Zobrazeno 1 - 10
of 13
pro vyhledávání: '"Jiaying Yin"'
Autor:
Qiyu He, Tsz-Ngai Mok, Tat-Hang Sin, Jiaying Yin, Sicun Li, Yiyue Yin, Wai-Kit Ming, Bin Feng
Publikováno v:
JMIR Public Health and Surveillance, Vol 9, p e45943 (2023)
BackgroundGout is a common and debilitating condition that is associated with significant morbidity and mortality. Despite advances in medical treatment, the global burden of gout continues to increase, particularly in high–sociodemographic index (
Externí odkaz:
https://doaj.org/article/982d1f659af04dd3be9b323baddc331a
Federated learning (FL) is a novel approach where user devices (UDs) train a shared model without exchanging their data, effectively preserving privacy in distributed machine learning. When FL is applied in wireless networks, one particular issue is
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::17b27bc9d6b52ea090359b4253c961c9
https://doi.org/10.36227/techrxiv.21763637.v1
https://doi.org/10.36227/techrxiv.21763637.v1
Publikováno v:
IEEE Internet of Things Journal. 7:544-557
Internet of Things (IoT) technology suffers from the challenge that rare wireless network resources are difficult to meet the influx of a huge number of terminal devices. Cache-enabled device-to-device (D2D) communication technology is expected to re
Publikováno v:
Algorithms and Architectures for Parallel Processing ISBN: 9783030953836
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6b0f443a3381ef7925d8395b026de324
https://doi.org/10.1007/978-3-030-95384-3_35
https://doi.org/10.1007/978-3-030-95384-3_35
Publikováno v:
IEEE Journal on Selected Areas in Communications. 37:439-451
The Internet of Things (IoT) technology has recently drawn more attention due to its ability to achieve the interconnections of massive physic devices. However, how to provide a reliable power supply to energy-constrained devices and improve the ener
Publikováno v:
GlobalSIP
Compared with traditional device-to-device (D2D) communication networks, the users in the cache-enabled D2D communication networks can easily obtain their requested contents from the nearby users, and reduce the backhaul costs. In this paper, we inve
Publikováno v:
ICCC
Antenna selection is often used for physical layer security to implement secure communications. However, due to the rapid changes of the main channel and the feedback delay of the channel state information (CSI), the transmitter obtains outdated CSI,
Publikováno v:
ICCC
Non-orthogonal multiple access (NOMA) is one of the most promising technologies in the next-generation cellular communication. However, the effective power allocation strategy has always been a problem that needs to be solved in power-domain NOMA. In
Publikováno v:
ICCC
With the rapid development of wireless communication technology, the low utilization of spectrum resources and the high demand for spectrum have always been an urgent and paradoxical problem to be resolved. In order to alleviate this conflict, cognit
Publikováno v:
IWCMC
Polar codes can provably achieve the capacity of a symmetric binary discrete memoryless channel and have low encoding and decoding complexity. However, the error rate performance of polar codes decoding in short and moderate length is not very well,