- Network Traffic and Congestion Control
- Mobile Ad Hoc Networks
- Opportunistic and Delay-Tolerant Networks
- Robotic Mechanisms and Dynamics
- Inertial Sensor and Navigation
- Target Tracking and Data Fusion in Sensor Networks
- Vehicular Ad Hoc Networks (VANETs)
- Caching and Content Delivery
- Software-Defined Networks and 5G
- Piezoelectric Actuators and Control
- Security in Wireless Sensor Networks
- Peer-to-Peer Network Technologies
- Energy Efficient Wireless Sensor Networks
- Advanced Sensor and Control Systems
- Embedded Systems and FPGA Design
- Industrial Technology and Control Systems
- Wireless Networks and Protocols
- Adaptive Control of Nonlinear Systems
- Cooperative Communication and Network Coding
- Mechanics and Biomechanics Studies
- Advanced MIMO Systems Optimization
- Dynamics and Control of Mechanical Systems
- Telecommunications and Broadcasting Technologies
- Advanced Authentication Protocols Security
- Network Security and Intrusion Detection
Northwestern Polytechnical University
2013-2024
Shandong Electric Power Engineering Consulting Institute Corp
2023
China Power Engineering Consulting Group (China)
2023
Research & Development Institute
2022
Yanshan University
2004-2021
Northwestern Polytechnic University
2006-2008
China Resources (China)
2008
This paper presents a new adaptive random weighting cubature Kalman filtering method for nonlinear state estimation. adopts the concept of to address problem that filter (CKF) performance is sensitive system noise. It establishes theories estimate noise statistics and predicted measurement together with their associated covariances. Subsequently, it adaptively adjusts weights points based on estimations improve prediction accuracy, thus restraining disturbances noises Simulations comparison...
Monitoring the illegal movement across national border effectively is a challenging problem. The emerging technology of wireless sensor network (WSN) expected to provide new way realize energy-efficient intrusion detection. We propose scheme measure and guarantee coverage quality WSN. also design model for detecting one-direction path. simulation results shows that could not only detect in area well, but extend lifetime an efficient way.
In recent years, machine learning has made tremendous progress in the fields of computer vision, natural language processing, and cybersecurity; however, we cannot ignore that models are vulnerable to adversarial examples, with some minor malicious input modifications, while appearing unmodified human observers, outputs learning-based model can be misled easily. Likewise, attackers bypass machine-learning-based security defenses attack systems real time by generating examples. this paper,...
As an application of mobile ad hoc networks in transportation realm, Vehicular Ad Network (VANET) is a prominent technology for inter-vehicle communications Intelligent Transportation System. City environment main scenario VANET applications, and routing urban faces greater challenges because potential more uneven distribution vehicular nodes, constrained mobility pattern difficult signal reception due to radio obstacles. This paper investigates compares several algorithms designed VANET. A...
Proactive defense is one of the most promising approaches to enhance cyber-security in power systems, while how balance its costs and benefits has not been fully studied. This paper proposes a novel method model cyber adversarial behaviors as attackers contending for defenders’ benefit based on game theory. We firstly calculate final hackers defenders different states basis constructed models then predict possible attack behavior evaluate best strategy systems. Based real system subnet, we...
This paper presents a new Strap-down Inertial Navigation System/Spectrum Red-Shift/Star Sensor (SINS/SRS/SS) system integration methodology to improve the autonomy and reliability of spacecraft navigation using spectrum red-shift information from natural celestial bodies such as Sun, Jupiter Earth. The models for SINS/SRS/SS are established. fusion is designed structure federated Kalman filter fuse local estimations SINS/SRS SINS/SS integrated subsystems generate global state estimation...
The application of implantable medical devices (IMDs), which solves the problems geographical distance limitation and real‐time health monitoring that plague patients doctors, has caused great repercussions in community. Despite potential wide application, it also brings some security privacy issues, such as leakage data unauthorized access to IMDs. Although a number authentication key agreement (AKA) schemes have been developed, we find subtle attacks still remain be addressed. Then propose...
Due to the disturbance of wind field, it is difficult achieve precise airship positioning and navigation in stratosphere. This paper presents a new constrained unscented particle filter (UPF) for SINS/GNSS/ADS (inertial system/global satellite system/atmosphere data system) integrated navigation. approach constructs speed model describe relationship between velocity using information output from ADS, further establishes mathematical Based on these models, also develops UPF obtain system...
Most of flooding algorithm recent Ad Hoc multicast routing protocols are suitable under specific networks conditions. If the condition changes like increasing number source nodes and or having higher node speed more traffic loads, they will not work well. To provide support for a wide range operational condition, we propose new protocol (CBSRP) that integrates effectiveness scheme efficiency mesh scheme. The constructs metric stability selects stable path with help entropy to reduce route...
As more and business applications become Web-enabled, service differentiation becomes an important issue for database-driven e-commerce Websites to meet different requirements of clients. This paper presents a feedback control approach provide proportional delay (PDD) in Web application servers handling dynamic HTTP requests. To achieve this goal, approximate linear time-invariant model the database connection pool (DBCP) is identified experimentally used design proportional-integral (PI)...
This article proposes a family of spatial three translational and one rotational parallel mechanisms (PMs) for pick-and-place operation. Their features are independent rotation the mechanism with four identical limbs, which provided by revolute joints on moving platform. The capability PMs has range at least 180°. focuses synthesis kinematics analysis 4- P(2-SS)R mechanism. First, based Lie group theory, parallelograms used in designing PMs. limbs listed two types synthesized. Then, typical...
Position-based routing attracts more consideration in vehicular ad hoc networks (VANETs) for its efficiency and scalability. To enable the geographic forwarding a vehicle must be able to discover position of destination node typically depending on location service. Considering characteristics city scenario, we proposed scalable effective service called RSLS based responsible sections (RS) which are intersections with traffic lights or bus stops. Vehicles only RS act as servers store latest...
As the heterogeneity ofWeb clients increasing, differentiated service becomes an important issue especially for e-commerce Web site. caching as a key accelerator on Internet plays role in alleviating client-perceived delay. To meet Service Level Agreement (SLA) without excessively over-provisioning resources, this paper proposes and evaluates novel framework enforcing Proportional Hit Rate. The combines implement of Isolated Cache Model usage control-theoretical approach storage control....
In this paper, a 3-RPS pyramid mechanism is analysed. Three constraining force screw limit the translations of in three directions, only rotating freedom allowed spatial. The has motion along its diagonal. input rationality discussed using theory. We build up model with application MATLAB, study simulation movement, get series movement curves and verify theories analysis by numerical example.
In this paper, classical feedback control theory is used to contribute two types of QoS guarantees, relative delay guarantee ( RDG) and absolute (ADG). RDG aims maintain the average queuing ratio between different classes requests according pre-specified parameters, ADG ensure for with high priority no more than threshold configured. All components closed-loop implemented HTTP dynamic in database connection pool (DBCP) Tomcat Web Server. Through off-line system identification, approximate...