Yue Shen

ORCID: 0009-0007-7638-3457
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • High Entropy Alloys Studies
  • Handwritten Text Recognition Techniques
  • Image Enhancement Techniques
  • High-Temperature Coating Behaviors
  • Data Management and Algorithms
  • Image and Signal Denoising Methods
  • Natural Language Processing Techniques
  • Advanced Image Processing Techniques
  • Evaluation Methods in Various Fields
  • Petri Nets in System Modeling
  • Image Processing Techniques and Applications
  • Advanced Decision-Making Techniques
  • Robot Manipulation and Learning
  • Internet Traffic Analysis and Secure E-voting
  • Semiconductor materials and devices
  • Metal and Thin Film Mechanics
  • Advanced Image Fusion Techniques
  • Network Packet Processing and Optimization
  • Machine Learning in Healthcare
  • Data Mining Algorithms and Applications
  • Access Control and Trust
  • Artificial Intelligence in Healthcare and Education
  • Research Data Management Practices
  • Advanced Materials Characterization Techniques
  • Robotic Mechanisms and Dynamics

Northeastern University
2025

Dalian Minzu University
2023-2024

North China Electric Power University
2010-2024

Commercial Aircraft Corporation of China (China)
2020

Ocean University of China
2020

Beijing Wuzi University
2015

Hunan Agricultural University
2006

National Cheng Kung University
2004

Abstract High entropy alloys (HEAs) with entropy‐driven stabilization are attractive in potassium‐ion batteries (PIBs); however, they suffer from phase segregation due to the disparity of versatile components. Confining multifarious metals into same lattice using ligands full‐coordination abilities allows for delicate control at nanoscale level and thus decreases atom diffusion. This chemical synthesis can suppress realize HEAs PIB anodes. Herein, a new MnCoNiCuZn‐based HEA nanoparticle...

10.1002/adfm.202422218 article EN Advanced Functional Materials 2025-02-07

Uyghur text recognition faces several challenges in the field due to scarcity of publicly available datasets and intricate nature script characterized by strong ligatures unique attributes. In this study, we propose a unified three-stage model for language recognition. The is developed using self-constructed dataset, enabling evaluation previous modules as well exploration novel module combinations previously unapplied recognition, including Convolutional Recurrent Neural Networks (CRNNs),...

10.3390/app13179539 article EN cc-by Applied Sciences 2023-08-23

In order to study the effect of iron content on pitting corrosion behavior a Ni-Cr-Mo alloy coating in simulated seawater environment, Ni-Cr-Mo-xFe (x = 0, 5, 10, 15, 20, 25) was prepared through laser cladding technology. These coatings primarily consist γ-Ni solid solution phase, with observable segregation interdendritic regions when reaches 25 wt%. After 42 days salt spray corrosion, it found that began appear surface increased 10 The results electrochemical revealed contents range 10–25...

10.3390/coatings14040459 article EN Coatings 2024-04-10

This paper presents a new fuzzy cover-based clustering algorithm. In the proposed algorithm, concept of cover and objective function are employed to identify holding points in dataset, we associate these together build up backbones final clusters. Three specific objectives underlie presentation approach this paper. The first is describe mathematical formulation covers, second summarize detailed procedure constructing covers splicing them into third goal demonstrate that able find out...

10.1109/tfuzz.2004.825076 article EN IEEE Transactions on Fuzzy Systems 2004-04-01

Recently, large language model (LLM) based artificial intelligence (AI) systems have demonstrated remarkable capabilities in natural understanding and generation. However, these models face a significant challenge when it comes to sensitive applications, such as reasoning over medical knowledge answering questions physician-like manner. Prior studies attempted overcome this by increasing the size (>100B) learn more general knowledge, while there is still room for improvement LLMs with...

10.48550/arxiv.2312.01040 preprint EN other-oa arXiv (Cornell University) 2023-01-01

Rain is a common weather phenomenon, and the challenge of removing rain streaks from single image crucial due to its detrimental impact on quality extraction valuable background information. Existing methods commonly rely specific assumptions regarding models, which restricts their ability accommodate wide range real-world scenarios. To overcome this limitation, these often require complex optimization techniques or stepwise refinement strategies. In paper, we propose novel rectangular...

