- Sparse and Compressive Sensing Techniques
- Image and Signal Denoising Methods
- Advanced Image Processing Techniques
- Energy Harvesting in Wireless Networks
- Image Enhancement Techniques
- Photorefractive and Nonlinear Optics
- Advanced Vision and Imaging
- Optical Systems and Laser Technology
- Wireless Sensor Networks and IoT
- Fault Detection and Control Systems
- Full-Duplex Wireless Communications
- Advanced Fiber Laser Technologies
- Photoacoustic and Ultrasonic Imaging
- Image Processing Techniques and Applications
- Advanced Steganography and Watermarking Techniques
- Photonic and Optical Devices
- RFID technology advancements
- Robotic Path Planning Algorithms
- Radar Systems and Signal Processing
- Image Processing and 3D Reconstruction
- Generative Adversarial Networks and Image Synthesis
- Remote-Sensing Image Classification
- Advanced Sensor and Energy Harvesting Materials
- Orbital Angular Momentum in Optics
- Wireless Communication Networks Research
Beijing Technology and Business University
2024
South China University of Technology
2020-2022
Jinan University
2020-2022
National University of Defense Technology
2020
Washington State University
2018
Xiangtan University
2013-2016
Research Institute of Highway
2016
Dalian University of Technology
2016
Northwest Institute of Nuclear Technology
2013-2015
Guangdong Polytechnic Normal University
2015
Multi-scale architectures and attention modules have shown effectiveness in many deep learning-based image de-raining methods. However, manually designing integrating these two components into a neural network requires bulk of labor extensive expertise. In this article, high-performance multi-scale attentive architecture search (MANAS) framework is technically developed for de-raining. The proposed method formulates new space with multiple flexible that are favorite to the task. Under space,...
Single image de-raining is an important and highly challenging problem. To address this problem, some depth or density guided single-image methods have been developed with encouraging performance. However, these individually use the to guide network conduct de-raining. In paper, a novel <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">joint de-raining</i> (JDDGD) method technically developed. The JDDGD starts...
In this paper a robust image watermarking algorithm based on DCT by Arnold transform and spread spectrum is proposed. The scrambled to enhance its privacy. specific second high-frequency coefficients of the original are selected effectively according Human Visual System (HVS) characteristic digital processing then encrypted embedded into spectrum. experimental results show that more effective.
We demonstrate theoretically and experimentally a novel photonic spin Hall effect (PSHE), to the best of our knowledge, at an interface between air uniaxial crystal, whose optical axis is within plane. Owing anisotropy partial cross polarization conversion occurs. For horizontally polarized paraxial Gaussian beam incidence, linear gradient forms along in-plane wavevector in reflected beam, allowing us achieve separation real space. The can be tuned by rotating crystal. A maximum...
A fully integrated passive ultrahigh-frequency (UHF) RF identification (RFID) tag circuit (IC) based on Chinese UHF RFID standard (GJB 7377.1) is proposed. An optimized voltage multiplier with threshold compensation and leakage current suppression designed to improve the RF-DC power conversion efficiency, which more than 58% for different load current. system clock constraint condition proposed digital baseband (BB) algorithm instead of calibration introduced ensure correct demodulation...
Rain removal is a highly demanding task because rainy image in computer lacks discriminative information to distinguish the details from rain streaks. In this paper, we present new High-Low-Frequency Guided De-raining (HLFGD) method remove streaks clearly while reserve details. Specifically, proposed HLFGD built with three network branches, namely global-structure branch, de-raining and edge-detail which achieve collaboration by concatenating intermediate features. Among them, branches aim...
As a prior knowledge, non‐local self‐similarity (NSS) has been widely utilised in ill‐posed problems. Actually, similar textures appear not only single scale, but also different scales. Unlike most existing patch‐based methods that explore NSS the same multi‐scale patches based image denoising algorithm is proposed this study. The authors have designed strategy to expand search space of block‐matching, which will increase probability finding more patches. After that, weighted nuclear norm...
The spot profile and intensity distribution of output beam from unstable resonator a DF Laser were measured. results showed the was ring with 45mm external diameter measurement data sufficed for design requests. But asymmetric seriously on horizontal direction, which arose by two possible reason, one non-uniform gain medium , other optic-axis migration to upstream medium.
An optical labeling scheme using hybrid multiwave-length-polarization (λP) label and amplitude shift keying (ASK) payload is introduced. This exploits wavelengths with two different states of polarization (SOP), circular state linear state, as label. Compared multiwavelength labeling, it remarkably enlarges the header information reduces requirement wavelength accuracy. experiment system for generating detecting λP label, which based on difference extinction ratio (PER), demonstrated....
Theoretical guarantees for the ℓ <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">0,∞</sub> -pseudo-norm based convolutional sparse coding have been established in a recent work. However, stability analysis noisy case via stripe coherence is absent. This stronger characterization of dictionary, and considerably more informative measure than standard global mutual coherence. The present paper supplements this missing part. Formally, three main...
A high-sensitivity ASK demodulator for a passive UHF RFID tag is presented. The consists of an envelope detector, voltage limiter, reference generator and comparator. Envelope detector utilizes zero-threshold-voltage MOSFETs which V <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">th</sub> less than 100mV. Limiter applying two stages shunting path used keeping the peak signal lower 1V in near field. method average detection employed processing...
In order to improve the sensitivity of passive ultrahigh frequency (UHF) radio identification (RFID) tags and increase operation distance, usually threshold voltage compensation technology was used reduce drop charge transfer transistor in envelope circuit demodulator. this paper, duty cycle signal is calibrated so that it not affected by difference between drive capability PMOS NMOS transistors, fluctuation process, temperature (PVT). The proposed demodulator has been implemented TSMC...
This paper develops an algorithm to effectively explore the advantages of both sparse vector recovery methods and generative model-based for solving compressed sensing problem. The proposed mainly consists two steps. In first step, a network-based projected gradient descent (NPGD) is introduced solve non-convex optimization problem, obtaining preliminary original signal. Then with obtained recovery, l <sub xmlns:mml="http://www.w3.org/1998/Math/MathML"...
In video information hiding processes, the security and robustness of watermarking data are two important performances.Based on generation robust signal, this paper proposes a secure solution for protecting fingerprint content.In our proposed method, construction signal is obtained by compressed sensing (CS) measurements relies knowledge measurement matrix used sensing, in which pseudo-random can offer natural method secret key.Our analysis results indicate that system possess better...
Charge pump, which provides high voltage to program the memory cells, is indispensable for nonvolatile (NVM) in radio frequency identification (RFID) tag. This paper presents a charge adopts single branch topology and implemented only with PMOSFETs, fulfill low cost requirement of RFID By introducing shift circuit, difference adjacent nodes pump will not exceed supply (V <inf xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">dd</inf> ), ensures...