- Target Tracking and Data Fusion in Sensor Networks
- Radar Systems and Signal Processing
- Security and Verification in Computing
- Non-Invasive Vital Sign Monitoring
- Advanced SAR Imaging Techniques
- Advanced Malware Detection Techniques
- Indoor and Outdoor Localization Technologies
- Parallel Computing and Optimization Techniques
- Advanced Sensor and Control Systems
- Advanced Optical Sensing Technologies
- Anomaly Detection Techniques and Applications
- Direction-of-Arrival Estimation Techniques
- Cryptographic Implementations and Security
- Advanced Image Fusion Techniques
- Blind Source Separation Techniques
- Radiation Effects in Electronics
- Speech and Audio Processing
- Advanced Measurement and Detection Methods
- Traffic Prediction and Management Techniques
- Robotics and Sensor-Based Localization
- Chaos-based Image/Signal Encryption
- Video Surveillance and Tracking Methods
- Digital Media Forensic Detection
- Physical Unclonable Functions (PUFs) and Hardware Security
- Advanced Clustering Algorithms Research
Beijing Information Science & Technology University
2021-2025
Beihang University
2016-2020
This paper proposes a human activity recognition (HAR) method for frequency-modulated continuous wave (FMCW) radar sensors. The utilizes multi-domain feature attention fusion network (MFAFN) model that addresses the limitation of relying on single range or velocity to describe activity. Specifically, fuses time-Doppler (TD) and time-range (TR) maps activities, resulting in more comprehensive representation activities being performed. In phase, multi-feature module (MAFM) combines features...
Human activity recognition by radar sensors plays an important role in healthcare and smart homes. However, labeling a large number of datasets is difficult time-consuming, it for models trained on insufficient labeled data to obtain exact classification results. In this paper, we propose multiscale residual weighted network with large-scale, medium-scale, small-scale networks. Firstly, MRW image encoder used extract salient feature representations from all time-Doppler images through...
Noncontact vital sign monitoring, based on mm-wave frequency-modulated continuous wave (FMCW) radar, can be widely applied in elderly care, clinical diagnoses, and in-vehicle occupant detection. The radar monitor the Doppler signal reflected by chest displacement then analyze phase change of echo to get respiration heartbeat signals. This article proposes a frequency-tracking method an improved birth–death strategy calculate rate real-time. There are two main steps estimate from frames...
This article investigates the perspective <inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> <tex-math notation="LaTeX">${n}$ </tex-math></inline-formula> -point (PnP) problem and provides an effective, dependable, fast optimal solution. The challenging pose estimation is changed into ideal circumstance for solving transition matrix by estimating position orientation of camera based on known reference points. method meets both geometric...
The thermal vacuum test (TVT) is an important verification process in the development of spacecraft and load. There are often multiple temperature points on device under (DUT) that require control. interaction among channels poses a challenge for control TVT. To solve this problem, multi-channel Smith proportional–integral–derivative (PID) controller based grouping neural network (Grouping-NN) proposed. Firstly, mathematical derivation typical model TVT carried out. Then, system identified...
In the field of range-based multi-target localization and tracking, measurement data each time cannot associate with its corresponding target, clustering analysis can be used to solve this problem. paper, a novel evolutionary kernel algorithm was developed for tracking in wireless sensor networks. First, locations multi-targets are predicted according previous trajectories. Second, we apply number recognition filter out outliers calculate initial cluster center by analyzing density data. For...
Target tracking is an important field of investigation in wireless sensor networks. When multiple targets are closely spaced, their measurement points mixed together due to the insufficient accuracy sensor. This may bring some difficulties determining positions observation required by subsequent algorithms and applications. Most known derived from Kalman filter, extended particles filter. In this paper, a novel data classification algorithm based on support vector machine (SVM) provided. SVM...
As an important technology in 3D vision, point-cloud registration has broad development prospects the fields of space-based remote sensing, photogrammetry, robotics, and so on. Of available algorithms, Iterative Closest Point (ICP) algorithm been used as classic for solving point cloud registration. However, with data being under influence noise, outliers, overlapping values, other issues, performance ICP will be affected to varying degrees. This paper proposes a global structure adaptive...
