- Advanced Steganography and Watermarking Techniques
- Software Testing and Debugging Techniques
- Social Work Education and Practice
- Consumer Behavior in Brand Consumption and Identification
- Chaos-based Image/Signal Encryption
- Mathematical Analysis and Transform Methods
- Anomaly Detection Techniques and Applications
- Software Reliability and Analysis Research
- Disability Rights and Representation
- Software Engineering Research
- Employment and Welfare Studies
- Education Discipline and Inequality
- Mental Health Research Topics
- Behavioral Health and Interventions
- Advanced Data Compression Techniques
- Digital Marketing and Social Media
- Video Surveillance and Tracking Methods
- Customer Service Quality and Loyalty
- Interpreting and Communication in Healthcare
- Fire Detection and Safety Systems
- Digital Media Forensic Detection
- Social Policy and Reform Studies
- COVID-19 and Mental Health
Jilin University
2023-2025
Guangdong University of Petrochemical Technology
2010-2023
Guangdong University of Technology
2023
National University of Defense Technology
2019
The information acquisition and automatic processing technology based on visual surveillance sensors in intelligent transportation system (ITS) has become an important application field of computer vision technology. first step a traffic usually needs to correctly detect objects from videos classify them into different categories. In this paper, the improved spatiotemporal sample consistency algorithm (STSC) is proposed, enhance robustness background subtraction complex scenes. To address...
Abstract Role conflict within the workplace is a persistent problem in social work practice, especially China, where its unique practice environment contributes to severity of problem. However, few studies have discussed this issue China. To address gap, study explored experiences and coping strategies Chinese workers (CSWs) through semi-structured interviews (N = 28). Findings suggest that CSWs who interact with agencies (government work) experience not only some role–concept conflicts but...
The visual presentation of cause-related marketing (CRM) messages is gaining increasing attention from researchers and practitioners. This study delves into the impact style CRM on consumer responses moderating role self-construal. results demonstrate that has a significant effect responses, as cause-focused engender higher brand attitude purchase intention than product-focused (Studies 1 2). Meanwhile, effects both consumers’ are mediated by perceived self-serving motives. Importantly,...
Campus lockdown policy is one of the most effective non-pharmaceutical intervention strategies used to prevent and control coronavirus disease 2019epidemic worldwide. College students were greatly affected by this policy. Related studies center on English-speaking countries; few have highlighted discussion Chinese context. This study, therefore, aimed broadly elicit real experiences unique insights college campus Through qualitative research, we identified four key themes with ten...
In order to cope with the shortage of present image encryption algorithm, a novel algorithm based on chaotic system and fractional Fourier transform is proposed in this paper. The process includes two steps: first encrypted by employing Fractional domain double random phase, then confusion using matrix which generated system, finally cipher obtained. security depends sensitivity randomness phase mask, orders FRFT initial conditions system. Theoretical analysis experimental results...
The safety of software is particularly important in the safety-critical computer system which has highest requirements. In order to ensure quality such systems, formal methods are recommended strongly development software. However, whether method for analysis and verification model meets agreed properties, there a problem modeling. Taking railway station interlocking as case study, this paper proposes generation design. UML sequence diagram describing functional behavior transformed into...