- Network Traffic and Congestion Control
- Advanced Algorithms and Applications
- Industrial Technology and Control Systems
- Network Security and Intrusion Detection
- Advanced Sensor and Control Systems
- Software Reliability and Analysis Research
- Network Time Synchronization Technologies
- Information and Cyber Security
- Simulation and Modeling Applications
- Face recognition and analysis
- Opportunistic and Delay-Tolerant Networks
- Mobile Ad Hoc Networks
- Sensorless Control of Electric Motors
- Complex Network Analysis Techniques
- Interconnection Networks and Systems
- Biometric Identification and Security
- Smart Grid Security and Resilience
- Image and Video Stabilization
- Advanced Computational Techniques and Applications
- Fuzzy Logic and Control Systems
- Risk and Safety Analysis
- Iterative Learning Control Systems
- Spectroscopy Techniques in Biomedical and Chemical Research
- Control Systems in Engineering
- Safety Systems Engineering in Autonomy
Shaoxing University
2025
University of Science and Technology Liaoning
2014-2024
CHN Energy (China)
2024
Shanghai Institute of Materia Medica
2024
China Electronic Product Reliability and Environmental Test Institute
2016-2024
Nanjing University of Chinese Medicine
2024
Chinese Academy of Sciences
2024
Second Hospital of Nanchang
2024
Ministry of Industry and Information Technology
2016-2023
Shenzhen Polytechnic
2022
The optimal power flow (OPF) is an important tool for the secure and economic operation of system. It attracts many researchers to pay close attention. Many algorithms are used solve OPF problem. decomposition-based multi-objective algorithm (MOEA/D) one them. However, effectiveness decreases as size system increases. Therefore, improved MOEA/D (IMOEA/D) proposed in this paper main goal IMOEA/D speed up convergence increase species diversity. To achieve goal, three improvement strategies...
Negative information selection is an approach to protect the privacy by using negative replace original information. In this paper, we prove some bounds for selection. Those reveal protection strength of quantitative probability analysis. We also analyzed reconstruction from available The formal analysis can specify bound on security and utility Besides, simulate brute force attacks under different data leakage ratios. Specifically, calculate attacker’s guess times before after leakage....
Avionics systems play a significant role in civil aircraft, and its reliability is directly related to the flight safe. In this paper, integrated modular avionics (IMA), as most advanced systems, analyzed. Via exploration of interaction mechanism IMA real physical system, property cyber-physical (CPS) determined. Hence, according different functional modules, model established for IMA, meanwhile task-oriented state spaces sub-units CPS architecture are assigned construct hierarchical IMA. A...
The human finger is the essential carrier of biometric features. itself contains multi-modal traits, including fingerprint and finger-vein, which provides convenience practicality for bi-modal fusion recognition. scale inconsistency feature space mismatch images are important reasons effect. extraction method based on graph structure can well solve problem bi-modalities, end-to-end recognition be realised convolutional neural networks (GCNs). However, this strategy GCNs still has two urgent...
AFDX (Avionics Full Duplex Switched Ethernet) developed for the Airbus A380 represents a major upgrade in both bandwidth and capability, but guaranteed kinds of service presents challenges to system designers. Scheduling new classes traffics with different priorities on same network is urgently resolve. However, there's no consideration how buffer size influence traffic performance priorities, since inappropriate capacity will lead frame missing or cannot satisfy requirement real-time. Using...
With the development and popularization of autonomous driving technology, its safety issues have attracted more attention from public. The performance limitations insufficient functions perception system execution driving, algorithm defects algorithms, decision-making control special weather traffic, risks caused by reasonably foreseeable misuse personnel, are biggest challenges in industrialization vehicles. Aiming at solving these challenges, concept Safety Intended Functionality (SOTIF)...
Self-constructing feedback fuzzy neural network controller (SCFFNNC) is designed to aim at the parameter uncertainties for permanent magnet linear synchronous motor (PMLSM) since they cause negative influence dynamic performance of PMLSM servo system. The thought about self-constructing, in which number neurons whole structure can be able increase on line according variety error, introduced based combining non-linear identification control with self-learning network. It reserve abilities,...
