomarker for the quantitative classification of an intervertebral disk?

    This study aimed to explore the feasibility of the fractal method used in decoding disk heterogeneity, ho** to find a reliable imaging biomarker for the quantitative and continuous grading of intervertebral ...

    Junchao Ma, Ruifeng Wang, Yong Yu, **aotong Xu, Haifeng Duan in European Spine Journal (2020)

  13. Article

    Open Access

    Robust edge photocurrent response on layered type II Weyl semimetal WTe2

    Photosensing and energy harvesting based on exotic properties of quantum materials and new operation principles have great potential to break the fundamental performance limit of conventional photodetectors an...

    Qinsheng Wang, **gchuan Zheng, Yuan He, ** Cao, **n Liu in Nature Communications (2019)

  14. No Access

    Article

    Nonlinear photoresponse of type-II Weyl semimetals

    The experimental manifestation of topological effects in bulk materials is attracting enormous research interest. However, direct experimental evidence of the effective k-space monopole of the Weyl nodes has so f...

    Junchao Ma, Qiangqiang Gu, Yinan Liu, Jiawei Lai, Peng Yu, **ao Zhuo in Nature Materials (2019)

  15. No Access

    Chapter and Conference Paper

    Interference-Aware Gossi** Scheduling in Uncoordinated Duty-Cycled Multi-hop Wireless Networks

    Gossi** is to broadcast the message of every node to all the other nodes in multi-hop wireless networks (MWNs). This operation plays an important role and is widely used in MWNs. Interference-aware gossi**...

    **anlong Jiao, Wei Lou, **aodong Wang in Wireless Algorithms, Systems, and Applicat… (2010)

  16. No Access

    Chapter and Conference Paper

    A Novel Mobility Management Scheme for Target Tracking in Cluster-Based Sensor Networks

    Target tracking is a typical and important application of wireless sensor networks (WSNs). In the consideration of scalability and energy efficiency for target tracking in large scale WSNs, it has been employe...

    Zhibo Wang, Wei Lou, Zhi Wang, Junchao Ma in Distributed Computing in Sensor Systems (2010)