47 results on '"Wan, Shicheng"'
Search Results
2. Multimodal Large Language Models: A Survey
- Author
-
Wu, Jiayang, Gan, Wensheng, Chen, Zefeng, Wan, Shicheng, and Yu, Philip S.
- Subjects
Computer Science - Artificial Intelligence - Abstract
The exploration of multimodal language models integrates multiple data types, such as images, text, language, audio, and other heterogeneity. While the latest large language models excel in text-based tasks, they often struggle to understand and process other data types. Multimodal models address this limitation by combining various modalities, enabling a more comprehensive understanding of diverse data. This paper begins by defining the concept of multimodal and examining the historical development of multimodal algorithms. Furthermore, we introduce a range of multimodal products, focusing on the efforts of major technology companies. A practical guide is provided, offering insights into the technical aspects of multimodal models. Moreover, we present a compilation of the latest algorithms and commonly used datasets, providing researchers with valuable resources for experimentation and evaluation. Lastly, we explore the applications of multimodal models and discuss the challenges associated with their development. By addressing these aspects, this paper aims to facilitate a deeper understanding of multimodal models and their potential in various domains., Comment: IEEE BigData 2023. 10 pages
- Published
- 2023
3. Model-as-a-Service (MaaS): A Survey
- Author
-
Gan, Wensheng, Wan, Shicheng, and Yu, Philip S.
- Subjects
Computer Science - Artificial Intelligence - Abstract
Due to the increased number of parameters and data in the pre-trained model exceeding a certain level, a foundation model (e.g., a large language model) can significantly improve downstream task performance and emerge with some novel special abilities (e.g., deep learning, complex reasoning, and human alignment) that were not present before. Foundation models are a form of generative artificial intelligence (GenAI), and Model-as-a-Service (MaaS) has emerged as a groundbreaking paradigm that revolutionizes the deployment and utilization of GenAI models. MaaS represents a paradigm shift in how we use AI technologies and provides a scalable and accessible solution for developers and users to leverage pre-trained AI models without the need for extensive infrastructure or expertise in model training. In this paper, the introduction aims to provide a comprehensive overview of MaaS, its significance, and its implications for various industries. We provide a brief review of the development history of "X-as-a-Service" based on cloud computing and present the key technologies involved in MaaS. The development of GenAI models will become more democratized and flourish. We also review recent application studies of MaaS. Finally, we highlight several challenges and future issues in this promising area. MaaS is a new deployment and service paradigm for different AI-based models. We hope this review will inspire future research in the field of MaaS., Comment: Preprint. 3 figures, 1 tables
- Published
- 2023
4. AI-Generated Content (AIGC): A Survey
- Author
-
Wu, Jiayang, Gan, Wensheng, Chen, Zefeng, Wan, Shicheng, and Lin, Hong
- Subjects
Computer Science - Artificial Intelligence ,Computer Science - Computers and Society ,Computer Science - Human-Computer Interaction - Abstract
To address the challenges of digital intelligence in the digital economy, artificial intelligence-generated content (AIGC) has emerged. AIGC uses artificial intelligence to assist or replace manual content generation by generating content based on user-inputted keywords or requirements. The development of large model algorithms has significantly strengthened the capabilities of AIGC, which makes AIGC products a promising generative tool and adds convenience to our lives. As an upstream technology, AIGC has unlimited potential to support different downstream applications. It is important to analyze AIGC's current capabilities and shortcomings to understand how it can be best utilized in future applications. Therefore, this paper provides an extensive overview of AIGC, covering its definition, essential conditions, cutting-edge capabilities, and advanced features. Moreover, it discusses the benefits of large-scale pre-trained models and the industrial chain of AIGC. Furthermore, the article explores the distinctions between auxiliary generation and automatic generation within AIGC, providing examples of text generation. The paper also examines the potential integration of AIGC with the Metaverse. Lastly, the article highlights existing issues and suggests some future directions for application., Comment: Preprint. 14 figures, 4 tables
- Published
- 2023
5. Web 3.0: The Future of Internet
- Author
-
Gan, Wensheng, Ye, Zhenqiang, Wan, Shicheng, and Yu, Philip S.
