Yamin Li

ORCID: 0000-0003-3974-0690
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Energy Efficient Wireless Sensor Networks
  • Advanced Steganography and Watermarking Techniques
  • Numerical Methods and Algorithms
  • Advanced Chemical Physics Studies
  • Interconnection Networks and Systems
  • Robotics and Sensor-Based Localization
  • Advanced Image and Video Retrieval Techniques
  • Distributed and Parallel Computing Systems
  • Robotic Path Planning Algorithms
  • Advanced Neural Network Applications
  • Quantum, superfluid, helium dynamics
  • Parallel Computing and Optimization Techniques
  • Surgical Simulation and Training
  • Image and Object Detection Techniques
  • Human Pose and Action Recognition
  • Topic Modeling
  • Embedded Systems Design Techniques
  • Image Processing Techniques and Applications
  • Advanced Vision and Imaging
  • Low-power high-performance VLSI design
  • Modular Robots and Swarm Intelligence
  • Digital Image Processing Techniques
  • Spectroscopy and Quantum Chemical Studies
  • Distributed Control Multi-Agent Systems
  • Cryptography and Residue Arithmetic

Hubei University
2017-2024

Zhengzhou University of Science and Technology
2023

China Three Gorges University
2021-2023

Hong Kong University of Science and Technology
2019

University of Hong Kong
2019

China University of Geosciences
2016

Dalian Jiaotong University
2010-2013

Taizhou Vocational and Technical College
2008

Lanzhou University of Technology
2008

Central Committee of the Communist Party of China
2006

Current perception models in autonomous driving have become notorious for greatly relying on a mass of annotated data to cover unseen cases and address the long-tail problem. On other hand, learning from unlabeled large-scale collected incrementally self-training powerful recognition received increasing attention may solutions next-generation industry-level robust driving. However, research community generally suffered inadequacy those essential real-world scene data, which hampers future...

10.48550/arxiv.2106.11037 preprint EN cc-by-nc-sa arXiv (Cornell University) 2021-01-01

10.1016/j.rcim.2019.101827 article EN Robotics and Computer-Integrated Manufacturing 2019-06-22

Monitoring applications based on wireless camera networks are becoming highly attractive. However, processing and streaming all image data impractical for sensor nodes due to the constraints limited energy, bandwidth, computing resources. In this paper, we propose an energy-efficient compressive transmission scheme, which can provide low-complexity regions of interest extraction, energy-driven quality control, robust communication against packet loss over networks. Performance proposed...

10.1109/jsen.2016.2536941 article EN IEEE Sensors Journal 2016-03-01

The core challenge of steganography is always how to improve the hidden capacity and concealment. Most current generation-based linguistic methods only consider probability distribution between text characters, emotion topic generated steganographic are uncontrollable. Especially for long texts, generating several sentences related a displaying overall coherence discourse-relatedness can ensure better In this article, we address problem coherent multi-sentence texts concealment, topic-aware...

10.1145/3418598 article EN ACM/IMS Transactions on Data Science 2021-04-08

In this paper we present a parallel-array implementation of new non-restoring square root algorithm (PASQRT). The carry-save adder (CSA) is used in the parallel array. PASQRT has several features unlike other implementations. First, it does not use redundant representation for result. Second, each iteration generates an exact resulting value. Next require any conversion on inputs CSA. And last, precise remainder can be obtained immediately. Furthermore, improved version-a root-select...

10.1109/iccd.1997.628940 article EN 2002-11-22

Generation-based linguistic steganography is a popular research area of information hiding. The text generative steganographic method based on conditional probability coding the direction that researchers have recently paid attention to. However, in course our experiment, we found secret hiding tends to destroy statistical distribution characteristics original text, which indicates this has problem obvious reduction quality when embedding rate increases, and topic generated texts...

10.32604/cmes.2023.025082 article EN Computer Modeling in Engineering & Sciences 2023-01-01

Structural impairments can be detected by monitoring and analyzing dynamic structural responses. In this paper, accurate deformations of multiple vibrating structures are estimated using one off-the-shelf CCD (Charge-coupled Device) camera a novel target configuration computation algorithm. method, camera, which mounted on either an adjacent structure or stationary support, is used to track global movements structure. The method utilizes subpixel feature extraction, Zhang's calibration-based...

10.12783/shm2017/14219 article EN Structural Health Monitoring 2017-09-28

By reversing secret images, a novel multi-secret visual cryptography scheme is presented in this paper. During the sharing process, correlative matrices are designed to encode multiple images into two ring shares. Compared with previous ones, proposed makes number of not restricted and has obviously improved pixel expansion relative difference.

10.1109/icic.2010.320 article EN 2010-06-01

Hardware square-root units require large numbers of gates even for iterative implementations. In this paper we present four low-cost high-performance fully-pipelined n-select implementations (nS-Root) based on a non-restoring-remainder square root algorithm. The nS-Root uses parallel array carry-save adders (CSAs). For bit calculation, CSA is used once. This means that the calculations can be fully pipelined. It also n-way root-select technique to speedup calculation. cost/performance...

