- Cryptography and Data Security
- Geotechnical Engineering and Underground Structures
- Blockchain Technology Applications and Security
- Geoscience and Mining Technology
- Civil and Geotechnical Engineering Research
- IoT and Edge/Fog Computing
- Internet Traffic Analysis and Secure E-voting
- Machine Fault Diagnosis Techniques
- Infrastructure Maintenance and Monitoring
- Network Security and Intrusion Detection
- Smart Grid and Power Systems
- Traffic Prediction and Management Techniques
- Advanced Steganography and Watermarking Techniques
- Advanced Fiber Optic Sensors
- Geotechnical Engineering and Analysis
- High-Voltage Power Transmission Systems
- Grouting, Rheology, and Soil Mechanics
- Geomechanics and Mining Engineering
- Advanced Algorithms and Applications
- Railway Engineering and Dynamics
- Vehicular Ad Hoc Networks (VANETs)
- Energy Efficient Wireless Sensor Networks
- Software Engineering Research
- Topic Modeling
- Coal Combustion and Slurry Processing
China Coal Research Institute (China)
2021-2025
Energy Research Institute
2021-2025
Xi'an University of Science and Technology
2008-2025
Xi'an University of Technology
2010-2024
China Coal Technology and Engineering Group Corp (China)
2019-2024
Wuhan Sixth Hospital
2024
Weatherford College
2024
Xi’an University
2023
Hefei University
2016-2021
Xi'an Railway Survey and Design Institute
2020
6 G and mobile Internet-of-Vehicles (IoV) technology require a secure, open, transparent system. Blockchain has the characteristics of decentralization, non-tampering, traceability, which can improve robustness, data privacy, security transparency overall Therefore, blockchain will be most promising to ensure privacy vehicle networks. In this article, we propose novel IoV block-streaming service awareness trusted verification in G. The edge node uploads microservices calling diagram network....
Slurry filling technology has been increasingly adopted in coal mines the northwest region. However, due to complexity of slurry transport pipelines, blockages remain a frequent issue. These can reduce operational efficiency, with different blockage types causing varying levels damage. Despite significance this issue, there is limited in-depth analysis literature, especially regarding role pressure pipeline blockages. This study utilizes FLUENT 2020R2 (the fluid simulation software) for...
Hypertensive heart disease was difficult to cure with drugs, and most patients had poor compliance, leading recurrent quality of life. The intelligent management mode based on the Internet Things avoided excessive dependence elderly medical institutions in traditional model enabled monitor themselves. This study aimed explore impact self-management ability prognosis hypertensive disease. A total 150 who received treatment from April 2020 2022 were selected divided into control group (n = 75...
With the development of intelligent transportation system, maintenance railway turnout is an essential daily task which was required to be efficiency and automatically. This paper presents diagnosis method based on deep learning curve segmentation Support Vector Machine. Firstly, we studied approach real-time monitoring power data collected form turnout, for step do a great help improve diagnose accuracy. Then well pre-processed sets, SVM algorithm applied classify samples report health...
In recent years, with the rapid increase in coverage and lines, security maintenance has become one of top concerns regard to railway transportation China. As key infrastructure, turnout system (RTS) plays a vital role transportation, which will cause incalculable losses when accidents occur. The traditional fault-diagnosis methods RTS are no longer applicable growing amount data, so intelligent fault diagnosis research hotspot. However, challenge is effectively extract deep features signal...
Mobile edge computing (MEC), as the key technology to improve user experience in a 5G network, can effectively reduce network transmission delay. Task migration migrate complex tasks remote servers through wireless networks, solving problems of insufficient capacity and limited battery mobile terminals. Therefore, order solve problem "how realize low-energy dependent applications," subtask partitioning model with minimum energy consumption is constructed based on relationship between...
With the rapid development of 5G technology, its high bandwidth, reliability, low delay, and large connection characteristics have opened up a broader application field IoT. Moreover, AIoT (Artificial Intelligence Internet Things) has become new direction Through deep learning real-time data provided by Things, AI can judge user habits more accurately, make devices behave in line with expectations, intelligent, thus improving product experience. However, process, there is lot interaction...
