- Islanding Detection in Power Systems
- Quantum Information and Cryptography
- Advanced Graph Neural Networks
- Power Systems and Renewable Energy
- Quantum Computing Algorithms and Architecture
- Microgrid Control and Optimization
- HVDC Systems and Fault Protection
- Smart Grid and Power Systems
- Power Systems and Technologies
- Innovative concrete reinforcement materials
- Structural Behavior of Reinforced Concrete
- Adaptive Control of Nonlinear Systems
- Advanced Algorithms and Applications
- Power Systems Fault Detection
- Complex Network Analysis Techniques
- High-Voltage Power Transmission Systems
- Infrastructure Maintenance and Monitoring
- Chaos-based Image/Signal Encryption
- Control Systems and Identification
- Elevator Systems and Control
- Manufacturing Process and Optimization
- Embedded Systems and FPGA Design
- Quantum Mechanics and Applications
- Cryptography and Data Security
- Structural Engineering and Vibration Analysis
University of Electronic Science and Technology of China
2005-2025
Harbin Institute of Technology
2013-2025
Chongqing University
2013-2025
Guilin University of Electronic Technology
2014-2023
Wuhan University of Science and Technology
2014-2022
Northwestern Polytechnical University
2022
Hunan University
2007-2022
Wuhan University
2021
Sanya University
2021
Wuhan University of Technology
2021
Work function (WF) modulation is a crucial descriptor for carbon-based electrodes in optoelectronic, catalytic, and energy storage applications. Boron-doped graphene envisioned as highly promising anode material alkali metal-ion batteries (MIBs). However, due to the large structural space concerning various doping concentrations, lack of both datasets effective methods hinders discovery boron-doped with high WF that generally leads strong adsorption. Herein, we propose...
N-ary relational facts represent semantic correlations among more than two entities. While recent studies have developed link prediction (LP) methods to infer missing relations for knowledge graphs (KGs) containing n-ary facts, they are generally limited transductive settings. Fully inductive settings, where predictions made on previously unseen entities, remain a significant challenge. As existing mainly entity embedding-based, struggle capture entity-independent logical rules. To fill in...
The key towards learning informative node representations in graphs lies how to gain contextual information from the neighbourhood. In this work, we present a simple-yet-effective self-supervised representation strategy via directly maximizing mutual between hidden of nodes and their neighbourhood, which can be theoretically justified by its link graph smoothing. Following InfoNCE, our framework is optimized surrogate contrastive loss, where positive selection underpins quality efficiency...
Abstract The stability of a voltage source converters (VSC) system based on phase-locked loop (PLL) is very important issue during asymmetric grid faults. This paper establishes transient synchronous model dual-sequence PLL-based VSC low ride-through by referring to the equivalent rotor swing equation generators. Based model, synchronization characteristics under faults are described, and interaction mechanisms, as well instability phenomena positive negative sequence PLL explained. Using...
In recent years, magnesium and its alloys have been proposed as a new class of metallic bioabsorbable implant material. Unfortunately, the rapid corrosion rate could result in accumulation hydrogen gas reduction mechanical properties before healing bone tissue. It is necessary to develop biocompatible coatings delay degradation rate. present research, hydroxyapatite are successfully deposited on AZ31 alloy by sol–gel technique slow down improve bioactivity. The structure, composition...
Quantum key distribution (QKD) networks are expected to enable information-theoretical secure (ITS) communication over a large-scale network. Most research on relay-based QKD assumes all relays or nodes completely trustworthy. However, this assumption is unreasonable because the malicious behavior of even single node can undermine security entire Currently, there no method directly distinguish between honest and nodes. Moreover, status as be dynamic. Therefore, solution needed that withstand...
Under grid fault, the grid-connected voltage source converters (VSCs) have risk of transient synchronization instability during low ride through. Based on equivalent rotor swing equation VSC, this letter proposes an improved stability control strategy, which improves existence equilibrium points and behaviors VSC system. Thus, can be significantly enhanced. The simulation experimental results demonstrate validity proposed strategy.
