Xiaodong Yang

ORCID: 0000-0001-5703-4437
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Privacy-Preserving Technologies in Data
  • Supply Chain and Inventory Management
  • Sustainable Supply Chain Management
  • Digital Platforms and Economics
  • Consumer Market Behavior and Pricing
  • Metaheuristic Optimization Algorithms Research
  • Spectroscopy and Chemometric Analyses
  • Blockchain Technology Applications and Security
  • Cloud Data Security Solutions
  • Complex Network Analysis Techniques
  • Advanced Algorithms and Applications
  • Wireless Networks and Protocols
  • Mobile Ad Hoc Networks
  • Merger and Competition Analysis
  • Opinion Dynamics and Social Influence
  • Advanced Computational Techniques and Applications
  • Quality and Supply Management
  • Machine Learning and Algorithms
  • Cooperative Communication and Network Coding
  • Wireless Communication Security Techniques
  • Spectroscopy Techniques in Biomedical and Chemical Research
  • Vehicular Ad Hoc Networks (VANETs)
  • Advanced Graph Neural Networks
  • Markov Chains and Monte Carlo Methods

Shanghai University of International Business and Economics
2019-2023

Shunde Polytechnic
2010-2023

Guangxi Academy of Sciences
2020-2023

Northwest Normal University
2017-2023

Harvard University
2023

Shandong University
2012-2023

Tsinghua University
2021-2023

China University of Mining and Technology
2011-2020

Ministry of Education of the People's Republic of China
2020

Sanming University
2020

A manufacturer commonly distributes through a set of retailers who are authorized to sell its product; demand‐enhancing services may also be provided by the manufacturer. These granted all ( uniform service provision) or favored few differential provision). To determine when does—or does not—bestow equal levels, we develop model one selling two competing retailers. We find optimality entail at some parametric values, while is optimal other values. Counterintuitively, with service, recipient...

10.1111/poms.13089 article EN Production and Operations Management 2019-08-19

There has been extensive research on the strategic choice between supply chain centralization and decentralization. However, most assumes complete or decentralization but omits commonly adopted structure of partial centralization. With centralization, a firm owns portion, not all, its partner. To help fill this gap, in paper, we make major contribution by explicitly analyzing where durable‐good manufacturer portion downstream retailer. We start with two‐period model derive analytical...

10.1111/poms.14006 article EN Production and Operations Management 2023-04-08

This paper presents an improved genetic algorithm with variable population-size (VPGA) inspired by the natural features of size population. Based on VPGA and particle swarm optimization (PSO) algorithms, this also proposes a novel hybrid approach called PSO-GA based evolutionary (PGBHEA). Simulations show that both PGBHEA are effective for problem.

10.1109/icmlc.2003.1259777 article EN 2004-06-21

Motivated by the emergence of dominant retail platforms operating using a store-within-a-store strategy, we study interaction such retailer's decision on selling format and manufacturer's channel selection. The retailer may elect to operate as traditional reseller or platform where manufacturer manages his own store pays slotting fee portion revenue platform. makes selection between weak reseller. A Stackelberg game with being leader is formulated, five relevant options are presented. We...

10.1080/00207543.2019.1566657 article EN International Journal of Production Research 2019-01-16

A novel discrete particle swarm optimization (PSO) method is presented to solve the generalized traveling salesman problem (GTSP). The "generalized vertex" employed represent problem, by which GTSP and TSP can be handled in a uniform style. An uncertain searching strategy local techniques are also accelerate convergent speed. Numerical results show effectiveness of proposed method.

10.1109/icmlc.2004.1382200 article EN 2005-02-22

Abstract Despite the rapid development of science and technology (S&T) in China, few studies have examined factors related to public opinions toward funding S&T development. Using a nationwide sample from an online survey China (N = 702), this study how Chinese attention information on digital media was associated with support for funding, based extended cognitive mediation model, which their scientific literacy nationalism technological were as outcomes consumption predictors The...

