Chao Fan
YOU?
Author Swipe
View article: A Comprehensive Survey on Subspace Clustering: Methods and Applications
A Comprehensive Survey on Subspace Clustering: Methods and Applications Open
View article: Generating equitable urban human flows with a fairness-aware deep learning model
Generating equitable urban human flows with a fairness-aware deep learning model Open
View article: Construction of prognostic scoring model for ovarian cancer based on deep learning algorithm
Construction of prognostic scoring model for ovarian cancer based on deep learning algorithm Open
View article: The Impact of Shared Team Task-Specific Experiences on Fire Brigade Rescue Effectiveness
The Impact of Shared Team Task-Specific Experiences on Fire Brigade Rescue Effectiveness Open
Experience is crucial for enhancing task performance. However, rescue experience, as a key contributor to individual and team capabilities within fire brigades, has not received sufficient attention in fire safety management research. Base…
View article: Sleep disturbances among older adults from the Russian Far East experiencing social loss: is there a sex difference?
Sleep disturbances among older adults from the Russian Far East experiencing social loss: is there a sex difference? Open
View article: Cross-docking scheduling for fresh produce with heterogeneous quality decay under interrupt modes
Cross-docking scheduling for fresh produce with heterogeneous quality decay under interrupt modes Open
View article: SliceMamba with Neural Architecture Search for Medical Image Segmentation
SliceMamba with Neural Architecture Search for Medical Image Segmentation Open
Despite the progress made in Mamba-based medical image segmentation models, existing methods utilizing unidirectional or multi-directional feature scanning mechanisms struggle to effectively capture dependencies between neighboring positio…
View article: Tight or Loose: Analysis of the Organization Cognition Process of Epidemic Risk and Policy Selection
Tight or Loose: Analysis of the Organization Cognition Process of Epidemic Risk and Policy Selection Open
In the context of Disease X risks, how governments and public health authorities make policy choices in response to potential epidemics has become a topic of increasing concern. The tightness of epidemic prevention policies is related to t…
View article: Data-driven anatomy of hierarchical migration patterns in the United States
Data-driven anatomy of hierarchical migration patterns in the United States Open
Population migration has become a dominant force in shaping local demographic changes in the United States, surpassing natural growth rates. However, whether the migration pattern and the influential factor have distinctive disparities bet…
View article: Deeper into Self-Supervised Monocular Indoor Depth Estimation
Deeper into Self-Supervised Monocular Indoor Depth Estimation Open
Monocular depth estimation using Convolutional Neural Networks (CNNs) has shown impressive performance in outdoor driving scenes. However, self-supervised learning of indoor depth from monocular sequences is quite challenging for researche…
View article: Empirical Analysis of the Dynamics of the COVID-19 Epidemic in Urban Embedded Social Networks
Empirical Analysis of the Dynamics of the COVID-19 Epidemic in Urban Embedded Social Networks Open
Background Due to the continual recurrence of COVID-19 in urban areas, it is important to know more about the evolution of the epidemic within this setting to mitigate the risk of the situation getting worse. As the virus spreads through h…
View article: Network Extraction and Analysis of Character Relationships in Chinese Literary Works
Network Extraction and Analysis of Character Relationships in Chinese Literary Works Open
Character relationships in literary works can be interpreted and analyzed from the perspective of social networks. Analysis of intricate character relationships helps to better understand the internal logic of plot development and explore …
View article: Defining fatty acids changes linked to rumen development, weaning and growth within Holstein-Friesian heifers
Defining fatty acids changes linked to rumen development, weaning and growth within Holstein-Friesian heifers Open
After birth, as effectively monogastric animals, calves undergo substantial physiological changes to become ruminants by 3 months of age and reach sexual maturity at approximately 15 months of age. Herein, we assess longitudinal metabolomi…
View article: Defining fatty acids changes linked to rumen development, weaning and growth within Holstein-Friesian heifers
Defining fatty acids changes linked to rumen development, weaning and growth within Holstein-Friesian heifers Open
After birth, as effectively monogastric animals, calves undergo substantial physiological changes to become ruminants by 3 months of age and reach sexual maturity at approximately 15 months of age. Herein, we assess longitudinal metabolomi…
View article: A Multi-Objective Task Scheduling Strategy for Intelligent Production Line Based on Cloud-Fog Computing
A Multi-Objective Task Scheduling Strategy for Intelligent Production Line Based on Cloud-Fog Computing Open
With the widespread use of industrial Internet technology in intelligent production lines, the number of task requests generated by smart terminals is growing exponentially. Achieving rapid response to these massive tasks becomes crucial. …
