Search Results - "Deng Hongyao"
-
1
Estimation of the parameters of a weighted nuclear norm model and its application in image denoising
Published in Information sciences (01-08-2020)“…In this study, a method for optimizing a weighted nuclear norm model is proposed. This model optimization solution employs a soft-thresholding operation on the…”
Get full text
Journal Article -
2
A verifiable (t, n) threshold quantum state sharing scheme on IBM quantum cloud platform
Published in Quantum information processing (2020)“…In current verifiable quantum state sharing schemes, the dishonest behaviors of certain participants can be verified. However, these schemes have either high…”
Get full text
Journal Article -
3
A Verifiable (t, n) Threshold Quantum State Sharing Against Denial Attack
Published in IEEE access (2019)“…To detect frauds by a dealer or some participants, researchers have proposed verifiable threshold quantum state sharing (VTQSTS) schemes. However, the existing…”
Get full text
Journal Article -
4
A Decision-Based Modified Total Variation Diffusion Method for Impulse Noise Removal
Published in Computational Intelligence and Neuroscience (01-01-2017)“…Impulsive noise removal usually employs median filtering, switching median filtering, the total variation L1 method, and variants. These approaches however…”
Get full text
Journal Article -
5
Lightweight Proofs of Retrievability for Electronic Evidence in Cloud
Published in Information (Basel) (01-09-2013)“…Proofs of Retrievability (PoR) is one of the basic functions of electronic evidence preservation center in cloud. This paper proposes two PoR schemes to…”
Get full text
Journal Article -
6
A novel STL-based hybrid model for forecasting hog price in China
Published in Computers and electronics in agriculture (01-07-2022)“…•The STL-based hybrid model is proposed in order to forecast hog price.•A novel method of extending hog-price series is proposed to alleviate the end effect of…”
Get full text
Journal Article -
7
Asynchronous H∞ control of Markov jump discrete-time systems with incomplete transition probability and unreliable links
Published in ISA transactions (01-03-2022)“…In this study, an asynchronous H∞ state feedback controller is devised for Markov jump discrete-time systems (MJDTSs) with time-varying delay. ”Asynchronous”…”
Get full text
Journal Article -
8
High-dimensional quantum threshold anonymous identity authentication scheme
Published in Quantum information processing (01-09-2018)“…In the existing quantum identity authentication (QIA) schemes, single-party QIA needs to run authentication process multiple times for multi-user system. ( n ,…”
Get full text
Journal Article -
9
License Plate Characters Segmentation Using Projection and Template Matching
Published in 2009 International Conference on Information Technology and Computer Science (01-07-2009)“…This paper presents a new method for Car License Plate Characterspsila Segmentation. The proposed approach is not only simple but also more effective than some…”
Get full text
Conference Proceeding -
10
Research of Similarity Measurements in the Clustering Analysis
Published in 2010 Second International Conference on Information Technology and Computer Science (01-07-2010)“…Similarity measurements play an important role in the clustering analysis, so any good or bad methods of measuring similar degree directly affect the…”
Get full text
Conference Proceeding -
11
A novel approach for license plate location in natural images
Published in 2009 Second International Conference on the Applications of Digital Information and Web Technologies (01-08-2009)“…Extraction of the license plate region is challenging first step in the license plate recognition system. The paper proposed approach is not only simple but…”
Get full text
Conference Proceeding -
12
Taking Flexible and Diverse Approaches to Get Undergraduate Students Interested in Cryptography Course
Published in 2009 First International Workshop on Education Technology and Computer Science (01-03-2009)“…With the extensive application of cryptography technologies in our lives, cryptography course has been paid more attention to in many universities. The…”
Get full text
Conference Proceeding -
13
Revisiting Recursive Least Squares for Training Deep Neural Networks
Published 07-09-2021“…Recursive least squares (RLS) algorithms were once widely used for training small-scale neural networks, due to their fast convergence. However, previous RLS…”
Get full text
Journal Article