- Cryptography and Data Security
- Privacy-Preserving Technologies in Data
- Supply Chain and Inventory Management
- Sustainable Supply Chain Management
- Digital Platforms and Economics
- Consumer Market Behavior and Pricing
- Metaheuristic Optimization Algorithms Research
- Spectroscopy and Chemometric Analyses
- Blockchain Technology Applications and Security
- Cloud Data Security Solutions
- Complex Network Analysis Techniques
- Advanced Algorithms and Applications
- Wireless Networks and Protocols
- Mobile Ad Hoc Networks
- Merger and Competition Analysis
- Opinion Dynamics and Social Influence
- Advanced Computational Techniques and Applications
- Quality and Supply Management
- Machine Learning and Algorithms
- Cooperative Communication and Network Coding
- Wireless Communication Security Techniques
- Spectroscopy Techniques in Biomedical and Chemical Research
- Vehicular Ad Hoc Networks (VANETs)
- Advanced Graph Neural Networks
- Markov Chains and Monte Carlo Methods
Shanghai University of International Business and Economics
2019-2023
Shunde Polytechnic
2010-2023
Guangxi Academy of Sciences
2020-2023
Northwest Normal University
2017-2023
Harvard University
2023
Shandong University
2012-2023
Tsinghua University
2021-2023
China University of Mining and Technology
2011-2020
Ministry of Education of the People's Republic of China
2020
Sanming University
2020
A manufacturer commonly distributes through a set of retailers who are authorized to sell its product; demand‐enhancing services may also be provided by the manufacturer. These granted all ( uniform service provision) or favored few differential provision). To determine when does—or does not—bestow equal levels, we develop model one selling two competing retailers. We find optimality entail at some parametric values, while is optimal other values. Counterintuitively, with service, recipient...
There has been extensive research on the strategic choice between supply chain centralization and decentralization. However, most assumes complete or decentralization but omits commonly adopted structure of partial centralization. With centralization, a firm owns portion, not all, its partner. To help fill this gap, in paper, we make major contribution by explicitly analyzing where durable‐good manufacturer portion downstream retailer. We start with two‐period model derive analytical...
This paper presents an improved genetic algorithm with variable population-size (VPGA) inspired by the natural features of size population. Based on VPGA and particle swarm optimization (PSO) algorithms, this also proposes a novel hybrid approach called PSO-GA based evolutionary (PGBHEA). Simulations show that both PGBHEA are effective for problem.
Motivated by the emergence of dominant retail platforms operating using a store-within-a-store strategy, we study interaction such retailer's decision on selling format and manufacturer's channel selection. The retailer may elect to operate as traditional reseller or platform where manufacturer manages his own store pays slotting fee portion revenue platform. makes selection between weak reseller. A Stackelberg game with being leader is formulated, five relevant options are presented. We...
A novel discrete particle swarm optimization (PSO) method is presented to solve the generalized traveling salesman problem (GTSP). The "generalized vertex" employed represent problem, by which GTSP and TSP can be handled in a uniform style. An uncertain searching strategy local techniques are also accelerate convergent speed. Numerical results show effectiveness of proposed method.
Abstract Despite the rapid development of science and technology (S&T) in China, few studies have examined factors related to public opinions toward funding S&T development. Using a nationwide sample from an online survey China (N = 702), this study how Chinese attention information on digital media was associated with support for funding, based extended cognitive mediation model, which their scientific literacy nationalism technological were as outcomes consumption predictors The...
In this paper, a cooperative game is proposed to perform fair and efficient resource allocation for the time division multiple access (TDMA) based communication networks. considered system, two selfish user nodes can act as source well potential relay each other. A transmission node with energy limitation willing seek relaying only if data-rate achieved through cooperation not lower than that without by consuming same amount of energy. The strategy be defined number data-symbols power it...
Purpose Massively multiplayer online role-playing games (MMORPGs) create quasi-real social systems in which players can interact with one another, and economic where consume trade in-game items virtual currency. The currency price, an important indicator of a economy, is highly contingent on players' behavioral interaction MMORPGs. purpose this paper to adopt network perspective examine how topological characteristics networks MMORPG, namely, externalities, density, closure, would exert...
Wireless communications have become one of the most key parts in our everyday life, which give us facility on work and life but they still bring a great security risk. A crucial problem with wireless is to ensure communication prevent privacy entities revealing. Authentication becoming an important issue when mobile user (MU) wants access services provided by home agent (HA) visited foreign (FA). Recently, Kuo et al. proposed authentication scheme claimed that was secure against different...
Environmental monitoring plays a vital role in environmental protection, especially for the management and conservation of natural resources. However, data is usually difficult to resist malicious attacks because it transmitted an open insecure channel. In our paper, new sharing scheme proposed by using attribute-based encryption, identity-based signature cloud computing technology meet requirements confidentiality, integrity, verifiability, unforgerability data. The equipment encrypts...
Multi-view data arises frequently in modern network analysis e.g. relations of multiple types among individuals social analysis, longitudinal measurements interactions observational units, annotated networks with noisy partial labeling vertices etc. We study community detection these disparate settings via a unified theoretical framework, and investigate the fundamental thresholds for recovery. characterize mutual information between latent parameters, provided degrees are sufficiently...
The thick rind of Fukumoto navel orange is a great barrier to light penetration, which makes it difficult evaluate the internal quality accurately by visible-near-infrared (Vis-NIR) transmittance spectroscopy. information carried transmission spectrum limited. Thus, application genetic algorithm (GA) for variable selection may not reach expected results, and selected variables contain redundancy. In this paper, we present use discrete wavelet transforms optimizing GA-partial least squares...
Web service technologies are playing an increasingly important role in service-oriented architecture design and application convergence over Mobile ad hoc networks (MANET). Due to the decentralized administration dynamic wireless connectivity problems, accomplishing reliable discovery MANET faces a large number of challenges. In order relieve communication inefficiency among providers clients caused mainly by unpredictable node mobility, this paper proposes cross-layer scheme which enables...
In this paper, we investigate the multiple attribute decision making with interval-valued intuitionistic fuzzy numbers. Motivated by ideal of dependent aggregation, develop Einstein ordered weighted average (DIVIFEOWA) operator, in which associated weights only depend on aggregated arguments and can relieve influence unfair hesitant results assigning low to those "false" "biased" ones then apply them some approaches for Finally, an illustrative example evaluating computer network security is...