- Subjects
Computer Science - Computers and Society - Abstract
With the rapid growth of the Internet, human daily life has become deeply bound to the Internet. To take advantage of massive amounts of data and information on the internet, the Web architecture is continuously being reinvented and upgraded. From the static informative characteristics of Web 1.0 to the dynamic interactive features of Web 2.0, scholars and engineers have worked hard to make the internet world more open, inclusive, and equal. Indeed, the next generation of Web evolution (i.e., Web 3.0) is already coming and shaping our lives. Web 3.0 is a decentralized Web architecture that is more intelligent and safer than before. The risks and ruin posed by monopolists or criminals will be greatly reduced by a complete reconstruction of the Internet and IT infrastructure. In a word, Web 3.0 is capable of addressing web data ownership according to distributed technology. It will optimize the internet world from the perspectives of economy, culture, and technology. Then it promotes novel content production methods, organizational structures, and economic forms. However, Web 3.0 is not mature and is now being disputed. Herein, this paper presents a comprehensive survey of Web 3.0, with a focus on current technologies, challenges, opportunities, and outlook. This article first introduces a brief overview of the history of World Wide Web as well as several differences among Web 1.0, Web 2.0, Web 3.0, and Web3. Then, some technical implementations of Web 3.0 are illustrated in detail. We discuss the revolution and benefits that Web 3.0 brings. Finally, we explore several challenges and issues in this promising area., Comment: ACM Web Conference 2023
- Published
- 2023
6. Web3: The Next Internet Revolution
- Author
-
Wan, Shicheng, Lin, Hong, Gan, Wensheng, Chen, Jiahui, and Yu, Philip S.
- Subjects
Computer Science - Computers and Society ,Computer Science - Networking and Internet Architecture - Abstract
Since the first appearance of the World Wide Web, people more rely on the Web for their cyber social activities. The second phase of World Wide Web, named Web 2.0, has been extensively attracting worldwide people that participate in building and enjoying the virtual world. Nowadays, the next internet revolution: Web3 is going to open new opportunities for traditional social models. The decentralization property of Web3 is capable of breaking the monopoly of the internet companies. Moreover, Web3 will lead a paradigm shift from the Web as a publishing medium to a medium of interaction and participation. This change will deeply transform the relations among users and platforms, forces and relations of production, and the global economy. Therefore, it is necessary that we technically, practically, and more broadly take an overview of Web3. In this paper, we present a comprehensive survey of Web3, with a focus on current technologies, challenges, opportunities, and outlook. This article first introduces several major technologies of Web3. Then, we illustrate the type of Web3 applications in detail. Blockchain and smart contracts ensure that decentralized organizations will be less trusted and more truthful than that centralized organizations. Decentralized finance will be global, and open with financial inclusiveness for unbanked people. This paper also discusses the relationship between the Metaverse and Web3, as well as the differences and similarities between Web 3.0 and Web3. Inspired by the Maslow's hierarchy of needs theory, we further conduct a novel hierarchy of needs theory within Web3. Finally, several worthwhile future research directions of Web3 are discussed., Comment: Preprint. 5 figures, 2 tables
- Published
- 2023
7. MDL-based Compressing Sequential Rules
- Author
-
Chen, Xinhong, Gan, Wensheng, Wan, Shicheng, and Gu, Tianlong
- Subjects
Computer Science - Artificial Intelligence - Abstract
Nowadays, with the rapid development of the Internet, the era of big data has come. The Internet generates huge amounts of data every day. However, extracting meaningful information from massive data is like looking for a needle in a haystack. Data mining techniques can provide various feasible methods to solve this problem. At present, many sequential rule mining (SRM) algorithms are presented to find sequential rules in databases with sequential characteristics. These rules help people extract a lot of meaningful information from massive amounts of data. How can we achieve compression of mined results and reduce data size to save storage space and transmission time? Until now, there has been little research on the compression of SRM. In this paper, combined with the Minimum Description Length (MDL) principle and under the two metrics (support and confidence), we introduce the problem of compression of SRM and also propose a solution named ComSR for MDL-based compressing of sequential rules based on the designed sequential rule coding scheme. To our knowledge, we are the first to use sequential rules to encode an entire database. A heuristic method is proposed to find a set of compact and meaningful sequential rules as much as possible. ComSR has two trade-off algorithms, ComSR_non and ComSR_ful, based on whether the database can be completely compressed. Experiments done on a real dataset with different thresholds show that a set of compact and meaningful sequential rules can be found. This shows that the proposed method works., Comment: Preprint. 6 figures, 8 tables
