Yourong Chen
YOU?
Author Swipe
View article: Research on the Construction of a Full-Color-Gamut Color Spinning Method and Neural Network Color Prediction System
Research on the Construction of a Full-Color-Gamut Color Spinning Method and Neural Network Color Prediction System Open
This paper aims to develop a comprehensive technology for full-color-gamut spinning to enable the precise design and production of blended yarns. A grid-based color-mixing model with six regions is built as a cylindrical color model by mix…
View article: Unlocking the Effectiveness of LoRA-FP for Seamless Transfer Implantation of Fingerprints in Downstream Models
Unlocking the Effectiveness of LoRA-FP for Seamless Transfer Implantation of Fingerprints in Downstream Models Open
With the rapid advancement of large language models (LLMs), safeguarding intellectual property (IP) has become increasingly critical. To address the challenges of high costs and potential contamination in fingerprint integration, we propos…
View article: Beyond contrastive learning: adaptive graph representations with mutual information maximization for blockchain and structured data
Beyond contrastive learning: adaptive graph representations with mutual information maximization for blockchain and structured data Open
Graph representation learning has emerged as a powerful approach for modeling structured data across diverse domains, including social networks, biochemical interactions, and financial transaction systems. Existing contrastive learning fra…
View article: Long-distance target localization optimization algorithm based on single robot moving path planning
Long-distance target localization optimization algorithm based on single robot moving path planning Open
To address the problem of low positioning accuracy for long-distance static targets, we propose an optimized algorithm for long-distance target localization (LTLO) based on single-robot moving path planning. The algorithm divides the robot…
View article: Yarn Formation Mechanism and Application of Rotor Spinning Wide-Color Gamut-Blended Yarn for Ostwald Color Solid
Yarn Formation Mechanism and Application of Rotor Spinning Wide-Color Gamut-Blended Yarn for Ostwald Color Solid Open
By applying the Ostwald color solid in spinning, we investigated how to correlate the Ostwald color solid with spinning process parameters and achieve the wide-color gamut-blended yarn spinning, based on rotor spinning principles. First, w…
View article: MB-AGCL: multi-behavior adaptive graph contrast learning for recommendation
MB-AGCL: multi-behavior adaptive graph contrast learning for recommendation Open
Graph Convolutional Networks (GCNs) have achieved remarkable success in recommendation systems by leveraging higher-order neighborhoods. In recent years, multi-behavior recommendation has addressed the challenges of data sparsity and cold …
View article: Robust tetra‐armed poly (ethylene glycol)‐based hydrogel as tissue bioadhesive for the efficient repair of meniscus tears
Robust tetra‐armed poly (ethylene glycol)‐based hydrogel as tissue bioadhesive for the efficient repair of meniscus tears Open
Repair and preservation of the injured meniscus has become paramount in clinical practice. However, the complexities of various clinic stitching techniques for meniscus repair pose challenges for grassroots doctors. Hence, there is a compe…
View article: A Secure and Efficient Authentication Scheme for Large-Scale IoT Devices Based on Zero-Knowledge Proof
A Secure and Efficient Authentication Scheme for Large-Scale IoT Devices Based on Zero-Knowledge Proof Open
Current authentication schemes based on zero-knowledge proof (ZKP) still face issues such as high computation costs, low efficiency, and security assurance difficulty. Therefore, we propose a secure and efficient authentication scheme (SEA…
View article: An efficient segment anything model for the segmentation of medical images
An efficient segment anything model for the segmentation of medical images Open
This paper introduces the efficient medical-images-aimed segment anything model (EMedSAM), addressing the high computational demands and limited adaptability of using SAM for medical image segmentation tasks. We present a novel, compact im…
View article: Effects of higher femoral tunnels on clinical outcomes, MRI, and second-look findings in double-bundle anterior cruciate ligament reconstruction with a minimal 5-year follow-up
Effects of higher femoral tunnels on clinical outcomes, MRI, and second-look findings in double-bundle anterior cruciate ligament reconstruction with a minimal 5-year follow-up Open
Background: To perform anatomical anterior cruciate ligament reconstruction (ACLR), tunnels should be placed relatively higher in the femoral anterior cruciate ligament (ACL) footprint based on the findings of direct and indirect femoral i…
View article: Do minimally invasive approaches affect long-term clinical outcomes of total knee arthroplasty? A cohort analysis with a minimum 10-year follow-up
Do minimally invasive approaches affect long-term clinical outcomes of total knee arthroplasty? A cohort analysis with a minimum 10-year follow-up Open
To the Editor: Total knee arthroplasty (TKA) is a safe and effective treatment for patients with end-stage knee osteoarthritis, with the conventional medial parapatellar (MP) approach for TKA, good visualization of the knee can be obtained…
View article: Community Governance Based on Sentiment Analysis: Towards Sustainable Management and Development
Community Governance Based on Sentiment Analysis: Towards Sustainable Management and Development Open
The promotion of community governance by digital means is an important research topic in developing smart cities. Currently, community governance is mostly based on reactive response, which lacks timely and proactive technical means for em…
View article: K-Anonymity Privacy Protection Algorithm for Multi-Dimensional Data against Skewness and Similarity Attacks
K-Anonymity Privacy Protection Algorithm for Multi-Dimensional Data against Skewness and Similarity Attacks Open
Currently, a significant focus has been established on the privacy protection of multi-dimensional data publishing in various application scenarios, such as scientific research and policy-making. The K-anonymity mechanism based on clusteri…
