Key Projects

A study of games and strategies using quantum information processing

A study of games and strategies using quantum information processing

Quantum information processing contributes to solving computational problems and enhancing communication security. Recently quantum information processing has been applied to game theory.

EXPLORE >
Research on large data collection and application technology of backup swine based on video tracking

Research on large data collection and application technology of backup swine based on video tracking

On the basis of the existing remote interactive teaching system based on video surveillance, this project studies the key technologies of big data collection and application.

EXPLORE >
Person re-identification based on evolutionary algorithm and multi-features

Person re-identification based on evolutionary algorithm and multi-features

"Person re-identification refers to identify a particular person automatically by computer in the surveillance video who has occurred in the monitoring network,which is significantly important for the improvement of intelligence of video monitoring.

EXPLORE >
Discrimination application demonstration system of passion fruit maturity  based on RGB-D sensor

Discrimination application demonstration system of passion fruit maturity based on RGB-D sensor

To overcome the disadvantages of traditional feature extraction methods of description ability of passion fruit maturity model discriminant, a feature extraction method of fusion shape features of depth information and texture and color features of RGB image of passion fruit was presented, the method can reduce the computational complexity and improve the accuracy of the discrimination of passion fruit maturity.

EXPLORE >
Research on autonomic management for network service systems

Research on autonomic management for network service systems

"Modern services have distinct features of organizational networking and information networking. Business managers are facing greater management complexity problems because of the complexity and dynamic variability of service network and the perishability of service resource .

EXPLORE >
study on searchable public key encryption in a multi-user setting

study on searchable public key encryption in a multi-user setting

"Because searchable encryption can be used to solve the issue of search on encrypted data in cloud computing enviornment, it has been widely studied by researches recently. At present the research on searchable encryption focuses on a single-user setting, namely the user can only search its own encrypted data.

EXPLORE >
Remote diagnosis and control expert system for longan diseases and pests based on Data Mining

Remote diagnosis and control expert system for longan diseases and pests based on Data Mining

"Project supported by China Spark Program under grant No. 2014GA780051, January 1, 2014 - December 31, 2016, Sole PI.

EXPLORE >
Dynamic analysis and remote diagnosis system of livestock and poultry diseases based on Intelligent Mining Algorithm

Dynamic analysis and remote diagnosis system of livestock and poultry diseases based on Intelligent Mining Algorithm

"Project supported by China Spark Program under grant No. 2015GA780062, January 1, 2015 - December 31, 2017, Sole PI.

EXPLORE >
Some researches on a class of cubic nonlinear integrable systems with peakons and blow-up solutions

Some researches on a class of cubic nonlinear integrable systems with peakons and blow-up solutions

This project is concerned with several aspects for a class of cubic nonlinear integrable systems with peakons and blow-up solutions. We mainly investigate the initial value problem and the initial boundary value problem for the systems.

EXPLORE >
Research on the Design of Efficient Leakage Resilient Signature Schemes

Research on the Design of Efficient Leakage Resilient Signature Schemes

"Traditional cryptography emphasizes on the design of cryptosystems, instead of the concrete implementation. However, the emerging side-channel attacks, allow the adversary to gain internal secret information of a cryptographic system, and renders many cryptosystems that are designed to be secure not secure any more.

EXPLORE >
Application and demonstration of rapid monitoring and early warning technology of major vegetable pests in South China

Application and demonstration of rapid monitoring and early warning technology of major vegetable pests in South China

This project takes four typical parasitic insects in vegetables in South China, Bemisia tabaci, Phyllotreta striolata Fabricius, Diamondback moth and Thrip, as the object, to carry out rapid monitoring and early warning of major pests in vegetables. The project will implement technical integration and application of demonstration, and achieve rapid pest forecast alarm.

