- Advanced Optical Network Technologies
- Optical Network Technologies
- Advanced Photonic Communication Systems
- Cloud Data Security Solutions
- Optical Coherence Tomography Applications
- Advanced Data Storage Technologies
- Energy, Environment, Economic Growth
- Network Traffic and Congestion Control
- Software-Defined Networks and 5G
- Cryptography and Data Security
- Security and Verification in Computing
- Advanced Decision-Making Techniques
- Advanced Malware Detection Techniques
- Photoacoustic and Ultrasonic Imaging
- China's Socioeconomic Reforms and Governance
- ECG Monitoring and Analysis
- Cloud Computing and Resource Management
- Corporate Social Responsibility Reporting
- E-commerce and Technology Innovations
- EEG and Brain-Computer Interfaces
- Environmental Sustainability in Business
- Digital Rights Management and Security
- Political Influence and Corporate Strategies
- Retinal Imaging and Analysis
- Image and Signal Denoising Methods
Northwestern Polytechnical University
2021-2025
City University of Hong Kong
2019-2022
Capital University of Economics and Business
2021
Ningxia Water Conservancy
2020
Macquarie University
2017
Beijing University of Posts and Telecommunications
2009-2015
China Information Technology Security Evaluation Center
2014-2015
Nanyang Technological University
2009-2015
Xi'an Technological University
2015
Jiangsu University of Technology
2014
An electrocardiograph (ECG) is widely used in diagnosis and prediction of cardiovascular diseases (CVDs). The traditional ECG classification methods have complex signal processing phases that leads to expensive designs. This paper provides a deep learning (DL) based system employs the convolutional neural networks (CNNs) for signals present PhysioNet MIT-BIH Arrhythmia database. proposed implements 1-D residual network (ResNet) model performs feature extraction by directly using input...
Data security has become one of core problems cloud computing. Many solutions have been proposed, however, most them only focus stage data life cycle, such as storage stage, which is not enough to solve problem threats exist in whole cycle. In this paper, we argue that the should be solved form After detail analysis cycle model and threats, a suggested design process solution given. The proposed idea simple but important create complete security.
Multi-channel detection is an effective way to improve data throughput of spectral-domain optical coherence tomography (SDOCT). However, current multi-channel OCT requires multiple detectors, which increases the complexity and cost system. We propose a novel design based on single spectrometer. Each camera pixel receives interferometric spectral signals from all channels but with shift between two channels. This effectively broadens bandwidth each pixel, reduces relative intensity noise...
With the rising popularity of multicast applications, various algorithms using either lightpath or light-tree schemes have been proposed for dynamic traffic grooming in meshed wavelength division multiplexing (WDM) networks. To best our knowledge, however, no systematic comparison has ever made between performance two minimizing network blocking probability. In this paper, we address problem WDM networks and present comprehensive comparisons these different cases. Our main contributions are...
An integrated configuration is proposed to convert tunable slow light from signal another frequency in a wide bandwidth by using 70 m-long highly nonlinear photonic crystal fiber (HN-PCF). A 10 GHz RZ delayed Gbit/s 2 <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">31</sup> -1 pseudo random bit sequence (PRBS) stimulated Brillouin scattering (SBS) pump, and the converted broadband four-wave mixing (FWM). By this way, not only converted, but...
In overlay IP over WDM networks, there are only limited information exchanges between the two layers through user network interface (UNI) [1] for service requests and responses. To enhance performance while maintaining its simplicity, we propose first time to learn from historical data of lightpath setting up costs maintained by logical layer operator(s), facilitate routing process. Using a simple cost updating strategy alleviate outdating issue, present dynamic LSP algorithms, namely...
To support multicast applications while improving wavelength capacity utilization in division multiplexing (WDM) networks, dynamic traffic grooming problem has been extensively studied recent years, and various algorithms using either lightpath or light-tree schemes have proposed. the best of our knowledge, however, no systematic comparison ever made between blocking performances these two different types schemes. In this paper, we firstly present a brief survey existing for grooming,...
Multipath routing employs multiple parallel paths between the source and destination for a connection request to improve resource utilization of network. In this paper, we present an integrated design multipath with delay constraints failure survivability in MPLS networks. By combining schemes into algorithms, path protection or restoration policies will enable network accommodate link failures at same time achieve significant improvement on utilization. We propose number working-backup...
This paper proposed a multi-function provable data possession (MF-PDP), which supports public verification, dynamic, unlimited times verification and sampling verification. The detail design is provided the theory analysis about correctness, security performance are also described. experiment emulation compare suggest feasibility advantage.
With the rising popularity of multicasting services in meshed wavelength division multiplexing (WDM) networks, protecting dynamic sub-wavelength granularity multicast requests against network failures becomes an important issue operation process. This paper investigates survivable traffic grooming problem WDM and a connection-level segment shared protection (CL-SSP) algorithm is proposed to protect single link failure Specifically, improve resource sharing process, lightpath-fragmentation...
It is popular to access the cloud storage by mobile devices. However, this application suffer data security risk, especial leakage and privacy violate problem. This risk exists not only in system, but also client platform. To reduce paper proposed a new solution. makes full use of searchable encryption trusted computing technology. Given performance limit devices, it proposes proxy based protection architecture. The design basic idea, deploy model key flows are detailed. analysis from shows...
PurposeOptical coherence tomography (OCT) is a noninvasive, high-resolution imaging modality capable of providing both cross-sectional and three-dimensional images tissue microstructures. Owing to its low-coherence interferometry nature, however, OCT inevitably suffers from speckles, which diminish image quality mitigate the precise disease diagnoses, therefore, despeckling mechanisms are highly desired alleviate influences speckles on images.ApproachWe propose multiscale denoising...
With the rapid development of network technology, a variety new attack methods to come out endlessly. Traditional firewalls, depending on static feature data base, have more and limitations these attacks. To alleviate this problem, in paper we propose honeynet-based firewall scheme with initiative security strategies. In scheme, data-analyzing module can timely discover behaviors by analyzing output result honeynet data-mining furthermore, according findings rule-learning dynamically create...
Overlay IP/MPLS over WDM network holds great promise for the Next-Generation Internet. One key design challenge with such a is limited information exchange between its two layers. We evaluate influences of WDM-layer link cost and routing strategies on performances dynamic multicast traffic grooming. Simulation results show that both strategy have significant impacts performances, especially when resources are abundant. In addition, more compared to those strategy. The suggest there potential...