- Traditional Chinese Medicine Studies
- Refrigeration and Air Conditioning Technologies
- Text and Document Classification Technologies
- Privacy-Preserving Technologies in Data
- Stochastic Gradient Optimization Techniques
- Advanced Thermodynamic Systems and Engines
- Advanced Text Analysis Techniques
- Traditional Chinese Medicine Analysis
- Biomedical Text Mining and Ontologies
- Advanced Image and Video Retrieval Techniques
- graph theory and CDMA systems
- Sparse and Compressive Sensing Techniques
- Distributed Control Multi-Agent Systems
- Phase Equilibria and Thermodynamics
- Thermodynamic and Exergetic Analyses of Power and Cooling Systems
- Fault Detection and Control Systems
- Image Retrieval and Classification Techniques
- Plant Physiology and Cultivation Studies
- Topic Modeling
- Heat Transfer and Optimization
- Coding theory and cryptography
- Postharvest Quality and Shelf Life Management
- Metabolomics and Mass Spectrometry Studies
- Radiomics and Machine Learning in Medical Imaging
- Sentiment Analysis and Opinion Mining
Henan University of Science and Technology
2008-2025
Luoyang Institute of Science and Technology
2025
Jiangsu Vocational College of Medicine
2024
Shanghai Jiao Tong University
2023
Shanghai Children's Hospital
2023
State Forestry and Grassland Administration
2023
Chinese Academy of Forestry
2023
China National Petroleum Corporation (China)
2023
Henan Provincial Academy of Building Research
2023
National University of Defense Technology
2013-2022
Cloud-to-Vehicle (C2V) integration serves as a fundamental infrastructure to provide robust computing and storage support for Vehicular Social Networks (VSNs). However, the proliferation of sensitive personal data within VSNs poses significant challenges in achieving secure efficient sharing while maintaining usability precise retrieval capabilities. Although existing searchable attribute-based encryption schemes offer encrypted fine-grained access control mechanisms, these still exhibit...
Abstract Addressing the challenge that carbon emission trading market is progressively being incorporated into various industries, existing scheduling strategies are characterized by high quota performance costs and limited reduction potential in demand. This paper studies a low-carbon optimization strategy of an electric-heat integrated energy system (IES), incorporating considerations demand side. Firstly, considering two targets Chinese certified reductions (CCER), model includes thermal...
This paper results from an attempt to unify several different file system design theories. We define a term "partial match pattern" and show that in order produce systems optimal with respect partial patterns, both the multikey hashing (MKH) method [16] multidimensional directory (MDD) [11] must be such form number of subdivisions is same for all domains keys. conditions string homomorphism (SHH) [15], MKH method, MDD equivalent one another. so-called Cartesian product files if records are...
Multi-objective optimization (MOO) has become an important method in machine learning, which involves solving multiple competing objective problems simultaneously. Nowadays, many MOO algorithms assume that gradient information is easily available and use this to optimize functions. However, when encountering situations where gradients are not available, such as black-box functions or non-differentiable functions, these ineffective. In paper, we propose a zeroth-order algorithm named SZMG...
In the domain of natural language processing (NLP), a primary challenge pertains to process Chinese tokenization, which remains challenging due lack explicit word boundaries in written Chinese. The existing tokenization methods often treat each character as an indivisible unit, neglecting finer semantic features embedded characters, such radicals. To tackle this issue, we propose novel token representation method that integrates radical-based into process. proposed extends vocabulary include...
Flying ad hoc networks (FANETs) have highly dynamic and energy-limited characteristics. Compared with traditional mobile networks, their nodes move faster topology changes more frequently. Therefore, the design of routing protocols faces greater challenges. The existing schemes rely on frequent fixed-interval Hello transmissions, which exacerbates network load leads to high communication energy consumption outdated location information. MP-QGRD combined extended Kalman filter (EKF) is used...
Introduction. This study employs a bibliometric methodology, utilising CiteSpace 6.2.R4 as an analytical tool to examine the evolution of journal Information Research over past 24 years from multivariate, time-phased, and dynamic perspective. Method. The was analysed by using perform co-occurrence analysis, co-citation cluster burst detection. Analysis. By analysing 2,180 articles indexed in Web Science database, it uncovered publication trends, research hotspots, thematic within journal....
Four patients presenting with chronic pigmented purpuric dermatosis (CPPD) on the limbs were found to have granulomatous inflammation superimposed pathological changes of CPPD. Three four had hyperlipidaemia. Therefore, reaction observed could be associated Whether it occurs only in Asian people or not needs further observation.
The apricot (Prunus armeniaca L.) is a fruit that belongs to the Rosaceae family; it has unique flavor and of important economic nutritional value. composition content soluble sugars organic acids in are key factors determining quality. However, molecular mechanism sugar acid accumulation apricots remains unclear. We measured sucrose, fructose, glucose, sorbitol, starch, malate, citric acid, titratable pH, investigated transcriptome profiles three (the high-sugar cultivar ‘Shushanggan’,...
A 3-D object representation scheme which uses surfaces as primitives and grammatical production rules structural relationship descriptors is proposed. Possible selections of surface are discussed. Examples given to illustrate the description method.
The local binary pattern (LBP) model is a simple and effective method of texture classification, but it sensitive to rotational noisy images. Although many variants LBP are proposed by scholars, there still several urgent problems, such as poor noise rotation immunity. In this paper, we propose robust descriptor, jumping refined (JRLP) for classification. particular, first extract difference count (JLDCP) consisting second-order diagonal represent the information in domain. To capture detail...
Emergency navigation is an emerging application of wireless sensor networks with significant research and social values. In order to ensure the safety timeliness for users, most existing works model as a path-planning problem adopt different metrics, such shortest route, minimum exposure path, maximum safe distance. Without sufficient consideration dynamics danger, approaches are likely cause users move back forth during navigation, known oscillation. Frequent oscillations inevitably result...