- Network Security and Intrusion Detection
- Smart Grid Security and Resilience
- Adaptive Control of Nonlinear Systems
- Technology and Security Systems
- Distributed and Parallel Computing Systems
- Chaos-based Image/Signal Encryption
- Nonlinear Dynamics and Pattern Formation
- Robotic Path Planning Algorithms
- Neural Networks Stability and Synchronization
- Distributed Control Multi-Agent Systems
- Robotics and Sensor-Based Localization
- Iterative Learning Control Systems
- Advanced Steganography and Watermarking Techniques
- Cryptographic Implementations and Security
- IoT and Edge/Fog Computing
- AI-based Problem Solving and Planning
- Industrial Technology and Control Systems
- Vehicle Routing Optimization Methods
- Advanced Multi-Objective Optimization Algorithms
- Nitric Oxide and Endothelin Effects
- Interactive and Immersive Displays
- Nonlinear Partial Differential Equations
- Evaluation and Optimization Models
- Control and Stability of Dynamical Systems
- Library Science and Information
South China Normal University
2025
University of South China
2022-2024
Dalian Maritime University
2023
State Grid Corporation of China (China)
2020-2023
Liaocheng University
2022
Henan University of Technology
2021
Inner Mongolia Electric Power (China)
2020
National Institute of Metrology
2019
Nanjing University of Aeronautics and Astronautics
2018
Southeast University
2017
Abstract The Electrowetting Display (EWD) has numerous advantages making it a potential candidate for flexible displays. However, there been limited research on the bending performance of Flexible Displays (FLEWD) and their feasibility in terms flexibility not confirmed. To investigate impact stability performance, FLEWD using active‐matrix substrate PEN conductive substrates were fabricated. A systematic evaluation system devices is established. results showed that can display videos...
Abstract Aiming at the problem that medical image information is easy to be stolen, tampered and maliciously destroyed in transmission process, a selective region encryption algorithm based on cascade chaos proposed. The consists of two stages: interest (ROI) full encryption. First, Cubic map cascaded with an improved Cosine map. Through analysis dynamic characteristics, has better chaotic performance than traditional systems. key sequence generated by image. Then edge detection performed...
A terminal sliding mode (TSM) control with self-tuning gain algorithm is proposed for the synchronization of coronary artery system under existence unmodeled dynamics and external disturbance. Considering system, a criterion selecting parameters derived to reach point equilibrium in finite time. The theoretic analysis based on Lyapunov theory proved that systems TSM scheme could be stabilized method shows drive response are synchronized states track This information about bound disturbance...
With the continuous development of power grids, scale supercomputing clusters has also gradually increased to carry a large number system simulation calculations, and problem high energy consumption appeared. To solve this problem, we propose container virtualization-based cluster for system. We analyze impact containers on calculations compare effects various scheduling migration algorithms clusters. Experiments show that compared virtual machines with hypervisor, which consumes massive...
Blind source separation (BSS) is an active research topic in the fields of biomedical signal processing and brain–computer interface. As a representative technique, maximum fraction analysis (MSFA) has been recently developed for problem BSS. However, MSFA formulated based on L2-norm, thus prone to be negatively affected by outliers. In this study, authors propose robust alternative L1-norm, termed as MSFA-L1. Specifically, they re-define objective function MSFA, which energy quantities both...
Abstract The Energy Internet is a leading development direction for the modernized and intelligent transformation of power grid, new type infrastructure that supports high-quality economy society. With access variety mobile terminals, security one most important challenges faced in construction Internet. Research on reliable networking data forwarding strategies edge great significance to its development. On basis analyzing requirements typical application scenarios, we introduce this paper...
Based on the principles and development status of current cyber security protection for electric power dispatching control system, aiming at problems defects exposed in actual work, closely combining monitoring requirements network operation, by optimizing alarm information, comprehensive data analysis, event reasoning emergency disposal, this article conduct research intelligent analysis management put forward reasonable strategy proposal that can improve overall level security.
The existing power system cyber security protection lacks pertinence for new services and has a low degree of automation. It is urgent to propose framework the characteristics generation business, especially improve attack prevention capability distributed sources, flexible adjustable loads, etc., ensuring stable operation grid. Aiming at lack efficient linkage coordination devices in systems, this paper proposes an interacted response technology based on intelligent learning. Our scheme...
The era of big data is accompanied by scientific and technological progress social development.Its emergence also brings great convenience to people's life production.However, there are many privacy security issues based on it.Privacy leakage will lead all kinds inconvenience in life, such as telephone or Internet harassment, more serious the loss property.This paper focuses data, how people be affected they should protect their face constantly emerging problems, gives suggestions comparing...
This paper proposes a robust adaptive output feedback control strategy which can automatically regulate gain for chaos synchronization. Chaotic systems with input nonlinearities, delayed nonlinear coupling, and external disturbance achieve synchronization by applying this strategy. Utilizing Lyapunov method LMI technique, the conditions ensuring are obtained. Finally, simulations given to show effectiveness of our
Abstract Benefiting from the vision of Security Operation Center (SOC), this paper proposes a construction plan for cyber security operation center electric power dispatching and control system. This solution integrates analyzes various data such as ledger database, knowledge historical alarm database in system, realizes functions handling, risk assessment, emergency response existing management platform. Through evaluation experiment, it is verified that our scheme has function overall...
The existing sensor network trust evaluation model cannot be directly applied to the new power system distributed home photovoltaic collection scenario, which is difficult meet requirements of strong computing and high defense system. Therefore, a dynamic based on multi-index detection proposed. Firstly, communication Bayes carried out according historical interaction terminal acquisition nodes. Then, current collected data evaluated by perceptual its support degree regional probability...
A comprehensive overview of today's cyber-attacks and defenses technology.This paper introduces the application social engineering in network attack principle intrusion method man -in -the -middle attack.In rapid development attacks, at same time, defense technology is also constantly evolving, on daily use firewall encryption to elaborate.We'll discuss overall.
During the closed formation control of multiple unmanned aerial vehicle UAV's strategy, flight direction will be disturbed, which is difficult to predict accurately, due wind disturbance, atmospheric pressure and aerodynamic force produced by UAV's. In this research, decentralized heading controllers proposed for correction angle based on consensus theory. Collisions may occur in course correction, convergence system calculated eigenvalue. The robustness controller simulated different...
Let $\Omega\subset \mathbb{R}^4$ be a smooth bounded domain, $W_0^{2,2}(\Omega)$ the usual Sobolev space. For any positive integer $\ell$, $\lambda_{\ell}(\Omega)$ is $\ell$-th eigenvalue of bi-Laplacian operator. Define $E_{\ell}=E_{\lambda_1(\Omega)}\oplus E_{\lambda_2(\Omega)}\oplus\cdots\oplus E_{\lambda_{\ell}(\Omega)}$, where $E_{\lambda_i(\Omega)}$ eigenfunction space associated with $\lambda_i(\Omega)$. $E^{\bot}_{\ell}$ denotes orthogonal complement $E_\ell$ in $W_0^{2,2}(\Omega)$....