- Coding theory and cryptography
- graph theory and CDMA systems
- Cryptographic Implementations and Security
- Antenna Design and Optimization
- Direction-of-Arrival Estimation Techniques
- Robotic Path Planning Algorithms
- Speech and Audio Processing
- Machine Learning and Algorithms
- Neural Networks and Applications
- Algorithms and Data Compression
- Geochemistry and Geologic Mapping
- Advanced Malware Detection Techniques
- Military Defense Systems Analysis
- Complexity and Algorithms in Graphs
- Oceanographic and Atmospheric Processes
- Advanced Memory and Neural Computing
- Security and Verification in Computing
- Semiconductor materials and devices
- Polynomial and algebraic computation
- Radiation Effects in Electronics
- Soil Geostatistics and Mapping
- Model Reduction and Neural Networks
- Advanced Clustering Algorithms Research
- Advancements in PLL and VCO Technologies
- Hate Speech and Cyberbullying Detection
Zhejiang University of Science and Technology
2024-2025
National University of Defense Technology
2015-2024
Southwest Petroleum University
2023
Columbia University
2013-2021
California University of Pennsylvania
2021
Shaanxi Provincial Land Engineering Construction Group
2018
Land Consolidation and Rehabilitation Center
2018
Ministry of Natural Resources
2018
China Land Surveying and Planning Institute
2018
Laboratoire Analyse, Géométrie et Applications
2017-2018
Continuous zeroing neural network (ZNN) and its discrete ZNN (DZNN) are comprehensively developed in many optimization systems. In this article, a Milne-Hamming method with DZNN classified as an implicit is proposed discussed upon the previous researches. Specifically, (MHDZNN) model aimed for time-varying nonlinear (TV-NO) problem functional limitations. This (MH) four-step discretized formula fixed parameters introduced to discretize model. Theoretical analyses of MHDZNN derive that...
We show that a canonical form for strongly regular (s.r.) graphs can be found in time exp(O~(n1/5)) and therefore isomorphism of s.r. tested within the same bound, where n is number vertices tilde hides polylogarithmic factor. The best previous bound testing s. r. was exp(O~(n1/3)) (Spiel man, STOC 1996) while GI general has been standing firmly at exp(O~(n1/2)) three decades. (These results, too, provided forms.) bounds on (Babai 1980 Spiel man were based analysis classical...
The correlation immunity of Boolean functions is a property related to cryptography, error correcting codes, orthogonal arrays (in combinatorics), and in slightly looser way sequences. Correlation-immune short, CI functions) have the keeping same output distribution when some input variables are fixed. They been widely used as combiners stream ciphers allow resistance Siegenthaler attack. Very recently, new use has appeared framework side channel attacks (SCA). To reduce cost overhead...
Many reverse engineering techniques for data structures rely on the knowledge of memory allocation routines. Typically, they interpose system’s malloc and free functions, track each chunk thus allocated as a structure. However, many performance-critical applications implement their own custom allocators. Examples include webservers, database management systems, compilers like gcc clang. As result, current binary analysis tracking fail such binaries. We present MemBrush, new tool to detect...
In this article, we derive the predictor-corrector (PC) methods with three-order convergent precision, together a class of specific general linear three-step (GLTS) rules provided. Afterward, time-varying optimization (TVO) problem, which is deemed as discrete TVO has been formulated and studied. The classical zeroing neural network via Zhang et al. discretization (ZD-DZNN) often utilized to obtain solution. Actually, stepsize domain DZNN model great factor for dynamical stability. To...
This paper analyzes the mixing characteristics of Subarctic Front (SAF) in Kuroshio-Oyashio Confluence Region based on temperature, salinity, and current data obtained from surveys remote sensing June 2016. The frontal zone observed area is at 145°–151°E, 38°–41°N. front distributed between 25.5–26.7 σθ a band pattern inclined north to south deeper south. region shallower than 200 m along isopycnal 25.9–26.1 has strongest horizontal temperature salinity gradients, largest former can reach...
A fault-tolerant hardening-by-design frequency divider has been proposed for clock and data recovery in a 28-nm CMOS process. By means of the mandatory updating mechanism, can update state D flip-flops from an error to correct so as avoid single-event transient (SET) accumulation different finite-state machines (FSMs). Our also does not destroy original structure can, thus, greatly reduce performance degradation. Laser tests show that threshold be significantly improved. The heavy-ion...
