- Rough Sets and Fuzzy Logic
- Complex Network Analysis Techniques
- Data Mining Algorithms and Applications
- Advanced Graph Neural Networks
- Anomaly Detection Techniques and Applications
- Single-cell and spatial transcriptomics
- IoT and Edge/Fog Computing
- Data-Driven Disease Surveillance
- Cloud Computing and Resource Management
- Crystallization and Solubility Studies
- Misinformation and Its Impacts
- Data Management and Algorithms
- Cancer Genomics and Diagnostics
- Service-Oriented Architecture and Web Services
- Opinion Dynamics and Social Influence
- Planetary Science and Exploration
- Network Security and Intrusion Detection
- Topic Modeling
- Wireless Signal Modulation Classification
- Recommender Systems and Techniques
- Spectroscopy and Chemometric Analyses
- Sparse and Compressive Sensing Techniques
- Text and Document Classification Technologies
- Digital Media Forensic Detection
- Image and Video Quality Assessment
Beijing Institute of Technology
2024-2025
CRRC (China)
2024
Second Hospital of Shanxi Medical University
2024
Shanxi Medical University
2024
State Key Laboratory of Digital Medical Engineering
2021-2024
University of International Business and Economics
2024
Asia University
2024
China University of Petroleum, Beijing
2023-2024
Soonchunhyang University
2021-2023
Chongqing University of Posts and Telecommunications
2023
This research paper proposes an intrusion detection system that combines particle swarm optimization and AdaBoost algorithms to classify detect malware-related records in innovative health app platforms. The employs the NSL KDD dataset, consisting of 125,973 instances 41 features, with data split into training (20%) testing (80%) sets. A feature selection process using Particle Swarm Optimization identifies 12 relevant features for detection. effectively categorizes various attack types,...
Verbasoside and hydroxysalidroside are derivatives of phenylethanol glycosides (PhGs) that exhibit a range pharmacological activities also serve as valuable precursors for synthesizing other more complex PhGs. However, chemical synthesis plant extraction large-scale production impractical to date. Here, 79 fungi from four types PhG-containing plants their rhizospheric soils were screened out, endophyte Alternaria botrytis RYF1 Rehmannia glutinosa was identified with the ability generate...
The booming of Social Internet Things (SIoT) has witnessed the significance graph mining and analysis for social network management. Online Networks (OSNs) can be efficiently managed by monitoring users' behaviors within a cohesive group represented maximal clique. They further provide valued intelligence their users. Maximal Cliques Problem (MCP) as fundamental problem in is to identify cliques graph. Existing studies on MCP mainly focus static graphs, with less attention detection dynamic...
Cohesive subgraph mining on attributed social networks is attracting much attention in the realm of graph and analysis. Most existing studies cohesive over neglect fairness attributes, which lead to difficulties deploying responsible applications. Toward this end, article formulates a new problem by introducing into cliques model mine absolute fair from networks. Specifically, adopts formal concept analysis (FCA) methodology represent given network, extracts set special equiconcepts further...
For online monitoring of crystal population growth quality during the L-glutamic acid crystallization process, an efficient image analysis method is proposed to detect rate in real time, based on a non-invasive imaging system. A trained weights network model established for real-time in-situ captured images, by using deep-learning segmentation algorithm named Mask R-CNN (Regional Convolutional Neural Network), which capable accurate and classification crystals blurred images....
An in situ measurement method is proposed for monitoring three-dimensional (3D) crystal size distribution (CSD) during a crystallization process, based on binocular microvision system. The stereo particle shape reconstructed from double-view images captured by two microscopic cameras fixed at different angles outside the crystallizer. To overcome influence solution turbulence and uneven illumination background involved with imaging, image analysis established to identify key corners of each...
A flood of information has occurred with the rise internet and digital devices in fourth industrial revolution era.Every millisecond, massive amounts structured unstructured data are generated; smartphones, wearable devices, sensors, self-driving cars just a few examples that currently generate our daily.Machine learning been considered an approach to support recognize patterns many areas provide convenient way other sectors, including healthcare sector, government banks, military...
