Publications by authors named "Ruchuan Wang"

With the development of the IoT, Wireless Rechargeable Sensor Networks (WRSNs) derive more and more application scenarios with diverse performance requirements. In scenarios where the energy consumption rate of sensor nodes changes dynamically, most existing charging scheduling methods are not applicable. The incorrect estimation of node energy requirement may lead to the death of critical nodes, resulting in missing events.

View Article and Find Full Text PDF

Recent image classification efforts have achieved certain success by incorporating prior information such as labels and logical rules to learn discriminative features. However, these methods overlook the variability of features, resulting in feature inconsistency and fluctuations in model parameter updates, which further contribute to decreased image classification accuracy and model instability. To address this issue, this paper proposes a novel method combining structural prior-driven feature extraction with gradient-momentum (SPGM), from the perspectives of consistent feature learning and precise parameter updates, to enhance the accuracy and stability of image classification.

View Article and Find Full Text PDF

Wireless Power Transfer (WPT) has become a key technology to extend network lifetime in Wireless Rechargeable Sensor Networks (WRSNs). The traditional omnidirectional recharging method has a wider range of energy radiation, but it inevitably results in more energy waste. By contrast, the directional recharging mode enables most of the energy to be focused in a predetermined direction that achieves higher recharging efficiency.

View Article and Find Full Text PDF

The Internet of Things (IoT) has been integrated into legacy healthcare systems for the purpose of improving healthcare processes. As one of the key technologies of IoT, radio frequency identification (RFID) technology has been applied to offer services like patient monitoring, drug administration, and medical asset tracking. However, people have concerns about the security and privacy of RFID-based healthcare systems, which require a proper solution.

View Article and Find Full Text PDF

With the rapid development of the Internet of Things and the popularization of 5G communication technology, the security of resource-constrained IoT devices such as Radio Frequency Identification (RFID)-based applications have received extensive attention. In traditional RFID systems, the communication channel between the tag and the reader is vulnerable to various threats, including denial of service, spoofing, and desynchronization. Thus, the confidentiality and integrity of the transmitted data cannot be guaranteed.

View Article and Find Full Text PDF

With the maturity of genome sequencing technology, huge amounts of sequence reads as well as assembled genomes are generating. With the explosive growth of genomic data, the storage and transmission of genomic data are facing enormous challenges. FASTA, as one of the main storage formats for genome sequences, is widely used in the Gene Bank because it eases sequence analysis and gene research and is easy to be read.

View Article and Find Full Text PDF

Radio frequency identification is one of the key techniques for Internet of Things, which has been widely adopted in many applications for identification. However, there exist various security and privacy issues in radio frequency identification (RFID) systems. Particularly, one of the most serious threats is to clone tags for the goal of counterfeiting goods, which causes great loss and danger to customers.

View Article and Find Full Text PDF

Due to the limited energy budget, great efforts have been made to improve energy efficiency for wireless sensor networks. The advantage of compressed sensing is that it saves energy because of its sparse sampling; however, it suffers inherent shortcomings in relation to timely data acquisition. In contrast, prediction-based approaches are able to offer timely data acquisition, but the overhead of frequent model synchronization and data sampling weakens the gain in the data reduction.

View Article and Find Full Text PDF

Nowadays, anyone carrying a mobile device can enjoy the various location-based services provided by the Internet of Things (IoT). 'Aggregate nearest neighbor query' is a new type of location-based query which asks the question, 'what is the best location for a given group of people to gather?' There are numerous, promising applications for this type of query, but it needs to be done in a secure and private way. Therefore, a trajectory privacy-preserving scheme, based on a trusted anonymous server (TAS) is proposed.

View Article and Find Full Text PDF

Multispectral images contain rich recognition information since the multispectral camera can reveal information that is not visible to the human eye or to the conventional RGB camera. Due to this characteristic of multispectral images, multispectral face recognition has attracted lots of research interest. Although some multispectral face recognition methods have been presented in the last decade, how to fully and effectively explore the intraspectrum discriminant information and the useful interspectrum correlation information in multispectral face images for recognition has not been well studied.

View Article and Find Full Text PDF

With the increasing number of ubiquitous terminals and the continuous expansion of network scale, the problem of unbalanced energy consumption in sensor networks has become increasingly prominent in recent years. However, a node scheduling strategy or an energy consumption optimization algorithm may be not enough to meet the requirements of large-scale application. To address this problem a type of Annulus-based Energy Balanced Data Collection (AEBDC) method is proposed in this paper.

View Article and Find Full Text PDF

To reduce time delays during data collection and prolong the network lifetime in Wireless Rechargeable Sensor Networks (WRSNs), a type of high-efficiency data collection method based on Maximum Recharging Benefit (DCMRB) is proposed in this paper. According to the minimum number of the Mobile Data Collectors (MDCs), the network is firstly divided into several regions with the help of the Virtual Scan Line (VSL). Then, the MDCs and the Wireless Charging Vehicles (WCVs) are employed in each region for high efficient data collection and energy replenishment.

