Yanjun Hu
YOU?
Author Swipe
View article: Counter-propagating entangled photon pairs from monolayer GaSe
Counter-propagating entangled photon pairs from monolayer GaSe Open
View article: Counter-propagating Entangled Photon Pairs from a Monolayer
Counter-propagating Entangled Photon Pairs from a Monolayer Open
Non-phase-matched spontaneous parametric down-conversion (SPDC) in atomically thin materials provides new degrees of freedom and enhanced quantum information capacity compared to conventional phase-matched sources. These systems emerged as…
View article: GRANet: a graph residual attention network for gene regulatory network inference
GRANet: a graph residual attention network for gene regulatory network inference Open
The reconstruction of gene regulatory networks (GRNs) is crucial for uncovering regulatory relationships between genes and understanding the mechanisms of gene expression within cells. With advancements in single-cell RNA sequencing (scRNA…
View article: An enhanced time synchronization method for a network based on Kalman filtering
An enhanced time synchronization method for a network based on Kalman filtering Open
This paper introduces an enhanced time synchronization method different from IEEE 1588 (PTP). The proposed algorithm employs a unique synchronous message packet structure with a fixed length of 10 bytes and the highest system priority. Thi…
View article: JUTAR: Joint User-Association, Task-Partition, and Resource-Allocation Algorithm for MEC Networks
JUTAR: Joint User-Association, Task-Partition, and Resource-Allocation Algorithm for MEC Networks Open
Mobile edge computing (MEC) is a promising technique to support the emerging delay-sensitive and compute-intensive applications for user equipment (UE) by means of computation offloading. However, designing a computation offloading algorit…
View article: Research on the Comparison Method of Power Grid Engineering Reserve Projects under the Transmission and Distribution Price Reform
Research on the Comparison Method of Power Grid Engineering Reserve Projects under the Transmission and Distribution Price Reform Open
In the context of transmission and distribution price (TDP) reform, the "TDP" policy of "permitted cost plus reasonable revenue" replaces the price principle of "purchase and sale price difference", and the "TDP" is approved separately und…
View article: IDSDL: a sensitive intrusion detection system based on deep learning
IDSDL: a sensitive intrusion detection system based on deep learning Open
Device-free passive (DfP) intrusion detection system is a system that can detect moving entities without attaching any device to the entities. To achieve good performance, the existing algorithms require proper access point (AP) deployment…
View article: Development of Large-And-Small Volume-Switching Rotary Compressor for Residential Multi-Connected Air-Conditioner
Development of Large-And-Small Volume-Switching Rotary Compressor for Residential Multi-Connected Air-Conditioner Open
Residential Multi-Connected Air-Conditioner(RMAC) are widely used in urban residential in China, but they have low energy efficiency problems in daily use. They are mainly due to the air-conditioning habits of Chinese residents in "part sp…
View article: A Natural Language Processing Pipeline of Chinese Free-Text Radiology Reports for Liver Cancer Diagnosis
A Natural Language Processing Pipeline of Chinese Free-Text Radiology Reports for Liver Cancer Diagnosis Open
Despite the rapid development of natural language processing (NLP) implementation in electronic medical records (EMRs), Chinese EMRs processing remains challenging due to the limited corpus and specific grammatical characteristics, especia…
View article: Low-Complexity Multi-User Detection Based on Gradient Information for Uplink Grant-Free NOMA
Low-Complexity Multi-User Detection Based on Gradient Information for Uplink Grant-Free NOMA Open
Massive machine type communication (mMTC) serves an irreplaceable role in the development process of the Internet of Things (IoT). Because of its characteristics of massive connection and sporadic transmission, compressed sensing (CS) has …
View article: Simultaneous Implementation Features Extraction and Recognition Using C3D Network for WiFi-based Human Activity Recognition
Simultaneous Implementation Features Extraction and Recognition Using C3D Network for WiFi-based Human Activity Recognition Open
Human actions recognition has attracted more and more people's attention. Many technology have been developed to express human action's features, such as image, skeleton-based, and channel state information(CSI). Among them, on account of …
View article: Cascade and Fusion of Multitask Convolutional Neural Networks for Detection of Thyroid Nodules in Contrast-Enhanced CT
Cascade and Fusion of Multitask Convolutional Neural Networks for Detection of Thyroid Nodules in Contrast-Enhanced CT Open
With the development of computed tomography (CT), the contrast-enhanced CT scan is widely used in the diagnosis of thyroid nodules. However, due to the artifacts and high complexity of thyroid CT images, traditional machine learning has di…
