Zobrazeno 1 - 10
of 13
pro vyhledávání: '"Shuang Wen"'
Publikováno v:
Evolutionary Intelligence. 15:2437-2443
Special matrices are widely used in information society. The gcd-matrices have be conducted to study over Descartes direct-product of some finite positive integer sets. If Descartes direct-product $$ S = S_{1} \times S_{2} \times \cdots \times S_{n}
Autor:
Shuang Wen, Dongfeng Liu
Publikováno v:
2021 2nd International Conference on Artificial Intelligence and Education (ICAIE).
The research of computer technology in the field of education makes Intelligent Tutoring System (ITS) birth and develop rapidly. The main advantage of an ITS is it can provide appropriate teaching content according to students’ knowledge state, lev
Autor:
Shuang Wen, Guojie Luo
Publikováno v:
FCCM
In the process of tomographic reconstruction, the attitude and center point of a specimen, from which the projection data are collected, suffer from misalignment due to mechanical imperfection and calibration error. Such misalignment leads to poor re
Deterministic Quantum Secure Direct Communication and Authentication Protocol Based on W‐Class State
Publikováno v:
Chinese Journal of Electronics. 27:276-280
A Quantum secure direct communication (QSDC) and authentication protocol based on the W-class state is presented to enhance the efficiency of eavesdropping detection. In this protocol, the W-class state is used to transmission the checking sequence a
Publikováno v:
Chinese Journal of Electronics. 27:223-228
Quantum cryptography (QC) as an important technology to protect the security of the future network communication, has gained extensive attention from both academia and industry in recent years. This paper provides a concise up-to-date review of QC, i
Publikováno v:
International Journal of Theoretical Physics. 57:83-94
Noise is a problem that communication channels cannot avoid. It is, thus, beneficial to analyze the security of MDI-QKD in noisy environment. An analysis model for collective-rotation noise is introduced, and the information theory methods are used t
Autor:
Guojie Luo, Shuang Wen
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030336417
LABELS/HAL-MICCAI/CuRIOUS@MICCAI
LABELS/HAL-MICCAI/CuRIOUS@MICCAI
In the imaging process for nanometer-scale electron tomography, misalignment between the actual projection parameters and the theoretical ones is inevitable due to mechanical precision of the instrument. Effective alignment remains a challenge. Curre
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::30d87ab1a7cda3a6c5026b44b6499a02
https://doi.org/10.1007/978-3-030-33642-4_12
https://doi.org/10.1007/978-3-030-33642-4_12
Autor:
Shuang Wen, Jian Li
Publikováno v:
Proceedings of the 2018 International Conference on Algorithms, Computing and Artificial Intelligence.
This paper proposes a combination structure of Recurrent Neural Network (RNN) and Convolutional Neural Network (CNN) for sentiment classification. Our model has two distinct characteristics: (1) Owing to the characteristics of the combination structu
Publikováno v:
DEStech Transactions on Computer Science and Engineering.
OTA (Over-the-Air) measurement was carried out on a smart phone for several typical configuration, a substituted method was developed to execute the TRP (Total Radiated Power) test, the TRP results of Bluetooth and Wi-Fi were analyzed that could prov
Publikováno v:
Applied Mechanics and Materials. :1900-1903
In the publishing and printing applications, hidden data is embedded into images for copyright protection and ownership generally. In this paper, a reasonable data hiding method based on noise-balanced error diffusion (NBEDF) is proposed, which is ap