Yu‐Jin Zhang
YOU?
Author Swipe
View article: Correlation analysis between the mDIXON-quant fat quantification parameters of the infrapatellar fat pad and the severity of knee osteoarthritis
Correlation analysis between the mDIXON-quant fat quantification parameters of the infrapatellar fat pad and the severity of knee osteoarthritis Open
The PDFF of the infrapatellar fat pad is significantly associated with KOA severity, demonstrating a progressive decrease as the disease advances. These findings suggest that PDFF holds promise as a potential objective biomarker for evalua…
View article: Multiview vision-language interaction for multimodal media content manipulation detection and localization
Multiview vision-language interaction for multimodal media content manipulation detection and localization Open
View article: Discovery of Late Permian Adakite in Eastern Central Asian Orogenic Belt: Implications for Tectonic Evolution of Paleo-Asian Ocean
Discovery of Late Permian Adakite in Eastern Central Asian Orogenic Belt: Implications for Tectonic Evolution of Paleo-Asian Ocean Open
The Permian to Triassic period represents a pivotal phase in the evolution of the Paleo-Asian Ocean, marked by significant tectonic transitions from subduction, collision, and post-orogenic extension. The timing of closure of the Paleo-Asi…
View article: Volcanic Age and Geochemistry of the Permian Linxi Formation in Northeast China: Implications for the Tectonic Evolution of the Paleo-Asian Ocean
Volcanic Age and Geochemistry of the Permian Linxi Formation in Northeast China: Implications for the Tectonic Evolution of the Paleo-Asian Ocean Open
The tectonic evolution of the Paleo-Asian Ocean (PAO) has been well studied, including its gradual narrowing and closure by subduction. However, aspects of the tectonic evolution of the oceanic domain remain unclear, including the exact ti…
View article: A Feature-Trajectory-Smoothed High-Speed Model for Video Anomaly Detection
A Feature-Trajectory-Smoothed High-Speed Model for Video Anomaly Detection Open
High-speed detection of abnormal frames in surveillance videos is essential for security. This paper proposes a new video anomaly–detection model, namely, feature trajectory–smoothed long short-term memory (FTS-LSTM). This model trains an …
View article: Discovery of about 2.5 Ga zircon U-Pb age from the diabase, Ar Horqin Banner Area, Inner Mongolia: Implications for Neoarchaean crystalline basement of Bainaimiao Arc Belt
Discovery of about 2.5 Ga zircon U-Pb age from the diabase, Ar Horqin Banner Area, Inner Mongolia: Implications for Neoarchaean crystalline basement of Bainaimiao Arc Belt Open
View article: Analysis of the Problems and Policy Suggestions of China's Macroeconomics Based on the Theory of Short-Term Economic Fluctuation and Numerical Simulation with Matlab
Analysis of the Problems and Policy Suggestions of China's Macroeconomics Based on the Theory of Short-Term Economic Fluctuation and Numerical Simulation with Matlab Open
With the arrival of the "14th Five-Year Plan", China's economy has ushered in new opportunities but it is facing great challenges at the same time. According to the short-term economic fluctuation theory, through the visual chart study of …
View article: Tectonic attributes of the northern Solonker-Linxi suture zone: Constraints from the Shoushangou Formation metamorphosed sedimentary rocks and its andesite lenticle in northern Jarud Banner, Inner Mongolia
Tectonic attributes of the northern Solonker-Linxi suture zone: Constraints from the Shoushangou Formation metamorphosed sedimentary rocks and its andesite lenticle in northern Jarud Banner, Inner Mongolia Open
本文选择扎鲁特旗北部达巴艾勒地区出露的一套下二叠统寿山沟组变沉积岩及其安山岩透镜体作为研究对象,在野外地质调查的基础上,通过岩相学、年代学、岩石地球化学等方面的系统研究,深入探讨索伦-林西缝合带北缘晚古生代的构造属性。下二叠统寿山沟组变质沉积岩LA-ICP-MS锆石U-Pb测年结果显示其最小峰值年龄为282.3±4.2Ma和285.9±5.6Ma,限定了沉积下限为早二叠世,另外还含有少量400~500Ma以及个别700~800Ma、1700Ma的单颗粒碎屑锆石年龄,表明其物…
View article: losure time of the eastern Paleo-Asian Ocean: Constraint from Permian-Triassic strata and detrital zircon geochronology at southern Great Xing'an Mountains, Inner Mongolia (China)
losure time of the eastern Paleo-Asian Ocean: Constraint from Permian-Triassic strata and detrital zircon geochronology at southern Great Xing'an Mountains, Inner Mongolia (China) Open
