De-gan Zhang

De-gan Zhang
Tsinghua University | TH

PHD

About

94
Publications
5,618
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,779
Citations
Citations since 2016
29 Research Items
2365 Citations
20162017201820192020202120220100200300400500
20162017201820192020202120220100200300400500
20162017201820192020202120220100200300400500
20162017201820192020202120220100200300400500
Introduction

Publications

Publications (94)
Article
Full-text available
Compared with the traditional network tasks, the emerging Internet of Vehicles (IoV) technology has higher requirements for network bandwidth and delay. However, due to the limitation of computing resources and battery capacity of existing mobile devices, it is hard to meet the above requirements. How to complete task offloading and calculation wit...
Article
Full-text available
Path planning of intelligent driving vehicles in emergencies is a hot research issue, this paper proposes a new method of the best path selection for the intelligent driving vehicles to solve this problem. Based on the prior knowledge applied reinforcement learning strategy and the searching- optimized A* algorithm, we designed a hybrid algorithm t...
Article
Full-text available
The basic fuzzy neural network algorithm has slow convergence and large amount of calculation, so this paper designed a particle swarm optimization trained fuzzy neural network algorithm to solve this problem. Traditional particle swarm optimization is easy to fall into local extremes and has low efficiency, this paper designed new update rules for...
Article
Purpose To solve the path planning problem of the intelligent driving vehicular, this paper designs a hybrid path planning algorithm based on optimized reinforcement learning (RL) and improved particle swarm optimization (PSO). Design/methodology/approach First, the authors optimized the hyper-parameters of RL to make it converge quickly and learn...
Article
Full-text available
In the vehicular ad hoc network (VANET), due to the particularity of high-speed movement of vehicle nodes, there are higher challenges in link stability and network topology control overhead. In this paper, a new algorithm of clustering AODV based on edge computing strategy is proposed. Considering the vehicle node energy and speed, the AODV routin...
Article
Full-text available
Traffic flow forecasting is one of the essential means to realize smart cities and smart transportation. The accurate and effective prediction will provide an important basis for decision‐making in smart transportation systems. This paper proposes a new method of traffic flow forecasting based on quantum particle swarm optimization (QPSO) strategy...
Article
Full-text available
With the fast development of 3D imaginations becomes more and more fascination, multi-view stereo based 3D reconstruction is a significant technique for those application. To facilitate the subsequent processing of 3D reconstruction and reduce the possibility of other algorithms falling into local optimal solutions, attempting to get better and fas...
Article
Full-text available
In the face of the current huge amount of intelligent traffic data, collecting and statistical processing is a necessary and important process. But the inevitable data missing problem is the current research focus. In this paper, a novel approach of tensor‐based data missing estimation for Internet of Vehicles is proposed for the problem of missing...
Article
Full-text available
Energy Efficient Hierarchical Clustering (EEHC) method is a distributed random clustering algorithm for residential wireless sensor networks (RWSNs) with the goal of maximizing network lifetime. However, during selection of the cluster head stage, a node declares itself as a cluster head to neighboring nodes with probability p, which does not consi...
Article
Wireless mesh networks (WMNs) are a kind of wireless network technology that can transmit multi-hop information, and have been regarded as one of the key technologies for configuring wireless machines. In WMNs, wireless routers can provide multi-hop wireless connections between nodes in the network and access the Internet through gateway devices. M...
Article
Full-text available
A new based on Semi-supervised classification theory for SAR images in contourlet domain is proposed, in this paper. Attempting to get better and faster performance, the PSO algorithm (Particle swarm optimization algorithm) and contourlet domain is proposed to instead of traditional k-means algorithm. PSO is used to find the global optimum by perfo...
Article
Temporally Ordered Routing Algorithms (TORA) is one of the most representative on-demand routing protocols in Mobile Ad Hoc Networks (MANET). This protocol is widely used in high-speed mobile MANET because of its robust topology. In order to improve the shortcomings of TORA in routing maintenance, such as high overhead and delay, and make the routi...
Article
Due to the limited computing resources and energy of IoT devices, complex computing tasks are offloaded to sufficient computing servers, such as Cloud Center. However, offloading may increase the latency and congestion of the IoT network. Mobile Edge Computing (MEC) is a promising approach, which can decrease the delay and energy consumption of IoT...
Article
Purpose This paper aims to put forward a kind of new method of intelligent trust engineering metrics for application of mobile ad hoc network (MANET). Design/methodology/approach The new method calculates the communication trust by using the number of data packets among the nodes of MANET, predicts intelligently the trust and calculates the compre...
