Patents by Inventor Shizhong Xu
Shizhong Xu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230422140Abstract: The present invention provides a method for optimizing the energy efficiency of wireless sensor network based on the assistance of unmanned aerial vehicle, firstly, collecting the state of the WSN through current routing scheme, and inputting the state of the WSN into the decision network of the agent to determine a next hover node; Secondly, based on the location of the next hover node, generating a new routing scheme by the UAV, and sending each sensor node's routing to its corresponding sensor node through current routing by the UAV; Lastly, after all sensor nodes have received their routings respectively, all sensor nodes send their collected data to the hover node through their routings respectively, and the UAV flies to and hovers above the next hover node to collect data through the next hover node, thus the data collection of the whole WSN is completed.Type: ApplicationFiled: September 12, 2023Publication date: December 28, 2023Applicant: University of Electronic Science and Technology of ChinaInventors: Jing REN, Jianxin LIAO, Tongyu SONG, Chao SUN, Jiangong ZHENG, Xiaotong GUO, Sheng WANG, Shizhong XU, Xiong WANG
-
Publication number: 20230231796Abstract: A method for energy efficient routing in wireless sensor network based on multi-agent deep reinforcement learning, predefines a to-be-deployed wireless sensor network and creates a cooperative routing decision system including A decision networks and one sink module, A decision networks deployed on the agents ai, i=1, 2, . . . , A, of the sensor nodes, the sink module deployed on the sink node n0. The decision network obtains a probability vector according to its local observation and position vectors. The sink module calculates a routing for each sensor node according the probability vectors of A decision networks and sends the routings to corresponding sensor nodes. A multi-agent deep reinforcement learning algorithm is adopted to train the decision networks of A agents ai, i=1, 2, . . . , A of the cooperative routing decision system, deploys the to-be-deployed wireless sensor network into an environment and updates the routing policy of the deployed wireless sensor network at each update cycle of routing.Type: ApplicationFiled: March 24, 2023Publication date: July 20, 2023Applicant: UNIVERSITY OF ELECTRONIC SCIENCE AND TECHNOLOGY OF CHINAInventors: Jing REN, Tongyu SONG, Jiangong ZHENG, Xiaotong GUO, Xuebin TAN, Sheng WANG, Shizhong XU, Xiong WANG
-
Patent number: 10893866Abstract: A system including a first base sheet, a second base sheet, a first plurality of individual strip sections extending out of said first base sheet, a second plurality of individual strip sections extending out of the second base sheet, wherein said first plurality of individual strip sections are operable for engagement and disengagement with said second base sheet and wherein said second plurality of individual strip sections are operable for engagement and disengagement with said first base sheet to enable and maintain wound closure and allow application of antibiotics to prevent and/or treat wound infection or application of other topical agents without removing and replacing the system.Type: GrantFiled: March 26, 2018Date of Patent: January 19, 2021Inventors: Shidong Xu, Shizhong Xu
-
Publication number: 20190290278Abstract: A system including a first base sheet, a second base sheet, a first plurality of individual strip sections extending out of said first base sheet, a second plurality of individual strip sections extending out of the second base sheet, wherein said first plurality of individual strip sections are operable for engagement and disengagement with said second base sheet and wherein said second plurality of individual strip sections are operable for engagement and disengagement with said first base sheet to enable and maintain wound closure and allow application of antibiotics to prevent and/or treat wound infection or application of other topical agents without removing and replacing the system.Type: ApplicationFiled: March 26, 2018Publication date: September 26, 2019Inventors: Shidong Xu, Shizhong Xu
-
Patent number: 8892725Abstract: The present invention relates to a method for detecting Network Anomaly in network architectures based on locator/identifier split, the detection flow is as follows: initialization processing, and in ITR: processing data packets, sending a Map-Request, determining whether to send an additional Map-Request, sending the data packet, processing the Map_Reply, processing EID-to-RLOC Cache entry expired; in ETR: processing data packet, processing Map-Request, determining whether the traffic of the ITR currently sending the Map-Request is abnormal, replying to the ITR of which the query traffic is abnormal, replying to ITR of which the query traffic is abnormal. With respect to the characteristic that the network architecture based on locator/identifier split needs to query the relationship between the locator and the identifier for packet delivery, the present invention detects Network Anomaly based on query traffic instead of network data packet traffic.Type: GrantFiled: November 2, 2010Date of Patent: November 18, 2014Assignee: University of Electronic Scienece and Technology of ChinaInventors: Sheng Wang, Jing Ren, Du Xu, Shizhong Xu
