Huanzhang Ling’s research while affiliated with Harbin Engineering University and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (6)


G real part, (r,z)=(2,-1),λ=4.4721\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$(r,z)=(2,-1),\ \lambda =4.4721$$\end{document}
Gr\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$G_r$$\end{document} real part error, Tsr=0.00838\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$T_\mathrm{sr} = 0.00838$$\end{document}, Tir=0.136\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$T_\mathrm{ir} = 0.136$$\end{document}, h=0.005\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$h=0.005$$\end{document}
GZ\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$G_Z$$\end{document} real part, (r,z)=(2,-1),ω0=1\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$(r,z)=(2,-1),\ \omega _0=1$$\end{document}
GZ\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$G_Z$$\end{document} real part error, Tsr=0.00708\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$T_\mathrm{sr} = 0.00708$$\end{document}, Tir=0.141\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$T_\mathrm{ir} = 0.141$$\end{document}, h=0.005\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$h=0.005$$\end{document}
G real part error, Tor=26.352\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$T_\mathrm{or} = 26.352$$\end{document}, Tir=405.340\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$T_\mathrm{ir} = 405.340$$\end{document}, h=5×10-6\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$h=5 \times 10^{-6}$$\end{document}

+6

Ordinary differential equation algorithms for a frequency-domain water wave Green’s function
  • Article
  • Publisher preview available

October 2016

·

85 Reads

·

16 Citations

Journal of Engineering Mathematics

Yan Shen

·

·

Wenyang Duan

·

Huanzhang Ling

Our study investigated an algorithm for a second-order ordinary differential equation for the frequency-domain Green’s function of free-surface waves in water of infinite depth. A power-series method is introduced if the wave frequency (Formula presented.); otherwise, if (Formula presented.), then the trigonometrically fitted block Numerov-type method (TBNM) is employed. The calculation precision of the power-series method and the TBNM reached (Formula presented.) and (Formula presented.), respectively. The two methods have a high calculation efficiency compared with calculating the Green’s function using the series expansion representation approach. The calculation speed for these two methods is 15 times faster using the same computing codes.

View access options

Selection of Atmospheric Environmental Monitoring Sites based on Geographic Parameters Extraction of GIS and Fuzzy Matter-Element Analysis

April 2015

·

108 Reads

·

5 Citations

Jianfa Wu

·

Dahao Peng

·

·

[...]

·

Huanzhang Ling

To effectively monitor the atmospheric quality of small-scale areas, it is necessary to optimize the locations of the monitoring sites. This study combined geographic parameters extraction by GIS with fuzzy matter-element analysis. Geographic coordinates were extracted by GIS and transformed into rectangular coordinates. These coordinates were input into the Gaussian plume model to calculate the pollutant concentration at each site. Fuzzy matter-element analysis, which is used to solve incompatible problems, was used to select the locations of sites. The matter element matrices were established according to the concentration parameters. The comprehensive correlation functions KA (xj) and KB (xj), which reflect the degree of correlation among monitoring indices, were solved for each site, and a scatter diagram of the sites was drawn to determine the final positions of the sites based on the functions. The sites could be classified and ultimately selected by the scatter diagram. An actual case was tested, and the results showed that 5 positions can be used for monitoring, and the locations conformed to the technical standard. In the results of this paper, the hierarchical clustering method was used to improve the methods. The sites were classified into 5 types, and 7 locations were selected. Five of the 7 locations were completely identical to the sites determined by fuzzy matter-element analysis. The selections according to these two methods are similar, and these methods can be used in combination. In contrast to traditional methods, this study monitors the isolated point pollutant source within a small range, which can reduce the cost of monitoring.


