- Advanced Image and Video Retrieval Techniques
- Image Retrieval and Classification Techniques
- Advanced Malware Detection Techniques
- Multimodal Machine Learning Applications
- Job Satisfaction and Organizational Behavior
- Advanced Neural Network Applications
- Advanced Computational Techniques and Applications
- Blockchain Technology Applications and Security
- Cloud Computing and Resource Management
- Service-Oriented Architecture and Web Services
- Security and Verification in Computing
- Caching and Content Delivery
- Robotics and Sensor-Based Localization
- Web Data Mining and Analysis
- Domain Adaptation and Few-Shot Learning
- Video Analysis and Summarization
- Text and Document Classification Technologies
- Employee Performance and Management
- Model-Driven Software Engineering Techniques
- Hydrocarbon exploration and reservoir analysis
- EFL/ESL Teaching and Learning
- Advanced Data Storage Technologies
- Magnetic Field Sensors Techniques
- Image and Object Detection Techniques
- Workplace Health and Well-being
Henan University Huaihe Hospital and Huaihe Clinical Institute
2022-2025
Central South University
2025
King Abdullah University of Science and Technology
2024
Institute of Information Engineering
2023
Chinese Academy of Sciences
2023
Baidu (China)
2022
Shanxi Normal University
2022
Taizhou Vocational and Technical College
2022
Tencent (China)
2017-2019
Microsoft (United States)
2012-2018
In existing visual representation learning tasks, deep convolutional neural networks (CNNs) are often trained on images annotated with single tag, such as ImageNet. However, tag annotation cannot describe all important contents of one image, and some useful information may be wasted during training. this work, we propose to train CNNs from multiple tags, enhance the quality CNN model. To end, build a large-scale multi-label image database 18M 11K categories, dubbed <italic...
This investigation delves into the ambidextrous impacts that shared leadership imparts on resilience of employees through incorporation Job Demands-Resources framework to delineate underlying mechanisms. Furthermore, it explores organizational boundary factors enhance employees' resilience, so as explore ways improve resilience. research chose use an online questionnaire at two time points with a analysis 246 valid questionnaires. Surveys were disseminated electronically esteemed third-party...
This study aimed to investigate the impact of work environment, emotional intelligence, and empathy fatigue on nurse presenteeism examine mediating roles intelligence fatigue. employed a cross-sectional research design conducted questionnaire survey from April July 2024 among 1,375 nurses (aged 18–24, 25–34, 35–44, ≥ 45 years) six tertiary hospitals in Henan Province. The included demographic characteristics, Nursing Practice Environment Scale, Emotional Intelligence Empathy Fatigue Stanford...
Undergraduate nursing students' interpersonal skills are closely related to their clinical competence, yet research on the effects of sensitivity and its mediating mechanisms is not found. To investigate undergraduate role self-efficacy subjective well-being. This study was a cross-sectional design conducted in Henan Province, China, from March April 2024, using convenience sampling method, questionnaires Interpersonal Competence Questionnaire, Sensitivity Scale, General Self-Efficacy Index...
Background Presenteeism is defined as the behavior of people who insist on attending work despite complaints ill health that should prompt rest and absence from work. Due to heavy workloads irreplaceable duties nursing service, nurses are a typical representative group suffering presenteeism. Although more scholars have recently begun focusing presenteeism, an abundant number studies tended focus presenteeism's external objective factors. There is, thus, lack based variables related...
Pore-network models have become a critical tool in the study of fluid flow geo-energy researches over last few decades, and accuracy pore-network modeling results highly depends on extraction pore networks. Traditional methods are based pixels require images with high quality. Here, pixel-free method called flashlight search medial axis algorithm is proposed for continuous space. The domain two-dimensional space line, whereas surface searched three-dimensional scenario. Thus, follows...
Edge detection is a fundamental technique in various computer vision tasks. Edges are indeed effectively delineated by pixel discontinuity and can offer reliable structural information even textureless areas. State-of-the-art heavily relies on pixel-wise annotations, which labor-intensive subject to inconsistencies when acquired manually. In this work, we propose novel self-supervised approach for edge that employs multi-level, multi-homography transfer annotations from synthetic real-world...
