Yanmei Wang

ORCID: 0000-0003-1409-1604
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Quantum Information and Cryptography
  • Regional Economic and Spatial Analysis
  • Service-Oriented Architecture and Web Services
  • Advanced Computational Techniques and Applications
  • Quantum Computing Algorithms and Architecture
  • Quantum Mechanics and Applications
  • Advanced Database Systems and Queries
  • Educational Technology and Pedagogy
  • Diverse Musicological Studies
  • Folklore, Mythology, and Literature Studies
  • Image and Video Stabilization
  • Geological Modeling and Analysis
  • Face and Expression Recognition
  • Advanced Decision-Making Techniques
  • Educational Technology and Assessment
  • Higher Education and Teaching Methods
  • Grey System Theory Applications
  • Cognitive Computing and Networks
  • Advanced Neural Network Applications
  • Advanced Malware Detection Techniques
  • Geochemistry and Geologic Mapping
  • Ear Surgery and Otitis Media
  • Geochemistry and Geochronology of Asian Mineral Deposits
  • Underground infrastructure and sustainability
  • Public-Private Partnership Projects

Zhejiang Pharmaceutical College
2025

Anhui Sanlian University
2020-2022

Qilu University of Technology
2021

Shandong Academy of Sciences
2021

Bohai University
2021

Beijing University of Technology
2017-2020

Xiangnan University
2020

Xidian University
2020

Shanxi University of Finance and Economics
2018

Shanxi University
2018

Classic multireceiver synthetic sonar (SAS) reconstruction algorithms relying upon Loffeld's bistatic formula (LBF) should firstly utilize the data segmentation approach to remove deformation (MD) term. Usually, small sub-block is required by traditional LBF based imaging produce high performance result. To address this issue, we describe a receiver-by-receiver algorithm. The presented method reformulates original range dependent and independent terms. Then, image carried out. reformulation...

10.1109/tgrs.2024.3362886 article EN IEEE Transactions on Geoscience and Remote Sensing 2024-01-01

10.1007/s13198-021-01468-2 article EN International Journal of Systems Assurance Engineering and Management 2021-11-09

This paper evaluates the ability of a variety commercial and non-commercial software products to detect serial run-time errors in C C++ programs, issue meaningful messages, give line source code where error occurred. The Insure++ Purify performed best all we evaluated. Error messages were usually better clearer when using than Purify. Our evaluation shows that overall capability detecting is significantly lower quality both Insure++. Of evaluated, Mpatrol provided programs. Copyright © 2006...

10.1002/cpe.1036 article EN Concurrency and Computation Practice and Experience 2006-01-01

Kernel Principal Component Analysis (KPCA) extracting principal component with nonlinear method is an improved PCA. The KPCA has been got widely used in feature extraction and face recognition. can extract the set which more suitable categorization than conventional This paper tried to apply of facial expression experimental results demonstrate that not only good at dimensional reduction, but also available get better performance highest rate 97.96%.

10.1109/icicip.2010.5565300 article EN International Conference on Intelligent Control and Information Processing 2010-08-01

Feature extraction is among the most important problems in face recognition systems. In this paper, Kernel Principal Component Analysis (KPCA) has been used feature and recognition. By use of integral kernel function, one can efficiently compute principal components high dimensional spaces, related to input space by some nonlinear map. Polynomial was used. The experimental results demonstrate that KPCA not only good at reduction, but also available get better performance than conventional...

10.1109/icinis.2010.88 article EN 2010-11-01

The knowledge management is becoming more and important in organizations, either over the intranet or Internet. In this paper we present an ontology-based Web (KM) framework based on ontology language DAML+OIL. This supports content-oriented rather than traditionally document-oriented approach to management. Three fundamental building blocks, i.e., annotations ontologies, knowledge-bases assertions ontologies resources crawling, rule-based reasoning/inference systems for semantic...

10.1109/icics.2003.1292789 article EN 2004-07-08

Aims: To effectively detect vehicle targets in remote sensing images, it can be widely used traffic management, route planning, and flow detection. YOLOv3 deep learning neural network, which mainly studies the target detection images carries out suitable for characteristics of images. Objective: This paper information extraction high-resolution based on a convolution network. Method: The network model satellite is optimized. iterations are set to 50002000045000, rate 0.001. At same time,...