Article
Full-text available
As a special MANET (mobile ad hoc network), VANET (vehicular ad-hoc network) has two important properties: the network topology changes frequently, and communication links are unreliable. Both properties are caused by vehicle mobility. To predict the reliability of links between vehicles effectively and design a reliable routing service protocol to...
Article
A kind of novel method of power allocation with limited cross-tier interference for cognitive radio network (CRN) is proposed in this paper. In this method, an interference-limited power allocation algorithm based on filter bank multi-carrier-offset quadrature amplitude modulation (FBMC-OQAM) is put forward. In order to improve the energy efficienc...
Article
Full-text available
This paper proposes a unified spatio-temporal model for short-term road traffic prediction. The contributions of this paper are as follows. First, we develop a physically intuitive approach to traffic prediction that captures the time-varying spatio-temporal correlation between traffic at different measurement points. The spatio-temporal correlatio...
Article
As a hierarchical network architecture, the cluster architecture can improve the routing performance greatly for vehicular ad hoc networks (VANETs) by grouping the vehicle nodes. However, the existing clustering algorithms only consider the mobility of a vehicle when selecting the cluster head. The rapid mobility of vehicles makes the link between...
Article
Full-text available
Secure message dissemination is an important issue in vehicular networks, especially considering the vulnerability of vehicle to vehicle message dissemination to malicious attacks. Traditional security mechanisms, largely based on message encryption and key management, can only guarantee secure message exchanges between known source and destination...
Article
Full-text available
Capacity of vehicular networks with infrastructure support is both an interesting and challenging problem as the capacity is determined by the inter-play of multiple factors including vehicle-to-infrastructure (V2I) communications, vehicle-to-vehicle (V2V) communications, density and mobility of vehicles, and cooperation among vehicles and infrastr...
Conference Paper
We propose a distributed and adaptive trust evaluation algorithm (DATEA) to calculate the trust between nodes. First, calculate the communication trust by using the number of data packets between nodes, and predict the trust based on the trend of this value, calculate the comprehensive trust by combining the history trust with the predict value; ca...
Article
Purpose The performance of the measurement matrix directly affects the quality of reconstruction of compressive sensing signal, and it is also the key to solve practical problems. In order to solve data collection problem of wireless sensor network (WSN), the authors design a kind of optimization of sparse matrix. The paper aims to discuss these i...
Conference Paper
In embedded Internet of Things (IOT) environment, there are the troubles such as complex background, illumination changes, shadows and other factors for detecting moving object, so we put forward a new detection service method through mixing Gaussian Mixture Model (GMM), edge detection service method and continuous frame difference method in this p...
Article
Most patch-based texture synthesis algorithms using Markov Random Field for composite materials only considers color similarity between the corresponding pixels. The traditional algorithms are lack of adaptability, so the size of patches needs to be defined artificially in advance as the result of blurring of image texture features for composite ma...
Article
Wireless mesh network (WMN) can sense information and realize end-network transmission. It consists of numerous wireless sensors, the energy and communication ability of which are limited. A kind of novel VPF-based energy-balanced routing strategy for WMN has been presented in this paper. Most of the existing energy-efficient routing strategy alway...
Article
Full-text available
One of the key problems that should be solved is the collision between tags which lowers the efficiency of the RFID system. The existed popular anti-collision algorithms are ALOHA-type algorithms and QT. But these methods show good performance when the number of tags to read is small and not dynamic. However, when the number of tags to read is larg...
Article
In order to improve above problems, this paper presents a new patch-based sampling algorithm for synthesizing textures from an input sample texture. We determine the size of block analyzing the effect of the best matched texture to synthesis result, and the result is satisfying. Moreover, the patch-based sampling algorithm remains effective when pi...
Article
Full-text available
As an important part of industrial application (IA), the wireless sensor network (WSN) has been an active research area over the past few years. Due to the limited energy and communication ability of sensor nodes, it seems especially important to design a routing protocol for WSNs so that sensing data can be transmitted to the receiver effectively....
Article
Due to the limited energy and communication ability of nodes in Wireless Sensor Network (WSN), it is especially important to design a good routing method (protocol) for WSN in order to make sensed data be transmitted to the receiver effectively. A kind of routing protocol based on Forward-Aware Factor for Energy Balance (FAF-EBRP) is proposed in th...
Article
SUMMARY We present a new radio frequency identification tag anti-collision algorithm in this paper. The main idea of this algorithm is that we should find the collided bit at first, and every tag contains a register RC, which has length the same as the tag's ID length to store the conflict bit, then all the subsequent processing are based on the co...
