Xiang Chaosheng
Lake sediments in the northwestern Tibetan Plateau preserve rich records of regional climatic and environmental changes, which is of significant importance for revealing variations in the Tibetan Plateau's westerly-monsoon circulation system and their interaction processes. By analyzing environmenta…
Long Xiaocui
Farmland resources are the fundamental guarantee of national food security, and mastering the quantity and quality status of farmland is the prerequisite for rational utilization of regional farmland resources. Taking Hancheng City, located in the eastern part of the Weibei Dry Plateau in Shaanxi Pr…
Zhang Yuhan, Zhou Pu
The Yellow River Basin is an important energy security support zone in China and a key region for safeguarding national ecological security. Coordinated development of coal resource development and ecological protection holds important practical significance for coordinating basin-wide energy securi…
Zhu Lei, Li Yannan
National Forest Parks constitute one of the important carriers of ecological civilization construction in China. This study investigates National Forest Parks in 1994, 2004, and 2019, comprehensively employing spatial analysis techniques to systematically investigate their spatial distribution patte…
Li Anbei, Wan Yu
Using daily precipitation data from five national meteorological stations in Urumqi during the snowfall period from 1961–2019, together with NCEP daily four-times 0.25°×0.25° and 1°×1° reanalysis data, this study statistically analyzes the characteristics of snowstorms and large-scale circulation pa…
Wang Yaqin
Based on daily meteorological data from 62 weather stations in Xinjiang Uygur Autonomous Region from 1969 to 2019, this study investigates the effects of meteorological factor variations on wind erosion climate erosivity; utilizes Geographically Weighted Regression models and centroid migration mode…
Xing Zhijie, He Wei, Zhang Zhengtang, Jiang Xuting, He Wei
Drawing on theoretical models of specific positive emotions in the workplace and implicit leadership theory, this study investigates the influence mechanism of ethical leadership on employee job performance, specifically examining the mediating role of awe and the moderating role of employee ethical…
Nie Yan, Guo Yongrui
Ecological water conveyance scheduling is one of the most effective measures for ecological protection and restoration. Implementing ecological water conveyance holds significant importance for restoring natural ecosystems in arid and semi-arid regions and maintaining the health of oasis ecosystems.…
Hu Xiaomeng, Yu Feng, Kaiping Peng, Hu Xiaomeng
Since its inception, modern Western ethics and moral psychology have experienced a century of development, characterized by abundant literature, remarkable achievements, and diverse schools of thought. By contrast, Chinese moral psychology, despite having accumulated certain theoretical inquiries an…
Chen Haoyong, Haoyong Chen
Exergy is an indicator for measuring energy quality, which profoundly reveals the essence of work capability loss during energy transfer processes. To investigate the dynamic evolution mechanism of ? in time-varying energy networks, this paper formulates the constitutive relations among physical qua…
Hou Tingting
Early detection, early diagnosis, and early intervention constitute a consensus in the educational rehabilitation of children with autism. However, limitations of traditional identification and diagnostic methods, together with a shortage of professionals, frequently result in children with autism m…
Gao Xiaotian, Zhang Qian, Lü Fan, Hu Fuyuan, Hu Fuyuan
The novel view synthesis task refers to generating novel-view images of a scene from multiple reference images. However, in multi-object scenes, inter-object occlusion leads to incomplete acquisition of object information, resulting in artifacts and misalignment issues in the generated novel-view sc…
Song Chenghao, Jiang Lingyun
Given that edge clouds lack more powerful computational processing capabilities compared to central clouds, they are susceptible to unnecessary scaling jitter or insufficient resource processing capability when handling dynamic workloads. This paper therefore conducts experimental evaluations on mic…
He Xingyu, Zhao Dan, Yang Guisong, Jin Ziri, Yangkailong Qin, Wang Qipei
In mobile crowdsensing systems, tasks exhibit spatiotemporal coverage overlap, which may lead to redundant data collection and consequently cause data redundancy issues. To address this, we propose a task allocation method that can simultaneously control both intra-task and inter-task data redundanc…
Zhao Haiyan, Xia Wenzhong, Cao Jian, Chen Qingkui
In open source communities, the promptness and quality of responses to developers' issues critically determine community vitality. Therefore, identifying and recommending appropriate problem solvers for newly submitted issues facilitates community development. This paper proposes a problem solver re…
Wu Yuxiang, Wang Xiaofeng, Ding Hongsheng, Yu Zhuo
Max-SAT is the optimization version of the SAT problem, with the objective of finding a variable assignment that maximizes the number of satisfied clauses in a given clause set. This problem is typically NP-hard. With the in-depth development of big data and artificial intelligence, existing algorit…
Chengqi, Zhu Hongliang, Xin Yang
Graph Convolutional Networks (GCNs) can extract effective information from graph data through graph convolutions, but they are vulnerable to adversarial attacks that degrade model performance. While adversarial training can enhance neural network robustness, the discrete nature of graph structures a…
Chen Che, Zheng Yifeng, Yang Jingmin, Xie Lingfu, Wenjie Zhang
