scispace - formally typeset
Search or ask a question
Institution

Hefei University of Technology

EducationHefei, China
About: Hefei University of Technology is a education organization based out in Hefei, China. It is known for research contribution in the topics: Computer science & Microstructure. The organization has 28093 authors who have published 24935 publications receiving 324989 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: In this article, a self-driven near infrared light photodetector (NIRPD) was proposed for NIR light detection, which showed an obvious rectifying behavior with a turn-on voltage of 0.6 V.
Abstract: Near infrared light photodiodes have been attracting increasing research interest due to their wide application in various fields. In this study, the fabrication of a new n-type GaAs nanocone (GaAsNCs) array/monolayer graphene (MLG) Schottky junction is reported for NIR light detection. The NIR photodetector (NIRPD) shows obvious rectifying behavior with a turn-on voltage of 0.6 V. Further device analysis reveals that the photovoltaic NIRPDs are highly sensitive to 850 nm light illumination, with a fast response speed and good spectral selectivity at zero bias voltage. It is also revealed that the NIRPD is capable of monitoring high-switching frequency optical signals (∼2000 Hz) with a high relative balance. Theoretical simulations based on finite difference time domain (FDTD) analysis finds that the high device performance is partially associated with the optical property, which can trap most incident photons in an efficient way. It is expected that such a self-driven NIRPD will have potential application in future optoelectronic devices.

168 citations

Journal ArticleDOI
TL;DR: Wang et al. as discussed by the authors applied data envelopment analysis (DEA) to measure the energy and environment performance of transportation systems in China with the goal of sustainable development, treating transportation as a parallel system consisting of subsystems for passenger transportation and freight transportation, and extending a parallel DEA approach to evaluate the efficiency of each subsystem.
Abstract: Because of China’s rapid economic development, its transportation system has become one of China’s high-energy-consumption and high-pollution-emission sectors. However, little research has been done which pays close attention to China’s transportation system, especially in terms of energy and environmental efficiency evaluation. In this paper, data envelopment analysis (DEA) is applied to measure the energy and environment performance of transportation systems in China with the goal of sustainable development. This paper treats transportation as a parallel system consisting of subsystems for passenger transportation and freight transportation, and extends a parallel DEA approach to evaluate the efficiency of each subsystem. An efficiency decomposition procedure is proposed to obtain the highest achievable subsystem efficiency. Our empirical study on 30 of mainland China’s provincial-level regions shows that most of them have a low efficiency in their transportation system and the two parallel subsystems. There are large efficiency differences between the passenger and freight transportation subsystems. In addition, unbalanced development has occurred in the three large areas of China, with the east having the highest efficiency, followed by central China and then west. Therefore, more measures should be taken to balance and coordinate the development between the three large areas and between the two subsystems within them. Our analysis approach gives data for determining effective measures.

168 citations

Journal ArticleDOI
TL;DR: The paper demonstrates that the approach can provide a viable accountability solution for the online service industry and avoids the low throughput and resource intensive pitfalls associated with Bitcoin’ s “Proof-of-Work” (PoW) mining.
Abstract: Incorporating accountability mechanisms in online services requires effective trust management and immutable, traceable source of truth for transaction evidence. The emergence of the blockchain technology brings in high hopes for fulfilling most of those requirements. However, a major challenge is to find a proper consensus protocol that is applicable to the crowdsourcing services in particular and online services in general. Building upon the idea of using blockchain as the underlying technology to enable tracing transactions for service contracts and dispute arbitration, this paper proposes a novel consensus protocol that is suitable for the crowdsourcing as well as the general online service industry. The new consensus protocol is called “Proof-of-Trust” (PoT) consensus; it selects transaction validators based on the service participants’ trust values while leveraging RAFT leader election and Shamir's secret sharing algorithms. The PoT protocol avoids the low throughput and resource intensive pitfalls associated with Bitcoin’ s “Proof-of-Work” (PoW) mining, while addressing the scalability issue associated with the traditional Paxos-based and Byzantine Fault Tolerance (BFT)-based algorithms. In addition, it addresses the unfaithful behaviors that cannot be dealt with in the traditional BFT algorithms. The paper demonstrates that our approach can provide a viable accountability solution for the online service industry.

167 citations

Journal ArticleDOI
TL;DR: An up-to-date survey on the sink mobility issue is presented and several representative solutions are described following the proposed taxonomy, to help readers comprehend the development flow within a category.
Abstract: Sink mobility has long been recognized as an efficient method of improving system performance in wireless sensor networks (WSNs), e.g. relieving traffic burden from a specific set of nodes. Though tremendous research efforts have been devoted to this topic during the last decades, yet little attention has been paid for the research summarization and guidance. This paper aims to fill in the blank and presents an up-to-date survey on the sink mobility issue. Its main contribution is to review mobility management schemes from an evolutionary point of view. The related schemes have been divided into four categories: uncontrollable mobility (UMM), path-restricted mobility (PRM), location-restricted mobility (LRM) and unrestricted mobility (URM). Several representative solutions are described following the proposed taxonomy. To help readers comprehend the development flow within the category, the relationship among different solutions is outlined, with detailed descriptions as well as in-depth analysis. In this way, besides some potential extensions based on current research, we are able to identify several open issues that receive little attention or remain unexplored so far.

167 citations

Journal ArticleDOI
TL;DR: This paper reports a user study on the information needs of health seekers in terms of questions and proposes a novel deep learning scheme to infer the possible diseases given the questions, which well fits specific tasks with fine-tuning.
Abstract: Automatic disease inference is of importance to bridge the gap between what online health seekers with unusual symptoms need and what busy human doctors with biased expertise can offer. However, accurately and efficiently inferring diseases is non-trivial, especially for community-based health services due to the vocabulary gap, incomplete information, correlated medical concepts, and limited high quality training samples. In this paper, we first report a user study on the information needs of health seekers in terms of questions and then select those that ask for possible diseases of their manifested symptoms for further analytic. We next propose a novel deep learning scheme to infer the possible diseases given the questions of health seekers. The proposed scheme is comprised of two key components. The first globally mines the discriminant medical signatures from raw features. The second deems the raw features and their signatures as input nodes in one layer and hidden nodes in the subsequent layer, respectively. Meanwhile, it learns the inter-relations between these two layers via pre-training with pseudo-labeled data. Following that, the hidden nodes serve as raw features for the more abstract signature mining. With incremental and alternative repeating of these two components, our scheme builds a sparsely connected deep architecture with three hidden layers. Overall, it well fits specific tasks with fine-tuning. Extensive experiments on a real-world dataset labeled by online doctors show the significant performance gains of our scheme.

167 citations


Authors

Showing all 28292 results

NameH-indexPapersCitations
Yi Chen2174342293080
Xiang Zhang1541733117576
Jun Chen136185677368
Shuicheng Yan12381066192
Yang Li117131963111
Jian Liu117209073156
Han-Qing Yu10571839735
Jianqiao Ye10196242647
Wei Liu96153842459
Wei Zhou93164039772
Panos M. Pardalos87120739512
Zhong Chen80100028171
Yong Zhang7866536388
Rong Cao7656821747
Qian Zhang7689125517
Network Information
Related Institutions (5)
South China University of Technology
69.4K papers, 1.2M citations

92% related

Harbin Institute of Technology
109.2K papers, 1.6M citations

91% related

Tsinghua University
200.5K papers, 4.5M citations

91% related

University of Science and Technology of China
101K papers, 2.4M citations

90% related

Tianjin University
79.9K papers, 1.2M citations

90% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
2023106
2022490
20213,120
20202,931
20192,666
20182,151