Chen Xu - IEEE Xplore Author Profile

Showing 1-25 of 72 results

Filter Results

Show

Results

With the rapid popularization of electric vehicles, the safety and reliability of lithium-ion batteries, as their core power source, have become major concerns. Effective anomaly detection is crucial for ensuring the safe operation of lithium-ion batteries. This article presents a comprehensive review of the anomaly types and detection methods used in lithium-ion batteries for electric vehicles. W...Show More
Due to the high level of flexibility, Unmanned Aerial Vehicle (UAV) can be deployed as aerial base station to provide communication coverage enhancement, especially when ground service facilities are lacking or communication is unreliable. UAV-assisted content caching, which can help reduce repeated transmissions on backhaul links, has emerged as a promising solution for edge caching networks. Fed...Show More
As an important research field in time series processing, traffic prediction has a profound impact on people’s daily lives and social development. Conventional traffic prediction relies on complete observation data. However, data missing is common in cities due to equipment failure, network interruption, etc., which poses a huge obstacle to traffic prediction. In this paper, we design a novel Spat...Show More
Many rescue missions critically rely on effective perception and real-time decision making, which hinge on efficient data collection and dissemination. This study introduces a hierarchical coded caching framework leveraging symbiotic communication, enabling backscatter devices (BDs) to relay information. By strategically caching coded map fragments across unmanned aerial vehicles (UAVs) equipped w...Show More
Integrating wireless energy transfer (WET) and data gathering based on the mobile platforms, such as the unmanned aerial vehicle (UAV) has been recognized as a promising technique to prolong the battery lifetime of resource-constrained wireless sensors in the Internet of Things era. However, it is challenging to jointly schedule dynamic renewable energy sources and communications resources to coor...Show More
The sharp development of maritime activities fosters maritime Internet-of-Things (M-IoT) applications. However, the computation resources of vessels are limited, which cannot adequately satisfy high-quality services in M-IoT. With this consideration, space-air-ground-sea integrated networks (SAGSINs) are introduced in this work. Besides, a maritime distributed computation offloading framework is d...Show More
Multi-vehicle pursuit (MVP) such as autonomous police vehicles pursuing suspects is important but very challenging due to its mission and safety-critical nature. While multi-agent reinforcement learning (MARL) algorithms have been proposed for MVP in structured grid-pattern roads, the existing algorithms use random training samples in centralized learning, which leads to homogeneous agents showing...Show More
Wireless power transfer (WPT) based on mobile platforms, such as unmanned aerial vehicle (UAV), has been recognized as a promised technique to prolong battery lifetime of resource-constrained wireless sensors in the Internet of Things (IoT) era. However, it is challenging to collaborate multiple mobile wireless chargers (MWCs) for coordinating heterogeneous energy requirements of massive rechargea...Show More
As more and more applications in smart transportation emerge, the timely and efficient collection of data in the Internet of Vehicles (IoV) has become an important issue. Dy-namically changing traffic streams make it difficult for roadside units (RSUs) to collect vehicle data. Unmanned aerial vehicles (UAVs) with high mobility can be easily deployed anywhere to compensate for the limited communica...Show More
With the help of unmanned aerial vehicle (UAV), remote terminals that out of wireless coverage can be connected to the Internet of Things (IoT) networks. Currently, the IoT relies on a large number of low-cost wireless sensors with limited energy supply to realize ubiquitous monitoring and intelligent control. The hybrid-powered networks composed of wireless-powered communication (WPC) terminal an...Show More
The pursuit-evasion game in Smart City brings a profound impact on the Multi-vehicle Pursuit (MVP) problem, when police cars cooperatively pursue suspected vehicles. Existing studies on the MVP problems tend to set evading vehicles to move randomly or in a fixed prescribed route. The opponent modeling method has proven considerable promise in tackling the non-stationary caused by the adversary age...Show More
The multi-vehicle pursuit (MVP), as a problem abstracted from various real-world scenarios, is becoming a hot research topic in the Intelligent Transportation System (ITS). The combination of Artificial Intelligence (AI) and connected vehicles has greatly promoted the research development of MVP. However, existing works on MVP pay little attention to the importance of information exchange and coop...Show More
