Search scope:
排序: Display mode:
Texture branch network for chronic kidney disease screening based on ultrasound images Research Articles
Peng-yi Hao, Zhen-yu Xu, Shu-yuan Tian, Fu-li Wu, Wei Chen, Jian Wu, Xiao-nan Luo,fuliwu@zjut.edu.cn
Frontiers of Information Technology & Electronic Engineering 2020, Volume 21, Issue 8, Pages 1119-1266 doi: 10.1631/FITEE.1900210
Keywords: 慢性肾脏病;超声;纹理分支网络;迁移学习
Picosecond Laser Surface Texturing of a Stavax Steel Substrate for Wettability Control Article
Xincai Wang, Hongyu Zheng, Yinchi Wan, Wenhe Feng, Yee Cheong Lam
Engineering 2018, Volume 4, Issue 6, Pages 816-821 doi: 10.1016/j.eng.2018.10.006
In this investigation, a picosecond laser was employed to fabricate surface textures on a Stavax steel substrate, which is a key material for mold fabrication in the manufacturing of various polymer products. Three main types of surface textures were fabricated on a Stavax steel substrate: periodic ripples, a two-scale hierarchical two-dimensional array of micro-bumps, and a micro-pits array with nanoripples. The wettability of the laser-textured Stavax steel surface was converted from its original hydrophilicity into hydrophobicity and even super-hydrophobicity after exposure to air. The results clearly show that this super-hydrophobicity is mainly due to the surface textures. The ultrafast laserinduced catalytic effect may play a secondary role in modifying the surface chemistry so as to lower the surface energy. The laser-induced surface textures on the metal mold substrates were then replicated onto polypropylene substrates via the polymer injection molding process. The surface wettability of the molded polypropylene was found to be changed from the original hydrophilicity to superhydrophobicity. This developed process holds the potential to improve the performance of fabricated plastic products in terms of wettability control and easy cleaning.
Keywords: Picosecond laser Surface texturing Stavax steel Polymer Hydrophobicity
A Method for License Plate Localization based on Texture and Wavelet Analysis
Huang Wei,Lu Xiaobo,Yu Yanxiang,Ling Xiaojing
Strategic Study of CAE 2004, Volume 6, Issue 3, Pages 19-24
This paper presents a method for vehicle license plate localization using texture and wavelet analysis. In view of the complex background and the small ratio of the license plate area to the whole picture, a method for finding a threshold for primitive classification is proposed. According to the distribution regularities of the characters in the license plate, a binary texture primitive analysis method is presented to extract the candidate license plate areas. A feature of the vertical strokes in the license plate is extracted using wavelet analysis. The feature of the vertical strokes, position feature and shape feature are quantificationally evaluated using membership degree, and a method for selecting the license plate area from the candidates by integrating all the features is described. A test shows that the proposed method offers a localization correctness rate of higher than 96% .
Keywords: texture wavelet analysis primitive license plate localization
Optimal communication frequency for switching cabled ocean networks with commands carried over the power line Research Article
Yan-hu Chen, Yu-jia Zang, Jia-jie Yao, Gul Muhammad,yanhuchen@zju.edu.cn
Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 10, Pages 1331-1343 doi: 10.1631/FITEE.1900125
Keywords: 海缆开断;海洋观测网;分支单元;传输线理论;通信频率
A New Subdiscipline of Contemporary Optics—Aero-optics
Yin Xingliang
Strategic Study of CAE 2005, Volume 7, Issue 12, Pages 1-6
Based on developing process of aero-optics, the background of the subject is introduced. The definition, intension, research object, research methods of the subject are proposed. The research contents are described, which include mechanism, calibration methods, calibration tests for aero-optic effects and optic window of the hypersonic aircraft. The theoretical research, engineering modeling, testing principle and testing methods in China are described in detail. Some representative results are given. At last, the application prospects and research tendency of the subject are suggested.
Keywords: aerodynamics turbulent flows optics aero-optics
A mechanical reliability study of 3-dB waveguide hybrid couplers in submillimeter and terahertz bands Research Articles
Zhongqian Niu, Bo Zhang, Daotong Li, Dongfeng Ji, Yang Liu, Yinian Feng, Tianchi Zhou, Yaohui Zhang, Yong Fan,zhangbouestc@yeah.net
Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 8, Pages 1104-1113 doi: 10.1631/FITEE.2000229
Keywords: 定向耦合器;3-dB分支波导定向耦合器;亚毫米波器件;太赫兹电路;机械可靠性
Research on the Issue of a Cyber Sovereignty Guarantee
Zou Peng,He Jun,Zou Hongxia,Liu Yunjie
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 8-12 doi: 10.15302/J-SSCAE-2016.06.002
As cyberspace carries more and more national, public, and private interests, the issue of a cyber sovereignty guarantee has attracted great attention around the world. From the perspective of China's cyber sovereignty situation, this paper analyzes the main problems related to China's cyber sovereignty guarantee, including the implications of the cyber rights of independence, equality, self-defense, and jurisdiction. Corresponding countermeasures and suggestions are also provided. The purpose of this paper is to promote the establishment of cyber sovereignty, enhance China's discourse right on international cyberspace governance rules, and enhance the ability to safeguard national cyberspace security interests.