View article: Joint Soft–Hard Attention for Self-Supervised Monocular Depth Estimation
Joint Soft–Hard Attention for Self-Supervised Monocular Depth Estimation Open
In recent years, self-supervised monocular depth estimation has gained popularity among researchers because it uses only a single camera at a much lower cost than the direct use of laser sensors to acquire depth. Although monocular self-su…
View article: Cluster Analysis and Visualization for the Legend of the Condor Heroes Based on Social Network
Cluster Analysis and Visualization for the Legend of the Condor Heroes Based on Social Network Open
The Legend of the Condor Heroes (LCH) is one of the fifteen well-known Wuxia novels penned by Jin Yong. It portrays a number of characters in the background of the Southern Song Dynasty. In this research, we attempt to analyze the relation…
View article: Mobile phone component object detection algorithm based on improved SSD
Mobile phone component object detection algorithm based on improved SSD Open
Aiming at the problem of low accuracy of small object detection and poor system robustness in the detection of mobile phone component image targets, an improved SSD algorithm is proposed to detect mobile phone component image targets. This…
View article: Coword and Cluster Analysis for the Romance of the Three Kingdoms
Coword and Cluster Analysis for the Romance of the Three Kingdoms Open
The Romance of the Three Kingdoms (RTK) is a classical Chinese historical novel by Luo Guanzhong. This paper establishes a research framework of analyzing the novel by utilizing coword and cluster analysis technology. At the beginning, we …
View article: Chinese Personal Name Disambiguation Based on Clustering
Chinese Personal Name Disambiguation Based on Clustering Open
Personal name disambiguation is a significant issue in natural language processing, which is the basis for many tasks in automatic information processing. This research explores the Chinese personal name disambiguation based on clustering …
View article: An Indirect Multimodal Image Registration and Completion Method Guided by Image Synthesis
An Indirect Multimodal Image Registration and Completion Method Guided by Image Synthesis Open
Multimodal registration is a challenging task due to the significant variations exhibited from images of different modalities. CT and MRI are two of the most commonly used medical images in clinical diagnosis, since MRI with multicontrast …
View article: Epilepsy Detection in EEG Using Grassmann Discriminant Analysis Method
Epilepsy Detection in EEG Using Grassmann Discriminant Analysis Method Open
Epilepsy is marked by seizures stemming from abnormal electrical activity in the brain, causing involuntary movement or behavior. Many scientists have been working hard to explore the cause of epilepsy and seek the prevention and treatment…
View article: Coupling diversity across human behavior spaces
Coupling diversity across human behavior spaces Open
The heterogeneous nature of human behaviors contributes to the complexity of human-activated systems. Empirical observations and theoretical models reveal the temporal and spatial heterogeneity of many aspects of human behaviors, including…
View article: Correlation between social proximity and mobility similarity
Correlation between social proximity and mobility similarity Open
Human behaviors exhibit ubiquitous correlations in many aspects, such as individual and collective levels, temporal and spatial dimensions, content, social and geographical layers. With rich Internet data of online behaviors becoming avail…
View article: Micromirror-based real image laser automotive head-up display
Micromirror-based real image laser automotive head-up display Open
This paper reports a micromirror-based real image laser automotive head-up display (HUD), which overcomes the limitations of the previous designs by: (1) implementing an advanced display approach which is able to display sharp corners whil…
View article: High-Modularity Network Generation Model Based on the Muitilayer Network
High-Modularity Network Generation Model Based on the Muitilayer Network Open
Many models synthesize various types of complex networks with communities. However, a network generation model that can represent high-modularity networks is rare. In this paper, we propose a high-modularity network generation model by lay…
View article: Correlation between social proximity and mobility similarity
Correlation between social proximity and mobility similarity Open
Human behaviors exhibit ubiquitous correlations in many aspects, such as individual and collective levels, temporal and spatial dimensions, content, social and geographical layers. With rich Internet data of online behaviors becoming avail…
View article: Optimization of Integrity Measurement Algorithm Based on Multi-thread Pipeline Paralleling
Optimization of Integrity Measurement Algorithm Based on Multi-thread Pipeline Paralleling Open
With the continuous development of trusted computing, the integrity measurement has gradually been practical; but the popularization and application of the existing measurement tools are still restricted by their own measurement algorithm’…