- Distributed Control Multi-Agent Systems
- Internet Traffic Analysis and Secure E-voting
- Peer-to-Peer Network Technologies
- Robotic Path Planning Algorithms
- Network Security and Intrusion Detection
- Adaptive Control of Nonlinear Systems
- Neural Networks and Applications
- Caching and Content Delivery
- Higher Education and Teaching Methods
- Advanced Steganography and Watermarking Techniques
- Biometric Identification and Security
- Network Traffic and Congestion Control
- User Authentication and Security Systems
- Advanced Malware Detection Techniques
- Digital Media Forensic Detection
- Advanced Decision-Making Techniques
- Advanced Numerical Methods in Computational Mathematics
- Neural Networks Stability and Synchronization
- Numerical methods for differential equations
- Quantum Computing Algorithms and Architecture
- Chaos-based Image/Signal Encryption
- AI and Big Data Applications
- Quantum Information and Cryptography
- Face recognition and analysis
- Advanced Computational Techniques and Applications
Jiujiang University
2022-2024
Shandong Normal University
2022-2023
Weifang University of Science and Technology
2023
Kunming Children's Hospital
2022
Shanghai University
2022
University of International Relations
2020-2022
Nanjing University of Aeronautics and Astronautics
2022
Shanghai Polytechnic University
2016-2021
Beijing Information Science & Technology University
2020
Hefei National Center for Physical Sciences at Nanoscale
2015-2019
The fundamental principle of artificial intelligence is the ability machines to learn from previous experience and do future work accordingly. In age big data, classical learning often require huge computational resources in many practical cases. Quantum machine algorithms, on other hand, could be exponentially faster than their counterparts by utilizing quantum parallelism. Here, we demonstrate a algorithm implement handwriting recognition four-qubit NMR test bench. learns standard...
Peer-to-peer (P2P) computing has emerged as a popular model aiming at further utilizing Internet information and resources, complementing the available client-server services. However, mechanism of peers randomly choosing logical neighbors without any knowledge about underlying physical topology can cause serious mismatching between P2P overlay network network. The problem brings great stress in infrastructure greatly limits performance gain from various search or routing techniques....
Iris is claimed to be one of the best biometrics. We have collected a large data set iris images, intentionally sampling range quality broader than that used by current commercial recognition systems. re-implemented Daugman-like algorithm developed Masek. also and implemented an improved segmentation eyelid detection stage algorithm, experimentally verified improvement in performance using dataset. Compared Masek's original approach, our leads increase over 6% rank-one rate.
Peer-to-peer (P2P) computing has emerged as a popular model aiming at further utilizing Internet information and resources. However, the mechanism of peers randomly choosing logical neighbors without any knowledge about underlying physical topology can cause serious mismatch between P2P overlay network network. The problem brings great stress in infrastructure. It greatly limits performance gain from various search or routing techniques. Meanwhile, due to inefficient topology, flooding-based...
This paper describes the Iris Challenge Evaluation (ICE) 2005. The ICE 2005 contains a dataset of 2953 iris images from 132 subjects. data is organized into two experiments: right and left eye. recognition performance presented for twelve algorithms nine groups that participated in For top performers, verification rate on above 0.995 at false accept 0.001. iris, corresponding rates are between 0.990 results challenge problem were first to observe correlations irises match non-match scores,...
In this paper, formation tracking control based on potential field is studied. The objective to a group of agents track desired trajectory while maintaining given in nonomniscient constrained space. Aiming at purpose, the average all agents' positions viewed as virtual leader, and task translated into that controlling leader center formation. situation where may not have global environmental information will lead they avoid collisions with unexpected spatial constraints. By introducing...
In this paper, the formation tracking control is studied for a multiagent system (MAS) with communication limitations. The objective to group of agents track desired trajectory while maintaining given in nonomniscient constrained space. role switching triggered by detection unexpected spatial constraints facilitates efficiency event-triggered bandwidth, energy consumption, and processor usage. A coordination mechanism proposed based on novel "coordinator" indirectly spread environmental...
This paper investigates the event-triggered-based adaptive bipartite finite-time tracking control problem of nonlinear nonstrict-feedback coopetition multi-agent systems (MASs) with time-varying disturbances. First, major design difficulties generated by entirely unknown functions containing all states are solved utilizing approximation property radial basis function neural networks (RBF NNs) and structural feature Gaussian functions. Then in backstepping procedure, issue "explosion...
In this brief, a vision-based tracking scheme is studied for the leader-follower formation control of multiagent system under visibility constraints without communication among agents. A kinect sole sensor installed on each agent to estimate pose, including relative orientations and positions local leader. dipolar vector field established generate maintain desired given displacement The are converted into input constrains pose leader, an auxiliary designed analyze effect constraints....
