Xiaoqiang Zhang
YOU?
Author Swipe
View article: A Dual-Modal Adaptive Pyramid Transformer Algorithm for UAV Cross-Modal Object Detection
A Dual-Modal Adaptive Pyramid Transformer Algorithm for UAV Cross-Modal Object Detection Open
Unmanned Aerial Vehicles (UAVs) play vital roles in traffic surveillance, disaster management, and border security, highlighting the importance of reliable infrared–visible image detection under complex illumination conditions. However, UA…
View article: Synthesis comparative evaluation of hydrophobic polymer/surfactant fracturing fluids on methane adsorption–desorption and pore structure modifications in coal
Synthesis comparative evaluation of hydrophobic polymer/surfactant fracturing fluids on methane adsorption–desorption and pore structure modifications in coal Open
Traditional fracturing fluids often face limitations in achieving a balance between viscosity, gel-breaking capability, and formation protection, which poses a significant challenge for the development of optimally performing fluids in min…
View article: African swine fever virus DEAD-box helicase D1133L promotes OGG1-driven incision of genomic 8-oxoG via HDAC5 deacetylation
African swine fever virus DEAD-box helicase D1133L promotes OGG1-driven incision of genomic 8-oxoG via HDAC5 deacetylation Open
African swine fever virus (ASFV) infection induces oxidative stress and produces oxidative DNA damage bases, including 8-oxoguanine (8-oxoG). It is essential to promptly repair these damages to maintain genome stability. The enzyme 8-oxogu…
View article: Experimental Study on Inhibition Characteristics of Imidazolium-Ionic-Liquid-Loaded Sepiolite Composite Inhibitor
Experimental Study on Inhibition Characteristics of Imidazolium-Ionic-Liquid-Loaded Sepiolite Composite Inhibitor Open
In response to the prevalent issues of short inhibition cycles and poor environmental compatibility in traditional inhibitors, this study prepared a new sepiolite-based composite inhibitor by loading imidazolium ionic liquid onto sepiolite…
View article: Image Encryption Algorithm Based on Dynamic Rhombus Transformation and Digital Tube Model
Image Encryption Algorithm Based on Dynamic Rhombus Transformation and Digital Tube Model Open
With the rapid advancement of information technology, as critical information carriers, images are confronted with significant security risks. To ensure the image security, this paper proposes an image encryption algorithm based on a dynam…
View article: FasterNet-YOLO for real-time detection of steel surface defects algorithm
FasterNet-YOLO for real-time detection of steel surface defects algorithm Open
Steel surface defect detection is an important application of object detection in industry. Achieving object detection in industry while balancing detection accuracy and real-time performance is a challenge. Therefore, this paper proposes …
View article: A lightweight detection algorithm of PCB surface defects based on YOLO
A lightweight detection algorithm of PCB surface defects based on YOLO Open
Aiming at the problems of low accuracy and large computation in the task of PCB defect detection. This paper proposes a lightweight PCB defect detection algorithm based on YOLO. To address the problem of large numbers of parameters and cal…
View article: The African swine fever virus gene MGF_360-4L inhibits interferon signaling by recruiting mitochondrial selective autophagy receptor SQSTM1 degrading MDA5 antagonizing innate immune responses
The African swine fever virus gene MGF_360-4L inhibits interferon signaling by recruiting mitochondrial selective autophagy receptor SQSTM1 degrading MDA5 antagonizing innate immune responses Open
Multigene family (MGF) 360 genes, which are African swine fever virus (ASFV) virulence genes, primarily target key host immune molecules to suppress host interferon (IFN) production and interferon-stimulated gene (ISG) transcription, impai…
View article: Image Encryption Algorithm Based on Hybrid Chaotic System and Three-Dimensional Model
Image Encryption Algorithm Based on Hybrid Chaotic System and Three-Dimensional Model Open
View article: Medical Image Encryption Algorithm Based on DNA Coding and Four-Square Cipher
Medical Image Encryption Algorithm Based on DNA Coding and Four-Square Cipher Open
