Zhou Zhiping, Fan Bin, fir, Xu Wencheng
To address the limitations of conventional salient object detection methods in detecting multiple salient objects at different scales, we propose a salient object detection algorithm based on deep reuse of multi-scale features. The network model consists of vertically stacked bidirectional dense fea…
Zhao Chun, Dong Xiaoming, Ren Yiying
Emerging intelligent transportation systems hold significant promise for improving traffic flow, optimizing fuel efficiency, reducing delays, and enhancing overall driving experience. Currently, traffic congestion constitutes an extremely serious challenge for humanity, particularly severe at urban …
Liu Jin, Luo Xiaoshu, Xu Zhaoxing
To address the issues of insufficient feature extraction for facial expressions and inadequate generalization capability of lightweight networks in complex environments, as well as ambiguous expressions caused by single-label datasets' inability to effectively describe complex emotional tendencies, …
Chen Wan, Cai Yanping, Li Aihua, Myrica rubra branch, Jiang Ke
To improve the real-time estimation accuracy of human vigilance, a real-time vigilance estimation method based on differential entropy (DE), improved moving average, and bidirectional two-dimensional principal component analysis (TD-2DPCA) is proposed. First, the total frequency band is decomposed i…
Tang Muyao, Zhou Dake, Li Tao
Deep Reinforcement Learning (DRL) can be widely applied in the field of urban traffic signal control; however, in existing research, the vast majority of DRL agents utilize only the current traffic state for decision-making, resulting in limited control effectiveness under conditions of significant …
Liu Zhenpeng, Miao Dewei, Liu Qiannan, Li Ruilin, Li Xiaofei
To address the issue of attackers exploiting background knowledge and other information to launch attacks during user location privacy protection, this paper proposes a location privacy protection method for mobile terminals. The scheme leverages k-anonymity and local differential privacy techniques…
Luo Haojia, Pan Dazhi
For the Dual-Resource Constrained Flexible Job Shop Scheduling Problem (DRCFJSP), a Cuckoo Algorithm with an improved decoding scheme is proposed to optimize the makespan. Since DRCFJSP requires consideration of both machine allocation and worker processing status, the traditional decoding method is…
Cai Ruichu, Wu Fengzhu, Li Zijian
Recommendation systems have found extensive applications across diverse domains, profoundly influencing daily life. Training an effective recommendation system typically requires vast amounts of "user-item" interaction data; however, data obtained in practice is often extremely sparse, frequently le…
Wang Jianxin, Shi Yingjie, Liu Hao, Huang Haiqiao, Du Fang
Hand-drawn sketch image translation is a challenging research topic in computer vision, with significant application value in artistic design and e-commerce. Currently, GAN-based hand-drawn sketch image translation remains in its infancy. This article analyzes the challenging issues confronting sket…
Li Yaqian, Zhang Xuyao, Li Qilong
To address the issue that inpainting networks in generative adversarial networks fail to simultaneously preserve global and local consistency of images while incurring substantial computational load, we incorporate the concept of progressive inpainting into an asymmetric U-Net architecture. First, w…
Wu Yuxiang, Wang Xiaofeng, Ding Hongsheng, Yu Zhuo
Max-SAT is the optimization version of the SAT problem, with the objective of finding a variable assignment that maximizes the number of satisfied clauses in a given clause set. This problem is typically NP-hard. With the in-depth development of big data and artificial intelligence, existing algorit…
Wu Zhuang, Tang Lun, Pu Hao, Wang Zhiping, Chen Qianbin
To address issues such as base station coverage holes and local traffic overload in urban vehicular networks, this paper proposes a dynamic pre-deployment scheme based on vehicle trajectory prediction information. First, to train a unified Seq2Seq-GRU trajectory prediction model, multiple UAVs equip…
Wang Yang, Zheng Jin, Ying Liu, Li Ping
Traffic flow prediction constitutes a crucial component of intelligent transportation systems. Due to the complexity of traffic data, long-term and accurate traffic flow prediction has consistently remained one of the most challenging tasks in time series forecasting. In recent years, researchers ha…
