- Imbalanced Data Classification Techniques
- Financial Distress and Bankruptcy Prediction
- Advanced Optical Sensing Technologies
- Face recognition and analysis
- Face and Expression Recognition
- Analog and Mixed-Signal Circuit Design
- Generative Adversarial Networks and Image Synthesis
- Video Surveillance and Tracking Methods
- Vehicle License Plate Recognition
- Rough Sets and Fuzzy Logic
- EEG and Brain-Computer Interfaces
- Remote Sensing and LiDAR Applications
- Advanced Vision and Imaging
- Traffic Prediction and Management Techniques
- ECG Monitoring and Analysis
- 3D Shape Modeling and Analysis
- Fire Detection and Safety Systems
- Control Systems and Identification
- Multi-Criteria Decision Making
- Grey System Theory Applications
- Remote Sensing and Land Use
- Advanced Data Compression Techniques
- Ferroelectric and Negative Capacitance Devices
- Advanced Computing and Algorithms
- Numerical Methods and Algorithms
Tongji University
2024-2025
China Internet Network Information Center
2025
Donghua University
2021-2022
ORCID
2022
School of Business and Management
2021
Wuhan University of Technology
2019-2020
Guilin University of Technology
2017
Fudan University
2012-2016
University College of Applied Science
2014
University of Shanghai for Science and Technology
2010
Face images contain many important biological characteristics. The research directions of face mainly include age estimation, gender judgment, and facial expression recognition. Taking estimation as an example, the through algorithms can be widely used in fields biometrics, intelligent monitoring, human-computer interaction, personalized services. With rapid development computer technology, processing speed electronic devices has greatly increased, storage capacity been allowing deep...
Business failure prediction is very important for the sustainable development of enterprises. Machine learning algorithms, especially ensemble have shown great economic benefits in enterprise financial early warning. However, highly imbalanced class distribution risk data and inexplainable most machine learning-based distress warning models limit their commercial application. To address above limitations, we enhance business performance by tree-ensemble a boosting manner. Moreover, to solve...
This letter proposes a novel 1.5-D algorithm for multi-channel electroencephalogram (EEG) compression. The proposed only needs to perform 1-D Discrete Wavelet Transform (DWT) rather than the 2-D version employed by previous works, and thus it results in lower computational complexity power dissipation. In this algorithm, new arranging method that exploits correlations between different sub-bands is developed concentrate energy, which causes more efficient compression using No List Set...
The use of computers to simulate facial aging or rejuvenation has long been a hot research topic in the field computer vision, and this technology can be applied many fields, such as customs security, public places, business entertainment. With rapid increase computing speeds, complex neural network algorithms implemented an acceptable amount time. In paper, optimized face-aging method based on Deep Convolutional Generative Adversarial Network (DCGAN) is proposed. method, original face image...
<div class="section abstract"><div class="htmlview paragraph">LiDAR sensors play an important role in the perception stack of modern autonomous driving systems. Adverse weather conditions such as rain, fog and dust, well some (occasional) LiDAR hardware fault may cause to produce pointcloud with abnormal patterns scattered noise points uncommon intensity values. In this paper, we propose a novel approach detect whether is generating anomalous by analyzing characteristics....
Credit card fraud imposes significant costs on both cardholders and issuing banks. Fraudsters often disguise their crimes, such as using legitimate transactions through several benign users to bypass anti-fraud detection. Existing graph neural network (GNN) models struggle with learning features of camouflaged, indirect multi-hop due inherent over-smoothing issues in deep multi-layer aggregation, presenting a major challenge detecting disguised relationships. Therefore, this paper, we...
Credit scoring is an effective tool for banks and lending companies to manage the potential credit risk of borrowers. Machine learning algorithms have made grand progress in automatic accurate discrimination good bad Notably, ensemble approaches are a group powerful tools enhance performance scoring. Random forest (RF) Gradient Boosting Decision Tree (GBDT) become mainstream methods precise RF Bagging-based that realizes enriches diversity base learners by modifying training object. However,...
