Da Lin

ORCID: 0000-0003-3136-3245
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Steganography and Watermarking Techniques
  • Chaos-based Image/Signal Encryption
  • Interconnection Networks and Systems
  • Digital Media Forensic Detection
  • Composting and Vermicomposting Techniques
  • Software-Defined Networks and 5G
  • Pharmaceutical and Antibiotic Environmental Impacts
  • Data-Driven Disease Surveillance
  • Recommender Systems and Techniques
  • Health and Well-being Studies
  • Caching and Content Delivery
  • Ocular Surface and Contact Lens
  • Ideological and Political Education
  • Neural Networks Stability and Synchronization
  • Network Time Synchronization Technologies
  • Viral Infections and Outbreaks Research
  • Network Traffic and Congestion Control
  • Multiple and Secondary Primary Cancers
  • Advanced Decision-Making Techniques
  • Corporate Insolvency and Governance
  • Engineering and Test Systems
  • Advanced oxidation water treatment
  • Global Financial Regulation and Crises
  • Environmental DNA in Biodiversity Studies
  • Distributed Control Multi-Agent Systems

Inner Mongolia University
2025

Guangdong Province Environmental Monitoring Center
2024

Zhejiang Chinese Medical University
2023

Wuhan Ship Development & Design Institute
2023

Xuzhou University of Technology
2019-2022

Richmond School and Sixth Form College
2021

University of Richmond
2021

Nanjing University of Posts and Telecommunications
2015

Center for Disease Control
2013

Hong Kong University of Science and Technology
2010-2012

Tongue diagnosis in Traditional Chinese Medicine (TCM) plays a crucial role clinical practice. By observing the shape, color, and coating of tongue, practitioners can assist determining nature location disease. However, field tongue currently faces challenges such as data scarcity lack efficient multimodal diagnostic models, making it difficult to fully align with TCM theories needs. Additionally, existing methods generally multi-label classification capabilities, challenging simultaneously...

10.3389/fphys.2025.1527751 article EN cc-by Frontiers in Physiology 2025-04-25

In current high bandwidth-delay-product networks, traditional end-to-end network protocols cannot guarantee the fair allocation of resources (i.e., a rogue source that sends at an uncontrolled rate can seize large fraction buffers intermediate router which results in dropped packets for other connections). Fair-queuing (FQ) algorithms were proposed to overcome this drawback. However, most these FQ either suffer from time-complexity or greatly rely on multiple queuing structures are extremely...

10.1109/icc.2010.5502015 article EN IEEE International Conference on Communications 2010-05-01

In this article, based on wavelet reconstruction and fractal dimension, a medical image authentication method is implemented. According to the local global methods, regularity of mutation structure in carrier information analyzed through measurement defined transformation domain. To eliminate redundancy reconstructed data, dimension used reduce attributes coefficients. singularity block information, key features are extracted feature constructed as images. The experimental results show that...

10.1177/15501477211014132 article EN cc-by International Journal of Distributed Sensor Networks 2021-04-01

Biological particle automatic classification is an important issue in index tasking for people with pollen hypersensitivity. This paper attempts to present a local feature extraction method based on SIFT 3D image recognition. In order solve major issues previous studies, high rate of redundant information, dimensions and low recognition should be taken into account. Therefore, this work focuses four-part novel approach, including constructing Gaussian pyramid obtain muti-scale images,...

10.1109/access.2019.2948088 article EN cc-by IEEE Access 2019-01-01

The transmission of digital medical information is affected by data compression, noise, scaling, labeling, and other factors. At the same time, may be illegally copied maliciously tampered with without authorization. Therefore, copyright protection integrity authentication are worthy attention. In this paper, based on wavelet packet energy entropy, a new method image designed. proposed uses sliding window to measure detail information. time-frequency distribution, local details mined....

10.3390/e24060798 article EN cc-by Entropy 2022-06-08

Recently, industrial recommendation services have been boosted by the continual upgrade of deep learning methods. However, they still face de-biasing challenges such as exposure bias and cold-start problem, where circulations machine training on human interaction history leads algorithms to repeatedly suggest exposed items while ignoring less-active ones. Additional problems exist in multi-scenario platforms, e.g. appropriate data fusion from subsidiary scenarios, which we observe could be...

10.1145/3487553.3524729 article EN Companion Proceedings of the The Web Conference 2018 2022-04-25

This is a retrospective study of clinical data from 106 patients with pyogenic liver abscess (PLA) treated in traditional Chinese hospital during the eight years preceding this publication. We aimed to provide evidence improve diagnosis accuracy and treatment strategies for PLAs. collected records at Guangxing Hospital, which affiliated Zhejiang Traditional University Hangzhou, we their general background information, laboratory imaging features, manifestations outcomes perform analysis....

10.3389/fsurg.2022.1041746 article EN cc-by Frontiers in Surgery 2023-01-06

In this paper, we aimed to discuss the security authentication requirements of medical images in network, and a method is designed based on fractal visual cryptography. Based discrete Brownian random field model, gray-level statistical information spatial structure fully mined. The gray distribution expressed form features. By using data mining methods, space analyzed, by stability energy structure, features are formed. Using cryptography (VC), robustness further enhanced. Through...

10.1155/2020/6642586 article EN cc-by Scientific Programming 2020-12-03

High-performance routers for next generation networks are required to scale with the increasing 'port number' due developments of various network access technologies. It has been common practice build scalable multi-stage multi-layer switches in circuit switching. For packet switches, however, researchers have so far had no consensus on how employ architecture. The underlying reason is that switching performance much affected by their buffering strategies. In single-stage crossbar routers,...

10.1049/iet-net.2011.0001 article EN IET Networks 2012-12-01

In this paper, a sequence decision framework based on the Bayesian search is proposed to solve problem of using an autonomous system for missing target in unknown environment. task, cost and efficiency are two competing requirements because they closely related task. Especially actual sensor assembled by searcher not perfect, so effective strategy needed guide agent perform Meanwhile, decision-making method crucial agent. If fully trusts feedback information sensor, task will end when...

10.1155/2020/8865381 article EN cc-by Scientific Programming 2020-11-18

10.11591/telkomnika.v12i7.5263 article EN TELKOMNIKA Indonesian Journal of Electrical Engineering 2014-06-01

<sec> <title>BACKGROUND</title> Frailty is extremely common in older people and often considered a sign of "old age" therefore overlooked; Timely identification - screening out the "frail" state elderly, conducting comprehensive assessment giving effective intervention, which has positive practical significance for improving quality life elderly prolonging life. At present, there no clear definition benchmark frailty, industry generally based on some frailty scales such as Fried scale to...

10.2196/preprints.48755 preprint EN 2023-05-05
Coming Soon ...