Guoliang Zhao

ORCID: 0000-0003-0152-5100
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Reservoir Engineering and Simulation Methods
  • Optimal Power Flow Distribution
  • Electric Power System Optimization
  • Hydraulic Fracturing and Reservoir Analysis
  • Power System Reliability and Maintenance
  • Network Security and Intrusion Detection
  • Power Systems and Technologies
  • Oil and Gas Production Techniques
  • Software Engineering Research
  • Drilling and Well Engineering
  • Hydrocarbon exploration and reservoir analysis
  • Software System Performance and Reliability
  • Software Testing and Debugging Techniques
  • Smart Grid Energy Management
  • Evaluation and Optimization Models
  • Advanced Clustering Algorithms Research
  • High-Voltage Power Transmission Systems
  • HVDC Systems and Fault Protection
  • Chromatography in Natural Products
  • Induction Heating and Inverter Technology
  • Augmented Reality Applications
  • Indoor and Outdoor Localization Technologies
  • Optimization and Search Problems
  • Advanced Image Processing Techniques
  • Internet Traffic Analysis and Secure E-voting

Inner Mongolia University
2024

Research Institute of Petroleum Exploration and Development
2018-2024

China National Petroleum Corporation (China)
2015-2024

State Grid Corporation of China (China)
2019-2024

Chongqing University
2024

IBM (Canada)
2024

China Tobacco
2024

Queen's University
2019-2021

Peking University
2018

Guangzhou University
2017

In the context of automated driving, navigating through challenging urban environments with dynamic objects, large-scale scenes, and varying lighting/weather conditions, achieving accurate localization is paramount for highly-automated (HAVs) or autonomous vehicles (AVs). An imprecise can greatly impact subsequent decision-making to manage an HAV AV's motion (planning control tasks). recent years, visual simultaneous mapping (VSLAM) has shown substantial progress equipping it lead handling...

10.1109/tits.2024.3379993 article EN IEEE Transactions on Intelligent Transportation Systems 2024-04-05

10.1016/j.cam.2013.04.006 article EN publisher-specific-oa Journal of Computational and Applied Mathematics 2013-04-10

High performance is a critical factor to achieve and maintain the success of software system. Performance anomalies represent degradation issues (e.g., slowing down in system response times) systems at run-time. can cause dramatically negative impact on users’ satisfaction. Prior studies propose different approaches detect by analyzing execution logs resource utilization metrics after have happened. However, prior detection cannot predict ahead time; such limitation causes an inevitable...

10.1145/3440757 article EN ACM Transactions on Software Engineering and Methodology 2021-04-23

Abstract Natural fractures are the main producibility factor in weathered granite reservoirs (basement rock) and volcanic-rock reservoirs. Production practices show that these could have high production rate, but difference of well productivity between single wells is obvious. These complex natural oriented at medium-high angles, which bring complexity heterogeneity to reservoirs, adding anisotropy reservoir permeability. It very hard effectively simulate naturally fractured study...

10.2118/191800-18erm-ms article EN 2018-10-07

Because of high oil price and technology advancement in recent years, chemical EOR is becoming an important option for maintaining sustainable efficient development mature reservoirs the future. In this paper, integrated numerical simulation approach adopted Palouge oilfield South Sudan feasibility evaluation. The methods are preliminarily screened main oil-bearing zones, advantages disadvantages flooding analyzed by comparing technical parameter limits with parameters. Specifically, pilot...

10.1007/s13202-015-0183-9 article EN cc-by Journal of Petroleum Exploration and Production Technology 2015-06-01

Malicious user behavior that does not trigger access violation or data leak alert is difficult to detect.Using the stolen login credentials, intruder doing espionage will first try stay undetected, silently collect he authorized from company network.This paper presents an overview of User Behavior Analytics Platform built logs, extract features and detect anomalous users which may contain potential insider threats.Besides, a multi-algorithms ensemble, combining OCSVM, RNN Isolation Forest,...

10.18293/seke2018-036 article EN Proceedings/Proceedings of the ... International Conference on Software Engineering and Knowledge Engineering 2018-07-01

To obtain precise and sound results, most of existing static analyzers require whole program analysis with complete source code. However, in reality, the code an application always interacts many third-party libraries, which are often not easily accessible to analyzers. Worse still, more than 30% legacy projects [1] cannot be compiled due complicated configuration environments (e.g., compiler options macros), making ideal "whole-program analysis" unavailable practice. This paper presents...

10.1145/3196321.3196367 article EN 2018-05-28

Abstract Currently, in the production of cigarettes blade, charging export moisture control means is relatively single and can not effectively guarantee excellent quality cigarette filament. In this paper, first all, working principle tobacco blade machine introduced, leaf for dynamically analyzed, influence return air temperature on process explored. Secondly, based traditional PID controller, an adaptive fuzzy controller established by combining rules, then stacked noise-reducing...

10.2478/amns-2024-0026 article EN cc-by Applied Mathematics and Nonlinear Sciences 2024-01-01

A reliable comfort model is essential to improve occupant satisfaction and reduce building energy consumption. As two types of the most common intuitive thermal adaptive behaviors, precise recognition dressing undressing can effectively support prediction. However, traditional activity suffers from shortcomings in privacy, cost, performance. To address above issues, this study proposes a cross-domain transfer learning method for human behavior with WiFi. First, we determine interval by...

10.48550/arxiv.2410.21827 preprint EN arXiv (Cornell University) 2024-10-29

Researches on the unit commitment with transmission network have been reported recently. But, in most of these researches, they discussed mainly security constrained commitment, while relationship between and losses was not considered. However, from a standpoint operating reserve for ensuring power supply reliability, an considering is required. Further, under deregulation liberalization electric industry, only line's but also are expected to play important role calculating access charge,...

10.1541/ieejpes1990.122.3_359 article EN IEEJ Transactions on Power and Energy 2002-01-01

Abstract Researches on the unit commitment with transmission network have been reported recently. However, most of these researches mainly discussed security constrained commitment, while relationship between and losses was not considered. from standpoint operating reserve for ensuring power supply reliability, a considering is required. Further, under deregulation liberalization electric industry, only line's but also are expected to play an important role in calculating access charge,...

10.1002/eej.10116 article EN Electrical Engineering in Japan 2003-01-16

Deterministic replay can reenact an earlier program execution, which facilitate debugging the parallel program. There is non-determinism to access shared resources when a runs on multicore processor, from major challenge of deterministic comes. An execution sequence inferred technique proposed reduce record cost, ESIDR. The key idea ESIDR tracking read actions memory with virtual cache and logging write-read dependence write action happens. among accesses obtained by analyzing log that...

10.1109/dcit.2015.7 article EN 2015-11-01

10.3724/sp.j.1087.2010.01926 article EN Journal of Computer Applications 2010-08-02
Coming Soon ...