To address the challenges of next-generation networks in coverage, deployment cost, and capacity, Mobile Edge Computing (MEC) often necessitates the assistance of relay nodes to execute computation-intensive and delay-sensitive tasks. This paper first introduces the fundamental architecture of relay…
Qiao Jian, Chen Shaobo, He Mengying
Existing short-term demand forecasting models for public bicycles have neglected the nature differences in how various environmental factors influence user demand, as well as the temporal dependencies of variable environmental factors. This paper distinguishes environmental factors into invariant fa…
Xiaoming Zhang, Dou Quansheng, Chen Shuzhen, Huanling Tang
Few-shot relation extraction is a prominent research problem in natural language processing, which aims to train relation extraction models with low-cost annotated data. The currently widely-used prototype networks suffer from issues of inaccurate and incomplete class prototype representation. To ad…
Zhou Zhiping, Fan Bin, fir, Xu Wencheng
To address the limitations of conventional salient object detection methods in detecting multiple salient objects at different scales, we propose a salient object detection algorithm based on deep reuse of multi-scale features. The network model consists of vertically stacked bidirectional dense fea…
AO Huan, Wang Yisong, Feng Renyan, Deng Zhouhui, Tong Tianle
Slater voting rule is a tournament-based voting rule that primarily constructs an acyclic tournament, finds one with minimal difference from the original tournament, and selects the winner from it. For the NP-hard Slater voting algorithm, a Picat method for optimized solving of the Slater problem ba…
Li Yaqian, Zhang Xuyao, Li Qilong
To address the issue that inpainting networks in generative adversarial networks fail to simultaneously preserve global and local consistency of images while incurring substantial computational load, we incorporate the concept of progressive inpainting into an asymmetric U-Net architecture. First, w…
Cai Ruichu, Wu Fengzhu, Li Zijian
Recommendation systems have found extensive applications across diverse domains, profoundly influencing daily life. Training an effective recommendation system typically requires vast amounts of "user-item" interaction data; however, data obtained in practice is often extremely sparse, frequently le…
Luo Haojia, Pan Dazhi
For the Dual-Resource Constrained Flexible Job Shop Scheduling Problem (DRCFJSP), a Cuckoo Algorithm with an improved decoding scheme is proposed to optimize the makespan. Since DRCFJSP requires consideration of both machine allocation and worker processing status, the traditional decoding method is…
Liu Jin, Luo Xiaoshu, Xu Zhaoxing
To address the issues of insufficient feature extraction for facial expressions and inadequate generalization capability of lightweight networks in complex environments, as well as ambiguous expressions caused by single-label datasets' inability to effectively describe complex emotional tendencies, …
Tang Muyao, Zhou Dake, Li Tao
Deep Reinforcement Learning (DRL) can be widely applied in the field of urban traffic signal control; however, in existing research, the vast majority of DRL agents utilize only the current traffic state for decision-making, resulting in limited control effectiveness under conditions of significant …
Zhao Chun, Dong Xiaoming, Ren Yiying
Emerging intelligent transportation systems hold significant promise for improving traffic flow, optimizing fuel efficiency, reducing delays, and enhancing overall driving experience. Currently, traffic congestion constitutes an extremely serious challenge for humanity, particularly severe at urban …
Chen Wan, Cai Yanping, Li Aihua, Myrica rubra branch, Jiang Ke
To improve the real-time estimation accuracy of human vigilance, a real-time vigilance estimation method based on differential entropy (DE), improved moving average, and bidirectional two-dimensional principal component analysis (TD-2DPCA) is proposed. First, the total frequency band is decomposed i…
Liu Zhenpeng, Miao Dewei, Liu Qiannan, Li Ruilin, Li Xiaofei
To address the issue of attackers exploiting background knowledge and other information to launch attacks during user location privacy protection, this paper proposes a location privacy protection method for mobile terminals. The scheme leverages k-anonymity and local differential privacy techniques…
Wu Zhuang, Tang Lun, Pu Hao, Wang Zhiping, Chen Qianbin
To address issues such as base station coverage holes and local traffic overload in urban vehicular networks, this paper proposes a dynamic pre-deployment scheme based on vehicle trajectory prediction information. First, to train a unified Seq2Seq-GRU trajectory prediction model, multiple UAVs equip…
Wang Jianxin, Shi Yingjie, Liu Hao, Huang Haiqiao, Du Fang
Hand-drawn sketch image translation is a challenging research topic in computer vision, with significant application value in artistic design and e-commerce. Currently, GAN-based hand-drawn sketch image translation remains in its infancy. This article analyzes the challenging issues confronting sket…
Dai Zuhua, Zhou Bin, Long Yujing, Wang Zongquan
When swarm intelligence heuristic algorithms solve the Discounted {0-1} Knapsack Problem (D{0-1}KP), some repair and optimization strategy is required to transform abnormal encoding individuals into encoding individuals that satisfy the solution constraints, in order to improve solution efficiency a…
Bian Huajun, Wang Huajun, Zhao Hewei
A novel network framework (SR-Net) for RGB-D salient object detection is proposed. To effectively integrate the complementarity of multimodal features, depth feature extraction is employed as an independent branch, the Convolutional Block Attention Module (CBAM) is adopted for depth feature enhancem…