In this paper, the principle, structure of Active Power Filter (APF) system and PWM control are all discussed, based on improved instantaneous reactive power theory, a kind fast feasible algorithm for distortion currents detection, harmonic current suppression compensation in shunt active filter is put forward, meanwhile, considering problem devices loss main circuit, compensating feedback DC bus link voltage added, finally, typical source with thyristor rectifier load simulated...
In this paper, a fault propagation model (FPM) of mobile ad hoc network (MANET) is proposed based on random walk model. We adopt the to describe movement behavior nodes in MANET. Based model, influence average transmission range, node's number and size simulation areas MANET's connectivity studied. And comparison different causes message loss conditions given. Finally, according state paths, position distribution congestion paths presented. Using can distinctly whole network, data could be...
AFDX (Avionics Full Duplex Switched Ethernet) is a new kind of real-time Ethernet, which the end-to-end transmission delay has been major concern. In this paper, configuration decomposition method based on proposed in three steps. Firstly, Virtual Links (VLs) are divided into direct influence set, indirect set and no set. Secondly, whole module module. Finally, network calculus theory adopted to get upper bound. This method, considers fully mutual among VLs, can provide guidance optimization...
Network traffic is an important and direct acting factor of network reliability performance. To understand the behaviors traffic, chaotic dynamics models were proposed helped to analyze nondeterministic a lot. The previous research thought that behavior was caused by random factors, deterministic networks would not exhibit because lacking factors. In this paper, we first adopted chaos theory data collected from typical testbed — avionics full duplex switched Ethernet (AFDX, network) testbed,...
The innovation to obtain the transfer function of electric actuator is introduced.By this innovation, analyzing each part actuator, open-loop obtained with voltage power supply as input and feedback output.With solution differential equation, a simple, fast method for obtaining parameters proposed get these parameters.The very quick, simple it proved by experiment.
Power line over-current relay protection is an important part of power system, it technical measure to assure the safety and reliable operation electric system line.In this paper, on basis features in line, thorough research analysis both at home abroad, with aid MATLAB/Simulink build simulation model, Using PSB module construct a three-stage protection's model through theory, set up full-wave Fourier algorithm, make experiment action.The results show that can achieve better under different...
Cell therapy using proliferating human hepatocytes (ProliHHs) is an effective treatment approach for advanced liver diseases. However, rapid and accurate identification of high-quality ProliHHs from different donors challenging due to individual heterogeneity. Here, we developed a machine learning framework integrate single-cell Raman spectroscopy multiple identify stages ProliHHs. A repository more than 14,000 spectra, consisting primary (PHHs) passages six donors, was generated. Using...
Purpose Step length is a key factor for pedestrian dead reckoning (PDR), which affects positioning accuracy and reliability. Traditional methods are difficult to handle step estimation of dynamic gait, have larger error not adapted real walking. This paper aims propose method based on frequency domain feature analysis gait recognition PDR, considers the effects real-time gait. Design/methodology/approach The new transformed acceleration pedestrians from time domain, characteristics were...
Software systems intensively interact with other software and hardware systems, the potential hazards caused by interaction inadequate consideration becomes uncertain, especially wide application of machine learning technology. Once functions cannot meet requirements interactions among entities, safety problems non-software system failures as Safety intended functionality (SOTIF) arrise. The uncertainties interation bring great challenges to SOTIF. In this paper, a multi-scale network model...
For nonlinear mathematical model of interior permanent magnet Synchronous motor(IPMSM), a speed control system based on the port-controlled Hamiltonian(PCH) is proposed. The controller designed by orthogonal decomposition and method interconnection damping assignment Passivity Based Control(IDA-PBC). It confirmed that stable. A to obtain coefficient given with turn problems into solving it for first order differential equations coefficient. Then an optimization presented at same time...