- Advanced Decision-Making Techniques
- Advanced Fiber Optic Sensors
- Quantum Information and Cryptography
- IPv6, Mobility, Handover, Networks, Security
- User Authentication and Security Systems
- Advanced Authentication Protocols Security
- Advanced Sensor and Control Systems
- Speech Recognition and Synthesis
- Cryospheric studies and observations
- Power Systems and Renewable Energy
- Cloud Data Security Solutions
- Speech and Audio Processing
- Cloud Computing and Resource Management
- Photonic Crystal and Fiber Optics
- Smart Grid and Power Systems
- Energy Load and Power Forecasting
- Geoscience and Mining Technology
- Image Enhancement Techniques
- Advanced Algorithms and Applications
- Advanced Computing and Algorithms
- Stock Market Forecasting Methods
- Music and Audio Processing
- Machine Fault Diagnosis Techniques
- Energy and Environmental Systems
- Regional Development and Environment
Jilin University of Chemical Technology
2021-2024
Chongqing Metrology Quality Inspection and Research Institute
2021-2023
Bank of China
2023
Alibaba Group (China)
2023
Fuzhou University
2023
Suzhou Research Institute
2021
Liaocheng University
2020-2021
Technical Institute of Physics and Chemistry
2017
Nanjing University
2014
Changchun University of Technology
2010
Snow removal aims to locate snow areas and recover clean images without repairing traces. Unlike the regularity semitransparency of rain, with various patterns degradations seriously occludes background. As a result, state-of-the-art methods usually retains large parameter size. In this paper, we propose lightweight but high-efficient network called Laplace Mask Query Transformer (LMQFormer). Firstly, present Laplace-VQVAE generate coarse mask as prior knowledge snow. Instead using in...
Geometric quantum manipulation and Landau-Zener interferometry have been separately explored in many systems. In this Letter, we combine these two approaches to study the dynamics of a superconducting phase qubit. We experimentally demonstrate based on pure geometric phases solid-state observe interference caused by accumulated evolution between consecutive transitions, while dynamical is canceled out spin-echo pulse. The full controllability qubit state as function intrinsically robust...
Cloud computing has witnessed tremendous growth, prompting enterprises to migrate the cloud for reliable and on-demand computing. Within a single Virtual Private (VPC), number of instances (such as VMs, bare metals, containers) reached millions, posing challenges related supporting millions with network location decoupling from underlying hardware, high elastic performance, reliability. However, academic studies have primarily focused on specific issues like high-speed data plane virtualized...
Spoof speech detection (SSD) can help to protect an automatic speaker recognition system against malicious attacks. However, there exists a great diversity in the spoof utterances generated by different text-to-speech and voice conversion algorithms, resulting poor generality of SSD unseen spoofing To address this problem, we integrate multi-scale feature aggregation (MFA) dynamic convolution operations into anti-spoofing framework detect local global artifacts The proposed mainly contains...
Third Generation (3G) wireless networks are now increasingly being deployed throughout the world. Because of their complex signaling and relatively limited bandwidth, these 3G generally more vulnerable than wire-line counterparts, thus making them fertile ground for some new attacks. In this paper, we propose a novel AKA Protocol scheme 3G, which is based on Diffie-Hellman Algorithm. This improves transmission security between ME, VLR HLR, it also provides message freshness, forward secrecy,...
In this paper, we analyze the security access domain in third generation communication system (3G) is vulnerable to Man Middle (MitM) attack and denial of service (DoS). Basing on deep analysis Authentication Key Agreement (AKA) protocol, formally established MitM-DoS models wireless network wired network. Aiming at vulnerability 3G, finally, a new defense strategy modeling demonstrated paper.
In this work, a dual-branch network is proposed to exploit both local and global information of utterances for spoofing speech detection (SSD). The artifacts can reside in specific temporal or spectral regions, which are the primary objectives SSD systems. We propose spectro-temporal graph attention jointly capture differences speech. It different from existing methods that method exploits cross mechanism bridge dependency. As also provide complimentary SSD, we use BiLSTM-based branch...
Emotion Forecasting in Conversations (EFC), the task aims to predict emotion of next utterance (yet come), has received more and attention recent years. However, this ignores one-to-many feature dialogue its prediction target is label, which flawed most cases. In work, we propose a new task: Distribution (EDFC), distribution utterance. Although reasonable real applications, it can only learn using labels cases because difficulty obtaining distribution. To address it, explore positive role...
A wireless wearable physiological parameter monitoring system for home health care is studied in this paper. Based on the of human research, we introduced realization ZigBee acquisition module.
The efficient integration of distributed fiber Bragg grating (FBG) sensors and cloud computing platform is used to achieve accurate measurement evaluation physical quantities, which solves the problems traditional sensing technology for health structure monitoring system, such as cost space constraints, it difficult deploy enough servers deal with data collection, transmission storage in real time. using adopts erbium-doped cascaded grating, reasonably configures FBG demodulator acquisition...
The status monitoring of industrial process equipment is great significance to its production energy efficiency and safety. A state system for complex surface structures based on the distributed FBG sensor network proposed. adopts realizes calculation stress field through layout design at different positions in three-dimensional space. 32-channel designed, light source, demodulation module, processing are selected analyzed. On basis building network, test was carried out equipment. For...
In the telecommunication operator wireless network, user is identifiable and centrally managed, therefore trust can also be managed. this paper, we propose cloud model based on to solve management problems in networks, including collection, storage, evaluation update. model, realizes conversion between qualitative concept quantitative value of satisfaction degree, timeliness vector buffer queue, update backward algorithm determine tendency numerical characteristics model. The proposed by...
The quantization scheme between double enhanced charge phase-slip (ECPS) qubits is given. In this system, there exist quantum entanglement phenomenona. characteristic discussed by employing the concurrence. An interesting conclusion obtained, i.e., if one desire to change two ECPS qubits, mutual inductance should be considered first, but it also a good choice tune symmetric and asymmetric combination of gate voltages.
by preprocessing the original load data series, processing ability of gray prediction to fluctuating series is enhanced, and selection initial conditions, it can make fitting curve more accord with law things developing in future, improve precision model meet demand short-term forecasting. The improved compared general GM (L,1) case analysis.
In this paper we analyze certificate structure, discuss on authentication method based in mobile network environment. This proposes a privilege management system attribute The uses which is high security to provide user large scale applications. use of certificate, distribute OCSP service and USIM support are also discussed paper.
Ventilation is a basic requirement for building comfort and the power consumption higher mechanical ventilation, in this paper, heat exchanger with natural ventilation designed experiment studied.The results show that temperature exchange effectiveness, moisture efficiency enthalpy are all related to difference, humidity difference flow rate.When Air rate than 53m3/h more 10°C.Natural can meet requirements of an ordinary bedroom.Enthalpy energy saving
Snow removal aims to locate snow areas and recover clean images without repairing traces. Unlike the regularity semitransparency of rain, with various patterns degradations seriously occludes background. As a result, state-of-the-art methods usually retains large parameter size. In this paper, we propose lightweight but high-efficient network called Laplace Mask Query Transformer (LMQFormer). Firstly, present Laplace-VQVAE generate coarse mask as prior knowledge snow. Instead using in...