- Advanced Optical Sensing Technologies
- Ocular and Laser Science Research
- Optical Systems and Laser Technology
- Advanced Measurement and Detection Methods
- Distributed Sensor Networks and Detection Algorithms
- Target Tracking and Data Fusion in Sensor Networks
- Infrared Target Detection Methodologies
- Mobile Ad Hoc Networks
- Energy Efficient Wireless Sensor Networks
- Fault Detection and Control Systems
- Video Surveillance and Tracking Methods
- Advanced Topics in Algebra
- Cooperative Communication and Network Coding
- Mobile Agent-Based Network Management
- Advanced Image Fusion Techniques
- Robotics and Sensor-Based Localization
- Atmospheric aerosols and clouds
- Security in Wireless Sensor Networks
- Advanced Algorithms and Applications
- Laser Design and Applications
- Network Traffic and Congestion Control
- Advanced Decision-Making Techniques
- Anomaly Detection Techniques and Applications
- Holomorphic and Operator Theory
- Advanced Wireless Network Optimization
Donghua University
2024-2025
Beijing Institute of Technology
2012-2024
Shanxi University
2020-2024
Jiangxi University of Science and Technology
2024
Jiangsu University of Science and Technology
2022
Nanjing Institute of Geography and Limnology
2022
Chinese Academy of Sciences
2022
National University of Defense Technology
2017-2018
University of New Orleans
2004-2016
Guangzhou Vocational College of Science and Technology
2015
Remaining useful life (RUL) Prediction is crucial for the predictive maintenance of industrial manufacturing systems. The challenges encountered in prediction RUL include identifying a pertinent health indicator (HI), effectively modeling t he degradation pattern across diverse features, and selecting optimal methodologies to enhance accuracy. This paper establishes construction HI using PCA, utilizing data from aircraft engines. Bi-LSTM with optimization algorithm investigated evaluation...
ABSTRACT Predicting the remaining useful life (RUL) of mechanical equipment is one key tasks prognostics and health management (PHM). Modern often operates under complex operating conditions failure modes, making it difficult to extract features, construct indicators, predict life. This paper presents a novel method for RUL prediction. The proposed extracts vibration signal data from employs ensemble empirical mode decomposition (EEMD) reconstruction denoise signals. Sequential Forward...
Predicting the end-to-end packet delay and understanding Internet dynamics are of great importance for many realtime non-realtime applications, especially provisioning quality service (QoS) various sources. In this paper methods modeling predicting delays surveyed with emphasis on approaches using system identification time series analysis. The survey focuses a control engineer's viewpoint rather than that statistician. Furthermore, it intends to provide connection between works in both areas.
In the modern networked battlefield, network centric warfare (NCW) scenarios need to interoperate between shared resources and data assets such as sensors, UAVs, satellites, ground vehicles, command control (C2/C4I) systems. By linking fusing platform routing information, sensor exploitation results, databases (e.g. Geospatial Information Systems [GIS]), situation awareness mission effectiveness will be improved. Within information fusion community, various research efforts are looking at...
Since dust particles in the air scatter and absorb light, images captured sand-dust weather mostly show low contrast, color deviation blurriness, seriously affecting reliability of visual tasks. Currently, pixel-level enhancement prior-based methods are used to restore images.However, these cannot accurately extract semantic information from due loss complexity scene depth, which may lead distortion blurred textures restored image.We thus presents a two-stage restoration method based on...
Distributed Kalman filters are often used in multisensor target tracking where the fusion center receives local estimates and fuses them to obtain global state estimate. With such a architecture, each tracker can communicate less frequently with than filter update rate. The estimate via track is usually accurate that of centralized estimator when estimation errors correlated trackers bandwidth constraints lower measurement This paper focuses on tradeoff between accuracy for communication...
This paper outlines a strategy for tracking evasive objects in discrete space using game theory to allocate sensor resources. One or more searchers have the effort among cells maximize object detection probability within finite time horizon minimize expected search achieve desired under false alarm constraint. We review standard formulations sequential decision setting finding stationary objects. Then we consider both robust and optimal strategies extend problem two-person zero-sum...
