- Cognitive Radio Networks and Spectrum Sensing
- Stability and Control of Uncertain Systems
- Advanced Numerical Analysis Techniques
- Wireless Communication Networks Research
- Advanced MIMO Systems Optimization
- Wireless Networks and Protocols
- Energy Efficient Wireless Sensor Networks
- 3D Shape Modeling and Analysis
- Advanced Sensor and Control Systems
- Cooperative Communication and Network Coding
- Advanced Algorithms and Applications
- Control and Stability of Dynamical Systems
- Matrix Theory and Algorithms
- IPv6, Mobility, Handover, Networks, Security
- Adaptive Control of Nonlinear Systems
- Embedded Systems and FPGA Design
- Advanced Vision and Imaging
- ICT Impact and Policies
- Mobile Ad Hoc Networks
- Power Systems Fault Detection
- Data Management and Algorithms
- Security in Wireless Sensor Networks
- Transportation Planning and Optimization
- Simulation and Modeling Applications
- Smart Grid and Power Systems
Beijing Aerospace Flight Control Center
2019-2025
Xi'an University of Technology
2010-2023
Ping An (China)
2023
Xi'an Railway Survey and Design Institute
2021
Chongqing University of Science and Technology
2014-2020
National University of Defense Technology
2008-2018
Guangdong University of Technology
2003-2017
Hebei University of Technology
2012-2016
Taiwan Power (Taiwan)
2015
Hohai University
2006-2014
The modeling of Bézier curves and surfaces with their shape parameters is the most popular area research in computer aided geometric design/computer manufacturing (CAGD/CAM) due to characteristics. In this paper, we propose an important idea tackle problem construction some engineering symmetric revolutionary rotation by using generalized hybrid trigonometric (or GHT-Bézier, for short) curve. can be modified alteration parameters. free-form complex GHT-Bézier constraints parametric...
This paper presents the implementation of real-time PCI interrupt response for a particular device within RTLinux operating system. It encapsulates methodologies employed to achieve responsiveness interrupts specifically environment. The delves into fundamental steps involved in development process, detailed execution implementation, integration driver program's kernel module, and harmonized operation between user process program. includes thorough evaluation performance based on proposed...
It is known that rotation of a furnished room around the roll axis erect subjects produces an illusion 360° self-rotation in many subjects. Exposure to stationary tilted visual frames or rooms only up 20° illusory tilt. But, studies using static rooms, remained and body was not aligned with room. We have revealed new class disorientation illusions occur when placed 90° 180° containing polarised objects (familiar tops bottoms). For example, supine looking at wall feel upright their arms...
Most routing protocols in wireless sensor networks take lifetime as design target, but not security. This paper researches on security and proposes SS-LEACH algorithm based LEACH algorithm. The makes use of nodes self-localization technology keys pre-distribution strategy. It improves the method electing cluster-heads forms dynamic stochastic multi-paths chains. results simulation demonstrate that only prolongs effectively, also enhances strongly.
Combining with software-defined networking and virtualization technology, Network Function (NFV) has been proposed as an important technology for constructing scalable network. VNF (Virtual Function) redeployment is a critical step dealing network evolve. Due to the inner state consistency constraints, migration new location major challenge redeployment. Previous works about primarily focused on internal transfer, which required reprograming software designed transfer protocols. Extra work...
Since the interactivity, integrality and instantaneity of data communication in smart substation have been improved to a higher degree, it can contribute construction realization area backup protection (SABP). In this paper, structure characteristics were introduced firstly, application concept about SABP was presented detail. According comprehensive treatment judgment for digital information whole substation, such as voltage/current samplings multiple bays, status circuit breakers, etc.,...
The establishment of common control channel (CCC) is an immense challenge in cognitive radio networks (CRNs). Since the number large and access opportunistic, process (a.k.a. rendezvous) that any pair-wise nodes (i.e. rendezvous pair) find a to establish for communication hard achieve, especially distributed CRN. Researchers have proposed sequence-based asynchronous hopping (ACH) protocols guarantee between transmitting receiving without requirement global synchronization. However, these...
Due to dynamic channel availability in cognitive radio networks (CRNs), rendezvous problem is known as the most challenging issue design of media access control (MAC) protocol, which a key step for secondary users (SUs) start communication. With concept blind rendezvous, numerous channel-hopping sequence (CHS) based schemes have been proposed solve this these years. Currently, little attention paid carrier sensing multiple access/collision avoidance (CSMA/CA) MAC on and also...
Compared with the relay protection devices located in traditional substation, used smart substation based on IEC61850 are different under hardware structure and signal processing. Electromagnetic instrument transformers replaced by electronic digital outputs, hard-wiring control cables displaced optical fibers to transmit switch information commands. Besides, some communication networks built for sharing Adopting acquisition equipment, fiber network will undoubtedly affect protection's...
Alias resolution, mapping IP addresses to routers, is a critical step in obtaining network topology. The latest work on alias resolution based special fields the packet, such as ID, port number, etc. However, for security reasons, most devices block packets setting options, and some related exist only IPv4, so these methods cannot be used of IPv6. In order solve above problems, we propose an analysis method delay sequence analysis. this article, present new model describe distribution...
An architecture of underwater sensor networks and a two-tier routing protocol for cluster-based heterogeneous networks-TTCB have been proposed in this paper. The includes the upper nodes, lower sink node on sea surface base stations land. All nodes form two clustering structure. According to initial energy, remaining energy node, consumption previous cluster head, average distance between heads other factors, TTCB elects first-level second-level head forms dynamic chain. simulation results...
The technology of sensing and access the potential available spectrum is always a hot topic for cognitive radio networks. Compare to existing works, this paper proposes new centralized protocol which based on premise contention-aware network flow. target maximize expected throughput whole network. We have proven that finding optimal results under fixed contention topology NP problem. An approximated algorithm proposed consisted by minimum clique cover maximum matching algorithm. By detailed...
In this paper, we study a problem of minimizing linear objective function subject to system fuzzy relation equations with max-product composition. First, present standard form an original model. Then by using the concept chained-set suite, educe optimal solutions form, which can get On basis these results, finally algorithm for studied problem, is simple and rapid application.
In order to fully utilize the spectrum resource, dynamic access becomes a promising approach increase opportunity of with rapid development cognitive radio. However performance radio networks (CRN) is considerably constrained by its limited power, memory and computing ability. Fortunately cloud computing, which highlight current research, has potential make up for disadvantages because vast storage capacity. this paper we will discuss convergence sharing from several aspects including model,...
In wireless sensor networks, proposed an energy efficient routing strategy based on ant colony algorithm. The algorithm combined residual of nodes, and accorded to transition probability choose the next node. When ants passed a node, updated path list node information table .Through table, nodes in network are divided into ordinary aggregation formed tree looking as leaves, branches, sink roots. data fusion is processed. So traffic reduced saved. simulation proved that this improved load...
SUMMARY Incipient faults such as those caused by tree contacts are difficult to detect conventional relaying algorithms. These impact distribution feeder reliability advancing –over time– into a full-blown fault if not detected in time. This paper proposes combined technique using S-transform and Hilbert transform extract the features of incipient fault. A least square support vector machine classifier is developed based on so that can be distinguished from normal disturbances. The...