View article: Construction of grid color mixture model of seven primary-color and modified Stearns-Noechel color matching algorithm for color prediction of full-color-gamut rotor melange yarn
Construction of grid color mixture model of seven primary-color and modified Stearns-Noechel color matching algorithm for color prediction of full-color-gamut rotor melange yarn Open
In this paper, the full-color-gamut grid color mixture model containing 601 grid points is constructed by ternary double coupling blending of seven primary-color fibers, and the spinning method of full-color-gamut melange yarn is given by …
View article: Game theory attack pricing for mining pools in blockchain-based IoT
Game theory attack pricing for mining pools in blockchain-based IoT Open
The malicious mining pool can sacrifice part of its revenue to employ the computing power of blockchain network. The employed computing power carries out the pool mining attacks on the attacked mining pool. To realize the win-win game betw…
View article: A Novel Data-Driven Evaluation Framework for Fork after Withholding Attack in Blockchain Systems
A Novel Data-Driven Evaluation Framework for Fork after Withholding Attack in Blockchain Systems Open
In the blockchain system, mining pools are popular for miners to work collectively and obtain more revenue. Nowadays, there are consensus attacks that threaten the efficiency and security of mining pools. As a new type of consensus attack,…
View article: FAWPA: A FAW Attack Protection Algorithm Based on the Behavior of Blockchain Miners
FAWPA: A FAW Attack Protection Algorithm Based on the Behavior of Blockchain Miners Open
Blockchain has become one of the key techniques for the security of the industrial internet. However, the blockchain is vulnerable to FAW (Fork after Withholding) attacks. To protect the industrial internet from FAW attacks, this paper pro…
View article: A survey on blockchain systems: Attacks, defenses, and privacy preservation
A survey on blockchain systems: Attacks, defenses, and privacy preservation Open
Owing to the incremental and diverse applications of cryptocurrencies and the continuous development of distributed system technology, blockchain has been broadly used in fintech, smart homes, public health, and intelligent transportation …
View article: Surgical treatment for acquired tracheoesophageal fistula complicated with tracheal stenosis using endoscopic liner cutter staplers: a case report
Surgical treatment for acquired tracheoesophageal fistula complicated with tracheal stenosis using endoscopic liner cutter staplers: a case report Open
: Acquired tracheoesophageal fistula (ATEF) results from an abnormal communication between the trachea and esophagus due to some acquired factors. Treatment for ATEF includes fistula resection combined with tracheal and esophageal reconstr…
View article: An Improved Feature Parameter Extraction Algorithm of Composite Detection Method Based on the Fusion Theory
An Improved Feature Parameter Extraction Algorithm of Composite Detection Method Based on the Fusion Theory Open
An improved feature parameter extraction algorithm is proposed in this study to solve the problem of quantitative detection of subsurface defects. Firstly, the common feature parameters from the differential signal of pulsed eddy current a…
View article: AI‐Driven Multiobjective Scheduling Algorithm of Flood Control Materials Based on Pareto Artificial Bee Colony
AI‐Driven Multiobjective Scheduling Algorithm of Flood Control Materials Based on Pareto Artificial Bee Colony Open
Considering the competition between rescue points, we use artificial intelligence (AI) driven Internet of Thing (IoT) and regional material storage data to propose a multiobjective scheduling algorithm of flood control materials based on P…
View article: Mining Revenue Optimization Algorithm of Miners in PoW-based Blockchain Networks
Mining Revenue Optimization Algorithm of Miners in PoW-based Blockchain Networks Open
In order to improve the revenues of attack mining pools and miners under block withholding attack, we propose the mining revenue optimization algorithm (MROA) of miners in PoW-based blockchain network. MROA establishes the revenue optimiza…
View article: Discovery of Selenocysteine as a Potential Nanomedicine Promotes Cartilage Regeneration With Enhanced Immune Response by Text Mining and Biomedical Databases
Discovery of Selenocysteine as a Potential Nanomedicine Promotes Cartilage Regeneration With Enhanced Immune Response by Text Mining and Biomedical Databases Open
We identified eight hub genes that could work as prospective biomarkers for the diagnostic and biomaterial drug treatment of cartilage lesion, involving the novel genes CAMP, DEFA3, TOLLIP, HLA-DQA2, SLC38A6, SLC3A1, FAM20A, and ANO8. Mean…
View article: Data Collection Algorithm of a 3D Wireless Sensor Network That Weighs Node Coverage Rate and Lifetime
Data Collection Algorithm of a 3D Wireless Sensor Network That Weighs Node Coverage Rate and Lifetime Open
Considering the movement of a sink node in this study to solve the data transmission problem of sensor nodes in a 3D network environment, we propose a Data Collection Algorithm of a 3D wireless sensor network (DCA_3D) that weighs node cove…
View article: A Prediction Method Based on Improved Echo State Network for COVID-19 Nonlinear Time Series
A Prediction Method Based on Improved Echo State Network for COVID-19 Nonlinear Time Series Open
This paper proposes a prediction method based on improved Echo State Network for COVID-19 nonlinear time series, which improves the Echo State Network from the reservoir topology and the output weight matrix, and adopt the ABC (Artificial …
View article: A Novel Computing Power Allocation Algorithm for Blockchain System in Multiple Mining Pools Under Withholding Attack
A Novel Computing Power Allocation Algorithm for Blockchain System in Multiple Mining Pools Under Withholding Attack Open
To overcome the fast-changing block withholding attacks among multiple mining pools composed of miners in the blockchain system, this paper proposes a mining pool computing power allocation (MPPA) algorithm, which significantly improves th…