- Advanced Image and Video Retrieval Techniques
- Image Retrieval and Classification Techniques
- Image and Signal Denoising Methods
- Advanced Image Fusion Techniques
- Advanced Image Processing Techniques
- Network Traffic and Congestion Control
- Advanced Steganography and Watermarking Techniques
- Mobile Ad Hoc Networks
- Advanced Vision and Imaging
- Software-Defined Networks and 5G
- Image Processing Techniques and Applications
- Medical Image Segmentation Techniques
- Opportunistic and Delay-Tolerant Networks
- Human Motion and Animation
- Video Surveillance and Tracking Methods
- Handwritten Text Recognition Techniques
- Multimodal Machine Learning Applications
- Simulation and Modeling Applications
- Image Enhancement Techniques
- Neural Networks Stability and Synchronization
- Domain Adaptation and Few-Shot Learning
- Face recognition and analysis
- Advanced Optical Network Technologies
- Digital Media Forensic Detection
- Chaos-based Image/Signal Encryption
Tsinghua University
2005-2025
Jinhua Polytechnic
2022-2023
National Engineering Research Center for Information Technology in Agriculture
2021-2023
Xi'an University of Science and Technology
2023
Feng Chia University
2019-2021
Shandong University of Science and Technology
2019
Xidian University
2018
University of Science and Technology Beijing
2011-2017
Chongqing University
2015-2016
Chinese PLA General Hospital
2016
This in-vitro study aimed to evaluate the fracture resistances and failure modes of endodontically treated mandibular premolars restored with endocrowns conventional post-core retained crowns.MATERIALS AND METHODS.Thirty were assigned into three groups (n=10): GI, intact teeth; GE, teeth endocrowns; GC, supported crowns.Except for in group all specimens cut 1.5 mm above cementoenamel junction treated.Both crowns fabricated from lithium-disilicate blocks using a CEREC 3D CAD/CAM unit.All...
Distributed control plane is a promising approach to scalable software-defined networking (SDN). However, traffic changes could incur load imbalance among individual controllers. Live migration of switches from controllers that are overloaded those underutilized may be solution handle peak switch using available resource. Such has performed with well-defined mechanism fully utilize the resource In this paper, we study decide which and where it should migrated for balanced plane, define as...
In this paper, we provide a novel reversible data hiding method using adaptive block truncation coding based on an edge-based quantization (ABTC-EQ) approach. We exploit the characteristic not being used in ABTC-EQ. To accomplish this, first utilized Canny edge detector to obtain image and classify each cover into two versions, edge-block non-edge-block. Subsequently, k-means clustering was three levels derive corresponding bit map while current processing case of edge-block. Then Zero-Point...
Hiding a message in compression codes can reduce transmission costs and simultaneously make the more secure. This paper presents an adaptive reversible data hiding scheme that is able to provide large embedding capacity while improving quantity of modified images. The proposed employs quantization level difference (QLD) interpolation technique adaptively embed secret information into pixels each absolute moment block truncation coding (AMBTC)-compressed block, except for positions two...
There are thousands of observation satellites orbiting the earth, each which captures massive-scale photographs covering millions square kilometers everyday. In practice, these aerial photos with ultra-high-definitions (UHD) and may contain tens to hundreds ground objects ( <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">e.g</i> ., vehicles rooftops). Understanding multiple categories a rich variety UHD is an indispensable technique for many...
In this paper, the state feedback control of linear singularly perturbed plant is studied, where sensor and controller/actuator are connected via a network transmission frequency constant. terms model-based control, model in system added at to stabilize original with periodically updating its by actual provided sensor. Moreover, under some certain conditions, independent small parameter, existence bound parameter shown guarantee globally exponential stability whole closed-loop system....
When MANET is connected into the Internet, gateways are entry points of all traffic between hybrid networks. Usually, a large amount load may become concentrated in some and congestion occurs. To resolve this problem, paper proposes balancing routing algorithm, called LBRA, to distribute among multiple gateways. Through simulation, we show that proposed algorithm can uniformly suppress increase path length at most 20% compared shortest routing.
With network virtualization more and popular, how to protect the virtual networks (VNs) from a single substrate link failure is increasingly important. Existing protection schemes like dedicated backup shared backup, suffer high resource cost delayed recovery, respectively. To offer instantaneous recovery with less redundant resource, in this paper, we propose coding-aware VN mapping framework which applies coding on for first time. This algorithm includes two mechanisms their corresponding...
Aiming at the problem of image noise level estimation, this paper proposes an algorithm for estimation by singular value decomposition and neural network.The larger (head) parts values are mainly affected main structure image, rest (tail) intensity noise.With increase level, corresponding tail increased.So, should be good characteristics estimation.Firstly, we add different with known on a batch free images, then select certain number fixed size blocks which standard deviation minimum from...
3D human pose estimation has a broad range of applications, including anomaly detection and animation creation. Despite that significant progress on relative research been made during the past decades, producing precise smooth estimations for input videos still remains challenging mainly because its ill-posed attributes. In this paper, we propose HiMoReNet, post-processing motion refinement neural network based an elaborate hierarchical architecture. Firstly, distinguish characteristic...
Multimedia services are predominant in current wireless networks and becoming ubiquitous the upcoming 5G era which video quality of experience (QoE) is a fundamental metric. However, no widely accepted QoE model exists due to its subjective nature. This paper proposes framework for quantifying multimedia content based on facial expression approach, can directly reflect end users’ intrinsic attitudes toward services. To achieve this objective, face database established containing over one...
Unsupervised domain adaptation (UDA) becomes more and popular in tackling real-world problems without ground truths of the target domain. Though tedious annotation work is not required, UDA unavoidably faces two problems: 1) how to narrow discrepancy boost transferring performance; 2) improve pseudo producing mechanism for self-supervised learning (SSL). In this paper, we focus on semantic segmentation tasks. Firstly, introduce adversarial into style gap bridging keep information from...
Noise variation is an important parameter for many image denoising algorithms. This paper proposed a new two-step noise estimation algorithm based on segmentation. In the first step, noisy was smoothed and segmented by statistical region merge (SRM) algorithm. Then of every computed, some regions were selected rule to estimate variation. second filter, segmentation parameters revised according estimated variation, cycle performed obtain more accurate estimation. Experimental results large...
Text-To-Visual speech (TTVS) synthesis by computer can increase the intelligibility and make human-computer interaction interfaces more friendly. This paper describes a Chinese text-to-visual system based on data-driven (sample based) approach, which is realized short video segments concatenation. An effective method to construct two visual confusion trees for initials finals developed. A co-articulation model distance hardness factor proposed, be used in recording corpus sentence selection...
In complex background, conventional automatic video-text location methods can not robustly locate text. A robust method is proposed in this paper. It be divided into two stages. the first stage, an unsupervised paradigm based on wavelet applied to obtain candidate text region. second traversing line with its aptitude spectrum introduced and create boundary for each line. Experiment demonstrates that our scheme of various color, font, sizes image
On the tie-line of interconnected power systems, there inevitably exist fluctuations. Overlarge undulations on tie-lines threaten stability and security system. It is remarkable that when control areas are larger, situation becomes more austere. In this paper, based practical data two large stochastic fluctuations tie-line, only 1000kV AC transmission line in China, analyzed by frequency-domain methods. found component with a specific period prominent The cause special phenomenon then...
This paper proposes a new protocol CDS, which is based on modification of DSR routing protocol. CDS leverages collaboration to optimize bottleneck and improve the whole performance transmission path. The simulation result NS2 indicates that outperforms full path collaborative