- Memory and Neural Mechanisms
- Neuroscience and Neuropharmacology Research
- Neural dynamics and brain function
- Neurobiology and Insect Physiology Research
- Visual perception and processing mechanisms
- Advanced Steganography and Watermarking Techniques
- Optical Wireless Communication Technologies
- Animal Behavior and Reproduction
- Digital Media Forensic Detection
- Power Systems Fault Detection
- Smart Grid and Power Systems
- Insect and Arachnid Ecology and Behavior
- PAPR reduction in OFDM
- Network Security and Intrusion Detection
- Power Systems and Technologies
- Advanced MIMO Systems Optimization
- Advanced Image Fusion Techniques
- Cooperative Communication and Network Coding
- Internet Traffic Analysis and Secure E-voting
- Advanced Signal Processing Techniques
- Software-Defined Networks and 5G
- Neuroscience and Neural Engineering
- Advanced Wireless Network Optimization
- IPv6, Mobility, Handover, Networks, Security
- Industrial Vision Systems and Defect Detection
Liming Vocational University
2011-2025
Shanghai University
2023-2024
Institute of Biophysics
2007-2023
Chinese Academy of Sciences
1999-2023
ZTE (China)
2011
Qi2
2011
Zen-Noh (Japan)
2011
ZTE (United States)
2011
State Key Laboratory of Brain and Cognitive Science
2009
Changsha University of Science and Technology
2008-2009
Copy-move forgery detection is a crucial task in digital image forensics, aiming to identify duplicated regions within an image. Traditional methods often locate the forged but struggle distinguish between original and copied areas. We introduce new method that addresses this issue. Initially, extracts low-frequency components of using contourlet transform. These are then divided into overlapping blocks, singular value features extracted from each block. The feature vectors sorted...
Dodging rapidly approaching objects is a fundamental skill for both animals and intelligent robots. Flies are adept at high-speed collision avoidance. However, it remains unclear whether the fly algorithm can be extracted applicable to real-time machine vision. In this study, we developed computational model inspired by looming detection circuit recently identified in Drosophila. Our results suggest that face of considerably noisy local motion signals, key achieve accurate attributed two...
Rat hippocampal cells exhibit characteristic phase-dependent firings when oscillation in frequency range around 8Hz is present. Based on the hypothesis that theta phase coding generated by synchronization of neural activities, an autoassociative network model hippocampus and entorhinal cortex was analyzed to explore mechanisms underlying episodic memory. Phase rhythm enables instantaneous acquisition experienced events including temporal spatial contents. Further comparison with...
Summary A wide variety of animal species including humans and fruit flies see second-order motion lacking coherent spatiotemporal correlations in luminance. Recent electrophysiological recordings, together with intensive psychophysical studies, are bringing to light the neural underpinnings perception mammals. However, where how higher-order signals processed fly brain is poorly understood. Using rich genetic tools available Drosophila examining optomotor responses several stimuli, we...
Flies detect and track moving targets among visual clutter, this process mainly relies on motion. Visual motion is analyzed or computed with the pathway from retina to T4/T5 cells. The computation of local directional was formulated as an elementary movement detector (EMD) model more than half a century ago. Solving target detection figure-ground discrimination problems can be equivalent extracting boundaries between background based discontinuities in output retinotopic array EMDs....
Quick and accurate location of faults is the basic task fault as well an important research subject in power system relay protection. The traveling wave principles double terminal locating method described, main causes generation errors actual application are investigated. A novel presented based on existing method. arriving intervals travelling from location, reflected opposite bus recorded. new applied Zhuzhou grid, results show that it has high accuracy.
According to the both-terminal traveling wave fault location, a novel network-based location algorithm is presented in this paper. In algorithm, information fusion technology applied, and path analyzed through shortest propagation principle. The arrival times recorded by remote substation converted into at reference substations which are closest line. Then morbid converted-times eliminated all valid fused with decided weight, exact position calculated last. paper can effectively resolve...
Flying insects rely mainly upon visual motion to detect and track objects. There has been a lot of research on fly inspired algorithms for object detection, but few have developed based alone. One the daunting difficulties is that neural circuit mechanisms underlying foreground-background segmentation are still unclear. Our previous modeling study proposed lobula held parallel pathways with distinct directional selectivity, each which could retinotopically discriminate figures moving in its...
It is a challenging work to solve the geometric attack in field of digital watermarking. In order synchronization between host image and watermark, normalization introduced. Firstly, geometrically invariant space constructed by using normalization, region interest (ROI) obtained from normalized utilizing centroid theory. Then, contourlet transform performed on ROI. Low-pass sub-band coefficients are divided into non-overlapping blocks. Finally, as energy blocks not same, an adaptive...
A novel line non-unit protection principle based on traveling wave is proposed in the paper, it measures instantaneous frequency of crest at point transmission near trap. If large than lower cut off trap, internal fault thus detected. The influence trap for also investigated. Hilbert-Huang Transform (HHT) used extracting special signals. Theoretical analysis and EMTP simulation results show correction.
As JPEG is one of the most popularly used image formats, localizing forgeries plays a special role in passive forensics. In this paper, copy-move forgery detection scheme combined scale invariant feature transform (SIFT) with discrete cosine (DCT) coefficient analysis images proposed. Generally, all matching sift keypoints are located at suspected regions obviously by means sift-based forensic methods. But they cannot discriminate between original and forged regions. order to localize...