Leng Zeqi, Wang Kunhao, Liang Wei, Zheng Yuefeng
In deploying blockchain-based IoT applications, technical obstacles have emerged, including lack of fine-grained privacy protection, low transaction processing efficiency, high latency, and insufficient flexibility and dynamism. To further advance the popularization and practical deployment of block…
Li Chen, He Ming, Wang Yong, Luo Ling, Han Wei
Action Recognition (AR) represents a research hotspot in the field of computer vision, with extensive application prospects in security surveillance, autonomous driving, production safety, and other domains. First, the connotation and extension of action recognition are analyzed, and the technical c…
Luan Xiaozhen, Wei Guoliang, Cai Jie
To further improve the accuracy and speed of optical flow matching in visual SLAM, this paper proposes an improved optical flow matching algorithm that integrates Inertial Measurement Unit (IMU) information to remove motion blur. The algorithm first employs a point spread function computed from IMU …
Zhang Boxin, Geng Shengling, Qin Baodong
SM9-IBS is an identity-based signature algorithm industry standard published by China in 2016. Although identity-based signature algorithms reduce the complexity of system management of user public keys, they suffer from the difficult problem of key revocation. Furthermore, the special structure of …
Xing Zhiwei, Zhang Qianqian, Luo Qian, Chen Zhaoxin
To address the issue that gate reallocation algorithm results struggle to satisfy the operating habits of different operators, a gate reallocation recommendation algorithm that aligns with the operational habits of actual operational staff is proposed. First, a decision environment space model is co…
Jingqi Wang, Gao Yan, Wu Zhiqiang, Li Renjie
In response to the current challenges of load uncertainty, renewable energy integration, and "dual carbon" objectives in power systems, this paper establishes a real-time pricing model that incorporates load uncertainty and carbon trading within the smart grid context, while fully considering the we…
Wang Hao, Liu Dan, Liu Shuo
To address the issues of the TextRank algorithm ignoring syntactic information and thematic information when extracting document keywords, we propose a document keyword extraction model based on syntactic analysis and thematic distribution. The model extracts document keywords through a two-stage pr…
Zhang Bo, Zhao Peng, Zhang Jinjin, Zeng Zhaoju, Xiao Xuhao
Integrating knowledge graphs into recommendation systems can leverage the semantic relationships between entities in knowledge graphs to learn user and item representations. Embedding propagation-based methods utilize the graph structure of knowledge graphs to learn relevant features, but as the pro…
Zhou Xuanlang, Qiu Weigen, Zhang Lichen
To improve text classification accuracy and address the issue of insufficient utilization of node features in text graph convolutional neural networks, a novel text classification model is proposed that intrinsically integrates the advantages of text graph convolution and Stacking ensemble learning …
Guo Xiaojian, Hu Fangyong
Currently, research on the Stochastic Duration Distributed Resource-Constrained Multi-Project Scheduling Problem (SDRCMPSP) is scarce, with most studies focusing on static scheduling schemes that cannot adjust and optimize strategies in real-time in response to environmental changes or promptly addr…
Chen Bang, Wu Maonian, Zhu Shaojun, Zheng Bo, Peng Wei
With the goal of enhancing the cognitive reasoning capability of recommendation algorithm models and overcoming the current limitation where traditional recommendation algorithms heavily rely on data quality, resulting in constrained performance, we propose an implicit deep collaborative recommendat…
Yang Changlin, Wang Jiguang, Wangqing
To reduce data storage requirements and transmission overhead in wireless Internet of Things (IoT), a local directed acyclic graph blockchain scheme (LDB) based on directed acyclic graph (DAG) is proposed. This scheme addresses node storage constraints and transmission overhead by enabling wireless …
Han Zonghuan, Liu Mingguo, Li Shen, Chen Lijia, Tian Min, Lan Tianxiang, Liang Qian
