ORCID Profile
0000-0002-0357-8284
Current Organisation
RMIT University
Does something not look right? The information on this page has been harvested from data sources that may not be up to date. We continue to work with information providers to improve coverage and quality. To report an issue, use the Feedback Form.
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2020
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2019
Publisher: MDPI AG
Date: 12-07-2023
DOI: 10.3390/PHOTONICS10070811
Abstract: Underwater wireless communication (UWC) technology has attracted widespread attention in the past few years. Compared with conventional acoustic underwater wireless communication technology, underwater optical wireless communication (UOWC) technology has promising potential to provide high data rate wireless connections due to the large license-free bandwidth. Building a high-performance and reliable UOWC system has become the target of researchers and various advanced and innovative technologies have been proposed and investigated. Among them, better hardware such as transmitters and receivers, as well as more advanced modulation and signal processing techniques, are key factors in improving UOWC system performance. In this paper, we review the recent development in UOWC systems. In particular, we provide a brief introduction to different types of UOWC systems based on channel configuration, and we focus on various recent studies on advanced signal processing methods in UOWC systems, including both traditional non-machine learning (NML) equalizers and machine learning (ML) schemes based on neural networks. In addition, we also discuss the key challenges in UOWC systems for future applications.
Publisher: OSA
Date: 2013
Publisher: Elsevier BV
Date: 03-2022
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 11-2012
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 07-2019
Publisher: Telecommunications Association Inc.
Date: 21-09-2022
Abstract: The fifth generation (5G) mobile network technologies include ultra-Reliable Low Latency Communications (uRLLC) capability. To fully exploit uRLLC, distributed Multi- access Edge Computing (MEC) is being developed and introduced at the network edge with an architecture that supports applications and services. Some of the MEC applications will benefit from uRLLC, including virtual reality, augmented reality, education, health, online gaming, automatic manufacturing and Vehicle-to-everything. However, unique challenges and opportunities exist for 5G cellular networks and MEC due to a range of factors, including end-user device mobility and the implementation of the network Control Plane (CP) and User Plane (UP). In this regard, there is a need to optimize protocols and network architecture. This paper investigates latency and related network elements in the next generation mobile cellular network. We also analyze the 5G network latency in the CP and UP. Finally, the paper identifies protocol optimization considerations for MEC integration with 5G to achieve low end-to-end latency.
Publisher: IEEE
Date: 11-2019
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 08-2016
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 08-2022
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 12-2022
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2014
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2022
Publisher: The Optical Society
Date: 27-11-2013
Publisher: The Optical Society
Date: 29-03-2013
Publisher: Hindawi Limited
Date: 29-06-2022
DOI: 10.1155/2022/3178760
Abstract: Multiaccess Edge Computing (MEC) has been adopted to provide an environment that supports cloud computing capabilities and IT services at the network edge. The open architecture of cloud computing and network access at the edge provides malicious actors with many attack vectors. The MEC system entities cannot be permanently trusted due to the dynamic and shareable nature of MEC deployments. This paper presents a classification of MEC entities that can be used to define security controls based on the Zero-Trust Security approach. The security controls are organised into a maturity framework that can be used to guide the systematic development of trust and security in an MEC environment. In this framework, a Minimum Viable Security posture defines the first operational step towards full implementation of Zero-Trust Security in an MEC environment.
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2023
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 15-10-2015
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2023
Publisher: IEEE
Date: 05-2018
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2022
Publisher: IEEE
Date: 11-2019
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2021
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2019
Publisher: Elsevier BV
Date: 09-2021
Publisher: Oxford University Press (OUP)
Date: 08-02-2018
Publisher: Elsevier BV
Date: 11-2015
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2023
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 03-2013
Publisher: MDPI AG
Date: 19-07-2017
DOI: 10.3390/S17071660
Publisher: The Optical Society
Date: 31-05-2013
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 06-2019
Publisher: Informa UK Limited
Date: 02-05-2021
Publisher: IEEE
Date: 05-2018
Publisher: The Optical Society
Date: 27-07-2017
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2021
Publisher: Hindawi Limited
Date: 12-05-2022
DOI: 10.1155/2022/3955800
Abstract: The Internet consists of distributed and interconnected autonomous systems (ASs). The flexibility afforded by the Internet architecture ensures that timely changes to the network topology can occur without centralized control. The Border Gateway Protocol (BGP) is an Internet protocol that routes the Internet traffic and exchanges the information between AS. However, BGP version 4 (BGP-4) currently suffers from a limitation called “high convergence delay” while doing routing updates, which is a very common limitation, damaging the performance of contemporary IP networks. Software-defined networking (SDN) was conceived at the beginning of the 21st century, and over the intervening years, it has gained traction. This technology has significantly enhanced traffic control, management, and monitoring, particularly in data centres and enterprise networks. Challenges have been found including how to provide administrative control, security, management, and monitoring at domain boundaries while introducing the SDN paradigm. In multidomain SDN, BGP-4 is used to exchange the information and route the traffic between domains or erse AS. In this review, an investigation is provided on using the SDN paradigm to enhance multidomain traffic management and control and to optimize BGP operation. A detailed insight is provided into the penetration of the SDN paradigm into modern networking architectures and how it may help in facilitating future research to improve BGP-4.
No related grants have been discovered for Shuo Li.