Jiankang Wang

ORCID: 0009-0005-5651-999X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Medical Image Segmentation Techniques
  • Innovation and Knowledge Management
  • Analytic Number Theory Research
  • Knowledge Management and Sharing
  • Smart Grid Security and Resilience
  • Competitive and Knowledge Intelligence
  • Image Retrieval and Classification Techniques
  • Image and Object Detection Techniques
  • Advanced Mathematical Identities
  • Mathematical functions and polynomials
  • Limits and Structures in Graph Theory
  • Face and Expression Recognition
  • Collaboration in agile enterprises
  • Biometric Identification and Security
  • Peer-to-Peer Network Technologies
  • Coding theory and cryptography
  • Distributed and Parallel Computing Systems
  • Information Architecture and Usability
  • Fractional Differential Equations Solutions
  • Face recognition and analysis
  • Innovative Educational Techniques
  • Energy Efficient Wireless Sensor Networks
  • Image and Signal Denoising Methods
  • Industrial Vision Systems and Defect Detection
  • Advanced Image Fusion Techniques

Northwest University
2024-2025

The Ohio State University
2021-2023

Nanjing Audit University
2009-2022

China Academy of Launch Vehicle Technology
2022

Hunan First Normal University
2009

Harbin Engineering University
2007

University of Alberta
2002-2003

10.1515/ms-2025-0004 article EN Mathematica Slovaca 2025-02-01

Knowledge sharing plays an important role in promoting innovation and helping improve R&D team performance the digital age. Based on evolutionary game theory, this study develops model of knowledge teams order to explore its system evolution path, stability strategy, influencing mechanism sharing. Then using a simulation model, examines dynamic process within teams. The results show that effectiveness can be promoted by members’ cognitive ability, absorption transformation degree...

10.3390/su13126664 article EN Sustainability 2021-06-11

With the increasing application of maturity model in field knowledge management, management is causing widespread concern practitioners and researchers. Based on deeply analysis ideological source models, this paper analyzed basic characteristics comprehensively compared from key process areas level, revealed structure for modern organizations providing some references to select implement model.

10.1109/iciii.2011.420 article EN 2011-11-01

Purpose The purpose of this paper is to analyze the detailed content and research framework a knowledge management audit, from view operation flow based on cognition summary audit proposed by many scholars organizations, in order put forward some references for effective implementation an organization project. Design/methodology/approach carries out multi‐perspective analysis summarizes similarities differences between different viewpoints, also contrasting method various organizations point...

10.1108/17468770911013546 article EN Journal of Technology Management in China 2009-09-25

Segmentation of ultrasound images is difficult due to the existence speckle noise. Erroneous edges from noise are not only abundant but also have large magnitude multiplicative nature Moreover, boundary usually incomplete, being missing or weak at some places. We propose a system address these problems in two steps. First, based on observation that boundaries appearance straight gently curving line segments, we adopt Sha'ahsua and Ullman's (1988) saliency map method reduce enhance edges....

10.1109/icpr.1998.711179 article EN 2002-11-27

High-volume synchrophasor data generated by the wide area measurement system (WAMS) present new challenges for design of scalable and robust communication architectures suitable large-scale deployment in power grid monitoring control applications. Features information technology (ICT) can be harnessed to devise a more flexible infrastructure than conventional unicast-based hierarchical architecture. Multicast has been suggested as potential solution scalability issues current WAMS This...

10.1109/tia.2021.3107369 article EN IEEE Transactions on Industry Applications 2021-08-24

In the era of knowledge economy and along with unceasing importance knowledge, management already became one main ways to gain competitive advantages, audit also most important step implementation component strategies. Firstly, this paper thoroughly analyzed connotation, model method audit, then discussed core processes support lastly proposed an integrated framework in order provide some references for practice.

10.1109/icmit.2010.5492864 article EN 2010-01-01

In this paper, we present a method to combine grammatical model that encodes priori shape information with the ziplock snakes presented by Neuenschwander et al. A competing mechanism is adopted take advantage of models without inducing excessive computation. The resulting model-based have many advantages over original model: they can accurately locate contour features, produce more refined results, and deal multiple contours, missing image cues, noise.

10.1109/tip.2003.809019 article EN IEEE Transactions on Image Processing 2003-02-01

10.1016/s0031-3203(02)00073-0 article EN Pattern Recognition 2002-12-02

The original snake models require a close initialization which in many situations are difficult to acquire. balloon model presented by Cohen et al. solve this problem suffers from the difficulty of choosing constant inflating force due variable internal shrinking forces and non-constant boundary intensity levels. Xu al., on other hand, proposed use pressure exactly offset forces. resulting achieves better stability terms parameter insensitivity sacrificing smoothness constraints, thus it...

