Dong Hai, Lin Guodong
To address the fresh food closed-loop supply chain network design problem, a robust optimization model for fresh food closed-loop supply chain networks is established to resolve uncertainties in the supply chain network. First, for a fresh food supply chain network structure encompassing 5 nodes, a …
Zhang Xin, Zhang Junhua, Zhang Shuai
Bone age assessment is a commonly used method for detecting endocrine and growth abnormalities in children; however, low-quality hand X-ray images in deep learning methods reduce the final assessment accuracy. To address this issue, we propose an alignment network that increases the region of intere…
Lei Kun, Guo Peng, Wang Qixin, Zhao Wenchao, Tang Liansheng
To enhance the solution efficiency for the Multi-Depot Vehicle Routing Problem (MDVRP), we propose an end-to-end deep reinforcement learning framework. First, MDVRP is formulated as a Markov Decision Process (MDP), encompassing definitions of state, action, and reward. Additionally, we propose an im…
Li Baozhen, Gu Xiulian
Text representation needs to address the ambiguity of textual terms and accurately define their semantic features within specific contextual environments. To tackle the problems of word polysemy and contextual characteristics, we propose an SCDVAB model for text semantic disambiguation. The main inn…
Chao Peng, Fanlin Zeng, Fanlin Zeng
This work aims to identify models capable of describing size effects on the modulus and hardness of polymers as measured by indentation testing. First, elastic size effects are described through a model developed by introducing an elastic unloading load model that incorporates couple-stress elastici…
Chu Jingli, Wang Jue, Ren Jiaohan, Chu Jingli
High-quality research papers should exhibit several essential attributes regarding research topic selection, research process, and research outcomes, with topic selection being the foremost concern. An inability to select appropriate topics precludes meaningful research and, by extension, scholarly …
Aole, Ma Jiahao, Zhang Haoshun, Yang Zijian, Chen Ziyuan, Cao Shiye, Chang Zhenbin, Aole
This paper is a biochemistry design experiment thesis from Harbin Institute of Technology (Weihai). The experiment employed the 2,6-dichloroindophenol method to determine the vitamin C content in vitamin beverages and effervescent tablets, discussed the feasibility of using pre-made vitamin beverage…
Fan Xiequan, Wu Hao, Ye Yinna, Ye Yinna
Let $Z_n$ be a supercritical branching process in an i.i.d. environment. In this paper, we obtain two non-uniform Berry-Esseen bounds for $Z_n$. This result extends the Berry-Esseen bound of Grama et al. [Stochastic,Process.,Appl.,127(4),1255-1281,2017] to the non-uniform case. Finally, we discuss a…
Zhang Jie, Luo Zhaosheng, Yu Xiaofeng, Qin Chunying, Luo Zhaosheng, Yu Xiaofeng
Currently, most research on CD-CAT has been conducted based on 0-1 scoring data, whereas in actual educational and psychological testing, there also exists a large amount of nominal response data. This study develops a CD-CAT suitable for nominal response data (hereinafter referred to as NCD-CAT) ba…
Yu Xiaofeng, Tang Qian, Qin Chunying, Li Yujun, YU Xiaofeng
Typically, cognitive diagnosis necessitates diagnostic evaluation of examinees through cognitive diagnosis models. The validity of diagnostic results generated by cognitive diagnosis models depends on the congruence between examinees' response patterns and the selected model. Consequently, when eval…
Yang Shenlong, Rao Tingting, Yu Feng, Yongyu Guo, Guo Yongyu
In recent years, the field of social class psychology has exhibited a pronounced research orientation toward subjective social class, prominently manifested by an emphasis on the subjective class component within the concept of social class, with a tendency to focus on subjective class in theoretica…
Yue Su, Sijia Li, Feng Huang, Jia Xue, Tingshao Zhu, Jia Xue, Tingshao Zhu
The COVID-19 outbreak has caused tremendous damage to individuals' normal lives and societal development. Recently, with the emergence of novel coronavirus variants, people worldwide continue to face the threat of COVID-19. Vaccination is considered one of the most effective methods to combat this p…
Shuzhi Li, Zou Yijie, Deng Xiaohong, Luo Zhiqiong, Liu Huiwen
