- Advanced Statistical Process Monitoring
- Numerical methods in inverse problems
- Optimization and Variational Analysis
- Manufacturing Process and Optimization
- Fault Detection and Control Systems
- Risk and Safety Analysis
- Technology and Security Systems
- Network Security and Intrusion Detection
- Scientific Measurement and Uncertainty Evaluation
- Differential Equations and Boundary Problems
- Advanced Decision-Making Techniques
- Online and Blended Learning
- Open Education and E-Learning
- Software Reliability and Analysis Research
- Advanced Optimization Algorithms Research
- Grey System Theory Applications
- IoT-based Smart Home Systems
- Evaluation and Optimization Models
- Embedded Systems and FPGA Design
- Fixed Point Theorems Analysis
- Innovative Teaching and Learning Methods
- Quality and Safety in Healthcare
- Probabilistic and Robust Engineering Design
- Spectral Theory in Mathematical Physics
- Contact Mechanics and Variational Inequalities
Carnegie Mellon University
2024
Energy Research Institute
2023
Hebei University of Economics and Business
2009-2022
China University of Geosciences (Beijing)
2022
Iowa State University
2021
Liaoning University
2019-2021
Northwestern Polytechnical University
2018
Liaoning Planning and Design Institute of Post and Telecommunication
2010
This study examined the effectiveness of Chinese capacity-building programs in enhancing State reconstruction post conflict Somalia. adopted realism and constructivism as theoretical paradigms. Realism posited that states operate an anarchic international system where national interests power dynamics are paramount. Constructivism on other hand emphasized importance social constructs, norms identities shape interactions. took form exploratory research design. The tools data collection...
In this paper, we establish the first existence result for solutions to critical semilinear equation involving logarithmic Schr\"odinger operator with subcritical nonlinearities. Additionally, present least-energy Brezis-Nirenberg type problem fractional pseudo-relativistic and Specifically, demonstrate that of converge, up a subsequence, nontrivial solution limiting operator. Furthermore, provide regularity sublinear Our approach relies on uniform positive bounds elements in Nehari...
The Internet of Things (IoT) is a widely hyped concept, with its focus on the connection smart devices to rather than people. IoT for consumers often called home market, and large part that market consists security devices. Consumers are motivated purchase prevent burglaries, which they fear may lead damage their property or threats families. However, also understand be threat privacy personal information. To determine relative roles concerns in decision devices, we conducted survey American...
Abstract Monitoring Weibull time between event (TBE) processes is essential to avoid deterioration of quality characteristics in various reliability analysis problems. Statistical process monitoring (SPM) charts are widely used monitor the possible decreasing mean shift. For such data, many control have been proposed literature, as exponentially weighted moving average (EWMA) chart, cumulative sum (CUSUM) and Mixed EWMA–CUSUM (MEC) chart Hybrid (MHEC) chart. The current investigation...
Abstract A progressive average chart usually triggers initial out‐of‐control (OC) signals more simply and quickly than other memory‐type charts . In this paper, two control procedures are proposed for monitoring the coefficient of variation (CV) a normally distributed process variable, namely, CV (PCV) resetting (PRCV) , respectively. The implementation is presented, necessary design parameters provided. Through extensive numerical simulations, it shown that PCV PRCV outperform several...
In a real uniformly convex and p-uniformly smooth Banach space, modified forward-backward splitting iterative algorithm is presented, where the computational errors superposition of perturbed operators are considered. The sequence proved to be convergent strongly zero point sum infinite m-accretive mappings $\theta_{i}$ -inversely accretive mappings, which also unique solution one kind variational inequalities. Some new proof techniques can found, especially, inequality employed compared...
This paper designed a cloud-based platform for the Internet of Things (IoT) family intelligent fish tank[14] control system. The system consists three parts: an aquarium component consisting microcontroller and sensor, two-way cloud computing data transmission IoT users to operate tank by Android App. uses sensors single-chip collect sends through HTTP[5] protocols.
Drill cuttings (DCs, Table 1), which are produced during hydrocarbon drilling operation, rock coated with fluids and hydrocarbons. DCs without adequate treatment could leave behind thousands of tons hazardous materials, resulting in a large environmental liability. In this work, seven samples were collected from Tu Qing oilfields, microbes inhabiting the revealed through 16S rDNA gene sequencing. The oilfield showed higher microbial community abundance than those oilfield. dominant...
On the basis of analyzing limitation information concept, such concepts as random information, fuzzy rough gray uncertain and pan- are defined. It is concluded that a general which synthetically describes all kinds objectively exist, certainty various uncertainty information.
Abstract New shrinking iterative algorithms for approximating common zeros of two infinite families maximal monotone operators in a real uniformly convex and smooth Banach space are designed. Two steps multiple choices can be made the new algorithms, groups interactive containment sets $C_{n}$ <mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML"><mml:msub><mml:mi>C</mml:mi><mml:mi>n</mml:mi></mml:msub></mml:math> $Q_{n}$...
Attack source locating technology is the core in credible internet. This paper proposes method based on probabilistic packet recording (PPR) algorithm combining other methods to use, which can search real attack maximum degree, and reversely recover path maximally.
A DSTP (demand-supply-technology-policy) model to analyse the driving forces for development of intelligent and energy efficient services is constructed. Further, focusing on technology driven by Internet Things, a basic framework efficiency service
This paper introduces an approach for synthesizing feasible safety indices to derive safe control laws under state-dependent spaces. The problem, referred as Safety Index Synthesis (SIS), is challenging because it requires the existence of input in all states and leads infinite number constraints. proposed method leverages Positivstellensatz formulate SIS a nonlinear programming (NP) problem. We formally prove that NP solutions yield with two imperative guarantees: forward invariance within...
This paper discusses RAS-method, which predicts the direct consumption coefficient matrix in input-output model of uncertain economic system. We define grey and give a on
In this paper, based on the hardware physical characteristics of Internet Things(IoT) devices and its operating system, we designed a driver interface specification an example application terminal under realizes plug play, registration, acquisition release device. The Things (IoT) cloud platform is constructed to enable IoT access platform. Users, developers vendors can manage drivers platform, complete functions device addition, logical free networking flexible configuration user-oriented...