- Algorithms and Data Compression
- Error Correcting Code Techniques
- Image Retrieval and Classification Techniques
- Face and Expression Recognition
- Remote Sensing and Land Use
- Bayesian Modeling and Causal Inference
- E-commerce and Technology Innovations
- Big Data Technologies and Applications
- Cryptographic Implementations and Security
- Cryptography and Residue Arithmetic
- Theoretical and Computational Physics
- Advanced Wireless Communication Techniques
- Advanced Neural Network Applications
- Coding theory and cryptography
- Earthquake Detection and Analysis
- Quantum many-body systems
- Korean Urban and Social Studies
- Geophysical Methods and Applications
- Chaos-based Image/Signal Encryption
- Complex Network Analysis Techniques
- Image and Object Detection Techniques
- Urban and spatial planning
- Lightning and Electromagnetic Phenomena
- Cryptography and Data Security
- Physical Unclonable Functions (PUFs) and Hardware Security
Hunan Provincial Science and Technology Department
2023-2024
Tianjin Metallurgical Vocational Technical College
2024
Hunan International Economics University
2021-2023
Xi'an Shiyou University
2022-2023
Jimei University
2021
Taiyuan University of Technology
2021
Fudan University
2015-2018
Beijing Jiaotong University
2014
The authors propose a framework to deal with unsupervised machine learning of both topological phases and non-topological ones. From this, the Calinski-Harabaz index score can be used probe phase transitions.
Chilling stress inhibits the growth of okra (Abelmoschus esculentus L.), reduces its overall agricultural yield, and deteriorates fruit quality. Therefore, it is crucial to elucidate mechanism through which plants respond chilling stress. This study investigates molecular mechanisms tolerance by comparing transcriptome metabolome chilling-tolerant (Ae182) chilling-sensitive (Ae171) varieties. We found that Ae182 exhibits higher antioxidant enzyme activities, including SOD, POD, CAT, APX,...
Through inductive coupling, AC transmission lines can generate large amounts of voltage to buried oil and gas pipelines in areas with common corridors, posing a threat the cathodic protection effect pipelines. Therefore, this paper investigates on long-distance through coupling. COMSOL Multiphysics finite element simulation software is used calculate distribution potential under different levels, parallel spacing, conductor-to-ground height, conductor arrangement pipeline burial depth for...
Power analysis attacks are major concerns among all kinds of side channel attacks. This paper proposes three countermeasures for Differential Analysis (DPA) by fully exploiting characteristics a many-core processor: (1) Data-level parallelism, (2) Random Dynamic Task Scheduling (RDTS), and (3) Adjustment (RDA), which combines RDTS, Frequency Scaling (RDFS) Phase (RDPA). For the first time these techniques applied to multicore processor from perspective secure system design. AES algorithm...
The traditional pointer instrument recognition scheme is implemented in three steps, which cumbersome and inefficient. So it difficult to apply the industrial production of real-time monitoring. Based on improvement CSL coding method setting pre-cache mechanism, an intelligent reading technology YOLOv5 proposed this paper, realizes rapid positioning instrument. problem angle interaction rotating target detection eliminated, complexity image preprocessing avoided, problems poor adaptability...
Modern enterprises are more active economic organizations in the operation and development of whole national economy, providing employment opportunities. Establishing a perfect level assessment system for modern is an important task current management. T
An adaptive, a variable code rate,can respond to channel changes promptly coding method is proposed,a discrete memoryless binary source sequence 𝑿 transformed losslessly make it capable of error checking. After the transformation, has and fixed rates through weighted probability arithmetic coding. Compared with rate, rate can effectively improve transmission performance, thereby being suitable for more complex communication environments. We prove that when length long enough, decoding 0...
Alibaba.com is considered to be one of the most well-known B2B & C2C e-commerce companies in China recent years.This paper discussed 3 main flows model business which information flow, cash flow and goods flow.Both are mature process Alibaba.comoperations.However, still has space improve area.In this paper, we will seek some solutions weakness logistics operations recommend solution about problem.