10.1109/cvpr.1999.784717 article EN 2003-01-20

The maturity levels and key process areas are the important parts of enterprise knowledge management model. implementation processes by groups is basis to achieve level transitions; it can promote evolve from ad-hoc, chaotic stage mature, disciplined stages. This paper firstly analyzed characteristics thoughts models, then comprehensively compared many KMMM, established transition benchmark level, discussed in depth mechanism order help effectively implementing projects.

10.1109/iciii.2012.6339667 article EN 2012-10-01

<abstract><p>This paper mainly studied the distribution of values Hardy sums involving Chebyshev polynomials. By using method analysis and arithmetic properties polynomials first kind, we obtained a sharp asymptotic formula for hybrid mean value $ S_5(h, q) kind. In addition, also gave S(h, S_{3}(h, Finally, found reciprocal formulas S_{4}(h, kind.</p></abstract>

10.3934/math.2024186 article EN cc-by AIMS Mathematics 2024-01-01

<abstract><p>For an odd prime $ p and a positive integer \alpha $, let g be of multiplicative order \tau modulo q = p^{\alpha} $. Denote by N(h, g, q) the number such that h\nmid (a+(g^{a})_{q}) for any 1\leq a\leq fixed h\geq 2 with (h, 1 The main purpose this paper is to give sharp asymptotic formula for</p> <p><disp-formula> <label/> <tex-math id="FE1"> \begin{document}$ N(k, h, \mathop{\sum\limits_{\begin{smallmatrix} 1\\...

10.3934/era.2024085 article EN cc-by Electronic Research Archive 2024-01-01

For an odd prime p, let [Formula: see text] be the finite field of p elements. The main purpose this paper is to establish new results on gaps between elements multiplicative subgroups fields. any text], we also obtain upper bounds following double character sum and a triple with order respectively.

10.1142/s1793042124500842 article EN International Journal of Number Theory 2024-02-21

10.1007/s10986-024-09626-2 article EN Lithuanian Mathematical Journal 2024-04-01

High-volume synchrophasor data generated by wide area measurement system (WAMS) presents new challenges for the design of scalable and robust communication architectures suitable large-scale deployment in power grid monitoring control applications. Features information technology (ICT) can be harnessed to devise a more flexible infrastructure than conventional unicast-based hierarchical architecture. Multicast has been suggested as potential solution scalability issues current WAMS This...

10.1109/icps51807.2021.9416621 article EN 2021-04-27

<abstract><p>In this paper, we defined a new generalized Cochrane sum with Dirichlet characters, and gave the upper bound of characters. Moreover, studied asymptotic estimation problem mean value characters obtained sharp formula for it. By using formula, also Dedekind sum.</p></abstract>

10.3934/math.20231542 article EN cc-by AIMS Mathematics 2023-01-01

With the rapid development of smart grid, its vulnerabilities to intentional cyber-attacks are increasingly being exposed. One such attack is Man-In-The-Middle (MITM) attack, which poses a challenge for online detection due stealthy nature. This paper presents an Intrusion Detection System (IDS) with updated structure improve speed. A Random Disturbance Algorithm (RDA) designed performance machine learning blocks. RDA compared PCA in effect on several benchmark algorithms. The proposed IDS...

10.1109/ias54024.2023.10406766 article EN 2022 IEEE Industry Applications Society Annual Meeting (IAS) 2023-10-29

Active contour models, or snakes, are effective and robust in extraction. In most papers on an initialization close to the desired is assumed be provided, which inappropriate many cases. The ziplock snake model presented by Neuenschwander et al. (1997), however, needs only two user-supplied endpoints. optimization process for a starts from endpoints progresses towards center of snake. this paper, we present method combine grammatical that encodes priori shape information with snakes. A...

10.1109/icpr.2000.905412 article EN 2002-11-11

The aim of this study is to building up advantage index for social science, so as analysis and compare the distribution regional science research field. Some analyses on absolute relative comparative discipline are made in each region by CSSCI papers. results showed For nowadays, economics becomes primary academic Chinese field; Beijing, Jiangsu, Shanghai, Hubei Guangdong strongest China's there a small number other provinces disciplines, have ranged disciplines. Relative disciplines such...

10.1109/iciii.2012.6339757 article EN 2012-10-01

10.3724/sp.j.1087.2010.01852 article EN Journal of Computer Applications 2010-07-30
Coming Soon ...