Skip to main content

previous disabled Page of 3
and
  1. No Access

    Article

    Quantum key distribution over a mimicked dynamic-scattering channel

    Free-space quantum key distribution (QKD) plays an important role in the global quantum network. However, free space channels suffer from the atmospheric turbulence and scattering effects of haze, fog, and dus...

    Qi-Hang Lu, Fang-**ang Wang, Wei Chen, Hai-Yang Fu in Science China Information Sciences (2024)

  2. No Access

    Article

    BiMuF: a bi-directional recommender system with multi-semantic filter for online recruitment

    Most existing recommendation research has been concentrated on unidirectional recommendation, i.e., only recommending items to users. However, the platform needs to achieve bi-directional recommendation in man...

    Pei-Yuan Lai, Zhe-Rui Yang, Qing-Yun Dai in Knowledge and Information Systems (2024)

  3. No Access

    Article

    LINDA: multi-agent local information decomposition for awareness of teammates

    In cooperative multi-agent reinforcement learning (MARL), where agents only have access to partial observations, efficiently leveraging local information is critical. During long-time observations, agents can ...

    Jiahan Cao, Lei Yuan, Jianhao Wang, Shaowei Zhang in Science China Information Sciences (2023)

  4. Article

    PyCIL: a Python toolbox for class-incremental learning

    We have presented PyCIL, a classincremental learning toolbox written in Python. It contains implementations of a number of founding studies of CIL, but also provides current state-of-the-art algorithms that ca...

    Da-Wei Zhou, Fu-Yun Wang, Han-Jia Ye, De-Chuan Zhan in Science China Information Sciences (2023)

  5. No Access

    Article

    A Survey of Non-Volatile Main Memory File Systems

    Non-volatile memories (NVMs) provide lower latency and higher bandwidth than block devices. Besides, NVMs are byte-addressable and provide persistence that can be used as memory-level storage devices (non-vola...

    Ying Wang, Wen-Qing Jia, De-Jun Jiang in Journal of Computer Science and Technology (2023)

  6. No Access

    Article

    Swarm Intelligence Research: From Bio-inspired Single-population Swarm Intelligence to Human-machine Hybrid Swarm Intelligence

    Swarm intelligence has become a hot research field of artificial intelligence. Considering the importance of swarm intelligence for the future development of artificial intelligence, we discuss and analyze swa...

    Guo-Yin Wang, Dong-Dong Cheng, De-You **a, Hai-Huan Jiang in Machine Intelligence Research (2023)

  7. No Access

    Article

    Polarization-insensitive quantum key distribution using planar lightwave circuit chips

    Self-stabilizing the quantum key distribution (QKD) system is essential to evaluate eavesdroppers’ information accurately. We develop and verify a polarization-insensitive time-bin decoder chip for QKD with th...

    Guo-Wei Zhang, Wei Chen, Guan-Jie Fan-Yuan, Li Zhang in Science China Information Sciences (2022)

  8. No Access

    Article

    Accelerating Data Transfer in Dataflow Architectures Through a Look-Ahead Acknowledgment Mechanism

    The dataflow architecture, which is characterized by a lack of a redundant unified control logic, has been shown to have an advantage over the control-flow architecture as it improves the computational perform...

    Yu-**g Feng, De-Jian Li, Xu Tan in Journal of Computer Science and Technology (2022)

  9. Article

    Preface

    Yi Pan, De-Shuang Huang, Jian-**n Wang in Journal of Computer Science and Technology (2021)

  10. No Access

    Article

    Vector soliton and noise-like pulse generation using a Ti3C2 MXene material in a fiber laser

    We built a Tm:Ho co-doped fiber laser using a Ti3C2 MXene material as a saturable absorber (SA). The formation of vector solitons (VSs) and noise-like pulses (NLPs) was observed. The SA was prepared by drip** a...

