- Advanced Steganography and Watermarking Techniques
- Digital Media Forensic Detection
- Chaos-based Image/Signal Encryption
- Mobile Agent-Based Network Management
- Network Security and Intrusion Detection
- Advanced Computational Techniques and Applications
- Peer-to-Peer Network Technologies
- Image and Video Stabilization
- Advanced Algorithms and Applications
- Blind Source Separation Techniques
- Simulation and Modeling Applications
- Technology Adoption and User Behaviour
- Advanced MRI Techniques and Applications
- Service-Oriented Architecture and Web Services
- E-Learning and Knowledge Management
- Medical Imaging Techniques and Applications
- Smart Grid Energy Management
- Natural Language Processing Techniques
- Advanced Data Compression Techniques
- Web and Library Services
- Advanced Computing and Algorithms
- Multimodal Machine Learning Applications
- Knowledge Management and Sharing
- Advanced Sensor and Control Systems
- Online Learning and Analytics
Xi'an Jiaotong University
2023-2024
South China Normal University
2024
University of Science and Technology of China
2024
Tea Research Institute
2023
Northwestern Polytechnical University
2023
Zunyi Normal College
2023
University of Wisconsin–Madison
2023
Guangdong University of Technology
2022
Nanjing Normal University
2022
Zhengzhou University
2022
0/1 knapsack problem belongs to combination optimization problem. Its optimal solution exists in the space including substantially large useless solutions besides solutions. Differing with other SA (simulated annealing) algorithms that getting approximate from whole often need much computation time, this improved algorithm proposed paper avoided disadvantage by extracting two kinds of spaces, i.e. all and most possible part space, space. Then improve quality some variables were introduced...
Remote sensing images often encounter various challenges arising from differences in shooting time, location, equipment, sensors, and other factors. These disparities lead to image distortion insufficient overlap between pairs of captured at the same location. Consequently, accuracy agricultural remote registration is significantly compromised. This paper proposes a robust feature matching technique called GAN-based neighborhood representation (RFM-GAN) for intricate satellite unmanned...
In magnetic resonance imaging (MRI), multi-contrast pulse sequences are routinely acquired, providing complementary information for medical diagnosis. Compared with the single-contrast MR image reconstruction, could further accelerate data acquisition and improve reconstruction quality by leveraging of images. this paper, we propose a model-driven graph transformer (MD-GraphFormer) fast imaging, which incorporates physical constraints MRI investigates among images using structure attention...
Steganography is defined as the art and science of hiding information, which a process that involves message in an appropriate carrier for example image file. The can then be sent to receiver without anyone else knowing it contains hidden message. In this paper we present novel scheme send imperceptibly between points over Internet. This uses fourth-order Chebyshev chaotic system generate chaos sequence used encrypt secret message, embeds modulated into identification field IP header....
Parallel imaging (PI), relying on multicoils to sense -space data, is an effective technique accelerate magnetic resonance by exploiting spatial sensitivity coding of multiple coils, with integrated compressive sensing (CS) technology achieve higher acceleration. In this paper, we propose a novel nonconvex reconstruction model and its proximal alternating linearized minimization (PALM) algorithm for PI in blind setting that MR image multichannel maps are jointly estimated, regularized...
In this paper we propose a scheme using image quality metrics and multi-class support vector machine to identify steganographic domains. Firstly, classify stegnographic domains into four, i.e. spatial domain, DCT DWT domain ICA domain. Then analyze total 26 measures summarized by Ismail Avcibas choose eight sensitive features based on the analysis of variance technique as feature set distinguish between cover-images stego-images which are marked in four respectively. The features' scores...
With the increasing proportion of renewable energy generation into power grid, more challenges are coming to safe and stable operation system. In order keep balance in market, system operator has purchase much service ancillary market guarantee transmission. Virtual plant (VPP) been extensively studied as a concept that aggregates multiple resource forms serve electricity market. Meanwhile, with development Energy Internet (EI) Error! Reference source not found., attention focused on...
Background: DBS has been shown to significantly affect motor symptoms in Parkinson's disease (PD). However, some studies have suggested that it may adverse effects on patients' neurocognitive function. To clarify this operation's effect function, we collected containing function evaluation for qualitative and quantitative analysis. Methods: We searched relevant clinical through Pubmed Embase databases extracted sorted out information such as sample size, post-operative scores, pre-operative...