古亚洲洋东段的具体闭合时限长期以来存在争议,重要原因在于缺乏相应时期的典型沉积剖面研究。近期,笔者在大兴安岭南段阿鲁科尔沁旗地区新发现一套保存较好的二叠-三叠系沉积序列,其详细记录了古亚洲洋闭合过程。本文以此为研究对象,重点对上二叠统林西组和下三叠统老龙头组开展沉积学和碎屑锆石年代学研究。上二叠统林西组上部为一套湖泊相沉积,下三叠统老龙头组为一套河湖相沉积,底部为冲积扇辫状河砾岩层。两套地层界线附近沉积环境发生剧变,气候从温暖湿润转变为炎热干旱,确定研究区林西组沉积时代为晚…
View article: Author response for "Recognition of Late Carboniferous arc‐related volcanic rocks from Ongniud Banner, southeastern Inner Mongolia: Evidence of southward subduction and implication of closure time for Palaeo‐Asian Ocean"
Author response for "Recognition of Late Carboniferous arc‐related volcanic rocks from Ongniud Banner, southeastern Inner Mongolia: Evidence of southward subduction and implication of closure time for Palaeo‐Asian Ocean" Open
Get your research seenMake an impact with these nine promotional tools. SEO• Use relevant keywords to make your title and abstract clear and easy to search for.• Off-page SEO strategies, like link building, can help get your paper seen. Co…
View article: Paleozoic tectonic evolution of the eastern Central Asian Orogenic Belt in NE China
Paleozoic tectonic evolution of the eastern Central Asian Orogenic Belt in NE China Open
The eastern Central Asian Orogenic Belt (CAOB) in NE China is a key area for investigating continental growth. However, the complexity of its Paleozoic geological history has meant that the tectonic development of this belt is not fully un…
View article: Large depth-of-field three-dimensional shape measurement with the focal sweep technique
Large depth-of-field three-dimensional shape measurement with the focal sweep technique Open
Three-dimensional (3D) shape measurement based on the fringe projection technique has been extensively used for scientific discoveries and industrial practices. Yet, one of the most challenging issues is its limited depth of field (DOF). T…
View article: MRI Reconstruction with Interpretable Pixel-Wise Operations Using Reinforcement Learning
MRI Reconstruction with Interpretable Pixel-Wise Operations Using Reinforcement Learning Open
Compressed sensing magnetic resonance imaging (CS-MRI) is a technique aimed at accelerating the data acquisition of MRI. While down-sampling in k-space proportionally reduces the data acquisition time, it results in images corrupted by ali…
View article: A Promotion Method for Generation Error Based Video Anomaly Detection
A Promotion Method for Generation Error Based Video Anomaly Detection Open
Surveillance video anomaly detection is to detect events that rarely or never happened in a certain scene. The generation error (GE)-based methods exhibit excellent performance on this task. They firstly train a generative neural network (…
View article: A Boost Strategy to the Generative Error Based Video Anomaly Detection Algorithms
A Boost Strategy to the Generative Error Based Video Anomaly Detection Algorithms Open
Surveillance video anomaly detection is to detect events that rarely or never happened in a certain scene. The generation error (GE)-based methods exhibit excellent performance on this task. They firstly train a generative neural network (…
View article: Behavioral Security in Covert Communication Systems
Behavioral Security in Covert Communication Systems Open
The purpose of the covert communication system is to implement the communication process without causing third party perception. In order to achieve complete covert communication, two aspects of security issues need to be considered. The f…
View article: Large depth-of-field 3D shape measurement using an electrically tunable lens
Large depth-of-field 3D shape measurement using an electrically tunable lens Open
The state-of-the-art 3D shape measurement system has rather shallow working volume due to the limited depth-of-field (DOF) of conventional lens. In this paper, we propose to use the electrically tunable lens to substantially enlarge the DO…
View article: Real-Time Steganalysis for Stream Media Based on Multi-channel Convolutional Sliding Windows
Real-Time Steganalysis for Stream Media Based on Multi-channel Convolutional Sliding Windows Open
Previous VoIP steganalysis methods face great challenges in detecting speech signals at low embedding rates, and they are also generally difficult to perform real-time detection, making them hard to truly maintain cyberspace security. To s…
View article: A Lifting Method for Generation Error Based Video Anomaly Detection.
