Zhiming Wang

ORCID: 0000-0002-6003-1453
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Image and Video Retrieval Techniques
  • Image Retrieval and Classification Techniques
  • Image and Signal Denoising Methods
  • Advanced Image Fusion Techniques
  • Advanced Image Processing Techniques
  • Network Traffic and Congestion Control
  • Advanced Steganography and Watermarking Techniques
  • Mobile Ad Hoc Networks
  • Advanced Vision and Imaging
  • Software-Defined Networks and 5G
  • Image Processing Techniques and Applications
  • Medical Image Segmentation Techniques
  • Opportunistic and Delay-Tolerant Networks
  • Human Motion and Animation
  • Video Surveillance and Tracking Methods
  • Handwritten Text Recognition Techniques
  • Multimodal Machine Learning Applications
  • Simulation and Modeling Applications
  • Image Enhancement Techniques
  • Neural Networks Stability and Synchronization
  • Domain Adaptation and Few-Shot Learning
  • Face recognition and analysis
  • Advanced Optical Network Technologies
  • Digital Media Forensic Detection
  • Chaos-based Image/Signal Encryption

Tsinghua University
2005-2025

Jinhua Polytechnic
2022-2023

National Engineering Research Center for Information Technology in Agriculture
2021-2023

Xi'an University of Science and Technology
2023

Feng Chia University
2019-2021

Shandong University of Science and Technology
2019

Xidian University
2018

University of Science and Technology Beijing
2011-2017

Chongqing University
2015-2016

Chinese PLA General Hospital
2016

This in-vitro study aimed to evaluate the fracture resistances and failure modes of endodontically treated mandibular premolars restored with endocrowns conventional post-core retained crowns.MATERIALS AND METHODS.Thirty were assigned into three groups (n=10): GI, intact teeth; GE, teeth endocrowns; GC, supported crowns.Except for in group all specimens cut 1.5 mm above cementoenamel junction treated.Both crowns fabricated from lithium-disilicate blocks using a CEREC 3D CAD/CAM unit.All...

10.4047/jap.2016.8.6.489 article EN The Journal of Advanced Prosthodontics 2016-01-01

Distributed control plane is a promising approach to scalable software-defined networking (SDN). However, traffic changes could incur load imbalance among individual controllers. Live migration of switches from controllers that are overloaded those underutilized may be solution handle peak switch using available resource. Such has performed with well-defined mechanism fully utilize the resource In this paper, we study decide which and where it should migrated for balanced plane, define as...

10.1109/ifipnetworking.2015.7145319 article EN 2015-05-01

10.1109/tcsvt.2025.3526236 article EN IEEE Transactions on Circuits and Systems for Video Technology 2025-01-01

10.1016/j.jnca.2016.03.018 article EN Journal of Network and Computer Applications 2016-03-31

In this paper, we provide a novel reversible data hiding method using adaptive block truncation coding based on an edge-based quantization (ABTC-EQ) approach. We exploit the characteristic not being used in ABTC-EQ. To accomplish this, first utilized Canny edge detector to obtain image and classify each cover into two versions, edge-block non-edge-block. Subsequently, k-means clustering was three levels derive corresponding bit map while current processing case of edge-block. Then Zero-Point...

10.3390/sym11060765 article EN Symmetry 2019-06-05

Hiding a message in compression codes can reduce transmission costs and simultaneously make the more secure. This paper presents an adaptive reversible data hiding scheme that is able to provide large embedding capacity while improving quantity of modified images. The proposed employs quantization level difference (QLD) interpolation technique adaptively embed secret information into pixels each absolute moment block truncation coding (AMBTC)-compressed block, except for positions two...

10.3390/app11020635 article EN cc-by Applied Sciences 2021-01-11

There are thousands of observation satellites orbiting the earth, each which captures massive-scale photographs covering millions square kilometers everyday. In practice, these aerial photos with ultra-high-definitions (UHD) and may contain tens to hundreds ground objects ( <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">e.g</i> ., vehicles rooftops). Understanding multiple categories a rich variety UHD is an indispensable technique for many...

10.1109/tgrs.2023.3334699 article EN IEEE Transactions on Geoscience and Remote Sensing 2023-01-01

In this paper, the state feedback control of linear singularly perturbed plant is studied, where sensor and controller/actuator are connected via a network transmission frequency constant. terms model-based control, model in system added at to stabilize original with periodically updating its by actual provided sensor. Moreover, under some certain conditions, independent small parameter, existence bound parameter shown guarantee globally exponential stability whole closed-loop system....

10.1109/chicc.2008.4605242 article EN 2008-07-01

When MANET is connected into the Internet, gateways are entry points of all traffic between hybrid networks. Usually, a large amount load may become concentrated in some and congestion occurs. To resolve this problem, paper proposes balancing routing algorithm, called LBRA, to distribute among multiple gateways. Through simulation, we show that proposed algorithm can uniformly suppress increase path length at most 20% compared shortest routing.

