- Advanced Multi-Objective Optimization Algorithms
- Probabilistic and Robust Engineering Design
- Higher Education and Teaching Methods
- Natural Language Processing Techniques
- Reliability and Maintenance Optimization
- Topic Modeling
- Advanced Computational Techniques and Applications
- Optimal Experimental Design Methods
- Rough Sets and Fuzzy Logic
- Advanced Control Systems Optimization
- Educational Technology and Assessment
- Advanced Statistical Process Monitoring
- Education and Work Dynamics
- Scientific Computing and Data Management
- Simulation Techniques and Applications
- Advanced Radiotherapy Techniques
- Cognitive Computing and Networks
- Multimodal Machine Learning Applications
- Data Mining Algorithms and Applications
- Anomaly Detection Techniques and Applications
- Wind and Air Flow Studies
- Lung Cancer Diagnosis and Treatment
- Technology and Security Systems
- Domain Adaptation and Few-Shot Learning
- Robotics and Sensor-Based Localization
Huazhong University of Science and Technology
2014-2025
Lanzhou University of Technology
2024
Institute of Modern Physics
2024
Chinese Academy of Sciences
2023-2024
Zhongshan Hospital
2014-2024
Fudan University
2019-2024
Arizona State University
2024
Chinese Academy of Medical Sciences & Peking Union Medical College
2023-2024
Tianjin University
2023-2024
Dalian Medical University
2023-2024
Recently, many works have tried to augment the performance of Chinese named entity recognition (NER) using word lexicons. As a representative, Lattice-LSTM has achieved new benchmark results on several public NER datasets. However, complex model architecture. This limits its application in industrial areas where real-time responses are needed. In this work, we propose simple but effective method for incorporating lexicon into character representations. avoids designing complicated sequence...
Text semantic matching is a fundamental task that has been widely used in various scenarios, such as community question answering, information retrieval, and recommendation. Most state-of-the-art models, e.g., BERT, directly perform text comparison by processing each word uniformly. However, query sentence generally comprises content calls for different levels of granularity. Specifically, keywords represent factual action, entity, event should be strictly matched, while intents convey...
This work aims to improve the reliability of dynamic systems by eliminating effect random control variables. At first, reliability-based optimization problem (RB-DOP) is introduced and defined account for with uncertainty associated Whereafter, in order solve RB-DOP efficiently, constraint function response shift scalar (CFRSS)-based method proposed, which nested decoupled into an equivalent deterministic DOP a CFRSS search problem, two problems are addressed iteratively until law converges....
We propose a model of preferences in which the effect randomization on ambiguity depends how unknown probability law is determined. adopt framework Anscombe and Aumann (1963) relax axioms. In resulting representation individual's preference, individual has collection sets priors <math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"> <mi mathvariant="script">M</mi> </math>. She believes that before she moves, nature chosen an scenario (a set priors) from </math>, scenario, will...
Abstract High-dimensional model representation (HDMR), decomposing the high-dimensional problem into summands of different order component terms, has been widely researched to work out dilemma “curse-of-dimensionality” when using surrogate techniques approximate problems in engineering design. However, available one-metamodel-based HDMRs usually encounter predicament prediction uncertainty, while current multi-metamodels-based cannot provide simple explicit expressions for black-box...
Abstract Purpose This study aimed to investigate the ability of Al 18 F-NOTA-FAPI PET/CT diagnose pancreatic carcinoma and tumor-associated inflammation with comparison F-FDG PET/CT. Methods Prospective analysis scans 31 patients from 05/2021 05/2022 were analyzed. imaging was performed in who had Ce-CT FDG diagnosis still unclear. Follow-up histopathology or radiographic examination confirmed findings. Radiotracer uptake, diagnostic performance, TNM (tumor-node-metastasis) classifications...
Malaria remains a severe life-threatening disease caused by plasmodium parasites. Microscopy is widely used for malaria diagnosis. However, it relies heavily on the skills and experience of inspectors. Due to low-level medical services lack skilled inspectors, misdiagnoses are frequently made in some areas.In recent years, many successful applications CNN models have been reported. Unlike images ImageNet, image only has tiny defect area with large amount information. In addition, dataset...
Aiming to address the issue of 'curse dimensionality' encountered in approximating high-dimensional problems using surrogate-based methods, model representation (HDMR), decomposing problem into summands different-order component functions, has been widely studied. To reduce computational demands current HDMR metamodelling techniques, an improved framework (iHDMR) is presented, taking full advantage relationships between first-order and second-order functions Cut-HDMR theory. then, a novel...
Abstract When solving the black-box dynamic optimization problem (BDOP) in sophisticated system, finite difference technique requires significant computational efforts on numerous expensive system simulations to provide approximate numerical Jacobian information for gradient-based optimizer. To save budget, this work introduces a BDOP framework based right-hand side (RHS) function surrogate model (RHSFSM), which RHS derivative functions of state equation are approximated by models, and is...
Intrusion response is a critical part of security protection. Compared with IT systems, industrial automation systems (IASs) have greater timeliness and availability demands. Real-time policy enforcement intrusion challenge facing for IASs. Inappropriate the can influence normal operation control system, loss caused by this may even exceed that cyberattacks. However, existing research about focuses on decisions ignores execution. This paper proposes general, real-time approach based...
In order to overcome the drawbacks of expensive function evaluation in practical reliability-based design optimization (RBDO) problem, researchers have proposed black box-based RBDO method. The algorithm flow commonly employed method for box problem consists outer construction loop surrogate model constraint and inner model-based solving loop. To improve ability this paper proposes a transformation-based improved kriging increase effectiveness two loops identified above. For loop, sample...
The open-sourcing of large language models (LLMs) accelerates application development, innovation, and scientific progress. This includes both base models, which are pre-trained on extensive datasets without alignment, aligned deliberately designed to align with ethical standards human values. Contrary the prevalent assumption that inherent instruction-following limitations LLMs serve as a safeguard against misuse, our investigation exposes critical oversight in this belief. By deploying...