View article: Platinum Functional Layer for Hydrogen Crossover Mitigation in Proton Exchange Membrane Water Electrolysers
Platinum Functional Layer for Hydrogen Crossover Mitigation in Proton Exchange Membrane Water Electrolysers Open
View article: Field-road classification for agricultural vehicles in China based on pre-trained visual model
Field-road classification for agricultural vehicles in China based on pre-trained visual model Open
Field-road classification that automatically identifies the activity (either in-field or on-road) of each point in Global Navigation Satellite System (GNSS) trajectories is a critical process in the behavior analysis of agricultural vehicl…
View article: African swine fever virus RNA polymerase subunits C315R and H359L inhibition host translation by activating the PKR-eIF2a pathway and suppression inflammatory responses
African swine fever virus RNA polymerase subunits C315R and H359L inhibition host translation by activating the PKR-eIF2a pathway and suppression inflammatory responses Open
ASFV C315R is homologous to the transcription factor TFIIB of large unclassified DNA viruses, and H359L is identical to the subunit 3 (RPB3) of eukaryotic RNA polymerase II. The C315R and H359L may play an important role in ASFV replicatio…
View article: Design and optimization of heat pump with infrared drying for Glycyrrhiza uralensis (Licorice) processing
Design and optimization of heat pump with infrared drying for Glycyrrhiza uralensis (Licorice) processing Open
A new dryer, integrating infrared and heat pump drying technologies, was designed to enhance licorice processing standardization, aiming at improved drying efficiency and product quality. Numerical simulation using COMSOL software validate…
View article: Improved YOLOv7 Algorithm for Small Object Detection in Unmanned Aerial Vehicle Image Scenarios
Improved YOLOv7 Algorithm for Small Object Detection in Unmanned Aerial Vehicle Image Scenarios Open
Object detection in unmanned aerial vehicle (UAV) images has become a popular research topic in recent years. However, UAV images are captured from high altitudes with a large proportion of small objects and dense object regions, posing a …
View article: Vitamin D-mediated tsRNA-07804 triggers mitochondrial dysfunction and suppresses non-small cell lung cancer progression by targeting CRKL
Vitamin D-mediated tsRNA-07804 triggers mitochondrial dysfunction and suppresses non-small cell lung cancer progression by targeting CRKL Open
Objective tRNA-derived small RNAs (tsRNAs) are novel non-coding RNAs with various functions in multiple cancers. Nevertheless, whether vitamin D executes its function in mitochondrial dysfunction and non-small cell lung cancer (NSCLC) prog…
View article: Aza-Prilezhaev Aziridination-Enabled Multidimensional Analysis of Isomeric Lipids via High-Resolution U-Shaped Mobility Analyzer-Mass Spectrometry
Aza-Prilezhaev Aziridination-Enabled Multidimensional Analysis of Isomeric Lipids via High-Resolution U-Shaped Mobility Analyzer-Mass Spectrometry Open
Unsaturated lipids constitute a significant portion of lipidome, serving as players of multifaceted functions involving cellular signaling, membrane structure and bioenergetics. While derivatization-assisted liquid chromatography tandem ma…
View article: Aza-Prilezhaev Aziridination-Enabled Multidimensional Analysis of Isomeric Lipids via High-Resolution U-Shaped Mobility Analyzer-Mass Spectrometry
Aza-Prilezhaev Aziridination-Enabled Multidimensional Analysis of Isomeric Lipids via High-Resolution U-Shaped Mobility Analyzer-Mass Spectrometry Open
Unsaturated lipids constitute a significant portion of lipidome, serving as players of multifaceted functions involving cellular signaling, membrane structure and bioenergetics. While derivatization-assisted liquid chromatography tandem ma…
View article: Image encryption algorithm based on improved iterative chaotic map with infinite collapses and Gray code
Image encryption algorithm based on improved iterative chaotic map with infinite collapses and Gray code Open
The quick advancement of multimedia technology has led to the widespread utilization of digital images across various industries. Meanwhile, image security has become an urgent issue in need of resolution. To guarantee image security as we…
View article: Low-light image enhancement by two-stream contrastive learning in both spatial and frequency domains (Erratum)