In industrial applications, fully supervised semantic segmentation for surface imprinted character images incurs high dataset annotation costs for enterprises. To address this issue, we propose a dual-branch feature fusion domain adaptation segmentation method (Dual-branch Feature Fusion Domain Adap…
Zhao Lijun, Cao Congying, ZHANG Jinjing, Bai Huihui, Zhao Yao, Wang Anhong
We propose a multi-description coding image enhancement method based on joint side and central decoding feature learning, which simultaneously considers both side decoding image enhancement and central decoding image enhancement, thereby enabling better network training through joint optimization of…
Zhang Rong, Liu Yuan, Li Yang
Aspect-level sentiment analysis aims to determine the sentiment polarity toward specific aspects in reviews; however, few studies have investigated the impact of complex sentences on sentiment classification. Based on this, we propose an aspect-level sentiment analysis model based on BERT and a self…
Zhang Chenrui, Wu Xinyi, Deng Hailu, Zhang Huiwei, Zhang Chenrui
Based on comment data from Eastmoney.com's Shenzhen Component Index stock forum between January 1, 2018 and December 31, 2019, this study extracts investor sentiment embedded therein using a deep learning BERT model, and employs a TVP-VAR model to investigate the time-varying dynamic relationships a…
Liu Qun, Liu Qun
This paper presents a comprehensive survey of subword tokenization methods in neural network-based natural language processing. It first elaborates on the out-of-vocabulary (OOV) problem stemming from closed vocabulary limitations in such approaches, and introduces three prevalent methods for addres…
Meng Guangjun, Chu Jingli
[Purpose/Significance]To trace the history of the China Science Information University established by the Chinese Academy of Sciences in 1958, and to provide more corroborating evidence for the origin of information science education in China.[Method/Process]By retrieving archives from multiple inst…
Qijun Luo, Zheng Li, Qingji Gao, Zheng Li
In self-service baggage check-in and sorting for civil aviation, automatically detecting whether pallets are added to self-dropped baggage is an essential function; however, the pallets are largely obscured by the embedded baggage, which poses a challenging problem. To address this issue, a fast det…
Wang Lixue, Wang Lixue
[Purpose/Significance] Researchers require citation linkages that identify the cited papers referenced by citing documents; however, the commonly downloaded data only contains the references listed in citing documents. Only by establishing a mapping between reference entries and cited papers can cit…
Gao Xiaotian, Zhang Qian, Lü Fan, Hu Fuyuan, Hu Fuyuan
The novel view synthesis task refers to generating novel-view images of a scene from multiple reference images. However, in multi-object scenes, inter-object occlusion leads to incomplete acquisition of object information, resulting in artifacts and misalignment issues in the generated novel-view sc…
Zhou Zhiping, Fan Bin, fir, Xu Wencheng
To address the limitations of conventional salient object detection methods in detecting multiple salient objects at different scales, we propose a salient object detection algorithm based on deep reuse of multi-scale features. The network model consists of vertically stacked bidirectional dense fea…
Tang Muyao, Zhou Dake, Li Tao
Deep Reinforcement Learning (DRL) can be widely applied in the field of urban traffic signal control; however, in existing research, the vast majority of DRL agents utilize only the current traffic state for decision-making, resulting in limited control effectiveness under conditions of significant …
Wang Jianxin, Shi Yingjie, Liu Hao, Huang Haiqiao, Du Fang
Hand-drawn sketch image translation is a challenging research topic in computer vision, with significant application value in artistic design and e-commerce. Currently, GAN-based hand-drawn sketch image translation remains in its infancy. This article analyzes the challenging issues confronting sket…
He Xingyu, Zhao Dan, Yang Guisong, Jin Ziri, Yangkailong Qin, Wang Qipei
In mobile crowdsensing systems, tasks exhibit spatiotemporal coverage overlap, which may lead to redundant data collection and consequently cause data redundancy issues. To address this, we propose a task allocation method that can simultaneously control both intra-task and inter-task data redundanc…