Cloud detection in satellite images is a vital step for cloud/land recognition, cloud/snow discrimination, and cloud shadow removal. Accurate plays an important role land resource management, environmental pollution monitoring, target recognition. Deep learning (DL) algorithms have shown great progress detection. However, as the complexity of DL-based model increases, efficiency decreases. models are unable to successfully balance performance-efficiency tradeoff. In our study,...
Face detection has been an independent technology playing important role in more and fields, which makes it necessary urgent to have its architecture reconfigurable meet different demands on capabilities. This paper proposed a face architecture, could be adjusted by the user according background, sensor resolution, accuracy speed situations. adjustable mode reconfiguration simple efficient, is especially suitable for portable mobile terminals whose working condition often changes frequently....
Objective:To discuss the characteristic of clinical pathological voice and feasibility computer automatic identification voice.Method:A total 129 patients with polyp vocal cord were selected as group, while a 125 people normal from community control group. Praat software was used to collect analyze related acoustic parameter values two groups cases, including Jitter, Shimmer, harmonic noise ratio (HNR), signal (SNR), normalized energy (NNE). Pathological group training set testing for neural...
A configurable Support Vector Machine (SVM) predicting hardware accelerator applied to biological signal processing is presented in this paper. There are different types of kernel functions SVM, and our design can realize three kernels (linear, polynomial, RBF). Choosing spectral energy as the input data, range usually very large. So data should first take logarithm order narrow scope. What's more, exponential function also needed RBF kernel. Therefore, a CORDIC-based generator which...
The Open Geospatial Consortium (OGC) Geography Markup Language (GML) explicitly represents geographical spatial knowledge in text mode. All kinds of fuzzy problems will inevitably be encountered expression. Especially for those expressions mode, this fuzziness broader. Describing and representing GML seems necessary. Three can found: element fuzziness, chain attribute fuzziness. Both belong to the reflection between elements and, then, representation replaced by GML. On basis vague soft set...
This paper proposed a 2-D electrocardiogram (ECG) compression core based on no list set partitioning in hierarchical trees (NLSPIHT) algorithm. The hardware solution presented here exploits the fact that ECG signals generally reveal both spatial and temporal redundancy. In order to reduce cost, tiling approach is adopted implement efficient low-cost circuits. Evaluated SMIC 65-nm process, 7 kHz compressor with 64×64 tile draws only 12.9-μW, which more favorably portable battery-driven...
According to the characteristics of interferogram, we design a new spike detection method, which firstly filters an interferogram with two different ways and then detects spikes based on both results. Theoretical analysis computer simulation shows that this algorithm performs well in detecting any position high accuracy, can be easily implemented hardware.
In order to realize the real-time face recognition in video by embedded system,the design scheme of fast system based on TI TMS320DM642 was presented,and optimization policy proposed terms both hardware and software.Firstly,effective features were selected,and algorithm detection briefly introduced,then according algorithm,the function units described.Finally,the transplanted onto system,then applied,and implemented.The experimental results demonstrate works reliably,the running speed...
As wetland is one of the richest ecosystems in bio-diversity and most important survival environment humans, quite a large amount multi-temporal data need to be processed dynamic monitoring based on satellite remote sensing, which brings five contradictory factors such as cost, accuracy, technology, time-consumption pollution. Using Minjiang river estuary example, this paper proposes sensing image classification method theory vague soft set similarity measures-Topsis decision-making....
Establishing precise credit scoring models to predict the potential default probability is vital for risk management. Machine learning models, especially ensemble approaches, have shown substantial progress in performance improvement of scoring. The Bagging approach improves by optimizing prediction variance while boosting algorithms reduce error controlling bias. In this study, we propose a hybrid method that combines advantages strategy and optimization pattern, which can well balance...