Bo Gao

ORCID: 0000-0003-2703-7244
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • GNSS positioning and interference
  • Advanced Computational Techniques and Applications
  • Inertial Sensor and Navigation
  • Indoor and Outdoor Localization Technologies
  • Target Tracking and Data Fusion in Sensor Networks
  • Interconnection Networks and Systems
  • Metaheuristic Optimization Algorithms Research
  • Image Processing and 3D Reconstruction
  • Cryptographic Implementations and Security
  • Archaeological Research and Protection
  • Forensic Anthropology and Bioarchaeology Studies
  • Algorithms and Data Compression
  • Data Mining Algorithms and Applications
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Scheduling and Optimization Algorithms
  • Digital Media and Visual Art
  • Product Development and Customization
  • Embedded Systems and FPGA Design
  • Image and Object Detection Techniques
  • Advanced Image Processing Techniques
  • Evolutionary Algorithms and Applications
  • Embedded Systems Design Techniques
  • Image Enhancement Techniques
  • Color perception and design
  • Chaos-based Image/Signal Encryption

Guiyang Medical University
2024

Shanghai Public Security Bureau
2023

Guodian Institute of Science and Technology
2023

Xiamen University of Technology
2021-2022

PLA Information Engineering University
2010-2022

Wuhan University
2008-2022

Institute of Information Engineering
2012

Wuhan University of Science and Technology
2007

Xichang University
2005

The Aquila Optimizer (AO) algorithm is a meta-heuristic with excellent performance, although it may be insufficient or tend to fall into local optima as the complexity of real-world optimization problems increases. To overcome shortcomings AO, we propose an improved (IAO) which improves original AO via three strategies. First, in order improve process, introduce search control factor (SCF) absolute value decreasing iteration progresses, improving hunting strategies AO. Second, random...

10.3390/pr10081451 article EN Processes 2022-07-25

Osteosarcoma and chondrosarcoma are common malignant bone tumors, accurate differentiation between these two tumors is crucial for treatment strategies prognosis assessment. However, traditional radiological methods face diagnostic challenges due to the similarity in imaging two.

10.3389/fmed.2024.1497309 article EN cc-by Frontiers in Medicine 2024-11-20

Abstract Skeleton Ground Truth (GT) is critical to the success of supervised skeleton extraction methods, especially with popularity deep learning techniques. Furthermore, we see GTs used not only for training detectors Convolutional Neural Networks (CNN), but also evaluating skeleton-related pruning and matching algorithms. However, most existing shape image datasets suffer from lack GT inconsistency standards. As a result, it difficult evaluate reproduce CNN-based algorithms on fair basis....

10.1007/s11263-023-01926-3 article EN cc-by International Journal of Computer Vision 2023-11-01

Summary The general Global Navigation Satellite System (GNSS) receiver faces several challenges because of jamming signals, spoofing and multipath which severely influence its safety. In this paper, a scheme with an interference recognition function is designed. the latter, correlation peak different shapes produced according to interferences. machine learning method then applied recognize classify these feature maps. This transforms problem into learning‐based classification problem. order...

10.1002/sat.1444 article EN International Journal of Satellite Communications and Networking 2022-04-23

In order to accelerate the convergence speed and accuracy of artificial bee colony algorithm, a double strategy improved algorithm is proposed, validate with classical testing functions. Firstly, using tent chaotic mapping, random numbers are generated during search process increase diversity, reverse learning used improve quality solutions, allowing explore more solution spaces process; Then, an adaptive elite guidance introduced hiring process, utilizing global optimal individual...

10.1109/icarce59252.2024.10492477 article EN 2023-12-14

In view of the variable task structure and complex scheduling environment heterogeneous computing system, low efficiency existing algorithms, this paper abstracts system by establishing a directed acyclic graph target model, proposes Q-learning based intelligent ant colony algorithm. The algorithm adapts scene to environment, dynamically calculates Q matrix according reward function, is used as initial pheromone According pseudo-random proportional rule select processor, list formed...

