Limei Peng's research while affiliated with University of Waterloo and other places
What is this page?
This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
Publications (31)
With the rise of the Industrial Internet of Things (IIoT), more and more industrial devices can be connected via the network. Data collection, processing, analysis, task execution, and other devices that can product network traffic volume are gradually being deployed to IIoT. However, under the limited spectrum resources and low-cost and low-energy...
Residential power line is considered a cost-effective communication media for building a digital indoor distributed network thanks to its ubiquity in the indoor environment. This paper investigates a front-hauling system under the split centralized radio access network (C-RAN) architecture, aiming to examine the feasibility of implementing common p...
Transmitter authentication is significantly critical to secure millimeter wave (mmWave) multiple-input multiple-output (MIMO) systems. By utilizing the mmWave MIMO channel and carrier frequency offset (CFO), this paper proposes a novel online machine learning-based physical layer authentication scheme to validate transmitter identities. In particul...
5G and beyond (B5G) applications generate tremendous computing-intensive, latency-sensitive, and privacy-sensitive tasks, which differ from the legacy cloud computing tasks, requiring more sophisticated scheduling strategies. We must satisfy the stringent service requirements, particularly privacy preservation that has not been sufficiently conside...
Prediction of social IoT (SIoT) data traffic is helpful in characterizing the complicated relationships for such as device-to-device, user-to-user, and user-to-device. One of the most popular traffic prediction methods in noisy environments is the Kalman filter (KF), which is extremely simple and general. Nevertheless, KF requires a dynamic traffic...
Passive user authentication is critical for the secure operation of Industrial Internet of Things (IIoT) systems. By jointly utilizing both the time-varying characteristics of the user sequential operation actions and spatial variation characteristics of channel state information (CSI) caused by these actions, this paper proposes a novel two-dimens...
IoT (Internet of Things) streaming data has increased dramatically over the recent years and continues to grow rapidly due to the exponential growth of connected IoT devices. For many IoT applications, fast stream query processing is crucial for correct operations. To achieve better query performance and quality, researchers and practitioners have...
The recent revival of artificial intelligence (AI) is revolutionizing almost every branch of science and technology. Given the ubiquitous smart mobile terminals and Internet of Things (IoT) devices, it is expected that a majority of intelligent applications will be deployed at the edge networks. Therefore, providing intelligent and sustainable edge...
Numerous new applications have been proliferated with the mature of 5G, which generates a large number of latency-sensitive and computationally intensive mobile data requests. The real-time requirement of these mobile data has been accommodated well by fog computing in the past few years, mainly through offloading tasks to fog nodes in the vicinity...
The huge volume of IoT data generated by emerging IoT end devices have triggered the prosperous development of Fog computing in the past years, mainly due to their real-time requirements. Fog computing aims at forming the idle edge devices that are in the vicinity of IoT end devices as instantaneous small-scale Fog networks (Fogs), so as to provide...
The volume of streaming sensor data from various environmental sensors continues to increase rapidly due to wider deployments of IoT devices at much greater scales than ever before. This, in turn, causes massive increase in the fog, cloud network traffic which leads to heavily delayed network operations. In streaming data analytics, the ability to...
In this paper, we study a multi-tier C-RAN architecture and propose flexible heterogeneous functional split schemes for it based on the concept of virtual remote radio heads (V-RRHs), aiming at optimizing the resource utilization and reducing the overall cost of BBU pool. A V-RRH consists of a digital unit (DU) borrowed from the macro base stations...
This article considers a radio-over-cable (RoC)based analog link on a local area network (LAN) cable [e.g., category (CAT) 5] as the last hop of the fronthaul for indoor mobile service coverage. We first present state-of-the-art mobile systems with RoC-based fronthauls and then discuss a number of critical issues regarding real implementation. Thes...
The incoming 5G technology is expected to proliferate tremendous internet-of-thing (IoT) services with real-time and mobility requirements, which are quite different from the legacy cloud services. Due to the centralized management relying on distant datacenters, cloud computing is short of satisfying the stringent IoT requirements, such as ultra-l...
