- Chaos-based Image/Signal Encryption
- Advanced Steganography and Watermarking Techniques
- Cryptography and Residue Arithmetic
- Coding theory and cryptography
- VLSI and FPGA Design Techniques
- Cryptography and Data Security
- CCD and CMOS Imaging Sensors
- Advanced Neural Network Applications
- Spinal Fractures and Fixation Techniques
- Cryptographic Implementations and Security
- Advanced Image and Video Retrieval Techniques
- Sparse and Compressive Sensing Techniques
- Embedded Systems Design Techniques
- Thin-Film Transistor Technologies
- Advanced Memory and Neural Computing
- Parallel Computing and Optimization Techniques
- VLSI and Analog Circuit Testing
- Soft Robotics and Applications
- Surgical Simulation and Training
- Antenna Design and Optimization
- Speech and Audio Processing
- Advancements in Semiconductor Devices and Circuit Design
- Direction-of-Arrival Estimation Techniques
- Spine and Intervertebral Disc Pathology
- Vehicular Ad Hoc Networks (VANETs)
Guangdong University of Technology
2015-2025
Xiamen Medical College
2022-2023
Huazhong University of Science and Technology
2023
Tongji Hospital
2023
Conference Board
2021-2022
Xi’an Jiaotong-Liverpool University
2021
Guangxi University of Finance and Economics
2021
Sichuan Cancer Hospital
2019-2020
Sichuan Provincial Hospital of Traditional Chinese Medicine
2020
Jiangxi Normal University
2011
In the field of robotics, soft robots have been showing great potential in areas medical care, education, service, rescue, exploration, detection, and wearable devices due to their inherently high flexibility, good compliance, excellent adaptability, natural safe interactivity. Pneumatic occupy an essential position among because features such as lightweight, efficiency, non-pollution, environmental adaptability. Thanks its mentioned benefits, increasing research interests attracted...
Purpose The purpose of this paper is to develop a human activity-aware adaptive shared control solution for human–robot interaction in surgical operation. Hands-on and teleoperation are two main procedures switched frequently teleoperated minimally invasive surgery (MIS). detailed activity the can be defined recognized using sensor information. In paper, novel continuous method proposed manipulators with Cartesian impedance scenario. Design/methodology/approach A by adjusting weight function...
Recently, to conquer most non-plain related chaos-based image cryptosystems’ security flaws that cannot resist the powerful chosen/knownn plain-text attacks or differential efficiently for less plaintext sensitivity, many plain cryptosystems have been developed. Most adopted traditional permutation–diffusion structure still some drawbacks and flaws: (1) encryption schemes using only confusion operation diffusion relate inadequately achieve high sensitivity; (2) in algorithms, generation of...
Recently, a variety of chaos-based image encryption algorithms adopting the traditional permutation-diffusion structure have been suggested. Most these cannot resist powerful chosen-plaintext attack and chosen-ciphertext efficiently for less sensitivity to plain-image. This paper presents symmetric color system based on plaintext-related random access bit-permutation mechanism (PRRABPM). In proposed scheme, new is used shuffle 3D bit matrix transformed from an original image, making RGB...
Abstract In this paper, a secure plaintext‐related image encryption scheme based on compressive sensing and tent‐sine system is proposed. First, the discrete wavelet transform (DWT) used to plain get coefficient matrix. Second, several chaotic sequences generated by map are scramble matrix construct measurement Afterward, performed obtain small‐sized encrypted image. Finally, an related plaintext designed. particular, proposed uses original information participate in process, ensuring high...
Abstract Tumor‐associated macrophages (TAMs) play critical roles in reprogramming other immune cells and orchestrating antitumor immunity. However, the interplay between TAMs tumor responsible for enhancing evasion remains insufficiently understood. Here, we revealed that interleukin (IL)‐1β was among most abundant cytokines within vitro tumor‐macrophage coculture system, enhanced IL‐1β expression associated with impaired cytotoxicity of CD8 + T human ovarian cancer, indicating possibility...
By leveraging the power of open-source software, EDA tool offers a cost-effective and flexible solution for designers, researchers, hobbyists alike. Open-source promotes collaboration, innovation, knowledge sharing within community. It emphasizes role toolchain in accelerating development electronic systems, reducing design costs, improving quality. This paper presents an project, iEDA, aiming to build basic infrastructure technology evolution closing industrial-academic gap area. As...
Abstract In telemedicine, diverse medical images transmitted between doctors and patients contain sensitive personal information. Thus, there is an urgent need for reliable efficient image encryption to protect these during transmission. this paper, a simultaneous permutation diffusion framework (SPDF) introduced based on new chaotic map. Firstly, combining the Chebyshev map iterative with infinite collapse (ICMIC), we propose one-dimensional system (1D-CICMIC) which exhibits higher...
In FPGA routing, machine learning-based optimization methods have achieved improved routing solutions by integrating traditional heuristics with predictive capabilities. However, these approaches mostly relied on single-task learning models black-box nature and often neglected the complex trade-offs inter-dependencies between metrics. To address limitations, this paper introduces a novel multi-task method. congestion-wirelength co-learning stage, simultaneous prediction of congestion...
Summary 1. It has been reported that resveratrol exerts the inhibitory effects on aging through activation of sirtuin 1 (SIRT1) and dimethylarginine dimethylaminohydrolase (DDAH)/asymmetric (ADMA) pathway involved in high glucose‐induced endothelial cell senescence. 2. The aims this work were to explore whether BTM‐0512, a novel derivative resveratrol, was able exert beneficial effect cellular senescence regulating DDAH/ADMA regulatory BTM‐0512 related SIRT1. 3. model cells induced by...
In this paper, a low hardware consumption design of elliptic curve cryptography (ECC) over GF(p) in embedded applications is proposed. The adder-based architecture explored to reduce the performing scalar multiplication (SM). Interleaved Modular Multiplication Algorithm and Binary Inversion are improved implemented with two full-word adder units. register units for data storage also optimized. based on twelve pipeline structure was Xilinx Virtex-4 platform. Design Compiler used synthesized...
The security of smart devices is facing great challenges. This article presents a new hybrid cipher framework suitable for such devices. Using software/hardware (SW/HW) co-design method, an efficient encryption/decryption and digital signature scheme based on SM2, SM3, SM4 algorithms implemented. First, the partitioned into software hardware parts analysis result pure solution overhead under conditions design constraints. Second, flow whole embedded are realized by SW/HW co-design. Finally,...
Elliptic curve cryptography (ECC) is widely used in practical applications because ECC has far fewer bits for operands at the same level of security than other public-key cryptosystems such as RSA. The performance an processor usually determined by modular multiplication (MM) and point (PM) operations. For recommended prime field, MM operation can consist fast reduction In this paper, a 256-bit implemented 129-bit (half-word) multiplier using Karatsuba–Ofman algorithm. modulo operation,...
Placement is essential in very large-scale integration (VLSI) physical design, as it directly affects the design cycle. Despite extensive prior research on placement, achieving fast and efficient placement remains challenging because of increasing complexity. In this paper, we comprehensively review progress optimization from perspective accelerating VLSI design. It can help researchers systematically understand problem corresponding means, thereby advancing modern research. We highlight...
In this article, a new low-profile broadband circularly polarized antenna with single-layer metasurface is designed. The composed of 4 × rotated rectangle-loops. Compared to single rectangle, introducing inner-cut rectangle slot can increase the design flexibilities by changing size for wider operating bandwidth and reduce in same frequency. proposed has advantages wide 3-dB axial ratio from 5.4 6.05 GHz an excellent 10-dB impedance 5 GHz.