- Error Correcting Code Techniques
- Advanced Wireless Communication Techniques
- Coding theory and cryptography
- Climate change and permafrost
- Advanced X-ray and CT Imaging
- Methane Hydrates and Related Phenomena
- Cooperative Communication and Network Coding
- graph theory and CDMA systems
- Welding Techniques and Residual Stresses
- Remote-Sensing Image Classification
- Data Management and Algorithms
- Medical Imaging Techniques and Applications
- Advanced Computational Techniques and Applications
- Geothermal Energy Systems and Applications
- Advanced Algorithms and Applications
- Genetic Mapping and Diversity in Plants and Animals
- Drilling and Well Engineering
- Digital Radiography and Breast Imaging
- CO2 Sequestration and Geologic Interactions
- Genetic and phenotypic traits in livestock
- Soil Mechanics and Vehicle Dynamics
- Plasmonic and Surface Plasmon Research
- Carbon Dioxide Capture Technologies
- Cellular Automata and Applications
- Identification and Quantification in Food
Jilin University
2025
Ministry of Natural Resources
2025
China Agricultural University
2025
South China Agricultural University
2024
Guangdong Province Environmental Monitoring Center
2024
Hong Kong Polytechnic University
2017-2024
Changchun University of Science and Technology
2021-2022
Shenzhen Polytechnic
2017
Southeast University
2013
State Key Laboratory of Remote Sensing Science
2008
The extraction of methane from natural gas hydrates (NGHs) using CO2 offers a dual advantage clean energy production and carbon storage. This study investigates the CO2–CH4 replacement process in permafrost regions through series laboratory experiments, particularly focusing on use liquid under low-temperature conditions. work provides unique insights into kinetics hydrate formation influence temperature pressure recovery sequestration reservoirs. results indicate that as approaches freezing...
Abstract Background The effectiveness of genomic prediction (GP) significantly influences breeding progress, and employing SNP markers to predict phenotypic values is a pivotal aspect pig breeding. Machine learning (ML) methods are usually used since their advantages in processing high dimensional data. While, the existing researches have not indicated which ML suitable for most prediction. Therefore, it necessary select appropriate from large number as long performed. This paper compared...
We propose a sub-wavelength range-based dual-band tunable ideal terahertz metamaterial perfect absorber. The absorber structure consists of three main layers, with the layer consisting metal I-shaped structure. By simulating incident wave absorbance structure, we found that has more than 99% absorption peaks in both bands. In addition, have investigated relationship between structural and geometrical parameters. studied thickness hb 4–14 THz band. Secondly, SiO2 dielectric absorbance....
A turbo-Hadamard code (THC) is a type of low-rate channel with capacity approaching the ultimate Shannon limit, i.e., -1.6 dB. In this paper, we investigate hardware implementation encoder/decoder system. particular, study THC systems rates 0.0114 and 0.0143. With messages quantized into 6 bits, show that degradation compared floating-point computation within 0.15 The entire system has been implemented on FPGA board. When rate equals 0.0143, bit error (BER) 10 <sup...
A turbo-Hadamard code (THC) is a type of low-rate channel with capacity approaching the ultimate Shannon limit, i.e., -1.59 dB. In this brief, we investigate hardware design encoder/decoder system. The entire system has been implemented on an FPGA board. bit error rate (BER) 10 <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">-5</sup> can be achieved at E <sub xmlns:xlink="http://www.w3.org/1999/xlink">b</sub> /N...
Low-density parity-check (LDPC) codes are normally categorized into random structure or regular structure. In this brief, we introduce a new type of LDPC which is semi-regular style. The matrices the code composed sub-matrices termed tree-permutation (TPMs). These TPMs “semi-regular” and constructed in systematic way. Using 2 × identity matrix anti-diagonal as an example, illustrate how <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">M</sup>...
Both turbo Hadamard codes and concatenated zigzag are ultimate-Shannonlimit-approaching channel codes. The former one requires the use of Bahl-Cocke-Jelinek-Raviv (BCJR) in iterative decoding process, making decoder structure more complex limiting its throughput. latter one, however, does not involve BCJR decoding. Hence can be much simpler potentially operate at a higher In this paper, we investigate hardware design encoder/decoder system implement it onto an FPGA board. We capable multiple...
This paper addresses the issue of pesticide waste and low utilization rates resulting from traditional plant protection via spraying operations, which apply equal dosages to different targets or parts same target. To tackle this problem, we designed a variable fruit tree system based on ExG-AABB (excess green axis-aligned bounding box) algorithm. We used Kinect depth camera capture information about canopy constructed spray flow model using pulse width modulation control technology. Variable...
Protograph-based low-density parity-check Hadamard codes (PLDPC-HCs) are a new type of ultimate-Shannon-limit-approaching codes. In this paper, we propose hardware architecture for the PLDPC-HC layered decoders. The decoders consist mainly random address memories, sub-decoders and control logics. Two types pipelined structures presented latency throughput these two derived. Implementation decoder design on an FPGA board shows that 1.48 Gbps is achieved with bit error rate (BER)...
Blood samples are easily damaged in traditional bloodstain detection and identification.In complex scenes with interfering objects, identification may be inaccurate, low rates false-positive results.In order to meet these challenges, we propose a method based on hyperspectral imaging mixed convolutional neural networks, which enables fast efficient non-destructive of bloodstains.In this study, apply visible/nearinfrared reflectance the 380-1000 nm spectral region analyze shape, structure,...
In this paper, starting from the noise and blur characteristics of strain clamp X-ray image , an processing method combining bilateral filter denoising unsharp mask enhancement is proposed. Experimental results show that algorithm have certain limitations in edge enhancement. After denoised by filtering,the used for enhancement, which can effectively expand scope algorithm. This greatly improve qualityand help identify defects. It provides a strong guarantee support inspection clamp, has...
This paper investigates the puncturing pattern design of Hadamard codes. When designing patterns, minimum Hamming distance property and cross-correlation punctured codes are considered. The theoretical upper bound is derived for an algorithm subsequently proposed searching with approaching bound. Another approach to minimize cross-correlations between codewords. A new metric defined measure overall severity based on which "lowest" found. Simulation results show that both techniques effective...
Given an all-one base matrix of size M×N, a closed path different lengths can be formed by starting at arbitrary element and moving horizontally vertically alternatively before terminating the same "starting" element. When closed-path length is small, say 4 or 6, total number combinations evaluated easily. increases, computation becomes non-trivial. In this paper, novel method proposed to evaluate paths in matrix. Theoretical results up 10 have been derived are verified exhaustive search...
In the application of X-ray industrial flaw detection, exposure parameters directly affect image quality. The voltage tube is most important factor, which difficult to be accurately calculated. Especially in detection a workpiece composed both high absorption coefficient and low materials, improper symmetric balance would lead an overexposure or underexposure phenomenon. this paper, based on model, combined with performance imaging detector, taking optimal symmetry contrast as model...
This letter proposed a user selection with swap (USS) algorithm based on zero-forcing beamforming (ZFBF). USS starts an initial group the largest channel 2-norms, iteratively “worst” (has minimal achieved rate) among scheduled users “best” maximum 2-norm) remaining users. Based simulation results, we can confirm that provide comparable performance previous algorithms greatly reduced complexity of O(KN2).
The "Tree Method" is usually used to identify potential cycles in low-density parity-check codes. However, with the increasing demand of high girth codes, method becomes hard implement because exponential increase both space complexity and time complexity. In this paper, a new introduced evaluate for all-one base matrix. applies large cycle length arbitrary size principle duplication are studied support approach. Instead doing low efficient exhaustive search, approach gives number without...