Article
Full-text available
Wireless Sensor Networks (WSN) is widely used as an effective medium to integrate physical world and information world of Internet of Things (IOT). While keeping energy consumption at a minimal level, WSN requires reliable communication. Multicasting is a general operation performed by the Base Station, where data is to be transmitted to a set of d...
Article
Service-aware computing is a hot research topic under the banner of web-based uncertain mobile applications. As we know, in the research domain of uncertain mobile service, service-aware evidence with uncertainty is dynamic and changing randomly. In order to ensure the QoS of different mobile application fields based on decision making, we think th...
Article
Full-text available
Matchmaking is considered as one of the crucial factors to ensure pervasive discovery of web services. Current matchmaking methods are inadequate to semantic information with machine understandable, therefore intelligent service discovery can not be carried on. In this paper, we use fuzzy linguistic variables to represent the vague or imprecise dat...
Article
Full-text available
In this article, a novel image de-noising method is proposed. This method is based on spherical coordinates system. First, spherical transform is re-defined in wavelet domain, and the properties of the spherical transform in wavelet domain are listed. Then, a new adaptive threshold in spherical coordinate system is presented. It has been proved bas...
Article
With the growth of the amount of information manipulated by embedded application systems, which are embedded into devices and offer access to the devices on the internet, the requirements of saving the information systemically is necessary so as to fulfil access from the client and the local processing more efficiently. For supporting mobile applic...
Article
Under the banner of Internet of Things (IOT), mobile service is an important hot research topic. As a part of IOT, embedded systems can offer access to the devices on Internet. For supporting mobile service, one design and implementation solution of embedded Uninterruptable Power Supply (UPS) system is brought forward for long-distance monitoring a...
Article
In this paper, we propose a new constructing approach for a weighted topology of wireless sensor networks (WSNs) based on local-world theory for the Internet of Things (IOT). Based on local-world theory, an uneven clustering weighted evolving model of WSNs is designed. The definitions of edge weight and vertex strength take sensor energy, transmiss...
Article
This paper proved a new adaptive threshold in spherical coordinate system based on Besov space norm theory for application of the internet of things (IOT). It presented a new adaptive curve shrinkage function to overcome the limitation of translational functions. The new function could reach and exceed the true value and enhance the image edge. Acc...
Article
It is well known that the data of large-scale and dense wireless sensor network has high spatial correlativity. According to the monitoring of a particular event, a new medium access control (MAC) protocol based on perceived data reliability and spatial correlation is proposed in this paper. In this protocol, a ring-shaped space correlation model i...
Article
Full-text available
Seamless migration is one of pervasive computing applications. The function of seamless mobility is suitable for mobile services such as mobile Web-based learning. In this paper, we propose an approach that supports an attentive mobile learning paradigm. This mobile learning dynamically follows the user from place to place and machine to machine wi...
Article
Full-text available
It's well known machine learning from examples is an effective method to solve non-linear classification problem. A new dynamic method of machine learning from transition example is given in this paper. This method can improve the traditional method ID3 which learns from static eigenvalues of examples. The limits of the traditional method ID3 lie o...
Article
Full-text available
In order to solve how to enhance the discovery efficiency and coverage, based on DHT (Distributed Hash Table) and Small World Theory, we put forward a new algorithm of service discovery for mobile application. In traditional DHT discovery algorithm, each node maintains the finger-table that store node information of adjacent node. By using Small-Wo...
Chapter
Service mining is the important research field in universal environment. Locating a network service or a device on demand is a challenging task for pervasive computing. We introduce a new approach that explores the use of Semantic Web language in building architecture for service mining in mobile environment in this paper. We propose a Web Ontology...
Conference Paper
The Chan-Vese model is one of the most popular region-based active contours, and its vector-valued extension is also powerful for multichannel images. Very recently, the histogram is introduced into the Chan-Vese model due to the effectiveness of histogram to model region information. Motivated by the fact that the histogram is also a powerful tool...
Conference Paper
As we know, service-aware computing is an important part of pervasive computing for Web-based mobile application with uncertainty. We modified the fusion method of evidence information after considering context's reliability, time-efficiency, and relativity, which has improved the classical fusion rule of D-S (Dempster-Shafer) Evidence Theory when...
Article
Multi-source heterogeneous information fusion is an extremely challenging problem because of the complex and highly irregular nature of environment. We consider decision fusion problem in the presence of m-dependent evidences in this paper. A new evidence fusion approach for decision of proactive service has introduced, which is extending of Class...
