Fei Li

ORCID: 0000-0003-4923-8688
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Combustion Engine Technologies
  • Flame retardant materials and properties
  • Fire dynamics and safety research
  • Traffic Prediction and Management Techniques
  • Rocket and propulsion systems research
  • Software-Defined Networks and 5G
  • Combustion and Detonation Processes
  • Vehicular Ad Hoc Networks (VANETs)
  • Real-Time Systems Scheduling
  • Transportation Planning and Optimization
  • Radiation Effects in Electronics
  • Reliability and Maintenance Optimization
  • Petri Nets in System Modeling
  • Power Transformer Diagnostics and Insulation
  • Heat transfer and supercritical fluids
  • Petroleum Processing and Analysis
  • Polymer composites and self-healing
  • Advanced Authentication Protocols Security
  • Flow Measurement and Analysis
  • Parallel Computing and Optimization Techniques
  • Green IT and Sustainability
  • Titanium Alloys Microstructure and Properties
  • Analytical Chemistry and Sensors
  • Mobile Crowdsensing and Crowdsourcing
  • Fluid Dynamics and Heat Transfer

North University of China
2011-2024

Chengdu University of Information Technology
2021

People's Government of Shaanxi Province
2011-2013

TU Wien
2013

Columbia University
2008

University of California, Los Angeles
2003

In industrial production and scientific research, ultrasonic cavitation technology, with its outstanding physical chemical processing capabilities, has been widely applied in fields such as material surface modification, synthesis, biotechnology, becoming a focal point of research application. This article delves into the effects different frequencies on outcomes through combined use numerical simulation, fluorescence analysis, high-speed photography, specifically analyzing quantitative...

10.1016/j.ultsonch.2024.106957 article EN cc-by-nc Ultrasonics Sonochemistry 2024-06-15

In this paper, we present power models with clock and temperature scaling, develop the first of its type coupled thermal simulation temperature-dependent leakage model at micro-architecture level. We show that energy total can be different by up to 2.5X 2X for temperatures between 90°C 130°C, respectively. Given such big variations, no microarchitecture level is accurate without considering dependent models.

10.1145/871506.871560 article EN 2003-01-01

In this study, the tail-slapping behavior of an oblique water-entry projectile is investigated through high-speed photography technology. The experimental images and data are captured, extracted processed using a digital image processing method. repeatability verified. By examining formation, development collapse process projectile’s cavity, study investigates impact motion on cavity’s evolution. Furthermore, it examines distinctive characteristics both cavity original at varying initial...

10.3390/jmse11091664 article EN cc-by Journal of Marine Science and Engineering 2023-08-24

In this study, a novel high-reliability liquid leakage sensor with V-shaped defect coupling structure (VDCS) is proposed and experimentally demonstrated using polymer optical fibers (POFs) based on light-emitting diode (LED) side-coupled light source. Liquid detection achieved changes in the refractive index as medium transforms from air to liquid. The LED lamp both provides source assists positioning. efficiency of POF varies depth angle VDCS. Experimental results show that high when VDCS...

10.1109/jphot.2021.3109801 article EN cc-by IEEE photonics journal 2021-09-02

Cyclohexene is an important intermediate during the oxidation of cycloalkanes, which comprise a significant portion real fuels. Thus, experimental data sets and kinetic models cyclohexene play role in understanding combustion cycloalkanes In this work, modeling study high-temperature ignition performed. Ignition delay time (IDT) measurements are carried out high-pressure shock tube (HPST). The studied pressures 5, 10, 20 bar; equivalence ratios 0.5, 1.0, 2.0; temperatures range from 980 to...

10.1021/acsomega.2c02229 article EN cc-by-nc-nd ACS Omega 2022-08-05

The existing magnetic target localization methods are greatly affected by the geomagnetic field and exist approximation errors. In this paper, a two-point gradient tensor model is established using spatial relation between observation points derived from invariants. Based on model, equations relating to position vector of constructed. Solving equations, new method only no errors achieved. To accurately evaluate accuracy method, circular trajectory that varies in all three directions...

10.3390/rs14236088 article EN cc-by Remote Sensing 2022-11-30

Topology architecture has a decisive influence on network reliability. In this paper, we design novel redundancy topology and analyze the structural robustness, number of redundant paths between two terminal nodes, reliability proposed by using natural connectivity time-independent time-dependent pair reliability, k-terminal all-terminal comprehensively quantitatively, compare these measures with AFDX in three scenarios. The evaluations show that robustness analysis, when no nodes are...

10.3390/s22072582 article EN cc-by Sensors 2022-03-28

Selecting and designing the optimum ultrasonic probe is vital for measurements experiments. The amplitude of emitted wave excitation signal as well diameter natural frequency seriously affect validity results. In this paper, we analyze significance key parameters theoretically. Further, an external fixed-point liquid level monitoring system was assembled according to principle reflection transmission. On experimental platform, study that evaluation through a simulation experiment, select...

