- Constraint Satisfaction and Optimization
- IoT and Edge/Fog Computing
- AI-based Problem Solving and Planning
- Software-Defined Networks and 5G
- Data Management and Algorithms
- Distributed and Parallel Computing Systems
- Network Security and Intrusion Detection
- Network Traffic and Congestion Control
- Cloud Computing and Resource Management
- Cooperative Communication and Network Coding
- Service-Oriented Architecture and Web Services
- Distributed Control Multi-Agent Systems
- Advanced Data Storage Technologies
- Mobile Agent-Based Network Management
- Peer-to-Peer Network Technologies
- Speech and Audio Processing
- Electric Power System Optimization
- Sparse and Compressive Sensing Techniques
- Hydraulic and Pneumatic Systems
- Neural Networks Stability and Synchronization
- Semantic Web and Ontologies
- Optimal Power Flow Distribution
- Context-Aware Activity Recognition Systems
- Wireless Networks and Protocols
- Distributed systems and fault tolerance
Wuhan University of Science and Technology
2019-2025
Chinese Institute for Brain Research
2024
Beijing Normal University
2023-2024
Wuhan Wudong Hospital
2024
Zhejiang Institute of Science and Technology Information
2024
United States Air Force Academy
2022
Air Force Communication NCO Academy
2022
Huawei Technologies (China)
2021
Changchun University
2021
Inner Mongolia University
2020
Choosing the appropriate antipsychotic drug (APD) treatment for patients with schizophrenia (SCZ) can be challenging, as response to APD is highly variable and difficult predict due lack of effective biomarkers. Previous studies have indicated association between genetic epigenetic factors, but no biomarkers been identified. Hence, further research imperative enhance precision medicine in SCZ treatment.Participants were recruited from two randomized trials. The discovery cohort was CAPOC...
With the rapid development of distributed energy resources, an increasing number residential and commercial users have been switched from pure electricity consumers to prosumers who can both consume produce energy. To properly manage these emerging prosumers, peer-to-peer (P2P) market has explored extensively studied. In this article, a scalable management mechanism is proposed for P2P market. First, multibilateral economic dispatch problem that maximizes social welfare formulated,...
Antipsychotic drug treatment for schizophrenia (SZ) can alter brain structure and function, but it is unclear if specific regional changes are associated with outcome. Therefore, we examined the effects of antipsychotic on grey matter (GM) density, white (WM) functional connectivity (FC) as well associations between efficacy. SZ patients (n = 163) health controls (HCs) 131) were by structural magnetic resonance imaging (sMRI) at baseline, a subset 77) re-examined after 8 weeks...
Multi-access Edge Computing (MEC) is a promising business paradigm in the 5G network. The principle "the nearest best" may not apply some cases. How to break boundaries among individual MEC sites and leverage computing resources as an integrity, key improve user experience usage efficiency of network resources. This paper proposes CFN-dyncast, distributed technique that dispatches clients' demands optimal site according load each status. also introduces related design considerations,...
The rapid and widespread adoption of Internet Thing-related services drives the advancement Fog Computing, which is proposed to extend Cloud Computing paradigm run geo-distributed applications throughout network. could be provisioned tenants by applying container-based virtualization or system technology. Within a container/VM (virtual machine), an application can configured run. This paper aims evaluate performance under different physical resource types, such as core memory. For each type...
Internet of Things (IoT) is vulnerable to data-tampering (DT) attacks.Due resource limitations, many anomaly detection systems (ADSs) for IoT have high false positive rates when detecting DT attacks.This leads the misreporting normal data, which will impact operation IoT.To mitigate caused by rate ADS, this paper proposes an ADS management scheme clustered IoT.First, we model data transmission and in IoT.Then, strategy formulated as running probabilities all ADSs deployed on every device.In...
ASP(alkali surfactant polymer) flood was initiated on March 15, 1997 in N-1DX block Daqing oilfield; its main slug completed June 12, 1999. By September 23, 1998 pump malfunction occurred with a scale thickness of 1cm over well bore. the end 1999, serious found surface gathering and delivery system, 0.3cm single pipes, pipes as heating furnace, this unfavorably affected current production.In terms problem, we performed study removal inhibition. Analytical content, forming mechanism...
The Naïve Bayesian classifier has been suggested as an effective method to construct anti-spam filters for its strong categorization and high precision. Artificial immune system become a new embranchment in computing intelligence good self-learning, self-adaptability robustness. This paper proposes spam filtering means based on Bayes AIS, analyses the key problems of algorithm. accuracy rate is compared with naïve classifier-Bogofilter it shown that proposed algorithm performs well great...
In this paper, the homotopy analysis method (HAM) is extended to deal with nonlinear aeroelastic problem of a two degree-of-freedom (DOF) airfoil. To avoid determination parameter for complicated high-order minimization problem, new modified HAM proposed based on idea minimizing squared residual. Using method, convergence-control determined by low order residual governing equations, and then solved in way similar basic HAM. The used solve behavior supersonic airfoil, unsteady aerodynamic...
A new low-complexity symbol-flipping algorithm based on majority decision to decode nonbinary low-density parity-check (LDPC) codes is proposed. The decoding procedure updates iteratively the hard-decision received symbol vector in search of a valid codeword space. Only one changed each iteration, and flipping function combines number failed checks reliability bits calculated symbols. Flipped position determined by flipped value channel output. And an optional mechanism avoid infinite loops...
ConstraintLisp is an object-oriented constraint programming language. It based on the satisfaction problem (CSP) model in Artificial Intelligence and technology. This integration provides both declarative representation efficiency of solving programming, powerful modelling capability, maintainability, reusability extensibility aimed at providing practical solutions to real life constrained search problems such as scheduling, resource allocation, etc. also designed implemented approach.
This paper is concerned with the finite-time stochastic synchronization of a chaotic system without linear term and its application in secure communication based on synchrosqueezed wavelet transform (SWT). In order to improve anti-jamming ability systems forecast time, proper controllers are designed achieve for random perturbation. Based proposed systems, we present scheme about secondary encryption enhance level security. Moreover, novel SWT algorithm introduced correctly recover...
For the centralized optimization, it is well known that adding one momentum term (also called heavy-ball method) can obtain a faster convergence rate than gradient method. However, for distributed counterpart, there quite few results about effect of added terms on rate. This article aimed at studying issue in setup, where <inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> <tex-math notation="LaTeX">$N$ </tex-math></inline-formula>...
Aiming at the problem of two-dimensional direction arrival (2D-DOA) estimation frequency hopping (FH) signals, this paper proposes a 2D-DOA algorithm for FH signals based on improved reduced dimension MUSIC (IRD-MUSIC). Firstly, receiving model uniform array antenna is established, and snapshot data signal established. Secondly, effective hop extracted from time domain spatial-time-frequency distribution matrix Finally, transforming DOA into two stage one dimensional problems by using...
Mobile edge computing has been recently considered as a promising paradigm to satisfy the ever-increasing computation requirements from mobile applications. Although may provide users with high-quality services by executing tasks at network edge, due complexity of service requests and limited resources servers, it is still major challenge for how select appropriate so minimize interaction delay energy consumption devices. The selection problem classic NP-hard problem. In this paper, we...