- IoT and Edge/Fog Computing
- Business Process Modeling and Analysis
- Petri Nets in System Modeling
- Smart Parking Systems Research
- Advanced Graph Theory Research
- Integrated Energy Systems Optimization
- Power Systems and Renewable Energy
- Smart Grid Energy Management
- Service-Oriented Architecture and Web Services
- Cloud Computing and Resource Management
- Privacy-Preserving Technologies in Data
- Energy Harvesting in Wireless Networks
- Microgrid Control and Optimization
- Energy Load and Power Forecasting
- Energy Efficient Wireless Sensor Networks
- Optimal Power Flow Distribution
- Photochromic and Fluorescence Chemistry
- Mobile Ad Hoc Networks
- Wind Energy Research and Development
- Advanced Technologies in Various Fields
- Fire Detection and Safety Systems
- Computational Geometry and Mesh Generation
- Cryptography and Data Security
- Cloud Data Security Solutions
- E-commerce and Technology Innovations
Weifang University of Science and Technology
2020-2024
Weifang University
2021-2024
Harbin Electric Corporation (China)
2024
Haier Group (China)
2023
Guangzhou Design Institute
2023
China Guodian Corporation (China)
2022
Guizhou University
2022
Guizhou Electric Power Design and Research Institute
2022
Shandong University of Science and Technology
2010-2014
Shandong University
2014
Abstract Boosted by mobile communication technologies, Human Activity Recognition (HAR) based on smartphones has attracted more and attentions of researchers. One the main challenges is classification time accuracy in processing long-time dependent sequence samples with noisy or missed data. In this paper, a 1-D Convolution Neural Network (CNN)-based bi-directional Long Short-Term Memory (LSTM) parallel model attention mechanism (ConvBLSTM-PMwA) proposed. The original features sensors are...
Although the data trading platform has accelerated flow of data, current still many problems. According to characteristics blockchain technology, from aspects attack behavior in and security application technology power transactions, this paper studies blockchain. Moreover, article focuses on privacy protection ciphertext strategy CP-ABE scheme, protects information access by designing appropriate key structures structure forms. In addition, system efficiency is improved computing...
Smoke and fire detection technology is a key for automatically realizing forest monitoring warning. One of the most popular algorithms object tasks YOLOv5. However, it suffers from some challenges, such as high computational load limited performance. This paper proposes high-performance lightweight network model detecting smoke based on YOLOv5 to overcome these problems. C3Ghost Ghost modules are introduced into Backbone Neck achieve purpose reducing parameters improving feature’s expressing...
Summary Regarding the recent information technology improvement, fog computing (FC) emergence increases ability of computational equipment and supplies modern solutions for traditional industrial applications. In environment, Internet Things (IoT) applications are completed by nodes that intermediate in fog, physical servers data centers cloud. From other side, because resource constraints, dynamic nature, heterogeneity, volatility management problems must be considered as one challenging...
Providing clean water for energy generation is of particular importance. Due to limited resources, hydropower facing problems in today’s world societies. this issue, the purpose study investigate optimal management resources and its impact on generation. The innovation research use a new version Developed Wildebeest Herd Optimization (DWHO) forecast This proposed algorithm solves optimization increases accuracy results obtained reservoir operation generate power. showed that developed has...
Summary Internet of Things (IoT) is utilized as an emerging sample for defining the future technology in which physical items like sensors, radio‐frequency identification tags, mobile phones, actuators, and so on, can have interaction together cooperation with their neighbors obtaining joint objectives. The performance deployed tasks applications on network considered one critical goals this model, achieved by task allocation mechanism. Task IoT complicated due to intricate connection among...
Process mining is an emerging technology used to extract, detect, and improve actual processes by extracting knowledge from event logs generated information systems. In the production process, we can obtain optimal process based on practical experience. Indirect dependencies may exist among different structures in model discovered log of executions that perform better. However, existing algorithms cannot effectively mine indirect structures. To compensate for this deficiency, algorithm named...
A graph is a particular representation of static network and labeling can be think as automatic routing data in topology. visual the form help us to look deep insight. The science (e.g., Python Package: computer programming language) uses theory concepts study analyze networks. Analyzing these equivalent finding set edges E′ for G such that every vertex incident with at least one edge E′. Then called an edge-covering G. spanning tree connected example edge-covering. finite simple (ad,...
Abstract In the process of collaborative scheduling grid energy-consuming side, voltage value is low, and utilization rate resources side poor. Therefore, a method for based on carbon verification data mining algorithm proposed. Based structure management system, related lookup formula set to determine task power energy side. Under algorithm, topology constructed, target parameters are processed, coordinated realized. The experimental results show that this can effectively improve each node,...
In graph theory, the labeling is assignment of labels (represented by integers) to edges and/or vertices a graph. For <mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML" id="M1"><mml:mrow><mml:mi>G</mml:mi><mml:mo>=</mml:mo><mml:mfenced open="(" close=")" separators="|"><mml:mrow><mml:mi>V</mml:mi><mml:mo>,</mml:mo><mml:mi>E</mml:mi></mml:mrow></mml:mfenced></mml:mrow></mml:math>, with vertex set id="M2"><mml:mi>V</mml:mi></mml:math> and edge id="M3"><mml:mi>E</mml:mi></mml:math>,...
Abstract Secure comparison protocol is an important branch of secure multi-party computation(SMPC), which compares the size input data without disclosing any information between participants. The development cloud computing provides application platform for SMPC, but it also brings new challenges. In with clients need to process their own and submit processed a server, then performs computation. this process, not only maintain honest state at all times, sensitive on server side may be...
On demand migration of tenants’ data is a critical technology for elastic load balancing in SaaS application. However, different tenants have required resource with various SLA requirements. Moreover, previously reported techniques are not tenant aware. To study the data, we mainly focus on problem when to migrate which muti-tenant shared DB server and build new framework that aims monitor minimize cost. We establish estimation model decide then create cost guide choice possible tenants....
Wind power systems are volatile and uncertain. In this paper, the wind system was studied for optimal configuration to improve stability reliability of system. This article proposed a energy storage optimization model based on OOB-GWO-SVR. Through simulation analysis actual data farm, paper verified accuracy effectiveness model, compared it with other commonly used algorithms. By experimental analysis, capacity 110 kWh, which had higher prediction capability than empirical formulas genetic...
Under the background of "double carbon" policy, access renewable energy in power system has increased significantly, and impact its uncertainty on operation cannot be ignored. In order to improve islanded microgrid's ability cope with energy. Firstly, index matching degree flexible supply demand (MDFSD) is established based flexibility margin theory, which able reflect respond load within a certain period time. Then, optimal model microgrid established, taking cost MDSDF as objective...