- Cloud Computing and Resource Management
- Distributed and Parallel Computing Systems
- Energy Efficient Wireless Sensor Networks
- IoT and Edge/Fog Computing
- Caching and Content Delivery
- Robotic Path Planning Algorithms
- Neural Networks and Applications
- Industrial Technology and Control Systems
- Robotics and Sensor-Based Localization
- Mobile Ad Hoc Networks
- Fuzzy Logic and Control Systems
- Advanced Computational Techniques and Applications
- Wireless Networks and Protocols
- Remote Sensing and LiDAR Applications
- Cooperative Communication and Network Coding
- AI in cancer detection
- Peer-to-Peer Network Technologies
- Internet Traffic Analysis and Secure E-voting
- Generative Adversarial Networks and Image Synthesis
- Robotic Mechanisms and Dynamics
- Digital Media Forensic Detection
- Data Mining Algorithms and Applications
- Network Security and Intrusion Detection
- Stability and Control of Uncertain Systems
- Parallel Computing and Optimization Techniques
Northeast Forestry University
2015-2025
Nanjing University of Posts and Telecommunications
2018-2019
Harbin Institute of Technology
2004
Virtual machine (VM) consolidation techniques are a means to improve energy efficiency and the utilization of cloud data center resources. However, aggressive VM approaches lead physical host over-utilization generate massive undesired migrations, which cause degradation performance both hosts VM. Additionally, it has been significant challenge resource in while delivering services with guaranteed quality service (QoS). To address problem, we propose an enhancing energy-efficient QoS dynamic...
The three-dimensional reconstruction of forest ecological environment by low-altitude remote sensing photography from Unmanned Aerial Vehicles (UAVs) provides a powerful basis for the fine surveying resources and management. A stereo vision system, D-SLAM, is proposed to realize simultaneous localization dense mapping UAVs in complex environments. system takes binocular images as input 3D maps target outputs, while sparse camera poses can be obtained. tracking thread utilizes temporal clue...
The bZIP (basic leucine zipper) transcription factors have been identified as key regulators of plant responses to drought stress, which limits growth and yield. Overexpression genes has shown potential in enhancing tolerance various species. However, the constrained types individual studies inconsistencies among experimental approaches resulted a lack statistical significance limited extrapolation factor overexpression for improvement. We conducted meta-analysis evaluate ten measured...
The automatic identification and three-dimensional reconstruction of house plans has emerged as a significant research direction in intelligent building smart city applications. Three-dimensional models reconstructed from two-dimensional floor provide more intuitive visualization for safety assessments spatial suitability evaluations. To address the limitations existing public datasets—including low quality, inaccurate annotations, poor alignment with residential architecture...
Purpose The purpose of this study is to address the welding demands within large steel structures by presenting a global spatial motion planning algorithm for mobile manipulator. This based on an independently developed wall-climbing robot, which comprises four-wheeled climbing platform and six-degree-of-freedom robotic manipulator, ensuring high mobility operational flexibility. Design/methodology/approach A convex hull feasible domain constraint in For extensive movements, connected...
The 3D reconstruction of forests provides a strong basis for scientific regulation tree growth and fine survey forest resources. Depth estimation is the key to inter-forest scene, which directly determines effect digital stereo reproduction. In order solve problem that existing matching methods lack ability use environmental information find consistency ill-posed regions, resulting in poor regions with weak texture, occlusion other inconspicuous features, LANet, network based on...
Cloud computing environments facilitate applications by providing virtualised resources that can be provisioned dynamically. The efficient scheduling of application tasks is critical to achieve high performance in cloud systems. To schedule precedence graphs a more realistic environments, we introduce new model considers the contention for communication not only processors resource but also network interface, what's it suitable fault-tolerant scheduling. Another novel idea proposed this...
In view of the issue concerns multiple Directed acyclic graphs (DAGs) scheduling in multi-tenant cloud computing environment, a strategy that integrate security and availability is proposed to satisfy tenants' requirements for resource availability, as thus it can not only protect users' privacy data but also advance success rate. The proposal assesses reputation ensure jobs be scheduled onto relatively nodes; during task scheduling, classifies DAGs achieve fairness; process resources...
In this paper, defining link reliability strategy constructed by remain energy, and communication cost of nodes as topology weight to synthetically reflect the energy efficiency dominator, an Energy-radio route (ECCR) is proposed solve problem that average consumption in cluster minimum cost. We take node residual distance between sink compete head, at same time, order reduce head costs, hop used establish topology. The experimental results show algorithm not only has saved characters, but...
