Jielin Wang

ORCID: 0000-0001-9011-0067
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Algorithms and Data Compression
  • Error Correcting Code Techniques
  • Image Retrieval and Classification Techniques
  • Face and Expression Recognition
  • Remote Sensing and Land Use
  • Bayesian Modeling and Causal Inference
  • E-commerce and Technology Innovations
  • Big Data Technologies and Applications
  • Cryptographic Implementations and Security
  • Cryptography and Residue Arithmetic
  • Theoretical and Computational Physics
  • Advanced Wireless Communication Techniques
  • Advanced Neural Network Applications
  • Coding theory and cryptography
  • Earthquake Detection and Analysis
  • Quantum many-body systems
  • Korean Urban and Social Studies
  • Geophysical Methods and Applications
  • Chaos-based Image/Signal Encryption
  • Complex Network Analysis Techniques
  • Image and Object Detection Techniques
  • Urban and spatial planning
  • Lightning and Electromagnetic Phenomena
  • Cryptography and Data Security
  • Physical Unclonable Functions (PUFs) and Hardware Security

Hunan Provincial Science and Technology Department
2023-2024

Tianjin Metallurgical Vocational Technical College
2024

Hunan International Economics University
2021-2023

Xi'an Shiyou University
2022-2023

Jimei University
2021

Taiyuan University of Technology
2021

Fudan University
2015-2018

Beijing Jiaotong University
2014

The authors propose a framework to deal with unsupervised machine learning of both topological phases and non-topological ones. From this, the Calinski-Harabaz index score can be used probe phase transitions.

10.1103/physrevresearch.3.013074 article EN cc-by Physical Review Research 2021-01-22

Chilling stress inhibits the growth of okra (Abelmoschus esculentus L.), reduces its overall agricultural yield, and deteriorates fruit quality. Therefore, it is crucial to elucidate mechanism through which plants respond chilling stress. This study investigates molecular mechanisms tolerance by comparing transcriptome metabolome chilling-tolerant (Ae182) chilling-sensitive (Ae171) varieties. We found that Ae182 exhibits higher antioxidant enzyme activities, including SOD, POD, CAT, APX,...

10.3390/plants14071100 article EN cc-by Plants 2025-04-02

Through inductive coupling, AC transmission lines can generate large amounts of voltage to buried oil and gas pipelines in areas with common corridors, posing a threat the cathodic protection effect pipelines. Therefore, this paper investigates on long-distance through coupling. COMSOL Multiphysics finite element simulation software is used calculate distribution potential under different levels, parallel spacing, conductor-to-ground height, conductor arrangement pipeline burial depth for...

10.3390/magnetochemistry9030075 article EN cc-by Magnetochemistry 2023-03-03

Power analysis attacks are major concerns among all kinds of side channel attacks. This paper proposes three countermeasures for Differential Analysis (DPA) by fully exploiting characteristics a many-core processor: (1) Data-level parallelism, (2) Random Dynamic Task Scheduling (RDTS), and (3) Adjustment (RDA), which combines RDTS, Frequency Scaling (RDFS) Phase (RDPA). For the first time these techniques applied to multicore processor from perspective secure system design. AES algorithm...

10.1587/elex.15.20180084 article EN IEICE Electronics Express 2018-01-01

The traditional pointer instrument recognition scheme is implemented in three steps, which cumbersome and inefficient. So it difficult to apply the industrial production of real-time monitoring. Based on improvement CSL coding method setting pre-cache mechanism, an intelligent reading technology YOLOv5 proposed this paper, realizes rapid positioning instrument. problem angle interaction rotating target detection eliminated, complexity image preprocessing avoided, problems poor adaptability...

10.3390/s22207800 article EN cc-by Sensors 2022-10-14

Modern enterprises are more active economic organizations in the operation and development of whole national economy, providing employment opportunities. Establishing a perfect level assessment system for modern is an important task current management. T

10.4108/eai.17-11-2023.2342752 article EN 2024-01-01

An adaptive, a variable code rate,can respond to channel changes promptly coding method is proposed,a discrete memoryless binary source sequence 𝑿 transformed losslessly make it capable of error checking. After the transformation, has and fixed rates through weighted probability arithmetic coding. Compared with rate, rate can effectively improve transmission performance, thereby being suitable for more complex communication environments. We prove that when length long enough, decoding 0...

10.36227/techrxiv.172373724.49637557/v1 preprint EN cc-by-nc-sa 2024-08-15

Alibaba.com is considered to be one of the most well-known B2B & C2C e-commerce companies in China recent years.This paper discussed 3 main flows model business which information flow, cash flow and goods flow.Both are mature process Alibaba.comoperations.However, still has space improve area.In this paper, we will seek some solutions weakness logistics operations recommend solution about problem.

