- Smart Grid and Power Systems
- Advanced Steganography and Watermarking Techniques
- High-Voltage Power Transmission Systems
- Chaos-based Image/Signal Encryption
- Antenna Design and Analysis
- Power Systems and Renewable Energy
- Digital Media Forensic Detection
- Advanced Algorithms and Applications
- Advanced Computational Techniques and Applications
- Microwave Engineering and Waveguides
- HVDC Systems and Fault Protection
- Power Systems and Technologies
- Energy Harvesting in Wireless Networks
- Machine Fault Diagnosis Techniques
- Advanced Antenna and Metasurface Technologies
- Music and Audio Processing
- Power System Reliability and Maintenance
- Speech and Audio Processing
- Image and Signal Denoising Methods
- Antenna Design and Optimization
- Advanced Materials and Mechanics
- Acoustic Wave Phenomena Research
- Evaluation Methods in Various Fields
- Optimal Power Flow Distribution
- Biometric Identification and Security
Shandong Jianzhu University
2011-2025
Jilin University
2024
Nanjing Audit University
2024
Hefei University of Technology
2023-2024
China Electronics Technology Group Corporation
2024
Gansu University of Traditional Chinese Medicine
2009-2023
Jiangnan University
2023
China Railway Group (China)
2022
National Center for Toxicological Research
2022
United States Food and Drug Administration
2022
A scheme is proposed to implement commutative video encryption and watermarking during advanced coding process. In H.264/AVC compression, the intra-prediction mode, motion vector difference discrete cosine transform (DCT) coefficients' signs are encrypted, while DCT amplitudes watermarked adaptively. To avoid that operation affects decryption operation, a traditional algorithm modified. The operations commutative. Thus, watermark can be extracted from encrypted videos, videos re-watermarked....
Advanced video coding is recently announced and widely used, although the according protection means have not been developed thoroughly. In this paper, a secure AVC scheme presented based on some partial encryption algorithms. During encoding, such sensitive data as intra-prediction mode, residue motion vector are encrypted partially. Among them, infra-prediction mode exp-Golomb entropy coding, intra-macroblocks' DCs context-based adaptive variable length (CAVLC), infra-macroblocks' ACs...
Abstract Ionic electrochemical actuators, which convert electrical energy into mechanical through electrochemical‐induced ion migration, show great potential in biomimetic soft robots. However, their applications are still limited due to the influence of electrode materials and actuator performance. Here, an MXene/carbon nanotube (CNT) heterostructural electrode‐based ionic is developed realizes dexterous touch manipulation mimicking humans. In this MXene/CNT heterostructure, one‐dimensional...
Abstract Smart actuators that can convert external energy stimuli into mechanical output have great potential in industrial, biomedical, and military applications. However, the existed disadvantage such as complex fabrication process, single stimulus source, requirement of artificial restrict their further development. Herein, a MXene/polyethylene (PE)‐based soft actuator with multistimulus response ability to be driven by natural sunlight human humidity is proposed through simple method....
Detection of cage motor broken rotor bars has long been an important but difficult job in the detection area faults. The characteristic frequency component faulted (CFCFR) is very close to power by far less amplitude, which brings about great difficulty for accurate detection. A new method based on wavelet ridge presented this paper. Aiming at motor's starting period during accelerates progressively and CFCFR approaches gradually spectrum, ridge-based adopted analyze transient procedure...
This paper describes a novel helical antenna made of pure water. The water is realized by replacing the metallic arm conventional with plastic tube circular cross section filled axially symmetric TM <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">01</sub> mode excited along and accounts for wave propagation radiation. Circular polarization (CP) achieved choosing proper dimension helix. measured results show that proposed has an overlapping...
Traditional villages are intricate socio-spatial systems shaped by multi-scalar interactions encompassing natural, cultural, and hierarchical dimensions. Despite their significant cultural ecological value, conventional unit-based conservation methods often overlook systemic interdependencies within between villages, leading to spatial fragmentation, inefficient resource utilization, the erosion of distinct identities. To address these limitations, this study proposes a cluster-based...
Currently, urban development has entered the stage of renewal and transformation. Energy transition is an important trend for sustainable development, assessment solar energy potential in old residential areas cold regions great significance. This study selects 47 communities Jinan, a region China, as case samples. Using clustering algorithms based on spatial form characteristic parameters, divides samples into five categories. The then uses Ladybug tool to simulate distribution total...
We propose a photonic spiking neural network (SNN) based on excitable vertical-cavity surface-emitting lasers with an embedded saturable absorber (VCSELs-SA) for emulating the sound azimuth detection function of brain first time. Here, spike encoding and response properties excitability VCSELs-SA are employed, difference between timings two postsynaptic neurons serves as indication azimuth. Furthermore, weight matrix contributing to successful is carefully identified, effect time interval...