10.1109/icet51757.2021.9451002 article EN 2022 IEEE 5th International Conference on Electronics Technology (ICET) 2021-05-07

The security of cryptographic algorithms is great importance to information security. Power attack technology poses a serious threat the algorithm operations. In this paper composite field-based AES mask protection design proposed, realizing inversion operation in S-box through decomposition field. And random added each operations based on structure. Each intermediate value randomized, and cyclic shift used implement transformation round operation, thus improving ability resist power...

10.1109/cis54983.2021.00097 article EN 2021 17th International Conference on Computational Intelligence and Security (CIS) 2021-11-01

With the rapid development of LBS system in recent years, existed communication and cognition model cannot describe its features entirely. After analysis system, aiming at limitations theory, this paper proposes spatial information subscribers.

10.1117/12.812630 article EN Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE 2008-10-24

Aiming at the no-wait flow shop scheduling problem with goal of minimizing maximum makespan, a discrete wolf pack algorithm has been proposed. First, methods for solving and application research were summarized, it was pointed out that there lack on to solve problem. According analysis characteristics problem, individual coded by decimal integer; searching behavior realized through exchange different code bits in wolf, continuous segment head randomly selected replace corresponding fierce...

10.1155/2021/4731012 article EN cc-by Scientific Programming 2021-12-21

Skeleton Ground Truth (GT) is critical to the success of supervised skeleton extraction methods, especially with popularity deep learning techniques. Furthermore, we see GTs used not only for training detectors Convolutional Neural Networks (CNN) but also evaluating skeleton-related pruning and matching algorithms. However, most existing shape image datasets suffer from lack GT inconsistency standards. As a result, it difficult evaluate reproduce CNN-based algorithms on fair basis. In this...

10.48550/arxiv.2310.06437 preprint EN cc-by-sa arXiv (Cornell University) 2023-01-01

In order to give full play the high parallel and efficiency characteristics of heterogeneous signal processing platforms, relevant scholars at home abroad have proposed many task scheduling algorithms with their own advantages improve efficiency. However, for communication intensive tasks, existing deployment methods are no longer applicable because higher requirements delay becomes key limit performance platform. For communication-intensive this paper proposes a load balancing method based...

10.1117/12.2636691 article EN 2nd International Conference on Internet of Things and Smart City (IoTSC 2022) 2022-05-09

In recent years, with the popularization of 5G communication technology and rapid growth data traffic network bandwidth, aiming at problem large CPU (Central Processing Unit) processing burden low occupancy in protocol processing, this paper uses TOE (TCP Offload Engine) to implement on ZYNQ hardware. is unload TCP/IP execute it hardware, convert C/RTL (Register Transfer Level) code through high-level integrated HLS (High Level Synthesis). The results show that accelerated method based can...

10.1117/12.2636353 article EN 2nd International Conference on Internet of Things and Smart City (IoTSC 2022) 2022-05-08

Deep learning techniques have been widely used in the field of Side Channel Attack (SCA), which poses a serious threat to security cryptographic algorithms. However, deep learning-based side channel attack also has problems such as inefficient models, poor robustness, and longtime consumption. To address these problems, this paper focuses on performance Long Short-term Memory(LSTM) combining with dimensional compression technique Sparse Auto Encoder (SAE), validates it fully synchronized...

10.1117/12.2653520 article EN 2022-12-08

Global navigation satellite system (GNSS) has been widely used around the world, but problems like low signal intensity or blocked could often cause users unable to collect enough for position purpose. A pseudolite geolocation is designed which can worked instead of non-line-of-sight (NLOS) satellites, cooperate with on orbit GNSS satellites. We detailed a novel consists and working progress. Through application scenario analysis simulation we verified that pseudorange errors main factor...

10.1109/ieeeconf52377.2022.10013350 article EN 2022-04-21
Coming Soon ...