10.1109/acac.2000.824317 article EN 2002-11-07

Most of the existing text generative steganographic methods are based on coding conditional probability distribution each word during generation process, and then selecting specific words according to secret information, so as achieve information hiding. Such have their limitations which may bring potential security risks. Firstly, with increase embedding rate, these models will choose lower probability, reduce quality generated texts; secondly, they can not control semantic expression final...

10.48550/arxiv.2006.08339 preprint EN other-oa arXiv (Cornell University) 2020-01-01

Computing a distance map (distance transform) is an operation that converts 2D image consisting of black and white pixels to where each pixel has value or pair coordinates represents the location nearest pixel. It basic in processing computer vision fields, used for expanding, shrinking, thinning, segmentation, clustering, computing shape, object reconstruction, etc. This paper examines possibility implementing problem finding efficiently using optical bus. The computational model considered...

10.1109/tsmca.2002.1021110 article EN IEEE Transactions on Systems Man and Cybernetics - Part A Systems and Humans 2002-03-01

Numerous studies have shown that nitric oxide (NO) interacts with human cyclooxygenase (COX); however, conflicting results exist respect to their interactions. Herein, recombinant COX-1 and COX-2 were prepared treated NO donors individually under anaerobic aerobic conditions. The S-nitrosylation detection subsequent kinetic investigations into the arachidonic acid (AA) oxidation of COX enzymes indicate S-nitrosylates both in an oxygen-dependent manner, but enhances only dioxygenase activity...

10.1039/c7ob02992f article EN Organic & Biomolecular Chemistry 2017-12-21

This paper describes a pipelined processor (named Aizup) design and implementation for the exercise of Computer Architecture/Organization Education at University Aizu. The Aizup, pipeline has four stages deals with data dependency control dependency. Aizup was designed Cadence environment implemented on Xilinx XC4006PC84 FPGA chip. We ask students to processor, perform functional simulations, implement chip, measure chip logic analyzer. course is helpful understand operations processors...

10.1109/fpga.1996.564755 article EN 1996-01-01

The first quasi-classical trajectory (QCT) calculation for the exothermic reaction Sr + CH 3 Br is carried out based on a constructed London–Eyring–Polanyi–Sato (LEPS) potential energy surface (PES). By QCT calculation, product SrBr vibration distributions are obtained. result in good comparison with experimental one by Keijzer JF et al. [Chem. Phys.207:261, 1996]. Furthermore, angular distribution and rotational alignment also products dominantly forward-scattered effect obvious. Fast...

10.1142/s0219633610005785 article EN Journal of Theoretical and Computational Chemistry 2010-04-01

Addressing the intricate challenge of modeling and re-rendering dynamic scenes, most recent approaches have sought to simplify these complexities using plane-based explicit representations, overcoming slow training time issues associated with methods like Neural Radiance Fields (NeRF) implicit representations. However, straightforward decomposition 4D scenes into multiple 2D representations proves insufficient for high-fidelity complex motions. In response, we present a novel direction-aware...

10.48550/arxiv.2403.02265 preprint EN arXiv (Cornell University) 2024-03-04

Modular inversion on large operands is a time-consuming calculation used in elliptic curve cryptography. Its hardware implementation requires extensive resources such as lookup tables and registers. We investigate state-of-the-art modular algorithms evaluate the performance cost of their implementations. then propose high-radix algorithm aimed at short execution time low cost. present detailed radix-8 based 256-bit primes Verilog HDL compare its with other Our Altera Cyclone V FPGA chip uses...

10.20944/preprints202409.0891.v1 preprint EN 2024-09-11

Numerous recent approaches to modeling and re-rendering dynamic scenes leverage plane-based explicit representations, addressing slow training times associated with models like neural radiance fields (NeRF) Gaussian splatting (GS). However, merely decomposing 4D into multiple 2D representations is insufficient for high-fidelity of complex motions. In response, we present DaRePlane, a novel direction-aware representation approach that captures scene dynamics from six different directions....

10.48550/arxiv.2410.14169 preprint EN arXiv (Cornell University) 2024-10-18

The Segment Anything Model 2 (SAM 2) is the latest generation foundation model for image and video segmentation. Trained on expansive Video (SA-V) dataset, which comprises 35.5 million masks across 50.9K videos, SAM advances its predecessor's capabilities by supporting zero-shot segmentation through various prompts (e.g., points, boxes, masks). Its robust performance efficient memory usage make particularly appealing surgical tool in especially given scarcity of labeled data diversity...

10.48550/arxiv.2408.01648 preprint EN arXiv (Cornell University) 2024-08-02

We present a theoretical study of the H+OCl system on an accurate ab initio potential energy surface (PES) investigated by Peterson et al.[J. Chem. Phys. 113 (2000) 6186]. Both exact time-dependent quantum wave packet (TDWP) and quasi-classical trajectory (QCT) methods are employed. The results reaction probabilities for total angular momentum J = 0 integral cross section calculated TDWP in good agreement with QCT ones. Additionally, nearly forward-backward symmetric product scattering...

10.1088/0256-307x/30/11/113101 article EN Chinese Physics Letters 2013-11-01
Coming Soon ...