- Nuclear physics research studies
- Quantum Chromodynamics and Particle Interactions
- Chaos-based Image/Signal Encryption
- Genetic Mapping and Diversity in Plants and Animals
- Cryptography and Data Security
- Quantum Computing Algorithms and Architecture
- Scientific Computing and Data Management
- Human Mobility and Location-Based Analysis
- Smart Grid and Power Systems
- Bayesian Modeling and Causal Inference
- Advanced Fiber Optic Sensors
- Electric Power Systems and Control
- Complex Network Analysis Techniques
- Cryptographic Implementations and Security
- Astronomical and nuclear sciences
- Cognitive Radio Networks and Spectrum Sensing
- Context-Aware Activity Recognition Systems
- Quantum Information and Cryptography
- Advanced Bandit Algorithms Research
- Caching and Content Delivery
- Extraction and Separation Processes
- Dust and Plasma Wave Phenomena
- Plasma Applications and Diagnostics
- Service-Oriented Architecture and Web Services
- Distributed Sensor Networks and Detection Algorithms
University of California, Los Angeles
2024
Jiangsu University of Science and Technology
2024
Tsinghua University
2024
SMART Reading
2023
Shenyang Institute of Automation
2021-2022
Bridge University
2022
Chinese Academy of Sciences
2020-2022
Oceaneering International (United States)
2022
Center Point
2022
Ensemble Therapeutics (United States)
2022
The mass table in the deformed relativistic Hartree-Bogoliubov theory continuum (DRHBc) with PC-PK1 density functional has been established for even-$Z$ nuclei $8\le Z\le120$, extended from previous work even-even [Zhang $\it{et.~al.}$ (DRHBc Mass Table Collaboration), At. Data Nucl. Tables 144, 101488 (2022)]. calculated binding energies, two-nucleon and one-neutron separation root-mean-square (rms) radii of neutron, proton, matter, charge distributions, quadrupole deformations, neutron...
Driven by both personal and commercial interests, fast popular content delivery, as one of the key services offered vehicular ad-hoc networks (VANETs), has recently received considerable attention. Most existing work mainly focuses on resource allocation such transmit power or subcarrier assignment from on-board units (OBUs) to roadside (RSUs). However, due limited backhaul capacity, great efforts still need be taken for delivering large-size files videos music high speed vehicles. Motivated...
Current 3D Large Multimodal Models (3D LMMs) have shown tremendous potential in 3D-vision-based dialogue and reasoning. However, how to further enhance LMMs achieve fine-grained scene understanding facilitate flexible human-agent interaction remains a challenging problem. In this work, we introduce 3D-LLaVA, simple yet highly powerful LMM designed act as an intelligent assistant comprehending, reasoning, interacting with the world. Unlike existing top-performing methods that rely on...
Leakages during the signing process, including partial key exposure and (or complete) randomness exposure, may be devastating for security of digital signatures. In this work, we investigate lattice-based Fiat-Shamir signatures in presence leakage. To end, present a generic recovery attack that relies on minimum leakage randomness, then theoretically connect it to variant Integer-LWE (ILWE) problem. The ILWE problem, introduced by Bootle et al. at Asiacrypt 2018, is recover secret vector s...
Plasmas under atmospheric pressure offer a high-temperature environment for material synthesis, but electrode ablation compromises purity. Here, we introduce an atmospheric-pressure microwave plasma (AMP) operated without electrodes to overcome the existing limitations in pure synthesis. The distribution of electrostatic field intensity inside waveguide during AMP excitation was examined via simulations. lateral and radial gas temperature distributions were also studied using optical...
Background: The outbreak of coronavirus disease 2019 (COVID-19) in Wuhan, Hubei Province, China spread worldwide, resulting a large number deaths.Methods: Temporary Ark hospitals (TAH) have played an important role controlling the epidemic city Wuhan. Taking one TAH with 800 beds as example, we summarized details layout, setting, working mode medical staffs, patient management, admission standards, discharge and standards for transferring to another hospital, hospital operation, so...
The ubiquitous power Internet of things (IoT) constructs an intelligent service system with comprehensive perception, efficient response and flexible processing around all departments the support communication technologies such as mobile artificial intelligence. With rapid development smart IoT perceptual devices edge computing, it has become possible for agents to cooperate in tasks. task completion time can be greatly reduced through cooperative among multiple entities IoT. However, scale...
Cooperative spectrum sensing has been shown to yield a significant performance improvement in cognitive radio networks. In this paper, we consider distributed cooperative (DCS) which secondary users (SUs) exchange data with one another instead of reporting common fusion center. most existing DCS algorithms, the SUs are grouped into disjoint groups or coalitions, and within each coalition local is exchanged. However, these schemes do not account for possibility that an SU can be involved...
Using building information modeling (BIM), design teams can maximize decision-making efficiency by using one data-sharing platform and integrated digital model.We present a novel builtproject that integrates computer-aided manufacturing (CAM), machine learning, internet of things (IoT) with BIM process.The goal is to solve problems tightly connect virtual data the real-world construction process.Introducing CAM in early phase reduces cost reverse engineering optimizes material costs.Machine...
Power Internet of Things (IOT) is the application things in smart grid and result development information communication technology to a certain stage. It will effectively integrate infrastructure resources power system resources, improve informationize level system. However, real-world complex systems are often vulnerable under disruptions. IOT facing with different types attack, which contains natural disasters human intentional attacks. Motivated by this point, we propose general framework...