- Published
- 2022
8. Metaverse in Education: Vision, Opportunities, and Challenges
- Author
-
Lin, Hong, Wan, Shicheng, Gan, Wensheng, Chen, Jiahui, and Chao, Han-Chieh
- Subjects
Computer Science - Computers and Society ,Computer Science - Databases - Abstract
Traditional education has been updated with the development of information technology in human history. Within big data and cyber-physical systems, the Metaverse has generated strong interest in various applications (e.g., entertainment, business, and cultural travel) over the last decade. As a novel social work idea, the Metaverse consists of many kinds of technologies, e.g., big data, interaction, artificial intelligence, game design, Internet computing, Internet of Things, and blockchain. It is foreseeable that the usage of Metaverse will contribute to educational development. However, the architectures of the Metaverse in education are not yet mature enough. There are many questions we should address for the Metaverse in education. To this end, this paper aims to provide a systematic literature review of Metaverse in education. This paper is a comprehensive survey of the Metaverse in education, with a focus on current technologies, challenges, opportunities, and future directions. First, we present a brief overview of the Metaverse in education, as well as the motivation behind its integration. Then, we survey some important characteristics for the Metaverse in education, including the personal teaching environment and the personal learning environment. Next, we envisage what variations of this combination will bring to education in the future and discuss their strengths and weaknesses. We also review the state-of-the-art case studies (including technical companies and educational institutions) for Metaverse in education. Finally, we point out several challenges and issues in this promising area., Comment: IEEE BigData 2022. 10 pages, 5 figures, 3 tables
- Published
- 2022
9. WS-Miner: A Fast Weighted Sequential Pattern Mining Algorithm
- Author
-
Chen, Shaotao, Chen, Jiahui, Wan, Shicheng, Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Jiming, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Li, Yong, Series Editor, Liang, Qilian, Series Editor, Martín, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Oneto, Luca, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zamboni, Walter, Series Editor, Zhang, Junjie James, Series Editor, Tan, Kay Chen, Series Editor, Lin, Jerry Chun-Wei, editor, Shieh, Chin-Shiuh, editor, Horng, Mong-Fong, editor, and Chu, Shu-Chuan, editor
- Published
- 2024
- Full Text
- View/download PDF
10. Temporal Fuzzy Utility Maximization with Remaining Measure
- Author
-
Wan, Shicheng, Ye, Zhenqiang, Gan, Wensheng, and Chen, Jiahui
- Subjects
Computer Science - Databases ,Computer Science - Artificial Intelligence - Abstract
High utility itemset mining approaches discover hidden patterns from large amounts of temporal data. However, an inescapable problem of high utility itemset mining is that its discovered results hide the quantities of patterns, which causes poor interpretability. The results only reflect the shopping trends of customers, which cannot help decision makers quantify collected information. In linguistic terms, computers use mathematical or programming languages that are precisely formalized, but the language used by humans is always ambiguous. In this paper, we propose a novel one-phase temporal fuzzy utility itemset mining approach called TFUM. It revises temporal fuzzy-lists to maintain less but major information about potential high temporal fuzzy utility itemsets in memory, and then discovers a complete set of real interesting patterns in a short time. In particular, the remaining measure is the first adopted in the temporal fuzzy utility itemset mining domain in this paper. The remaining maximal temporal fuzzy utility is a tighter and stronger upper bound than that of previous studies adopted. Hence, it plays an important role in pruning the search space in TFUM. Finally, we also evaluate the efficiency and effectiveness of TFUM on various datasets. Extensive experimental results indicate that TFUM outperforms the state-of-the-art algorithms in terms of runtime cost, memory usage, and scalability. In addition, experiments prove that the remaining measure can significantly prune unnecessary candidates during mining., Comment: Preprint. 9 figures, 11 tables
