- Advanced Numerical Methods in Computational Mathematics
- Advanced Mathematical Modeling in Engineering
- Numerical methods in engineering
- Complex Network Analysis Techniques
- Opportunistic and Delay-Tolerant Networks
- Mechanical stress and fatigue analysis
- Lattice Boltzmann Simulation Studies
- Optimization and Search Problems
- Contact Mechanics and Variational Inequalities
- Mobile Ad Hoc Networks
- Differential Equations and Numerical Methods
- Cooperative Communication and Network Coding
- Optical Imaging and Spectroscopy Techniques
- Computational Fluid Dynamics and Aerodynamics
- Model Reduction and Neural Networks
- Caching and Content Delivery
- Opinion Dynamics and Social Influence
- Radiative Heat Transfer Studies
- Machine Learning and Algorithms
- Gas Dynamics and Kinetic Theory
- Nonlinear Differential Equations Analysis
- Brake Systems and Friction Analysis
- Advanced Decision-Making Techniques
- Age of Information Optimization
- Maritime Transport Emissions and Efficiency
Tongji University
2015-2025
Shanghai Jiao Tong University
2019-2024
Shanghai Sixth People's Hospital
2024
Anhui University of Traditional Chinese Medicine
2023
Shanghai Skin Disease Hospital
2021
University of Shanghai for Science and Technology
2021
University of Massachusetts Dartmouth
2018
Ministry of Education of the People's Republic of China
2014-2017
Nanjing University of Science and Technology
2015
Tangshan College
2009-2011
An update scheme of the state probability vector actions is critical for learning automata (LA). The most popular pursuit that pursues estimated optimal action and penalizes others. This paper proposes a reverse philosophy leads to last-position elimination-based (LELA). graded last in terms performance penalized by decreasing its eliminated when becomes zero. All active actions, is, with nonzero probability, equally share from at each iteration. proposed LELA characterized relaxed...
Screen locking/unlocking is important for modern smart phones to avoid the unintentional operations and secure personal stuff. Once phone locked, user should take a specific action or provide some secret information unlock phone. The existing unlocking approaches can be categorized into four groups: motion, password, pattern, fingerprint. Existing do not support well due deficiency of security, high cost, poor usability. We collect 200 users' handwaving actions with their discover an...
A learning automaton (LA) is a powerful tool for reinforcement learning. Its action probability vector plays two roles: 1) deciding when it converges, i.e., total computing budget has used, and 2) allocating among actions to identify the optimal one. These intertwined roles lead problem: mostly goes currently estimated due its high regardless whether such allocation can help true one or not. This work proposes new class of LA that avoids use allocation. Instead we only determine if converges...
Learning automata (LA) are powerful tools for reinforcement learning. A discretized pursuit LA is the most popular one among them. During an iteration its operation consists of three basic phases: 1) selecting next action; 2) finding optimal estimated and 3) updating state probability. However, when number actions large, learning becomes extremely slow because there too many updates to be made at each iteration. The increased mostly from phases 1 3. new fast with assured ε -optimality...
In this paper, we consider a more degenerate version of the well-known slow-fast planar $C^\infty$ differential system with small parameter $0\le \varepsilon\ll 1$ and turning point. Based on geometric singular perturbation theory including blow-up techniques, help desingularization normally nonhyperbolic points show that limiting attracting repulsion orbits near critical curve are determined by entry-exit function return map is ${C}^\infty$ smooth respect to initial value,...
A new formulation, a gauge formulation of the incompressible Navier-Stokes equations in terms an auxiliary field $\mathbf {a}$ and variable $\phi$, {u} =\mathbf {a}+\nabla \phi$, was proposed recently by E Liu. This paper provides theoretical analysis their verifies computational advantages. We discuss implicit method, which uses backward Euler or Crank-Nicolson time discretization. However, boundary conditions for are implemented explicitly (vertical extrapolation). The resulting momentum...
