Loading [MathJax]/extensions/MathMenu.js
Xingran Chen - IEEE Xplore Author Profile

Showing 1-12 of 12 results

Filter Results

Show

Results

To realize workshop object detection, this paper firstly builds a workshop object detection dataset composed of computer numerical control machine tools and robot arms and proposes DG-YOLOX based on YOLOX-Tiny. Then, to improve the quality of upsampling features of the model, an upsampling module based on the Warp-Up operation is proposed. Next, the deformable grid decoupled head is proposed to in...Show More
In applications of group testing in networks, e.g. identifying individuals who are infected by a disease spread over a network, exploiting correlation among network nodes provides fundamental opportunities in reducing the number of tests needed. We model and analyze group testing on n correlated nodes whose interactions are specified by a graph G. We model correlation through an edge-faulty random...Show More
At present, the cooperative scheduling structure of power generation in the source-grid box-type substation is mostly set in one-way form, and the coverage of scheduling is small, which leads to the decrease of the stability probability of damping ratio. Therefore, the design and verification analysis of the cooperative scheduling method of power generation in the source-grid box-type substation c...Show More
In applications of group testing in networks, e.g. identifying individuals who are infected by a disease spread over a network, exploiting correlation among network nodes provides fundamental opportunities in reducing the number of tests needed. We model and analyze group testing on n correlated nodes whose interactions are specified by a graph G. We model correlation through an edge-faulty random...Show More
In applications of remote sensing, estimation, and control, timely communication is critical but not always ensured by high-rate communication. This work proposes decentralized age-efficient transmission policies for random access channels with $M$ transmitters. We propose the notion of age-gain of a packet to quantify how much the packet will reduce the instantaneous age of information at the r...Show More
The interplay between timeliness and rate efficiency is investigated in packet erasure broadcast channels with feedback. A scheduling framework is proposed in which coding actions, as opposed to users, are scheduled to attain desired tradeoffs between rate and age of information (AoI). This tradeoff is formalized by an upper bound on AoI as a function of the target rate constraints and two lower b...Show More
Real-time sampling and estimation of autoregressive Markov processes is considered in random access channels. Two classes of policies are studied: (i) oblivious policies in which decision making is independent of the source realizations, and (ii) non-oblivious policies in which sources are observed causally for decision making. In the first class, minimizing the expected time-average estimation er...Show More
In applications of remote sensing, estimation, and control, timely communication is not always ensured by high-rate communication. Oftentimes, it is observed that as the capacity of a system is approached, delay increases significantly and so does age of information - a metric recently proposed to capture freshness and timeliness of information. This work proposes decentralized age-efficient trans...Show More
This paper investigates the incentives of mobile network operators (MNOs) for acquiring additional spectrum to offer mobile virtual network operators (MVNOs) and thereby inviting competition for a common pool of end users (EUs). We consider interactions between two service providers (SPs), a MNO and an MVNO, under two different scenarios: 1) EUs must choose one of them 2) EUs have the option to de...Show More
This paper investigates the incentives of mobile network operators (MNOs) for acquiring additional spectrum to offer mobile virtual network operators (MVNOs) and thereby inviting competition for a common pool of end users (EUs). We consider a base case and two generalizations: (i) one MNO and one MVNO, (ii) one MNO, one MVNO and an outside option, and (iii) two MNOs and one MVNO. In each of these ...Show More
Age of Information (AoI) is studied in two-user broad-cast networks with feedback, and lower and upper bounds are derived on the expected weighted sum AoI of the users. In particular, a class of simple coding actions is considered and within this class, randomized and deterministic policies are devised. Explicit conditions are found for symmetric dependent channels under which coded randomized pol...Show More
Coding for random access communication is a key challenge in Internet of Things applications. In this paper, the well-known scheme of Coded Slotted Aloha (CSA) is considered and its performance is analyzed in the non-asymptotic regime where the frame length and the number of users are finite. A density evolution framework is provided to describe the dynamics of decoding, and fundamental limits are...Show More