Xiaoming Zhang, Dou Quansheng, Chen Shuzhen, Huanling Tang
Few-shot relation extraction is a prominent research problem in natural language processing, which aims to train relation extraction models with low-cost annotated data. The currently widely-used prototype networks suffer from issues of inaccurate and incomplete class prototype representation. To ad…
He Xingyu, Zhao Dan, Yang Guisong, Jin Ziri, Yangkailong Qin, Wang Qipei
In mobile crowdsensing systems, tasks exhibit spatiotemporal coverage overlap, which may lead to redundant data collection and consequently cause data redundancy issues. To address this, we propose a task allocation method that can simultaneously control both intra-task and inter-task data redundanc…
Dai Zuhua, Zhou Bin, Long Yujing, Wang Zongquan
When swarm intelligence heuristic algorithms solve the Discounted {0-1} Knapsack Problem (D{0-1}KP), some repair and optimization strategy is required to transform abnormal encoding individuals into encoding individuals that satisfy the solution constraints, in order to improve solution efficiency a…
Zhao Haiyan, Xia Wenzhong, Cao Jian, Chen Qingkui
In open source communities, the promptness and quality of responses to developers' issues critically determine community vitality. Therefore, identifying and recommending appropriate problem solvers for newly submitted issues facilitates community development. This paper proposes a problem solver re…
Chengqi, Zhu Hongliang, Xin Yang
Graph Convolutional Networks (GCNs) can extract effective information from graph data through graph convolutions, but they are vulnerable to adversarial attacks that degrade model performance. While adversarial training can enhance neural network robustness, the discrete nature of graph structures a…
Chen Che, Zheng Yifeng, Yang Jingmin, Xie Lingfu, Wenjie Zhang
To address the challenges of next-generation networks in coverage, deployment cost, and capacity, Mobile Edge Computing (MEC) often necessitates the assistance of relay nodes to execute computation-intensive and delay-sensitive tasks. This paper first introduces the fundamental architecture of relay…
Qiao Jian, Chen Shaobo, He Mengying
Existing short-term demand forecasting models for public bicycles have neglected the nature differences in how various environmental factors influence user demand, as well as the temporal dependencies of variable environmental factors. This paper distinguishes environmental factors into invariant fa…
AO Huan, Wang Yisong, Feng Renyan, Deng Zhouhui, Tong Tianle
Slater voting rule is a tournament-based voting rule that primarily constructs an acyclic tournament, finds one with minimal difference from the original tournament, and selects the winner from it. For the NP-hard Slater voting algorithm, a Picat method for optimized solving of the Slater problem ba…
Bian Huajun, Wang Huajun, Zhao Hewei
A novel network framework (SR-Net) for RGB-D salient object detection is proposed. To effectively integrate the complementarity of multimodal features, depth feature extraction is employed as an independent branch, the Convolutional Block Attention Module (CBAM) is adopted for depth feature enhancem…
Song Chenghao, Jiang Lingyun
Given that edge clouds lack more powerful computational processing capabilities compared to central clouds, they are susceptible to unnecessary scaling jitter or insufficient resource processing capability when handling dynamic workloads. This paper therefore conducts experimental evaluations on mic…
Li Jian, Li Zhuo, Ma Tianxiang, Liang Jifeng
To address the limitation that existing clothing compatibility models predominantly focus on exploring compatibility between paired items, we propose a clothing compatibility prediction model based on hypergraph representation. The model first constructs a clothing hypergraph based on the different …
Meng Hui, Ren Lina, Li Ying
To address issues such as key abuse and digital certificate management in existing lattice-based proxy re-encryption schemes, we introduce an accountability mechanism and propose a novel identity-based accountable proxy re-encryption scheme. This scheme employs user identity ID to compute and genera…
Fanjun Su, Ma Mingxu, Tong Guoxiang
Most existing algorithms utilizing Graph Neural Networks for text classification have overlooked the over-smoothing problem inherent in GNNs and the discrepancies arising from text graph topological differences, leading to suboptimal performance in text classification. To address this issue, we prop…
