Sheng Jiang

ORCID: 0000-0003-3061-8023
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Error Correcting Code Techniques
  • Advanced Wireless Communication Techniques
  • Coding theory and cryptography
  • Climate change and permafrost
  • Advanced X-ray and CT Imaging
  • Methane Hydrates and Related Phenomena
  • Cooperative Communication and Network Coding
  • graph theory and CDMA systems
  • Welding Techniques and Residual Stresses
  • Remote-Sensing Image Classification
  • Data Management and Algorithms
  • Medical Imaging Techniques and Applications
  • Advanced Computational Techniques and Applications
  • Geothermal Energy Systems and Applications
  • Advanced Algorithms and Applications
  • Genetic Mapping and Diversity in Plants and Animals
  • Drilling and Well Engineering
  • Digital Radiography and Breast Imaging
  • CO2 Sequestration and Geologic Interactions
  • Genetic and phenotypic traits in livestock
  • Soil Mechanics and Vehicle Dynamics
  • Plasmonic and Surface Plasmon Research
  • Carbon Dioxide Capture Technologies
  • Cellular Automata and Applications
  • Identification and Quantification in Food

Jilin University
2025

Ministry of Natural Resources
2025

China Agricultural University
2025

South China Agricultural University
2024

Guangdong Province Environmental Monitoring Center
2024

Hong Kong Polytechnic University
2017-2024

Changchun University of Science and Technology
2021-2022

Shenzhen Polytechnic
2017

Southeast University
2013

State Key Laboratory of Remote Sensing Science
2008

The extraction of methane from natural gas hydrates (NGHs) using CO2 offers a dual advantage clean energy production and carbon storage. This study investigates the CO2–CH4 replacement process in permafrost regions through series laboratory experiments, particularly focusing on use liquid under low-temperature conditions. work provides unique insights into kinetics hydrate formation influence temperature pressure recovery sequestration reservoirs. results indicate that as approaches freezing...

10.1021/acs.energyfuels.4c05292 article EN Energy & Fuels 2025-01-21

Abstract Background The effectiveness of genomic prediction (GP) significantly influences breeding progress, and employing SNP markers to predict phenotypic values is a pivotal aspect pig breeding. Machine learning (ML) methods are usually used since their advantages in processing high dimensional data. While, the existing researches have not indicated which ML suitable for most prediction. Therefore, it necessary select appropriate from large number as long performed. This paper compared...

10.1186/s12711-025-00957-3 article EN cc-by Genetics Selection Evolution 2025-03-10

We propose a sub-wavelength range-based dual-band tunable ideal terahertz metamaterial perfect absorber. The absorber structure consists of three main layers, with the layer consisting metal I-shaped structure. By simulating incident wave absorbance structure, we found that has more than 99% absorption peaks in both bands. In addition, have investigated relationship between structural and geometrical parameters. studied thickness hb 4–14 THz band. Secondly, SiO2 dielectric absorbance....

10.3390/coatings12050687 article EN Coatings 2022-05-16

A turbo-Hadamard code (THC) is a type of low-rate channel with capacity approaching the ultimate Shannon limit, i.e., -1.6 dB. In this paper, we investigate hardware implementation encoder/decoder system. particular, study THC systems rates 0.0114 and 0.0143. With messages quantized into 6 bits, show that degradation compared floating-point computation within 0.15 The entire system has been implemented on FPGA board. When rate equals 0.0143, bit error (BER) 10 <sup...

10.1109/istc.2018.8625371 article EN 2018-12-01

A turbo-Hadamard code (THC) is a type of low-rate channel with capacity approaching the ultimate Shannon limit, i.e., -1.59 dB. In this brief, we investigate hardware design encoder/decoder system. The entire system has been implemented on an FPGA board. bit error rate (BER) 10 <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">-5</sup> can be achieved at E <sub xmlns:xlink="http://www.w3.org/1999/xlink">b</sub> /N...

10.1109/tcsii.2019.2960613 article EN IEEE Transactions on Circuits & Systems II Express Briefs 2019-12-18

Low-density parity-check (LDPC) codes are normally categorized into random structure or regular structure. In this brief, we introduce a new type of LDPC which is semi-regular style. The matrices the code composed sub-matrices termed tree-permutation (TPMs). These TPMs “semi-regular” and constructed in systematic way. Using 2 × identity matrix anti-diagonal as an example, illustrate how <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">M</sup>...

10.1109/tcsii.2017.2785779 article EN IEEE Transactions on Circuits & Systems II Express Briefs 2017-12-21

Both turbo Hadamard codes and concatenated zigzag are ultimate-Shannonlimit-approaching channel codes. The former one requires the use of Bahl-Cocke-Jelinek-Raviv (BCJR) in iterative decoding process, making decoder structure more complex limiting its throughput. latter one, however, does not involve BCJR decoding. Hence can be much simpler potentially operate at a higher In this paper, we investigate hardware design encoder/decoder system implement it onto an FPGA board. We capable multiple...

