He Li's research while affiliated with Nanyang Normal University and other places
What is this page?
This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
Publications (15)
Computer-aided diagnosis techniques based on deep learning in skin cancer classification have disadvantages such as unbalanced datasets, redundant information in the extracted features and ignored interactions of partial features among different convolutional layers. In order to overcome these disadvantages, we propose a skin cancer classification...
Background
If we rely solely on whether to assign permissions together to determine roles, the roles we generate may not necessarily reflect the needs of the system. Therefore, the role generation process can be done based on user-to-permission dynamic relationships, such as user dynamic operation logs, thus providing the motivation for this work....
For the detection of objects floating in the river, most of the traditional intelligent video monitoring methods are used to monitor through manual viewing. During the traditional video data transmission and processing, the massive amount of data will put pressure on the background such as network and computing power. The new effective method is to...
Chinese roses have both ornamental and medicinal value. However, Chinese roses are susceptible to various diseases during their growing process. It is a challenge for growers to promptly detect and control diseases, especially in extensive planting scenarios. A novel disease identification approach for Chinese roses is proposed to help growers accu...
Water environment monitoring has always been an important method of water resource environmental protection. In practical applications, there are problems such as large water bodies, long monitoring periods, and large transmission and processing delays. Aiming at these problems, this paper proposes a framework and method for detecting floating obje...
The traditional centralized intelligent home network security authentication schemes have security problems such as integrity and confidentiality, while the distributed schemes have the problem of delayed authentication. These schemes are not suitable for the intelligent home environment of edge computing. To solve these problems, a certificateless...
The energy problem and limited capacity of batteries have been fundamental constraints in many wireless sensor network (WSN) applications. For WSN, the wireless energy transmission technology based on magnetic resonance coupling is a promising energy transmission technology. To reduce the cost and energy consumption during charging in mobile wirele...
In the hybrid communication scenario of the Heterogeneous Cloud Radio Access Network and Device-to-Device in 5G, spectrum efficiency promotion and the interference controlling caused by spectrum reuse are still challenges. In this article, a novel resource management method, consisting of power and channel allocation, is proposed to solve this prob...
In mobile wireless multimedia sensor networks’ image compression task collaborations, the existing methods do not consider the dynamic changes in the processing ability and the locations of the cooperative nodes. When processing the image compression tasks, these methods will cause frequent interruptions and result in data re-transmission for those...
In mobile wireless multimedia sensor networks (MWMSNs) image compression task coordination, the existing methods without considering the dynamic changes of the processing ability and location of cooperative nodes, which will cause frequent interruptions of image compression tasks and task data re-transmission. To solve these problems, an image comp...
Citations
... Although traditional DL approaches have strengths, they still have limitations. These techniques are prone to overfitting, especially when dealing with imbalanced datasets, which might cause the model to prioritize the dominant class [3]. These approaches also find it challenging to accurately represent spatial features and global connections in the input images. ...
... To identify Chinese rose diseases form leaf images Liu et al. proposed a lightweight CNN based on inception and depth wise separable convolution with Coordinate Attention (CA) [28]. Images of both healthy and diseased leaves are included in the dataset which contains 1972 training images, 677 validation images, and 677 testing images. ...
... This solution addresses the distribution challenges faced by AI applications, thereby facilitating their widespread adoption. Zhang et al. [67] present a certificateless smart home network authentication scheme leveraging blockchain. This scheme achieves mutual authentication among users, intelligent terminals (Its), and intelligent gateways (Igs). ...
... However, only charging requests are processed here, and a conventional routing strategy is used for data collection. There are a few new energy-saving methods introduced for data collection from SNs employing the mobile sink (MS) [7,14]. The MS went to a number of SNs in the network to get information from them. ...
... One more work based on matching theory is presented in [10], where one-to-one matching is employed, and consequently, the authors applied a resource exchange strategy. Authors in [11], [12] have presented a joint channel and power allocation scheme for D2D communication in HCRAN. They have given a geometric vertex search approach along with 3D matching technique to improve the throughput. ...
... Recent developments in diverse technology fields such as 5G communications [1], [2] and multimedia [3] have resulted in numerous use cases due to their relative ease and inexpensive distributions. Such use cases span learning [4], entertainment and gaming [5]. ...
Reference: Image Feature-Based Watermarking
... Authors [14] have their research work in MWMSNs in which image compression is further decomposed into image compression task and image transfer subtasks. Simulation is performed by using MATLAB. ...