- IoT and Edge/Fog Computing
- Advanced Image Processing Techniques
- Advanced Measurement and Detection Methods
- IoT Networks and Protocols
- Energy Efficient Wireless Sensor Networks
- Image Processing Techniques and Applications
- Infrared Target Detection Methodologies
- Gaze Tracking and Assistive Technology
- Digital Holography and Microscopy
- Privacy-Preserving Technologies in Data
- Cognitive Radio Networks and Spectrum Sensing
- Embedded Systems and FPGA Design
- Glaucoma and retinal disorders
- Cloud Computing and Resource Management
- Cryptography and Data Security
- Energy Harvesting in Wireless Networks
- Sparse and Compressive Sensing Techniques
- Context-Aware Activity Recognition Systems
- Security and Verification in Computing
- Image and Video Stabilization
- Advanced MIMO Systems Optimization
- Blockchain Technology Applications and Security
- Industrial Vision Systems and Defect Detection
- Retinal Imaging and Analysis
- Power Systems and Technologies
Chongqing University
2013-2024
New Technology (Israel)
2023
Shanghai Second People's Hospital
2022
Space Engineering University
2020
PLA Army Engineering University
2012
Medical research shows that eye movement disorder is related to many kinds of neurological diseases. Eye characteristics can be used as biomarkers Parkinson's disease, Alzheimer's schizophrenia and other However, due the unknown medical mechanism some diseases, it difficult establish an intuitive correspondence between In this paper, we propose a classification method diseases based on decision tree random forest. Firstly, variety experimental schemes are designed obtain images, information...
Previous schemes for designing secure branch prediction unit (SBPU) based on physical isolation can only offer limited security and significantly affect BPU's capability, leading to prominent performance degradation. Moreover, encryption-based SBPU periodic key re-randomization have the risk of being compromised by advanced attack algorithms, overhead is also considerable. To this end, paper proposes a conflict-invisible (CIBPU). CIBPU employs redundant storage design, load-aware indexing,...
Benign paroxysmal positional vertigo (BPPV) is a prevalent form of that necessitates skilled physician to diagnose by observing the nystagmus and resulting from specific changes in patient's position. In this study, we aim explore integration eye movement video position information for BPPV diagnosis apply artificial intelligence (AI) methods improve accuracy diagnosis.
In recent years, with an increasing number of Internet Things (IoT) devices, general cloud computing mode is hard to process large amounts data high Quality Service (QoS). Edge put forward relieve the pressure servers, but most them only focused on allocating tasks depending servers or edge virtualization technology. Resource-constrained smart mobile terminals (RC-SMTs) produce be processed some are usually not able support even Docker The cooperative computation capacity RC-SMTs potential...
The expansion of Internet Things (IoT) spawns large on-device machine learning demands, while the can be a hard task for resource constrained IoT terminals with fragmented data set. Federal (FL), which aims to build joint model across multiple devices, IoT-FL has now become promising path on terminals. In broad FL fields, current server–client pattern cannot jump out third-party self-trustless problem, and recent researches suggest that even sharing training results may also reveal raw sets....
Medical research confirms that eye movement abnormalities are related to a variety of psychological activities, mental disorders and physical diseases. However, as the specific manifestations various diseases in terms remain unclear, accurate diagnosis according is difficult. In this paper, deep neural network (DNN) method employed establish disease discrimination model movement. First, multiple eye-tracking experiments designed obtain images. Second, pupil characteristics, including...
Abstract:
In Wireless Sensor Networks (WSNs), unlicensed users, that is, sensor nodes, have excessively exploited the radio spectrum. Through Cognitive Radio (CR), licensed spectra, which are owned by can be partly or entirely shared with users. This paper proposes a strategic bargaining spectrum-sharing scheme, considering CR-based heterogeneous WSN (HWSN). The sensors of HWSNs discrepant and exist in different wireless environments, leads to various signal-to-noise ratios (SNRs) for same Unlicensed...
Mobile edge computing (MEC) has become an effective solution for insufficient and communication problems the Internet of Things (IoT) applications due to its rich resources on side. In multi-terminal scenarios, deployment scheme nodes important impact system performance essential issue in end-edge-cloud architecture. this article, we consider specific factors, such as spatial location, power supply, urgency requirements terminals, with respect building evaluation model solve allocation...
Aiming at the problems of imperfectness and poor robustness to current analysis methods videonystagmography (VNG), a medical characteristics method for displacement vectors nystagmus is proposed in this paper. Firstly, video images are captured with infrared cameras motion trajectories eyeballs obtained through pupil localization. Then, 2D between any two adjacent frames acquired computing differences their positions. The statistical results demonstrated match joint distribution several...
As the use and scale of wireless sensor networks has grown, lack transmission spectrum become a key factor affecting network quality service. An effective solution is to collect unused from primary users (i.e. licensed users) that for networks. In this article, cognitive radio-based network, sharing strategy between clusters proposed. First, as secondary user an unlicensed user), base station plays Bertrand game with monopolists (the gain access on behalf clusters. Then, allocates band...
<title>Abstract</title> In the grid intelligent inspection system, automatic registration of infrared and visible light images in power scenes is a crucial research technology. Since there are obvious differences key attributes between images, direct alignment often difficult to achieve expected results. To overcome high difficulty aligning an image method proposed this paper. First, we use Sobel operator extract edge information pair. Second, feature points edges recognized by curvature...
To defend against conflict-based cache side-channel attacks, partitioning or remapping techniques were proposed to prevent set conflicts between different security domains obfuscate the locations of such conflicts. But complicate design and may result in significant performance penalties. Therefore, there have been lightweight prefetching-based schemes introduce noise confuse attackers' observation. However, we validated experimentally that relying on prefetching only is insufficient, as...
The diversity of smart city scenarios makes it difficult for Internet Things terminals (IoTT) to accurately match their differential demands computing, storage, and communication resources with general-purpose MCU chips, leading resource redundancy cost increases. Due the lack demand analysis IoT application scenarios, traditional customized chip design methods cannot be directly used IoTT chips. To address this issue, we propose building a decoupled atomic service set analyze practical...
Modern processors make use of optimization techniques such as cache and speculation mechanisms to greatly improve performance. But recent research has found that these can also be exploited by attackers perform powerful side-channel attacks. A large number cache-based attacks have been replicated enhanced over Intel X86- ARM-based architectures, but there is a relative lack on RISC-V-based architectures. Xuantie-910 BOOM are both processors. So far, cache-side channels in the unprivileged...