Publications by authors named "Qinglei Zhou"

Article Synopsis
  • * Traditional computational methods for predicting PBRs face limitations, such as using simple sliding windows for residue features and struggling with finding a suitable window size for different PBR types.
  • * The proposed PMSFF framework enhances PBR prediction by using a pre-trained language model, generating multi-scale residue embeddings, and applying a bidirectional GRU for better context learning, showing improved results compared to current methods.
View Article and Find Full Text PDF

With the rapid development of the Internet of Vehicles (IoV), the demand for secure and efficient signature verification is becoming increasingly urgent. To meet this need, we propose an efficient SM9 aggregate signature scheme implemented on Field-Programmable Gate Array (FPGA). The scheme includes both fault-tolerant and non-fault-tolerant aggregate signature modes, which are designed to address challenges in various network environments.

View Article and Find Full Text PDF

In the process of Canny edge detection, a large number of high complexity calculations such as Gaussian filtering, gradient calculation, non-maximum suppression, and double threshold judgment need to be performed on the image, which takes up a lot of operation time, which is a great challenge to the real-time requirements of the algorithm. The traditional Canny edge detection technology mainly uses customized equipment such as DSP and FPGA, but it has some problems, such as long development cycle, difficult debugging, resource consumption, and so on. At the same time, the adopted CUDA platform has the problem of poor cross-platform.

View Article and Find Full Text PDF

As one of the most critical tasks in legal artificial intelligence, legal judgment prediction (LJP) has garnered growing attention, especially in the civil law system. However, current methods often overlook the challenge of imbalanced label distributions, treating each label with equal importance, which can lead the model to be biased toward labels with high frequency. In this paper, we propose a label-enhanced prototypical network (LPN) suitable for LJP, that adopts a strategy of uniform encoding and separate decoding.

View Article and Find Full Text PDF

In this paper, we address the problem of multi-view clustering (MVC), integrating the close relationships among views to learn a consistent clustering result, via triplex information maximization (TIM). TIM works by proposing three essential principles, each of which is realized by a formulation of maximization of mutual information. 1) Principle 1: Contained.

View Article and Find Full Text PDF
Article Synopsis
  • * There are two main approaches for generating SCS: retrieval-based methods, which rely on finding similar code snippets, and generative methods, which create summaries using attentional encoder-decoder architectures, though both have limitations in terms of accuracy and availability of quality training data.
  • * The proposed method, Re_Trans, combines the strengths of both approaches by first retrieving similar codes and summaries, then using a trained discriminator and generative model to enhance accuracy, with promising results from evaluations on a large dataset of Java code-comment pairs.
View Article and Find Full Text PDF
Article Synopsis
  • A convolutional neural network (CNN) based vehicle detection and tracking algorithm is developed to improve smart transportation systems while addressing challenges like high computational complexity and power consumption in edge devices.
  • A low-power and high-precision vehicle detector is implemented using FPGA technology, incorporating YOLOv3 and YOLOv3-tiny CNNs along with the Deepsort tracking algorithm to efficiently process and analyze traffic data.
  • Optimization techniques such as model compression and hardware improvements result in drastic reductions in model size (up to 98.2%) and enable high video processing speeds, achieving a peak throughput of 168.72 frames per second.
View Article and Find Full Text PDF

Control-flow attestation (CFA) is a mechanism that securely logs software execution paths running on remote devices. It can detect whether a device is being control-flow hijacked by launching a challenge-response process. In the growing landscape of the Internet of Things, more and more peer devices need to communicate to share sensed data and conduct inter-operations without the involvement of a trusted center.

View Article and Find Full Text PDF

Software testing is a widespread validation means of software quality assurance in industry. Intelligent optimization algorithms have been proved to be an effective way of automatic test data generation. Firefly algorithm has received extensive attention and been widely used to solve optimization problems because of less parameters and simple implement.

View Article and Find Full Text PDF

Question answering (QA) system is becoming the focus of the research in medical health in terms of providing fleetly accurate answers to users. Numerous traditional QA systems are faced to simple factual questions and do not obtain accurate answers for complex questions. In order to realize the intelligent QA system for disease diagnosis and treatment in medical informationization, in this paper, we propose a depth evidence score fusion algorithm for Chinese Medical Intelligent Question Answering System, which can measure the text information in many algorithmic ways and ensure that the QA system outputs accurately the optimal candidate answer.

View Article and Find Full Text PDF