Abstract Identifying the change‐prone parts of software could help managers and developers to effectively allocate maintenance resource time during early phases life cycle. Change‐proneness prediction on file level with binary classification methods makes such identification possible. As fact that files frequently account for a small part all files, performance standard is not satisfying. In this paper, we employ imbalanced learning methods, including bagging, resampling, especially their...
The pervasiveness of personalized collaborative recommender systems has shown the powerful capability in a wide range E-commerce services such as Amazon, TripAdvisor, Yelp, etc. However, fundamental vulnerabilities leave space for malicious users to affect recommendation results attackers desire. A vast majority existing detection methods assume certain properties attacks are given advance. In reality, improving performance is usually constrained due challenging issues: (a) various types...
This paper analyses characteristics of single-phase ground fault and presents a line selecting method based on wavelet transform. Base Sampling frequency, it selects the special frequency band, singularity detection with is employed to obtain polarities magnitudes abrupt current, through comparing circuit can be determined. So technique correct, feasible, proved by great deal simulating tests.
Internet of things is characterized by limited energy and distributed topology. In this scenario, a secure energy-saving routing algorithm plays significant role in ensuring the performance things. Due to different standards communication stacks, traditional security mechanisms heavily rely on trust management function well. article, we propose an energy-aware trustworthy multi-hop model for To balance consumption trust, whole from source destination should be considered appraisal, rather...
In a high-speed rail system, the driver repeatedly adjusts train’s speed and traction while driving, causing high level of energy consumption. This also leads to instability operation, affecting passengers’ experiences operational efficiency system. To solve this problem, we propose variational graph auto-encoder (VGAE) model using neural network learn posterior distribution. can effectively capture correlation between components system simulate drivers’ operating state accurately. The...
<title>Abstract</title> Gangue-filled mining technology represents the significant advancement in green mining. To investigate mechanism of pressure reduction gangue-filled and sensitivity main controlling factors, mechanical model was first developed based on advanced support The method for calculating filled derived from beam structural stress characteristics. Then, numerical simulation methods were employed to analyze patterns geological conditions. Finally, orthogonal experiments...
Diffusion models, such as Stable Diffusion, have made significant strides in visual generation, yet their paradigm remains fundamentally different from autoregressive language complicating the development of unified language-vision models. Recent efforts like LlamaGen attempted image generation using discrete VQVAE tokens, but large number tokens involved renders this approach inefficient and slow. In work, we present Meissonic, which elevates non-autoregressive masked modeling (MIM)...
Slurry filling technology has gradually been adopted in coal mines the northwest region. However, due to complexity of slurry transport pipelines, blockages remain a frequent issue. Pipeline can adversely impact production, reducing operational efficiency, with different blockage types causing varying degrees harm. Despite significance this issue, there is limited in-depth analysis literature, especially regarding role pressure pipeline blockages. This study utilizes FLUENT software for...
In recent years, with the continuous promotion of blockchain technology, application smart contracts has shown an explosive growth trend, and contract vulnerabilities seriously threaten ecological security blockchain. Aiming at inefficiency existing Symbolic Execution vulnerability detection this paper proposes effective method source code level. Firstly, we define critical path. As attackers typically aim to steal or freeze funds, path related fund transfer as path, its instructions are...
In a (k, n) secret sharing scheme, k or more qualified shareholders can reconstruct the secret, but less than of them are unable to get any information about secret. The schemes with cheating detection were designed solve problem that some vicious participants (cheaters) release forged shares in reconstruction. We divide cheaters into inside and outside based on their different identities. who aim cheat other honest shareholders, disqualified do not receive from dealer, they try filch valid...
Recently, more and shield-driven construction projects have to cross over or under the existing metro line in soft soil China. To evaluate influence of such construction, three major factors were studied this article based on monitoring data. They vertical interval between two tunnels, projection angel synchronous grouting rate. The linear regression formulas also obtained show trends displacement during overcrossing undercrossing projects.