- Advanced Image Fusion Techniques
- Infrared Target Detection Methodologies
- Satellite Image Processing and Photogrammetry
- Remote-Sensing Image Classification
- Remote Sensing and Land Use
- Advanced Computational Techniques and Applications
- Image Processing Techniques and Applications
- Advanced Image Processing Techniques
- Anomaly Detection Techniques and Applications
- 3D Surveying and Cultural Heritage
- Advanced Measurement and Detection Methods
- Cryptography and Residue Arithmetic
- Visual Attention and Saliency Detection
- Image and Signal Denoising Methods
- Earthquake Detection and Analysis
- RFID technology advancements
- Web Application Security Vulnerabilities
- Soft Robotics and Applications
- Surgical Simulation and Training
- Digital Media Forensic Detection
- Image and Video Stabilization
- Extenics and Innovation Methods
- Wireless Sensor Networks and IoT
- Software Engineering Research
- Belt Conveyor Systems Engineering
China Mobile (China)
2008-2025
Ruijin Hospital
2025
Shanghai Jiao Tong University
2024
Nankai University
2024
Shanghai Ninth People's Hospital
2024
Nanjing University of Information Science and Technology
2021-2022
China Three Gorges University
2021
Hunan Institute of Science and Technology
2021
PLA Information Engineering University
2021
Shanghai University of Engineering Science
2021
The nine-grid layout is commonly used for multi-image posts, arranging nine images in a tic-tac-toe board. This effectively presents content within limited space. Moreover, due to the numerous possible arrangements nine-image grid, optimal arrangement that yields highest level of attractiveness remains unknown. Our study investigates how affects overall popularity image set, aiming explore alignment schemes more aligned with user preferences. Based on survey results regarding preferences...
ABSTRACT Although ViT has achieved significant success in the field of image classification, research on ViT‐based object detection algorithms is still its early stages, and their application real‐world scenarios limited. Furthermore, based or Transformer are prone to overfitting issues when training data scarce. While CO‐DETR state‐of‐the‐art precision COCO dataset leaderboard, also suffers from problems, which affect smaller datasets. Based study algorithms, a new algorithm termed DC‐DETR...
<title>Abstract</title> <bold>Background: </bold>This clinical report presents the use of a minimally invasive, robot-assisted windowing surgery for extraction median impacted mandibular tooth. The highlights precision and safety afforded by robotic assistance in performing complex dental procedures. However, this case also critically examines challenges associated with systems, including high costs, prolonged setup times, need specialized training. financial burden learning curve...
In this paper, a novel high order power filter is proposed, named the LCCL filter. Compared with traditional LCL filter, composes parallel resonant branch loop at switching frequency by paralleling small capacitor line side inductor. The resonance enables to exhibit infinite impedance frequency. Particularly, it can attenuate current ripple components much better than thus decreases grid THD. an LLCL exhibits attenuation ability in domain when source considered. Besides,...
When in orbit, spliced satellite optical cameras are affected by various factors that degrade the actual image stitching precision and accuracy of their data products. This is a major bottleneck current remote sensing technology. Previous geometric calibration research has mostly focused on stitched images largely ignored inter-chip relationship among original multi-chip images, resulting loss subsequent Therefore, this paper, novel method proposed for cameras. The integral model was...
Fully convolutional networks (FCN) such as UNet and DeepLabv3+ are highly competitive when being applied in the detection of earthquake-damaged buildings very high-resolution (VHR) remote sensing images. However, existing methods show some drawbacks, including incomplete extraction different sizes inaccurate boundary prediction. It is attributed to a deficiency global context-aware correlation mining spatial context well failure consider relative positional relationship between pixels...
High-resolution remote sensing (HRRS) images, when used for building detection, play a key role in urban planning and other fields. Compared with the deep learning methods, method based on morphological attribute profiles (MAPs) exhibits good performance absence of massive annotated samples. MAPs have been proven to strong ability extracting detailed characterizations buildings multiple attributes scales. So far, great deal attention has paid this application. Nevertheless, constraints...
