- Data Management and Algorithms
- Human Pose and Action Recognition
- Data Mining Algorithms and Applications
- Advanced Neural Network Applications
- Caching and Content Delivery
- Anomaly Detection Techniques and Applications
- Advanced Computational Techniques and Applications
- Time Series Analysis and Forecasting
- Facility Location and Emergency Management
- Geographic Information Systems Studies
- Video Analysis and Summarization
- Video Surveillance and Tracking Methods
- Peer-to-Peer Network Technologies
- Rough Sets and Fuzzy Logic
- Software Engineering and Design Patterns
- Mobile Crowdsensing and Crowdsourcing
- Network Security and Intrusion Detection
- Microbial Fuel Cells and Bioremediation
- Gait Recognition and Analysis
- Cognitive and psychological constructs research
- Recommender Systems and Techniques
- Customer churn and segmentation
- Hand Gesture Recognition Systems
- Stroke Rehabilitation and Recovery
- RFID technology advancements
Shenyang Jianzhu University
2009-2024
Zhejiang Ocean University
2024
Shenyang Institute of Computing Technology (China)
2024
Northeastern University
2020
Nanjing University
2015
The influence of environmental attitudes on behaviors has long been discussed. However, few studies have addressed the foundation such attitudes. In present study, we explored primitive belief underlying attitudes, i.e., connections with nature, and its relationship pro-environmental behaviors. Specifically, used scales, a computerized Implicit Association Test, situational simulation experiment to examine both explicit implicit deliberate spontaneous behaviors, find correlations between...
Abandoned object detection is a critical task in the field of public safety. However, existing methods perform poorly when detecting small and occluded objects, leading to high false missed rates. To address this issue, paper proposes an abandoned method that integrates adaptive dual-background model with SAO-YOLO (Small Object YOLO). The goal reduce rates for thereby improving overall accuracy. First, introduces adjusts according scene changes, reducing noise interference background model....
Abstract In in‐vehicle driving scenarios, composite action recognition is crucial for improving safety and understanding the driver's intention. Due to spatial constraints occlusion factors, range of motion limited, thus resulting in similar patterns that are difficult differentiate. Additionally, collecting skeleton data characterise full human posture difficult, posing additional challenges recognition. To address problems, a novel Graph‐Reinforcement Transformer (GR‐Former) model...
Radio-frequency Identification (RFID) technology promises to revolutionize the way we track items in supply chain, retail store, and asset management applications. The size different characteristics of RFID data pose many interesting challenges current systems. In this paper, provide a brief overview highlight few spatio-temporal that believe are suitable topics for exploratory research.
The detection of abnormal moving on trajectory data streams is an important task in spatio-temporal mining. An outlier a grossly different from others, meaning there are few or even no trajectories following similar route. In this paper, we propose lightweight method to measure the streams. Furthermore, basic algorithm (Trajectory Outlier Detection Streams-TODS), which can quickly determine nature trajectory. Finally, Approximate (ATODS) reduce cost. It space approximate effectively amount...
In this paper, we focus on discussing the delay-dependent dissipative filtering problem for a type of singular time-varying delay systems with random disturbance. At first, construct proper candidate Lyapunov-Krasovskii functional, then basis an auxiliary vector function and free weighting matrix technique, stochastic admissibility dissipation conditions considered error system are derived. Furthermore, corresponding filter design method is proposed. addition, address solving approach H <sub...
The influence of spatial position means how deep it affects the objects and can be measured by number affected objects. evaluation which widely used in architectural planning facility location is a typical study database. In previous studies, object was supposed to affect only one position, calculated space area. However, many positions effects are multiple. this study, we provide new model based on RkNN. A measurement method proposed calculating weight contribution distance between...
Video surveillance systems are crucial tools for enhancing security and technological prevention levels. Behavior recognition plays a vital role in violence the identification of hazardous activities within video systems. Addressing challenges such as impact redundant backgrounds multi-angle shooting environments on human behavior videos, resulting poor data processing capabilities low accuracy, this paper proposes novel detection algorithm named BiST-GCN-CBAM (Bottleneck Residual Dual-Path...
With the rapid development of campus network date and high-availability, security requirements, data backup disaster recovery technology has been widely used, this become a key aspect IT infrastructure.This paper analyzed technology, proposed plan net establishment system it is proved well in practical application.
To improve the adaptation of housing construction product in villages and towns housing, meet requirements for energy-saving building products fittings. Microsoft.Net framework MVC design pattern are adopted, other techniques applied like Ajax, which construct intelligent service system that apples product. It realizes generalized processing query optimization product, affords an platform popularization management. The implement efficient to management residential our country, has a high...
There is a kind of query that users tend to use fuzzy concepts express the requirements.In relational database, based on as inputs cannot be directly executed.The basic method converts users' into precise domain knowledge.In practice, condition often composed high and multilevel concepts, so its conversion very complex, efficiency poor.A new knowledge-based proposed in this paper, it achieved generalized data.Experiments show paper better than multiple levels.It may provide efficient methods...
We propose the framework for monitoring k-nearest neighbor (kNN) query based on peer-to-peer (P2P) structure. In framework, moving objects with mobile equipment can finish some computation to help finding global kNN. A group-query algorithm is introduced which adopt two new techniques named distance-time and section-sort speed-up query. The cost of CPU time wireless communication could be reduced largely. simulation experiments, algorithms improve efficiency
In this paper, due to the important value in practical applications, we consider coded distributed matrix multiplication problem of computing $AA^\top$ a system with $N$ worker nodes and master node, where input matrices $A$ $A^\top$ are partitioned into $m$-by-$p$ $p$-by-$m$ blocks equal-size sub-matrices respectively. For effective straggler mitigation, propose novel computation strategy, named \emph{folded polynomial code}, which is obtained by modifying entangled codes. Moreover,...