View Article and Find Full Text PDF

With the expansion of Intelligent Transport Systems (ITS) in smart cities, the shared bicycle has developed quickly as a new green public transportation mode, and is changing the travel habits of citizens heavily across the world, especially in China. The purpose of the current paper is to provide an inclusive review and survey on shared bicycle besides its benefits, history, brands and comparisons. In addition, it proposes the concept of the Internet of Shared Bicycle (IoSB) for the first time, as far as we know, to find a feasible solution for those technical problems of the shared bicycle.

View Article and Find Full Text PDF

Nowadays, location-based services, which include services to identify the location of a person or an object, have many uses in social life. Though traditional GPS positioning can provide high quality positioning services in outdoor environments, due to the shielding of buildings and the interference of indoor environments, researchers and enterprises have paid more attention to how to perform high precision indoor positioning. There are many indoor positioning technologies, such as WiFi, Bluetooth, UWB and RFID.

View Article and Find Full Text PDF

With the fast development of the Internet of Things, Radio Frequency Identification (RFID) has been widely applied into many areas. Nevertheless, security problems of the RFID technology are also gradually exposed, when it provides life convenience. In particular, the appearance of a large number of fake and counterfeit goods has caused massive loss for both producers and customers, for which the clone tag is a serious security threat.

View Article and Find Full Text PDF

The Global Positioning System (GPS) is widely used in outdoor environmental positioning. However, GPS cannot support indoor positioning because there is no signal for positioning in an indoor environment. Nowadays, there are many situations which require indoor positioning, such as searching for a book in a library, looking for luggage in an airport, emergence navigation for fire alarms, robot location, etc.

View Article and Find Full Text PDF

Some frame components, such as SYNC (frame synchronization) and RTS/CTS (Ready to Send/Clear to Send), are not taken into consideration when the traditional setting strategies conduct the optimization of SMAC (Sensor MAC) contention window size. This paper proposes mathematical models that allow the analysis of data packets forwarding delay within one SMAC virtual cluster. Simulation results in OMNeT++ show good agreements with the proposed mathematical models, validating the models' correctness.

View Article and Find Full Text PDF

Unlike conventional scalar sensors, camera sensors at different positions can capture a variety of views of an object. Based on this intrinsic property, a novel model called full-view coverage was proposed. We study the problem that how to select the minimum number of sensors to guarantee the full-view coverage for the given region of interest (ROI).

View Article and Find Full Text PDF

With the development of wireless sensor networks, certain network problems have become more prominent, such as limited node resources, low data transmission security, and short network life cycles. To solve these problems effectively, it is important to design an efficient and trusted secure routing algorithm for wireless sensor networks. Traditional ant-colony optimization algorithms exhibit only local convergence, without considering the residual energy of the nodes and many other problems.

View Article and Find Full Text PDF

To balance energy consumption and reduce latency on data transmission in Wireless Sensor Networks (WSNs), a type of low-latency data gathering method with multi-Sink (LDGM for short) is proposed in this paper. The network is divided into several virtual regions consisting of three or less data gathering units and the leader of each region is selected according to its residual energy as well as distance to all of the other nodes. Only the leaders in each region need to communicate with the mobile Sinks which have effectively reduced energy consumption and the end-to-end delay.

View Article and Find Full Text PDF

Video and image sensors in wireless multimedia sensor networks (WMSNs) have directed view and limited sensing angle. So the methods to solve target coverage problem for traditional sensor networks, which use circle sensing model, are not suitable for WMSNs. Based on the FoV (field of view) sensing model and FoV disk model proposed, how expected multimedia sensor covers the target is defined by the deflection angle between target and the sensor's current orientation and the distance between target and the sensor.

View Article and Find Full Text PDF

Coverage pattern and deployment strategy are directly related to the optimum allocation of limited resources for wireless sensor networks, such as energy of nodes, communication bandwidth, and computing power, and quality improvement is largely determined by these for wireless sensor networks. A three-dimensional coverage pattern and deployment scheme are proposed in this paper. Firstly, by analyzing the regular polyhedron models in three-dimensional scene, a coverage pattern based on cuboids is proposed, and then relationship between coverage and sensor nodes' radius is deduced; also the minimum number of sensor nodes to maintain network area's full coverage is calculated.

View Article and Find Full Text PDF

Deployment quality and cost are two conflicting aspects in wireless sensor networks. Random deployment, where the monitored field is covered by randomly and uniformly deployed sensor nodes, is an appropriate approach for large-scale network applications. However, their successful applications depend considerably on the deployment quality that uses the minimum number of sensors to achieve a desired coverage.

View Article and Find Full Text PDF