- Knowledge Management and Sharing
- Innovation and Knowledge Management
- Intellectual Capital and Performance Analysis
- Innovation Policy and R&D
- Intellectual Property and Patents
- Entrepreneurship Studies and Influences
- Firm Innovation and Growth
- Evaluation and Optimization Models
- Collaboration in agile enterprises
- Plant tissue culture and regeneration
- Advanced MIMO Systems Optimization
- Plant Molecular Biology Research
- Fault Detection and Control Systems
- Scientific Innovation and Industrial Efficiency
- Opinion Dynamics and Social Influence
- Environmental Quality and Pollution
- Statistical and Computational Modeling
- China's Socioeconomic Reforms and Governance
- IoT and Edge/Fog Computing
- Multi-Criteria Decision Making
- Chinese history and philosophy
- Business Strategy and Innovation
- Complex Network Analysis Techniques
- Regional Economic and Spatial Analysis
- Traffic control and management
Central South University
2016-2024
Sichuan University
2015-2024
Shanghai Maritime University
2020-2024
Shandong University of Science and Technology
2023
University of Victoria
2021-2022
Shandong University
2005-2021
PLA Academy of Military Science
2016
Civil Aviation Flight University of China
2011
Hezhou University
2009
Peking University
2009
The marriage of cloud and software defined network (SDN) can work out the challenge which exist in typical platform such as private isolation user, flow control. But SDN based cloud, controller manages whole system is vulnerable to distributed-denial-of-service (DDoS) attack, causing paralysis entire network. It critical for be quick-speed, low false positive, high precise against attack detection. In this paper, we use extreme gradient boosting (XGBoost), detection method cloud. addition,...
Communication resource allocation is important for improving the performance of users in mobile edge computing (MEC) scenarios. In existing studies, MEC system typically suffer from unfair allocation, which results inefficient utilization and degraded user performance. To address this challenge, paper we propose a fair approach to maximize overall network throughput, under constraint each user's minimum transmission rate. We formulate problem as Nash bargaining game, existence uniqueness...
Purpose Collective reputation cognition is an enterprise's perception of the general rules evaluation, jointly formed by a network's collective members. It affects choice enterprises' innovation behavior and guides enterprises to occupy dominant position in network, thus achieving high performance. In this process, it inseparable from good network competence. This study attempts bring cognition, competence performance into same framework aims explore relationship among them determine...
Abstract Innovative ability plays a critical role in the sustainable development of universities. Although assessment universities' innovative is significant undertaking, it difficult work. This challenge can be addressed as typical multiple attribute decision making (MADM) problem, which attributes should considered with different levels importance. paper aims to propose an integrated MADM method solve this issue. To do so, we first introduce least square hesitant fuzzy linguistic term set...
Abstract Innovative search is a critical component of strategic decision making, and its different dimensions convey various levels risk. Prior research on the behavioural theory firm has focused motivation logic or capacity to predict effects performance feedback risk taking but paid limited attention their joint effects. To construct comprehensive framework in firm, we consider both analyse impact taking. We argue that underperformance positively affects innovative scope overperformance...
Purpose This study aims to examine how the knowledge breadth and depth of a patent affect its likelihood being pledged. It also seeks explore whether these relationships change diversely in different technological environments. Design/methodology/approach A complementary log-log model with random effects was conducted test hypotheses using unique data set consisting 348,927 invention patents granted by China National Intellectual Property Administration from 1985 2015 belonging 74,996 firms....
At present, there are more and frauds in the financial field. The detection prevention of great significance for regulating maintaining a reasonable order. Deep learning algorithms widely used because their high recognition rate, good robustness, strong implementation. Therefore, context e-commerce big data, this paper proposes quantitative algorithm fraud based on deep learning. First, encoders to extract features behaviour. same time, order reduce computational complexity, feature...
This article examines how startups obtain loan financing through pledged patents as the startup's age increases. By using a panel dataset containing 31,083 Chinese and 88,264 of invention from 2006 to 2015, we test verify an inverted U-shaped relationship between their patent pledges, there is optimal for collateral financing. Younger do not find it easy pledge financing, while older rely on this channel. We further that firm innovation capabilities experience can optimize likelihood...
The health stage division problem has been attracting interest for its potential role in Prognostics and Health Management (PHM). In traditional division, multiple indicators (HIs) are extracted from original data, then one suitable HI is constructed. According to the trend of HI, whole degradation process divided into different stages based on change points. points transition between stages. But difficult construct just special applications. Therefore how consider HIs simultaneously a big...
Supplier selection is a critical multi-criteria decision making problem for supply chain management. With the emergence of big data, there an urgent need data-driven methods. A hybrid DEA-Adaboost model proposed to meet challenge. The split into DEA and learner. fuzzy multi-objective used build expert database, which contains appropriate inappropriate suppliers. learner trained by Adaboost from database. Thus, derived are combined as reduce time consumption computational complexities...
Analyzing clustering results may lead to the privacy disclosure issue in big data mining. In this paper, we put forward a differential privacy-based protecting preprocessing method for distance-based clustering. Firstly, distortion technique is used prevent distances from disclosing relationships. Differential affect while privacy. Then an adaptive budget parameter adjustment mechanism applied keeping balance between protection and results. By solving maximum minimum problems, can be...