He Li's research while affiliated with Nanyang Normal University and other places

Publications (15)

Article
Full-text available
Computer-aided diagnosis techniques based on deep learning in skin cancer classification have disadvantages such as unbalanced datasets, redundant information in the extracted features and ignored interactions of partial features among different convolutional layers. In order to overcome these disadvantages, we propose a skin cancer classification...
Article
Background If we rely solely on whether to assign permissions together to determine roles, the roles we generate may not necessarily reflect the needs of the system. Therefore, the role generation process can be done based on user-to-permission dynamic relationships, such as user dynamic operation logs, thus providing the motivation for this work....
Article
Full-text available
For the detection of objects floating in the river, most of the traditional intelligent video monitoring methods are used to monitor through manual viewing. During the traditional video data transmission and processing, the massive amount of data will put pressure on the background such as network and computing power. The new effective method is to...
Article
Full-text available
Chinese roses have both ornamental and medicinal value. However, Chinese roses are susceptible to various diseases during their growing process. It is a challenge for growers to promptly detect and control diseases, especially in extensive planting scenarios. A novel disease identification approach for Chinese roses is proposed to help growers accu...
Article
Full-text available
Water environment monitoring has always been an important method of water resource environmental protection. In practical applications, there are problems such as large water bodies, long monitoring periods, and large transmission and processing delays. Aiming at these problems, this paper proposes a framework and method for detecting floating obje...
Article
Full-text available
The traditional centralized intelligent home network security authentication schemes have security problems such as integrity and confidentiality, while the distributed schemes have the problem of delayed authentication. These schemes are not suitable for the intelligent home environment of edge computing. To solve these problems, a certificateless...
Article
Full-text available
The energy problem and limited capacity of batteries have been fundamental constraints in many wireless sensor network (WSN) applications. For WSN, the wireless energy transmission technology based on magnetic resonance coupling is a promising energy transmission technology. To reduce the cost and energy consumption during charging in mobile wirele...
Article
Full-text available
In the hybrid communication scenario of the Heterogeneous Cloud Radio Access Network and Device-to-Device in 5G, spectrum efficiency promotion and the interference controlling caused by spectrum reuse are still challenges. In this article, a novel resource management method, consisting of power and channel allocation, is proposed to solve this prob...
Article
Full-text available
In mobile wireless multimedia sensor networks’ image compression task collaborations, the existing methods do not consider the dynamic changes in the processing ability and the locations of the cooperative nodes. When processing the image compression tasks, these methods will cause frequent interruptions and result in data re-transmission for those...
Conference Paper
In mobile wireless multimedia sensor networks (MWMSNs) image compression task coordination, the existing methods without considering the dynamic changes of the processing ability and location of cooperative nodes, which will cause frequent interruptions of image compression tasks and task data re-transmission. To solve these problems, an image comp...

Citations

... Although traditional DL approaches have strengths, they still have limitations. These techniques are prone to overfitting, especially when dealing with imbalanced datasets, which might cause the model to prioritize the dominant class [3]. These approaches also find it challenging to accurately represent spatial features and global connections in the input images. ...
... To identify Chinese rose diseases form leaf images Liu et al. proposed a lightweight CNN based on inception and depth wise separable convolution with Coordinate Attention (CA) [28]. Images of both healthy and diseased leaves are included in the dataset which contains 1972 training images, 677 validation images, and 677 testing images. ...
... This solution addresses the distribution challenges faced by AI applications, thereby facilitating their widespread adoption. Zhang et al. [67] present a certificateless smart home network authentication scheme leveraging blockchain. This scheme achieves mutual authentication among users, intelligent terminals (Its), and intelligent gateways (Igs). ...
... However, only charging requests are processed here, and a conventional routing strategy is used for data collection. There are a few new energy-saving methods introduced for data collection from SNs employing the mobile sink (MS) [7,14]. The MS went to a number of SNs in the network to get information from them. ...
... One more work based on matching theory is presented in [10], where one-to-one matching is employed, and consequently, the authors applied a resource exchange strategy. Authors in [11], [12] have presented a joint channel and power allocation scheme for D2D communication in HCRAN. They have given a geometric vertex search approach along with 3D matching technique to improve the throughput. ...
... Recent developments in diverse technology fields such as 5G communications [1], [2] and multimedia [3] have resulted in numerous use cases due to their relative ease and inexpensive distributions. Such use cases span learning [4], entertainment and gaming [5]. ...
... Authors [14] have their research work in MWMSNs in which image compression is further decomposed into image compression task and image transfer subtasks. Simulation is performed by using MATLAB. ...