- Video Surveillance and Tracking Methods
- Stock Market Forecasting Methods
- Market Dynamics and Volatility
- Visual Attention and Saliency Detection
- Diverse Aspects of Tourism Research
- Human Pose and Action Recognition
- Auction Theory and Applications
- Remote-Sensing Image Classification
- Advanced Image and Video Retrieval Techniques
- Advanced Vision and Imaging
- Grey System Theory Applications
- Advanced Neural Network Applications
- Color perception and design
- Digital Media and Visual Art
- Complex Network Analysis Techniques
- Game Theory and Applications
- Handwritten Text Recognition Techniques
- Advanced Algorithms and Applications
- Multimodal Machine Learning Applications
- Advanced Decision-Making Techniques
- Digital Media Forensic Detection
- Research, Science, and Academia
- Management Systems and Quality Improvement
- Advanced Text Analysis Techniques
- Diverse Interdisciplinary Research Innovations
Shenzhen Polytechnic
2024
Shaanxi University of Science and Technology
2022-2024
South China University of Technology
2008-2023
Peng Cheng Laboratory
2022-2023
China West Normal University
2011-2023
University of Electronic Science and Technology of China
2022
Virginia Tech
2018
University of Sheffield
2015
Shenyang Jianzhu University
2011
China National Pharmaceutical Group Corporation (China)
2010
Benefitting from insensitivity to light and high penetration of foggy environments, infrared cameras are widely used for sensing in nighttime traffic scenes. However, the low contrast lack chromaticity thermal (TIR) images hinder human interpretation portability high-level computer vision algorithms. Colorization translate a TIR image into daytime color (NTIR2DC) may be promising way facilitate scene perception. Despite recent impressive advances translation, semantic encoding entanglement...
Darknet markets are online services behind Tor where cybercriminals trade illegal goods and stolen datasets. In recent years, security analysts law enforcement start to investigate the darknet study cybercriminal networks predict future incidents. However, vendors in these often create multiple accounts (\em i.e., Sybils), making it challenging infer relationships between identify coordinated crimes. this paper, we present a novel approach link of same through photo analytics. The core idea...
Clothes changing is one of the challenges in person re-identification (ReID), since clothes provide remarkable and reliable information for decision, especially when resolution an image low. Variation significantly downgrades standard ReID models, dominates decisions. The performance existing methods considering still not satisfying, they fail to extract sufficient identity that excludes information. This study aims disentangle identity, clothes, unrelated features with a Generative...
Medical Visual Question Answering (Medical-VQA) aims to answer clinical questions regarding radiology images, assisting doctors with decision-making options. Nevertheless, current Medical-VQA models learn cross-modal representations through residing vision and texture encoders in dual separate spaces, which lead indirect semantic alignment. In this paper, we propose UnICLAM, a Unified Interpretable model Contrastive Representation Learning Adversarial Masking. Specifically, an aligned...
The scientific and rational assessment of the evolution node importance in rail transit line networks is important for sustainability transportation systems. Based on complex network theory, this study develops a weighted model using Space L method. It first considers topology, mutual influence neighboring nodes system, land use intensity station domain to construct comprehensive index evaluation system importance. then uses covariance-weighted principal component analysis algorithm more...
In order to improve solving support vector machine algorithm, an improved learning algorithm of the parallel SMO is proposed. According this master CPU averagely distributes primitive training set slave CPUs so that they can almost independently run serial on their respective set. As it adopts strategies buffer and shrink, speed increased, which showed in experiments based dataset MNIST. The indicate has good performance largescale SVM.
In recent years, the field of deep learning has flourished, not only breaking through many difficult problems that are to be solved by traditional algorithms but also bursting with greater vitality when combined other fields. For example, product emotional design based on can integrate users' needs into actual design. this paper, we aim use and affective technology in creation AR interactive picture books transform reading process from static dynamic, enrich visual stimulation, increase fun...
Visitor education plays a crucial role in the knowledge diffusion process outdoor recreation and nature-based tourism. It entails sharing information, experiences, insights with visitors to enhance their understanding appreciation of natural environment. Our methodology for investigating ecological civilization tourism destinations involves constructing network model. In this model, scenic spots, tourists, public are defined as nodes, communication channels between them representing edges...
Measuring the similarity of short text snippets plays an important role in information retrieval and natural language processing. for snippets, such as search queries, remains a challenging task. In this paper, we develop new measure, which can further improve accuracy semantic especially case insufficient content, Web page snippets. Then introduce our measure combined with entropy to clustering engine automatically find best numbers. Meanwhile, rank clusters method illustrate results.
Abstract STEM education is a hot issue in modern education, and it important to study whether middle school students enter careers the future early stage of career planning. In this paper, we collected students’ behavioral data through online tutoring platform ASSISTments, divided raw log into five types: single-valued, binary-valued, multi-valued, continuous-valued cumulative, aggregated them using different reconstruction methods. Then, width & depth prediction model based on feature...
With the wide application of business intelligence in corporate, demand for data mining software increases daily. To improve efficiency and quality reusing reduce period cost developing system, this paper proposes a new component library system mining. Through componentization algorithm, implements varied core algorithms form components. In way, are improved significantly to meet various demands.
Particle-based dynamic occupancy maps were proposed in recent years to model the obstacles environments. Current particle-based describe status discrete grid form and suffer from size problem, wherein a large is unfavorable for motion planning, while small lowers efficiency causes gaps inconsistencies. To tackle this paper generalizes map into continuous space builds an efficient 3D egocentric local map. A dual-structure subspace division paradigm, composed of voxel novel pyramid-like...
In the present world, some terrorist actions may even involve nuclear detonations. To reduce damages, national decision makers need a tool to rapidly predict fallout hazard from this article, two dissimilar mathematical models, SILAM and ALAMA, intended predictions were compared at in one real meteorological situation. Two improvised explosion yield scenarios prepared for calculations. The comparison results seem infer that "simple" models are as applicable more "advanced" ones emergency...
Salient object detection (SOD) has been well studied in recent years, especially using deep neural networks. However, SOD with RGB and RGB-D images is usually treated as two different tasks network structures that need to be designed specifically. In this paper, we proposed a unified efficient structure cross-attention context extraction (CRACE) module address both of efficiently. The CRACE receives appropriately fuses (for SOD) or three inputs. simple feature pyramid (FPN)-like modules...
Human pose estimation plays an important role in machine vision. 2D-based human has received more attention due to its low 2D space complexity. However, many algorithm networks detect key points different environments, and their key-points prediction accuracy will decline varying degrees. In order solve the problem of weak generalization keypoints detection environments. First all, this paper, based on small influence illumination MSR image rich detail information stored RGB image, proposes...
A novel ZrInO semiconductor material was investigated as an active channel for the oxide TFTs. The flexible TFT exhibited excellent electrical characteristics with a saturation mobility (μ <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">sat</sub> ) of 22.6 cm <sup xmlns:xlink="http://www.w3.org/1999/xlink">2</sup> V xmlns:xlink="http://www.w3.org/1999/xlink">–1</sup> s , on/off current ratio (INsub>on/...
Affected by the new crown epidemic, Jiangning District of Nanjing has encountered many problems in development its tourism industry over past three years, especially problem low quality development, which become more prominent under epidemic.From 2023, market is picking up, needs to face up own problems, base on stage, adhere concept, for people, tourism-driven, and promote high-quality with reform innovation as driving force.
Complying with the existing buffer operator of grey system theory axiom system, using relevant properties convex function, and combining strengthening operator, paper constructs a new class gives proof. It makes which is based on original application further extended.