10.2174/2352096515666220820174654 article EN Recent Advances in Electrical & Electronic Engineering (Formerly Recent Patents on Electrical & Electronic Engineering) 2022-08-23

This paper addresses the LQG control problem for unmanned aerial vehicles (UAV) with time delays. In particular, case data-rate limitations is considered. It shown in our results that data rate of communication channel has important effects on performances. derived there exists a tradeoff between and cost.  A quantization, coding, scheme proposed to stabilize unstable plant. Simulation show validity scheme. DOI: http://dx.doi.org/10.11591/telkomnika.v11i9.2426

10.11591/telkomnika.v11i9.2426 article EN TELKOMNIKA Indonesian Journal of Electrical Engineering 2013-05-08

Knowledge graph technology has developed rapidly in recent years, and it is widely used various scenarios, such as intelligent semantic search, in-depth question answering mobile personal assistants. However, power marketing services face many problems low service response efficiency, poor customer experience a lack of real-time online services. Thus, necessary to design knowledge platform that can integrate scattered points the field, promote utilization, improve internal external service,...

10.1109/iccea53728.2021.00065 article EN 2020 International Conference on Computer Engineering and Application (ICCEA) 2021-06-01

This paper is concerned with the existence and non-existence of traveling wave solutions for a diffusive SIR model delay nonlinear incidence.First, we construct pair upper lower bounded cone.Then prove by using Schauder's fixed point theorem constructing suitable Lyapunov functional.The nonexistence obtained two-sided Laplace transform.Moreover, numerical simulations support theoretical results.Finally, also obtain that minimal speed decreasing respect to latent period increasing diffusion...

10.22436/jnsa.011.12.03 article EN The Journal of Nonlinear Sciences and Applications 2018-09-13

The paper designs a kind of anti-sleeping student alarm clock with physical exercises and English learning functions. electronic is composed sports detection module, word reading control module. adopts the principle awakening people by movement loud speaking, which can make students to take when getting up speak words after thus get up. not only has functions but also learning, so it great practice value.

10.1109/icsess.2014.6933662 article EN 2014-06-01

In clustering algorithm research, objects, attributes and other aspects of data sets are usually considered to be independent identically distributed; that is, each object is assumed an uniformly distributed individual with no impacts between objects. However, objects in real life often neither independently nor they non-IID, leading a complex coupling relationship interact other. The results under identical distribution may incomplete or even misleading. To make the DBSCAN as accurate...

10.1109/access.2021.3081500 article EN cc-by IEEE Access 2021-01-01

For web services, QoS (Quality of Service, quality service) is an important indicator for judging whether a service efficient. How to better predict the value make appropriate recommendations entire recommendation system and Issues that are being discussed in forecasting academia. At same time, timeliness time relevance values also affecting prediction accuracy Web services. A large amount data has potentially time-related attributes. This provides new inspiration thinking forecasting. Add...

10.1109/icnisc54316.2021.00086 article EN 2021 7th Annual International Conference on Network and Information Systems for Computers (ICNISC) 2021-07-01

Utilizing the property of unitary transformation and Greenberger-Horne-Zeilinger (GHZ) states, a restricted quantum deniable authentication protocol is proposed. The can provide that sender deny content sent message, but cannot taking part in certain communication. Security analysis results show this satisfy known key security basic requirements such as completeness, deniability, no-counterfeiting withstand impersonation attack, intercept-resend attack.

10.1049/cje.2018.01.001 article EN Chinese Journal of Electronics 2018-03-01

With the prevalence of Internet Things, numerous system vulnerabilities can be explored, and hacker may launch a series DoS attacks by exploiting system. In this paper, simulation experiment is designed to implement on that utilizes IEEE 802.15.6 password association protocol accomplish information transmission. During process, authors introduce probabilistic model checking technique with tool PRISM. This method used for analysis factors affecting success rate attacks. The study expected...

10.1109/itme.2018.00192 article EN 2018-10-01
Coming Soon ...