In this paper, we propose a beamforming scheme based on radial basis function (RBF) network for multiple input output (MIMO) wireless communication systems. The RBF is an effective forward neural network, which has the advantages of easy training and fast convergence rate. This technique performs better than higher order statistics beamformer.
Two novel active steganalysis schemes which only use one copy of stego image are presented in this paper. We view as blind sources separation (BSS) problem and can be solved with independent component analysis (ICA) algorithm under the assumption that embedded secret message is an independent, identically distributed (i.i.d) random sequence to cover image. With we firstly adopt maximum a posteriori (MAP) estimator obtain estimate The first scheme views estimated version another second...
An effective and efficient e-learning platform should hide systems' complexity provide an easy flexible interaction operation. Poor interface design of is a main factor impacting on students' interactive with system learning outcomes. The purpose this study to evaluate non-degree performance analysis user perception methods investigate the system's efficiency, effectiveness satisfaction. In study, efficiency are evaluated by time task completion score. Satisfaction questionnaire...
A novel digital watermark against RST distortion based on SURF is proposed. The algorithm the second watermark, fast than SIFT, so that faster, and ability nearly same with feature SIFT. use odd-even detector properly to avoid procedure when embedded.
In order to solve the cooperative maneuvering decision problem of UAVs in dual-UAVs formations air combat, this paper proposes an combat algorithm based on a reward mechanism and distributed Multi-Agent Twin Delayed Deep Deterministic Policy Gradient (MATD3). Firstly, function is designed according purpose combat. Secondly, To address sparse introduced idea real variable weight superposition method optimal distance calculation immediate reshape function. The formation confrontation...
ABSTRACT This article describes an “on-the-road” usability study and explains the study's methodological challenges, solutions, recommendations. The concerned a library-consortium website, which is communication educational tool for librarians who are physically dispersed throughout state, intranet remote users. Rather than traveling to numerous locations or attempting evaluation of lab took mobile laboratory professional conference where large number website users were gathered. Four...
A continuously tunable gain and bandwidth analog front-end for ambulatory biopotential measurement systems is presented. The circuit capable of amplifying conditioning different biosignals. To optimize the power consumption simplify system architecture, only adopts two-stage amplifiers. In addition, careful design eliminates need chopping circuits. input-referred noise 1.19 μVrms (0.48–2000 Hz). chip fabricated via a SMIC 0.18 μm CMOS process. Although 32.1 μW under 3 V voltage supply, test...
In this paper, a scalable, robust and recovery-driven authentication scheme targeting at verifying the authenticity of JPEG2000 images is proposed. It achieved by truncating bit planes wavelet coefficients into two portions in codec based on lowest compression rate (CBR). The invariant features, which are generated from upper portion, signed sender's private key to generate crypto signature. By embedding signature has ability for content as long final transmitted image not less than CBR....
Integrated Energy System is beneficial for promoting the distributed renewable energy (DRE) consumption, thereby alleviating environmental pollution and shortage. In this paper, we propose a virtual power plant (VPP) structure considering feature of heat electric system integration, which defined as Multi-energy Virtual Power Plant (MVPP). MVPP allowed to participate in electricity market; price information from bulk market can affect heating through coupling devices, thus optimizing...
Abstract College websites play an increasingly important role in the lives of students, faculty, and parents providing them with necessary information communication opportunities. A number researchers have studied effectiveness college websites, however, most these studies focused on needs students. There is a research gap understanding multiple audiences websites. This paper presents preliminary findings study user groups community website: traditional non‐traditional employees, parents,...
Self-regulated learning (SRL) plays an important role in most life-long training projects. In SRL, easy and flexible interaction with system is a primary factor impacting learners' motivation outcomes. The purpose of this study to evaluate government platform Performance Analysis User Perception methods investigate the system's efficiency, effectiveness satisfaction. study, efficiency were evaluated by Time on Task Completion score, satisfaction was Questionnaire Interviews. Based our...
In this paper, we show that Y can be introduced into data sharpening to produce non-parametric regression estimators enjoy high orders of bias reduction. Compared with those in existing literature, the proposed data-sharpening estimator has advantages including simplicity estimators, good performance expectation and variance, mild assumptions. We generalize dependent errors. Finally, conduct a limited simulation illustrate performs better than ones.