- Electric Vehicles and Infrastructure
- Viral Infections and Outbreaks Research
- Smart Grid Security and Resilience
- Smart Grid Energy Management
- Viral Infections and Vectors
- Blockchain Technology Applications and Security
- Energy Harvesting in Wireless Networks
- Respiratory viral infections research
- Influenza Virus Research Studies
- Microgrid Control and Optimization
- Privacy-Preserving Technologies in Data
- Disaster Response and Management
- Cryptography and Data Security
- Advanced MIMO Systems Optimization
- Advanced Battery Technologies Research
- Vaccine Coverage and Hesitancy
- Mosquito-borne diseases and control
- Animal Virus Infections Studies
- Energy Efficient Wireless Sensor Networks
- Vector-Borne Animal Diseases
- Robotic Path Planning Algorithms
- COVID-19 epidemiological studies
- Security in Wireless Sensor Networks
- Adaptive Control of Nonlinear Systems
- Animal Disease Management and Epidemiology
University of Utah
2020-2024
Nihon University
2023
Beihang University
2022
Jiangsu Provincial Center for Disease Control and Prevention
2016-2021
Harbin Institute of Technology
2017-2020
Center for Disease Control
2019
ITER China
2016
University of Illinois Chicago
2015
PLA 306 Hospital
2014
Centers for Disease Control and Prevention
2012
Background. Severe fever with thrombocytopenia syndrome (SFTS) is an emerging viral disease in China, caused by SFTS virus (SFTSV). patients can quickly proceed to multiorgan dysfunction and death; however, underlying pathogenic mechanisms remain unclear.
While we have a good understanding of how cyber crime is perpetrated and the profits attackers, harm experienced by humans less well understood, reducing this should be ultimate goal any security intervention. This paper presents strategy for quantifying caused typo squatting via novel technique intent inference. Intent inference allows us to define new metric users, develop methodology identifying domain names, quantify various perpetrators. We find that costs typical user 1.3 seconds per...
According to the robot’s dynamics, a high performance algorithm based on dynamic surface control is introduced track desired trajectory, and simulations are conducted selective compliance assembly robot arm-type manipulator verify algorithm. The traditional designed model, which requires exact model information. Due uncertainty complex environments, tracking of controller can be significantly decreased. Therefore, model-free fuzzy adaptive designed, by adopting system with Lyapunov...
The recent outbreak of the Ebola virus disease (EVD) in Sierra Leone has been characterized by World Health Organization as one most challenging EVD outbreaks to date. first confirmed case was a young woman who admitted government hospital Kenema following miscarriage on 24 May 2014. On 5 January 2015, intensified training for an response project initiated at medical university Jui. To understand knowledge, attitudes, practices, and perceived risk among public, especially after this...
Abstract Much less is known about the etiology of influenza‐like illness in China. A continuous surveillance 16 respiratory viruses was conducted from November 2010 to October 2011 outpatients with Nanjing, The two largest general hospitals and a provincial virus laboratory Nanjing participated this study. Throat swabs were collected during medical visits for tested using PCR. Three hundred seventeen detected samples 246 (50.6%) patients illness. found mostly commonly influenza, rhinovirus,...
The Ebola virus disease spread rapidly in West Africa 2014, leading to the loss of thousands lives. Community engagement was one key strategies interrupt transmission, and practical community level measures needed be explored field tailored specific context communities.First, community-level education on (EVD) prevention launched for community's social mobilizers six districts Sierra Leone beginning November 2014. Then, from January May 2015, three pilot communities, local trained members...
The flexible, efficient, and reliable operation of grid-interactive efficient buildings (GEBs) is increasingly impacted by the growing penetration distributed energy resources (DERs). Besides, optimization control DERs, buildings, distribution networks are further complicated their interconnections. In this letter, we exploit load-side flexibility clean to develop a novel two-level hybrid decentralized-centralized (HDC) algorithm DER-connected GEBs. proposed HDC 1) achieves scalability...
Large-scale multi-agent cooperative control problems have materially enjoyed the scalability, adaptivity, and flexibility of distributed optimization. However, due to mandatory iterative communications between agents system operator, architecture is vulnerable malicious attacks privacy breaches. Current research on preservation both operator in optimization with strongly coupled objective functions constraints still primitive. To fill gaps, this letter proposes a novel privacy-preserving...
