Xiaoting Zhang

ORCID: 0000-0002-5336-1956
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Optical measurement and interference techniques
  • Cold Atom Physics and Bose-Einstein Condensates
  • Advanced Image and Video Retrieval Techniques
  • Advanced Vision and Imaging
  • Advanced Computational Techniques and Applications
  • Quantum Information and Cryptography
  • Robotics and Sensor-Based Localization
  • Image Processing Techniques and Applications
  • Infrared Target Detection Methodologies
  • Opportunistic and Delay-Tolerant Networks
  • Educational Research and Pedagogy
  • Molecular Sensors and Ion Detection
  • Advanced Optical Network Technologies
  • Educational Systems and Policies
  • Face and Expression Recognition
  • Software-Defined Networks and 5G
  • Biometric Identification and Security
  • Adversarial Robustness in Machine Learning
  • Machine Learning and ELM
  • Chaos-based Image/Signal Encryption
  • Neural Networks and Reservoir Computing
  • Caching and Content Delivery
  • Advanced Graph Neural Networks
  • User Authentication and Security Systems
  • Blockchain Technology Applications and Security

Beijing Normal University
2025

Guangzhou University
2023

Nanjing University
2019-2023

Guangxi University
2023

Beijing University of Technology
2023

Xidian University
2021

Nanjing University of Finance and Economics
2021

Zhejiang University
2019

Jiangnan University
2017

Shenzhen Institute of Information Technology
2012

Three-dimensional measurement of shiny or reflective surface is a challenging issue for optical-based instrumentations. In this paper, we present novel structured light approach direct target so as to skip the coating preprocedure. comparison with traditional image-intensity-based coding strategies like sinusoidal and line patterns, strip edges not raw image intensities are encoded in illuminated patterns. With generally better preserved than individual intensity data presence reflections,...

10.1109/tie.2012.2188875 article EN IEEE Transactions on Industrial Electronics 2012-02-24

A photo-regulated ATP sensor coupled with cationic DQAsomes is developed for spatiotemporally controlled imaging of in the mitochondria living cells.

10.1039/c9sc04773e article EN cc-by-nc Chemical Science 2019-11-26

The kagome material ${\mathrm{CsTi}}_{3}{\mathrm{Bi}}_{5}$, which is isostructural to the extensively studied charge-density-wave (CDW) compound ${\mathrm{CsV}}_{3}{\mathrm{Sb}}_{5}$, exhibits intriguing electronic features within its two-dimensional lattices of titanium atoms. Here, we perform optical spectroscopic measurements together with first-principles calculations for single-crystalline ${\mathrm{CsTi}}_{3}{\mathrm{Bi}}_{5}$ investigate properties comprehensively. It found that...

10.1103/physrevb.111.075147 article EN Physical review. B./Physical review. B 2025-02-19

Although several algorithms have achieved automatic registration on optical and synthetic aperture radar (SAR) images, it is still a challenge to establish enough reliable correspondences between such images due their different imaging mechanisms. For this purpose, we propose robust point-feature-based method. Considering the inherent properties of image SAR image, two gradient operators are utilized construct scale spaces extract features. A new operator defined for yielding more consistent...

10.1109/lgrs.2021.3069761 article EN IEEE Geoscience and Remote Sensing Letters 2021-04-09

The kagome material CsTi$_3$Bi$_5$, which is isostructural to the extensively studied charge density wave (CDW) compound CsV$_3$Sb$_5$, exhibits intriguing electronic features within its two-dimensional lattices of titanium atoms. Here, we perform optical spectroscopic measurements together with first-principles calculations on single-crystalline CsTi$_3$Bi$_5$ investigate properties comprehensively. It found that overall spectra are very similar those but existence CDW instability ruled out...

10.1103/physrevb.111.075147 preprint EN arXiv (Cornell University) 2024-09-05

Previous camera self-calibration methods have exhibited certain notable shortcomings. On the one hand, they either exclusively emphasized scene cues or solely focused on vehicle-related cues, resulting in a lack of adaptability to diverse scenarios and limited number effective features. Furthermore, these utilized geometric features within traffic scenes extracted semantic information, failing comprehensively consider both aspects. This comprehensive feature extraction from scenes,...

10.3390/s23239527 article EN cc-by Sensors 2023-11-30

Aimed at the problem of huge computation, large tree size and over-fitting testing data for multivariate decision (MDT) algorithms, we proposed a novel rough set-based trees (RSMDT) method. In this paper, positive region degree condition attributes with respect to in set theory is used selecting tests. And new concept extended generalization one equivalence relation corresponding another introduced construction We experimentally test RSMDT algorithm terms classification accuracy, computing...

10.4304/jcp.7.4.870-879 article EN Journal of Computers 2012-04-01

We propose a scheme to generate the multi-photon cluster states via cavity input-output process and single-bit rotations. The method can be generalized construct series of graph states, successful probability is close unity in ideal condition.

