- Quantum Information and Cryptography
- Regional Economic and Spatial Analysis
- Service-Oriented Architecture and Web Services
- Advanced Computational Techniques and Applications
- Quantum Computing Algorithms and Architecture
- Quantum Mechanics and Applications
- Advanced Database Systems and Queries
- Educational Technology and Pedagogy
- Diverse Musicological Studies
- Folklore, Mythology, and Literature Studies
- Image and Video Stabilization
- Geological Modeling and Analysis
- Face and Expression Recognition
- Advanced Decision-Making Techniques
- Educational Technology and Assessment
- Higher Education and Teaching Methods
- Grey System Theory Applications
- Cognitive Computing and Networks
- Advanced Neural Network Applications
- Advanced Malware Detection Techniques
- Geochemistry and Geologic Mapping
- Ear Surgery and Otitis Media
- Geochemistry and Geochronology of Asian Mineral Deposits
- Underground infrastructure and sustainability
- Public-Private Partnership Projects
Zhejiang Pharmaceutical College
2025
Anhui Sanlian University
2020-2022
Qilu University of Technology
2021
Shandong Academy of Sciences
2021
Bohai University
2021
Beijing University of Technology
2017-2020
Xiangnan University
2020
Xidian University
2020
Shanxi University of Finance and Economics
2018
Shanxi University
2018
Classic multireceiver synthetic sonar (SAS) reconstruction algorithms relying upon Loffeld's bistatic formula (LBF) should firstly utilize the data segmentation approach to remove deformation (MD) term. Usually, small sub-block is required by traditional LBF based imaging produce high performance result. To address this issue, we describe a receiver-by-receiver algorithm. The presented method reformulates original range dependent and independent terms. Then, image carried out. reformulation...
This paper evaluates the ability of a variety commercial and non-commercial software products to detect serial run-time errors in C C++ programs, issue meaningful messages, give line source code where error occurred. The Insure++ Purify performed best all we evaluated. Error messages were usually better clearer when using than Purify. Our evaluation shows that overall capability detecting is significantly lower quality both Insure++. Of evaluated, Mpatrol provided programs. Copyright © 2006...
Kernel Principal Component Analysis (KPCA) extracting principal component with nonlinear method is an improved PCA. The KPCA has been got widely used in feature extraction and face recognition. can extract the set which more suitable categorization than conventional This paper tried to apply of facial expression experimental results demonstrate that not only good at dimensional reduction, but also available get better performance highest rate 97.96%.
Feature extraction is among the most important problems in face recognition systems. In this paper, Kernel Principal Component Analysis (KPCA) has been used feature and recognition. By use of integral kernel function, one can efficiently compute principal components high dimensional spaces, related to input space by some nonlinear map. Polynomial was used. The experimental results demonstrate that KPCA not only good at reduction, but also available get better performance than conventional...
The knowledge management is becoming more and important in organizations, either over the intranet or Internet. In this paper we present an ontology-based Web (KM) framework based on ontology language DAML+OIL. This supports content-oriented rather than traditionally document-oriented approach to management. Three fundamental building blocks, i.e., annotations ontologies, knowledge-bases assertions ontologies resources crawling, rule-based reasoning/inference systems for semantic...
Aims: To effectively detect vehicle targets in remote sensing images, it can be widely used traffic management, route planning, and flow detection. YOLOv3 deep learning neural network, which mainly studies the target detection images carries out suitable for characteristics of images. Objective: This paper information extraction high-resolution based on a convolution network. Method: The network model satellite is optimized. iterations are set to 50002000045000, rate 0.001. At same time,...
This paper addresses the LQG control problem for unmanned aerial vehicles (UAV) with time delays. In particular, case data-rate limitations is considered. It shown in our results that data rate of communication channel has important effects on performances. derived there exists a tradeoff between and cost. A quantization, coding, scheme proposed to stabilize unstable plant. Simulation show validity scheme. DOI: http://dx.doi.org/10.11591/telkomnika.v11i9.2426
Knowledge graph technology has developed rapidly in recent years, and it is widely used various scenarios, such as intelligent semantic search, in-depth question answering mobile personal assistants. However, power marketing services face many problems low service response efficiency, poor customer experience a lack of real-time online services. Thus, necessary to design knowledge platform that can integrate scattered points the field, promote utilization, improve internal external service,...
This paper is concerned with the existence and non-existence of traveling wave solutions for a diffusive SIR model delay nonlinear incidence.First, we construct pair upper lower bounded cone.Then prove by using Schauder's fixed point theorem constructing suitable Lyapunov functional.The nonexistence obtained two-sided Laplace transform.Moreover, numerical simulations support theoretical results.Finally, also obtain that minimal speed decreasing respect to latent period increasing diffusion...
The paper designs a kind of anti-sleeping student alarm clock with physical exercises and English learning functions. electronic is composed sports detection module, word reading control module. adopts the principle awakening people by movement loud speaking, which can make students to take when getting up speak words after thus get up. not only has functions but also learning, so it great practice value.
In clustering algorithm research, objects, attributes and other aspects of data sets are usually considered to be independent identically distributed; that is, each object is assumed an uniformly distributed individual with no impacts between objects. However, objects in real life often neither independently nor they non-IID, leading a complex coupling relationship interact other. The results under identical distribution may incomplete or even misleading. To make the DBSCAN as accurate...
For web services, QoS (Quality of Service, quality service) is an important indicator for judging whether a service efficient. How to better predict the value make appropriate recommendations entire recommendation system and Issues that are being discussed in forecasting academia. At same time, timeliness time relevance values also affecting prediction accuracy Web services. A large amount data has potentially time-related attributes. This provides new inspiration thinking forecasting. Add...
Utilizing the property of unitary transformation and Greenberger-Horne-Zeilinger (GHZ) states, a restricted quantum deniable authentication protocol is proposed. The can provide that sender deny content sent message, but cannot taking part in certain communication. Security analysis results show this satisfy known key security basic requirements such as completeness, deniability, no-counterfeiting withstand impersonation attack, intercept-resend attack.
With the prevalence of Internet Things, numerous system vulnerabilities can be explored, and hacker may launch a series DoS attacks by exploiting system. In this paper, simulation experiment is designed to implement on that utilizes IEEE 802.15.6 password association protocol accomplish information transmission. During process, authors introduce probabilistic model checking technique with tool PRISM. This method used for analysis factors affecting success rate attacks. The study expected...