- Published
- 2022
11. Itemset Utility Maximization with Correlation Measure
- Author
-
Chen, Jiahui, Xu, Yixin, Wan, Shicheng, Gan, Wensheng, and Lin, Jerry Chun-Wei
- Subjects
Computer Science - Artificial Intelligence - Abstract
As an important data mining technology, high utility itemset mining (HUIM) is used to find out interesting but hidden information (e.g., profit and risk). HUIM has been widely applied in many application scenarios, such as market analysis, medical detection, and web click stream analysis. However, most previous HUIM approaches often ignore the relationship between items in an itemset. Therefore, many irrelevant combinations (e.g., \{gold, apple\} and \{notebook, book\}) are discovered in HUIM. To address this limitation, many algorithms have been proposed to mine correlated high utility itemsets (CoHUIs). In this paper, we propose a novel algorithm called the Itemset Utility Maximization with Correlation Measure (CoIUM), which considers both a strong correlation and the profitable values of the items. Besides, the novel algorithm adopts a database projection mechanism to reduce the cost of database scanning. Moreover, two upper bounds and four pruning strategies are utilized to effectively prune the search space. And a concise array-based structure named utility-bin is used to calculate and store the adopted upper bounds in linear time and space. Finally, extensive experimental results on dense and sparse datasets demonstrate that CoIUM significantly outperforms the state-of-the-art algorithms in terms of runtime and memory consumption., Comment: Preprint. 5 figures, 7 tables
- Published
- 2022
12. Towards Target High-Utility Itemsets
- Author
-
Miao, Jinbao, Gan, Wensheng, Wan, Shicheng, Wu, Yongdong, and Fournier-Viger, Philippe
- Subjects
Computer Science - Databases ,Computer Science - Artificial Intelligence - Abstract
For applied intelligence, utility-driven pattern discovery algorithms can identify insightful and useful patterns in databases. However, in these techniques for pattern discovery, the number of patterns can be huge, and the user is often only interested in a few of those patterns. Hence, targeted high-utility itemset mining has emerged as a key research topic, where the aim is to find a subset of patterns that meet a targeted pattern constraint instead of all patterns. This is a challenging task because efficiently finding tailored patterns in a very large search space requires a targeted mining algorithm. A first algorithm called TargetUM has been proposed, which adopts an approach similar to post-processing using a tree structure, but the running time and memory consumption are unsatisfactory in many situations. In this paper, we address this issue by proposing a novel list-based algorithm with pattern matching mechanism, named THUIM (Targeted High-Utility Itemset Mining), which can quickly match high-utility itemsets during the mining process to select the targeted patterns. Extensive experiments were conducted on different datasets to compare the performance of the proposed algorithm with state-of-the-art algorithms. Results show that THUIM performs very well in terms of runtime and memory consumption, and has good scalability compared to TargetUM., Comment: Preprint. 6 figures, 5 tables
- Published
- 2022
13. “Brick-and-mortar” structured nanofluidics with high cation flux employed for efficient osmotic energy harvesting
- Author
-
Huang, Suan, Liu, Tao, Xin, Weiwen, He, Xiaohan, Wan, Shicheng, Yang, Chaowen, Zhao, Juncheng, Shi, Liuyong, Zhou, Teng, and Wen, Liping
- Published
- 2025
- Full Text
- View/download PDF
14. Anomaly Rule Detection in Sequence Data
- Author
-
Gan, Wensheng, Chen, Lili, Wan, Shicheng, Chen, Jiahui, and Chen, Chien-Ming
- Subjects
Computer Science - Databases ,Computer Science - Artificial Intelligence - Abstract
Analyzing sequence data usually leads to the discovery of interesting patterns and then anomaly detection. In recent years, numerous frameworks and methods have been proposed to discover interesting patterns in sequence data as well as detect anomalous behavior. However, existing algorithms mainly focus on frequency-driven analytic, and they are challenging to be applied in real-world settings. In this work, we present a new anomaly detection framework called DUOS that enables Discovery of Utility-aware Outlier Sequential rules from a set of sequences. In this pattern-based anomaly detection algorithm, we incorporate both the anomalousness and utility of a group, and then introduce the concept of utility-aware outlier sequential rule (UOSR). We show that this is a more meaningful way for detecting anomalies. Besides, we propose some efficient pruning strategies w.r.t. upper bounds for mining UOSR, as well as the outlier detection. An extensive experimental study conducted on several real-world datasets shows that the proposed DUOS algorithm has a better effectiveness and efficiency. Finally, DUOS outperforms the baseline algorithm and has a suitable scalability., Comment: Preprint. 6 figures, 7 tables