10.1088/0256-307x/25/3/009 article EN Chinese Physics Letters 2008-03-01

We study the effect of Kerr medium on intrinsic decoherence a system which consists two two-level atoms and optical cavity. The entanglement is calculated by making use concurrence. Our results show that very sensitive to nonlinear coupling constant medium. Both oscillation period amplitude concurrence increase with increasing constant.

10.1088/0256-307x/24/6/009 article EN Chinese Physics Letters 2007-06-01

While large-scale face datasets have advanced deep learning-based analysis, they also raise privacy concerns due to the sensitive personal information contain. Recent schemes implemented differential protect datasets. However, these generally treat each image as a separate database, which does not fully meet core requirements of privacy. In this paper, we propose semantic-level protection scheme that applies entire dataset. Unlike pixel-level approaches, our guarantees semantic in faces is...

10.48550/arxiv.2412.15590 preprint EN arXiv (Cornell University) 2024-12-20

Previous camera self-calibration methods have exhibited certain notable shortcomings. On one hand, they either exclusively emphasized scene cues or solely focused on vehicle-related cues, resulting in a lack of adaptability to diverse scenarios and limited number effective features. Furthermore, these utilized geometric features within traffic scenes extracted semantic information, failing comprehensively consider both aspects. This the comprehensive feature extraction from scenes,...

10.20944/preprints202309.1690.v1 preprint EN 2023-09-26

We build the Utility Management System software architecture evaluation model for reducing risk of system. we got t needs, Combined with Quality Attribute Workshop method and PALM method, from main function, external cross-linking relationship development trend, so as to five dimensions architecture, including modularity, technology maturity, competition processing, independence, reliability. Then grading each dimension get model. The can realize identification early system through...

10.1117/12.2686872 article EN 2023-08-10

With the rapid development of scientific and technological revolution, Internet Thing systems have been widely deployed in many vertical domains such as smart cities, grids, agriculture, medical healthcare, etc. In these scenarios, it is an urgent problem to provide a high-effect IoT solution support high computation ability with strong data security privacy constraints. this paper, we propose novel secure computing platform based on blockchain crowdsourcing computation. Each sample...

10.1109/mdm58254.2023.00058 article EN 2023-07-01

Positioning UAVs with each other and maintaining formation is the key factor to achieve UAV cluster positioning. In this paper, it proposed adopt method of pure azimuth passive positioning, through part transmitting signal, receiving adjusting position, realizing The target positioning tracking problem can be divided into two problems: error control problem. Firstly, aiming at UAVs, paper uses filtering MGEKF algorithm establish basic model carry out preliminary UAVs. Secondly, because UAV,...

10.1109/iccasit58768.2023.10351663 article EN 2022 IEEE 4th International Conference on Civil Aviation Safety and Information Technology (ICCASIT) 2023-10-11

This paper describes a corner detection method in pseudo-random structured light pattern. In the algorithm, image is firstly convoluted with weighted Gaussian mask (WGM) which symmetry property between two neighboring rhombic elements considered. As result, proposed more suitable to detect X shape Then non-maximal suppression process carried out find candidates for corner. Record times of each position being candidate different size WGMs. Finally, fuzzy c-means (FCM) algorithm conducted...

10.1109/icist.2011.5765079 article EN International Conference on Information Science and Technology 2011-03-01

Over the past decades, vehicular ad hoc networks (VANETs) have been a core networking technology to provide drivers and passengers with safety convenience. As new emerging technology, cloud computing (VCC) can services for various data-intensive applications in VANETs, such as multimedia streaming. However, vehicle mobility intermittent connectivity present challenges large-scale data dissemination underlying architecture. In this paper, we will explore service scheduling of virtual RSUs...

10.3390/a10030098 article EN cc-by Algorithms 2017-08-24

Key competency is a matter closely followed by international education reform, and the primary middle school stage an important of cultivating students' key competency.Therefore, we must strengthen research on development students.This paper first discusses related concepts competency.Secondly, it analyzes problems that arise in process students.Finally, aiming at these problems, this explores main path students, namely, optimizing teachers' skills based core accomplishment, carrying out...

10.2991/icemaess-18.2018.249 article EN cc-by-nc Proceedings of the 2018 5th International Conference on Education, Management, Arts, Economics and Social Science (ICEMAESS 2018) 2018-01-01

Power consumption has become a key issue during the last few years and that of Internet in particular, is not negligible. With advent cloud computing exponential growth traffic with it, power an increasing concern for data centers. While power-aware algorithms have been investigated quite well wireless context, their developments wire-line networks, especially traffic-intensive centers remain to be explored. In this paper, we propose novel flow routing algorithm on premise performance...

10.1109/hpsr.2019.8807996 article EN 2019-05-01

The paper introduces the method of automatic indexing for Chinese archives. authors have made some researches on algorithms subject and classification indexing. weight function descriptors thesaurus keywords-descriptors are organized in a logical way. fuzzy relation is used

10.1109/wcica.2000.862555 article EN 2002-11-07
Coming Soon ...