- Optical measurement and interference techniques
- Cold Atom Physics and Bose-Einstein Condensates
- Advanced Image and Video Retrieval Techniques
- Advanced Vision and Imaging
- Advanced Computational Techniques and Applications
- Quantum Information and Cryptography
- Robotics and Sensor-Based Localization
- Image Processing Techniques and Applications
- Infrared Target Detection Methodologies
- Opportunistic and Delay-Tolerant Networks
- Educational Research and Pedagogy
- Molecular Sensors and Ion Detection
- Advanced Optical Network Technologies
- Educational Systems and Policies
- Face and Expression Recognition
- Software-Defined Networks and 5G
- Biometric Identification and Security
- Adversarial Robustness in Machine Learning
- Machine Learning and ELM
- Chaos-based Image/Signal Encryption
- Neural Networks and Reservoir Computing
- Caching and Content Delivery
- Advanced Graph Neural Networks
- User Authentication and Security Systems
- Blockchain Technology Applications and Security
Beijing Normal University
2025
Guangzhou University
2023
Nanjing University
2019-2023
Guangxi University
2023
Beijing University of Technology
2023
Xidian University
2021
Nanjing University of Finance and Economics
2021
Zhejiang University
2019
Jiangnan University
2017
Shenzhen Institute of Information Technology
2012
Three-dimensional measurement of shiny or reflective surface is a challenging issue for optical-based instrumentations. In this paper, we present novel structured light approach direct target so as to skip the coating preprocedure. comparison with traditional image-intensity-based coding strategies like sinusoidal and line patterns, strip edges not raw image intensities are encoded in illuminated patterns. With generally better preserved than individual intensity data presence reflections,...
A photo-regulated ATP sensor coupled with cationic DQAsomes is developed for spatiotemporally controlled imaging of in the mitochondria living cells.
The kagome material ${\mathrm{CsTi}}_{3}{\mathrm{Bi}}_{5}$, which is isostructural to the extensively studied charge-density-wave (CDW) compound ${\mathrm{CsV}}_{3}{\mathrm{Sb}}_{5}$, exhibits intriguing electronic features within its two-dimensional lattices of titanium atoms. Here, we perform optical spectroscopic measurements together with first-principles calculations for single-crystalline ${\mathrm{CsTi}}_{3}{\mathrm{Bi}}_{5}$ investigate properties comprehensively. It found that...
Although several algorithms have achieved automatic registration on optical and synthetic aperture radar (SAR) images, it is still a challenge to establish enough reliable correspondences between such images due their different imaging mechanisms. For this purpose, we propose robust point-feature-based method. Considering the inherent properties of image SAR image, two gradient operators are utilized construct scale spaces extract features. A new operator defined for yielding more consistent...
The kagome material CsTi$_3$Bi$_5$, which is isostructural to the extensively studied charge density wave (CDW) compound CsV$_3$Sb$_5$, exhibits intriguing electronic features within its two-dimensional lattices of titanium atoms. Here, we perform optical spectroscopic measurements together with first-principles calculations on single-crystalline CsTi$_3$Bi$_5$ investigate properties comprehensively. It found that overall spectra are very similar those but existence CDW instability ruled out...
Previous camera self-calibration methods have exhibited certain notable shortcomings. On the one hand, they either exclusively emphasized scene cues or solely focused on vehicle-related cues, resulting in a lack of adaptability to diverse scenarios and limited number effective features. Furthermore, these utilized geometric features within traffic scenes extracted semantic information, failing comprehensively consider both aspects. This comprehensive feature extraction from scenes,...
Aimed at the problem of huge computation, large tree size and over-fitting testing data for multivariate decision (MDT) algorithms, we proposed a novel rough set-based trees (RSMDT) method. In this paper, positive region degree condition attributes with respect to in set theory is used selecting tests. And new concept extended generalization one equivalence relation corresponding another introduced construction We experimentally test RSMDT algorithm terms classification accuracy, computing...