- Published
- 2021
15. TargetUM: Targeted High-Utility Itemset Querying
- Author
-
Miao, Jinbao, Wan, Shicheng, Gan, Wensheng, Sun, Jiayi, and Chen, Jiahui
- Subjects
Computer Science - Databases ,Computer Science - Artificial Intelligence - Abstract
Traditional high-utility itemset mining (HUIM) aims to determine all high-utility itemsets (HUIs) that satisfy the minimum utility threshold (\textit{minUtil}) in transaction databases. However, in most applications, not all HUIs are interesting because only specific parts are required. Thus, targeted mining based on user preferences is more important than traditional mining tasks. This paper is the first to propose a target-based HUIM problem and to provide a clear formulation of the targeted utility mining task in a quantitative transaction database. A tree-based algorithm known as Target-based high-Utility iteMset querying using (TargetUM) is proposed. The algorithm uses a lexicographic querying tree and three effective pruning strategies to improve the mining efficiency. We implemented experimental validation on several real and synthetic databases, and the results demonstrate that the performance of \textbf{TargetUM} is satisfactory, complete, and correct. Finally, owing to the lexicographic querying tree, the database no longer needs to be scanned repeatedly for multiple queries., Comment: Preprint. 7 figures, 9 tables
- Published
- 2021
16. FUIM: Fuzzy Utility Itemset Mining
- Author
-
Wan, Shicheng, Gan, Wensheng, Guo, Xu, Chen, Jiahui, and Yun, Unil
- Subjects
Computer Science - Databases - Abstract
Because of usefulness and comprehensibility, fuzzy data mining has been extensively studied and is an emerging topic in recent years. Compared with utility-driven itemset mining technologies, fuzzy utility mining not only takes utilities (e.g., profits) into account, but also considers quantities of items in each transaction for discovering high fuzzy utility itemsets (HFUIs). Thus, fuzziness can be regard as a key criterion to select high-utility itemsets, while the exiting algorithms are not efficient enough. In this paper, an efficient one-phase algorithm named Fuzzy-driven Utility Itemset Miner (FUIM) is proposed to find out a complete set of HFUIs effectively. In addition, a novel compact data structure named fuzzy-list keeps the key information from quantitative transaction databases. Using fuzzy-list, FUIM can discover HFUIs from transaction databases efficiently and effectively. Both completeness and correctness of the FUIM algorithm are proved by five theorems. At last, substantial experiments test three terms (runtime cost, memory consumption, and scalability) to confirm that FUIM considerably outperforms the state-of-the-art algorithms., Comment: Preprint. 10 figures, 6 tables
- Published
- 2021
17. Huygens’ metasurface: From anomalous refraction to reflection
- Author
-
Li, Yicheng, Wan, Shicheng, Zhao, Ruiqiang, Zhu, Zheng, Li, Wenjia, Guan, Chunying, Yang, Jun, Bogdanov, Andrey, Belov, Pavel, and Shi, Jinhui
- Published
- 2024
- Full Text
- View/download PDF
18. Efficient weighted sequential pattern mining
- Author
-
Chen, Shaotao, Chen, Jiahui, and Wan, Shicheng
- Published
- 2024
- Full Text
- View/download PDF
19. THUE: Discovering Top-K High Utility Episodes
- Author
-
Wan, Shicheng, Chen, Jiahui, Gan, Wensheng, Chen, Guoting, and Goyal, Vikram
- Subjects
Computer Science - Databases - Abstract
Episode discovery from an event is a popular framework for data mining tasks and has many real-world applications. An episode is a partially ordered set of objects (e.g., item, node), and each object is associated with an event type. This episode can also be considered as a complex event sub-sequence. High-utility episode mining is an interesting utility-driven mining task in the real world. Traditional episode mining algorithms, by setting a threshold, usually return a huge episode that is neither intuitive nor saves time. In general, finding a suitable threshold in a pattern-mining algorithm is a trivial and time-consuming task. In this paper, we propose a novel algorithm, called Top-K High Utility Episode (THUE) mining within the complex event sequence, which redefines the previous mining task by obtaining the K highest episodes. We introduce several threshold-raising strategies and optimize the episode-weighted utilization upper bounds to speed up the mining process and effectively reduce the memory cost. Finally, the experimental results on both real-life and synthetic datasets reveal that the THUE algorithm can offer six to eight orders of magnitude running time performance improvement over the state-of-the-art algorithm and has low memory consumption., Comment: Preprint. 6 figures, 9 tables
- Published
- 2021
