- Advanced Computational Techniques and Applications
- Educational Technology and Assessment
- Advanced Malware Detection Techniques
- Security and Verification in Computing
- Higher Education and Teaching Methods
- Software System Performance and Reliability
- Reinforcement Learning in Robotics
- Geology and Paleoclimatology Research
- Simulation and Modeling Applications
- vaccines and immunoinformatics approaches
- Sentiment Analysis and Opinion Mining
- Advanced Data Compression Techniques
- Software Reliability and Analysis Research
- Advanced Vision and Imaging
- Energy Efficient Wireless Sensor Networks
- Water Quality Monitoring Technologies
- Machine Learning in Bioinformatics
- Digital Media Forensic Detection
- Parallel Computing and Optimization Techniques
- Software Testing and Debugging Techniques
- Image Processing and 3D Reconstruction
- Web Applications and Data Management
- Explainable Artificial Intelligence (XAI)
- Security in Wireless Sensor Networks
- Information Architecture and Usability
Xinjiang University
2025
Beijing Institute of Petrochemical Technology
2024-2025
Guangxi University
2011-2024
Central South University
2024
Chinese Academy of Sciences
2015-2024
Institute of Information Engineering
2020-2024
University of Chinese Academy of Sciences
2020-2024
Mudanjiang Normal University
2007-2023
National University of Defense Technology
2021-2022
Institute of Botany
2015-2021
Abstract The area and elevation of the Tibetan Plateau over time has directly affected Asia’s topography, characteristics Asian monsoon modified global climate, but in ways that are poorly understood. Charting uplift history is crucial for understanding mechanisms link climate irrespective place. While some palaeoelevation data available southern central Tibet, clues to northern Tibet remain sparse largely circumstantial. Leaf fossils extremely rare here we report a newly discovered early...
This study aimed to optimize the ultrasonic/microwave-assisted extraction (UAME) technique of Elaeagnus angustifolia polysaccharides (EAP-UM) by response surface methodology (RSM). The optimum conditions include: solid-liquid ratio 1:23 g/mL, ultrasonic power 252 W, microwave 417 and time 11 min. Under these conditions, yield reached 7.87%, superior ultrasound-assisted (UAE, 5.74%), microwave-assisted (MAE, 6.86%), hot water (HWE, 4.91%). UAME could also result in higher carbohydrate,...
Finding efficient, expressive and yet intuitive programming models for data-parallel computing system is an important open problem. Systems like Hadoop Spark have been widely adopted massive data processing, as coarse-grained primitives map reduce are succinct easy to master. However, sometimes over-simplified API hinders programmers from more fine-grained control designing efficient algorithms. Developers may resort sophisticated domain-specific languages (DSLs), or even low-level layers...
Audio perceptual hashing is a digest of audio contents, which independent content preserving manipulations, such as MP3 compression, amplitude scaling, noise addition, etc. It provides fast and reliable tool for identification, retrieval, authentication signals. A new scheme based on non- Negative matrix factorization (NMF) Modified discrete cosine transform (MDCT) coefficients proposed. MDCT coefficients, have been widely used in coding, exhibit good discrimination different contents highly...
The water quality monitoring plays an important role in contamination surveillance and guides the resource protection for safe clean water. A flexible automated real-time alarm system based on wireless sensor network(WSN) is proposed. WSN built accordance with Zigbee communication protocol, which consists of nodes, route nodes coordinator node. cheap efficient sensors (pH electrode, dissolved oxygen temperature senor) transreceiver collect environmental data transmit to node via nodes. are...
Code-reuse attack is a severe threat to computer systems as it can circumvent many existing security defenses and perform arbitrary behavior. Control-flow integrity (CFI) technique that restricts control-flow transfers prevent the attack. Although CFI has been implemented via various methods, including hardware-assisted extensions, current designs of fine-grained fail meet practical needs. The main hurdles include: 1) lack cost-effective design 2) insufficient they cannot enforce complete...
In order to realize the copyright protection of audio information and improve security watermarking algorithm, a secure robust algorithm via quantization random correlation coefficients in lifting wavelet transform domain QR decomposition is proposed Firstly, performed on data, approximate components are mapped into matrix, done blocks matrix. The watermark embedded by coefficient R matrix vector using index modulation. Simulation results show that not only have good imperceptibility high...
A simple and rapid microwave‐assisted extraction (MAE) technique was developed for the of rutin from Lespedeza virgata (Thunb.) DC. The influence four variables on discussed. optimum conditions found were 75% aqueous ethanol, solvent volume to sample weight ratio at 90 : 1, extracting temperature 75 ° C, time 15 min. comparison made among MAE, classical maceration, ultrasonic‐assisted (UAE). Yields determined by high‐performance capillary electrophoresis (HPCE). whole analysis process...
Marketing is all about the process of communicating value a product or service to customers in order stimulate sales, while target marketing maximizes return on investment into activities. We present piece practice transform massive data actionable insights and guidance using statistical analysis mining methods, which helps leading home appliance manufacturer optimize its strategy for increasing customer intimacy, solidifying loyalty, most importantly, boosting sales volume profit.
Improving the availability of soil phosphorus (P) and promoting tree growth through species selection assembly are critical issue. We conducted an afforestation experiment following randomized block experimental design with 1, 2, 4, 6 richness in south subtropics, including
Abstract Soil examination can provide useful forensic information about the spatial location and human activities of a suspect. is widely used in criminal investigations. In case that occurred countryside Jilin Province, NE China, soil was found adhering to clothing on body. Examination plant debris using DNA barcoding technique it be ginseng root, which indicated might have come from plantation. first instance, helped finding place where body initially buried. Then comparison made between...
Emotion is an important part of human intelligence. They can influence behaviors and guide to adapt the environment. Integrating emotion into agent enhance authenticity creditability agent's behavior. This paper classifies as cognitive reflex emotion. The generating mechanisms these two emotions are analyzed. In order model in agent, a framework proposed. framework, production system used based on appraisal theory, generated according conditioned emotional response theory. At last,...
Abstract In the learning process based on ISVM, how to effectively retain history information and selectively discard some new training data, so as maintain classification accuracy save storage space after adding samples every time, which is key of current ISVM algorithm. This thesis proposes a incremental algorithm, that is, SVM algorithm cluster diameter (CD-ISVM). firstly calculates two centers positive negative samples, then build boundary vector set by coordinates class centers....
Return-oriented programming (ROP) is a prevalent code reuse technique that hijacks program's control flow by modifying its return addresses on the stack. Researchers have proposed some address verification methods using message authentication (MAC). But these approaches suffer from high performance overhead. In this article, we first propose Dislocated Stack, new kind of stack layout in which previous would be pushed onto current frame and stored into hardware buffer function calls. Based...
In this paper, we present a modified reliability-based iterative majority-logic decoding (MRBI-MLGD) algorithm for structured LDPC codes. The MRBI-MLGD uses the initial rather than last updated message value in iteration procedure, which works resembling turbo decoder. Furthermore, is an integer passing and mainly requires logical operations. Simulation results show that, compared to original one, MIRB-MLGD can achieve better performance with slightly increased computational complexity.