Mingjun Wei

ORCID: 0000-0003-2764-9291
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Financial Distress and Bankruptcy Prediction
  • Advanced Battery Technologies Research
  • Customer churn and segmentation
  • Anomaly Detection Techniques and Applications
  • Internet Traffic Analysis and Secure E-voting
  • Robotic Path Planning Algorithms
  • Advanced Computational Techniques and Applications
  • Interstitial Lung Diseases and Idiopathic Pulmonary Fibrosis
  • Data Mining Algorithms and Applications
  • Advanced Algorithms and Applications
  • Chaos-based Image/Signal Encryption
  • Medical Imaging and Pathology Studies
  • Guidance and Control Systems
  • Pulmonary Hypertension Research and Treatments
  • Adaptive Control of Nonlinear Systems
  • Advanced Malware Detection Techniques
  • Flowering Plant Growth and Cultivation
  • Electric and Hybrid Vehicle Technologies
  • Numerical methods for differential equations
  • Energy and Environment Impacts
  • IoT-based Smart Home Systems
  • Data Management and Algorithms
  • Aerospace Engineering and Control Systems
  • Plant Taxonomy and Phylogenetics

Beijing Jingshida Electromechanical Equipment Research Institute
2019-2024

Taiyuan University of Science and Technology
2024

North China University of Science and Technology
2011-2023

Computer Emergency Response Team
2019

Zhejiang University
2003-2011

Skin disease is one of the most common diseases. Due to intricate categories skin diseases, their symptoms being very similar in early stage, and lesion samples extremely unbalanced, classification challenging. At same time, under conditions limited data, generalization ability a single reliable convolutional neural network model weak, feature extraction insufficient, accuracy low. Therefore, this paper, we proposed for based on fusion. Through fusion, deep shallow introduction an attention...

10.3390/electronics12020438 article EN Electronics 2023-01-14

Dijkstra algorithm is a classic of computing the shortest path between two points. In past amount urban vehicles small, so optimal one. However, with increasing cars, traffic congestion serious. The calculated by using traditional still path, but it not necessarily optimal. Therefore, in order to solve route choice problem improved put forward, which introduces weight function. Experiments show that can better meet needs drivers on path.

10.1109/wartia.2014.6976257 article EN 2014 IEEE Workshop on Advanced Research and Technology in Industry Applications (WARTIA) 2014-09-01

With the rapid development of LAN, security LAN has been becoming serious, especially malicious network attack is one vital problems. In this paper, with web log mining technique, files which are generated in server analysed by outlier mining, can effectively supervise and promise operation techniques.

10.1109/emeit.2011.6023097 article EN 2011-08-01

Successive Over-Relaxation Iterative Algorithm (hereinafter referred to as SOR Algorithm) is one of the effective methods for solving large-scale sparse matrix equation set, and first order linear stationary iterative method. Starting with introduction system algebraic equations, this paper discusses astringency judgement conditions importance selection convergence factor, provides MATLAB program Algorithm, equations; algorithm; symmetric positive definite matrices.

10.1109/emeit.2011.6023095 article EN 2011-08-01

To improve the fuel economy and battery life of extended‐range electric vehicles (EREVs), an energy management strategy (EMS) based on bargaining game (BG) is proposed. This optimizes overall by optimizing power allocation. First, a model for EREVs developed. The considers auxiliary unit (APU) as two parties game. allocation between APU both consumption life. And it also improves benefit vehicle. Second, effect discount factor control results analyzed to obtain best optimization results....

10.1002/ente.202301118 article EN Energy Technology 2024-01-30

This paper presented that intrusion detection is an effective technique to protect Web server. Misused-based used detect Web-based attacks. It went deeply into Decision Tree technique; the traditional misused-based matching method was improved by using decision tree and speed of process has been significantly improved. Its efficiency verified example.

10.1109/icfn.2010.68 article EN 2010-01-01

Our team has won the Grand Champion (Tie) of PAKDD-2007 data mining competition. The task is to score credit card customers a consumer finance company according likelihood that take up home loans offered by company. This report presents our solution for this business problem. TreeNet and logistic regression are algorithms used in project. final based on cross-algorithm ensemble two within-algorithm ensembles regression. Finally, some discussions from presented.

10.4018/jdwm.2008040102 article EN International Journal of Data Warehousing and Mining 2008-04-01

Lyapunov index is one of criteria for testing whether the system in a chaotic state, and its value represents developed level state. To study characteristic cascade reveal disturbance mechanism among subsystems system, following researches are carried out. First, model constructed from viewpoint pseudo noise disturbance, difference between without with external influence investigated. Then conclusion that disturbances can be considered as drawn. Second, proved not algebraic sum each...

10.7498/aps.63.120509 article EN cc-by Acta Physica Sinica 2014-01-01

Meeting distributed detection's requirements of accuracy, expansibility and portability, ontology is introduced to organize systematize all intrusion detection behavior at any level, consequently reducing ambiguity supporting share. The paper presented ontology-based model with advantages hierarchical cooperative models, then the deduction expert system was used detect complex attacks.

10.1109/iccasm.2010.5622757 article EN 2010-10-01

In fractional Fourier transform (FRFT) image encryption algorithm, according to the problem that one plain-text is correlated with cipher-text encrypted, which can not resist chosen plaintext and attack, double-feedback method based on chaotic dynamic grouping oriented FRFT was proposed. Two systems were adopted in this method. Firstly, feedback introduced drive two systems. And driven by utilized encrypt: keys of system 1 realize plain later FRFT, first obtained. Then 2 obtain second...

10.1109/iceiec.2016.7589714 article EN 2016-06-01

Aiming at the web attacks, this paper presented a program-based intrusion detection system to protect Web server based on analysis of data source and technique. Then, it extended object safety specification so as meet requirements server. In conclusion, new technology, can be applied detect attacks against vulnerabilities effectively.

10.1109/ictm.2009.5413056 article EN International Conference on Test and Measurement 2009-12-01

In this paper, influences of actuator nonlinearities and their suppression methods are studied. Firstly, the dead zone backlash characteristics on control performance statically unstable missiles analyzed in detail. Then based cascade method active disturbance rejection (ADRC) theory, a nonlinear "double-layer compensation" for is proposed. Finally, simulation verification carried out. Simulation results show that ADRC approach can significantly suppress adverse effects such as system...

10.1109/icus48101.2019.8996043 article EN 2021 IEEE International Conference on Unmanned Systems (ICUS) 2019-10-01

10.1007/s11766-003-0080-8 article EN Applied mathematics/Applied Mathematics. A Journal of Chinese Universities/Gao-xiao yingyong shuxue xuebao 2003-03-01
Coming Soon ...