- Phagocytosis and Immune Regulation
- Software Engineering Research
- Cancer Mechanisms and Therapy
- Software Engineering Techniques and Practices
- Technology Assessment and Management
- Distributed systems and fault tolerance
- Web Data Mining and Analysis
- Tactile and Sensory Interactions
- Indoor and Outdoor Localization Technologies
- Information and Cyber Security
- Geomechanics and Mining Engineering
- Petri Nets in System Modeling
- Advanced Text Analysis Techniques
- Data Quality and Management
- Topic Modeling
- Chemical and Physical Studies
- Open Source Software Innovations
- Interactive and Immersive Displays
- Advanced Malware Detection Techniques
- Natural Language Processing Techniques
- Optical Wireless Communication Technologies
- Security and Verification in Computing
- PARP inhibition in cancer therapy
- Healthcare Operations and Scheduling Optimization
- Advanced Data and IoT Technologies
Wuhan University
2023-2024
Jilin University
2013-2023
Nanjing University of Posts and Telecommunications
2023
Harbin Institute of Technology
2012-2022
Fudan University
2022
Southwest University of Science and Technology
2022
RWTH Aachen University
2022
Liaoning University
2022
Tianjin Normal University
2022
Yangzhou University
2022
Training data is the backbone of developing either Machine Learning (ML) models or specific Deep (DL) algorithms. The lack well-labeled training image has significantly impeded development novel DL methods like Convolutional Neural Networks (CNNs) in mineral thin section images identification. However, annotation, especially pixel-wise annotation always a costly process. Manually creating dense semantic labels for rock been long considered as an unprecedented challenge view ubiquitous...
Modern code generation tools, utilizing AI models like Large Language Models (LLMs), have gained popularity for producing functional code. However, their usage presents security challenges, often resulting in insecure merging into the base. Evaluating quality of generated code, especially its security, is crucial. While prior research explored various aspects generation, focus on has been limited, mostly examining produced controlled environments rather than real-world scenarios. To address...
Compared with traditional sentence-level relation extraction, document-level extraction is a more challenging task where an entity in document may be mentioned multiple times and associated relations. However, most methods of do not distinguish between mention-level features entity-level features, just apply simple pooling operation for aggregating into features. As result, the distinct semantics different mentions are overlooked. To address this problem, we propose RSMAN paper which...
Security code review aims to combine automated tools and manual efforts detect security defects during development. The rapid development of Large Language Models (LLMs) has shown promising potential in software development, as well opening up new possibilities review. To explore the challenges applying LLMs practical for defect detection, this study compared detection performance three state-of-the-art (Gemini Pro, GPT-4, GPT-3.5) under five prompts on 549 files that contain from real-world...
In this article, a three-dimensional (3D) pen-like positioning system based on the high-precision 3D ultrasonic (US) method is presented. The US can achieve millimeter-level accuracy in within working area of 2 m × 1.5 m. order to improve real-time performance proposed system, an electronic pen realized by time-of-flight (TOF) detection dynamic threshold and average zero-crossing detection. overcomes limitations traditional that sensitive noise. high without conducting complex calculations....
With the growing usage of renewable energy resources, fluctuation and randomness solar wind power output have a significant influence on safe stable operation system. Deciding how to deal with these uncertainties has become hot topic for researchers practitioners. In this paper, hybrid improved marine predators algorithm is proposed solve optimal reactive dispatch problem load demand, wind-solar uncertainties. The ε constrained technique adopted constraints in optimization problem....
The predecessor of China Optics was and Applied Digest, which founded in 1985. At that time, it the only retrieval journal field optics China. end 2008, Digest renamed
Fourier descriptor is an important method used in shape analysis and recognition. A novel for designing the classifier of multi-dimensional data was proposed, which radar chart multi-statistics to show multidimensional applied Descriptors recognize chart. Different formed different distinguished category. Then a new based on polar radius defined, describes curve shape. The Probabilistic Neural network combined with implement automatic classification. Experimental results this has good...
