- Infrastructure Maintenance and Monitoring
- Optical measurement and interference techniques
- Non-Destructive Testing Techniques
- Network Security and Intrusion Detection
- Complex Network Analysis Techniques
- Structural Health Monitoring Techniques
- Advanced Vision and Imaging
- Anomaly Detection Techniques and Applications
- Evolutionary Game Theory and Cooperation
- Opinion Dynamics and Social Influence
- Microbial infections and disease research
- Advanced Malware Detection Techniques
- Industrial Vision Systems and Defect Detection
- Information and Cyber Security
- Genomics and Phylogenetic Studies
- Concrete Corrosion and Durability
- Mycobacterium research and diagnosis
- Advanced Measurement and Detection Methods
Shihezi University
2025
Tianjin University
2019-2021
Manual visual inspection is customarily used to identify and evaluate service status of bridges. However, current procedures followed by human inspectors demand long time access Also, highly relying on subjective or empirical knowledge may induce false evaluation. To overcome these challenges, a vision-based method presented for bridge defects detection using transfer learning convolutional neural networks (CNNs), which could automatically analyze large volume collected images. Firstly,...
Information on dynamic displacement is an effective indicator for structures condition evaluation and provides a quantised insight into the structural analysis. This paper proposes low-cost system based computer vision using smartphone to measure displacement, then identify properties of structures. Conventional sensors like linear variable differential transformers (LVDT), GPS, accelerometer in monitoring systems have limitations high price, inaccessibility, accuracy. However, some new...
Abstract A batch of sheep in a farm Xinjiang, China, died suddenly; bacterial strain was isolated from the abdominal fluid sick and dead sheep, identified as Rothia nasimurium by 16S sequencing, Y1 subjected to drug sensitivity test with Draft gene sequencing. The results revealed strain’s resistance 9 antibiotics, exhibited solely towards amikacin vancomycin. Phylogenetic tree analysis confirmed that it related E1706032 sp.SD9660Na . draft genome sequencing showed total length 2,387,685 bp,...
We consider cyber security as one of the most significant technical challenges in current times. One main tasks is to detect anomalous patterns network streams soon they appear. In order solve above problem, previous propositions use statistical or machine learning-based methods streams. However, these solutions incur low efficiency and precision due frequent recomputation results from scratch unreasonable assumptions. graph theory, dense subgraphs can be used model if we abstract a dynamic...
The advanced persistent threat (APT) is a stealthy cyber attack perpetrated by group that gains unauthorized access to computer network and remains undiscovered steal specific data resources. Fast detection defense of APT attacks are critical tasks in security. Previous works use simple feature extraction classification methods distinguish information flow from the normal one. However, latent, with very little mixed many flows. Moreover, can adjust their behavior according environment,...
Scale-free network, as a type of complex is prone to various target attacks. Some researches characterize the attack and defense problem network game problem, design optimal strategy from perspective achieving equilibrium. However, such in scale-free space very difficult solve because too large. An effective way achieve equilibrium train growing population player strategies use heuristic methods guide evolution. The deep reinforcement learning (DRL) has been used evolution due its strong...