Low-light image enhancement by two-stream contrastive learning in both spatial and frequency domains (Erratum) Open
The Journal of Electronic Imaging (JEI), copublished bimonthly with the Society for Imaging Science and Technology, publishes peer-reviewed papers that cover research and applications in all areas of electronic imaging science and t…
View article: Color Image Encryption Algorithm Based on Cross-Spiral Transformation and Zone Diffusion
Color Image Encryption Algorithm Based on Cross-Spiral Transformation and Zone Diffusion Open
Due to their rich information, color images are frequently utilized in many different industries, but the network’s security in handling their delivery of images must be taken into account. To improve the security and efficiency of color i…
View article: Moisture insensitive analysis of polyester/viscose waste textiles using Near-Infrared spectroscopy and Orthogonalization of external parameters algorithm
Moisture insensitive analysis of polyester/viscose waste textiles using Near-Infrared spectroscopy and Orthogonalization of external parameters algorithm Open
Near-Infrared (NIR) spectroscopic analyses can be applied in waste textile recycling as a rapid and non-invasive method to provide both qualitative and quantitative results. However, it has been a challenge to enhance the accuracy rate of …
View article: Image encryption algorithm based on 2D hyper-chaotic system and central dogma of molecular biology
Image encryption algorithm based on 2D hyper-chaotic system and central dogma of molecular biology Open
With the widespread use of images, image security has received much attention. Image security can be guaranteed by encrypting the plain image and transmitting the corresponding cipher image. This paper proposes an image encryption algorith…
View article: Multiple-image encryption algorithm based on Sarrus rule and 3D Fibonacci matrix
Multiple-image encryption algorithm based on Sarrus rule and 3D Fibonacci matrix Open
Using images to transmit information becomes more common in the new era, but the image information can easily be stolen and tampered with the malicious damage during transmission. In this paper, firstly, inspired by the famous Sarrus rule …
View article: Image encryption algorithm based on the Matryoshka transform and modular-inverse matrix
Image encryption algorithm based on the Matryoshka transform and modular-inverse matrix Open
The transmission of digital image in Internet is convenient, but at the same time the great risk of information leakage is existed. To meet the requirements of image content security and real-time communication, we propose an image encrypt…
View article: StrucTexTv2: Masked Visual-Textual Prediction for Document Image Pre-training
StrucTexTv2: Masked Visual-Textual Prediction for Document Image Pre-training Open
In this paper, we present StrucTexTv2, an effective document image pre-training framework, by performing masked visual-textual prediction. It consists of two self-supervised pre-training tasks: masked image modeling and masked language mod…
View article: Experimental Study of Unpaved Road Identification by Dual-Input Lstm
Experimental Study of Unpaved Road Identification by Dual-Input Lstm Open
View article: Learning Adaptive Feature for Object Detection in Low-Light Conditions
Learning Adaptive Feature for Object Detection in Low-Light Conditions Open
View article: Application of Jiawei Maxing Shigan Tang in the treatment of COVID-19: An observational study
Application of Jiawei Maxing Shigan Tang in the treatment of COVID-19: An observational study Open
Objective To explore the clinical efficacy and adverse reactions of Jiawei Maxing Shigan Tang (JMST; a modified decoction of ephedra, apricot kernel, gypsum, and licorice) combined with western medicine in the symptomatic treatment of COVI…
View article: Color Image Encryption Algorithm Based on Dynamic Block Zigzag Transformation and Six-Sided Star Model
Color Image Encryption Algorithm Based on Dynamic Block Zigzag Transformation and Six-Sided Star Model Open
As a result of the rise in network technology, information security has become particularly important. Digital images play an important role in network transmission. To improve their security and efficiency, a new color image encryption al…