Abstract Allophane, a common component on Earth and probable constituent of the amorphous Mars, is closely associated with Fe in form structural and/or iron (oxyhydr)oxide coatings. However, until now, formation evolution allophane as products environmental concentrations have rarely been studied. We investigated precipitation from gels different Fe/(Fe + Al) molar ratios ( n , 0 ≤ 1.0). X‐ray diffraction patterns Fourier transform infrared spectra showed that was nearly only product at 0.2...
RF fingerprint recognition is an emerging technology for identifying specific hardware features of wireless transmitters. In order to solve the problem illegal transmitter hazardous communication security, this paper proposes a method generating methods based on generative adversarial net (GAN).This article first uses I / Q data through wavelet transform pre-processing , Since can describe different frequency signals, characteristics radio be highlighted after data. Then we have designed...
Single-cell whole-genome sequencing is a powerful tool for uncovering mutations in individual cells. In recent times, the generation of vast amounts data has significantly advanced our understanding key biological processes, including cell development and tumor progression. This rapid accumulation underscores urgent need comprehensive resource platform to manage utilize this information effectively. To address need, we introduce HSCGD, first open-access database dedicated collection,...
Abstract The three-dimensional animation developed by virtual reality technology has been widely concerned. Although the changed traditional production mode to a great extent, existing is still not perfect, which needs be further compensated artificial intelligence technology, and domestic research on this aspect less. Therefore, paper establishes application of in aided production. This investigates popularity course major colleges universities, thinks that interdisciplinary education...
Knowledge graph describes entities by numerous RDF data (subject-predicate-object triples), which has been widely applied in various fields, such as artificial intelligence, Semantic Web, entity summarization. With time elapses, the continuously increasing descriptions of lead to information overload and further cause people confused. this backdrop, automatic summarization received much attention recent years, aiming select most concise typical facts that depict an brief from lengthy data....
Multi-cloud composed by multiple clouds environment can take advantages of cloud computing which is becoming increasingly popular among new scientific and technological undertakings. The requested services users could often be distributed across some providers hosted several clouds. multi-cloud composition problem requires scalable approaches to efficiently perform searching reduce the energy consumption monetary cost for fulfilling user's request. In this paper, we present a sustainable...
The variational method, which is a popular approach for image denoising, aims to estimate the original from noisy or corrupted image. To consider constraints of pixel values fully, our study investigates constrained second-order total generalized (TGV) model, includes non-negative and bounded as special case. By adopting an equivalent definition TGV, we transform proposed minimization problem into sum two convex functions, where one composed linear transformation. Subsequently, employ...
A third place (public social space) has been proven to be a gathering for communities of friends on networks (social media). The regulars at places worship, cafes, parks, and entertainment can also possibly with those who follow each other media, non-regulars being network one the regulars. Therefore, detecting analyzing user-friendly provide references layout construction urban public spaces. In this article, we focus proposing method signed mining γ-Quasi-Cliques closely related users...
In the real world, spread of various epidemics can be modelled using SEIR disease transmission model. Early detection and prevention susceptible individuals is an effective method controlling infectious viruses. This paper presents a study that detects community on hospital contact network, which encompasses patients, nurses, doctors managers. The goal our work to identify communities with patients healthcare workers, analyse independent networks roles determine high-influence nodes within...
The explosive information growth facilitates the generation of increasingly massive streaming data. As a traditional soft computing approach for data analysis, Formal Concept Analysis (FCA) has severe problem low efficiency and long time coping with Therefore, devising an optimized algorithm FCA attribute-incremental is becoming very urgent challenging issue. In this paper, quick on generating concept lattice presented. Specifically, correctness proposed mathematically proved, several...
Epidemics usually spread widely and can cause a great deal of loss to humans. In the real world, vaccination is principal method for suppressing infectious diseases. The Susceptible-Infected-Susceptible (SIS) model suggests that voluntary may affect an epidemic. Most studies date have argued infection rates nodes in SIS are not heterogeneous. However, reality, there exist differences neighbor network structure number contacts, which diseases society. As consequence, it be reasonably assumed...