10.3390/s21041320 article EN cc-by Sensors 2021-02-12

A basic understanding of the high-temperature pyrolysis process jet fuels is not only valuable for development combustion kinetic models but also critical to design advanced aeroengines. The and utilization alternative are crucial importance in both military civil aviation. direct coal liquefaction (DCL) derived liquid fuel an important fuel, yet fundamental studies on this category lacking. In present work, a DCL-derived its blend with traditional RP-3 carried out by using single-pulse...

10.1021/acsomega.1c02530 article EN cc-by-nc-nd ACS Omega 2021-07-06

The performance of time-critical systems depends heavily on time synchronization accuracy. Therefore, it is crucial to have a method that can achieve high In this paper, we propose new underlying transmission architecture and messages. On the basis these, aiming at error problem slave clock, an enhanced based Furthermore, evaluate OMNeT++ simulator. addition, compare impact different crystal oscillator accuracies frequencies accuracy, respectively. Simulation results show offset most ±1...

10.3390/pr11051328 article EN Processes 2023-04-25

In recent years, green software research is gaining momentum because of the acute need for sustainable development. Most past has been focused on definitions, metrics and technical solutions software, but few addressed from business perspective. this paper, we present analysis three key elements Green Software Services (GSS)---stakeholders, their requirements, models. The stakeholders GSS are detailed with services each stakeholder can provide consume, thus clarifying interests to GSS. Based...

10.5555/2662693.2662695 article EN 2013-05-20

Aiming at the secure problem of which vehicle ECU’s firmware can be easily tampered with and in-vehicle communication isn’t encrypted, a key pre-distribution system is introduced to propose an ECU attestation in-Vehicle encryption mechanism. It adopts hash algorithm integrity. And it utilizes symmetry encrypt communication. The session keys are produced distributed by assure each unique. Simulation experimental results show this mechanism low cost has high calculating speed safety. solve...

10.12783/dtetr/ssme-ist2016/3987 article EN DEStech Transactions on Engineering and Technology Research 2016-11-30

When a large amount of data floods into the network, traditional routing algorithm Network-onChip will cause network congestion due to selection same path, which seriously affect transmission and realtime performance data. Based on that, this paper proposes an efficient adaptive avoid situation. In paper, binary tree topology was improved. Then uses OPNET simulation software model improved in three layers, performs experiments model. The evaluations show that results meet expectations, can...

10.1109/ichci51889.2020.00075 article EN 2020-12-01

This paper mainly introduces metal forming on extrusion simulations. Different process parameters of the simulation results are analyzed, such as ingots by billet pressure changes, change temperature, flow speed different process, and performance changes caused them discussed.

10.4028/www.scientific.net/amr.337.456 article EN Advanced materials research 2011-09-01

New York, London, Paris and Tokyo are world-class cities suffer from have traffic congestion. This paper points out the main reason for jams isincompatibility between transport planning development in accordance to physical distance of city. Proper Classifications borrowed metaphor Chinese classical culture "pie", "Gun Xiuqiu", "cutting sword "and" kite flying " four independent interconnected transportation programs. The connection basic theories is an integrated network a honeycomb-like...

10.1061/41177(415)85 article EN 2011-06-16

In the system that uses ultrasonic to measure liquid level, sound velocity of will be changed due difference in temperature, which affect reliability experimental results. This paper explores relationship between temperature and velocity, acoustic impedance. Based on that, effects signals are explored. And this fits evaluations compensation formula with ordinary least squares. Then builds a temperature-amplitude prediction model based BP neural network using received echo data. The show as...

10.1109/ichci51889.2020.00068 article EN 2020-12-01

The bus network is widely used in industrial automation and avionics systems due to its many advantages. Network reliability an important indicator of the design analysis. However, evaluation method not capable dealing with network. In this paper, we model without redundancy redundancy, propose algorithms calculate two-terminal k-terminal verify effectiveness three scenarios. experimental results show that when link reaches 0.9, six terminal nodes, eight ten nodes 40.95%, 52.17%, 61.26%...

10.1109/access.2022.3222824 article EN cc-by IEEE Access 2022-01-01

In the United States, Britain, France, Russia, China, and other countries, much of road-crossing traffic occurring has congestion problems. During a storm, earthquake, war, or special circumstances, some cross-sections are completely cut off cannot be recovered timely. order to avoid such situations, we need destroy old transportation scheme establish new ones. Redesign using "push stone" method cancel light, dismantle overpass, convert stereo for plane transportation, realize zero...

10.1061/9780784413036.018 article EN 2013-06-11

In view of the low efficiency current vehicle networking authentication key agreement scheme and frequent update public private keys vehicle, a based on certificateless cloud server is proposed. This realizes privacy protection anonymous by introducing dynamic identity mechanism. At same time, constructing temporary index database, trusted center can track suspicious vehicles after fact meet conditional anonymity requirements vehicles. addition, part in this solution will dynamically change...

10.1109/tocs53301.2021.9688580 article EN 2021 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS) 2021-12-10
Coming Soon ...