10.1109/icact.2014.6778987 article EN 2014-02-01

With network virtualization more and popular, how to protect the virtual networks (VNs) from a single substrate link failure is increasingly important. Existing protection schemes like dedicated backup shared backup, suffer high resource cost delayed recovery, respectively. To offer instantaneous recovery with less redundant resource, in this paper, we propose coding-aware VN mapping framework which applies coding on for first time. This algorithm includes two mechanisms their corresponding...

10.1109/icc.2014.6883785 article EN 2014-06-01

Aiming at the problem of image noise level estimation, this paper proposes an algorithm for estimation by singular value decomposition and neural network.The larger (head) parts values are mainly affected main structure image, rest (tail) intensity noise.With increase level, corresponding tail increased.So, should be good characteristics estimation.Firstly, we add different with known on a batch free images, then select certain number fixed size blocks which standard deviation minimum from...

10.2991/meita-15.2015.126 article EN cc-by-nc 2015-01-01

3D human pose estimation has a broad range of applications, including anomaly detection and animation creation. Despite that significant progress on relative research been made during the past decades, producing precise smooth estimations for input videos still remains challenging mainly because its ill-posed attributes. In this paper, we propose HiMoReNet, post-processing motion refinement neural network based an elaborate hierarchical architecture. Firstly, distinguish characteristic...

10.1109/lsp.2023.3295756 article EN IEEE Signal Processing Letters 2023-01-01

10.3724/sp.j.1089.2019.17845 article EN Journal of Computer-Aided Design & Computer Graphics 2019-01-01

Multimedia services are predominant in current wireless networks and becoming ubiquitous the upcoming 5G era which video quality of experience (QoE) is a fundamental metric. However, no widely accepted QoE model exists due to its subjective nature. This paper proposes framework for quantifying multimedia content based on facial expression approach, can directly reflect end users’ intrinsic attitudes toward services. To achieve this objective, face database established containing over one...

10.1109/mmul.2018.2879596 article EN IEEE Multimedia 2018-11-06

Unsupervised domain adaptation (UDA) becomes more and popular in tackling real-world problems without ground truths of the target domain. Though tedious annotation work is not required, UDA unavoidably faces two problems: 1) how to narrow discrepancy boost transferring performance; 2) improve pseudo producing mechanism for self-supervised learning (SSL). In this paper, we focus on semantic segmentation tasks. Firstly, introduce adversarial into style gap bridging keep information from...

10.1109/icassp43922.2022.9746095 article EN ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2022-04-27

Noise variation is an important parameter for many image denoising algorithms. This paper proposed a new two-step noise estimation algorithm based on segmentation. In the first step, noisy was smoothed and segmented by statistical region merge (SRM) algorithm. Then of every computed, some regions were selected rule to estimate variation. second filter, segmentation parameters revised according estimated variation, cycle performed obtain more accurate estimation. Experimental results large...

10.1109/csa.2013.152 article EN International Conference on Computer Sciences and Applications 2013-12-01

Text-To-Visual speech (TTVS) synthesis by computer can increase the intelligibility and make human-computer interaction interfaces more friendly. This paper describes a Chinese text-to-visual system based on data-driven (sample based) approach, which is realized short video segments concatenation. An effective method to construct two visual confusion trees for initials finals developed. A co-articulation model distance hardness factor proposed, be used in recording corpus sentence selection...

10.1360/jos161054 article EN Journal of Software 2005-01-01

In complex background, conventional automatic video-text location methods can not robustly locate text. A robust method is proposed in this paper. It be divided into two stages. the first stage, an unsupervised paradigm based on wavelet applied to obtain candidate text region. second traversing line with its aptitude spectrum introduced and create boundary for each line. Experiment demonstrates that our scheme of various color, font, sizes image

10.1109/icbecs.2010.5462313 article EN International Conference on Biomedical Engineering and Computer Science 2010-04-01

On the tie-line of interconnected power systems, there inevitably exist fluctuations. Overlarge undulations on tie-lines threaten stability and security system. It is remarkable that when control areas are larger, situation becomes more austere. In this paper, based practical data two large stochastic fluctuations tie-line, only 1000kV AC transmission line in China, analyzed by frequency-domain methods. found component with a specific period prominent The cause special phenomenon then...

10.1109/appeec.2013.6837142 article EN 2013-12-01

This paper proposes a new protocol CDS, which is based on modification of DSR routing protocol. CDS leverages collaboration to optimize bottleneck and improve the whole performance transmission path. The simulation result NS2 indicates that outperforms full path collaborative

10.1109/uic-atc-scalcom-cbdcom-iop.2015.121 article EN 2015-08-01
Coming Soon ...