Finite field arithmetic is the base of cryptography algorithms like Elliptic Curves Cryptography (ECC) and RSA. In this paper, We have designed an unit to implement operation (A ± αB)mod N, where α a small number compared with N. our design, coefficient smaller than 128. The basic motivation designing multiply-accumulate (MAC) support some high security ECC such as Optimal Ate Pairings. well-known Pairing based on Barreto-Naehrig elliptic curve famous for it's efficient implementation. those...
<p>In this paper, a brand-new hash algorithm is provided. The length of the value can be customized. It theoretically proved that collision limit reached. applied flexibly, and it to digital signatures, document verification other fields in future.</p>
In order to analysis of pipeline systems including equipment failure mode and cause, calculate the reliability unit or system, study influence system pipe find weak link in improve enhance is put forward concrete effective measures, according result determine optimal spare coefficient, maintenance ability, Material plans, etc. The different sections same can accurately understand links, respectively prioritize, grasp best opportunity reduce risks, eliminate hidden accident bud, avoid...
<p> Image analysis and compression We usually use Fourier transform, DCT transform wavelet transform. The image transformation method based on weighted probability model is the new described in this paper. reasoned iterative formula of binary sequence-weighted versus inverse transformation, encoding sequence are constructed. In experiment, yielded large number duplicate values transformed data, which suitable for construction a method. can reconstruct effectively, has obvious edge...
<p> Image analysis and compression We usually use Fourier transform, DCT transform wavelet transform. The image transformation method based on weighted probability model is the new described in this paper. reasoned iterative formula of binary sequence-weighted versus inverse transformation, encoding sequence are constructed. In experiment, yielded large number duplicate values transformed data, which suitable for construction a method. can reconstruct effectively, has obvious edge...
<p> X is a discrete memoryless binary source , Sequence undergoes lossless transformation to satisfy the requirement “Each 1 separated by one or more zeros", "Each 0 two 1s" similar condition These conditions are decision for error detection in channel transmission. A new coding method proposed based on weighted probability model The encoding rate and decoding steps of different conversion methods It proved that can reach when code length long enough. In simulation experiment BPSK...
<p> X is a discrete memoryless binary source , Sequence undergoes lossless transformation to satisfy the requirement “Each 1 separated by one or more zeros", "Each 0 two 1s" similar condition These conditions are decision for error detection in channel transmission. A new coding method proposed based on weighted probability model The encoding rate and decoding steps of different conversion methods It proved that can reach when code length long enough. In simulation experiment BPSK...
<p>In this paper a brand new channel error detection and correction method is provided. Artificially adding symbols to the source binary sequence makes present regularity. The receiver can use rule implement correction. Since many redundant are added, weighted probability model lossless coding proposed in remove information, reasons why Markov chains conditional probabilities not feasible given. It proven that reach capacity when code length approaches infinity. shown experimentally...
This paper aims to explore the correlation between planning and design of entrance image Jimei School Village (Ji Mei Xue Cun) landscape for urban development.Access concept sustainable development, sites new challenges: spatial order has long been excluded utilization rate is low; The modern cannot fit in with ancient stone archway; traffic at century-old chaotic, which threatens students' safety.Nowadays, there a height difference Village.Many roads converge form an acute angle space,...
<p>In this paper, a brand-new hash algorithm is provided. The length of the value can be customized. It theoretically proved that collision limit reached. applied flexibly, and it to digital signatures, document verification other fields in future.</p>
<p>In this paper a brand new channel error detection and correction method is provided. Artificially adding symbols to the source binary sequence makes present regularity. The receiver can use rule implement correction. Since many redundant are added, weighted probability model lossless coding proposed in remove information, reasons why Markov chains conditional probabilities not feasible given. It proven that reach capacity when code length approaches infinity. shown experimentally...