A Lifting Method for Generation Error Based Video Anomaly Detection. Open
View article: Automatically Generate Steganographic Text Based on Markov Model and Huffman Coding
Automatically Generate Steganographic Text Based on Markov Model and Huffman Coding Open
Steganography, as one of the three basic information security systems, has long played an important role in safeguarding the privacy and confidentiality of data in cyberspace. The text is the most widely used information carrier in people'…
View article: TS-CNN: Text Steganalysis from Semantic Space Based on Convolutional Neural Network
TS-CNN: Text Steganalysis from Semantic Space Based on Convolutional Neural Network Open
Steganalysis has been an important research topic in cybersecurity that helps to identify covert attacks in public network. With the rapid development of natural language processing technology in the past two years, coverless steganography…
View article: AAG-Stega: Automatic Audio Generation-based Steganography
AAG-Stega: Automatic Audio Generation-based Steganography Open
Steganography, as one of the three basic information security systems, has long played an important role in safeguarding the privacy and confidentiality of data in cyberspace. Audio is one of the most common means of information transmissi…
View article: Study on Classification of Interrogative Words and Interrogative Pronouns -- The Excavated and Transmitted Warring States Literature
Study on Classification of Interrogative Words and Interrogative Pronouns -- The Excavated and Transmitted Warring States Literature Open
In order to deepen the description and analysis of the Chinese interrogative words and their sentence patterns in the warring states period, We carry out the story on the basis of unearthed literature corpus of the warring stats period, an…
View article: Image Captioning with Object Detection and Localization
Image Captioning with Object Detection and Localization Open
Automatically generating a natural language description of an image is a task close to the heart of image understanding. In this paper, we present a multi-model neural network method closely related to the human visual system that automati…
View article: Creating Interactive Behaviors in Early Sketch by Recording and Remixing Crowd Demonstrations
Creating Interactive Behaviors in Early Sketch by Recording and Remixing Crowd Demonstrations Open
In the early stages of designing graphical user interfaces (GUIs), the look (appearance) can be easily presented by sketching, but the feel (interactive behaviors) cannot, and often requires an accompanying description of how it works (Mye…
View article: The Retrospect and the Prospect of a Research on Pronouns in Excavated Materials of the Warring States
The Retrospect and the Prospect of a Research on Pronouns in Excavated Materials of the Warring States Open
Nowadays, the grammatical study in excavated materials has been attracting more attention of scholars.This article, based on the differences of the corpus of researchers, reviews the studies according to pronouns in Excavated Materials of …
View article: A Deep and Autoregressive Approach for Topic Modeling of Multimodal Data
A Deep and Autoregressive Approach for Topic Modeling of Multimodal Data Open
Topic modeling based on latent Dirichlet allocation (LDA) has been a framework of choice to deal with multimodal data, such as in image annotation tasks. Another popular approach to model the multimodal data is through deep neural networks…
View article: A Locality Preserving Approach for Kernel PCA
A Locality Preserving Approach for Kernel PCA Open