|
|
Articles
by
Wang Li |
Total Records (
4 ) for
Wang Li |
|
 |
|
|
|
Wang Li
and
Zeng Pei-Pei
|
|
Circuit board infrared image segmentation is an important
procedure in the application of circuit board fault detection with infrared
thermal imaging technology. A CNO-HMRF-EM algorithm combined with the advantage
of HMRF, EM and CNO is designed to deal with the insufficiency of the traditional
clustering methods in the circuit board infrared image segmentation. To get
the best clustering segmentation results, HMRF-EM algorithm is used as the first
step to estimate the tag of each image point so that each point of image can
be clustered according to the tag estimation result. Then the HMRF-EM algorithms
optimal clustering number is determined in the use of CNO algorithm. The simulation
results prove that, comparing with the methods of C-Mean clustering and OTSU
clustering, bigger GS value as well as the better results of the clustering
segmentation can be acquired in the use of CNO-HMRF-EM algorithm. |
|
|
|
|
Wang Li
,
Gang Luo
and
Lingyun Xiang
|
|
In practical applications, in order to extract data from the
stego, some data hiding encryption methods need to identify themselves. When
performing data hiding, they embed some specific logo for self-identification.
However, it is unavoidable to bring themselves the risk of exposure. Suppose
each hidden method has a corresponding logo S and the attacker has a logo set
Φ which consists of some hidden methods logos. Once he find the logo S
which matches a logo in Φ, he can easily recognize the very method. To
solve this problem, we propose a method based on synchronization to hide the
specific sign or logo. First, the sender generates a key using a public variable
parameter which is always changing from time to time. Then, we can calculate
the hidden datas location in the cover from the key. According to the locations,
we can embed the logo into the cover. As the public parameter is changing from
time to time, each transmission of hidden data has a unique location sequence.
When the stego reaches its receiver, according to the public parameter, the
receiver could generate the key and get the hidden datas location to extract
the secret data correctly. Experimental results verify that the data hiding
method performs well and hardly has impacts on the covers quality and has little
impacts on the robustness, imperceptibility and capacity of the original stego-cover.
Besides, it is able to recover the key with linear time complexity when the
critical information which is used to generate the key is missing. |
|
|
|
|
|
Wang Li
,
Guo Yu-Fei
,
Qi Hai-Tao
,
Su Shuo
,
Chen Ji-Dang
,
Zhao Fu-Rong
,
Cao Nan
,
Zhang Min-Ze
,
Zhang Chao-Yi
,
Huang Zhen
,
Tan Li-Kai
,
Li Shou-Jun
and
Zhang Gui-Hong
|
|
NP is a relatively conservative structure protein also is the main recognition antigen and have good middle cross reactive. To express Canine Influenza Virus (CIV) subtype H3N2 NP protein, the NP gene was amplified by PCR and cloned into vector pMD18-T and then sequence determination. The NP gene was cloned into vector pET-32a (+). The recombinant plasmid pET-NP was transformed into Rosetta II (DE3) and induced with IPTG. |
|
|
|
|
|
Shao Fei
,
Wang Xiaoyi
,
Shi Yan
,
Xu Jiping
,
Sheng Lu
,
Wang Li
and
Tang Lina
|
|
Based on the deep analysis of the formation process of algal blooms for the urban lakes and rivers, some key factors affecting the formation of algal blooms have been extracted. Furthermore, a recognition model of algae outbreak has been established based on the complex network to calculate the related parameters of the characters towards the complex network which is the way to achieve the recognition of the phenomenon mentioned above. By means of the experiment on the water quality in the urban lakes of Beijing, this method has been proved to be correct and efficient which provides the reference for the deeper research of the formation mechanism of algal blooms. |
|
|
|
|
|
|