- Parallel Computing and Optimization Techniques
- Distributed and Parallel Computing Systems
- Matrix Theory and Algorithms
- Interconnection Networks and Systems
- Advanced Decision-Making Techniques
- Lattice Boltzmann Simulation Studies
- Cryptographic Implementations and Security
- Generative Adversarial Networks and Image Synthesis
- Advanced Data Storage Technologies
- Cryptography and Data Security
- Pulsars and Gravitational Waves Research
- Traffic Prediction and Management Techniques
- Geophysics and Gravity Measurements
- Cryptography and Residue Arithmetic
- AI in cancer detection
- Medical Image Segmentation Techniques
- Icing and De-icing Technologies
- Meteorological Phenomena and Simulations
- Chaos-based Image/Signal Encryption
- High-pressure geophysics and materials
- Advanced Memory and Neural Computing
- Radiomics and Machine Learning in Medical Imaging
- Time Series Analysis and Forecasting
- COVID-19 diagnosis using AI
- Oceanographic and Atmospheric Processes
Qilu University of Technology
2019-2025
Shandong Academy of Sciences
2019-2025
National Supercomputing Center in Wuxi
2014-2025
Chinese University of Hong Kong
2025
Shandong University
2008-2024
Jinan Institute of Quantum Technology
2022-2024
Ocean University of China
2021-2023
Zhejiang University of Finance and Economics
2013
Abstract The overestimation of surface ozone concentration in low‐resolution global atmospheric chemistry and climate models has been a long‐standing issue. We first update the dry deposition scheme both high‐ (0.25°) (1°) Community Earth System Model (CESM) version 1.3 runs, by adding effects leaf area index correcting sunlit shaded fractions stomatal resistances. With this update, 5‐year‐long summer simulations (2015–2019) using CESM still exhibit substantial (by 6.0–16.2 ppbv) over U.S.,...
Robust cross-subject emotion recognition based on multichannel EEG has always been a hard work. In this work, we hypothesize there exists default brain variables across subjects in emotional processes. Hence, the states of latent that related to processing must contribute building robust models. Specifically, propose utilize unsupervised deep generative model (e.g., variational autoencoder), determine factors from EEG. Through sequence modeling method, examine performance learnt factors. The...
Abstract. With semiconductor technology gradually approaching its physical and thermal limits, recent supercomputers have adopted major architectural changes to continue increasing the performance through more power-efficient heterogeneous many-core systems. Examples include Sunway TaihuLight that has four management processing elements (MPEs) 256 computing (CPEs) inside one processor Summit two central units (CPUs) six graphics (GPUs) node. Meanwhile, current high-resolution Earth system...
Abstract We report the discovery of a new 5.78 ms period millisecond pulsar (MSP), PSR J1740−5340B (NGC 6397B), in an eclipsing binary system discovered with Parkes radio telescope (now also known as Murriyang) Australia and confirmed MeerKAT South Africa. The measured orbital period, 1.97 days, is longest among all binaries globular clusters (GCs) consistent that coincident X-ray source U18, previously suggested to be “hidden MSP.” Our XMM-Newton observations during NGC 6397B’s...
When computing integral curves and surfaces for large-scale unsteady flow fields, a major bottleneck is the widening gap between data access demands available bandwidth (both I/O in-memory). In this work, we explore novel advection-based scheme to manage field both efficiency scalability. The key first partition into blocklets (e.g. cells or very fine-grained blocks of cells), then (pre)fetch on-demand using parallel key-value store. benefits are (1) greatly increasing scale local-range...
In order to enhance the cyber-security of networked control systems, Kogiso and Fujita (2015) proposed a concept controller encryption using homomorphic for first time. Encrypted linear controllers scheme could conceal information processed inside device maintain original functions controllers. this paper, we propose encrypt BGN encryption, which supports addition multiplication. We also compare efficiency with an encrypted RSA Paillier encryption.
We report on a comprehensive multi-wavelength study of the pulsars in globular cluster (GC) M5, including discovery M5G, new compact non-eclipsing "black widow" pulsar. Thanks to analysis 34 years radio data taken with FAST and Arecibo telescopes, we obtained phase-connected timing solutions for four clusters improved those other three known pulsars. These have resulted in, among things: a) much proper motions five pulsars, transverse velocities that are smaller than their respective escape...
Abstract. With the semi-conductor technology gradually approaching its physical and heat limits, recent supercomputers have adopted major architectural changes to continue increasing performance through more power-efficient heterogeneous many-core systems. Examples include Sunway TaihuLight that has four Management Processing Element (MPE) 256 Computing (CPE) inside one processor Summit two central processing units (CPUs) 6 graphics (GPUs) node. Meanwhile, current high-resolution Earth...
The paper describes the modern control (governance, management) science approach to socioeconomic development of a country's region (province, subject, municipality) in context public administration. Proven methods for strategic goal setting, scenario and economic modelling with artificial intelligence support based on opportunity assessing system optimisation are presented. is given as an integrated object control. Strategic planning uses hierarchy analysis methods. experience modelling,...
Traffic flow forecasting is an important issue for the application of Intelligent Transportation Systems (ITS). How to improve traffic precision a crucial problem. models in different time sections have great differences. The could be improved if were built on respectively. usually real-time and too many variables will reduce performance. So selection most informative variable combination significant. It can save computation cost precision. In this paper, information bottleneck theory based...
The Chromosome-centric Human Proteome Project (C-HPP) aims to catalog genome-encoded proteins using a chromosome-by-chromosome strategy. As the C-HPP proceeds, increasing requirement for data-intensive analysis of MS/MS data poses challenge proteomic community, especially small laboratories lacking computational infrastructure. To address this challenge, we have updated previous CAPER browser into higher version, 3.0, which is scalable cloud-based system sets. 3.0 uses cloud computing...
The pseudo random number generators (PRNG) is one type of deterministic functions. information entropy the output sequences depends on input seeds. can be predicted if attackers could know or control seeds PRNGs. Against that, it necessary that unpredictable, to say, high enough. However, there no enough sources in environment, how generate PRNG? In other words, increase seeds? Many approaches for extracting from physical environment have been proposed, which lack theoretical analysis....