    Shuai Wang 王帅, Lei Li **雷, Yu-feng Song 宋宇峰 in Frontiers of Information Technology & Elec… (2021)

  11. No Access

    Article

    Image fuzzy enhancement algorithm based on contourlet transform domain

    In order to solve the problems of low contrast, global darkness and noise amplification in some hyperspectral and remote-sensing images, a new image fuzzy enhancement method based on contourlet transform (CT) ...

    Yun-hu Huang, De-wang Chen in Multimedia Tools and Applications (2020)

  12. No Access

    Article

    Energy-efficient power amplifiers and linearization techniques for massive MIMO transmitters: a review

    Highly efficient power amplifiers (PAs) and associated linearization techniques have been developed to accommodate the explosive growth in the data transmission rate and application of massive multiple input m...

    **n Liu, Guan-sheng Lv, De-han Wang in Frontiers of Information Technology & Elec… (2020)

  13. No Access

    Article

    Defocus Hyperspectral Image Deblurring with Adaptive Reference Image and Scale Map

    Defocus blur is one of the primary problems among hyperspectral imaging systems equipped with simple lenses. Most of the previous deblurring methods focus on how to utilize structure information of a single ch...

    De-Wang Li, Lin-**g Lai, Hua Huang in Journal of Computer Science and Technology (2019)

  14. No Access

    Article

    A security-based steganographic scheme in vector quantization coding between correlated neighboring blocks

    With the growth of the Internet and the advancements in modern communication systems, sending data over the Internet or other media is now a commonplace practice. Consequently, it has become an important issue...

    Cheng-Ta Huang, Li-Chiun Lin, De-En Sun in Multimedia Tools and Applications (2019)

  15. No Access

    Article

    Use of a coded voltage signal for cable switching and fault isolation in cabled seafloor observatories

    Cabled seafloor observatories play an important role in ocean exploration for its long-term, real-time, and in-situ observation characteristics. In establishing a permanent, reliable, and robust seafloor obser...

    Zhi-feng Zhang, Yan-hu Chen, De-jun Li in Frontiers of Information Technology & Elec… (2018)

  16. No Access

    Article

    Underwater video transceiver designs based on channel state information and video content

    Underwater hostile channel conditions challenge video transmission designs. The current designs often treat video coding and transmission schemes as individual modules. In this study, we develop an adaptive tr...

    Rong-xin Zhang, **ao-li Ma, De-qing Wang in Frontiers of Information Technology & Elec… (2018)

  17. No Access

    Article

    Solving IIR system identification by a variant of particle swarm optimization

    A variant of particle swarm optimization (PSO) is represented to solve the infinitive impulse response (IIR) system identification problem. Called improved PSO (IPSO), it makes significant enhancement over PSO...

    De-Xuan Zou, Suash Deb, Gai-Ge Wang in Neural Computing and Applications (2018)

  18. No Access

    Article

    Cross-lingual implicit discourse relation recognition with co-training

    A lack of labeled corpora obstructs the research progress on implicit discourse relation recognition (DRR) for Chinese, while there are some available discourse corpora in other languages, such as English. In ...

    Yao-jie Lu, Mu Xu, Chang-xing Wu in Frontiers of Information Technology & Elec… (2018)

  19. No Access

    Article

    An effective data fusion-based routing algorithm with time synchronization support for vehicular wireless sensor networks

    In the field of vehicular wireless sensor networks-based structural health monitoring, the structural damage identification is achieved by two structural features, namely natural frequencies and mode shapes. T...

    Chang Tan, Sai Ji, Ziyuan Gui, Jian Shen, De-Sheng Fu in The Journal of Supercomputing (2018)

  20. No Access

    Article

    Cryptanalysis of an identity-based public auditing protocol for cloud storage

    Public verification of data integrity is crucial for promoting the serviceability of cloud storage systems. Recently, Tan and Jia (2014) proposed an identity-based public verification (NaEPASC) protocol for cl...

    Li-bing Wu, **g Wang, De-biao He in Frontiers of Information Technology & Elec… (2017)

previous disabled Page of 3