To address the issues that the Raft algorithm cannot resist attacks from Byzantine nodes and that logs are susceptible to tampering and forgery, we design an RB-Raft (Resist Byzantine-Raft) algorithm that resists Byzantine nodes. First, we employ a hash chain approach to perform iterative hashing on…
He Shuo, Xie Liang
To address the issues of time-consuming training, large memory consumption, and difficulty in model updating associated with traditional offline hashing algorithms, as well as the phenomenon of substantial label loss in real-world image datasets, we propose an online hashing algorithm for balanced l…
Li Chao, Li Yufei, Huo Feizhou, Zhang Qinqin
To investigate the effects of hazard factors such as temperature, smoke, and CO concentration on evacuation in fire scenarios, a fire evacuation model based on dynamic coupling of FDS and cellular automata is established. The model establishes a one-to-one correspondence between FDS grids and cellul…
Chen Jinling, Li Jie, Zhao Chengming, Liu Xin
To achieve accurate classification of breast pathology WSI images, we propose a gated convolutional neural network classification method based on hybrid connections. A hybrid module incorporating local residual connections and global dense connections is constructed, with squeeze-and-excitation gate…
Xu Pengjin, Liang Chengji
A bi-level programming model is established to address the actual battery swapping characteristics of automated guided vehicles (AGVs) in automated container terminals, aiming to reduce the total task completion time and total battery swapping time of AGVs while rationally planning the number of bat…
Qiu Tao, Xie Peiliang, Deng Guopeng, Xi Hongmei, <PARA id="1">Zheng Zhi</PARA>, Xia Xiufeng
Complex event processing is a technique for analyzing event streams in dynamic environments. Typically implemented based on finite state automata, complex event processing techniques generate a large number of overlapping partial matches on the event stream during the matching process, requiring the…
Shi Meifeng, Xiao Shichuan, Feng Xin
To address the issues of slow convergence and susceptibility to local optima in existing ant colony optimization-based algorithms for solving distributed constraint optimization problems, this paper proposes a Random disturbance based multi-population ant colony algorithm to solve distributed constr…
Qiu Xiaoyan, Ge Yanying, Hu Chao, Hu Chao
During periods of social disasters such as pandemics, the number of trauma survivors increases dramatically; coupled with transportation disruptions, traditional psychological rescue efforts struggle to respond promptly to large-scale psychological crises among disaster victims. Expressive writing, …
Wu Fei, Wang Wei
Social media account credibility assessment is an important component in ensuring the healthy development of online social ecosystems. To address issues such as multi-dimensional credibility assessment indicators for social media accounts and diverse data information uncertainties, a credibility ass…
Zhang Yuting, Liu Yong
To address the deficiencies of the School-Based Optimization (SBO) algorithm, including poor search performance and susceptibility to local optima, this paper proposes an SBO algorithm integrated with educational psychology (SBO based on Educational Psychology, SBO-EP). During the teaching phase, th…
Yang Guisong, Wang Jingru, Li Jun, He Xingyu
Existing mobile crowdsensing task recommendation methods share common drawbacks: on one hand, they fail to fully consider the impact of spatio-temporal information on worker preferences, resulting in low recommendation accuracy; on the other hand, they ignore the influence of task popularity on reco…
Li Chen, He Ming, Wang Yong, Luo Ling, Han Wei
Action Recognition (AR) represents a research hotspot in the field of computer vision, with extensive application prospects in security surveillance, autonomous driving, production safety, and other domains. First, the connotation and extension of action recognition are analyzed, and the technical c…
Zhao Xingbo, Li Mengdong, Wang Ying, Zhu Yilin
Bullens et al. left an open problem in CSI-Fish, namely designing an identification protocol that allows the system challenge space to be #1;, rather than a small set #1;. This paper proposes a zero-knowledge proof scheme based on supersingular isogenies. The scheme treats the challenge C as an isog…