EXPLORE >
Mixed strategy self-feedback evolutionary algorithms based on fitness landscapes and their applications in prevision agriculture

Mixed strategy self-feedback evolutionary algorithms based on fitness landscapes and their applications in prevision agriculture

In conventional evolutionary algorithms, different search strategies have been designed to find the optimum in a fitness landscape. Nevertheless none of them works well over all possible fitness landscapes.

EXPLORE >
Research on non-locality based quantum games

Research on non-locality based quantum games

Classical game theory has wide application in computer science, economics, biology and other fields. Quantum game which is one of the branches of quantum information theory, introduces quantum information processing resources to classical game.

EXPLORE >
Theories and algorithms for 1-bit compressive sensing

Theories and algorithms for 1-bit compressive sensing

Compressive sensing has become an active research area in the field of applied and computational harmonic analysis. It has been widely used in signal acquisition and processing, medical imaging, machine learning and many other fields.

EXPLORE >
Time-frequency analysis of nonlinear Fourier atoms and applications

Time-frequency analysis of nonlinear Fourier atoms and applications

The classic methods of time-frequency analysis, such as spectrogram, wavelet analysis, Wigner distribution and etc can be regarded as derivatives of Fourier analysis, the essence of which is to approximate signals by using time-frequency atoms with linear phases. Unfortunately, most of real signals are transient signals having time-varying frequency,namely, instantaneous frequency (IF).

EXPLORE >
Study on the Method of TAL Effector Target Prediction with Structural Model

Study on the Method of TAL Effector Target Prediction with Structural Model

Transcription activator-like effector (TALE) functions as eukaryotic-like transcription factors that induce the expression of plant disease susceptibility genes by recognizing specific DNA sequences. The ability to accurately predict binding sites for TALE is crucial for achieving a better understanding of the plant disease processes, developing plant genetic resistance strategies and designing the TALE nuclease (TALEN).

EXPLORE >
Research on Compression and Reconstruction of Encrypted Images Using the Markov Random Field

Research on Compression and Reconstruction of Encrypted Images Using the Markov Random Field

How to achieve the efficient compression and high-quality reconstruction on encrypted signals is a fundamental problem with scientific significance and potential applications for cloud computing in the big-data era.

EXPLORE >
Research on the computational power of membrane computing systems with neurons

Research on the computational power of membrane computing systems with neurons

With the rapid development of computer technology, looking for a computing device dealing with large-scale information more quickly and effectively has became one of the serious problems to be solved. Inspired by the structure and functioning of biological cells, a novel computational model-Membrane Computing is proposed by Gh.Pǎun. Membrane computing theory is mainly to discuss how to build a computational model from the structure and functioning of the cell, as well as the organization, organ and other advanced structures, and to analyze its computing power and computational efficiency.

EXPLORE >
Research on online clustering ensemble algorithms for multi-source heterogeneous streaming data and their applications

Research on online clustering ensemble algorithms for multi-source heterogeneous streaming data and their applications

As an important research topic, the clustering ensemble technique has been receiving increasing attention in recent years, due to its ability to combine multiple clusterings into a probably better and more robust clustering. However, most, if not all, of the existing clustering ensemble algorithms are devised for offline data, which lack the desirable ability to handle streaming data. With the rapid development of information technology, more and more data emerge as data streams, which are often collected from multiple heterogeneous sources.

EXPLORE >
具有分数阶导数的解析函数空间上的算子与算子代数

具有分数阶导数的解析函数空间上的算子与算子代数

We will research the special operator and operator algebras on Hardy-Sobolev spaces and Bergman-Sobolev spaces, these spaces first occurs in Harmonic analysis. Recently, the complex analytic construction and the Sobolev space construction are connected, since the complex analytic function spaces have better construction than real function spaces, the properties and construction of operators and operator algebras on these spaces are deeper than that in the case of real variables.

EXPLORE >
SCAU College of Mathematics and Informatics
SCAU College of Software Engineering
483 WUSHAN ROAD
TIANHE DISTRICT
GUANGZHOU,GUANGDONG,CHINA
POST : 510642
TEL : 020-85285393