The smart grid mainly suffers from two types of cascading failures: 1) interdependence failure and 2) load propagation failure. former one happens due to the between power communication networks. latter is caused by in single grid. A tiny leads simultaneous occurrence these failures. In this paper, we study system robustness considering propagation. First, develop a mathematical tool analyze network. Then, percolation-based method proposed calculate remaining fractions survivals after...
Background Low-intensity focused ultrasound stimulation (LIFUS) has been developed to enhance neurological repair and remodelling during the late acute stage of ischaemic stroke in rodents. However, cellular molecular mechanisms after LIFUS are unclear. Methods Ultrasound was treated adult male mice 7 days transient middle cerebral artery occlusion. Angiogenesis measured by laser speckle imaging histological analyses. Electromyography fibre photometry records were used for synaptogenesis....
We study the multicast capacity for hybrid wireless networks consisting of ordinary ad hoc nodes and base stations under Gaussian Channel model, which generalizes both unicast broadcast capacities networks. Assume that all transmit at a constant power P, decays along path, with attenuation exponent \alpha >2. The data rate transmission is determined by Signal to Interference plus Noise Ratio (SINR) receiver as B \log (1 + {\rm SINR}). are placed in square region {\cal A}(a) area according...
In this paper, the robust stochastic stability is investigated for a class of uncertain discrete-time impulsive Markovian jump delay systems with multiplicative noises. Using method Lyapunov functionals construction, it shown that impulses can stabilise original impulse-free unstable systems. Moreover, property be retained in cases appropriately large time interval. Some numerical examples are exploited to demonstrate effectiveness and superiority proposed results.
A stochastic point location (SPL) problem aims to find a target parameter on 1-D line by operating controlled random walk and receiving information from environment (SE). If the changes randomly, we call dynamic; otherwise static. SE can be 1) informative (p > 0.5 where p represents probability for an providing correct suggestion) 2) deceptive <; 0.5). Up till now, hierarchical searching (HSSL) is most efficient algorithms catch static or dynamic in environment, but unable locate recognize...
In this paper, we investigate capacity scaling laws of wireless social networks under the social-based session formation. We model a network as three-layered structure, consisting physical layer, and layer; introduce cross-layer distance & density-aware model, called population-based formation which: 1) for each node v <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">k</sub> , number its friends/followers, denoted by q follows Zipf's distribution...
In this paper, we study two tightly coupled issues: space-crossing community detection and its influence on data forwarding in Mobile Social Networks (MSNs) by taking the hybrid underlying networks with infrastructure support into consideration. The network is composed of large numbers mobile users a small portion Access Points (APs). Because APs can facilitate communication among long-distance nodes, concept physical proximity be extended to one across geographical space. work, first...
Abstract An interpolated coefficient finite element method is presented and analyzed for the two‐dimensional elliptic sine‐Gordon equations with Dirichlet boundary conditions. It proved that discretization scheme admits at least one solution, a subsequence of approximation solutions converges to an exact solution in L 2 ‐norm as mesh size tends zero. © 2009 Wiley Periodicals, Inc. Numer Methods Partial Differential Eq, 2011
Document network is a kind of intriguing dataset which provides both topical (texts) and topological (links) information. Most previous work assumes that documents closely linked with each other share common topics. However, the associations among are usually complex, not limited to homophily (i.e., tendency link similar others). Actually, heterophily different others) another pervasive phenomenon in social networks. In this paper, we introduce new tool, called copula, separately model...
Discovering and tracking spatiotemporal event patterns have many applications. For example, in a smart-home project, set of pattern learning automata are used to monitor user's repetitive activities, by which the home's automaticity can be promoted while some his/her burdens reduced. Existing algorithms for recognition dynamic noisy environment based on fixed structure stochastic whose state transition function is predesigned guarantee their immunity noise. However, such design conservative...
Discovering semantic coherent topics from the large amount of user-generated content (UGC) in social media would facilitate many downstream applications intelligent computing. Topic models, as one most powerful algorithms, have been widely used to discover latent patterns text collections. However, key weakness topic models is that they need documents with certain length provide reliable statistics for generating topics. In Twitter, users' tweets are mostly short and noisy. Observations word...