Jingke Xu

ORCID: 0000-0003-3241-4913
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Data Management and Algorithms
  • Human Pose and Action Recognition
  • Data Mining Algorithms and Applications
  • Advanced Neural Network Applications
  • Caching and Content Delivery
  • Anomaly Detection Techniques and Applications
  • Advanced Computational Techniques and Applications
  • Time Series Analysis and Forecasting
  • Facility Location and Emergency Management
  • Geographic Information Systems Studies
  • Video Analysis and Summarization
  • Video Surveillance and Tracking Methods
  • Peer-to-Peer Network Technologies
  • Rough Sets and Fuzzy Logic
  • Software Engineering and Design Patterns
  • Mobile Crowdsensing and Crowdsourcing
  • Network Security and Intrusion Detection
  • Microbial Fuel Cells and Bioremediation
  • Gait Recognition and Analysis
  • Cognitive and psychological constructs research
  • Recommender Systems and Techniques
  • Customer churn and segmentation
  • Hand Gesture Recognition Systems
  • Stroke Rehabilitation and Recovery
  • RFID technology advancements

Shenyang Jianzhu University
2009-2024

Zhejiang Ocean University
2024

Shenyang Institute of Computing Technology (China)
2024

Northeastern University
2020

Nanjing University
2015

The influence of environmental attitudes on behaviors has long been discussed. However, few studies have addressed the foundation such attitudes. In present study, we explored primitive belief underlying attitudes, i.e., connections with nature, and its relationship pro-environmental behaviors. Specifically, used scales, a computerized Implicit Association Test, situational simulation experiment to examine both explicit implicit deliberate spontaneous behaviors, find correlations between...

10.1371/journal.pone.0127247 article EN cc-by PLoS ONE 2015-05-18

Abandoned object detection is a critical task in the field of public safety. However, existing methods perform poorly when detecting small and occluded objects, leading to high false missed rates. To address this issue, paper proposes an abandoned method that integrates adaptive dual-background model with SAO-YOLO (Small Object YOLO). The goal reduce rates for thereby improving overall accuracy. First, introduces adjusts according scene changes, reducing noise interference background model....

10.3390/s24206572 article EN cc-by Sensors 2024-10-12

Abstract In in‐vehicle driving scenarios, composite action recognition is crucial for improving safety and understanding the driver's intention. Due to spatial constraints occlusion factors, range of motion limited, thus resulting in similar patterns that are difficult differentiate. Additionally, collecting skeleton data characterise full human posture difficult, posing additional challenges recognition. To address problems, a novel Graph‐Reinforcement Transformer (GR‐Former) model...

10.1049/cvi2.12298 article EN cc-by-nc-nd IET Computer Vision 2024-07-10

Radio-frequency Identification (RFID) technology promises to revolutionize the way we track items in supply chain, retail store, and asset management applications. The size different characteristics of RFID data pose many interesting challenges current systems. In this paper, provide a brief overview highlight few spatio-temporal that believe are suitable topics for exploratory research.

10.11591/telkomnika.v11i3.2213 article EN TELKOMNIKA Indonesian Journal of Electrical Engineering 2013-03-01

The detection of abnormal moving on trajectory data streams is an important task in spatio-temporal mining. An outlier a grossly different from others, meaning there are few or even no trajectories following similar route. In this paper, we propose lightweight method to measure the streams. Furthermore, basic algorithm (Trajectory Outlier Detection Streams-TODS), which can quickly determine nature trajectory. Finally, Approximate (ATODS) reduce cost. It space approximate effectively amount...

10.1109/access.2020.2974521 article EN cc-by IEEE Access 2020-01-01

In this paper, we focus on discussing the delay-dependent dissipative filtering problem for a type of singular time-varying delay systems with random disturbance. At first, construct proper candidate Lyapunov-Krasovskii functional, then basis an auxiliary vector function and free weighting matrix technique, stochastic admissibility dissipation conditions considered error system are derived. Furthermore, corresponding filter design method is proposed. addition, address solving approach H <sub...

10.1109/access.2019.2953945 article EN cc-by IEEE Access 2019-01-01

The influence of spatial position means how deep it affects the objects and can be measured by number affected objects. evaluation which widely used in architectural planning facility location is a typical study database. In previous studies, object was supposed to affect only one position, calculated space area. However, many positions effects are multiple. this study, we provide new model based on RkNN. A measurement method proposed calculating weight contribution distance between...

10.1109/wisa.2017.40 article EN 2017-11-01

Video surveillance systems are crucial tools for enhancing security and technological prevention levels. Behavior recognition plays a vital role in violence the identification of hazardous activities within video systems. Addressing challenges such as impact redundant backgrounds multi-angle shooting environments on human behavior videos, resulting poor data processing capabilities low accuracy, this paper proposes novel detection algorithm named BiST-GCN-CBAM (Bottleneck Residual Dual-Path...

10.1109/nnice61279.2024.10498352 article EN 2024-01-19

With the rapid development of campus network date and high-availability, security requirements, data backup disaster recovery technology has been widely used, this become a key aspect IT infrastructure.This paper analyzed technology, proposed plan net establishment system it is proved well in practical application.

10.2991/emcs-16.2016.478 article EN cc-by-nc Advances in computer science research 2016-01-01

To improve the adaptation of housing construction product in villages and towns housing, meet requirements for energy-saving building products fittings. Microsoft.Net framework MVC design pattern are adopted, other techniques applied like Ajax, which construct intelligent service system that apples product. It realizes generalized processing query optimization product, affords an platform popularization management. The implement efficient to management residential our country, has a high...

10.1109/bmei.2011.6098745 article EN 2011-10-01

There is a kind of query that users tend to use fuzzy concepts express the requirements.In relational database, based on as inputs cannot be directly executed.The basic method converts users' into precise domain knowledge.In practice, condition often composed high and multilevel concepts, so its conversion very complex, efficiency poor.A new knowledge-based proposed in this paper, it achieved generalized data.Experiments show paper better than multiple levels.It may provide efficient methods...

10.2991/iccasm.2012.86 article EN cc-by-nc 2012-01-01

We propose the framework for monitoring k-nearest neighbor (kNN) query based on peer-to-peer (P2P) structure. In framework, moving objects with mobile equipment can finish some computation to help finding global kNN. A group-query algorithm is introduced which adopt two new techniques named distance-time and section-sort speed-up query. The cost of CPU time wireless communication could be reduced largely. simulation experiments, algorithms improve efficiency

10.1109/icmlc.2009.5212289 article EN International Conference on Machine Learning and Cybernetics 2009-07-01

In this paper, due to the important value in practical applications, we consider coded distributed matrix multiplication problem of computing $AA^\top$ a system with $N$ worker nodes and master node, where input matrices $A$ $A^\top$ are partitioned into $m$-by-$p$ $p$-by-$m$ blocks equal-size sub-matrices respectively. For effective straggler mitigation, propose novel computation strategy, named \emph{folded polynomial code}, which is obtained by modifying entangled codes. Moreover,...

10.48550/arxiv.2211.15267 preprint EN cc-by-nc-sa arXiv (Cornell University) 2022-01-01

10.1504/ijcat.2022.10055451 article EN International Journal of Computer Applications in Technology 2022-01-01
Coming Soon ...