- Reservoir Engineering and Simulation Methods
- Optimal Power Flow Distribution
- Electric Power System Optimization
- Hydraulic Fracturing and Reservoir Analysis
- Power System Reliability and Maintenance
- Network Security and Intrusion Detection
- Power Systems and Technologies
- Oil and Gas Production Techniques
- Software Engineering Research
- Drilling and Well Engineering
- Hydrocarbon exploration and reservoir analysis
- Software System Performance and Reliability
- Software Testing and Debugging Techniques
- Smart Grid Energy Management
- Evaluation and Optimization Models
- Advanced Clustering Algorithms Research
- High-Voltage Power Transmission Systems
- HVDC Systems and Fault Protection
- Chromatography in Natural Products
- Induction Heating and Inverter Technology
- Augmented Reality Applications
- Indoor and Outdoor Localization Technologies
- Optimization and Search Problems
- Advanced Image Processing Techniques
- Internet Traffic Analysis and Secure E-voting
Inner Mongolia University
2024
Research Institute of Petroleum Exploration and Development
2018-2024
China National Petroleum Corporation (China)
2015-2024
State Grid Corporation of China (China)
2019-2024
Chongqing University
2024
IBM (Canada)
2024
China Tobacco
2024
Queen's University
2019-2021
Peking University
2018
Guangzhou University
2017
In the context of automated driving, navigating through challenging urban environments with dynamic objects, large-scale scenes, and varying lighting/weather conditions, achieving accurate localization is paramount for highly-automated (HAVs) or autonomous vehicles (AVs). An imprecise can greatly impact subsequent decision-making to manage an HAV AV's motion (planning control tasks). recent years, visual simultaneous mapping (VSLAM) has shown substantial progress equipping it lead handling...
High performance is a critical factor to achieve and maintain the success of software system. Performance anomalies represent degradation issues (e.g., slowing down in system response times) systems at run-time. can cause dramatically negative impact on users’ satisfaction. Prior studies propose different approaches detect by analyzing execution logs resource utilization metrics after have happened. However, prior detection cannot predict ahead time; such limitation causes an inevitable...
Abstract Natural fractures are the main producibility factor in weathered granite reservoirs (basement rock) and volcanic-rock reservoirs. Production practices show that these could have high production rate, but difference of well productivity between single wells is obvious. These complex natural oriented at medium-high angles, which bring complexity heterogeneity to reservoirs, adding anisotropy reservoir permeability. It very hard effectively simulate naturally fractured study...
Because of high oil price and technology advancement in recent years, chemical EOR is becoming an important option for maintaining sustainable efficient development mature reservoirs the future. In this paper, integrated numerical simulation approach adopted Palouge oilfield South Sudan feasibility evaluation. The methods are preliminarily screened main oil-bearing zones, advantages disadvantages flooding analyzed by comparing technical parameter limits with parameters. Specifically, pilot...
Malicious user behavior that does not trigger access violation or data leak alert is difficult to detect.Using the stolen login credentials, intruder doing espionage will first try stay undetected, silently collect he authorized from company network.This paper presents an overview of User Behavior Analytics Platform built logs, extract features and detect anomalous users which may contain potential insider threats.Besides, a multi-algorithms ensemble, combining OCSVM, RNN Isolation Forest,...
To obtain precise and sound results, most of existing static analyzers require whole program analysis with complete source code. However, in reality, the code an application always interacts many third-party libraries, which are often not easily accessible to analyzers. Worse still, more than 30% legacy projects [1] cannot be compiled due complicated configuration environments (e.g., compiler options macros), making ideal "whole-program analysis" unavailable practice. This paper presents...
Abstract Currently, in the production of cigarettes blade, charging export moisture control means is relatively single and can not effectively guarantee excellent quality cigarette filament. In this paper, first all, working principle tobacco blade machine introduced, leaf for dynamically analyzed, influence return air temperature on process explored. Secondly, based traditional PID controller, an adaptive fuzzy controller established by combining rules, then stacked noise-reducing...
A reliable comfort model is essential to improve occupant satisfaction and reduce building energy consumption. As two types of the most common intuitive thermal adaptive behaviors, precise recognition dressing undressing can effectively support prediction. However, traditional activity suffers from shortcomings in privacy, cost, performance. To address above issues, this study proposes a cross-domain transfer learning method for human behavior with WiFi. First, we determine interval by...
Researches on the unit commitment with transmission network have been reported recently. But, in most of these researches, they discussed mainly security constrained commitment, while relationship between and losses was not considered. However, from a standpoint operating reserve for ensuring power supply reliability, an considering is required. Further, under deregulation liberalization electric industry, only line's but also are expected to play important role calculating access charge,...
Abstract Researches on the unit commitment with transmission network have been reported recently. However, most of these researches mainly discussed security constrained commitment, while relationship between and losses was not considered. from standpoint operating reserve for ensuring power supply reliability, a considering is required. Further, under deregulation liberalization electric industry, only line's but also are expected to play an important role in calculating access charge,...
Deterministic replay can reenact an earlier program execution, which facilitate debugging the parallel program. There is non-determinism to access shared resources when a runs on multicore processor, from major challenge of deterministic comes. An execution sequence inferred technique proposed reduce record cost, ESIDR. The key idea ESIDR tracking read actions memory with virtual cache and logging write-read dependence write action happens. among accesses obtained by analyzing log that...