Students need a wide variety of skills before they can successfully engage in real-world projects with paying customers. Some these skills, such as the "soft skills" communicating non-technical customer and working larger team to collaboratively develop project, are generally not present Computer Science courses. In this paper, we discuss our experience teaching explain structure redesigned Software Development course how it aligns Capstone experience. The main novelty approach is specific...
Following the application of Deep Learning to graphic data, Graph Neural Networks (GNNs) have become dominant method for Node Classification on graphs in recent years. To assign nodes with preset labels, most GNNs inherit end-to-end way which node features are input models while labels pre-classified used supervised learning. However, these methods can make full use and their associations, they treat separately ignore structural information those labels. utilize label structures, this paper...
Information-theoretic secure (ITS) authentication is an essential part of a quantum key distribution (QKD) system. In the QKD network, scheme based on ITS keys pre-shared by However, such subject to limitation that consumes significant amount when scale and communication requirements networks grow. To address issue, we propose group for considerably fewer keys. our scheme, multiple network nodes collaborate complete as group. Compared reduces complexity consumption from <inline-formula...
In this article, the transient synchronization process of multi-paralleled grid forming (GFM) inverters is studied detailly. Firstly, based on control structure and complementary cluster center inertia relative motion (CCCOI-RM), single machine infinite bus (SMIB) system proposed. Subsequently, power angle characteristic (PAC) equation for different dispatching strategies with simplified damping coefficient built. Meanwhile, a strategy considering communication delay proposed, which avoiding...
Microgrid is profitable to mitigate the expansion pressure of transmission grid and achieve higher reliability at same time. It also provides an ideal platform for application renewable energy. Network characteristics analysis basic element in assessment microgrid. This paper discusses two methods microgrid construction according China's distribution system, constructs a based on typical 10 kV network. In order analyze topology microgrid, kinds matrices are used describe more common RBTS...
Abstract Generally, the information theoretically secret key agreement by public discussion consists of three phases, namely, advantage distillation, reconciliation, and privacy amplification. In existing literatures, these phases are studied separately, no comprehensive consideration has been given. this paper, we analyze restrictive relationship among from an overall point view. For satellite scenario, in detail Winnow protocol for first time. We also present mutual between parameters...
A major application of a distributed WSN (wireless sensor network) is to monitor specific area for detecting some events such as disasters and enemies. In order achieve this objective, each in the network required collect local observations which are probably corrupted by noise, make decision regarding presence or absence an event, then send its fusion center. After that, center makes final depending on these decisions rule, so efficient rule extremely critical. It obvious that...
Classical Radial Basis Function (RBF) neural network controller designs typically fix the number of basis functions and tune only weights. In this paper we present a backstepping algorithm in which all RBF parameters, including centers, variances weight matrices are tuned online. By using Lyapunov approach, tuning rules for updating parameters derived stability robustness analysis is presented. Additionally, incorporate ability to append neurons such that both tracking performance...
Purpose – The purpose of this paper is to propose a bolt loosening detection approach which integrates piezoelectric ceramics with active sensor technology. Design/methodology/approach When the ultrasonic wave propagates across contact surface at bolted joints, because existence imperfect interface, only part energy passed through it. According Hertz theory, depends on true area decided by pretension. Hence, measuring received sensing material, pretension or can be detected. Findings...
Nowadays, Graph Neural Networks (GNNs) following the Message Passing paradigm become dominant way to learn on graphic data. Models in this have spend extra space look up adjacent nodes with adjacency matrices and time aggregate multiple messages from nodes. To address issue, we develop a method called LinkDist that distils self-knowledge connected node pairs into Multi-Layer Perceptron (MLP) without need messages. Experiment 8 real-world datasets shows MLP derived can predict label of...