Keywords: cyber sovereignty cyber right of independence cyber right of equality cyber right of self-defense cyber right of jurisdiction cyber border defense
Calculation of the Behavior Utility of a Network System: Conception and Principle Article
Changzhen Hu
Engineering 2018, Volume 4, Issue 1, Pages 78-84 doi: 10.1016/j.eng.2018.02.010
The service and application of a network is a behavioral process that is oriented toward its operations and tasks, whose metrics and evaluation are still somewhat of a rough comparison. This paper describes scenes of network behavior as differential manifolds. Using the homeomorphic transformation of smooth differential manifolds, we provide a mathematical definition of network behavior and propose a mathematical description of the network behavior path and behavior utility. Based on the principle of differential geometry, this paper puts forward the function of network behavior and a calculation method to determine behavior utility, and establishes the calculation principle of network behavior utility. We also provide a calculation framework for assessment of the network’s attack-defense confrontation on the strength of behavior utility. Therefore, this paper establishes a mathematical foundation for the objective measurement and precise evaluation of network behavior.
Keywords: Network metric evaluation Differential manifold Network behavior utility Network attack-defense confrontation
Research on Cyberspace Sovereignty
Fang Binxing,Zou Peng and Zhu Shibing
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 1-7 doi: 10.15302/J-SSCAE-2016.06.001
Cyberspace sovereignty (referred to here by its short form, cyber sovereignty) is the extension of national sovereignty to the platform of information and communication technology systems. This article defines cyberspace and cyber sovereignty, discusses the existence of cyber sovereignty, and judges several erroneous points of view that deny cyber sovereignty.
Keywords: cyberspace cyberspace sovereignty stakeholder
Future Internet: trends and challenges Special Feature on Future Network-Review Article
Jiao ZHANG, Tao HUANG, Shuo WANG, Yun-jie LIU
Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 9, Pages 1185-1194 doi: 10.1631/FITEE.1800445
Keywords: Future Internet Network architecture Service customized network
Research Progress and Key Technologies of Quantum Network Systems
Li Jing, Gao Fei, Qin Sujuan, Wen Qiaoyan, Zhang Ping
Strategic Study of CAE 2023, Volume 25, Issue 6, Pages 80-95 doi: 10.15302/J-SSCAE-2023.06.010
The rapid development of quantum information has brought new opportunities and challenges to modern information technologies. As one of the popular research directions in the field of quantum information, quantum networks aim to utilize the fundamental properties of quantum mechanics to achieve long-distance (secure) communications or provide computational capabilities superior to classical computing networks through distributed computing. The study of quantum networks holds great significance in advancing the practicality of quantum information. To gain a comprehensive understanding of the development trajectory of quantum networks, this study categorizes quantum networks into three types: quantum cryptography, quantum cloud computing, and quantum teleportation networks, based on different application scenarios and technical approaches. It provides comprehensive reviews of both domestic and international research progress and the challenges faced in each aspect. Furthermore, in conjunction with the practical implementation of quantum networks, the key technologies that need to be overcome in the development of quantum network systems, involving link establishment, information transmission, networking protocols, and physical hardware, are summarized. Overall, the development of quantum networks is still in the primary stage. At this stage, actively addressing challenges and seizing opportunities are of great significance to enhance the technological prowess of China. Therefore, to promote the development of quantum network systems in China, suggestions are proposed from three aspects: strengthening investment in the research and development of fundamental hardware infrastructure, attaching importance to the theoretical research of quantum networks, and enhancing interdisciplinary research and talent cultivation.
Keywords: quantum information quantum network quantum cryptography network quantum cloud computing network quantum teleportation network
Current Status and Future Development of Cyberspace Security in Rail Transit Industry
Peng Yihua, Liu Mingyuan, Gao Shuai, Su Wei, Zhang Hongke
Strategic Study of CAE 2023, Volume 25, Issue 6, Pages 136-149 doi: 10.15302/J-SSCAE-2023.06.005
The wide application of network technologies has meanwhile brought about increasingly complex challenges regarding network environment for the key infrastructure of the rail transit industry. Therefore, deepening the research on cyberspace security in the rail transit industry becomes increasingly important. This study expounds on the basic concept and major characteristics of cyberspace security in the rail transit industry and summarizes its macro situation from the perspectives of strategies in China and abroad as well as security system and standards. It sorts out the development status of cyberspace security protection systems in the rail transit industry from three aspects: basic, enhanced, and collaborative protection. Moreover, the study analyzes the corresponding security risks and causes, involving practical cases of traditional network threats and data attack threats, and concludes that internal and external risk factors become the double threats to the industry’s dedicated network and the traditional network architecture restricts network security and reliability in the rail transit industry. Furthermore, we propose the following suggestions: (1) strengthening the original basic research and systematic innovation of networks, (2) building an independent and controllable industrial chain of network security, (3) improving the operation and management of network security, and (4) enhancing talent cultivation for network security in the rail transit industry.