10.1109/access.2020.3022537 article EN cc-by IEEE Access 2020-01-01

This paper addresses the issue of pesticide waste and low utilization rates resulting from traditional plant protection via spraying operations, which apply equal dosages to different targets or parts same target. To tackle this problem, we designed a variable fruit tree system based on ExG-AABB (excess green axis-aligned bounding box) algorithm. We used Kinect depth camera capture information about canopy constructed spray flow model using pulse width modulation control technology. Variable...

10.3390/agronomy14102199 article EN cc-by Agronomy 2024-09-25

Protograph-based low-density parity-check Hadamard codes (PLDPC-HCs) are a new type of ultimate-Shannon-limit-approaching codes. In this paper, we propose hardware architecture for the PLDPC-HC layered decoders. The decoders consist mainly random address memories, sub-decoders and control logics. Two types pipelined structures presented latency throughput these two derived. Implementation decoder design on an FPGA board shows that 1.48 Gbps is achieved with bit error rate (BER)...

10.1109/tcsi.2022.3200687 article EN IEEE Transactions on Circuits and Systems I Regular Papers 2022-08-29

Blood samples are easily damaged in traditional bloodstain detection and identification.In complex scenes with interfering objects, identification may be inaccurate, low rates false-positive results.In order to meet these challenges, we propose a method based on hyperspectral imaging mixed convolutional neural networks, which enables fast efficient non-destructive of bloodstains.In this study, apply visible/nearinfrared reflectance the 380-1000 nm spectral region analyze shape, structure,...

10.1109/access.2022.3195029 article EN cc-by IEEE Access 2022-01-01

In this paper, starting from the noise and blur characteristics of strain clamp X-ray image , an processing method combining bilateral filter denoising unsharp mask enhancement is proposed. Experimental results show that algorithm have certain limitations in edge enhancement. After denoised by filtering,the used for enhancement, which can effectively expand scope algorithm. This greatly improve qualityand help identify defects. It provides a strong guarantee support inspection clamp, has...

10.1117/12.2605528 article EN AOPC 2020: Optical Sensing and Imaging Technology 2021-11-24

This paper investigates the puncturing pattern design of Hadamard codes. When designing patterns, minimum Hamming distance property and cross-correlation punctured codes are considered. The theoretical upper bound is derived for an algorithm subsequently proposed searching with approaching bound. Another approach to minimize cross-correlations between codewords. A new metric defined measure overall severity based on which "lowest" found. Simulation results show that both techniques effective...

10.23919/apcc.2017.8304001 article EN 2017-12-01

Given an all-one base matrix of size M×N, a closed path different lengths can be formed by starting at arbitrary element and moving horizontally vertically alternatively before terminating the same "starting" element. When closed-path length is small, say 4 or 6, total number combinations evaluated easily. increases, computation becomes non-trivial. In this paper, novel method proposed to evaluate paths in matrix. Theoretical results up 10 have been derived are verified exhaustive search...

10.1109/access.2018.2819981 article EN cc-by-nc-nd IEEE Access 2018-01-01

In the application of X-ray industrial flaw detection, exposure parameters directly affect image quality. The voltage tube is most important factor, which difficult to be accurately calculated. Especially in detection a workpiece composed both high absorption coefficient and low materials, improper symmetric balance would lead an overexposure or underexposure phenomenon. this paper, based on model, combined with performance imaging detector, taking optimal symmetry contrast as model...

10.3390/sym15010044 article EN cc-by Symmetry 2022-12-24

This letter proposed a user selection with swap (USS) algorithm based on zero-forcing beamforming (ZFBF). USS starts an initial group the largest channel 2-norms, iteratively “worst” (has minimal achieved rate) among scheduled users “best” maximum 2-norm) remaining users. Based simulation results, we can confirm that provide comparable performance previous algorithms greatly reduced complexity of O(KN2).

10.1587/comex.2.459 article EN IEICE Communications Express 2013-01-01

The "Tree Method" is usually used to identify potential cycles in low-density parity-check codes. However, with the increasing demand of high girth codes, method becomes hard implement because exponential increase both space complexity and time complexity. In this paper, a new introduced evaluate for all-one base matrix. applies large cycle length arbitrary size principle duplication are studied support approach. Instead doing low efficient exhaustive search, approach gives number without...

10.23919/icact.2018.8323662 article EN 2022 24th International Conference on Advanced Communication Technology (ICACT) 2018-02-01
Coming Soon ...