Wang Yang, Zheng Jin, Ying Liu, Li Ping
Traffic flow prediction constitutes a crucial component of intelligent transportation systems. Due to the complexity of traffic data, long-term and accurate traffic flow prediction has consistently remained one of the most challenging tasks in time series forecasting. In recent years, researchers ha…
Meng Lei, Tang Xin, Xu Yanyan
To address the issue that existing vertical handover algorithms in heterogeneous wireless network environments struggle to achieve seamless handover for mobile users accessing networks and fail to provide stable communication services, a vertical handover algorithm based on mobile user location pred…
Dong Yongji, Wang Yu, Yuan Zheng
To address the inability of traditional software-based protocol stacks to meet the demands of high-speed data transmission and processing, a hardware-accelerated UDP protocol stack design scheme is proposed. Based on the highly efficient parallel characteristics of hardware, this scheme implements a…
Yao Yukun, Chen Xinyao, Yang Jie
To satisfy the personalized requirements of end users and reduce the transmission delay in D2D networks, a cooperative retransmission scheme based on instantly decodable network coding (IDNC) with terminal differentiation is proposed. First, this scheme introduces a novel IDNC algorithmic framework …
Li Mengfan, Qin Wenhu, Cloud China
To address issues such as poor car-following stability, ineffective tracking, or unsafe conditions caused by significant speed fluctuations of vehicles in congested environments, a multi-objective optimization car-following scheme based on vehicle models and deep reinforcement learning is proposed. …
Meng Hui, Ren Lina, Li Ying
To address issues such as key abuse and digital certificate management in existing lattice-based proxy re-encryption schemes, we introduce an accountability mechanism and propose a novel identity-based accountable proxy re-encryption scheme. This scheme employs user identity ID to compute and genera…
Fanjun Su, Ma Mingxu, Tong Guoxiang
Most existing algorithms utilizing Graph Neural Networks for text classification have overlooked the over-smoothing problem inherent in GNNs and the discrepancies arising from text graph topological differences, leading to suboptimal performance in text classification. To address this issue, we prop…
Xia Jiqiang, Cui Pengshuai, Li Ziyong, Lan Julong
To address the problem of inconsistency between control-plane and data-plane flow rules caused by hardware/software failures and misconfigurations in the SDN data plane, we propose a P4-based consistency verification mechanism for SDN control-data plane flow rules (P4CV, P4-based Consistency Verific…
Li Jian, Li Zhuo, Ma Tianxiang, Liang Jifeng
To address the limitation that existing clothing compatibility models predominantly focus on exploring compatibility between paired items, we propose a clothing compatibility prediction model based on hypergraph representation. The model first constructs a clothing hypergraph based on the different …
Tan Fuxiang, Qian Yurong, Kong Yuting, Zhang Hao, Zhou Daxin, Fan Yingying, Chen Long
Rain streaks severely degrade the quality of captured images, affecting subsequent computer vision tasks. To improve the quality of rainy images, we propose a Transformer-based single image deraining algorithm. First, the algorithm obtains a large receptive field through a transformer with a windowi…
Yu Kun, Wang Zheyuan, Peng Xiongliang, Wang Pei, Zhao Zejun, Yan Yidan, Cao Peiyue, Yu Kun
With the rapid development of the social economy, the sustainability of employee altruistic behavior has become increasingly important for organizations and their members to better adapt and develop in the current rapidly changing work environment. Recent studies have found that altruistic behavior …
Liu Wumei, Xiao Haiyi, Wang Xuefeng, Wang Xuefeng
Residential mobility refers to the frequency with which individuals change their place of residence (i.e., moving). As a key socio-ecological factor, it exerts significant influence on individuals' cognition, emotion, and behavior. Previous scholars have reviewed the consequences of residential mobi…
Tong Hao, Yu Xiaofeng, Qin Chunying, Peng Yafeng, Zhong Xiaoyuan, Yu Xiaofeng
This study proposes a personal fit statistic R for polytomous scoring items to investigate its performance in detecting six common aberrant response patterns (cheating, guessing, random responding, carelessness, innovative responding, and mixed aberrance), and compares it with the standardized log-l…
Chu Jingli, Zhang Ying, Chu Jingli
This year marks the centennial anniversary of the School of Information Management at Wuhan University (its predecessor being the Library Science Department of Boone University, founded in 1920), signifying that library science education in China has passed through a century of development. In retro…
Chu Jingli, Zhang Ying, Xie Hejia, Chu Jingli
[Purpose/Significance] Library and information science graduate students constitute the emerging force in the development of the LIS profession. Development in the new era has presented new demands for LIS education, requiring further enhancement of core competencies among LIS graduate students. [Re…
Chu Jingli, Ren Jiaohan, Wang Jue, Jingli Chu
[Purpose/Significance]Knowledge service represents both the core capability and key trend for libraries, as well as a focal content and business direction for publishing institutions. In the digital intelligence era, investigating the similarities and differences between knowledge services in librar…