- Energy Efficient Wireless Sensor Networks
- Quantum Computing Algorithms and Architecture
- Quantum Information and Cryptography
- Advanced Neural Network Applications
- Quantum Mechanics and Applications
- Advanced Image and Video Retrieval Techniques
- Opportunistic and Delay-Tolerant Networks
- IoT and Edge/Fog Computing
- Topic Modeling
- Advanced Computational Techniques and Applications
- Neural Networks and Applications
- GaN-based semiconductor devices and materials
- Advanced Image Processing Techniques
- Advanced Vision and Imaging
- Natural Language Processing Techniques
- Network Time Synchronization Technologies
- Anomaly Detection Techniques and Applications
- Context-Aware Activity Recognition Systems
- Mobile Ad Hoc Networks
- Remote-Sensing Image Classification
- Image Enhancement Techniques
- Speech Recognition and Synthesis
- Blind Source Separation Techniques
- Advanced Algorithms and Applications
- Silicon Carbide Semiconductor Technologies
Hefei University
2025
Cornell University
2024
Chinese Academy of Sciences
2015-2024
Xidian University
2015-2024
China University of Mining and Technology
2020-2024
Institute of Microelectronics
2015-2024
University of Chinese Academy of Sciences
2024
University of Glasgow
2024
Nanjing University
2004-2024
China Mobile (China)
2024
Recently, Boyer et al. presented a novel semiquantum key distribution protocol [Phys. Rev. Lett. 99 (2007) 140501] by using four quantum states, each of which is randomly prepared in the Z or X basis. Here we present semi-quantum maximally entangled states Alice shares secret with classical Bob. Quantum has ability to prepare Bell and perform basis computational measurement. Classical Bob restricted measuring, preparing particle basis, reflecting reordering particles. The qubit efficiency...
The Fisher Linear Discriminant (FLD) is commonly used in pattern recognition. It finds a linear subspace that maximally separates class patterns according to the Criterion. Several methods of computing FLD have been proposed literature, most which require calculation so-called scatter matrices. In this paper, we bring fresh perspective via Fukunaga-Koontz Transform (FKT). We do by decomposing whole data space into four subspaces with different discriminability, as measured eigenvalue ratios....
We present a semiquantum secret sharing protocol by using two-particle entangled states in which quantum Alice shares key with two classical parties, Bob and Charlie. Classical Charlie are restricted to measuring, preparing particle the computational basis, or reflecting particles. None of them can acquire unless they collaborate. also show is secure against eavesdropping.
Large language models (LLMs) have demonstrated remarkable generalizability, such as understanding arbitrary entities and relations. Instruction tuning has proven effective for distilling LLMs into more cost-efficient Alpaca Vicuna. Yet student still trail the original by large margins in downstream applications. In this paper, we explore targeted distillation with mission-focused instruction to train that can excel a broad application class open information extraction. Using named entity...
Sensor networks are often used to monitor sensitive information from the environment or track objects' movements. Anonymity has become an important problem in sensor networks, and been widely researched wireless ad hoc wired networks. The limited capacity resources of current have brought new challenges anonymity research. In this paper, two efficient methods proposed based on using a one-way hash chain dynamically change identity nodes order provide anonymity, their properties analyzed compared.
Unmanned Aerial Vehicles (UAVs) technology is evolving very quickly. New advancements in this important area of research have led more efficient and superior UAVs all sizes, which a vast amount on-board command, control, processing, storage networking capabilities. Such devices promise to be useful wide variety applications. In order successfully efficiently achieve their functions accomplish tasks, must communicate with each other using UAV-to-UAV (U2U) communication. They also systems...
An obvious increase in the gate leakage current has been commonly observed GaN HEMTs, after Plasma-enhanced chemical vapor deposition (PECVD) SiN passivation to obviously increase. This paper presents an Al/SiN stack layer structure. The high HEMTs caused by PECVD is distinctly reduced 2 3 orders of magnitude introducing a thin Al layer. It mainly attributed blocking and minimizing damage for (Al)GaN surface build-up luminance process then reducing trap density. TEM mapping SRIM software...
With the rapid development of micro-machining technology, feature size object parts becomes smaller whilst roundness tolerance must be critically verified at sub-micrometers or nanometers. Therefore, establishing a method is important for evaluating errors to guarantee machining quality. A progressive search proposed based on minimum zone criterion in Cartesian coordinate system this paper. The least-square center measured points used as initial reference by circle model progressively...
Wireless sensor networks (WSNs) are resource-constrained networks, especially when the energy is highly constrained; application of WSNs severely restricted. Data fusion can effectively reduce volume data transmission in network, consumption to extend network lifetime and improve bandwidth utilization, as a result, it overcome restriction bandwidth. This paper gives survey on classical wireless from following aspects: constructing an aggregation tree correlation processing, etc. And finally...