10.2991/icibet-14.2014.34 article EN cc-by-nc Advances in intelligent systems research/Advances in Intelligent Systems Research 2014-01-01

Finite field arithmetic is the base of cryptography algorithms like Elliptic Curves Cryptography (ECC) and RSA. In this paper, We have designed an unit to implement operation (A ± αB)mod N, where α a small number compared with N. our design, coefficient smaller than 128. The basic motivation designing multiply-accumulate (MAC) support some high security ECC such as Optimal Ate Pairings. well-known Pairing based on Barreto-Naehrig elliptic curve famous for it's efficient implementation. those...

10.1109/asicon.2015.7516999 article EN 2021 IEEE 14th International Conference on ASIC (ASICON) 2015-11-01

<p>In this paper, a brand-new hash algorithm is provided. The length of the value can be customized. It theoretically proved that collision limit reached. applied flexibly, and it to digital signatures, document verification other fields in future.</p>

10.36227/techrxiv.13606373.v1 preprint EN cc-by 2021-01-22

In order to analysis of pipeline systems including equipment failure mode and cause, calculate the reliability unit or system, study influence system pipe find weak link in improve enhance is put forward concrete effective measures, according result determine optimal spare coefficient, maintenance ability, Material plans, etc. The different sections same can accurately understand links, respectively prioritize, grasp best opportunity reduce risks, eliminate hidden accident bud, avoid...

10.1109/icmsp55950.2022.9859022 article EN 2022 4th International Conference on Intelligent Control, Measurement and Signal Processing (ICMSP) 2022-07-08

<p> Image analysis and compression We usually use Fourier transform, DCT transform wavelet transform. The image transformation method based on weighted probability model is the new described in this paper. reasoned iterative formula of binary sequence-weighted versus inverse transformation, encoding sequence are constructed. In experiment, yielded large number duplicate values transformed data, which suitable for construction a method. can reconstruct effectively, has obvious edge...

10.36227/techrxiv.22679584 preprint EN cc-by 2023-04-26

<p> Image analysis and compression We usually use Fourier transform, DCT transform wavelet transform. The image transformation method based on weighted probability model is the new described in this paper. reasoned iterative formula of binary sequence-weighted versus inverse transformation, encoding sequence are constructed. In experiment, yielded large number duplicate values transformed data, which suitable for construction a method. can reconstruct effectively, has obvious edge...

10.36227/techrxiv.22679584.v1 preprint EN cc-by 2023-04-26

<p> X is a discrete memoryless binary source , Sequence undergoes lossless transformation to satisfy the requirement “Each 1 separated by one or more zeros", "Each 0 two 1s" similar condition These conditions are decision for error detection in channel transmission. A new coding method proposed based on weighted probability model The encoding rate and decoding steps of different conversion methods It proved that can reach when code length long enough. In simulation experiment BPSK...

10.36227/techrxiv.24657624 preprint EN cc-by 2023-12-04

<p> X is a discrete memoryless binary source , Sequence undergoes lossless transformation to satisfy the requirement “Each 1 separated by one or more zeros", "Each 0 two 1s" similar condition These conditions are decision for error detection in channel transmission. A new coding method proposed based on weighted probability model The encoding rate and decoding steps of different conversion methods It proved that can reach when code length long enough. In simulation experiment BPSK...

10.36227/techrxiv.24657624.v1 preprint EN cc-by 2023-12-04

<p>In this paper a brand new channel error detection and correction method is provided. Artificially adding symbols to the source binary sequence makes present regularity. The receiver can use rule implement correction. Since many redundant are added, weighted probability model lossless coding proposed in remove information, reasons why Markov chains conditional probabilities not feasible given. It proven that reach capacity when code length approaches infinity. shown experimentally...

10.36227/techrxiv.13604738.v1 preprint EN cc-by-nc-sa 2021-01-22

This paper aims to explore the correlation between planning and design of entrance image Jimei School Village (Ji Mei Xue Cun) landscape for urban development.Access concept sustainable development, sites new challenges: spatial order has long been excluded utilization rate is low; The modern cannot fit in with ancient stone archway; traffic at century-old chaotic, which threatens students' safety.Nowadays, there a height difference Village.Many roads converge form an acute angle space,...

10.2991/assehr.k.210609.018 article EN cc-by-nc Advances in Social Science, Education and Humanities Research/Advances in social science, education and humanities research 2021-01-01

<p>In this paper, a brand-new hash algorithm is provided. The length of the value can be customized. It theoretically proved that collision limit reached. applied flexibly, and it to digital signatures, document verification other fields in future.</p>

10.36227/techrxiv.13606373 preprint EN cc-by 2021-01-22

<p>In this paper a brand new channel error detection and correction method is provided. Artificially adding symbols to the source binary sequence makes present regularity. The receiver can use rule implement correction. Since many redundant are added, weighted probability model lossless coding proposed in remove information, reasons why Markov chains conditional probabilities not feasible given. It proven that reach capacity when code length approaches infinity. shown experimentally...

10.36227/techrxiv.13604738 preprint EN cc-by-nc-sa 2021-01-22
Coming Soon ...