20. TOPIC: Top-k High-Utility Itemset Discovering
- Author
-
Chen, Jiahui, Wan, Shicheng, Gan, Wensheng, Chen, Guoting, and Fujita, Hamido
- Subjects
Computer Science - Databases - Abstract
Utility-driven itemset mining is widely applied in many real-world scenarios. However, most algorithms do not work for itemsets with negative utilities. Several efficient algorithms for high-utility itemset (HUI) mining with negative utilities have been proposed. These algorithms can find complete HUIs with or without negative utilities. However, the major problem with these algorithms is how to select an appropriate minimum utility (minUtil) threshold. To address this issue, some efficient algorithms for extracting top-k HUIs have been proposed, where parameter k is the quantity of HUIs to be discovered. However, all of these algorithms can solve only one part of the above problem. In this paper, we present a method for TOP-k high-utility Itemset disCovering (TOPIC) with positive and negative utility values, which utilizes the advantages of the above algorithms. TOPIC adopts transaction merging and database projection techniques to reduce the database scanning cost, and utilizes minUtil threshold raising strategies. It also uses an array-based utility technique, which calculates the utility of itemsets and upper bounds in linear time. We conducted extensive experiments on several real and synthetic datasets, and the results showed that TOPIC outperforms state-of-the-art algorithm in terms of runtime, memory costs, and scalability., Comment: Preprint. 5 figures, 11 tables
- Published
- 2021
21. PLZF protein forms a complex with protein TET1 to target TCF7L2 in undifferentiated spermatogonia
- Author
-
Du, Xiaomin, Yang, Donghui, Yu, Xiuwei, Wei, Yudong, Chen, Wenbo, Zhai, Yuanxin, Ma, Fanglin, Zhang, Mengfei, Wan, Shicheng, Li, Yunxiang, Yang, Xinchun, Aierken, Aili, Zhang, Ning, Xu, Wenjing, Meng, Yuan, Li, Na, Liao, Mingzhi, Yuan, Xiaole, Zhu, Haijing, Qu, Lei, Zhou, Na, Bai, Xue, Peng, Sha, Yang, Fan, and Hua, Jinlian
- Published
- 2024
- Full Text
- View/download PDF
22. Eif2s3y alleviated LPS-induced damage to mouse testis and maintained spermatogenesis by negatively regulating Adamts5
- Author
-
Li, Yunxiang, Wu, Wenping, Xu, Wenjing, Wang, Yuqi, Wan, Shicheng, Chen, Wenbo, Yang, Donghui, Zhang, Mengfei, Wu, Xiaojie, Yang, Xinchun, Du, Xiaomin, Wang, Congliang, Han, Miao, Chen, Yuguang, Li, Na, and Hua, Jinlian
- Published
- 2023
- Full Text
- View/download PDF
23. Fast Weighted Sequential Pattern Mining
- Author
-
Ye, Zhenqiang, Li, Ziyang, Guo, Weibin, Gan, Wensheng, Wan, Shicheng, Chen, Jiahui, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Fujita, Hamido, editor, Fournier-Viger, Philippe, editor, Ali, Moonis, editor, and Wang, Yinglin, editor
- Published
- 2022
- Full Text
- View/download PDF
24. Spliced X-box binding protein 1 (XBP1s) protects spermatogonial stem cells (SSCs) from lipopolysaccharide (LPS)-induced damage by regulating the testicular microenvironment
- Author
-
Xu, Wenjing, Yang, Yumei, Li, Yunxiang, Yang, Donghui, Wan, Shicheng, Li, Na, and Hua, Jinlian
- Published
- 2022
- Full Text
- View/download PDF
25. Fast Weighted Sequential Pattern Mining
- Author
-
Ye, Zhenqiang, primary, Li, Ziyang, additional, Guo, Weibin, additional, Gan, Wensheng, additional, Wan, Shicheng, additional, and Chen, Jiahui, additional
- Published
- 2022
- Full Text
- View/download PDF
26. A Quarterly High RFM Mining Algorithm for Big Data Management.
- Author
-
Peng, Cuiwei, Chen, Jiahui, Wan, Shicheng, and Xu, Guotao
- Subjects
CONSUMER behavior ,DATA management ,DATA mining ,VALUE (Economics) ,NUMERICAL analysis ,BIG data - Abstract
In today's highly competitive retail industry, offline stores face increasing pressure on profitability. They hope to improve their ability in shelf management with the help of big data technology. For this, on-shelf availability is an essential indicator of shelf data management and closely relates to customer purchase behavior. RFM (recency, frequency, and monetary) pattern mining is a powerful tool to evaluate the value of customer behavior. However, the existing RFM pattern mining algorithms do not consider the quarterly nature of goods, resulting in unreasonable shelf availability and difficulty in profit-making. To solve this problem, we propose a quarterly RFM mining algorithm for On-shelf products named OS-RFM. Our algorithm mines the high recency, high frequency, and high monetary patterns and considers the period of the on-shelf goods in quarterly units. We conducted experiments using two real datasets for numerical and graphical analysis to prove the algorithm's effectiveness. Compared with the state-of-the-art RFM mining algorithm, our algorithm can identify more patterns and performs well in terms of precision, recall, and F1-score, with the recall rate nearing 100%. Also, the novel algorithm operates with significantly shorter running times and more stable memory usage than existing mining algorithms. Additionally, we analyze the sales trends of products in different quarters and seasonal variations. The analysis assists businesses in maintaining reasonable on-shelf availability and achieving greater profitability. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