10.1038/s41598-024-70329-2 article EN cc-by-nc-nd Scientific Reports 2024-08-21

We would like industrial robots to handle unstructured environments with cameras and perception pipelines. In contrast traditional that replay offline-crafted trajectories, online behavior planning is required for these perception-guided applications. Aside from algorithms, deploying manipulators also requires substantial effort in integration. One approach writing scripts a language (such as Python) construct the problem perform integration other algorithmic modules & external devices....

10.48550/arxiv.2409.03439 preprint EN arXiv (Cornell University) 2024-09-05

Combining with the actual situation of project management for Fengcheng Power Plant Phase II Expansion Project in Jiangxi Province, this paper used Logical Framework Approach partial evaluation management, and Fuzzy Comprehensive Evaluation Method comprehensive management. In process evaluation, indicator systems post-evaluation was established, which according to objectives investment, quality, progress, safety environmental. The five laid foundation evaluation. results can measure overall...

10.1109/icee.2010.624 article EN International Conference on E-Business and E-Government 2010-05-01

Warehousing is an indispensable link in logistics. It's very necessary to monitor and manage warehousing synthetically for the developing so far. According characters of warehousing, we propose concept, architecture function integrated supervisory control system (W-ISCS) based on research application various industries. This paper firstly analyzes current status then designs architecture, hierarchy system. At last, introduces subsystems access modes subsystems.

10.1109/icsess.2015.7339191 article EN 2015-09-01

In this study, Ni-Cr-Mo-xFe alloy coatings (x = 0, 5, 10, 15, 20, 25 wt%) were fabricated using laser cladding technology. These primarily consist of γ-Ni solid solution phase, with a noticeable segregation Fe occurring when iron content reaches wt%. Within the range 10-25 wt%, accumulation in outer layer passive film leads to an excess cationic vacancies. Consequently, stability is reduced, leading occurrence pitting corrosion within coating.

10.2139/ssrn.4571108 preprint EN 2023-01-01

Aiming at the problems of difficult Uyghur feature extraction, easy missed detection targets and low efficiency, a text method based on CenterNet is proposed. Firstly, lightweight EfficientNetV2-S used as backbone network to reduce parameters improve ability extract features. Then, SE module in replaced by ECA operation speed network. In addition, according characteristics diversity target size, deconvolution removed, pyramid features introduced enhance adaptability model with different...

10.1109/icicml60161.2023.10424844 article EN 2022 International Conference on Image Processing, Computer Vision and Machine Learning (ICICML) 2023-11-03

A series of recent works based on convolutional neural networks have successfully captured raindrops. However, the specific difficulties recovery still exist. The task removing rain streaks from images requires an effective balance between various image details and contextual correlations information. This article proposes a multi-stage restoration network CKL-Net single to effectively restore initial background texture in rainstreaked images. Unlike traditional models for some encoder...

10.1109/iaecst60924.2023.10502499 article EN 2023-12-08

Since the method of using username and password traditional access-control list mechanism can no more keep up with further development e-government, we realized a distributed-access-control model to settle this problem. This divides security management into two levels: First is global level which responsible for harmonizing controlling all control objects e-government network; Second local in charge departments or inside project group. By recompiling kernel FreeBSD 5.0 version RC2, have...

10.1109/chicc.2006.280717 article EN Chinese Control Conference 2006-08-01

With the deeply research on intrusion detection techniques and widely use of products, study evaluation systems became important. In paper, relative works was introduced. The primary aspects in an were discussed. An system for proposed. system, a supervisor module controls whole system. schedules traffic control attack emulation module. data environment are recorded input to functions such as network host usage, attacks report generation implemented.

10.1109/chicc.2006.4346917 article EN Chinese Control Conference 2006-07-01

The civil aviation management department reviews airworthiness certification for aircraft products to ensure the of products. complexity and characteristics work determine that requires reviewer need have rich knowledge experience in domain. If these knowledges can be reused, it will effectively improve capability. Airworthiness compliance activities are core reuse. Therefore, order solve problem accuracy reuse activities, based on existing activity ontology model, this paper further refines...

10.1109/dsa51864.2020.00077 article EN 2021 8th International Conference on Dependable Systems and Their Applications (DSA) 2020-11-01
Coming Soon ...