View article: A novel CSI-based fingerprinting for localization with a single AP
A novel CSI-based fingerprinting for localization with a single AP Open
WiFi-based indoor localization techniques are critical for location-based services. Among them, fingerprint-based method gains considerable interest due to its high accuracy and low equipment requirement. One of the major challenges faced …
View article: An Efficient Quadratic Constrained Least Squares Localization Method for Narrow Space With Ranging Measurement
An Efficient Quadratic Constrained Least Squares Localization Method for Narrow Space With Ranging Measurement Open
The localization algorithm for mobile robots working in narrow space needs to handle the scenario that the geometric shape of reference nodes tends to a line, which results in the matrix of least squares localization approaches ill-conditi…
View article: A Robust Passive Intrusion Detection System with Commodity WiFi Devices
A Robust Passive Intrusion Detection System with Commodity WiFi Devices Open
In recent years, due to the rapidly growing capacities of physical layer, device-free passive detection holds great importance for a broad range of application. Most recent works focus on motion detection, intrusion detection, and vital si…
View article: Channel Estimation with Systematic Polar Codes
Channel Estimation with Systematic Polar Codes Open
Study of polar codes in fading channels is of great importance when applying polar codes in wireless communications. Channel estimation is a fundamental step for communication to be possible in fading channels. For both systematic and non-…
View article: Energy-efficient Compressive Data Gathering Utilizing Virtual Multi-input Multi-output
Energy-efficient Compressive Data Gathering Utilizing Virtual Multi-input Multi-output Open
Data gathering is an attractive operation for obtaining information in wireless sensor networks (WSNs). But one of important challenges is to minimize energy consumption of networks. In this paper, an integration of distributed compressive…
View article: Experimental Ten-Photon Entanglement
Experimental Ten-Photon Entanglement Open
We report the first experimental demonstration of quantum entanglement among ten spatially separated single photons. A near-optimal entangled photon-pair source was developed with simultaneously a source brightness of ∼12 MHz/W, a collecti…
View article: Linear system construction of multilateration based on error propagation estimation
Linear system construction of multilateration based on error propagation estimation Open
Iterative localization algorithms are critical part in the control of mobile autonomous robots because they feed fundamental position information to the robots. In a harsh unknown environment, the estimation of environmental noise is hardl…
View article: On the Polar Code Encoding in Fading Channels
On the Polar Code Encoding in Fading Channels Open
Besides the determined construction of polar codes in BEC channels, different construction techniques have been proposed for AWGN channels. The current state-of-the-art algorithm starts with a design-SNR (or an operating SNR) and then proc…
View article: A Novel Interleaving Scheme for Polar Codes
A Novel Interleaving Scheme for Polar Codes Open
It's known that the bit errors of polar codes with successive cancellation (SC) decoding are coupled. We call the coupled information bits the correlated bits. In this paper, concatenation schemes are studied for polar codes (as inner code…
View article: Automatic registration of single aerial image with LiDAR data based on “pin-hole”imaging simulation and iterative computation
Automatic registration of single aerial image with LiDAR data based on “pin-hole”imaging simulation and iterative computation Open
以æå½±æµéå ±çº¿æ¹ç¨ä¸ºä¸¥æ ¼é 忍¡å,æåºäºä¸ç§å¼å ¥éåæå模æè¿ç¨çåå¼ èªç©ºå½±åLiDARç¹äºé åè¿ä»£æ¹æ³,å ±å为3ä¸ªé¶æ®µ:第ä¸,å©ç¨èªç©ºå½±åå åæ°ååå§å¤æ¹ä½å ç´ å¯¹LiDARç¹äºé…
View article: Automatic registration of aerial stereo imagery to LiDAR data through iterative parallax mutual information computation
Automatic registration of aerial stereo imagery to LiDAR data through iterative parallax mutual information computation Open
View article: Energy Efficient Feedback Design for Coordinated Multi-Point Transmission in Downlink
Energy Efficient Feedback Design for Coordinated Multi-Point Transmission in Downlink Open
Coordinated multi-point (CoMP) has been raised to increase the average cell throughput and the cell-edge user throughput.However, the energy consumption of mobile stations (MSs) is a key problem restricting the wide application of CoMP sys…
View article: On the Error Performance of Systematic Polar Codes
On the Error Performance of Systematic Polar Codes Open
Systematic polar codes are shown to outperform non-systematic polar codes in terms of the bit-error-rate (BER) performance. However theoretically the mechanism behind the better performance of systematic polar codes is not yet clear. In th…