27. Independent control of circularly polarized light with exceptional topological phase coding metasurfaces
- Author
-
Li, Yicheng, primary, Wan, Shicheng, additional, Deng, Shaoxuan, additional, Deng, Zhengwei, additional, Lv, Bo, additional, Guan, Chunying, additional, Yang, Jun, additional, Bogdanov, Andrey, additional, Belov, Pavel, additional, and Shi, Jin-hui, additional
- Published
- 2024
- Full Text
- View/download PDF
28. Model-as-a-Service (MaaS): A Survey
- Author
-
Gan, Wensheng, primary, Wan, Shicheng, additional, and Yu, Philip S., additional
- Published
- 2023
- Full Text
- View/download PDF
29. Multimodal Large Language Models: A Survey
- Author
-
Wu, Jiayang, primary, Gan, Wensheng, additional, Chen, Zefeng, additional, Wan, Shicheng, additional, and Yu, Philip S., additional
- Published
- 2023
- Full Text
- View/download PDF
30. UCHL1 maintains microenvironmental homeostasis in goat germline stem cells
- Author
-
Yang, Donghui, primary, Zhang, Mengfei, additional, Chen, Wenbo, additional, Lu, Qizhong, additional, Wan, Shicheng, additional, Du, Xiaomin, additional, Li, Yunxiang, additional, Li, Balun, additional, Wu, Wenping, additional, Wang, Congliang, additional, Li, Na, additional, Peng, Sha, additional, Tang, Haiyang, additional, and Hua, Jinlian, additional
- Published
- 2023
- Full Text
- View/download PDF
31. Targeted High-Utility Itemset Querying
- Author
-
Miao, Jinbao, primary, Wan, Shicheng, additional, Gan, Wensheng, additional, Sun, Jiayi, additional, and Chen, Jiahui, additional
- Published
- 2023
- Full Text
- View/download PDF
32. Weighted Statistically Significant Pattern Mining
- Author
-
Zhou, Tingfu, primary, Qi, Zhenlian, additional, Gan, Wensheng, additional, Wan, Shicheng, additional, and Chen, Guoting, additional
- Published
- 2023
- Full Text
- View/download PDF
33. Eif2s3y Alleviated Damage of Mouse Testis Induced by Lps and Maintained Spermatogenesis by Negatively Regulating Adamts5
- Author
-
Li, Yunxiang, primary, Wu, Wenping, additional, Xu, Wenjing, additional, Wang, Yuqi, additional, Wan, Shicheng, additional, Chen, Wenbo, additional, Yang, Donghui, additional, Zhang, Mengfei, additional, Wu, Xiaojie, additional, Yang, Xinchun, additional, Du, Xiaomin, additional, Wang, Congliang, additional, Han, Miao, additional, Chen, Yuguang, additional, Li, Na, additional, and Hua, Jinlian, additional
- Published
- 2023
- Full Text
- View/download PDF
34. Bifunctional sensing based on an exceptional point with bilayer metasurfaces
- Author
-
Li, Yicheng, primary, Deng, Zhengwei, additional, Qin, Chunhua, additional, Wan, Shicheng, additional, Lv, Bo, additional, Guan, Chunying, additional, Yang, Jun, additional, Zhang, Shuang, additional, and Shi, Jinhui, additional
- Published
- 2022
- Full Text
- View/download PDF
35. Metaverse in Education: Vision, Opportunities, and Challenges
- Author
-
Lin, Hong, primary, Wan, Shicheng, additional, Gan, Wensheng, additional, Chen, Jiahui, additional, and Chao, Han-Chieh, additional
- Published
- 2022
- Full Text
- View/download PDF
36. Targeted Mining of Rare High-Utility Patterns
- Author
-
Zhang, Peifeng, primary, Chen, Jiahui, additional, Wan, Shicheng, additional, and Gan, Wensheng, additional
- Published
- 2022
- Full Text
- View/download PDF
37. Anomaly Rule Detection in Sequence Data
- Author
-
Gan, Wensheng, Chen, Lili, Wan, Shicheng, Chen, Jiahui, and Chen, Chien-Ming
- Abstract
Analyzing sequence data usually leads to the discovery of interesting patterns and then anomaly detection. In recent years, numerous frameworks and methods have been proposed to discover interesting patterns in sequence data as well as detect anomalous behavior. However, existing algorithms mainly focus on frequency-driven analytics, and they are challenging to be applied in real-world settings. In this work, we present a new anomaly detection framework called DUOS that enables Discovery of Utility-aware Outlier Sequential rules from a set of sequences. In this pattern-based anomaly detection algorithm, we incorporate both the anomalousness and utility of a group, and then introduce the concept of utility-aware outlier sequential rule (UOSR). We show that this is a more meaningful way for detecting anomalies. Besides, we propose some efficient pruning strategies w.r.t. upper bounds for mining UOSR, as well as the outlier detection. An extensive experimental study conducted on several real-world datasets shows that the proposed DUOS algorithm has a better effectiveness and efficiency. Finally, DUOS outperforms the baseline algorithm and has a suitable scalability.