Decentralized optimizations have been extensively applied in large-scale industrial cyber-physical systems to achieve control scalability. However, state-of-the-art methods heavily depend on explicit communications between participants, exposing the entire framework data confidentiality risks. To overcome this challenge, article, a privacy-preserving decentralized multi-agent cooperative optimization paradigm was developed via integrating cryptography into optimization. The proposed approach...
Cooperatively optimizing a vast number of agents over large-scale network faces unprecedented scalability challenges. The existing optimization algorithms is limited by either the agent population size or dimension. As radical improvement, this article, for first time, constructs two-facet scalable distributed framework. This novel framework distributes computing load among (scalability w.r.t. size) and enables each to only consider partial constraints in its primal variable updates...
Human infections with vaccinia virus (VACV), mostly from laboratory accidents or contact infected animals, have occurred since smallpox was eradicated in 1980. No recent cases been reported China. We report on an outbreak of VACV occupational exposure to rabbit skins inoculated VACV.
Background Severe fever with thrombocytopenia syndrome virus (SFTSV), an emerging human pathogen naturally transmitted by ticks, has spread widely since it was first detected in 2010. Although SFTSV-specific antibodies have been wild birds, these natural reservoir and amplifying hosts for the not well studied. Methodology/Principle findings Here we report experimental infection of spotted doves (Streptopelia chinensis) two strains SFTSV, JS2010-14, a Chinese lineage strain, JS2014-16,...
The charging processes of a large number electric vehicles (EVs) require coordination and control for the alleviation their impacts on distribution network provision various grid services. However, scalability existing EV paradigms are limited by either population size or dimension, largely impairing EVs' aggregate service capability applicability. To overcome barrier, this paper, motivated optimal scheduling problem valley-filling service, (1) proposes novel dimension reduction methodology...
Abstract The coronavirus disease 2019 (COVID-19) pandemic caused by severe acute respiratory syndrome 2 (SARS-CoV-2) continues to scale up around the world, costing health and economic losses. development of an effective COVID-19 vaccine is utmost importance. Most designs can be classified into three camps: protein based (inactivated vaccines, subunit, VLP T-cell vaccines), gene (DNA or RNA replicating non-replicating viral/bacterial vectored a combination both protein-based gene-based...
A sliding mode control method based on nonlinear disturbance observer and nominal model is proposed to track the trajectory of manipulator with uncertain interference. dynamic established, a law designed, stability system verified by Lyapunov theory. introduced improve performance system. The results show that reduces unmodelled errors influence external Furthermore, simulation Matlab prove compared traditional PD position method, has higher accuracy better robustness.
Currently, the image registration algorithm is mainly implemented on PC. In this paper, to realize a mobile terminal, customized system was designed and Raspberry Pi microcomputer board, in which Keren adopted achieve registration. Experimental results show that can reach sub-pixel level of with high efficiency, still has satisfactory accuracy even for general case noises are included all images. Besides, realizing function based terminal also makes more potential be used higher integration.
Abstract: We report a case of laboratory-confirmed Zika virus (ZIKV) infection imported into China from Ecuador. This is the first documented with ZIKV Jiangsu, and Ecuador nationwide. The patient developed fever, rash, conjunctivitis joint pain after returning. However, due to less specific clinical symptoms lack quick diagnostic methods in elementary healthcare facilities, this was not identified during her two medical consultations. RNA detected urine sample rather than serum case,...
Distributed and decentralized multi-agent optimization (DMAO) algorithms enable the control of large-scale grid-edge resources, such as electric vehicles (EVs), to provide power grid services. Despite its great scalability, DMAO is fundamentally prone cyber attacks it highly dependent on frequent peer-to-peer communications. Existing cyber-security research in this regard mainly focuses broad-spectrum aiming at jeopardizing entire system while losing possibility achieving specific attacking...
The electric vehicle (EV) industry is rapidly evolving owing to advancements in smart grid technologies and charging control strategies. While EVs are promising decarbonizing the transportation system providing services, their widespread adoption has led notable erratic load injections that can disrupt normal operation of power grid. Additionally, unprotected collection utilization personal information during EV process cause prevalent privacy issues. To address scalability data...
Reinforcement learning (RL)-based methods have achieved significant success in managing grid-interactive efficient buildings (GEBs). However, RL does not carry intrinsic guarantees of constraint satisfaction, which may lead to severe safety consequences. Besides, GEB control applications, most existing safe approaches rely only on the regularisation parameters neural networks or penalty rewards, often encounter challenges with parameter tuning and catastrophic violations. To provide enforced...