Zhong Weizhao, Chen Huihui
Mobile crowdsensing data contains image and spatio-temporal contextual information that can be utilized for detecting changes in street view images; however, such data is typically low-quality and non-standard. To accurately detect changes in street scenes, this paper primarily addresses the data qu…
Leng Zeqi, Wang Kunhao, Liang Wei, Zheng Yuefeng
In deploying blockchain-based IoT applications, technical obstacles have emerged, including lack of fine-grained privacy protection, low transaction processing efficiency, high latency, and insufficient flexibility and dynamism. To further advance the popularization and practical deployment of block…
Luan Xiaozhen, Wei Guoliang, Cai Jie
To further improve the accuracy and speed of optical flow matching in visual SLAM, this paper proposes an improved optical flow matching algorithm that integrates Inertial Measurement Unit (IMU) information to remove motion blur. The algorithm first employs a point spread function computed from IMU …
Yuan Haobin, Zhao Tao, Zhong Yuzhong
To address the suboptimal segmentation performance of existing visible-infrared (RGB-T) image semantic segmentation models, this paper proposes a nested segmentation network based on deep difference feature complementary fusion. Specifically, the encoder and decoder components are interconnected via…
Liu Ji, Jia Fangdi
To improve the accuracy of overlapping community detection, we propose CLPANNI (Cycle Label Propagation Algorithm with Neighbor Node Influence), an optimized algorithm based on cycle structures derived from LPANNI. The algorithm extracts minimal cycle information of nodes, measures node importance u…
Li Zhuo, Mao Yachun, Luo Peng, Ma Tianxiang, Zhao Jianli
Named Data Networking (NDN), as a novel Internet architecture, aims to address the ever-increasing data traffic. Based on its consumer-driven content retrieval model, NDN naturally supports consumer mobility. However, producer mobility remains a challenging problem, requiring additional mechanisms t…
Huang Hao, Yan Qian, Gan Ting, Shijun Li
Analyzing student evaluation data for teachers in teaching evaluation systems enables teachers to comprehend students' authentic attitudes toward instructors, summarize teaching experience, improve subsequent teaching methods, and enhance teaching quality. However, during teaching evaluations, issue…
Liu Xingyu, Jiang Lingyun
In the IoT service discovery process, users typically express their requirements through their own intentions, whereas service descriptions constitute explanations of service functionalities; consequently, mismatches between these two elements impact the accuracy of service discovery. Simultaneously…
Wang Jin, Zhang Xinyou
Due to their limited battery life and computing power, autonomous vehicles struggle to meet the processing demands of latency-sensitive or compute-intensive tasks while ensuring driving range. To address this issue, this paper proposes an autonomous vehicle task offloading strategy based on deep Q-n…
Ma Yinghong, Jiang Lingyun
In fifth-generation mobile communications, network slicing is employed to provide an optimal network for diverse services. In the context of RAN slicing scenarios across multiple base stations, conventional resource allocation methods fail to meet slice requirements when the number of slices varies …
Li Qiaoli, Han Hua
Link prediction is an important problem in the field of data mining. Similarity methods based on random walks generally assume that the probability of a walking particle transferring to neighboring nodes is equal, ignoring the influence of node degree values on the transfer probability. To address t…
Yang Changlin, Wang Jiguang, Wangqing
To reduce data storage requirements and transmission overhead in wireless Internet of Things (IoT), a local directed acyclic graph blockchain scheme (LDB) based on directed acyclic graph (DAG) is proposed. This scheme addresses node storage constraints and transmission overhead by enabling wireless …
Wang Hao, Liu Dan, Liu Shuo
To address the issues of the TextRank algorithm ignoring syntactic information and thematic information when extracting document keywords, we propose a document keyword extraction model based on syntactic analysis and thematic distribution. The model extracts document keywords through a two-stage pr…