-
Patent number: 8059535Abstract: A method and a core router for implementing forward delay for bursts are disclosed. The core router configured with an FDL performs proactive delay processing for the burst to be overlapped after predicting that the burst will be overlapped on the link to be protected, thus reducing the probability of burst conflict on the downstream link to be protected. After finding that burst conflict will occur on the output port of the core router at a future moment, the core router sends a burst delay request to the upstream core router, requesting the upstream core router that has an FDL and the delay capability to delay the burst. Therefore, the FDL configured in the network is brought into full play, and the probability of burst conflict is reduced.Type: GrantFiled: May 20, 2009Date of Patent: November 15, 2011Assignee: Huawei Technologies Co., Ltd.Inventors: Sheng Wang, Yulei Qi, Du Xu, Shizhong Xu, Yi Zhang
-
Patent number: 8050284Abstract: A method for controlling burst assembly, device, and communication equipment thereof are provided. In the present invention, an assembly time and a predetermined time threshold are compared to determine a load change in a cache queue. If the load is increased or decreased suddenly, a length threshold is directly increased or decreased. If the load is to be increased, the length threshold is randomly increased according to a certain probability. If the load is to be decreased, the length threshold is randomly decreased according to a certain probability. If the load is in a normal state, the length threshold is maintained. Therefore, the length threshold is dynamically adjusted with the load change. The method and device provided by the present invention ensure an end-to-end (E2E) delay of the services and optimize the network performance.Type: GrantFiled: May 12, 2009Date of Patent: November 1, 2011Assignee: Huawei Technologies Co., Ltd.Inventors: Lu Zhao, Sheng Wang, Shizhong Xu, Yi Zhang
-
Publication number: 20110196961Abstract: The present invention relates to a method for detecting Network Anomaly in network architectures based on locator/identifier split, the detection flow is as follows: initialization processing, and in ITR: processing data packets, sending a Map-Request, determining whether to send an additional Map-Request, sending the data packet, processing the Map_Reply, processing EID-to-RLOC Cache entry expired; in ETR: processing data packet, processing Map-Request, determining whether the traffic of the ITR currently sending the Map-Request is abnormal, replying to the ITR of which the query traffic is abnormal, replying to ITR of which the query traffic is abnormal. With respect to the characteristic that the network architecture based on locator/identifier split needs to query the relationship between the locator and the identifier for packet delivery, the present invention detects Network Anomaly based on query traffic instead of network data packet traffic.Type: ApplicationFiled: November 2, 2010Publication date: August 11, 2011Applicant: University of Electronic Science and Technology of ChinaInventors: Sheng WANG, Jing Ren, Du Xu, Shizhong Xu
-
Publication number: 20090245269Abstract: A method and a core router for implementing forward delay for bursts are disclosed. The core router configured with an FDL performs proactive delay processing for the burst to be overlapped after predicting that the burst will be overlapped on the link to be protected, thus reducing the probability of burst conflict on the downstream link to be protected. After finding that burst conflict will occur on the output port of the core router at a future moment, the core router sends a burst delay request to the upstream core router, requesting the upstream core router that has an FDL and the delay capability to delay the burst. Therefore, the FDL configured in the network is brought into full play, and the probability of burst conflict is reduced.Type: ApplicationFiled: May 20, 2009Publication date: October 1, 2009Inventors: Sheng WANG, Yulei QI, Du XU, Shizhong XU, Yi ZHANG
-
Publication number: 20090220238Abstract: A method for controlling burst assembly, device, and communication equipment thereof are provided. In the present invention, an assembly time and a predetermined time threshold are compared to determine a load change in a cache queue. If the load is increased or decreased suddenly, a length threshold is directly increased or decreased. If the load is to be increased, the length threshold is randomly increased according to a certain probability. If the load is to be decreased, the length threshold is randomly decreased according to a certain probability. If the load is in a normal state, the length threshold is maintained. Therefore, the length threshold is dynamically adjusted with the load change. The method and device provided by the present invention ensure an end-to-end (E2E) delay of the services and optimize the network performance.Type: ApplicationFiled: May 12, 2009Publication date: September 3, 2009Applicant: Huawei Technologies Co., Ltd.Inventors: Sheng WANG, Lu ZHAO, Shizhong XU, Yi ZHANG