- Wireless Communication Security Techniques
- Cooperative Communication and Network Coding
- Software Testing and Debugging Techniques
- Real-time simulation and control systems
- Advanced DC-DC Converters
- Welding Techniques and Residual Stresses
- Multilevel Inverters and Converters
- Full-Duplex Wireless Communications
- Engineering and Test Systems
- Microgrid Control and Optimization
- Cognitive Radio Networks and Spectrum Sensing
- Advanced Optical Sensing Technologies
- Hydrogen embrittlement and corrosion behaviors in metals
- Geotechnical Engineering and Analysis
- Wireless Networks and Protocols
- Optical Systems and Laser Technology
- Advanced Welding Techniques Analysis
- Embedded Systems and FPGA Design
- Earthquake and Tsunami Effects
- Security in Wireless Sensor Networks
- Drilling and Well Engineering
- HVDC Systems and Fault Protection
- Advanced Measurement and Detection Methods
- Civil and Geotechnical Engineering Research
- Radar Systems and Signal Processing
Taiyuan University of Technology
2016-2024
Beijing University of Technology
2023
Xi'an Jiaotong University
2012-2021
Capital Normal University
2021
Shanghai Institute of Microsystem and Information Technology
2016
Beijing Institute of Technology
2016
Beihang University
2009-2012
Security is an issue of paramount importance, yet it a significant challenge for wireless communications, which becomes more intricate when facing full duplex (FD) active eavesdropper capable performing eavesdropping and jamming simultaneously. In this paper, we investigate the physical layer security in presence FD eavesdropper, who launches attacks to further improve eavesdropping. The jamming, however, also results self-interference at itself. This problem formulated within hierarchical...
In cognitive Ad Hoc networks (CAHN), because the contentions and mutual interferences among secondary nodes are inevitable as well usually have limited power budget, spectrum efficiency energy critically important to CAHN, especially for medium access control (MAC) protocol design. Aiming at improving both efficiencies, we in this paper propose a diversity technology called Channel-Aggregation Diversity (CAD), through which each node can utilize multiple channels simultaneously efficiently...
Abstract The dynamic measurement of lidar products in complex and narrow scenes faces many challenges, such as limited space parameter calibration. Thus, this paper develops an omni-directional LiDAR automatic acquisition system for industrial environments. is first designed. calibration cost then reduced using the method real scene parameters, which allows to maintain error around 2.6 mm. Afterwards, SIFT feature description algorithm combined with enhanced SVDD process point cloud data,...
In this letter, we propose a power allocation scheme for statistical quality-of-service (QoS) provisioning in multi-relay decode-and-forward (DF) cognitive networks (CN). By considering the direct link between source and destination, CN first chooses transmission mode (direct or relay transmission) based on channel state information. Then, according to determined mode, efficient will be performed under given QoS requirement, average transmit interference constraints as well peak constraint....
This paper presents a numerical and infrared experimental study of thermal grain growth behavior during argon tungsten arc welding 443 stainless steel. A 3D finite element model was proposed to simulate the process. The simulations were carried out via Ansys Parametric Design Language (APDL) available in finite-element code, ANSYS. To validate simulation accuracy, series experiments using fully-automated process conducted. results analysis show that weld bead size experiment have good...
Secure the cooperative transmission is studied for an automatic repeat request (ARQ)-based wireless network against a jamming-aided eavesdropper. The eavesdropper utilizes jamming attack to assist its eavesdropping by forcing legitimate transmitter retransmit confidential messages under poor wiretap channel quality. Then, utilizing these retransmission opportunities, will eavesdrop message good To address threat from in ARQ-based network, we propose adaptive relaying and secure scheme...
With the FPGA widely applied in embedded system, more and quality problems related to began expose. The verification efficiency of software needs be improved urgently. This paper started with concept software, proposing two methods: testbench assertion analysis solve problem on basis comparing traditional software. It cited example a RISC (Reduced Instruction Set Computer) CPU, described implementation process methods from establishing simulation environment verifying CPU function reading...