Meng Lei, Tang Xin, Xu Yanyan
To address the issue that existing vertical handover algorithms in heterogeneous wireless network environments struggle to achieve seamless handover for mobile users accessing networks and fail to provide stable communication services, a vertical handover algorithm based on mobile user location pred…
Li Mengfan, Qin Wenhu, Cloud China
To address issues such as poor car-following stability, ineffective tracking, or unsafe conditions caused by significant speed fluctuations of vehicles in congested environments, a multi-objective optimization car-following scheme based on vehicle models and deep reinforcement learning is proposed. …
Tan Fuxiang, Qian Yurong, Kong Yuting, Zhang Hao, Zhou Daxin, Fan Yingying, Chen Long
Rain streaks severely degrade the quality of captured images, affecting subsequent computer vision tasks. To improve the quality of rainy images, we propose a Transformer-based single image deraining algorithm. First, the algorithm obtains a large receptive field through a transformer with a windowi…
Dong Yongji, Wang Yu, Yuan Zheng
To address the inability of traditional software-based protocol stacks to meet the demands of high-speed data transmission and processing, a hardware-accelerated UDP protocol stack design scheme is proposed. Based on the highly efficient parallel characteristics of hardware, this scheme implements a…
Xia Jiqiang, Cui Pengshuai, Li Ziyong, Lan Julong
To address the problem of inconsistency between control-plane and data-plane flow rules caused by hardware/software failures and misconfigurations in the SDN data plane, we propose a P4-based consistency verification mechanism for SDN control-data plane flow rules (P4CV, P4-based Consistency Verific…
Yao Yukun, Chen Xinyao, Yang Jie
To satisfy the personalized requirements of end users and reduce the transmission delay in D2D networks, a cooperative retransmission scheme based on instantly decodable network coding (IDNC) with terminal differentiation is proposed. First, this scheme introduces a novel IDNC algorithmic framework …
Yu Kun, Wang Zheyuan, Peng Xiongliang, Wang Pei, Zhao Zejun, Yan Yidan, Cao Peiyue, Yu Kun
With the rapid development of the social economy, the sustainability of employee altruistic behavior has become increasingly important for organizations and their members to better adapt and develop in the current rapidly changing work environment. Recent studies have found that altruistic behavior …
Liu Wumei, Xiao Haiyi, Wang Xuefeng, Wang Xuefeng
Residential mobility refers to the frequency with which individuals change their place of residence (i.e., moving). As a key socio-ecological factor, it exerts significant influence on individuals' cognition, emotion, and behavior. Previous scholars have reviewed the consequences of residential mobi…
Tong Hao, Yu Xiaofeng, Qin Chunying, Peng Yafeng, Zhong Xiaoyuan, Yu Xiaofeng
This study proposes a personal fit statistic R for polytomous scoring items to investigate its performance in detecting six common aberrant response patterns (cheating, guessing, random responding, carelessness, innovative responding, and mixed aberrance), and compares it with the standardized log-l…
Chu Jingli, Zhang Ying, Chu Jingli
This year marks the centennial anniversary of the School of Information Management at Wuhan University (its predecessor being the Library Science Department of Boone University, founded in 1920), signifying that library science education in China has passed through a century of development. In retro…
Chu Jingli, Zhang Ying, Xie Hejia, Chu Jingli
[Purpose/Significance] Library and information science graduate students constitute the emerging force in the development of the LIS profession. Development in the new era has presented new demands for LIS education, requiring further enhancement of core competencies among LIS graduate students. [Re…
Chu Jingli, Ren Jiaohan, Wang Jue, Jingli Chu
[Purpose/Significance]Knowledge service represents both the core capability and key trend for libraries, as well as a focal content and business direction for publishing institutions. In the digital intelligence era, investigating the similarities and differences between knowledge services in librar…
Tang Shuxuan, Gao Youhe, Tang Shuxuan, Gao Youhe