The problem of track-to-track association and track fusion has been considered in the literature where center access to multiple estimates associated estimation error covariances from local sensors, as well their cross covariances. Due primarily communication constraints real systems, some legacy trackers may only provide without any covariance information. In cases, (sensor-level) operate with fixed filter gain do not have self assessment errors. other network conveys a coarsely quantized...
Clustering algorithms are frequently used for wireless sensor networks with the increasing network capacity now. In this paper, we proposed an energy efficient strong head clustering algorithm (EESH) to improve performance prolonging lifetime. algorithm, cluster election depends on nodes not only more energy, but also large costs determined by neighbors. Nodes amounts of nearby, weaker and shorter distance neighbors may get opportunities become heads. By means election, can contribute as...
To compare the detection performance of near-, mid-, and far-infrared laser fuzes in clouds, we built a fuze model cloud environment based on Monte Carlo method, simulated echoes near- (0.86 μm), mid- (4.6 (10 μm) pulsed clouds under two scenarios: backscattering echo absence target presence clouds. The at different wave bands scenarios were compared, results show that have comparable while presenting respective advantages disadvantages compared to near-infrared band. With presentation...
For a pulsed laser transmitted in the raised dust from battlefield vehicle movement, premise of obtaining its transmission properties and anti-jamming method is to acquire spatial distribution rules mass concentration. In this study, emission mechanism for vehicle-raised environment analyzed, as well various influencing factors velocity. A finite volume (FVM)-based model simulating dispersion by certain moving tank built, effects flow rate, traveling speed, wind speed direction on...
In land battlefield environments, aerosol particles can cause laser beams to undergo attenuation, thus deteriorating the operational performance of military devices. The particle size distribution (PSD) and extinction coefficient are key optical properties for assessing attenuation characteristics caused by particles. this study, we employed diffraction method measure PSDs graphite smoke screen, copper powder iron ground dust, soil explosion dust. We evaluated goodness fit six common...
The emerging paradigm of distributed Web services has promised seamless business integration across the Internet that shares not only computing power but also applications. One major challenge is resource allocation to each end user in an economically efficient and low latency manner. A common solution proportional sharing where gets his proportion predetermined weight. However, this does allow users differentiate value their dynamically adjust weights. reservation mechanism may improve...
In a peer-to-peer file distribution network, large is split into blocks residing in multiple storage locations. A peer node tries to retrieve the original by downloading from randomly chosen peers. We compare performance of four strategies: uncoded, erasure coding, random linear and coding over coded blocks. show that, principle, makes better tradeoff between requirement decoding complexity. However, sparsity not fully exploited combinations all Motivated recent results compressed sensing,...
The problem of track-to-track association - a prerequisite for fusion tracks has been considered in the literature only described by kinematic states. from common target can also be solved using additional feature or attribute variables which are associated with those tracks. We extend existing results to situation where track is done variables, continuous valued, as well classification information attributes, discrete valued. sufficient statistic optimal test (in Neyman-Pearson sense) based...
This paper presents a novel approach to predict the Internet end-to-end delay using multiple-model (MM) methods. The basic idea of MM method is assume system dynamics can be described by set models rather than single one; running bank filters (each corresponds certain model in set) parallel at same time, output given combination estimates from these filters. Based on collected data and preliminary analysis, we propose an off-line design procedure vector quantization (VQ) short-term time...
The monitoring application of wireless sensor network in road traffic is becoming wider. traditional way always places the nodes randomly on roads to form topology. By doing so, energy wasted and throughput decreased. This paper proposes a new topology for traffic. uses data frame format linear placement strategy decrease load transmission redundant information. Simulation results show that proposed can save node energy, extend lifetime, increase enhance sink node's processing ability effectively.
Network traffic demands grow explosively from multimedia, point-to-point, and E-Science applications. In order to meet such tremendous growth, optical networks has been introduced for exploring higher bandwidth better QoS guarantee. Problems arise when integrating the whole new infrastructure with current IP backbone, including controlling data path network management. this paper, we discuss design issues of alarm management in hybrid containing DWDM, SDH technologies. For instance, there is...
Let T be a triangular n-matrix ring (n≥ 2). It is shown that, under some mild assumptions, map δ:T→T multiplicative Lie derivation if and only δ(X)=d(X)+γ(X) holds for all X∈T, where d:T→T an additive γ:T→Z(T) central-valued vanishing on commutators.