A novel horn antenna is reported in this communication, which realized by using water walls instead of traditional metallic walls. Due to its fluidity, filling different channels can be readily controlled. Therefore, the proposed operate two states: H-plane state and leaky-wave state, resulting radiation patterns. The energy bounding effects a layer are initially studied for choosing suitable thickness EH <sub xmlns:mml="http://www.w3.org/1998/Math/MathML"...
This paper is concerned with the design of reconfigurable antennas based on pure water. Being a transparent, flexible, and readily available liquid, water can form cylindrical stream that be used to guide leaky electromagnetic wave. By properly selecting attenuation phase constants wave, radiation characteristics designed suit different application requirements. controlling flow or size shape water, one realize operating frequencies, patterns, polarizations. Three novel are presented showing...
A secure distribution scheme is proposed for compressed videos, which based on a compression domain watermarking algorithm. At the server end, watermarking-based encryption algorithm used to encrypt data stream. receiver joint fingerprint embedding and decryption (JFD) adopted decrypt video simultaneously. For features of algorithm, this easy extract detect colluders, suitable distributing videos. Theoretical analysis experimental results prove its practice.
This paper presents a modified particle swarm optimization (MPSO) method to realize optimal reactive power dispatch (ORPD) considering voltage stability improvement. The ORPD problem is formulated as nonlinear constrained multi- objective problem, the sub-objective minimal real losses, control number and maximal margin. mutation incorporated into PSO new strategy using in MPSO algorithm prevent particles trapped local minimal. Cases study with IEEE30 system practical tested effectiveness...
A new frequency reconflgurable unequal U-slot antenna is presented in this paper. The loaded with two lumped variable varactors capable of 6 difierent frequencies switching between 2.3GHz and 3.6GHz. small slots the ground plane are employed for biasing circuit to minimize parasitic efiects towards performance antenna. It found that fed by an L-shaped feed line can reduce 30% size conventional Moreover, proposed ofiers stable radiation characteristics each operating tunable range. a gain...
Chaos and neural networks have both been used in data encryption because of their cipher-suitable properties, such as parameter-sensitivity, time-varying, random-similarity, etc. Based on chaotic networks, a hash function is constructed, which makes use networks' diffusion property chaos' confusion property. This encodes the plaintext arbitrary length into value fixed (typically, 128-bit, 256-bit or 512-bit). Its security against statistical attack, birthday attack meet-in-the-middle...
A pair of new possible chiral doublet bands has been experimentally identified for the first time in odd-odd nucleus $^{126}\mathrm{Cs}$. The possibility multiple $(\mathrm{M}\ensuremath{\chi}\mathrm{D})$ $^{126}\mathrm{Cs}$ was interpreted by projected shell model (PSM) calculations with a relatively complete configuration space. newly observed and band reported earlier belong to an identical configuration, providing experimental theoretical evidence existence nuclei...
A novel short backfire antenna realized by replacing the metallic wall with water is described in this paper. Through controlling flow different layers, proposed based on a cylindrical waveguide made of can switch between two functions. When works Function I, it pencil beam. operates other function, conical beam achieved, and its angle be changed height cylinder wall. Measured results show that when working has an impedance bandwidth (|S11| <; -10 dB) 11.3% (3.6 GHz to 4.05 GHz). maximum...
By means of the mathematical morphology (MM) method, power quality (PQ) disturbance signals can be monitored quickly and effective. However, signal under investigation is often corrupted by noises, MM filter formed fixed structure elements not handle this very well. In paper, theory shortage traditional are analyzed at first. And an improved (IMM) method proposed. appropriate structural selected different their self-adaptive weighted combinations used to deal with perturbation signals. Also,...
The /spl plusmn/500 kV bipolar, direct current Tian-Guang HVDC transmission system with a rating of 1800 MW was been put into operation by the middle 2001. Constant regulator, constant voltage regulator and extinction-angle are three basic regulators which determine regulative performance system. They all PI in parameters regulators, i.e. gain Kp time Tn have notable effect on their characteristics, so parameter estimations these very necessary. This paper points out that PSCAD/EMTDC is an...
A secure video distribution scheme is proposed, which embeds a fingerprint code into the content during decryption process. At server side, scrambled by motion vector (MV) encryption. customer decrypted and fingerprinted simultaneously under control of both key fingerprint. For MV embedding are based on modification, they combined homogenous operations. Thus, it difficult for attackers to get clear from gap between operation operation. To counter collusion attacks, can be encoded with...
A polarization-reconfigurable pure-water helical antenna operating at 1.6 GHz is presented in this paper, which consists of two water helixes with inversed rotational directions connected series. By changing the height, a switch between right-handed circular polarization (RHCP) and linear (LP) achieved. Measured results show that proposed RHCP-to-LP has an overall impedance bandwidth (|S <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">11</sub> |...