Keywords: rail transit cyberspace security network architecture customized network network attack
Ping-ping WU, Hong LIU, Xue-wu ZHANG, Yuan GAO
Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 7, Pages 955-967 doi: 10.1631/FITEE.1600041
Keywords: Facial landmark localization Geometric feature Appearance feature Smile recognition
Information Network—— Frontier of Information Engineering Science
Zhong Yixin
Strategic Study of CAE 1999, Volume 1, Issue 1, Pages 24-29
Information Network has been grown up and spread out to the entire globe extremely swiftly in recent years. It has also very quickly turned out to be a world-wide new infrastructure of the society and made great influence to the ways people work, live, learn and think.The astonished phenomenon has been regarded as a real frontier and focus in science and engineering, extracting great attentions from science and engineering circle as well as the whole world.
An attempt is made in the paper to establish a new discipline, the information network engineering, based on the above phenomenon.First, the concept of information network is re-defined clearly here and then the working mechanism of information network is analyzed in depth. A comparative discussion on the functions embodied in human activities and that performed in information network is carried out and the working relationship between man and information network is found to be the socalled symbiosis. As a result of the analyses above, a list of the important issues and directions in information network engineering study is briefly summarized.
Keywords: information network intelligent productive tools network age information network engineering
Emergency and Response for Cyberspace Security
Yu Quan,Yang Lifeng and Gao Guijun、Kou Ziming、Zhai Lidong
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 79-82 doi: 10.15302/J-SSCAE-2016.06.016
Based on the current situation and main problems with cyberspace security in China, this paper proposes that cyberspace security should shift its focus from emergency to response. Some transformation strategies are proposed, including three aspects: network security-monitoring capacity, network security guarantee capacity, and talents construction capacity.
Keywords: cyberspace security emergency for cyberspace security response for cyberspace security transformation strategy
Title Author Date Type Operation
Texture branch network for chronic kidney disease screening based on ultrasound images
Peng-yi Hao, Zhen-yu Xu, Shu-yuan Tian, Fu-li Wu, Wei Chen, Jian Wu, Xiao-nan Luo,fuliwu@zjut.edu.cn
Journal Article
Picosecond Laser Surface Texturing of a Stavax Steel Substrate for Wettability Control
Xincai Wang, Hongyu Zheng, Yinchi Wan, Wenhe Feng, Yee Cheong Lam
Journal Article
A Method for License Plate Localization based on Texture and Wavelet Analysis
Huang Wei,Lu Xiaobo,Yu Yanxiang,Ling Xiaojing
Journal Article
Optimal communication frequency for switching cabled ocean networks with commands carried over the power line
Yan-hu Chen, Yu-jia Zang, Jia-jie Yao, Gul Muhammad,yanhuchen@zju.edu.cn
Journal Article
A mechanical reliability study of 3-dB waveguide hybrid couplers in submillimeter and terahertz bands
Zhongqian Niu, Bo Zhang, Daotong Li, Dongfeng Ji, Yang Liu, Yinian Feng, Tianchi Zhou, Yaohui Zhang, Yong Fan,zhangbouestc@yeah.net
Journal Article
Research on the Issue of a Cyber Sovereignty Guarantee
Zou Peng,He Jun,Zou Hongxia,Liu Yunjie
Journal Article
Calculation of the Behavior Utility of a Network System: Conception and Principle
Changzhen Hu
Journal Article
Future Internet: trends and challenges
Jiao ZHANG, Tao HUANG, Shuo WANG, Yun-jie LIU
Journal Article
Research Progress and Key Technologies of Quantum Network Systems
Li Jing, Gao Fei, Qin Sujuan, Wen Qiaoyan, Zhang Ping
Journal Article
Current Status and Future Development of Cyberspace Security in Rail Transit Industry
Peng Yihua, Liu Mingyuan, Gao Shuai, Su Wei, Zhang Hongke
Journal Article
Spontaneous versus posed smile recognition via region-specific texture descriptor and geometric facial dynamics
Ping-ping WU, Hong LIU, Xue-wu ZHANG, Yuan GAO
Journal Article