Recently, extensive research attention has been drawn to the program executing security of embedded processor since increasing code tamper attacks, as well transient faults severely affect safety systems. The monitoring and fault recovery technique is one effective methods ensure performance devices. In this article, an architecture for proposed run-time execution, which builds a Monitoring Cache (M-Cache) then checks integrity based on reference data. Especially, will build checkpoint once...
The success of Multi-hypothesis tracking(MHT) lies in the use multiple scans, which can often yield improved tracking performance over single scan based data association methods radar-centric multi-target tracking(MTT) systems. However, with increase number targets associated measurements, there is an exponentially increasing need for formulating potential hypotheses, computational cost may be prohibitively expensive. In this paper, a multi-hypothesis fractional belief propagation (MHFBP)...
In modern time, finger-vein recognition technology has become increasingly popular. Basically, the process involves image acquisition, feature extraction and recognition. The algorithm is key research issue. Because of differences between acquisition devices individuals, performance affected by rotation, translation noise in finger vein To solve problems, a based on an improved Zernike moment proposed this paper. Firstly, Sobel operator used to perform ROI from original image, effectively....
Nowadays, the secure program execution of embedded processor has attracted considerable research attention, since more and code tampering attacks transient faults are seriously affecting security processors. The monitoring fault recovery strategies not only closely related to devices, but also directly affect performance processor. This paper presents a architecture for run-time execution, which takes regular backup copies two-stage checkpoint. In this framework, integrity check technology...
The performance of measuring moving vehicle targets with onboard millimeter-wave (MMW) radar can be affected by environmental noise, as well the dynamic changes in number these vehicles and problem interference measurement data between adjacent vehicles. In this article, we propose a new possibilistic clustering algorithm for problem. dataset will contain lot information about stationary prior to cluster analysis. To obtain target dataset, method recognizing measurements was developed. Then,...
Embedded systems are vulnerable to various kinds of attacks when they in execution. Advanced attacks, such as buffer overflow, able inject malicious code at runtime. Besides, physical also becoming more common. This paper presents a new hardware-assisted architecture validate the execution program which is reliable, effective and low overhead. A specified tool developed collect software properties each basic block from binary automatically. At runtime, proposed scheme checks whether...
To find the best polarity of large-scale Mixed Polarity Reed-Muller (MPRM) logic circuits, this paper proposes a new Adaptive Simulated Annealing Genetic Algorithm (ASAGA) which can effectively out polarity. (GA) has outstanding global searching ability but easily falls into local optimum, while (SAA) is expert in limitation poor convergence. The method incorporating SAA GA proposed play their strengths to utmost extent and makes up shortcomings. Additionally, for key parameters ASAGA, we...
Crowd movement analysis (CMA) is a key technology in the field of public safety. This provides reference for identifying potential hazards places by analyzing crowd aggregation and dispersion behavior. Traditional video processing techniques are susceptible to factors such as environmental lighting depth when movements, so cannot accurately locate source events. Radar, on other hand, offers all-weather distance angle measurements, effectively compensating shortcomings surveillance. paper...
Abstract In the field of array signal processing, accurate direction arrival (DOA) estimation is crucial for handling both coherent and incoherent mixed sources. This paper proposes a deep learning-enhanced atomic norm minimization (DLEANM) algorithm, designed to improve DOA coprime arrays. The algorithm first models scenarios realistically employs interpolation transform arrays into virtual uniform linear arrays, which facilitates formulation problem. Solving this problem reconstructs an...
This paper proposes a fast direction of arrival (DOA) estimation method based on positive incremental modified Cholesky decomposition atomic norm minimization (PI-CANM) for augmented coprime array sensors. The approach incorporates sampling the to generate non-uniform, discontinuous virtual array. It then utilizes interpolation convert this into uniform, continuous Based this, problem DOA is equivalently formulated as gridless optimization problem, which solved via reconstruct Hermitian...
With the popularity of node data to sink-node in wireless sensor networks (WSNs), it is vital protect privacy and enable easily manage at same time. Under such demands, reversible steganography encrypted images attracts more researchers' attention. In this paper, we propose a novel mean shift algorithm for improving security communication WSNs. The first calculates l, α, β sub-components after removing l component original image. At time, use clustering calculate 3-dimensional regional...