Chen Che, Zheng Yifeng, Yang Jingmin, Xie Lingfu, Wenjie Zhang
To address the challenges of next-generation networks in coverage, deployment cost, and capacity, Mobile Edge Computing (MEC) often necessitates the assistance of relay nodes to execute computation-intensive and delay-sensitive tasks. This paper first introduces the fundamental architecture of relay…
Zhao Chun, Dong Xiaoming, Ren Yiying
Emerging intelligent transportation systems hold significant promise for improving traffic flow, optimizing fuel efficiency, reducing delays, and enhancing overall driving experience. Currently, traffic congestion constitutes an extremely serious challenge for humanity, particularly severe at urban …
Luo Haojia, Pan Dazhi
For the Dual-Resource Constrained Flexible Job Shop Scheduling Problem (DRCFJSP), a Cuckoo Algorithm with an improved decoding scheme is proposed to optimize the makespan. Since DRCFJSP requires consideration of both machine allocation and worker processing status, the traditional decoding method is…
Zhao Haiyan, Xia Wenzhong, Cao Jian, Chen Qingkui
In open source communities, the promptness and quality of responses to developers' issues critically determine community vitality. Therefore, identifying and recommending appropriate problem solvers for newly submitted issues facilitates community development. This paper proposes a problem solver re…
Qiao Jian, Chen Shaobo, He Mengying
Existing short-term demand forecasting models for public bicycles have neglected the nature differences in how various environmental factors influence user demand, as well as the temporal dependencies of variable environmental factors. This paper distinguishes environmental factors into invariant fa…
Wu Yuxiang, Wang Xiaofeng, Ding Hongsheng, Yu Zhuo
Max-SAT is the optimization version of the SAT problem, with the objective of finding a variable assignment that maximizes the number of satisfied clauses in a given clause set. This problem is typically NP-hard. With the in-depth development of big data and artificial intelligence, existing algorit…
Wu Zhuang, Tang Lun, Pu Hao, Wang Zhiping, Chen Qianbin
To address issues such as base station coverage holes and local traffic overload in urban vehicular networks, this paper proposes a dynamic pre-deployment scheme based on vehicle trajectory prediction information. First, to train a unified Seq2Seq-GRU trajectory prediction model, multiple UAVs equip…
Chen Wan, Cai Yanping, Li Aihua, Myrica rubra branch, Jiang Ke
To improve the real-time estimation accuracy of human vigilance, a real-time vigilance estimation method based on differential entropy (DE), improved moving average, and bidirectional two-dimensional principal component analysis (TD-2DPCA) is proposed. First, the total frequency band is decomposed i…
Song Chenghao, Jiang Lingyun
Given that edge clouds lack more powerful computational processing capabilities compared to central clouds, they are susceptible to unnecessary scaling jitter or insufficient resource processing capability when handling dynamic workloads. This paper therefore conducts experimental evaluations on mic…
Xiaoming Zhang, Dou Quansheng, Chen Shuzhen, Huanling Tang
Few-shot relation extraction is a prominent research problem in natural language processing, which aims to train relation extraction models with low-cost annotated data. The currently widely-used prototype networks suffer from issues of inaccurate and incomplete class prototype representation. To ad…
Dai Zuhua, Zhou Bin, Long Yujing, Wang Zongquan
When swarm intelligence heuristic algorithms solve the Discounted {0-1} Knapsack Problem (D{0-1}KP), some repair and optimization strategy is required to transform abnormal encoding individuals into encoding individuals that satisfy the solution constraints, in order to improve solution efficiency a…
Wang Yang, Zheng Jin, Ying Liu, Li Ping
Traffic flow prediction constitutes a crucial component of intelligent transportation systems. Due to the complexity of traffic data, long-term and accurate traffic flow prediction has consistently remained one of the most challenging tasks in time series forecasting. In recent years, researchers ha…
Cai Ruichu, Wu Fengzhu, Li Zijian