A data-driven indirect approach for predicting the response of existing structures induced by excavation is hereby proposed based on making full use monitoring data during excavation, which can predict deformation history research object excavation. In this article, a machine-learning-based model framework implementing constructed and treatment key issues in design implementation method described detail including theoretical framework, mode method, dimensionality reduction parameters,...
Shaded areas reduce the quality of digital images, bring many difficulties to image interpretation, especially in high-resolution remote-sensed images. In order improve urban application capability, shadow correction should be performed. this article, a new methodology for was proposed applying Urban Solar Radiative Transfer (USRT)1 model, which scheme based on physical model. The sky view factor (SVF)2 selected as one quantify morphological and structural characteristics underlying surface,...
Build-in-test of software is designed in embedded system widely. This paper analyses the general architecture system, introduces three types BIT structure pattern, for each arithmetic design described details with real practice. presents a new s/w approach based on fault injection. Four important phrases: testing requirement analysis, injection, and result analysis are thoroughly this approach. The ending part summery paper.
This paper studies the secrecy outage probability of full-duplex (FD) relay networks in presence external eavesdropper and residual self-interference, where FD can forward message or transmit jamming signal. Different with existing researches which consider employs decode-and-forward (DF) protocol, we study situation that uses amplify-and-forward (AF) propose a destination aided scheme to further improve performance when transmits jamming. Furthermore, compare four different schemes (i.e.,...
In this paper Model-based Simulation Testing Framework (MSTF) will be introduced. The basic principles of the MSTF, associated technology and tools are then presented in detail include both strategy process defining test methods as well software architecture distributed simulation system (DSTS).
This paper introduce a control strategy based on liner active disturbance rejection to reduce the DC fluctuation in microgrid. A brief introduction of microgrid is presented, and advantage isolated storage port claimed. Later, this illuatrates small signal model dual bridge(DAB) port. The basic working principle LADRC analyzed, mathematical expression extended state observer(ESO) explained. Combining DAB, simulation Matlab/Simulink verifies proposed strategy.
Abstract High-precision coal seam model is the basis of intelligent mining. The longwall mining face floor model, which can provide data sources for correction dynamic difficult to measurement directly. To address this issue, paper proposes a high-precision surface reconstruction and method based on large number operating points. Firstly, coupling equipment obtained plane surface. Subsequently, points are corrected obtain Catmull–Clark subdivision then used subdivide formed by reconstructed...
Bike-sharing is an environmentally friendly shared mobility mode, but its self-loop phenomenon, where bikes are returned to the same station after several time usage, significantly impacts equity in accessing services. Therefore, this study conducts a multiscale analysis with spatial autoregressive model and double machine learning framework assess socioeconomic features geospatial location's impact on phenomenon at metro stations street scales. The results reveal that bike-sharing intensity...
In this paper, a novel ISOP (input series and output parallel) hybrid DC-DC converter is proposed for renewable energy grid, which consists of CLLLC resonant switched capacitor dual active bridge (SCDAB). This paper analyzes the power characteristics, steady-state operation average model converter. The parameter calculation method also presented. Moreover, adopts control scheme pulse frequency modulation single-phase-shift control. To verify effectiveness scheme, simulation prototype built...
With the rapid advancement of DC/DC power transmission technology, various topologies are proposed, efficiency in delivery and energy conversion should be promoted dramatically, for example, Dual-Active-Bridge(DAB) converter. Aiming at MVDC applications, this paper proposes a novel topology converter which is composed modular multilevel on primary side double full bridges secondary side. Based carrier phase-shift modulation, produces five-level waveform to reduce instant voltage impact...
Simulation test system is a real time system, in which data management mechanism the key point to assure correctness and transferring of data. This paper introduced architecture simulation first, then elaborates how build model accordance with feature It also presented two leveled storage strategy, together based on publisher-subscriber mode.
This paper characterizes the technical difficulties and challenges faced when testing complex avionics software. With this as background, a unique Simulation Testing Framework (STF) will be introduced. The basic principles of STF, associated technology tools are then presented in detail include both strategy process defining test methods well software architecture distributed simulation system (DSTS).