- Smart Grid and Power Systems
- Power Systems and Renewable Energy
- Network Security and Intrusion Detection
- IoT and Edge/Fog Computing
- Advanced Decision-Making Techniques
- Ultrasonics and Acoustic Wave Propagation
- Integrated Energy Systems Optimization
- Caching and Content Delivery
- Non-Destructive Testing Techniques
- Opportunistic and Delay-Tolerant Networks
- Advanced Computing and Algorithms
- Advanced Steganography and Watermarking Techniques
- Smart Grid Security and Resilience
- Distributed and Parallel Computing Systems
- Advanced Computational Techniques and Applications
- Energy Harvesting in Wireless Networks
- Chaos-based Image/Signal Encryption
- Thermodynamic and Exergetic Analyses of Power and Cooling Systems
- Computational Geometry and Mesh Generation
- Digital Media Forensic Detection
- Distributed Control Multi-Agent Systems
- 3D Shape Modeling and Analysis
- Software-Defined Networks and 5G
- Fault Detection and Control Systems
- Infrastructure Resilience and Vulnerability Analysis
Shanghai Electric (China)
2020-2025
South China University of Technology
2023
Southeast University
2023
Zhejiang University
2018-2022
Tongji University
2013-2022
Beijing Institute of Education
2019
Zhejiang Province Institute of Architectural Design and Research
2018
Kingdee (China)
2015
North China Electric Power University
2015
University of Notre Dame
2000
The Industrial Internet of Things (IIoT) offers the manufacturing sector opportunities for transformation and upgrade but also carries significant security risks. Traditional federated learning (FL) as a potential solution is challenging in complicated application environments with heterogeneous data, imbalanced poisoning attacks. To address these challenges, we construct clustered FL Framework IIoT intrusion detection (CFL-IDS) based on local models' evaluation metrics (EMs). First,...
Due to the merits of Lamb wave Structural Health Monitoring (SHM) composite, wave-based damage detection and identification technology show a potential solution for insulation condition evaluation large generator stator. This was performed in order overcome problem that it is difficult effectively identify stator using single feature wave. In this paper, method based on multi-feature fusion presented. Firstly, different features were extracted from time domain, frequency fractal dimension...
If the neutral point either on primary or secondary side of potential transformer is not grounded directly, harmonic voltage measurement will reflect real distortion system voltage. Also, capacitive high and medium cannot be used for measurement. A new method to set signal from tap Current Transformer bushing recommended here. The can achieve a more precise result
Effective insulation condition diagnosis for large generator stator is critical to ensure safe operation and extend life. In this study, elastic guided waves probability imaging approach introduced detect damage. A distributed actuator-sensor network was established acquire Lamb wave signals before after the presence of Flight time scattered were calculated using Hilbert transform locate Gaussian distribution employed quantify damage at different spatial locations in bar. The features...
With the rapid development of Internet Things (IoT) technology, Network Function Virtualization (NFV) is introduced in edge network to provide flexible and personalized service. However, there still exist some problems be solved, such as high cost, unbalanced load, low availability. Therefore, a reliability-and-energy-balanced Service Chain (SFC) mapping migration method presented for IoT applications. First, aiming at improving performance reducing expenditure, an SFC algorithm based on...
Personal cloud storage is rapidly gaining popularity. A number of Internet service providers, such as Google and Baidu, entered this emerging market developed a variety services. These ubiquitous services allow people to access personal files all over the world at anytime. With prevalence mobile rich media on web, more use for storing working documents, music, private photos movies. Nevertheless, size often beyond upper limit that normal form-based file upload allows hence dedicated...
Abstract Co‐firing biomass in an existing coal combustion boiler is a promising way to mitigate carbon emission the context of global neutrality. This paper investigated effect injection location on and NO X formation characteristics 300‐MWe tangential co‐firing with coal. Numerical models have been validated against experimental measurement for both pure firing biomass/coal cases. Compared firing, case injected into highest layer can sustain comparable temperature distribution profile along...
