- Wireless Networks and Protocols
- Multi-Agent Systems and Negotiation
- Mobile Ad Hoc Networks
- Service-Oriented Architecture and Web Services
- Wireless Communication Networks Research
- Semantic Web and Ontologies
- Multimodal Machine Learning Applications
- Opportunistic and Delay-Tolerant Networks
- Smart Agriculture and AI
- Simulation Techniques and Applications
- Logic, Reasoning, and Knowledge
- Advanced Graph Neural Networks
- Advanced Wireless Network Optimization
- Cryptography and Residue Arithmetic
- Advanced Image and Video Retrieval Techniques
- Cryptography and Data Security
- Meat and Animal Product Quality
- Human Pose and Action Recognition
- Mobile Agent-Based Network Management
- Neurobiology and Insect Physiology Research
- Cryptographic Implementations and Security
- Insect Utilization and Effects
- Leaf Properties and Growth Measurement
- Natural Language Processing Techniques
- Human Motion and Animation
Fujian Agriculture and Forestry University
2012-2024
Harbin Institute of Technology
2024
University of Electro-Communications
2014-2015
Jiangsu Institute of Meteorological Sciences
2013
Missouri University of Science and Technology
2010-2013
China People's Public Security University
2010
In recent years, to address the issue of networked data sparsity in node classification tasks, cross-network (CNNC) leverages richer information from a source network enhance performance target network, which typically has sparser information. However, real-world applications, labeled nodes may be collected multiple sources with modalities (e.g., text, vision, and video). Naive application single-source single-modal CNNC methods result sub-optimal solutions. To this end, article, we propose...
We introduce Grounded SAM, which uses Grounding DINO as an open-set object detector to combine with the segment anything model (SAM). This integration enables detection and segmentation of any regions based on arbitrary text inputs opens a door connecting various vision models. As shown in Fig.1, wide range tasks can be achieved by using versatile SAM pipeline. For example, automatic annotation pipeline solely input images realized incorporating models such BLIP Recognize Anything....
The development of accurate models for cyber-physical systems (CPSs) is hampered by the complexity these systems, fundamental differences in operation cyber and physical components, significant interdependencies among components. Agent-based modeling shows promise overcoming challenges, due to flexibility software agents as autonomous intelligent decision-making Semantic agent are even more capable, structure they provide facilitates extraction meaningful content from data provided agents....
We present KnotPad, an interactive paper-like system for visualizing and exploring mathematical knots; we exploit topological drawing math-aware deformation methods in particular to enable enrich our interactions with knot diagrams. Whereas most previous efforts typically employ physically based modeling simulate the 3D dynamics of knots ropes, tool offers a Reidemeister move environment that is much closer problems being solved theory, yet without interfering traditional advantages...
Computing and communication devices in any cyber-physical system (CPS) of non-trivial scale exhibit significant heterogeneity. Critical infrastructure systems, which are prime examples CPSs, no exception. The extent networking capability, decentralized control, more generally, integration between the cyber physical infrastructures can vary greatly within a large-scale CPS. Other manifestations heterogeneity CPSs resolution, syntax, semantics data collected by sensors from infrastructure....
One of the greatest benefits offered by cyber-physical systems is potential for automated decision support, which can increase intelligence and efficacy environmental management. Agent-based modeling facilitate application cyber infrastructure to abstracting physically-distributed communication control into operation one or more agents. Ontologies capture semantics both physical components an management system, respectively, while reflecting interactions between two. As such, they serve as a...
We propose a QoS supporting ad hoc network protocol which employs hybrid approach utilizing both TDMA and 802.11 DCF. period provides contention free transmissions for flows, DCF is used to provide contention-based access best effort or low priority flows. time slots are assigned on admission basis in distributed manner by routing information considering current assignment situation. In period, frames transmitted not disturb the period. By combing DCF, proposed able an efficient solution...
L. vannamei has become one of the most productive species. However, it is susceptible to microbial contamination during fishing, transportation, and storage, which can lead spoilage quality deterioration. This study investigates relationship between changes in proteome Litopenaeus (L. vannamei) muscle characteristics low-temperature storage using tandem mass spectrometry technology quantitative proteomics strategy. The differential expression proteins under cold (4 °C, CS), partial slight...
To produce jasmine tea of excellent quality, it is crucial to select flowers at their optimal growth stage during harvesting. However, achieving this goal remains a challenge due environmental and manual factors. This study addresses issue by classifying different based on visual attributes using the YOLOv7 algorithm, one most advanced algorithms in convolutional neural networks.
This paper presents the mediated hierarchical identity-based combined public key (mHIB-CPK) scheme by applying concept of encryption (mHIBE) [1] to (IB-CPK) [2], which is an (IBE) [3] compatible with ElGamal [4] and other algorithms based on discrete logarithm problem (on prime fields or elliptic curves, such as [5], [6]). Besides advantages from mHIBE (hierarchical generation efficient revocation) IBCPK (compatible popular algorithms), mHIBCPK prevents conspiracy attacks IB-CPK [7], making...
We propose a QoS supporting ad hoc network scheme which employs hybrid approach utilizing both TDMA and 802.11 DCF present performance evaluation results of the scheme. In scheme, period provides contention free transmissions for flows, is used to provide contention-based access best effort or low priority flows. evaluate proposed various numbers TCP flows different CBR data rates with QualNet simulator. Simulation show that protocol able an efficient solution control in networks by combing DCF.
Based on the daily climate data in winter and relative meteorological yield of loquat for 2 stations Putian from 1992 to 2009, this paper studied disaster-inducing factors integrated climatic index low temperature injury loquat. The results showed that critical could be determined as 3.0°C. included extreme minimum temperature, sum numbers less than or equal 3.0°C, sustained days harmful chilling accumulation there were obvious correlations among these factors. According method principal...
This article discusses the basic principle of how to use Visual Basic6.0 programming language called Surfer8.0 for embedded programming, describe key technical, give an example 32 automatic stations soil moisture map Fujian Province in China, through VB call drawing function Surfer, full play grid capacity and functions performance visual graphics data. Display output city (county) site which can judge measure arid locations, will be great help guidance, provide scientific basis leadership...