Objective: Pregnancy is a process during which the body's physiological state undergoes profound changes. The normal course of pregnancy is crucial for ensuring proper fetal development and maintaining maternal health. We attempted to explore whether changes in the urinary proteome can reflect the p…
Gong, Fuzhou, Wang, Ting, Wang, Ting
In this paper, we propose and study a novel continuous-time model, based on the well-known constant elasticity of variance (CEV) model, to describe the asset price process. The basic idea is that the volatility elasticity of the CEV model cannot be treated as a constant from the perspective of stoch…
Li Zhenbing, Ren Ting, Deng Jiaojiao, Chen Junpei, Zhou Songdong, Zeng Xinmei, Ma Jiao, Li Fangwen
Hibiscus mutabilis has a long cultivation history and is an ancient garden tree species and medicinal plant native to China. To investigate the evolutionary characteristics of H. mutabilis cultivars and their relatives, clarify the phylogenetic relationships among H. mutabilis cultivars and between …
Yang Le, Nie Cong, Long Xiaoqin, He Jize, Yan Chaoyue, Zhu Qiankun, Wang Wanjun
SPL transcription factors are widely involved in plant growth, development, and stress response processes. Currently, there are no studies on SPL membrane-bound (SPL with Transmembrane Motif) transcription factors, i.e., STM transcription factors, in Dendrobium officinale. To investigate the roles o…
Chen Qin, Tang Xinran, Xue Qianhuai, Wang Xinyang, Du Yanjun
Phenological changes driven by global warming have already exerted significant impacts on biodiversity and ecosystems. Research on subtropical phenology remains relatively limited compared to that in temperate and frigid zones. Studies of autumn phenology are particularly scarce, and whether phenolo…
Zhou Xuan, Peng-Hua Gao, Yan Bo
Late embryogenesis abundant (LEA) proteins are closely associated with plant stress resistance, protecting plant cells under drought stress, reducing plant damage, and are widely distributed across organisms. Selaginella pulvinata is a fern species with exceptional survival capacity under drought st…
Hu Renchuan, Hu Qimin, fellow farmers, Luo Binsheng
The Baiku Yao people have a strong tradition of raising and consuming local black pigs, and possess unique and extensive experience and knowledge regarding the collection and management of feed plants. This study aims to conduct an ethnobotanical inventory of feed plants and their related indigenous…
Shu Jiangping, Yufeng Gu, Ou Zhiguo, Shao Wen, Yang Juan, Lu Qiyong, Zhang Xianchun, Liu Baodong, Wang Ruijiang, YAN Yuehong
Isoëtes is the most anciently originated genus of aquatic vascular plants, with all species listed as National First-Class Protected Plants. Through nationwide investigation and research on Isoëtes plants, significant morphological differences were found among tetraploid individuals from different l…
Mou Zhiyi, Duan Chunyan, Li Yanyu, Zhang Denan, Sun Yingjie, Teng Qiumei, Chen Yunshuang, Cao Yang, Wang Zihui, Xu Guangping
This study investigated the response characteristics of soil enzyme activity to biochar input to provide a theoretical reference for the rational application of eucalyptus branch biochar. Based on a field experiment in eucalyptus plantations in northern Guangxi, biochar prepared from eucalyptus plan…
Jiang Haidu, Weiling Xie, Chai Shengfeng, Tang Jianmin, Jiang Yunsheng, Qin Huizhen, Wei Xiao
Keteleeria davidiana var. calcarea is a precious tree species in mid-subtropical karst regions, characterized by a narrow distribution range and scarcity of wild seedlings, which severely constrains its natural regeneration. To investigate the causes of its endangerment and provide a reference for i…
Runyang Zhang, 钱前, Liu Kunping, Liang Yueming, Zhang Wei, Jin Zhenjiang, Pan Fujing
To investigate the effects of different land use types and ecological restoration patterns on soil enzyme activities and their C:N:P ratios in karst regions, this study selected three land use types [degraded disturbed land, grassland, and fruit tree (loquat) forest land] and four restoration patter…
Zhu Xuetao, Du Fan, Ye Xiaoyan, Fan Jiaxin, Jiang Changsheng
This study conducted a taxonomic investigation on a morphologically distinct specimen of the genus Carcinomyces collected from Liancheng National Nature Reserve in Gansu Province, using morphological characterization and molecular phylogenetic analysis based on ITS sequences. The results indicate th…