- Medical Image Segmentation Techniques
- Innovation and Knowledge Management
- Analytic Number Theory Research
- Knowledge Management and Sharing
- Smart Grid Security and Resilience
- Competitive and Knowledge Intelligence
- Image Retrieval and Classification Techniques
- Image and Object Detection Techniques
- Advanced Mathematical Identities
- Mathematical functions and polynomials
- Limits and Structures in Graph Theory
- Face and Expression Recognition
- Collaboration in agile enterprises
- Biometric Identification and Security
- Peer-to-Peer Network Technologies
- Coding theory and cryptography
- Distributed and Parallel Computing Systems
- Information Architecture and Usability
- Fractional Differential Equations Solutions
- Face recognition and analysis
- Innovative Educational Techniques
- Energy Efficient Wireless Sensor Networks
- Image and Signal Denoising Methods
- Industrial Vision Systems and Defect Detection
- Advanced Image Fusion Techniques
Northwest University
2024-2025
The Ohio State University
2021-2023
Nanjing Audit University
2009-2022
China Academy of Launch Vehicle Technology
2022
Hunan First Normal University
2009
Harbin Engineering University
2007
University of Alberta
2002-2003
Knowledge sharing plays an important role in promoting innovation and helping improve R&D team performance the digital age. Based on evolutionary game theory, this study develops model of knowledge teams order to explore its system evolution path, stability strategy, influencing mechanism sharing. Then using a simulation model, examines dynamic process within teams. The results show that effectiveness can be promoted by members’ cognitive ability, absorption transformation degree...
With the increasing application of maturity model in field knowledge management, management is causing widespread concern practitioners and researchers. Based on deeply analysis ideological source models, this paper analyzed basic characteristics comprehensively compared from key process areas level, revealed structure for modern organizations providing some references to select implement model.
Purpose The purpose of this paper is to analyze the detailed content and research framework a knowledge management audit, from view operation flow based on cognition summary audit proposed by many scholars organizations, in order put forward some references for effective implementation an organization project. Design/methodology/approach carries out multi‐perspective analysis summarizes similarities differences between different viewpoints, also contrasting method various organizations point...
Segmentation of ultrasound images is difficult due to the existence speckle noise. Erroneous edges from noise are not only abundant but also have large magnitude multiplicative nature Moreover, boundary usually incomplete, being missing or weak at some places. We propose a system address these problems in two steps. First, based on observation that boundaries appearance straight gently curving line segments, we adopt Sha'ahsua and Ullman's (1988) saliency map method reduce enhance edges....
High-volume synchrophasor data generated by the wide area measurement system (WAMS) present new challenges for design of scalable and robust communication architectures suitable large-scale deployment in power grid monitoring control applications. Features information technology (ICT) can be harnessed to devise a more flexible infrastructure than conventional unicast-based hierarchical architecture. Multicast has been suggested as potential solution scalability issues current WAMS This...
In the era of knowledge economy and along with unceasing importance knowledge, management already became one main ways to gain competitive advantages, audit also most important step implementation component strategies. Firstly, this paper thoroughly analyzed connotation, model method audit, then discussed core processes support lastly proposed an integrated framework in order provide some references for practice.
In this paper, we present a method to combine grammatical model that encodes priori shape information with the ziplock snakes presented by Neuenschwander et al. A competing mechanism is adopted take advantage of models without inducing excessive computation. The resulting model-based have many advantages over original model: they can accurately locate contour features, produce more refined results, and deal multiple contours, missing image cues, noise.
The original snake models require a close initialization which in many situations are difficult to acquire. balloon model presented by Cohen et al. solve this problem suffers from the difficulty of choosing constant inflating force due variable internal shrinking forces and non-constant boundary intensity levels. Xu al., on other hand, proposed use pressure exactly offset forces. resulting achieves better stability terms parameter insensitivity sacrificing smoothness constraints, thus it...
The maturity levels and key process areas are the important parts of enterprise knowledge management model. implementation processes by groups is basis to achieve level transitions; it can promote evolve from ad-hoc, chaotic stage mature, disciplined stages. This paper firstly analyzed characteristics thoughts models, then comprehensively compared many KMMM, established transition benchmark level, discussed in depth mechanism order help effectively implementing projects.
<abstract><p>This paper mainly studied the distribution of values Hardy sums involving Chebyshev polynomials. By using method analysis and arithmetic properties polynomials first kind, we obtained a sharp asymptotic formula for hybrid mean value $ S_5(h, q) kind. In addition, also gave S(h, S_{3}(h, Finally, found reciprocal formulas S_{4}(h, kind.</p></abstract>
<abstract><p>For an odd prime $ p and a positive integer \alpha $, let g be of multiplicative order \tau modulo q = p^{\alpha} $. Denote by N(h, g, q) the number such that h\nmid (a+(g^{a})_{q}) for any 1\leq a\leq fixed h\geq 2 with (h, 1 The main purpose this paper is to give sharp asymptotic formula for</p> <p><disp-formula> <label/> <tex-math id="FE1"> \begin{document}$ N(k, h, \mathop{\sum\limits_{\begin{smallmatrix} 1\\...
For an odd prime p, let [Formula: see text] be the finite field of p elements. The main purpose this paper is to establish new results on gaps between elements multiplicative subgroups fields. any text], we also obtain upper bounds following double character sum and a triple with order respectively.
High-volume synchrophasor data generated by wide area measurement system (WAMS) presents new challenges for the design of scalable and robust communication architectures suitable large-scale deployment in power grid monitoring control applications. Features information technology (ICT) can be harnessed to devise a more flexible infrastructure than conventional unicast-based hierarchical architecture. Multicast has been suggested as potential solution scalability issues current WAMS This...
<abstract><p>In this paper, we defined a new generalized Cochrane sum with Dirichlet characters, and gave the upper bound of characters. Moreover, studied asymptotic estimation problem mean value characters obtained sharp formula for it. By using formula, also Dedekind sum.</p></abstract>
With the rapid development of smart grid, its vulnerabilities to intentional cyber-attacks are increasingly being exposed. One such attack is Man-In-The-Middle (MITM) attack, which poses a challenge for online detection due stealthy nature. This paper presents an Intrusion Detection System (IDS) with updated structure improve speed. A Random Disturbance Algorithm (RDA) designed performance machine learning blocks. RDA compared PCA in effect on several benchmark algorithms. The proposed IDS...
Active contour models, or snakes, are effective and robust in extraction. In most papers on an initialization close to the desired is assumed be provided, which inappropriate many cases. The ziplock snake model presented by Neuenschwander et al. (1997), however, needs only two user-supplied endpoints. optimization process for a starts from endpoints progresses towards center of snake. this paper, we present method combine grammatical that encodes priori shape information with snakes. A...
The aim of this study is to building up advantage index for social science, so as analysis and compare the distribution regional science research field. Some analyses on absolute relative comparative discipline are made in each region by CSSCI papers. results showed For nowadays, economics becomes primary academic Chinese field; Beijing, Jiangsu, Shanghai, Hubei Guangdong strongest China's there a small number other provinces disciplines, have ranged disciplines. Relative disciplines such...