- Advanced Vision and Imaging
- Advanced Image Processing Techniques
- Energy Efficient Wireless Sensor Networks
- Mobile Ad Hoc Networks
- Security in Wireless Sensor Networks
- Visual Attention and Saliency Detection
- Advanced Image and Video Retrieval Techniques
- Image Enhancement Techniques
- Advanced Neural Network Applications
- Image Processing Techniques and Applications
- Face recognition and analysis
- Gaze Tracking and Assistive Technology
- Advanced Wireless Communication Techniques
- Advanced MIMO Systems Optimization
- Opportunistic and Delay-Tolerant Networks
- Advanced Optical Sensing Technologies
- Optical measurement and interference techniques
- Fractal and DNA sequence analysis
- Algorithms and Data Compression
- Advanced Computational Techniques and Applications
- Video Surveillance and Tracking Methods
- Web Data Mining and Analysis
- Cryptography and Data Security
- Color Science and Applications
- Wireless Communication Networks Research
North China University of Technology
2024
Xi'an Technological University
2023
Shanghai University
2019-2021
Wuhan University
2021
Beijing Institute of Technology
2018-2021
Nankai University
2020
Southwest University of Science and Technology
2019
PLA Army Engineering University
2018
Iowa State University
2009-2012
Institute of Theoretical Physics
2011
Packet dropping and modification are common attacks that can be launched by an adversary to disrupt communication in wireless multihop sensor networks. Many schemes have been proposed mitigate or tolerate such attacks, but very few effectively efficiently identify the intruders. To address this problem, we propose a simple yet effective scheme, which misbehaving forwarders drop modify packets. Extensive analysis simulations conducted verify effectiveness efficiency of scheme.
Packet dropping and modification are common attacks that can be launched by an adversary to disrupt communication in wireless multi-hop sensor networks. Many schemes have been proposed mitigate the but none effectively efficiently identify intruders. To address problem, we propose a simple yet effective scheme, which misbehaving forwarders drop or modify packets. Extensive analysis simulations using ns2 simulator conducted verified effectiveness efficiency of scheme.
When deployed for long-term tasks, the energy required to support sensor nodes' activities is far more than that can be preloaded in their batteries. No matter how battery conserved, once used up, network life terminates. Therefore, guaranteeing long- term supply has persisted as a big challenge. To address this problem, we propose node replacement and reclamation (NRR) strategy, with which mobile robot or human labor called repairman (MR) periodically traverses network, reclaims nodes low...
Disordered and frustrated graphical systems are ubiquitous in physics, biology, information science. For models on complete graphs or random graphs, deep understanding has been achieved through the mean-field replica cavity methods. But finite-dimensional 'real' remain very challenging because of abundance short loops strong local correlations. A statistical mechanics theory is constructed this paper for based mathematical framework partition function expansion concept region graphs....
Non-contact human-computer interactions (HCI) based on hand gestures have been widely investigated. Here, we present a novel method to locate the real-time position of using electrostatics human body. This has many advantages, including delay less than one millisecond, low cost, and does not require camera or wearable devices. A formula is first created sense array signals with five spherical electrodes. Next, solving algorithm for measured introduced equations three-dimensional coordinates...
Abstract Image super-resolution is a kind of important image processing technology in computer vision and processing. It refers to the process recovering high-resolution from low-resolution image. has wide range real-world applications, such as medical imaging, security others. In addition improving perception quality, it also helps improve other tasks. Compared with traditional methods, deep learning methods show better reconstruction results field reconstruction, have gradually developed...
Unlike the constraint frontal face condition, faces in wild have various unconstrained interference factors, such as pose variations, illumination variations and occlusion. Because of this, facial expressions recognition (FER) is a challenging task existing methods fail to performant well. However, for occluded (containing occlusion caused by other objects self-occlusion head posture changes), attention mechanism has ability focus on non-occluded regions automatically. In this paper, we...
The intricate physiological composition of the human face facilitates manifestation diverse facial expressions, serving as a conduit for conveyance emotions, cognitive states, and anticipation future reactions. This multifaceted ability holds paramount significance in character representation. realistic reconstruction 3D expressions stands focal point within realms computer graphics vision research. endeavor to capture reconstruct three‐dimensional models depicting finds extensive utility...
The just noticeable distortion (JND) model reveals the visibility limitation. Human eyes hold different attention and sensitivity to regions owing contributions perceptual quality. In this paper, a superpixel-wise JND based on region (RJND) is proposed. First, an image segmented into superpixels by simple linear iterative clustering (SLIC). Then, color contrast calculated for each foveation are selected image. Based human visual perception, weighting established incorporating modulation....
Aiming at the transmission efficiency of asymmetric PCMA communication and improvement its capacity, full use characteristics that technology can be combined with common multiple access realized by transmitting small signals in a large signal band.Firstly, method FDMA CDMA is introduced principle.Then, influence parameter estimation error on demodulation performance under different technologies analyzed simulation.Finally, for two kinds technologies, Corresponding analysis conclusions are...
A grating projection shape measurement system has been a commonly used method in the field of three-dimensional (3D) reconstruction recent years, and global point cloud registration is key step this method. However, process, large amount low-precision overlapping redundant data (ORD) generated between adjacent camera stations, which will seriously affect speed accuracy later modeling. Therefore, how to eliminate these ORD major problem be solved at present. Determining all 3D pairs two...
Currently, a crucial challenge is raised on how to manage large amount of images the Web. Due real synergy between an image and its location, we propose automatic solution annotate contextual location information for WWW images. We construct importance model acquire dominant in page that comprise surrounding text. For each acquired image, develop effective algorithm compute from apply our approach 1,000 pages various Websites annotation. The experiments demonstrated more than 30% are related...
In this paper, camera movements including zoom, pan and tilt could be efficiently detected for conversation scenes in movies using an improved feature point matching method. RANSAC algorithm is applied to reduce the error rate of matching. This implementation possesses notable significance scenes' editing analysis. Besides, it essential fundamental step constructing a visual attention model.
High dynamic range (HDR) images capture the luminance information of real world and have more detailed than low (LDR) images. In this paper, we propose a dual-streams global guided end-to-end learning method to reconstruct HDR image from single LDR input that combines both local features. our framework, features are separately learned in branches. reconstructed phase, use fusion layer fuse them so can guide better image. Furthermore, design mixed loss function including multi-scale...
In order to improve the accuracy of vehicle detection, this paper proposes a detection method based on improved YOLOv3. First, loss function YOLOv3 algorithm is by introducing GIoU and focal strategies, meanwhile, network improved. Secondly, adopting data augmentation for preprocessing, adding label smoothing strategy improves generalization ability model further average detection. During training, multi-scale training used, cosine decay learning rate used replace step strategy, which...
In video understanding, a core task is to detect the objects in frames and recently state-of-art methods are proposed exhaustively possible objects. Few studies discussing exact these by importance of object roles, which refer ones that relatively concerned attract more attention audience short clip. This paper intends represent audience's transfer mechanism attractive (key object) proposes key detection network based on temporal reinforcement learning (RL). Temporal RL means our model...
In a system composed of line array CCD and multiple LEDs, it is necessary to accurately obtain the exposure sequence work on while LEDs are lit, which makes time synchronization more difficult under wireless conditions. this paper, synchronous based division access (TDMA) timing proposed. The method reduces network load hardware power consumption avoids use signal lines for between nodes. errors described, generation theoretically analyzed experimentally verified. node clock proposed,...