Traditional sports information processing methods often rely on manual observation and recording. This method is not only inefficient, but also susceptible to subjective bias, which affects the accuracy reliability of data. In this paper, a physiological condition monitoring system based multimedia computer constructed, deeply integrates technology, technology biomedical sensing technology. Through integration advanced processors variety biosensors, can collect, process analyze data...
In this paper, a novel Formation Potential Field method is proposed for the multi-agent formation control. The objective to control group of agents automatically generate and maintain specific while avoiding internal collisions with spatial constraints. A designed combining multiple local attractive potential fields repulsive fields. To further relax requirements agents' initial positions enhance robustness, global field added outside influence range Field. optimality scheme in time analysed...
It is difficult to calculate the energy levels and eigenstates of a large physical system on classical computer because exponentially growing size Hilbert space. In this work, we experimentally demonstrate quantum algorithm which could solve problem via simulated resonant transitions. Using four-qubit simulator in two qubits are used as ancillas for control measurement, obtain spectrum 2-qubit low-energy effective Hamiltonian water molecule. The transitions allow state transform access...
Overlay networks provide base infrastructures for many areas including multimedia streaming and content distributions. Since most overlay are highly decentralized self-organized, cut vertices may exist in such systems due to the lack of centralized management. A vertex is defined as a network node whose removal increases number components. Failure these nodes can break an into large disconnected components greatly downgrade upper layer services like media streaming. We propose here...
In this paper, we present a novel approach for tracking control with switching formation in nonomniscient constrained space multiagent system (MAS). The introduction of results from the situation where MAS is maneuvering restricted path which often case real world application. preplanned trajectory may be inaccurate due to lack sufficient environmental information. case, agents have rapidly avoid collisions unexpected obstacles or even switch guarantee passability. A concept avoidless...
Iris is an important biometric method with high reported accuracy. However, current iris recognition systems require substantial user cooperation in the image acquisition. Relatively little known about how might perform less stringent control of quality. We have re-implemented a Daugman-like matchingmethod, and evaluated its performance on dataset over 12,000 images from 300 persons, different qualities. find overall rank-one rate using 89.64%. Poor quality account for most instances...
Multihoming technology can be traced back to the 1980s or even earlier, but it seldom drew much attention from research community. Recently, with explosive deployment of multihoming on Internet, researchers have started investigate issues that were raised by networks. This article draws an overall picture technology, presents current networks, and discusses must studied in future
Analysis of mouse-interaction behaviors for identifying individual computer users has experienced growing interest from information security and biometric researchers. This paper presents a simple efficient user verification system by modeling behavior, which is accurate competent future deployment. For each mouse-operation sample, holistic attributes mouse trajectories are first analyzed using power transformation method, to derive schematic representation behavior eigenspace. Then,...
Due to the randomness and time dependence of factors affecting software reliability, most reliability models are treated as stochastic processes, non-homogeneous Poisson process (NHPP) is used one. However, failure behavior does not follow NHPP in a statistically rigorous manner, pure random method might be enough describe behavior. To solve these problems, this paper proposes new integrated approach that combines grey system theory software. A model put forward discrete form, grey-based for...
Use cases are widely used to describe requirements be validated by users and builders drive the software development process. However, use only define functional requirements, leaving out global properties that affect whole or part of system. Furthermore, crosscutting nature some is not handled. This approach based on we map non-functional into function architectures through scenario template. It improves modularity in which make it possible begin tackling problem tangling, scattering...
In previous implementations of adiabatic quantum algorithms using spin systems, the average Hamiltonian method with Trotter's formula was conventionally adopted to generate an effective instantaneous that simulates passage. However, this approach had issues precision and adiabaticity evolution. order address these, we here propose experimentally demonstrate a novel scheme for computation by intrinsic realistic system represent problem while adiabatically driving extrinsic directly induced...
A cut vertex is defined as a network node whose removal increases the number of components. Failure disconnects component and downgrades performance. Overlay networks are resilient to failure random nodes, but vertices that have been observed in real-world overlay traces make very vulnerable well-constructed targeted attacks. Traditional methods detecting centralized difficult, if not impossible, be applied large-scale highly dynamic networks. We aim provide practical solution by proposing...
Multicast services are demanded by a variety of applications. Many applications require anonymity during their communication. However, there has been very little work on anonymous multicasting and such not available yet. Since fundamental differences between multicast unicast, the solutions proposed for in unicast communications cannot be directly applied to In this paper, we define system, propose mutual (MAM) protocol including design construction optimization an tree. MAM is self...