- Published
- 2023
- Full Text
- View/download PDF
38. Fast Mining RFM Patterns for Behavioral Analytics
- Author
-
Wan, Shicheng, primary, Deng, Jieying, additional, Gan, Wensheng, additional, Chen, Jiahui, additional, and Yu, Philip S., additional
- Published
- 2022
- Full Text
- View/download PDF
39. Fuzzy Utility Mining on Temporal Data
- Author
-
Ye, Zhenqiang, primary, Wan, Shicheng, additional, Gan, Wensheng, additional, Chen, Jiahui, additional, and Tang, Linlin, additional
- Published
- 2022
- Full Text
- View/download PDF
40. Fast RFM Model for Customer Segmentation
- Author
-
Wan, Shicheng, primary, Chen, Jiahui, additional, Qi, Zhenlian, additional, Gan, Wensheng, additional, and Tang, Linlin, additional
- Published
- 2022
- Full Text
- View/download PDF
41. Discovering Top-k Profitable Patterns for Smart Manufacturing
- Author
-
Wan, Shicheng, primary, Chen, Jiahui, additional, Zhang, Peifeng, additional, Gan, Wensheng, additional, and Gu, Tianlong, additional
- Published
- 2022
- Full Text
- View/download PDF
42. Anomaly Rule Detection in Sequence Data
- Author
-
Gan, Wensheng, primary, Chen, Lili, additional, Wan, Shicheng, additional, Chen, Jiahui, additional, and Chen, Chien-Ming, additional
- Published
- 2022
- Full Text
- View/download PDF
43. Targeted High-Utility Itemset Querying
- Author
-
Miao, Jinbao, primary, Wan, Shicheng, additional, Gan, Wensheng, additional, Sun, Jiayi, additional, and Chen, Jiahui, additional
- Published
- 2021
- Full Text
- View/download PDF
44. TopHUI: Top-k high-utility itemset mining with negative utility
- Author
-
Gan, Wensheng, primary, Wan, Shicheng, additional, Chen, Jiahui, additional, Chen, Chien-Ming, additional, and Qiu, Lina, additional
- Published
- 2020
- Full Text
- View/download PDF
45. An Improved Corner Detection Algorithm Based on Harris
- Author
-
Han, Songqi, primary, Yu, Weibo, additional, Yang, Hongtao, additional, and Wan, Shicheng, additional
- Published
- 2018
- Full Text
- View/download PDF
46. [ BLOC1S1 promotes proliferation of goat spermatogonial stem cells].
- Author
-
Wan S, Zhang M, Chen W, Han M, Yang D, Wang C, Wu W, Wang Y, Li N, Zhu H, Ahmed Hamed A, and Hua J
- Subjects
- Animals, Male, Spermatogonia metabolism, Cell Proliferation, Flow Cytometry, Testis metabolism, Goats, Stem Cells
- Abstract
With the rapid development of gene editing technology, the study of spermatogonial stem cells (SSCs) holds great significance in understanding spermatogenesis and its regulatory mechanism, developing transgenic animals, gene therapy, infertility treatment and protecting rare species. Biogenesis of lysosome-related organelles complex 1 subunit 1 ( BLOC1S1 ) is believed to have anti-brucella potential. Exploring the impack of BLOC1S1 on goat SSCs not only helps investigate the ability of BLOC1S1 to promote SSCs proliferation, but also provides a cytological basis for disease-resistant breeding research. In this study, a BLOC1S1 overexpression vector was constructed by homologous recombination. The BLOC1S1 overexpression cell line of goat spermatogonial stem cells was successfully constructed by lentivirus packaging, transfection and puromycin screening. The overexpression efficiency of BLOC1S1 was found to be 18 times higher using real time quantitative PCR (RT-qPCR). Furthermore, the results from cell growth curve analysis, flow cytometry for cell cycle detection, and 5-ethynyl-2'-deoxyuridine (EdU) staining showed that BLOC1S1 significantly increased the proliferation activity of goat SSCs. The results of RT-qPCR, immunofluorescence staining and Western blotting analyses revealed up-regulation of proliferation-related genes ( PCNA , CDK2 , CCND1 ), and EIF2S3Y , a key gene regulating the proliferation of spermatogonial stem cells. These findings strongly suggest that the proliferative ability of goat SSCs can be enhanced through the EIF2S3Y/ERK pathway. In summary, this study successfully created a goat spermatogonial stem cell BLOC1S1 overexpression cell line, which exhibited improved proliferation ability. This research laid the groundwork for exploring the regulatory role of BLOC1S1 in goat spermatogonia and provided a cell platform for further study into the biological function of BLOC1S1 . These findings also establish a foundation for breeding BLOC1S1 overexpressing goats.
- Published
- 2023
- Full Text
- View/download PDF
47. Bifunctional sensing based on an exceptional point with bilayer metasurfaces.
- Author
-
Li Y, Deng Z, Qin C, Wan S, Lv B, Guan C, Yang J, Zhang S, and Shi J
- Abstract
Exceptional points (EPs), the critical phase transition points of non-Hermitian parity-time (PT) systems, exhibit many novel physical properties and associated applications, such as ultra-sensitive detection of perturbations. Here, a bilayer metasurface with two orthogonally oriented split-ring resonators (SRRs) is proposed and a phase transition of the eigenpolarization states is introduced via changing the conductivity of vanadium dioxide (VO
2 ) patch integrated into the gap of one SRR. The metasurface possesses a passive PT symmetry and an EP in polarization space is observed at a certain conductivity of the VO2 . Two sensing schemes with the metasurface are proposed to achieve high-sensitivity sensing of temperature and refractive index in the terahertz (THz) range. The metasurface is promising for applications in THz biosensing and polarization manipulation.- Published
- 2023
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.