Institution
Beihang University
Education•Beijing, China•
About: Beihang University is a education organization based out in Beijing, China. It is known for research contribution in the topics: Computer science & Control theory. The organization has 67002 authors who have published 73507 publications receiving 975691 citations. The organization is also known as: Beijing University of Aeronautics and Astronautics.
Topics: Computer science, Control theory, Nonlinear system, Microstructure, Artificial neural network
Papers published on a yearly basis
Papers
More filters
••
TL;DR: This work combines the advantages of the fibril network donor and the state of the art Y6 acceptor in a two-step approach to deliver a high efficiency of 16% without batch-to-batch variation.
Abstract: Morphology control in laboratory and industry setting remains as a major challenge for organic solar cells (OSCs) due to the difference in film-drying kinetics between spin coating and the printing process. A two-step sequential deposition method is developed to control the active layer morphology. A conjugated polymer that self-assembles into a well-defined fibril structure is used as the first layer, and then a non-fullerene acceptor is introduced into the fibril mesh as the second layer to form an optimal morphology. A benefit of the combined fibril network morphology and non-fullerene acceptor properties was that a high efficiency of 16.5% (certified as 16.1%) was achieved. The preformed fibril network layer and the sequentially deposited non-fullerene acceptor form a robust morphology that is insensitive to the polymer batches, solving a notorious issue in OSCs. Such progress demonstrates that the utilization of polymer fibril networks in a sequential deposition process is a promising approach towards the fabrication of high-efficiency OSCs. Reliably controlling the morphology in organic solar cells is desired for up-scaling. Here Weng et al. combine the advantages of the fibril network donor and the state of the art Y6 acceptor in a two-step approach to deliver a high efficiency of 16% without batch-to-batch variation.
191 citations
••
TL;DR: In this paper, a fuzzy integrated evaluation model based on the entropy weight was constructed to rate the energy investment risk for 50 nations along China's "Belt & Road initiative" and found that resource potential and Chinese factors have become the main determinant of energy investment risks, while environmental constraints and political risk should also be considered for investing decisions.
191 citations
••
TL;DR: IEAIE can only serve as a counterexample for illustrating common pitfalls in designing secure communication method for image data, and each security metric is questionable, which undermines the security credibility of IEAIE.
Abstract: Recently, a chaotic image encryption algorithm based on information entropy (IEAIE) was proposed. This paper scrutinizes the security properties of the algorithm and evaluates the validity of the used quantifiable security metrics. When the round number is only one, the equivalent secret key of every basic operation of IEAIE can be recovered with a differential attack separately. Some common insecurity problems in the field of chaotic image encryption are found in IEAIE, e.g., the short orbits of the digital chaotic system and the invalid sensitivity mechanism built on information entropy of the plain image. Even worse, each security metric is questionable, which undermines the security credibility of IEAIE. Hence, IEAIE can only serve as a counterexample for illustrating common pitfalls in designing secure communication method for image data.
190 citations
••
TL;DR: In this paper, Li et al. proposed a public-key encryption with fuzzy keyword search (PEFKS) scheme, in which two or more keywords share the same fuzzy keyword trapdoor.
Abstract: Public-key encryption with keyword search (PEKS) is a versatile tool. It allows a third party knowing the search trapdoor of a keyword to search encrypted documents containing that keyword without decrypting the documents or knowing the keyword. However, it is shown that the keyword will be compromised by a malicious third party under a keyword guess attack (KGA) if the keyword space is in a polynomial size. We address this problem with a keyword privacy enhanced variant of PEKS referred to as public-key encryption with fuzzy keyword search (PEFKS). In PEFKS, each keyword corresponds to an exact keyword search trapdoor and a fuzzy keyword search trapdoor. Two or more keywords share the same fuzzy keyword trapdoor. To search encrypted documents containing a specific keyword, only the fuzzy keyword search trapdoor is provided to the third party, i.e., the searcher. Thus, in PEFKS, a malicious searcher can no longer learn the exact keyword to be searched even if the keyword space is small. We propose a universal transformation which converts any anonymous identity-based encryption (IBE) scheme into a secure PEFKS scheme. Following the generic construction, we instantiate the first PEFKS scheme proven to be secure under KGA in the case that the keyword space is in a polynomial size.
190 citations
••
TL;DR: Experimental results on real database indicate that the hyperspectral algorithm is robust, even for the ships with low contrast, and the extended HOG feature turns out to be better than HOG itself as well as some other features such as local binary pattern.
Abstract: Ship detection in high-resolution optical imagery is a challenging task due to the variable appearances of ships and background. This paper aims at further investigating this problem and presents an approach to detect ships in a “coarse-to-fine” manner. First, to increase the separability between ships and background, we concentrate on the pixels in the vicinities of ships. We rearrange the spatially adjacent pixels into a vector, transforming the panchromatic image into a “fake” hyperspectral form. Through this procedure, each produced vector is endowed with some contextual information, which amplifies the separability between ships and background. Afterward, for the “fake” hyperspectral image, a hyperspectral algorithm is applied to extract ship candidates preliminarily and quickly by regarding ships as anomalies. Finally, to validate real ships out of ship candidates, an extra feature is provided with histograms of oriented gradients (HOGs) to generate a hypothesis using AdaBoost algorithm. This extra feature focuses on the gray values rather than the gradients of an image and includes some information generated by very near but not closely adjacent pixels, which can reinforce HOG to some degree. Experimental results on real database indicate that the hyperspectral algorithm is robust, even for the ships with low contrast. In addition, in terms of the shape of ships, the extended HOG feature turns out to be better than HOG itself as well as some other features such as local binary pattern.
190 citations
Authors
Showing all 67500 results
Name | H-index | Papers | Citations |
---|---|---|---|
Yi Chen | 217 | 4342 | 293080 |
H. S. Chen | 179 | 2401 | 178529 |
Alan J. Heeger | 171 | 913 | 147492 |
Lei Jiang | 170 | 2244 | 135205 |
Wei Li | 158 | 1855 | 124748 |
Shu-Hong Yu | 144 | 799 | 70853 |
Jian Zhou | 128 | 3007 | 91402 |
Chao Zhang | 127 | 3119 | 84711 |
Igor Katkov | 125 | 972 | 71845 |
Tao Zhang | 123 | 2772 | 83866 |
Nicholas A. Kotov | 123 | 574 | 55210 |
Shi Xue Dou | 122 | 2028 | 74031 |
Li Yuan | 121 | 948 | 67074 |
Robert O. Ritchie | 120 | 659 | 54692 |
Haiyan Wang | 119 | 1674 | 86091 |