- Artificial Immune Systems Applications
- Influenza Virus Research Studies
- Anomaly Detection Techniques and Applications
- Advanced Neural Network Applications
- Network Security and Intrusion Detection
- Industrial Vision Systems and Defect Detection
- Image Processing Techniques and Applications
- Video Surveillance and Tracking Methods
- Domain Adaptation and Few-Shot Learning
- Advanced Image and Video Retrieval Techniques
- vaccines and immunoinformatics approaches
- Immunotherapy and Immune Responses
- Advanced Malware Detection Techniques
- Mathematical and Theoretical Epidemiology and Ecology Models
- Face and Expression Recognition
- Software Testing and Debugging Techniques
- Image Retrieval and Classification Techniques
- Face recognition and analysis
- Machine Learning and Data Classification
- Radiomics and Machine Learning in Medical Imaging
- Software System Performance and Reliability
- Parallel Computing and Optimization Techniques
- T-cell and B-cell Immunology
- Time Series Analysis and Forecasting
- Advanced Vision and Imaging
Shenzhen Polytechnic
2025
Institute of Microelectronics
2024
Chinese Academy of Sciences
2018-2024
University of Chinese Academy of Sciences
2024
Southwest Minzu University
2024
Northwest Normal University
2024
Sichuan Agricultural University
2024
Ministry of Agriculture and Rural Affairs
2024
Donghua University
2010-2023
Hohai University
2021
While introducing new technology has completely transformed the textile production process, rapid pace of massive industrialization increased volume wastewater, which is highly hazardous. Even though industry essential to our economy, harmful environment because solid wastes, air pollutants, noise, etc. Recycling wastewater crucial, and oxidation, physical, biological, physicochemical methods can be used treat wastewater. Based on statistics visualization tools, bibliometric analysis evolved...
Generally, comprehensive documents are needed to provide the research community with relevant details of any direction. This study conducted first descriptive bibliometric analysis examine most influential journals, institutions, and countries in field artificial intelligence textiles. Furthermore, mapping was also used diverse topics VOSviewer process 996 articles retrieved from Web Science-Core Collection 2007 2020. The results show that China United States have largest number...
Scientists worldwide are always interested in making new discoveries; thus, the scientific literature has been growing exponentially. Keeping abreast of body at a rapidly advancing pace poses significant challenges to active researchers and society. Although numerous data resources have made openly available, effectively navigating vast amount information with heightened levels uncertainty remains bottleneck. Here, we searched analyzed regarding antibacterial treatments textile industry. The...
Abstract This article presents a triple‐valued gravitational search algorithm (TGSA) to tackle the graph planarization problem (GPP). GPP is one of most important tasks in theory, and has proved be an NP‐hard problem. To solve it, TGSA uses encoding scheme models space into triangular hypercube quantitatively based on well‐known single‐row routing representation method. The agents TGSA, whose interactions are driven by gravity law, move toward global optimal position gradually. updating rule...
In order to rapidly breed high-quality varieties, an increasing number of plant researchers have identified the functions a large genes, but there is serious lack research on plants’ phenotypic traits. This severely hampers breeding process and exacerbates dual challenges scarce resources resource development utilization. Currently, crop phenotyping has gradually transitioned from traditional methods HTP technologies, highlighting high regard scientists for these technologies. It well known...
Real-time non-intrusive monitoring of wind turbines, blades, and defect surfaces poses a set complex challenges related to accuracy, safety, cost, computational efficiency. This work introduces an enhanced deep learning-based framework for real-time detection turbine blade defects. The WindDefNet is introduced, which features the Inception-ResNet modules, Visual Transformer (ViT), multi-scale attention mechanisms. utilizes modified cross-convolutional blocks, including powerful hybrid,...
The aim of this paper is to provide a simple MATLAB-based model determine the real-time homogeneity neppy mélange yarn fabrics.Currently, industry relies solely on visual assessment and experience.This algorithm, however, proposes solution for industry.The designed algorithm presented in paper, which based kernel density function macropixel analysis, was implemented nep detection yarns calculated an inhomogeneity neps around 91%.This strategy would be useful can also used other types fashion yarns.
It is known that both excitatory and inhibitory neuronal networks can achieve robust synchronization only under certain conditions, such as long synaptic delay or low level of heterogeneity. In this work, be found in an excitatory/inhibitory (E/I) network with medium high heterogeneity, which often occurs real networks. Two effects post-synaptic potentials (PSP) to are presented, the contribution neurons E/I investigated. may contribute networks, especially PSP has a more positive effect on...
Laser trackers are instruments used to measure the three-dimensional coordinates of objects with high precision. It is necessary study calibration methods identify geometric errors laser so as compensate for and improve measurement accuracy. Among offsets, tilts, eccentricity in system, transit tilt offset play important roles have an essential effect on accuracy, which need be calibrated compensated for. Current detecting between standing axes complex time-consuming. In this paper, a fast...
ABSTRACT In this paper, a security problem of cooperative immunization against collaborative attacks such as blackhole and wormhole attacks, in the mobile ad hoc networks Worldwide Interoperability for Microwave Access (WiMAX) networks, was discussed. Because vulnerabilities protocol suites, can cause more damages than individual attacks. human immune system, nonselfs (i.e., viruses, bacteria cancers etc.) attack body way diseases body. With inspiration from tri‐tier model built to detect...
Hydraulic rock drills are widely used in drilling, mining, construction, and engineering applications. They typically operate harsh environments with high humidity, large temperature differences, vibration. Under the influence of environmental noise operational patterns, distributions data collected by sensors for different operators equipment differ significantly, which leads to difficulty fault classification hydraulic drills. Therefore, an intelligent robust method is highly desired. In...
Imbalanced data classification is an important problem in the field of computer science. Traditional algorithms often experience a decrease accuracy when distribution uneven. Therefore, measures need to be taken improve balance dataset and enhance model. We have designed resampling method detection. This relies on negative selection process constrain evolution process. By combining CRITIC with regression coefficients, we establish crossover probabilities for elite genes achieve evolutionary...
Over the past several years, in order to solve problem of malicious abuse facial manipulation technology, face detection technology has obtained considerable attention and achieved remarkable progress. However, most existing methods have very impoverished generalization ability robustness. In this paper, we propose a novel method for detection, which can improve robustness by bag-of-local-feature. Specifically, extend Transformers using bag-of-feature approach encode inter-patch...