Recommendation systems have found extensive applications across diverse domains, profoundly influencing daily life. Training an effective recommendation system typically requires vast amounts of "user-item" interaction data; however, data obtained in practice is often extremely sparse, frequently le…
AO Huan, Wang Yisong, Feng Renyan, Deng Zhouhui, Tong Tianle
Slater voting rule is a tournament-based voting rule that primarily constructs an acyclic tournament, finds one with minimal difference from the original tournament, and selects the winner from it. For the NP-hard Slater voting algorithm, a Picat method for optimized solving of the Slater problem ba…
Liu Zhenpeng, Miao Dewei, Liu Qiannan, Li Ruilin, Li Xiaofei
To address the issue of attackers exploiting background knowledge and other information to launch attacks during user location privacy protection, this paper proposes a location privacy protection method for mobile terminals. The scheme leverages k-anonymity and local differential privacy techniques…
Chengqi, Zhu Hongliang, Xin Yang
Graph Convolutional Networks (GCNs) can extract effective information from graph data through graph convolutions, but they are vulnerable to adversarial attacks that degrade model performance. While adversarial training can enhance neural network robustness, the discrete nature of graph structures a…
Liu Jin, Luo Xiaoshu, Xu Zhaoxing
To address the issues of insufficient feature extraction for facial expressions and inadequate generalization capability of lightweight networks in complex environments, as well as ambiguous expressions caused by single-label datasets' inability to effectively describe complex emotional tendencies, …
Li Yaqian, Zhang Xuyao, Li Qilong
To address the issue that inpainting networks in generative adversarial networks fail to simultaneously preserve global and local consistency of images while incurring substantial computational load, we incorporate the concept of progressive inpainting into an asymmetric U-Net architecture. First, w…
Bian Huajun, Wang Huajun, Zhao Hewei
A novel network framework (SR-Net) for RGB-D salient object detection is proposed. To effectively integrate the complementarity of multimodal features, depth feature extraction is employed as an independent branch, the Convolutional Block Attention Module (CBAM) is adopted for depth feature enhancem…
Tan Fuxiang, Qian Yurong, Kong Yuting, Zhang Hao, Zhou Daxin, Fan Yingying, Chen Long
Rain streaks severely degrade the quality of captured images, affecting subsequent computer vision tasks. To improve the quality of rainy images, we propose a Transformer-based single image deraining algorithm. First, the algorithm obtains a large receptive field through a transformer with a windowi…
Xia Jiqiang, Cui Pengshuai, Li Ziyong, Lan Julong
To address the problem of inconsistency between control-plane and data-plane flow rules caused by hardware/software failures and misconfigurations in the SDN data plane, we propose a P4-based consistency verification mechanism for SDN control-data plane flow rules (P4CV, P4-based Consistency Verific…
Meng Hui, Ren Lina, Li Ying
To address issues such as key abuse and digital certificate management in existing lattice-based proxy re-encryption schemes, we introduce an accountability mechanism and propose a novel identity-based accountable proxy re-encryption scheme. This scheme employs user identity ID to compute and genera…
Yao Yukun, Chen Xinyao, Yang Jie
To satisfy the personalized requirements of end users and reduce the transmission delay in D2D networks, a cooperative retransmission scheme based on instantly decodable network coding (IDNC) with terminal differentiation is proposed. First, this scheme introduces a novel IDNC algorithmic framework …
Meng Lei, Tang Xin, Xu Yanyan
To address the issue that existing vertical handover algorithms in heterogeneous wireless network environments struggle to achieve seamless handover for mobile users accessing networks and fail to provide stable communication services, a vertical handover algorithm based on mobile user location pred…
Dong Yongji, Wang Yu, Yuan Zheng
To address the inability of traditional software-based protocol stacks to meet the demands of high-speed data transmission and processing, a hardware-accelerated UDP protocol stack design scheme is proposed. Based on the highly efficient parallel characteristics of hardware, this scheme implements a…