Aerial computing is an important form of mobile edge computing (MEC) to enhance network coverage. In this paper, we focus on a massive access scenario where ground devices with different types of tasks are not in service area of communication infrastructure. Therefore, we propose a task-aware multiple unmanned aerial vehicles (UAV) cooperative computing scheme that each UAV stores the program for ...Show More
In ride-hailing services, the imbalance between supply and demand is a big challenge for ride-hailing systems. In this paper, we propose the CoRLNF approach, which Combines multi-agent Reinforcement Learning and Network Flow model to implement joint Spatio-Temporal (ST) pricing and fleet management, and can effectively balance the supply and demand for ride-hailing platforms. Different from existi...Show More
Unmanned aerial vehicle (UAV) can provide communication and computation service enhancements to the In-ternet of vehicles (IoV) via flexible deployment and short-range transmission. In this paper, we investigate an energy harvesting-based UAV-assisted vehicular edge computing framework, where the UAV equipped with edge server helps to execute vehicular computing tasks, and meanwhile harvests energ...Show More
With the emergence of various newly developing applications, the computational tasks generated in the internet of things become more diverse. It is vital to match the diverse tasks with network resources according to the task differential de-mands (e.g., latency, energy, security). In device-to-device (D2D) assisted heterogeneous networks (HetNets), tasks can be offloaded to idle devices or base s...Show More
With the help of unmanned aerial vehicle (UAV), remote terminals that out of wireless coverage can be connected to the Internet of Things (IoT) networks. Currently, the IoT relies on a large number of low-cost wireless sensors with limited energy supply to realize ubiquitous monitoring and intelligent control. The wireless powered communication (WPC) and the non-orthogonal multiple access (NOMA) t...Show More
Service caching refers to caching the necessary programs or/and the related databases for performing computational tasks at edge servers, which has been considered to save both computation and communication resources in mobile edge computing (MEC) systems. In this paper, we investigate computation service caching in a multi-unmanned aerial vehicle (UAV) enabled MEC system, where each UAV equipped ...Show More
Solar harvesting, as the most mature environmental energy harvesting technology, can provide a convenient, low-carbon, and off-grid solution for energy-constrained WSN in remote environmental monitoring. However, the stochastic and intermittent nature of solar energy seriously affects network energy efficiency. In this paper, we jointly consider solar harvest deployment and scheduling for clustere...Show More
In order to enhance the sustainability of rechargeable wireless sensor networks (RWSN), a deep-q-networks (DQN)-based adaptive dual-mode energy-efficient routing is proposed in this paper. Firstly, the life expectancy of each node is calculated based on multiple related factors, and a multi-hop routing based on forward transmission principle is proposed by using the indicator. Then according to th...Show More
The future wireless network will face demands of massive connectivity and intensive computation with the increase of mobile devices. Mobile edge computing (MEC) and Device-to-Device (D2D) have emerged as promising technologies to address the above challenges, and implementing social relationships in D2D-MEC networks can improve the reliability of D2D links. Exploiting these benefits, we investigat...Show More
Cluster-based channel modeling has gradually become a trend in the development of a channel model, since it is a good compromise between accuracy and complexity. However, most of the existing clustering algorithms require prior knowledge of clusters, initialization, and threshold choices. An accurate and automatic cluster identification algorithm is therefore highly desirable for channel modeling....Show More
In this article, with the aim to enhance the secure transmission and improve the utilization of spectrum resources in Internet of Things (IoT), a multicarrier nonorthogonal multiple access (MC-NOMA)-assisted full duplex (FD) network is investigated, in which nonorthogonal multiple access (NOMA) is implemented in both uplink and downlink transmissions. The lightweight and low-power physical layer s...Show More
Service caching refers to caching the necessary programs or the related databases for executing computational tasks at edge servers, which has been considered to save both computation and communication resources in mobile edge computing (MEC) systems. In this paper, we investigate computation service caching in a multi-unmanned aerial vehicle (UAV) assisted MEC system, where each UAV equipped with...Show More
The future wireless network will face demands of massive connectivity and intensive computation with the increase of mobile devices. Mobile edge computing (MEC) and Device-to-Device (D2D) have emerged as promising technologies to address the above challenges, and implementing social relationships in D2D cooperative computing can improve the reliability of D2D links. Exploiting these benefits, we i...Show More