- Energy Harvesting in Wireless Networks
- Distributed Sensor Networks and Detection Algorithms
- Energy Efficient Wireless Sensor Networks
- Opinion Dynamics and Social Influence
- Target Tracking and Data Fusion in Sensor Networks
- Mathematical and Theoretical Epidemiology and Ecology Models
- Opportunistic and Delay-Tolerant Networks
- Complex Network Analysis Techniques
- Maritime Ports and Logistics
- Network Security and Intrusion Detection
- Distributed Control Multi-Agent Systems
- Indoor and Outdoor Localization Technologies
- Heat Transfer and Boiling Studies
- Mobile Ad Hoc Networks
- Heat Transfer and Optimization
- Advanced MIMO Systems Optimization
- Smart Grid Security and Resilience
- UAV Applications and Optimization
- Game Theory and Applications
- Quantum Information and Cryptography
- Piezoelectric Actuators and Control
- Sustainable Supply Chain Management
- Quantum Mechanics and Applications
- Transportation Planning and Optimization
- Security in Wireless Sensor Networks
Guangzhou University
2016-2025
Ningbo University
2011-2024
Southeast University
2022-2023
Jianghan University
2022
Hunan Cancer Hospital
2016-2019
Central South University
2016-2019
University of South China
2019
Wuhan University of Technology
2015
California Maritime Academy
2014
South China University of Technology
2010-2013
The unmanned aerial vehicle (UAV) route planning problem mainly centralizes on the process of calculating best between departure point and target as well avoiding obstructions to avoid collisions within a given flight area. A highly efficient approach is required for this complex high dimensional optimization problem. However, many algorithms are infeasible or have low efficiency, particularly in three-dimensional (3d) environment. In paper, modified sparrow search algorithm named CASSA has...
This study studies coordinated control of a platoon vehicles consisting leader and multiple followers when suffer from disturbances. Small disturbances acting on one vehicle may cause large spacing errors between intervehicles. In addition, the propagate up or down in platoon. To mitigate adverse effect disturbances, law is proposed based only position information itself its preceding vehicle. analyse propagation among platoon, upper bounds two transfer functions are presented including...
c-Fos is a major component of activator protein (AP)-1 complex. It has been implicated in cell differentiation, proliferation, angiogenesis, invasion, and metastasis. To investigate the role glioma radiosensitivity to understand underlying molecular mechanisms, we downregulated gene expression by lentivirus-mediated shRNA lines subsequently analyzed radiosensitivity, DNA damage repair capacity, cycle distribution. Finally, explored its prognostic value 41 malignant patients...
Internet of Vehicles (IoV) is gradually becoming popular, but it also brings more opportunities for malware intrusion. The intrusion into IoV will cause a series security issues and increase the incidence road accidents. Therefore, suppressing measures to combat spread in be fundamental urgent. To address this critical issue, paper proposes fractional-order (FIOV) investigate propagation patterns Road Side Unit (RSU) Vehicles. accurately reflect actual malware, traffic density, channel...
This study examines the intermittent control of a rumor propagation system with anti-rumor mechanism. The interaction mechanism is investigated, including existence and stability two boundary equilibriums, condition bistability behavior. Threshold parameters are identified which determine global exponential rumor-free equilibrium. To combat spreading, we design deterministic stochastic strategies aperiodically time. expressions minimum intensities obtained, related to ratio parameters....
The Internet of Underwater Things (IoUT) relies on wireless communication devices that are arranged in an open underwater environment and can interact with other through acoustic technology. However, due to their limited resources environment, IoUT has been suffering from a high risk malware attacks. As the two main parts IoUT, autonomous vehicles (AUVs) rechargeable sensor networks (UWRSNs) more favored by attackers be directly attacked malware, which lead cross-propagation when AUVs UWRSNs...
Ship pollution accidents can cause serious harm to marine ecosystems and economic development. This study proposes a ship accident analysis method based on knowledge graph solve the problem that complex information is challenging present clearly. Based of 411 along coast China, Word2vec’s word vector models, BERT–BiLSTM–CRF model BiLSTM–CRF model, were applied extract entities relations, Neo4j database was used for data storage visualization. Furthermore, case retrieval correlation analyzed...
With the development of wireless rechargeable sensor networks (WRSNs ), security issues WRSNs have attracted more attention from scholars around world. In this paper, a novel epidemic model, SILS(Susceptible, Infected, Low-energy, Susceptible), considering removal, charging and reinfection process is proposed. Subsequently, local global stabilities disease-free equilibrium points are analyzed simulated after obtaining basic reproductive number R0. Detailedly, simulations further reveal...
Energy constraint hinders the popularization and development of wireless sensor networks (WSNs). As an emerging technology equipped with rechargeable batteries, (WRSNs) are being widely accepted recognized. In this paper, we research security issues in WRSNs which need to be addressed urgently. After considering charging process, activating anti-malware program launching malicious attack process modeling, susceptible–infected–anti-malware–low-energy–susceptible (SIALS) model is proposed....
With the rapid development of science and technology, application wireless sensor networks (WSNs) is more widely. It has been widely concerned by scholars. Viruses are one main threats to WSNs. In this paper, based on principle epidemic dynamics, we build a SEIR propagation model with mutated virus in WSNs, where E nodes infectious cannot be repaired S or R nodes. Subsequently, basic reproduction number R0, local stability global system analyzed. The cost function Hamiltonian constructed...
During the transmission of power measurement data through communication networks from remote terminal unit (RTU) to state estimator in Supervisory Control and Data Acquisition (SCADA), cyber-physical systems (PCPSs) are more susceptible cyber-attacks. To mitigate that threat, this paper is concerned with a new recovery strategy on machine learning against false injection attacks (FDIAs) PCPSs. Firstly, view limited resources (such as energy) adversaries system protections, sparse target...
With the rapid development of high-speed railway around world, more advanced nondestructive evaluation (NDE) and structural health monitoring (SHM) techniques are required to detect damage in its forming stage before jeopardizes safety structures. In this aspect, guided-wave-based diagnostic imaging is a recent research focus, aimed at intuitionally showing healthy status structure under inspection. However, present mostly two-dimensional methods, which fail inspect complicated solid study,...
The risk of ship-bridge collisions should be evaluated using advanced models to consider different anti-collision and bridge-protection measures. This study aimed propose a method evaluate the effectiveness active passive safety measures in preventing collision. A novel collision probability formulation taking into consideration was proposed. model applied at Jintang Bridge China where surrounding vessel traffic is ultra-crowded. We calculated between bridge passing automatic identification...
SUMMARY In this paper, the problem of decentralized parameter estimation over noisy channels in a cluster‐based sensor network is studied. Each cluster head generates local estimate by adopting sample mean estimator. The estimates from all heads are compressed using one‐bit quantizer and then bits transmitted to fusion center independent binary symmetric channels. Two maximum likelihood estimators proposed for estimating based on received two different scenarios: (i) clusters have same...
In present paper, a delayed SEIR model of malware propagation on mobile wireless sensor networks is formulated. Basic reproduction number the calculated by employing next generation matrix method and impact time delay due to incubation period discussed with help eigenvalue method. What more, properties Hopf bifurcation are derived using center manifold To minimize infectious nodes cost related detoxication, an optimal control strategy presented constructing suitable Hamiltonian function....