10.1093/ijpor/edac037 article EN International Journal of Public Opinion Research 2023-02-17

In this paper, a cooperative game is proposed to perform fair and efficient resource allocation for the time division multiple access (TDMA) based communication networks. considered system, two selfish user nodes can act as source well potential relay each other. A transmission node with energy limitation willing seek relaying only if data-rate achieved through cooperation not lower than that without by consuming same amount of energy. The strategy be defined number data-symbols power it...

10.1109/icc.2011.5962621 article EN 2011-06-01

10.1007/s40684-015-0023-x article EN International Journal of Precision Engineering and Manufacturing-Green Technology 2015-04-01

Purpose Massively multiplayer online role-playing games (MMORPGs) create quasi-real social systems in which players can interact with one another, and economic where consume trade in-game items virtual currency. The currency price, an important indicator of a economy, is highly contingent on players' behavioral interaction MMORPGs. purpose this paper to adopt network perspective examine how topological characteristics networks MMORPG, namely, externalities, density, closure, would exert...

10.1108/intr-07-2016-0201 article EN Internet Research 2017-06-08

Wireless communications have become one of the most key parts in our everyday life, which give us facility on work and life but they still bring a great security risk. A crucial problem with wireless is to ensure communication prevent privacy entities revealing. Authentication becoming an important issue when mobile user (MU) wants access services provided by home agent (HA) visited foreign (FA). Recently, Kuo et al. proposed authentication scheme claimed that was secure against different...

10.6633/ijns.201505.17(3).02 article EN International journal of network security 2015-05-01

Environmental monitoring plays a vital role in environmental protection, especially for the management and conservation of natural resources. However, data is usually difficult to resist malicious attacks because it transmitted an open insecure channel. In our paper, new sharing scheme proposed by using attribute-based encryption, identity-based signature cloud computing technology meet requirements confidentiality, integrity, verifiability, unforgerability data. The equipment encrypts...

10.1371/journal.pone.0258062 article EN cc-by PLoS ONE 2021-09-30

Multi-view data arises frequently in modern network analysis e.g. relations of multiple types among individuals social analysis, longitudinal measurements interactions observational units, annotated networks with noisy partial labeling vertices etc. We study community detection these disparate settings via a unified theoretical framework, and investigate the fundamental thresholds for recovery. characterize mutual information between latent parameters, provided degrees are sufficiently...

10.48550/arxiv.2401.08167 preprint EN cc-by-nc-nd arXiv (Cornell University) 2024-01-01

The thick rind of Fukumoto navel orange is a great barrier to light penetration, which makes it difficult evaluate the internal quality accurately by visible-near-infrared (Vis-NIR) transmittance spectroscopy. information carried transmission spectrum limited. Thus, application genetic algorithm (GA) for variable selection may not reach expected results, and selected variables contain redundancy. In this paper, we present use discrete wavelet transforms optimizing GA-partial least squares...

10.1002/jsfa.9717 article EN Journal of the Science of Food and Agriculture 2019-03-29

Web service technologies are playing an increasingly important role in service-oriented architecture design and application convergence over Mobile ad hoc networks (MANET). Due to the decentralized administration dynamic wireless connectivity problems, accomplishing reliable discovery MANET faces a large number of challenges. In order relieve communication inefficiency among providers clients caused mainly by unpredictable node mobility, this paper proposes cross-layer scheme which enables...

10.1109/icws.2016.59 article EN 2016-06-01

In this paper, we investigate the multiple attribute decision making with interval-valued intuitionistic fuzzy numbers. Motivated by ideal of dependent aggregation, develop Einstein ordered weighted average (DIVIFEOWA) operator, in which associated weights only depend on aggregated arguments and can relieve influence unfair hesitant results assigning low to those "false" "biased" ones then apply them some approaches for Finally, an illustrative example evaluating computer network security is...

10.3233/ifs-141201 article EN Journal of Intelligent & Fuzzy Systems 2015-10-05
Coming Soon ...