In 5G mobile communications, caching popular media contents is considered as a promising solution to mitigate the network congestion pressure. this paper, we design heterogeneous model including base station (BS), small cells (SCs) and device-to-device (D2D) pairs, which are all portions of networks. addition, analyze performance cache-based content delivery in network. With mutually independent Possion Point Process (PPP), first provide user request hitting probability analysis theoretical...
Summary With the development of smart Internet things devices, intelligent applications are expected to lead further innovation in city. However, although cloud computing infrastructure can be used meet traditional challenges, scheduling model for new big data application has still not matured. In this work, we proposed a two‐stage framework city application. first stage, propose virtual machine selection algorithm edge enhance relative migration benefits. The defines invalid and benefits...
Generative Adversarial Nets (GANs) have shown excellent performance in image generation and Semi-Supervised Learning (SSL). However, existing GANs three problems: (1) the generator G discriminator D tends to be optimal out of sync, are not good at processing labelled data. (2) easy generate chaotic semantics; (3) cannot learn inverse mapping (projecting data back into latent space which is benefit feature representation related semantics). The problems caused by limitation two-player mode,...
The global robust exponential stability of interval complex-valued Cohen-Grossberg neural networks (CGNNs)with mixed delays and distributed are considered in this paper. Based on some mild assumptions, we prove the existence, uniqueness equilibrium point CGNNs. We introduce two numerical examples end.
Abstract Fault-tolerant scheduling is an important issue for optimal heterogeneous distributed systems because of a wide range resource failures. Primary-backup approach common methodology used fault tolerance wherein each task has primary copy and backup on two different processors. For independent tasks, the can overload with other copies same processor, as long their corresponding are scheduled Unfortunately, most algorithms developed simple model where communication contention not taken...
The hybrid space of robots is divided into task and joint space, with focused on trajectory-tracking accuracy, while considers dynamic responsiveness synchronization. Therefore, the robot-motion control systems need to effectively integrate both aspects, ensuring precision in trajectory promptly responding unforeseen environmental events. Hence, this paper proposes an online trajectory-generation method for spaces. In a planning approach presented high-precision NURBS curves. global curve...
Based on T-S fuzzy model, the robust guaranteed cost control problem is studied for a class of uncertain systems with time-delay. Sufficient conditions are presented existence law. And new design method state feedback controller proposed by using LMI approach.
In this paper, a new gradient-based iterative algorithm is proposed to solve the coupled Lyapunov matrix equations associated with continuous-time Markovian jump linear systems. A necessary and sufficient condition established for be convergent. addition, optimal value of tunable parameter achieving fastest convergence rate given explicitly. Finally, some numerical simulations are validate obtained theoretical results.
It is a main direction of industrial application that manipulator performs grasping task in space and combines obstacle avoidance planning. This paper presents an improved RRTConnect path planning algorithm IRRTC based on dynamic constrained admittance control. The sliding constraints the Cartesian position used to search for reachable traction robot by algorithm. For orientation control, priori formed artificially given constraint interval, then control modified using end load moment...
The Internet of Things (IoT) has been highly appreciated by several nations and societies as a worldwide strategic developing sector. However, IoT security is seriously threatened anomalous traffic in the IoT. Therefore, creating detection model that can recognize such aberrant essential to ensuring overall We outline main approaches are used today detect network suggest Resnet based on fused one-dimensional convolution (Conv1D) for this purpose. Our method combines create new model. This...
Abstract Fault-tolerance is one of important issues in wireless sensor network (WSN) since it critical real deployed environments to realize stability and reduce demand times. In this paper, we propose primary-backup technique by creating a backup path for every on primary data transmission. Especially, take high reliability as selected or method. The experimental results show that the algorithm not only has low packet delivery ratio characters, but also ensures topology paths extends...
Protein-protein interactions (PPIs) are of biological interest because they orchestrate a number cellular processes such as metabolic pathways and immunological recognition. This paper aims at exploring more PPIs Glucosinolates biosynthetic removing falsely predicted. A support vector machine (SVM) predictor with the radial basis kernel function (RBF kernel) is trained based on domain domain-domain interaction (DDI) information amino acid sequences. In this paper, symmetrical pair feature...
Traditional smoke recognition based on HSI model or frame differentiation method can not reach the effect of real-time processing due to large amount computation and requirement too many images. A kind automatic for recognizing forest fire gray bit plane aiming at improve performance is proposed, analyze information use combining with adaptive area smoke, first, build image, then calculate characteristics reflected by in each order finally obtain smoke. Experimental results show that...