Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Risk Analysis of Deepwater Managed Pressure Drilling Based on Improved Borda Sequence Value Method

    Deepwater pressure-controlled drilling accidents are frequent, but their causes are not well summarized. Traditional risk matrix analysis methods often result in the formation of risk “knots” due to imprecise ...

    Meipeng Ren, Yingming He, **angqian Yang in Proceedings of the International Field Exp… (2024)

  2. No Access

    Chapter and Conference Paper

    Study on Throttling Characteristics of Hydraulic Cylinder Throttle Valve and Control Strategies for MPD

    The surface choke manifold is the core part of the Managed Pressure Drilling system, on which the adjustment of the throttle valve components is very important for exquisite control of the pressure in the well...

    Hao Shen, Hao Li, Baojiang Sun, Xuerui Wang in Proceedings of The Fourth International Te… (2022)

  3. No Access

    Chapter and Conference Paper

    Data-Request-Packet Broadcasting Approach for Mobile Opportunistic Networks with Unreliable Links

    With the wide application of mobile smart devices carried by humans, content dissemination by using Device-to-Device wireless communication technologies in Mobile Opportunistic Networks (MONs) attracts numerou...

    Lichen Zhang, **aochun Zhang, Sui Yu in Advanced Multimedia and Ubiquitous Enginee… (2020)

  4. No Access

    Chapter and Conference Paper

    Personalized Recommendation Based on Tag Semantics in the Heterogeneous Information Network

    Heterogeneous information network (HIN) is widely used in recommendation system because of its superiority in complex information modeling. However, the existing HIN-based methods ignore two issues. First, low...

    Bin Yan, Lichen Zhang, Longjiang Guo, Meirei Ren, Ana Wang in Wireless Sensor Networks (2019)

  5. No Access

    Chapter and Conference Paper

    A Task Assignment Approach with Maximizing User Type Diversity in Mobile Crowdsensing

    Mobile crowdsensing (MCS) employs numerous mobile users to perform sensing tasks, in which task assignment is a challenging issue. Existing researches on task assignment mainly consider spatial-temporal divers...

    Ana Wang, Lichen Zhang, Longjiang Guo in Combinatorial Optimization and Applications (2019)

  6. No Access

    Chapter and Conference Paper

    A Novel Virtual Traffic Light Algorithm Based on V2V for Single Intersection in Vehicular Networks

    For the vehicle passing priority, the existing virtual traffic light algorithm only considered the factor of the arrival time, a group of vehicles won’t transfer the wayleave until they all pass completely. Th...

    Longjiang Guo, De Wang, Peng Li in Combinatorial Optimization and Applications (2019)

  7. No Access

    Chapter and Conference Paper

    Multi-objective Ant Colony Optimization Algorithm Based on Load Balance

    Virtual machine (VM) placement is a process of map** VMs to physical machines. The optimal placement is important for improving power efficiency and resource utilization in a cloud computing environment. In ...

    Liwen Zhu, Ruichun Tang, Ye Tao, Meiling Ren, Lulu Xue in Cloud Computing and Security (2016)

  8. No Access

    Chapter and Conference Paper

    Rogue Access Point Detection in Vehicular Environments

    The threat of rogue access points (APs) has attracted significant attentions from both industrial and academic researchers. This paper considers a category of rogue APs that are set up in moving vehicles to lu...

    Hao Qu, Longjiang Guo, Wei** Zhang in Wireless Algorithms, Systems, and Applicat… (2015)

  9. Chapter and Conference Paper

    Object Contour Extraction Based on Merging Photometric Information with Graph Cuts

    Graph cuts algorithm is one of high effective optimal methods in image segmentations. To improve the effect of segmentation caused by uneven illumination, a contour extraction method which merges photometric i...

    Rongguo Zhang, Meimei Ren, **g Hu, **aojun Liu, Kun Liu in Image and Graphics (2015)

  10. No Access

    Chapter and Conference Paper

    Implementing the Matrix Inversion by Gauss-Jordan Method with CUDA

    Solving the matrix inversion is an open problem which is often related to scientific computation. Moreover, matrix inverse also has wide applications in social networks. Individuals in social networks are desc...

    Ning Tian, Longjiang Guo, Meirui Ren in Wireless Algorithms, Systems, and Applicat… (2014)

  11. No Access

    Chapter and Conference Paper

    GPU Acceleration of Finding Maximum Eigenvalue of Positive Matrices

    Matrix eigenvalue theory has become an important analysis tool in scientific computing. Sometimes, people do not need to find all eigenvalues but only the maximum eigenvalue. Existing algorithms of finding the...

    Ning Tian, Longjiang Guo, Chunyu Ai in Algorithms and Architectures for Parallel … (2014)

  12. No Access

    Chapter and Conference Paper

    Lichen: A Potential Anticancer Officinal Resource

    Many natural products, which derived from plants, animals, and microorganisms, have been isolated as bioactive compounds with great therapeutic potential for cancer, but as a fungus, lichen has long been negle...

    Meirong Ren, **nli Wei, Feng Xu in Proceedings of the 2012 International Conf… (2014)

  13. No Access

    Chapter and Conference Paper

    A Novel Data Broadcast Strategy for Traffic Information Query in the VANETs

    This paper proposes a data broadcast strategy for traffic information query. Traffic information query is an important application in VANETs. Real-time traffic information query makes users to select path in a...

    **n**g Wang, Longjiang Guo, **bao Li, Meirui Ren in Web-Age Information Management (2013)

  14. No Access

    Chapter and Conference Paper

    A Framework of Fire Monitoring System Based on Sensor Networks

    Sensor networks have been widely applied in harsh environment monitoring. Fire monitoring is one of the extensive applications. But existing fire monitoring systems based on sensor networks fall into two probl...

    Longjiang Guo, Yihui Sun, **bao Li in Wireless Algorithms, Systems, and Applicat… (2012)

  15. No Access

    Chapter and Conference Paper

    Wireless Nerve: Invisible Anti-theft System in Wireless Sensor Network

    There are limitations in traditional anti-theft technologies. All the technologies have a common ground, that is: the devices are exposed to the space, also easily found and destroyed by adversaries. This pape...

    Meirui Ren, **sheng Duan, Hao Qu, **n**g Wang, Lei Du in Web-Age Information Management (2012)