- Cryptography and Data Security
- Privacy-Preserving Technologies in Data
- Complexity and Algorithms in Graphs
- Quantum Information and Cryptography
- Microwave Imaging and Scattering Analysis
- Cryptographic Implementations and Security
- Cloud Data Security Solutions
- Quantum Computing Algorithms and Architecture
- Geophysical Methods and Applications
- Semiconductor Quantum Structures and Devices
- Smart Agriculture and AI
- Quantum and electron transport phenomena
- Animal Behavior and Welfare Studies
- Internet Traffic Analysis and Secure E-voting
- Advanced SAR Imaging Techniques
- Quantum Mechanics and Applications
- Ultra-Wideband Communications Technology
- Chaos-based Image/Signal Encryption
- Water Quality Monitoring Technologies
- Effects of Environmental Stressors on Livestock
- Animal Disease Management and Epidemiology
- IoT and Edge/Fog Computing
- Quantum optics and atomic interactions
- Date Palm Research Studies
- Advanced Neural Network Applications
South China Agricultural University
2014-2024
Guangdong Institute of Intelligent Manufacturing
2020-2024
Ministry of Agriculture and Rural Affairs
2023
Xi'an University of Science and Technology
2017-2018
Nanjing University of Information Science and Technology
2016
Shanghai University of Electric Power
2014
Beijing Electronic Science and Technology Institute
2014
University of Michigan
2007-2011
Chinese Academy of Sciences
2010
Institute of Electronics
2009
To achieve high-resolution 2-D images, through-wall imaging (TWI) radar with ultra-wideband and long antenna arrays faces considerable technical challenges such as a prolonged data collection time, huge amount of data, high hardware complexity. This paper presents novel acquisition scheme an algorithm for TWI based on compressive sensing (CS), which states that signal having sparse representation can be reconstructed from small number nonadaptive randomized projections by solving tractable...
Quantum computation requires a continuous supply of rapidly initialized qubits for quantum error correction. Here, we demonstrate fast spin state initialization with near unity efficiency in singly charged dot by optically cooling an electron spin. The is successfully cooled from 5 to 0.06 K at magnetic field 0.88 T applied Voigt geometry. rate order 10(9) s-1, which set the spontaneous decay excited state.
Pig behavior recognition and tracking in group-housed livestock are effective aids for health welfare monitoring commercial settings. However, due to demanding farm conditions, the targets pig videos heavily occluded overlapped, there illumination changes, which cause error switches of identify (ID) process decrease quality. To solve these problems, this study proposed an improved DeepSORT algorithm object tracking, contained three processes. Firstly, two detectors, YOLOX-S YOLO v5s, were...
The live weight of pigs has always been an important reference index for growth monitoring and the health status breeding pigs. An accurate acquisition is key to guide scientific feeding improve economic benefits. Compared with traditional contact measurement method, non-contact weighing method can greatly reduce human–pig errors. In this paper, a deep neural network constructed which automatically accurately predict by measuring multiple body parameters. Because good generalization ability...
A common functionality of many location-based social networking applications is a location sharing service that allows group friends to share their locations. With potentially untrusted server, such may threaten the privacy users. Existing solutions for Privacy-Preserving Location Sharing Services (PPLSS) require trusted third party has access exact all users in system or rely on expensive algorithms protocols terms computational communication overhead. Other can only provide approximate...
Thanks to its convenience and cost-savings feature, cloud computing ushers a new era. Yet security privacy issues must not be neglected. Private set intersection (PSI) is useful important in many applications, such as document similarity, genetic paternity data mining. The server performs operations on two outsourced encrypted datasets of owners. In the existing protocols, however, owners cannot decide whether use all or part their compute intersection, nor can they specify whom compare...
Abstract The encryption of user data is crucial when employing electronic health record services to guarantee the security stored on cloud servers. Attribute-based (ABE) scheme considered a powerful technique that offers flexible and fine-grained access control capabilities. Further, multi-user collaborative ABE additionally supports users acquire authorization through works. However, existing schemes do not consider different weights collaboration users. Therefore, using these for weighted...
Accurately counting the number of insect pests from digital images captured on yellow sticky traps remains a challenge in field pest monitoring. In this study, we develop new approach to using saliency map and improved non-maximum suppression. Specifically, as background trap is simple object small, exploit construct region proposal generator including building, activation formation, background–foreground classifier, tune-up boxes involved generation. For each proposal, convolutional neural...
The severity of rice blast and its impacts on yield are closely related to the inoculum quantity Magnaporthe oryzae, automatic detection pathogen spores in microscopic images can provide a rapid effective way quantify inoculum. Traditional spore methods mostly rely manual feature extraction shallow machine learning models, designed for indoor counting single class, which cannot handle interference impurity particles field. This study achieved fungus mixture with other fungal pollens commonly...
As the development of economic and technology, Internet Things (IOT) has become an important part strategic emerging industries, this paper takes into account, small equipment, large coverage area, network data security, low power consumption so on, A remote monitoring system temperature humidity based on OneNet cloud service platform is proposed. The STM32F103RCT6 ARM Cortex-M3 kernel adopted as main controller, SIM800C communication module authorized frequency band GSM/GPRS cellular...
Abstract Private Set Intersection Cardinality (PSI-CA) and Union (PSU-CA) are two cryptographic primitives whereby or more parties able to obtain the cardinalities of intersection union their respective private sets, privacy sets is preserved. In this paper, we propose a three-party protocol finish these tasks by using quantum resources, where every two, as well three, can with help semi-honest third party (TP). our protocol, GHZ states play role in encoding information that will be used TP...
Abstract The knowledge of body size/weight is necessary for the general growth enhancement swine as well making informed decisions that concern their health, productivity, and yield. Therefore, this work aims to automate collection pigs’ parameters using images from Kinect V2 cameras, development Multilayer Perceptron Neural Network (MLP NN) models predict weight. dataset obtained 3D light depth cameras contains 9980 pigs across S21 S23 breeds, then grouped into 70:15:15 training, testing,...
The effects of laser intensity and wavelength on measurements spin noise in bulk semiconductors are studied with an absorption-based optically excited impurity ionization model. dependent electron relaxation time illustrates the gradual transition from a near nonperturbative measurement to perturbative measurement. A strong relationship between measured absorption is observed shown fit well simple For where has be regime, related material properties rather than experimental conditions (e.g.,...