In this paper, a novel FSS radome is developed and measured. This has one transparent passband two absorptive bands. These bands are separated by the passband. The manufactured measured to verify its unique electromagnetic characteristics. passband, gain of antenna with our only 1~2dB lower than without any radome. bands, electric level reflected wave from can be 16.5dB metallic plane same size as
In order to improve the angle measurement performance of a coprime linear array, this paper proposes novel direction-of-arrival (DOA) estimation algorithm for array based on multiple invariance signal parameters via rotational techniques (MI-ESPRIT) and lookup table method. The proposed does not require spatial spectrum search uses solve ambiguity, which reduces computational complexity. To fully use subarray elements, DOA precision is higher compared with existing algorithms. Moreover,...
A hardened phase frequency detector (PFD) employing double-loop self-sampling technology is proposed for clock and data recovery. The PFD can remove the error state maintain correct by use of sampler. laser experiment shows that threshold value has been greatly improved.
Satellite data products and high-resolution in situ observations were combined to investigate the evolution structure of Kuroshio Extension Front Spring 2019. The former reveals variation front is influenced by northward movement through transporting warm saline water a cold brackish region. latter indicates steep upward slopes isopycnals, tilting frontal zone, as well several ~300 m thick blobs North Pacific Intermediate Water between 26.25 26.75 kg/m3, where conspicuous thermohaline...
Differentially 4-uniform permutations on F22k with high nonlinearity are often chosen as substitution boxes in block ciphers. Recently, Qu et al. used the powerful switching method to construct low differential uniformity from inverse function [Qu al., Constructing differentially over via method, IEEE Trans. Inform. Theory 59(7) (2013), pp. 4675–4686, More constructions of F22k, Des. Codes Cryptogr. DOI 10.1007/s10623-014-0006-x] and proposed a sufficient but not necessary condition for...
Permutation polynomials over finite fields play important roles in theory. They also have wide applications many areas of science and engineering such as coding theory, cryptography, combinatorial design, communication theory so on. binomials trinomials attract people's interest due to their simple algebraic form additional extraordinary properties. In this paper, several new classes permutation are constructed. Some these generalizations known ones.
The previous threshold proxy re-signature schemes have been mainly constructed with bilinear maps, the implementations of which are much more time-consuming than exponentiation operations. To solve this problem, we propose efficient El-Gamal signatures. performance analysis shows that our existing schemes. Based on discrete logarithm provable secure in random oracle model.
The development of hyperspectral remote sensing technology has been widely used in soil nutrient prediction. is the representative type Shaanxi Province. In this study, total nitrogen content was as research target, and samples were measured by reflectance spectroscopy using ASD method. Pre-treatment, first order differential, second differential logarithmic transformation reflected spectrum after pre-treatment, estimation model established least squares regression method principal component...
A subset $S$ of the Boolean hypercube $\mathbb{F}_2^n$ is a sumset if $S = \{a + b : a, b\in A\}$ for some $A \subseteq \mathbb{F}_2^n$. Sumsets are central objects study in additive combinatorics, featuring several influential results. We prove lower bound $\Omega(2^{n/2})$ number queries needed to test whether function $f:\mathbb{F}_2^n \to \{0,1\}$ indicator sumset. Our testing sumsets follows from sharp bounds on related problem shift testing, which may be independent interest. also give...
A radiation-hardened phase-locked loop is proposed for phase interpolator clock and data recovery purposes. sensitive node-compressed charge pump multi-node cross coupling voltage-controlled oscillators are in this with the goal of achieving good jitter performance improving anti-SET (SET, single-event transient) capability. The root mean square (RMS) reduced from 3.7 ps to 2.58 at 2 GHz, while laser threshold improved 120 pJ 370 compared unhardened loop. hardened also does not lose its lock...
Abstract Time‐varying linear systems (TVLS) is a vital mathematical problem in many engineering fields. In this letter, Milne‐Hamming discretized zeroing neural networks (MHDZNN) presented to solve the TVLS, where high accurate convergence got by combing (MH) method. Theoretical analyses of its and precision are discussed illustrate validity DZNN (MHDZNN). Furthermore, numerical experiments compared with two existing models simulated verify superiority proposed MHDZNN model.