- High-Voltage Power Transmission Systems
- HVDC Systems and Fault Protection
- Power Systems and Renewable Energy
- Smart Grid and Power Systems
- Fractional Differential Equations Solutions
- Numerical methods for differential equations
- Spacecraft Dynamics and Control
- Advanced Sensor and Control Systems
- Wireless Communication Security Techniques
- Advanced Algorithms and Applications
- Advanced Optimization Algorithms Research
- Cooperative Communication and Network Coding
- Microgrid Control and Optimization
- Target Tracking and Data Fusion in Sensor Networks
- Power Systems and Technologies
- Power System Optimization and Stability
- Inertial Sensor and Navigation
- Differential Equations and Numerical Methods
- Aerospace Engineering and Control Systems
- Matrix Theory and Algorithms
- Fault Detection and Control Systems
- Wind Turbine Control Systems
- Thermal Analysis in Power Transmission
- Craniofacial Disorders and Treatments
- Geomechanics and Mining Engineering
Academy of Medical Sciences
2024-2025
Chinese Academy of Medical Sciences & Peking Union Medical College
2024-2025
China Electric Power Research Institute
2011-2024
Peking Union Medical College Hospital
2024
North China Electric Power University
2011-2024
Harbin Institute of Technology
2024
China Academy of Space Technology
2023
Northwestern Polytechnical University
2009-2023
BOE Technology Group (China)
2023
Xi'an Jiaotong University
2018
Wireless communication is susceptible to eavesdropping attacks because of its broadcast nature. This paper illustrates how interference can be used counter and assist secrecy. In particular, a wire-tap channel with helping interferer (WT-HI) considered. Here, transmitter sends confidential message intended receiver in the presence passive eavesdropper help an independent interferer. The interferer, which does not know message, helps ensuring secrecy by sending signal. An achievable rate...
As an important part of prognostics and health management, accurate remaining useful life (RUL) prediction for lithium (Li)-ion batteries can provide helpful reference when to maintain the in advance. This paper presents a novel method predict RUL Li-ion batteries. is based on framework improved particle learning (PL). The PL prevent degeneracy by resampling state particles first with considering current measurement information then propagating them. Meanwhile, adjusting number at each...
Fault detection and isolation (FDI) is very difficult for electronics-rich analog systems due to its sophisticated mechanism variable operational conditions. Traditionally, FDI in such done through the monitoring of deviation output signals voltage or current at system level, which commonly arises from degradation one more critical components. Therefore, can be transformed a multiclass classification task given extracted features circuit. Traditional feature extraction on circuit mostly...
Analog circuits have been extensively used in industrial systems, and their failure may make the systems work abnormally even cause accidents. In order to monitor status, detect faults, predict early, this study proposes a signal model-based fault coding circuit response after being stimulated perform diagnosis without training large amount of sample data classifiers. Manifold features extracted from responses are associated with fault-indicating curve feature space, which group bases...
Due to the broadcast nature of wireless medium, communication is susceptible adversarial eavesdropping. This paper describes how eavesdropping can potentially be defeated by exploiting superposition medium. A Gaussian wire-tap channel with a helping interferer (WTC-HI) considered in which transmitter sends confidential messages its intended receiver presence passive eavesdropper and help an interferer. The interferer, does not know message assists transmission sending signal that independent...
Full human body shape scans provide valuable data for a variety of applications including anthropometric surveying, clothing design, human-factors engineering, health, and entertainment. However, the high price, large volume, difficulty operating professional 3-D scanners preclude their use in home Recently, portable low-cost red green blue-depth cameras such as Kinect have become popular computer vision tasks. infrared mechanism this type camera leads to noisy incomplete depth images. We...
Abstract An optimal control strategy for a hybrid power flow controller based on PST and VSC is proposed in this paper. Firstly, regulation model of the considering impedance variation with taps established. Based this, transfer factor between different lines calculated abnormal operation scenarios such as grid maintenance faults, line thermal stability limit constraints proposed. Then, combined characteristics phase shifting transformer (PST) voltage source converter (VSC), coordinated...
Craniofacial microsomia (CFM) involves complex skeletal asymmetries, including mandibular and zygomatic arch deficiencies, leading to facial deformities occlusal cant. Current animal models inadequately replicate these features, hindering the development of customized temporomandibular joint prostheses for CFM. This study aimed develop a miniature pig model that mimics proportional craniofacial defects observed in severe CFM, serving as platform future TMJ reconstruction studies. Three pigs...
This paper presents a methodology to simulate the operation of multiple wind farms. The proposed model simulates farm output curves which fit given statistical indices. Correlated speeds different farms are generated by using stochastic differential equation takes account marginal distribution and time sequencing. Wind speed seasonal rhythms diurnal patterns, turbine characteristics, reliability wake effect considered in model. presented cases validate effectiveness show that correlation...
Wireless communication is susceptible to adversarial eavesdropping due the broadcast nature of wireless medium. In this paper it shown how can be alleviated by exploiting superposition property A wiretap channel with a helping interferer (WT-HI), in which transmitter sends confidential message its intended receiver presence passive eavesdropper, and help an independent interferer, considered. The does not know message, helps ensuring secrecy sending signals. An achievable rate for WT-HI...
In the realm of rock mass project, fatigue failure characteristics under cyclic load have closed realtionship with long-term stability mass. Acoustic emission (AE) technique can be used to monitor production micro-cracks development and process in test sample continuously in-real-time, which makes it better than other methods. The experimental results were displayed as follows: AE Count, Energy, Hits roughly same damage process. signal materials such is arised from damage. Thus, variable...
This article presents a variant of sigma-point Kalman filters family called square-root spherical simplex unscented filter for online Bayesian recursive estimation the state and parameter nonlinear systems with non-Gaussian statistics. The algorithm consists better-behaved transformation to build sigma point set. forms have equal or marginally better accuracy when compared standard forms, but at added benefit reduced computational cost certain consistently increased numerical stability as...