Network Intrusion Detection Based on a General Regression Neural Network Optimized by an Improved Artificial Immune Algorithm

March 2015

·

293 Reads

·

40 Citations

To effectively and accurately detect and classify network intrusion data, this paper introduces a general regression neural network (GRNN) based on the artificial immune algorithm with elitist strategies (AIAE). The elitist archive and elitist crossover were combined with the artificial immune algorithm (AIA) to produce the AIAE-GRNN algorithm, with the aim of improving its adaptivity and accuracy. In this paper, the mean square errors (MSEs) were considered the affinity function. The AIAE was used to optimize the smooth factors of the GRNN; then, the optimal smooth factor was solved and substituted into the trained GRNN. Thus, the intrusive data were classified. The paper selected a GRNN that was separately optimized using a genetic algorithm (GA), particle swarm optimization (PSO), and fuzzy C-mean clustering (FCM) to enable a comparison of these approaches. As shown in the results, the AIAE-GRNN achieves a higher classification accuracy than PSO-GRNN, but the running time of AIAE-GRNN is long, which was proved first. FCM and GA-GRNN were eliminated because of their deficiencies in terms of accuracy and convergence. To improve the running speed, the paper adopted principal component analysis (PCA) to reduce the dimensions of the intrusive data. With the reduction in dimensionality, the PCA-AIAE-GRNN decreases in accuracy less and has better convergence than the PCA-PSO-GRNN, and the running speed of the PCA-AIAE-GRNN was relatively improved. The experimental results show that the AIAE-GRNN has a higher robustness and accuracy than the other algorithms considered and can thus be used to classify the intrusive data.


Meticulous Restricted Equivalent Transformation on Singular Systems

January 2015

·

16 Reads

Lecture Notes in Electrical Engineering

In this chapter, a meticulous restricted equivalent transformation on singular systems is proposed. It can simplify different variables in complex singular systems and turn the complex singular system to be more simple and clear. This method gives the complexity of the singular system equivalent to more singular systems so that we approach the new phenomenon of altering the traditional restricted equivalent transformation provided the future analysis foundation on the practical system.


Robust Stochastic Stabilization of Uncertain Stochastic Jump Systems with Time-Varying Delays

August 2010

·

10 Reads

This paper studies the problem of robustly stochastic stability of uncertain stochastic systems with time-varying delays, where the system is subjected to both Brownian motion and Markovian parameter jumping. By using some zero equations, neither model transformation nor bounding for cross terms is required to obtain the delay-dependent results. The problem of robustly stochastic stability addressed in this paper is to design a state feedback controller such that, for all admissible uncertainties, the closed-loop system is robustly stochastically stable. A criterion for the existence of such controller is derived based on the Lyapunov function combined with linear matrix inequalities (LMI).


Citations (3)


... In the existing literature, nonlinear solutions for variable-order dynamics are derived using various approximation techniques [37,38]. However, it is worth noting that the frequency domain approximation method, in several instances, may obscure the underlying chaotic behavior [39]. To address this problem, we adopt a time-dependent approach to comprehensively analyze the dynamic patterns of systems with fractional variable order. ...

Reference:

A study of the chaotic features of variable order fractional Liu’s system via radial basis neural network
Ordinary differential equation algorithms for a frequency-domain water wave Green’s function

Journal of Engineering Mathematics

... Chen et al. 19 established a dynamic mathematical diffusion model of heavy gas leakage in storage tanks by using the Gaussian plume model and obtained the dynamic analysis process of gas spatial concentration field at different times. Wu et al. 20 combined a geographic information system with a Gaussian plume model and established the relationship of concentration distribution function according to the pollutant concentration parameters of each location. Hui et al. ...

Selection of Atmospheric Environmental Monitoring Sites based on Geographic Parameters Extraction of GIS and Fuzzy Matter-Element Analysis

... Their adaptability, particularly in high-dimensional datasets, addresses challenges associated with conventional algorithms such as k-nearest neighbor and decision trees Dreiseitl and Ohno-Machado [2002]. Across various application domains, ANNs have been employed for classification tasks and have also demonstrated their efficacy in several computer security areas, including detecting network attacks Wu et al. [2015], Shenfield et al. [2018]. ...

Network Intrusion Detection Based on a General Regression Neural Network Optimized by an Improved Artificial Immune Algorithm