The detection of collapsed buildings based on post-earthquake remote sensing images is conducive to eliminating the dependence pre-earthquake data, which great significance carry out emergency response in time. difficulties obtaining or lack elevation information, as strong evidence determine whether collapse not, main challenge practical application this method. On one hand, introduction double bounce features synthetic aperture radar (SAR) are helpful judge not. other because SAR limited...
Based on the theories of heat transfer and method computational fluid dynamics, a liquid–solid mathematical model an axial piston hydraulic motor pump is constructed in this study. Through finite volume method, with different cooling runners has been solved. Meanwhile, oil flow regularity runner temperature distribution duct obtained. On basis long-strip runner, influence ambient pump's rise analysed. The result shows that channels housing effectively reduce rise, channel for optimum...
A satellite image adaptive restoration method was developed that avoids ringing artifacts at the boundary and retains oriented features. The combines periodic plus smooth decomposition with complex wavelet packet transforms. framework first decomposes a degraded into sum of “periodic component” “smooth component”. Bayesian is then used to estimate modulation transfer function degradation parameters noise. component deconvoluted using transforms deconvolution result combined get final...
An accurate two-dimensional-three-dimensional (2D-3D) image registration method is introduced in this paper, which used image-guided surgery to detect and correct patient movement during intervention treatment. In we decompose a 3D rigid transformation the coordinate into in-plane transformations out-of-plane rotations two orthogonal 2D projections, using approximate geometric relationship results projections are then combined converted by 2D-3D transformation. order ensure accuracy, propose...
Introduction This study evaluated the efficacy and learning curve of a maxillofacial surgical robotic system (MSRS) guided by electromagnetic navigation for mandibular angle ostectomy (MAO), compared to traditional methods. Methods The utilized controlled experiment involving thirty rabbits, paired divided into experimental control groups. group underwent MAO using MSRS, while was treated with conventional techniques. surgeons performing procedures were inexperienced in surgery assess impact...
In this work, we are interested in achieving both high text controllability and overall appearance consistency the generation of personalized human characters. We propose a novel framework, named SerialGen, which is serial method consisting two stages: first, standardization stage that standardizes reference images, then based on standardized reference. Furthermore, introduce modules aimed at enhancing process. Our experimental results validate proposed framework's ability to produce images...
Image Quality Assessment (IQA) and Aesthetic (IAA) aim to simulate human subjective perception of image visual quality aesthetic appeal. Existing methods typically address these tasks independently due distinct learning objectives. However, they neglect the underlying interconnectedness both tasks, which hinders task-agnostic shared representations for perception. To confront this challenge, we propose Unified vision-language pre-training Aesthetics (UniQA), learn general perceptions two...
Binary code similarity detection (BCSD) plays a big role in the process of binary application security test. It can be applied several fields, such as software plagiarism detection, malware analysis, vulnerability detection. Most research is based on recurrent neural networks, which difficult to get overall or long-distance semantic information functions. Besides, exiting works simply extract high-level features, lacking in-depth investigations potential mechanisms for fusing low-level and...
Most of the traditional camouflage target detection rely on human eyes to make a simple magnification observation through white light instruments, but result is usually not good. The hyperspectral instrument can acquire spectral images certain band range, and then obtain continuous curve object. In general, there are differences in curves between different objects. With detection, camouflaging characteristics camouflaged backgrounds different. order best effect, difference clothing...
Two elliptic curve scalar multiplications (ECMLT) are used in some important encryption algorithms, a pseudo-pipelined VLSI architecture of two ECMLTs over GF(2 <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">m</sup> ) is proposed for these algorithms. The includes three word-serial finite field (FF) multipliers, and each FF multiplier has word size w. Implemented using FPGA, computed approximately 4¿m/w¿(m-1)clock cycles the architecture....