This paper mainly reports the experimental research on damage detection of large generator stator insulation using theory elastic guided waves. The characteristics parameters material are gained through materials tensile test. By means selecting appropriate wave excitation signal and solving equation Rayleigh-Lamb equation, dispersion curves Lamb waves obtained, which describes relationship between phase/group velocity frequency. Moreover, provide a reference about choice frequency signal....
Abstract In this paper, we propose an optical scheme of on-chip matrixing for matrix-vector multiplications (MVMs) by configuring each matrix element into a photonic tensor processing unit (TPU) with wavelength division multiplexing and the actively tunable weighting scalar multiplication. The low loss chalcogenide phase change material Ge 2 Sb Se 4 Te (GSST) is employed modeled intermediate states multilevel TPU. dynamic electro-thermal process GSST transition using ITO electrical heating...
Coaxial coil topology is used as the transfer medium in traditional MCR-WPT (Magnetic Coupled Resonant Wireless Power Transfer) systems to improve characteristics. The intermediate coils are added extend transmission distance, whose positions critical. This paper focuses on optimal for an system with four coaxial planar circular spiral coils. By modeling system, mathematical expression of self-inductance and mutual inductance calculate load power which composed coils, using MATLAB. distance...
NFV separates network functions from hardware-dependent middle boxes, which can significantly reduce costs and improve management flexibility. It has been widely used in operator networks. However, due to traffic fluctuation the network, using virtual provide flexible services is still challenging. In addition, most VNF scaling methods are passive nature, may cause high latency fail meet QoS requirements of services. Therefore, this paper first proposes a GRU-based prediction model scales...
With the development of energy Internet, power communication services are heterogeneous, and different have business priorities. The with priorities requirements for network bandwidth real-time performance. For traditional unified service, a scheduling method cannot meet these service at same time, electric guarantee quality service. Therefore, how to make full use time-varying characteristics resources needs achieve goals high resource utilization transmission has become one urgent problems...
Adaptive guaranteed-performance formation analysis and design problems for second-order multi-agent systems are studied, where the global information is not required, which means main results of this article fully distributed. First, an adaptive control protocol presented systems, input constructed using neighboring state errors adaptively adjustable interaction weights. Then, proposed based on Riccati inequalities. Furthermore, cost determined adjusting approach gain in terms linear matrix...
The current network security situation of industrial control systems is becoming increasingly severe, and the ICS ATT&CK framework provides a unified knowledge base for attack tactics techniques system security. This paper presents RRDD model risk assessment ICS, which consists four parts: Risk identification (R), calculation Defense strategy (D), measures (D). based on to analyze indicators clarify vulnerability system, importance assets, threats faced existing mitigation measures. analysis...
With the development and construction of new technologies, existing centralized data processing mode ICS is limited by lack storage resources computing power, cannot meet needs massive frequent interaction between devices, which makes cloud-edge-end collaboration technology receive more attention. Based on this, this paper combs concept collaboration, introduces network architecture analyzes key support technologies collaboration. By summarizing current research situation technology, future...
Abstract the computing network based on cloud is becoming more and complex. How to effectively unload tasks key problem improve service ability of network. In this paper, a mathematical model task unloading in established, an optimal solution improved greedy algorithm proposed, which can quickly find way resource chain dynamic realize fast allocation calculation. search space for algorithms too large there lack support HPC LAN. Therefore, from one layer two layers, are respectively searched...
In this paper, design of ZCS soft switching converter-based gate driver monolithic integrated circuit (IC) is presented. The developed in B6035 high-voltage bipolar process technology Sichuan Institute Solid-state Circuit. It consists voltage detection logic, switch driving, isolation transformer excitation blow-down unit circuits. and the driving jointly comprise power MOS transistor. principle resonance used to circuit. can drive transistor with low efficiently, especially suitable for...