Zhou Xuanlang, Qiu Weigen, Zhang Lichen
To improve text classification accuracy and address the issue of insufficient utilization of node features in text graph convolutional neural networks, a novel text classification model is proposed that intrinsically integrates the advantages of text graph convolution and Stacking ensemble learning …
Guo Xiaojian, Hu Fangyong
Currently, research on the Stochastic Duration Distributed Resource-Constrained Multi-Project Scheduling Problem (SDRCMPSP) is scarce, with most studies focusing on static scheduling schemes that cannot adjust and optimize strategies in real-time in response to environmental changes or promptly addr…
Jingqi Wang, Gao Yan, Wu Zhiqiang, Li Renjie
In response to the current challenges of load uncertainty, renewable energy integration, and "dual carbon" objectives in power systems, this paper establishes a real-time pricing model that incorporates load uncertainty and carbon trading within the smart grid context, while fully considering the we…
Zhang Bo, Zhao Peng, Zhang Jinjin, Zeng Zhaoju, Xiao Xuhao
Integrating knowledge graphs into recommendation systems can leverage the semantic relationships between entities in knowledge graphs to learn user and item representations. Embedding propagation-based methods utilize the graph structure of knowledge graphs to learn relevant features, but as the pro…
Chen Bang, Wu Maonian, Zhu Shaojun, Zheng Bo, Peng Wei
With the goal of enhancing the cognitive reasoning capability of recommendation algorithm models and overcoming the current limitation where traditional recommendation algorithms heavily rely on data quality, resulting in constrained performance, we propose an implicit deep collaborative recommendat…
Zhang Boxin, Geng Shengling, Qin Baodong
SM9-IBS is an identity-based signature algorithm industry standard published by China in 2016. Although identity-based signature algorithms reduce the complexity of system management of user public keys, they suffer from the difficult problem of key revocation. Furthermore, the special structure of …
Xing Zhiwei, Zhang Qianqian, Luo Qian, Chen Zhaoxin
To address the issue that gate reallocation algorithm results struggle to satisfy the operating habits of different operators, a gate reallocation recommendation algorithm that aligns with the operational habits of actual operational staff is proposed. First, a decision environment space model is co…
Zhao Lijun, Cao Congying, ZHANG Jinjing, Bai Huihui, Zhao Yao, Wang Anhong
We propose a multi-description coding image enhancement method based on joint side and central decoding feature learning, which simultaneously considers both side decoding image enhancement and central decoding image enhancement, thereby enabling better network training through joint optimization of…
Han Zonghuan, Liu Mingguo, Li Shen, Chen Lijia, Tian Min, Lan Tianxiang, Liang Qian
In industrial applications, fully supervised semantic segmentation for surface imprinted character images incurs high dataset annotation costs for enterprises. To address this issue, we propose a dual-branch feature fusion domain adaptation segmentation method (Dual-branch Feature Fusion Domain Adap…
Zhang Rong, Liu Yuan, Li Yang
Aspect-level sentiment analysis aims to determine the sentiment polarity toward specific aspects in reviews; however, few studies have investigated the impact of complex sentences on sentiment classification. Based on this, we propose an aspect-level sentiment analysis model based on BERT and a self…
Zhang Chenrui, Wu Xinyi, Deng Hailu, Zhang Huiwei, Zhang Chenrui
Based on comment data from Eastmoney.com's Shenzhen Component Index stock forum between January 1, 2018 and December 31, 2019, this study extracts investor sentiment embedded therein using a deep learning BERT model, and employs a TVP-VAR model to investigate the time-varying dynamic relationships a…
PENG Jiajia, Li Zhongqin, XU Liping, MA Yuqing, LI Hongliang, ZHAO Weibo, FAN Shuang
Abstract: Glaciers are known as natural ''solid reservoirs'', and they play a dual role between the composition of water resources and the river runoff regulation in arid and semi-arid areas of China. In this study, we used in situ observation data from Urumqi Glacier No. 1, Xinjiang Uygur Autonomou…