- Advanced Data Storage Technologies
- Chaos-based Image/Signal Encryption
- Advanced Steganography and Watermarking Techniques
- Caching and Content Delivery
- Cryptography and Data Security
- Scheduling and Optimization Algorithms
- Industrial Vision Systems and Defect Detection
- Interconnection Networks and Systems
- Advanced Computational Techniques and Applications
- Distributed and Parallel Computing Systems
- Landslides and related hazards
- Optimization and Packing Problems
- Advanced Manufacturing and Logistics Optimization
- Parallel Computing and Optimization Techniques
- Evaluation Methods in Various Fields
- Topic Modeling
- Natural Language Processing Techniques
- Digital Media Forensic Detection
- Web Applications and Data Management
- Imbalanced Data Classification Techniques
- DNA and Biological Computing
- Greenhouse Technology and Climate Control
- Explainable Artificial Intelligence (XAI)
- Remote-Sensing Image Classification
- Mathematical Approximation and Integration
Huazhong University of Science and Technology
2006-2024
Chengdu University of Information Technology
2012-2024
Science and Technology Department of Sichuan Province
2021-2024
Zhejiang University of Science and Technology
2022
Huaqiao University
2011-2020
Hunan Normal University
2020
Guangdong Work Injury Rehabilitation Hospital
2018
Chinese Academy of Sciences
2010
Institute of Scientific and Technical Information
2004
Objective: This paper presents an asynchronous electrooculography (EOG)-based human-machine interface (HMI) for smart home environmental control with the purpose of providing daily assistance severe spinal cord injury (SCI) patients. Methods: The proposed HMI allows users to interact a environment through eye blinking. Specifically, several buttons, each corresponding command, randomly flash on graphical user interface. Each buttons functions as visual cue blink. To issue can blink...
Fabric quality plays a crucial role in modern textile industry processes. How to detect fabric defects quickly and effectively has become the main research goal of researchers. The You Only Look Once (YOLO) series networks have maintained dominant position field target detection. However, detecting small-scale objects, such as tiny targets defects, is still very challenging task for YOLOv4 network. To address this challenge, paper proposed an improved detection algorithm: using combined data...
The use of artificial intelligence within the healthcare sector is consistently growing. However, majority deep learning-based AI systems are a black box nature, causing these to suffer from lack transparency and credibility. Due widespread adoption medical imaging for diagnostic purposes, industry frequently relies on methods that provide visual explanations, enhancing interpretability. Existing research has summarized explored usage explanation in domain, providing introductions have been...
As technology advances both in increasing bandwidth and reducing latency for I/O buses devices, moving data in/out memory has become critical. In this paper, we have observed the different characteristics of CPU reference behavior, found potential benefits separating from data. We propose a DMA cache technique to store dedicated on-chip storage present two designs. The first design, Decoupled Cache (DDC), adopts additional as buffer second Partition-Based (PBDC), does not require storage,...
Deep learning has been applied in various fields for its effective and accurate feature capabilities recent years. Currently, information extracted from remote sensing images with the methods become most relevant research area developed precision. In terms of developing segmentation precision reducing calculation power consumption, improved deep have received more attention, improvement semantic architectures a popular solution. This presents method named D-DenseNet new structure road...
We present a new class of erasure codes size n×n (n is prime number) called T-code, family simple, highly fault tolerant XOR-based for storage systems (with tolerance up to 15). T-code not maximum distance separable (MDS), but has many other advantages, such as high tolerance, simple computability, and efficiency coding decoding. Because its superior quantity over the system, this technology more suited in RAID or dRAID systems.
As network speed continues to grow, new challenges of processing are emerging. In this paper, we first study the overheads and interactions among different steps networking from a hardware perspective point out that I/O related memory have become main bottlenecks performance promotion. Then based on analysis, show conventional optimizing solutions insufficient due architecture limitations. Motivated by studies, propose an improved Direct Cache Access (DCA) scheme combined with Integrated NIC...
Symbols are considered as the language of a map; hence, accurate understanding meaning symbols is crucial when obtaining geographical information from map: symbolisation spatial data key importance in cartography. A system (GIS) provides convenient mapping platform and powerful functions for symbolisation, while presence various standards impedes maps sharing map information. On other hand, available GIS platforms find it difficult to deal with automatic conversion between different...
Abstract Deformation development of landslides is a complex process that usually requires the deployment various monitoring devices on slope to obtain data from multiple sources for effective analysis. Only through this can an accurate judgment be made regarding entire evolutionary trend deformation. Monitoring obtained sensors have certain degree correlation, randomness, and redundancy. The processing these crucial providing warnings. Given machine learning adept at uncovering implicit...
For applications such as intelligent retrieval systems and question answering systems, named entity recognition is a fundamental crucial sub-task.The fine-grained task, opposed to the conventional coarse-grained more in line with requirements of real-world requires models better feature extraction capabilities. Most current Chinese only consider semantic aspects text ignore its spatial features. To address this issue, paper proposes deep learning-based model that uses BERT pre-trained...
Text similarity is an important criterion for achieving text retrieval.Compared to neural networks that require a large amount of data training, character based calculation more suitable in small datasets. In this paper, we propose optimize the formula Jaccard coefficient view missing judgment existing algorithms such as cosine distance and Edit distance. Firstly, denominator original was modified avoid impact caused by length database formula. At same time, between intersecting characters...
Most of secret image sharing schemes are follow the idea classic Shamir scheme, namely (k,n) threshold scheme based on one-variable polynomial. Which succeed much advantages such as implentment easily, both have features Perfect and Ideal so on. But those regard images data stream, not adequately consider matrix characteristics digital image. In view this situation, paper proposed a new bivariate polynomial, besides has most access structure in been greatly enriched. And important, is more...
Abstract Secret image sharing is an attractive research problem in information security filed. After more than ten years of development, secret has become a relatively independent area. Most current scheme used Lagrange interpolation Shamir as the core idea, but which way will greatly reduce computational efficiency and system availability without doubt because huge amount data images. According to internal relationship between coding theory technology, paper proposed based on theory. In...
A Multi Secret Image sharing scheme can share several secret images among certain participators securely. Boolean-based schemes are one kind of method with light-weighted computation compared to the previous complex algebraic-based methods, which realize multi images. However, existing mostly restricted particular case (2, n) and (n, n), only few study general access structure, shares meaningless. In this paper, a new structure is proposed. All meaningful, avoid attracting attention...
Memory trace analysis is an important technology for architecture research, system software (i.e., OS, compiler) optimization, and application performance improvements. Hardware-snooping effective efficient approach to monitor collect memory traces. Compared with software-based approaches, traces collected by hardware-based approaches are usually lack of semantic information, such as process/function/loop identifiers, virtual address I/O access. In this paper we propose a hybrid...
The erasure codes are widely used in the distributed storage with low redundancy compared to replication method. However, current research studies about mainly focus on encoding methods, while there few decoding methods. In this paper, a novel method is proposed; it general and can be both over multivariate finite field binary field. of failures realized based transforming process transformation matrix, convenient avoid overburdened visiting problem by tiny modification correctness proved...