The paper proposes a novel adaptive radio-over-fiber (RoF) system for next-generation cloud radio access network (C-RAN), aiming to optimize the operation cost in terms of power consumption while maintaining required data rate. By jointly considering the nonlinear distortion from Mach-Zehnder modulator (MZM) and high power amplifier (HPA) due to hi...
This paper studies a cache-enabled cross-haul network (Ce-XHaul) infrastructure under the banner of 5G, aiming at offloading data requests in the backhaul networks by means of extremely restricting the provisioning of user requests in the fronthaul networks. The major motivation behind Ce-XHaul is to install a proper amount of cache storage in base...
Group division is a typical task involved in online social network analysis. Group division can be based on static and dynamic relationships. Compared to static group division, dynamic interactions between users can better reflect the intimacy of relationships between users in the online social network. This paper proposes a group division method b...
The paper studies the scenario of wireless multicast with a single transmitter and a relay that deliver scalable source symbols to the receivers in a decode-and-forward (DF) fashion. With the end-to-end mean square error distortion (EED) as performance metric, we firstly derive the EED expression for the $L$-resolution scalable source symbol for an...
Citations
... A RIS is a reflective surface with multiple antenna-like devices that can modify the phase of the reflected wave and it has the ability to intelligently control wireless channels in order to optimize wireless performance [32]. UAV network and the RIS have been studied in [33]- [35]. Furthermore, software-defined RIS can effectively alter their impinging signals to improve specific key performance indicators [36]. ...
... (2) To iteratively calculate the emotional value of the vertex using a graph propagation algorithm on this graph. Existing graph propagation algorithms include Random Walk, PageRank and Label Propagation (Kamal et al., 2017;Qiu et al., 2018). In the process of calculating the edge weights, information such as parsing results, syntactic context, and linguistic knowledge in the dictionary are used. ...
... A multi-UAV system has clear advantages in both space and time of task execution. For one thing, a group of UAVs can complete multiple tasks simultaneously in different geographical locations [7]. Additionally, these UAVs can flexibly cope with the changing environment. ...
... The isomorphic graph network was introduced to predict future traffic conditions. Finally, the advantages of the proposed model were verified through experiments [9]. proposed a heterogeneous Autonomous Underwater Vehicle (AUV)based auxiliary IAM. ...
... The IoT has various advantages in day to day lives, helping people by associating various sensors and actuators. Likewise, managing various solicitations from various gadgets simultaneously is a typical subject for researchers concentrating on the IoT can happen just when the load scheduling is done appropriately [6]. Consequently, both load scheduling and asset portion have been considered as required activities for all cycles to be performed. ...
... It signifies that academic collaboration study that transcends geographical borders has been formed, which is extremely useful to research breakthroughs. The highest ties were between the two nations, like China-UK (13), USA-Malaysia (6), China-USA (44), China-India (10), China-Canada (16), and Saudi Arabia-Egypt (10) in terms of link strength. Nevertheless, compared to the network's potential linkages, the present connections have remained extremely restricted. ...
... In authors in [15] focused on how to protect user privacy while offloading jobs and lowering the average E2E delay of IoT tasks and reduce the workload. [16] IoT jobs were classified according to their security levels, with high-security tasks being divided into chunks supplied by fog nodes from various SPs. In this [17] the authors propose IoT fog cloud architecture which takes advantage of fog and cloud. ...
Reference: FPMS: A Fog based Poultry Monitoring System
... Similarly, the edge-cloud-based query processing is also playing a vital role in the effort of reducing the query execution latency [1,3,[15][16][17][18][19][20]. Edge and fog computing have emerged as promising paradigms for meeting stringent processing demands of latency-sensitive applications [20][21][22][23][24][25]. ...
... Theoretical & mathematical concepts on split 8 [59], [60], [61], [62], [51], [63], [64], [65], [66], [67], [68] Analysis integrate analog sub-systems. gNodeB [54] from IS-Wireless (ISW) [55] is a software solution that can be deployed on either physical or virtual resources. ...
... Immediate timing can be utilized in the imaging processes of optical satellites. Conventional offline timing causes wastage of computational resources, and due to the dynamic environmental changes, immediate timing is needed to optimize and decrease computational costs [24]. In smart buildings, an efficient schedule is used to save energy consumption and user convenience and reduce energy costs [25]. ...