We propose a scheme to generate the multi-photon cluster states via cavity input-output process and single-bit rotations. The method can be generalized construct series of graph states, successful probability is close unity in ideal condition.
We study the effect of Kerr medium on intrinsic decoherence a system which consists two two-level atoms and optical cavity. The entanglement is calculated by making use concurrence. Our results show that very sensitive to nonlinear coupling constant medium. Both oscillation period amplitude concurrence increase with increasing constant.
While large-scale face datasets have advanced deep learning-based analysis, they also raise privacy concerns due to the sensitive personal information contain. Recent schemes implemented differential protect datasets. However, these generally treat each image as a separate database, which does not fully meet core requirements of privacy. In this paper, we propose semantic-level protection scheme that applies entire dataset. Unlike pixel-level approaches, our guarantees semantic in faces is...
Previous camera self-calibration methods have exhibited certain notable shortcomings. On one hand, they either exclusively emphasized scene cues or solely focused on vehicle-related cues, resulting in a lack of adaptability to diverse scenarios and limited number effective features. Furthermore, these utilized geometric features within traffic scenes extracted semantic information, failing comprehensively consider both aspects. This the comprehensive feature extraction from scenes,...
We build the Utility Management System software architecture evaluation model for reducing risk of system. we got t needs, Combined with Quality Attribute Workshop method and PALM method, from main function, external cross-linking relationship development trend, so as to five dimensions architecture, including modularity, technology maturity, competition processing, independence, reliability. Then grading each dimension get model. The can realize identification early system through...
With the rapid development of scientific and technological revolution, Internet Thing systems have been widely deployed in many vertical domains such as smart cities, grids, agriculture, medical healthcare, etc. In these scenarios, it is an urgent problem to provide a high-effect IoT solution support high computation ability with strong data security privacy constraints. this paper, we propose novel secure computing platform based on blockchain crowdsourcing computation. Each sample...
Positioning UAVs with each other and maintaining formation is the key factor to achieve UAV cluster positioning. In this paper, it proposed adopt method of pure azimuth passive positioning, through part transmitting signal, receiving adjusting position, realizing The target positioning tracking problem can be divided into two problems: error control problem. Firstly, aiming at UAVs, paper uses filtering MGEKF algorithm establish basic model carry out preliminary UAVs. Secondly, because UAV,...
This paper describes a corner detection method in pseudo-random structured light pattern. In the algorithm, image is firstly convoluted with weighted Gaussian mask (WGM) which symmetry property between two neighboring rhombic elements considered. As result, proposed more suitable to detect X shape Then non-maximal suppression process carried out find candidates for corner. Record times of each position being candidate different size WGMs. Finally, fuzzy c-means (FCM) algorithm conducted...
Over the past decades, vehicular ad hoc networks (VANETs) have been a core networking technology to provide drivers and passengers with safety convenience. As new emerging technology, cloud computing (VCC) can services for various data-intensive applications in VANETs, such as multimedia streaming. However, vehicle mobility intermittent connectivity present challenges large-scale data dissemination underlying architecture. In this paper, we will explore service scheduling of virtual RSUs...
Key competency is a matter closely followed by international education reform, and the primary middle school stage an important of cultivating students' key competency.Therefore, we must strengthen research on development students.This paper first discusses related concepts competency.Secondly, it analyzes problems that arise in process students.Finally, aiming at these problems, this explores main path students, namely, optimizing teachers' skills based core accomplishment, carrying out...
Power consumption has become a key issue during the last few years and that of Internet in particular, is not negligible. With advent cloud computing exponential growth traffic with it, power an increasing concern for data centers. While power-aware algorithms have been investigated quite well wireless context, their developments wire-line networks, especially traffic-intensive centers remain to be explored. In this paper, we propose novel flow routing algorithm on premise performance...
The paper introduces the method of automatic indexing for Chinese archives. authors have made some researches on algorithms subject and classification indexing. weight function descriptors thesaurus keywords-descriptors are organized in a logical way. fuzzy relation is used