Fuel cells are a promising power source for future data centers, offering high energy efficiency, low greenhouse gas emissions, and reliability. However, due to mechanical limitations related fuel delivery, slow adjust sudden increases in center demands, which can result temporary shortfalls. To mitigate the impact of shortfalls, prior work has proposed either perform capping by throttling servers, or leverage storage devices (ESDs) that temporarily provide enough make up shortfall while...
Hyperautomation is a true digital transformation using advanced techniques and automates complicated business processes. Blockchain-based networks have hyper-automation turbo-boost power as they create tamper-proof, real-time data exchange networks. The study aims to examine the impact of blockchain on performance Chinese electronics manufacturers through green supply chain circular economy in environment. Respondents (n = 376) present were made up employees from 300 China-based companies....
UDDI registration center provides a set of management mechanism for Web services providers to publish their service and consumers inquire what they needs. It solves the problem description, discovery Integration. graph is semantic index established on according logical relations between web [1,2]. can enhance efficiency. jUDDI an open source Java implementation specification Services. Based research graph, this article takes as example show how traditional registry be extended so supporting graph.
Unauthorized code modification based on reverse engineering is a serious threat for software industry. Virtual machine obfuscation emerging as powerful technique protection. However, the current protection are vulnerable under semantic attacks which use dynamic profiling to transform an obfuscated program construct simpler that functionally equivalent but easier analyze. This paper presents DSA-VMP, novel VM-based technique, address issue of attacks. Our design goal exploit data flows...
Increasingly sophisticated code obfuscation techniques are quickly adopted by malware developers to escape from detection and thwart the reverse engineering effort of security analysts. State-of-the-art de-obfuscation approaches rely on dynamic analysis, but face challenge low coverage as not all software execution paths behavior will be exposed at specific profiling runs. As a result, these often fail discover hidden malicious patterns. This paper introduces SEEAD, novel generic...
Image matching is at the base of many computer vision problems, such as object recognition or image stitching. Standard SIFT provides poor performance when images under viewpoint change conditions and with similar corners. Hence, we propose a algorithm combine regional SSDA simplified algorithm. We demonstrate through experiments that our yields better in feature points. Besides, cut down about half time was originally needed tested images.
With the evolution of disease patterns and continuous pursuit persons for high-quality nursing services, new nurses are reserve talents team shoulder a major mission. However, due to their low work performance high turnover rate, this is not conducive stable development teams, it urgent solve problem. The purpose study was explore effect readiness on nurses, focusing mediating role organizational justice professional identity.
For feature point detection with variable scale, rotation, illumination and 3D view port, a tracking method combining scale invariant transform (SIFT) KLT (Kanade-Lucas-Tomasi) is proposed in this paper. SIFT improved it used to detect points of image, then track the continuously. In order verify feasibility method, simulation experiments are carried out real scene image sequences different complexity using better results obtained more stable than conventional method.
General detectors follow the pipeline that feature maps extracted from ConvNets are shared between classification and regression tasks. However, there exists obvious conflicting requirements in multi-orientation object detection is insensitive to orientations, while quite sensitive. To address this issue, we provide an Encoder-Decoder architecture, called Rotated Feature Network (RFN), which produces rotation-sensitive (RS) for rotation-invariant (RI) classification. Specifically, Encoder...
Along with the surging service demands in cloud, power provision infrastructure of Internet Data Centers (IDCs) has brought dramatically increasing capital cost. To enlarge size IDCs lowest cost, management computing facilities attracted many attentions recent. A large portion applications running on data centers are data-intensive and throughput-preferredMapReduce is one them enjoying widely deployment. However critical peak problem MapReduce clusters, which actually limits cluster's size,...
Situation awareness is a kind of the third generation information security technology, which aims to provide global views cyberspace for administrators.A framework cyber situation based on data mining proposed in this paper.The can be viewed from two perspectives, one flow, presents abstracting data, and other logic view, procedure awareness.The framework's core component correlation state machine, an extension machine.The machine structure achieving awareness, created technology...