- Supply Chain and Inventory Management
- Sustainable Supply Chain Management
- Information and Cyber Security
- Scheduling and Optimization Algorithms
- Advanced Manufacturing and Logistics Optimization
- Innovation Diffusion and Forecasting
- Network Security and Intrusion Detection
- Cybercrime and Law Enforcement Studies
- Advanced Measurement and Detection Methods
- Assembly Line Balancing Optimization
- Advanced Statistical Process Monitoring
- Machine Fault Diagnosis Techniques
- Manufacturing Process and Optimization
- Supply Chain Resilience and Risk Management
- Stability and Control of Uncertain Systems
- Adaptive Control of Nonlinear Systems
- Advanced Malware Detection Techniques
- Spam and Phishing Detection
- Quality and Supply Management
- Software Reliability and Analysis Research
- Advanced Algorithms and Applications
- Statistical Distribution Estimation and Applications
- Energy, Environment, and Transportation Policies
- Energy Efficiency and Management
- Game Theory and Applications
Hefei University of Technology
2014-2024
Applied Optimization (United States)
2016-2024
University of Florida
2016-2024
Ministry of Education of the People's Republic of China
2019-2024
Changchun University of Science and Technology
2015
Nantong University
2011
Nanjing University of Posts and Telecommunications
2010
The high-reliability requirement of numerical control (NC) machine tools emphasizes the effectiveness preventive maintenance (PM). However, most existing PM decisions are made by treating them as single-component systems, resulting in problems "excessive maintenance" or "insufficient maintenance." Moreover, real failure data has rarely been utilized for decision-making, which leads to idealized policies far from practice. This article presents a framework derive optimal group (GM) policy...
In consideration of business information sharing, this paper investigates a new game sharing and security investment between two allied firms. Firms' strategies in three decision models (Nash Equilibrium decision, partially centralised totally decision) are analysed. We provide some quantitative analyses on how parameters affect firms' decisions the models. Our Nash analysis shows that when firms make individually, they will share no with each other. When is determined by social planner,...
Abstract Considering information security insurance, this paper investigates an investment game between two firms with complementary assets. Each firm's and expected profit in Nash equilibrium (i.e., make decisions individually) social optimum jointly) are analyzed through rigorous theoretical analyses numerical examples. We find that making jointly will the as a whole obtain more profits than when they alone, whereas does not mean each firm benefit from joint decision‐making process. Our...
In order to better describe the complexity of internal image quantitatively, research method is proposed based on neural network, from three aspects image, which texture and edge information significant area. The network technology adopted establish mathematical evaluation model between various indexes. And index weight values are obtained by training for learning. verification results show that able quantitatively truly, experimental was consistent with human visual perception, its...
Based on phase space reconstruction (PSR) and hybrid VNS-SVR model, a remaining useful life (RUL) prediction method for aircraft engines is proposed. The proposed model combines support vector regression (SVR), which has been successfully adopted problems, with the variable neighborhood search (VNS). First, used to transform selected one-dimensional performance sequences of into matrix forms, increases data information improve learning efficiency effectively. Then, SVR construct model....
Target recognition is widely used in national economy, space technology and defense other fields. There great difference between the difficulty of target extraction. The image complexity evaluating level extracting from background. It can be as a prior evaluation index algorithm's effectiveness. paper, perspective background characteristics measurement, describe metrics parameters using quantitative, accurate mathematical relationship. For collinear problems each measurement parameters, are...
Download This Paper Open PDF in Browser Add to My Library Share: Permalink Using these links will ensure access this page indefinitely Copy URL DOI
This paper is concerned with the problem of robust stabilization for uncertain stochastic delay systems interconnections via decentralized sliding mode control. Some less restrictive sufficient conditions existence surfaces are given in terms linear matrix inequalities, by which controllers ensuring reachability specified designed. A numerical example included to verify validity developed controller.
The development of the information technology has brought threats to human society when it influenced seriously global politics, economics and military etc. But among security system, buffer overrun vulnerability is undoubtedly one most important common vulnerabilities. This paper describes a new technology, named program slicing, detect overflow leak in security-critical C code. First, we use slicing analyze variables which may be with extract expressions will bring memory overflow....
<p style='text-indent:20px;'>Product quality is the lifeline of enterprise survival and development. With rapid development information technology, semiconductor manufacturing process produces multitude features. Due to increasing features, requirement on training time classification accuracy prediction methods becomes increasingly higher. Aiming at realizing for process, this paper proposes a modified support vector machine (SVM) model based feature selection, considering high...
<p style='text-indent:20px;'>In this paper, we investigate a coordinated optimization problem of production and maintenance where the machine reliability decreases with use machine. Lower means is more likely to fail during stage. In event failure, corrective (CM) required, CM will cause certain cost. Preventive (PM) can improve reduce failures stage, but it also To minimize total cost, must determine an appropriate PM plan balance these two types maintenance. addition, tardiness cost...
How to set proper warranty lengths for different components is a common problem manufacturers who produce end products when pricing. This study investigates pricing game between vertically integrated manufacturer and an exterior end-product with the acting as leader. The two key component product without respectively. We assume that customers perceive quality through of brand reputations manufacturers. result shows higher reputation has incentive longer length. However, due impact cost...
Innovative business models are emerging to promote the popularization of electric vehicles. This study investigates a firm's service innovation strategy and choice between sales rental in presence consumer behavioral preferences subsidies within given supply chain. The optimal price quality decisions unique determined by profit-maximization model. We find that when customers have an obvious preference for high or relatively low traditional model, firm will profitably invest innovation....