- Service-Oriented Architecture and Web Services
- Face and Expression Recognition
- Business Process Modeling and Analysis
- Network Security and Intrusion Detection
- Software System Performance and Reliability
- IoT and Edge/Fog Computing
- Advanced Software Engineering Methodologies
- Neural Networks and Applications
- Opportunistic and Delay-Tolerant Networks
- Reinforcement Learning in Robotics
- Advanced Memory and Neural Computing
- Text and Document Classification Technologies
- Autonomous Vehicle Technology and Safety
- Neural Networks Stability and Synchronization
- Data Quality and Management
- Smart Parking Systems Research
- Distributed systems and fault tolerance
- Mobile Ad Hoc Networks
- Imbalanced Data Classification Techniques
- Machine Learning and ELM
- Advanced Malware Detection Techniques
- Access Control and Trust
- Chaos-based Image/Signal Encryption
- Cryptographic Implementations and Security
- Information and Cyber Security
Second People’s Hospital of Yibin
2025
Liverpool John Moores University
2015-2024
Anhui Agricultural University
2024
Chongqing Jiaotong University
2010-2024
Huawei Technologies (United Kingdom)
2023-2024
Ipswich Hospital
2024
Lanzhou University of Technology
2024
China Telecom (China)
2023
Xi'an Jiaotong University
2018-2023
Beijing City University
2021-2023
In this paper, the boundedness and complete stability of complex-valued neural networks (CVNNs) with time delay are studied. Some conditions to guarantee CVNNs derived using local inhibition. Moreover, under conditions, a compact set that globally attracts all trajectories network is also given. Additionally, several in terms real-valued linear matrix inequalities (LMIs) for established via energy minimization method approach converts LMIs ones. Examples simulation results given show...
Due to the many beneficial effects on physical and mental health strong association with fitness rehabilitation programs, activity (PA) recognition has been considered as a key paradigm for Internet of Things healthcare. Traditional PA techniques focus repeated aerobic exercises or stationary PA. As crucial indicator in human health, it covers range bodily movement from aerobics anaerobic that may all bring benefits. However, existing approaches are mostly designed specific scenarios often...
Formation lithology identification is of great importance for reservoir characterization and petroleum exploration. Previous methods are based on cutting logging well-logging data have a significant time lag. In recent years, many machine learning been applied to by utilizing data, which may be affected drilling fluid. Drilling string vibration high-density ancillary it has the advantages low-latency, can acquired in real-time. more accessible available compared ultra-deep well drilling....
Currently the false data injection (FDI) attack bring direct challenges in synchronized phase measurement unit (PMU) based network state estimation wide-area system, resulting degraded system reliability and power supply security. This paper assesses performance of electric cyber-physical paradigm considering presence FDI attacks. The adverse impact on is evaluated through simulations for a range scenarios using IEEE 14-bus model. In addition, an algorithmic solution proposed to address...
In recent years, Blockchain has been expected to create a secure mechanism for exchanging not only cryptocurrency but also other types of assets without the need powerful and trusted third-party. This could enable new era Internet usage called Value (IoV) in which any such as intellectual digital properties, equity wealth can be digitized transferred an automated, secure, convenient manner. IoV, is used guarantee security transactions that are nearly impossible altered; thus it impractical...
Configuration bugs are one of the dominant causes software failures. Previous studies show that a configuration bug could cause huge financial losses in system. The importance has attracted various research studies, e.g., To detect, diagnose, and fix bugs. Given report, an approach can identify whether is help developers reduce debugging effort. We refer to this problem as reports prediction. address problem, we develop new automated framework applies text mining technologies on...
Explicitly or implicitly, most dimensionality reduction methods need to determine which samples are neighbors and the similarities between in original high-dimensional space. The projection matrix is then learnt on assumption that neighborhood information, e.g., similarities, known fixed prior learning. However, it difficult precisely measure intrinsic of space because curse dimensionality. Consequently, selected according such obtained corresponding might not be optimal sense classification...
The integrated scheduling of quay cranes, internal vehicles, and yard cranes in container terminals aims to improve port operations often requires robustness under uncertainty with cascade effects. In terminal operations, equipment operating time poses challenges effective scheduling, as even small fluctuations can create effects throughout the rendering original schedule ineffective. This research develop a new method that enables balance between optimization scheduling. Additionally,...
Aiming at the problem of source-load uncertainty caused by increasing penetration renewable energy and large-scale integration electric vehicles (EVs) into modern power system, a robust optimal operation scheduling algorithm for regional integrated systems (RIESs) with such uncertain situations is urgently needed. Based on this background, aiming irregular charging demand EV, paper first proposes an EV model based trip chain theory. Secondly, multi-RIES optimization including shared storage...
To evaluate the clinical utility of improved machine learning models in predicting poor prognosis following endovascular intervention for intracranial aneurysms and to develop a corresponding visualization system. A total 303 patients with treated at four hospitals (FuShun County Zigong City People's Hospital, Nanchong Central The Third Hospital Yibin, Sixth Yibin) from January 2022 September 2023 were selected. These divided into good group (n = 207) 96). An model was employed analyze...
Trust has been exploring in the era of Internet Things (IoT) as an extension traditional triad security, privacy and reliability for offering secure, reliable seamless communications services. It plays a crucial role supporting IoT entities to reduce possible risks before making decisions. However, despite large amount trust-related research IoT, prevailing trust evaluation model still debatable under development. In this article, we clarify concept Social (SIoT) ecosystems propose...
The future security of Internet Things is a key concern in the cyber-security field. One issues ability to generate random numbers with strict power and area constrains. "True Random Number Generators" have been presented as potential solution this problem but improvements output bit rate, consumption, design complexity must be made. In work we present novel experimentally verified Generator" that uses exclusively conventional CMOS technology well offering over previous designs complexity,...
This paper focuses on imbalanced dataset classification problem by using SVM and oversampling method. Traditional method increases the occurrence of over-lapping between classes, which leads to poor generalization classification. To solve this proposes a combined quasi-linear assembled SMOTE. The is an with kernel function. It realizes approximate nonlinear separation boundary mulit-local linear boundaries interpolation. SMOTE implements considering data distribution information avoids...
A novel True Random Number Generator (TRNG), using random telegraph noise (RTN) as the entropy source, is proposed to address speed, design area, power and cost simultaneously. For first time, breaks inherent speed limitation generates true numbers up 3Mbps with ultra-low power. This over 10 times faster than state-of-the-art RTN-TRNG [6]. Moreover, new does not require selection of devices thus avoids use large transistor array laborious post-selection process. reduces circuit area cost....
The modelling of healthcare process is inherently complicated due to its multi-disciplinary character. Business Process Model and Notation (BPMN) has been considered applied model demonstrate the flexibility variability activities that involved in process. However, with growing usage digital information IoT technology system, issue security privacy becomes main concern term both store management electronic health record (EHR). Therefore, it very important capture requirements at conceptual...