Conference Paper
A new clustering classification approach based on fuzzy closeness relationship (FCR) is studied in this paper. As we know, fuzzy clustering classification is one of important and valid methods to knowledge discovery. One of problems in fuzzy clustering classification is to determine a certain fuzzy sample classification in given limited sample spac...
Conference Paper
The image data are obtained by a variety of multimedia, information equipment, which include amount of information, extensive coverage, and redundancy in ubiquitous computing paradigm. In order to make use of these information reasonably and efficiently, it is necessary to fuse such massive data, therefore the multi-sensor image information fusion...
Article
In order to improve the efficiency of service discovery in the pervasive environment, this paper presents a new strategy of service discovery based on p2p network model. Reference the ring topology of chord algorithm and the algorithm used by DHT, the traditional single finger-table witch be maintained by each node in the ring will be changed into...
Conference Paper
In pervasive computing paradigm, the image data obtained by a variety of multimedia, information equipment. In order to make use of these information reasonably and efficiently, a new method for image fusion based on fuzzy neural network has presented in this paper. It can fuse massive data from the multi-sensor image. Here, fuzzy neural network is...
Article
The task-oriented proactive seamless migration is one of difficult problems to be solved in pervasive computing paradigm. Apparently, this function of seamless mobility is suitable for mobile web-based application. But when seamless migration for computing task of application is realised on PC, laptop, or PDA, there are several difficult problems t...
Article
In multi-sensor and multi-target nomadic tracking systems, for making decision, signals with noise as input must be sent to fusion center to be filtered, associated, combined and made final decision as output. In the chain, association is very important processing. In this paper, an efficient fuzzy logic data association approach for nomadic tracki...
Article
In order to get good fusion result for nomadic service under pervasive computing paradigm, based on our researches, we present a new approach of entropy-based wavelet filtering to do an adaptive soft process for nomadic decision, which is the good balance when considering both application quality and the PSNR criterion. Using a hard threshold-ing,...
Conference Paper
The traditional syntactic service matchmaking is lack of semantic information with machine understandable, so it can not achieve intelligent service discovery. In this paper, the fuzzy nature of matchmaking is considered, and the conceptions of linguistic variables in fuzzy logics are introduced into service matchmaker. The matchmaking linguistic v...
Conference Paper
A fuzzy clustering is one of important and valid methods to knowledge discovery. One of problems in fuzzy clustering is to determine a certain fuzzy sample classification in given limited sample space. Another is its validity, that is to say, if the sample is resemble in sample space, its fuzzy type will be resemble too. In our research, firstly, u...
Conference Paper
This paper presents a hybrid short-term traffic flow forecast technology. For the uncertainty, the short-term traffic flow forecast is complicated, and the accuracy is not high. This strategy combines the RBF neural network and ant colony clustering algorithm to forecast the traffic flow. It used ant colony clustering algorithm to get the centers o...
Conference Paper
Aiming to discover the rule-chains directly, a novel graph-based online incremental mining algorithm (RIOMining) is proposed. Firstly, an interrelated bitmap based on a directed graph (PAGraph) is designed to compress the rule-chain information for storage. The compressed storage of the directed-graph effectively avoids repetitious database scannin...
Conference Paper
This paper proposes the MDMA (multi-dimensional distributed mining association rules) algorithm based on advanced SQL query. The algorithm works on star-style structure networks. It uses CUBE operator in new standard SQL and combines with SQL powerful query function. So there is no need for the proposed algorithm to conduct a great deal of iteratio...
Conference Paper
A new kind of neural-based market prediction computing approach for electronic commerce has been presented by our research group in this paper. Our purpose is to suggest a successful and efficient prediction method of risk assessment for the clients to get substantial profits in competitive commerce markets of electronic commerce. In this paper we...
Conference Paper
This paper presents a neural network proportion integral differential (PID) controller for automatic gauge control (AGC) System of rolling mill, it is an high non-linear and time-varying system. The traditional PID controller has the invariable parameters. However in the actual factory, the environment of the controlled object is often changed. If...
Article
It is known to all that context-aware computing with uncertainty is an important part of pervasive computing for proactive service. Because multi-source evidence context-aware information with uncertainty is dynamic and changing randomly, in order to ensure the QoS of different application fields based on pervasive computing, we modified the fusion...
Chapter
As a new kind of computing paradigm, pervasive computing will meet the requirements of human being that anybody maybe obtain services in anywhere and at anytime, task-oriented seamless migration is one of its applications. Apparently, the function of seamless mobility is suitable for mobile services, such as mobile Web-based learning. In this artic...