Distributed Denial-of-Service (DDos) attack is one of the high threats to Internet. This paper proposes a measure based on Hurst coefficient detect DDoS Low-rate. The result experiments shows that can intrusion hided in normal data traffic real time.
A view-independent relational model (VIRM) used in a vision system for recognizing known 3-D objects from single monochromatic images of unknown scenes is described. The inspects CAD number different viewpoints, and statistical interference applied to identify relatively relationships among component parts the object. These relations are stored as object, which represented form hypergraph. Three-dimensional components can be associated with extended image features obtained by grouping...
In recent years, general object detection on nature images leverages convolutional neural networks (CNNs) and vision transformers (ViT) to achieve great progress high accuracy. However, unlike scenarios, remote sensing systems usually deploy a large number of edge devices. Therefore, this condition encourages detectors have lower parameters than high-complexity networks. To end, we propose an effective lightweight framework hybrid network, which enhances representation learning balance...
A new 22-element small signal equivalent circuit model for the AlGaN/GaN high electron mobility transistor (HEMT) is presented. Compared with traditional model, gate forward and breakdown conductions (Ggsf Ggdf) are introduced into to characterize leakage current. Additionally, gate-connected field plate source-connected of device, an improved method extracting parasitic capacitances proposed, which can be applied small-signal extraction asymmetric device. To verify S-parameters obtained...
Federated learning (FL) can train a global model from clients' local data set, which make full use of the computing resources clients and performs more extensive efficient machine on with protecting user information requirements. Many existing works have focused optimizing FL accuracy within resource constrained in each individual round, however there are few comprehensively consider optimization for latency, energy consumption over all rounds wireless federated learning. Inspired by this,...
Due to resource constraints on edge devices, lightweight detection models are gaining popularity in remote sensing. However, achieving efficient performance with these is challenging compared traditional models. Knowledge distillation (KD) a promising solution this issue. previous KD methods sensing often suffer from background noise and fail address feature disparities among detectors. To the above issues, we introduce Two-Way Assistant (TWA) method for object detection. TWA comprises two...
Aiming at the disadvantages of fixed rotation angle in quantum genetic algorithm (QGA), this paper, particle swarm optimization (PSO) was used to update gate stead old one that locates by a designed query table. According experimental results, novel (NQGA) with new updating method has got higher global search capability than common QGA. The NQGA load distribution tandem cold rolling. comparison data show is an effective for
This paper studies the problem of human activity recognition. Traditionally, data collected by accelerometer is preprocessed with a fixed time window, and features for recognition model are extracted in this framework. However, some activities quasi-periodic, which means that classification accuracy can be improved if adaptive window adopted instead. As divided into periodic non-periodic class, order to extract more accurately classification, then designed specifically cope two categories....
WirelessHART is an emerging wireless sensor network protocol. In this paper, a joint graph routing algorithm for maximizing the lifetime (JRMNL) in proposed. Node communication load factor approximately estimated by matrix operations first time. Then node load, residual energy, and link transmission power are integrated as cost function that accurately measured algorithm. A chooses optimal next hop comparing of all its neighbor nodes, which guarantees energy balancing whole network....
WirelessHART is a kind of wireless mesh network communication standard specially designed for industrial process automation applications and FHSS as well TDMA mechanism guarantees its robustness. In this paper, time slots channels are allocated each link in networks by edge-coloring, graph route-based scheduling algorithm with collision avoidance proposed. By combining the optimal routing multi-hop retransmission mechanism, performance effectively improved. The analysis shows that proposed...
A striking scheme called ``counterfactual quantum cryptography'' gives a conceptually new approach to accomplish the task of key distribution. It allows two legitimate parties share secret even though particle carrying information is not, in fact, transmitted through channel. Since an eavesdropper cannot directly access entire system each signal particle, protocol seems provide practical security advantages. However, here we propose eavesdropping method which works on finite scenario. We...
In recent years, the Social Internet of Things (SIoT) has become a research hot topic in field wireless networks, which are inseparable relationships between human and devices. As huge numbers heterogeneous devices will be connected, it needs more frequency spectrum. The Cognitive radio (CR) technology can improve spectrum utilization an opportunistic communication manner. However, dynamic availability make difficult for routing design CR-SIoT. Opportunistic (OR) mitigate drawbacks from...
Flow Direction Algorithm (FDA) has better searching performance than some traditional optimization algorithms. To give the basic more effective ability and avoid multiple local minima under space, enable it to obtain search results, an improved FDA based on Lévy flight strategy self-renewable method (LSRFDA) was proposed in this paper. The approach were added Algorithm. Random parameters generated by can increase algorithm’s diversity of feasible solutions a short calculation time greatly...