- Blockchain Technology Applications and Security
- Smart Grid and Power Systems
- Advanced Decision-Making Techniques
- Advanced Computational Techniques and Applications
- AI in cancer detection
- Artificial Intelligence in Healthcare
- Image Retrieval and Classification Techniques
- Parallel Computing and Optimization Techniques
- Text and Document Classification Technologies
- Web Data Mining and Analysis
- Advanced Authentication Protocols Security
- IoT and Edge/Fog Computing
- Non-Invasive Vital Sign Monitoring
- CCD and CMOS Imaging Sensors
- Radar Systems and Signal Processing
- Speech and Audio Processing
- Direction-of-Arrival Estimation Techniques
- Ionic liquids properties and applications
- Advanced Adaptive Filtering Techniques
- Technology and Security Systems
- Topic Modeling
- Cryptography and Data Security
- Advanced Data Storage Technologies
- Video Analysis and Summarization
- Rough Sets and Fuzzy Logic
Union Hospital
2025
Huazhong University of Science and Technology
2025
Institute of Oceanology
2025
Zhengzhou University
2020-2024
Southeast University
2024
Civil Aviation University of China
2014-2024
Guilin University of Electronic Technology
2023
State Grid Corporation of China (China)
2019-2022
Henan University of Economic and Law
2021
Wuhan University
2021
Biological neural circuits demonstrate exceptional adaptability to diverse tasks by dynamically adjusting connections efficiently process information. However, current two-dimension materials-based neuromorphic hardware mainly focuses on specific devices individually mimic artificial synapse or heterosynapse soma and encoding the inner states realize corresponding mock object function. Recent advancements suggest that integrating multiple material brain-like functions including inter-mutual...
Ultrasonography is widely used in the clinical diagnosis of thyroid nodules. Ultrasound images nodules have different appearances, interior features, and blurred borders that are difficult for a physician to diagnose into malignant or benign types merely through visual recognition. The development artificial intelligence, especially deep learning, has led great advances field medical image diagnosis. However, there some challenges achieve precision efficiency recognition In this work, we...
With the development of power grid, advanced indexes requirements its operation such as safety, economy, convenience have been proposed. Traditional grid were facing severe challenges. It is hard for traditional to satisfy new requirements. In order solve problem requirement high efficiency, well state observable and controllable in intelligence industry background, we put forward opinion that 5G artificial with multi sensor data fusion technology support future intelligent operation. this...
Source number is a crucial factor in array signal processing. A new method present here to estimate the source number. The output data firstly weighted by eigenvectors of covariance matrix, and then peak-to-average power ratio (PAR) computed. inherent properties PAR are exploited. multiple targets detection threshold criterion: criterion (PARTC) established concerning PAR. Simulation results show that PARTC performs better than AIC MDL under all conditions.
<title>Abstract</title> Label Distribution Learning (LDL) is a novel machine learning paradigm that focuses on the description degrees of labels to particular instance. Existing LDL algorithms generally learn with original input space, is, all features are simply employed in discrimination processes class labels. However, this common-used data representation strategy ignores each label supposed possess some specific characteristics its own and therefore might have sub-optimal performance. We...
With the rapid development of multi-core processor technology, parallelization has become main approach for modern applications to improve throughput and responsiveness. However, increasing number processors also poses a challenge scalability parallel program performance. In traditional single-threaded program, all data is exclusively occupied by one thread, so performance optimization mainly focuses on algorithm logic implementation skills program; while in system environment, most...
With the construction of new power systems, proportion energy generation will gradually increase, and transaction virtual plants become more complex challenging. increase in number entities involved plants, traditional centralized dispatching method can no longer meet needs development plants. The decentralization, tamper resistance smart contracts blockchain improve efficiency However, with increasing distributed users participating transactions, consensus delay completing transactions...
There exists correlation between the received noises of array elements, especially when space element is smaller than half-lambda. It induces fluctuant (non-white) in spatial spectrum noise, which deteriorates detection performance. In this paper, two methods pre-whiting noise are presented, called as magnitude normalization on (MNNSS) and covariance matrix reverse (NCMR). The results experiment show that these can restrain color spectrum, performance improved distinctly.
The raise of extension set provides reasonable logical foundation for the automatic solving contradiction problem. This paper views as an unsatiable concept, unrealizable action or item that can't meet satisfaction a certain analyzes representation language in face problem, which is, new description logic--ALC D-ES . Syntax definition, semantic explanation and reasoning algorithm Tableau are given details, lay theoretical method problem based on logic reasoning.
Aim The Proof-of-Work consensus mechanism is the core of blockchain, but existing Fork After Withholding (FAW) attack can earn more rewards by launching attacks on mining pools under mechanism. This paper proposes a new model based FAW attack, which further increases attacker’s reward to explore impact method blockchain network and losses caused helpful for maintaining blockchain. Methods called "Eclipse (EFAW) attack" combining with eclipse attack. In EFAW attacker infiltrates victim pool...
An approach of the moving object segmentation is proposed in this paper. Firstly motion fields are extracted from compressed stream, where noise and unreal blocks removed by vector median filter. Then vectors accumulated estimation, order to get denser prominent vectors. Finally objects segmented adaptively particle swarm clustering algorithm. It demonstrated experimental results that domain can be effectively.
In this paper a new non-interaction mobile agent detecting protocol is proposed by combining with onion itinerary technology and identity-based. Lastly the security performance of analyzed.
This paper has presented an idea of using substation and monitoring data to locate the key operations difficulties in staff working substation. The analysis also make it possible for related department majors find out training needs technique development power grid. With help field data, conclusion above will be more clear objective.
Breast cancer is the most common for females worldwide. The literature presents a comparison of four machine learning algorithms: Classification Tree, Pruned Bagging, and Random Forests on Wisconsin Diagnostic Cancer dataset by measuring test sensitivity, specificity, precision, negative predictive value, misclassification error rate. result shows that performance pruned classification tree better than normal tree; aggregated models (Bagging Forests) are only use one single decision to...
Chinese Medical literature research results are more accurate and representative than other medical texts. This paper studies the extraction method of named entity recognition in literatures on hypertension treatment. proposes a Bi-directional Long Short-Term Memory-Conditional Random Fields (BiLSTM-CRF) model based Attention mechanism for recognition. BiLSTM-CRF is used as infrastructure while to learn dependence each word full text. In addition, dictionary keywords built improve efficiency...
In the real scene of project management, lifetime management information about s an important content management. Aiming at technical risks such as storage pressure, risk data lost or improper using in well moral department misuse authority, even bending information, refusing to provide information. this paper, we resorted basic idea parallel control. Firstly, put up mechanism structure that on world and virtual block chain smart contract found.via interaction comparison between record which...