4-Methylcatechol (4-MC) is one of the metabolites quercetin, which a potential drug for neuroprotection and tumorigenesis inhibition. This study was performed to investigate cytotoxic effect 4-MC in mouse TM4 Sertoli cells. cell viability significantly inhibited by time- dose-dependent manner. The number apoptotic dead cells increased after treatment. Caspase 3 activity prolonged exposure 200 μM 4-MC. upregulated mRNA level Bax gene considerably downregulated Bcl-2 expression...
In this article, a pen-type device that enables three-dimensional (3D) human-computer interaction is presented. This based on high-precision 3D ultrasonic (US) positioning method, which can achieve millimeter-level accurate and six degrees of freedom (6DoF) within working range 4 m × 1.5 m. The the electronic pen realized by highprecision time-of-flight (TOF) detection method dynamic thresholding zero-crossing as well multigroup coordinate averaging method. During process, correlation...
Artificial Intelligence (AI) technologies have been developed rapidly, and AI-based systems widely used in various application domains with opportunities challenges. However, little is known about the architecture decisions made development, which has a substantial impact on success sustainability of these systems. To this end, we conducted an empirical study by collecting analyzing data from Stack Overflow (SO) GitHub. More specifically, searched SO six sets keywords explored 32 projects...
The aerodynamic performance of vehicles on a bridge deck depends the local wind field, especially in region near tower. This study was carried out large‐scale (1: 20.4) truss girder, and tunnel tests were performed to determine how fields affected by tower presence different barriers. barrier parameters significantly affect field. Wind barriers should be sufficiently high provide wide protection range have relatively small porosities reduce speed. opening form also considered, where...
In this paper, we explore a new class of stochastic differential equations called anticipated generalized backward doubly (AGBDSDEs), which not only involve two symmetric integrals related to independent Brownian motions and an integral driven by continuous increasing process but also include generators depending on the terms solution (Y, Z). Firstly, prove existence uniqueness theorem for AGBDSDEs. Further, comparison theorems are obtained after finding GBDSDEs.
Abstract Due to the proliferation of contemporary computer-integrated systems and communication networks, there is more concern than ever regarding privacy, given potential for sensitive data exploitation. A recent cyber-security research trend focus on security principles develop foundations designing safety-critical systems. In this work, we investigated problem verifying current-state opacity in discrete event using labeled Petri nets. system opaque provided that estimate cannot be...
In this work, we propose a new modified Popov’s method by using inertial effect for solving pseudomonotone variational inequalities in real Hilbert spcaes, which does not require prior information about the Lipschitz constant of mapping, and only needs to compute value mapping once projection onto feasible set at each iterative step. We present weak convergence theorem proposed algorithm. Our results generalize some related literature primary numerical experiments demonstrate applicability scheme.
This work addresses the problem of quantifying opacity for discrete event systems. We consider a passive intruder who knows overall structure system but has limited observational capabilities and tries to infer secret this based on captured information flow. Researchers have developed various approaches quantify compensate lack precision qualitative in describing degree security system. Most existing works study specified probabilistic problems framework systems, where behaviors or states...
The plane-wave expansion method is used to calculate TE and TM mode band gaps for two-dimensional square lattice photonic crystal with hollow anisotropic tellurium (Te) rods under three different rotation operations. effect of on absolute gap investigated. calculated results show that the high order have a close relationship structure symmetry, symmetry distribution Te in x-y plane together influence gaps.
Abstract Since the emergence of COVID-19, many hospitals have encountered challenges in performing efficient scheduling and good resource management to ensure quality healthcare provided patients is not compromised. Operating room (OR) one issues that has gained our attention because it related workflow efficiency critical care hospitals. Automatic high predictive accuracy surgical case duration a role improving OR utilization. To estimate duration, rely on historic averages based specific...
Background: Despite the widespread use of automated security defect detection tools, software projects still contain many defects that could result in serious damage. Such tools are largely context-insensitive and may not cover all possible scenarios testing potential issues, which makes them susceptible to missing complex defects. Hence, thorough entails a synergistic cooperation between these human-intensive techniques, including code review. Code review is widely recognized as crucial...