Zifei Ma

ORCID: 0000-0001-6793-8990
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Software Engineering Research
  • Cloud Data Security Solutions
  • Software Engineering Techniques and Practices
  • Advanced Decision-Making Techniques
  • Software System Performance and Reliability
  • Topic Modeling
  • IoT and Edge/Fog Computing
  • Business Process Modeling and Analysis
  • Multi-Criteria Decision Making
  • Plant Pathogens and Fungal Diseases
  • Plant Disease Management Techniques
  • Genetic Mapping and Diversity in Plants and Animals
  • Smart Agriculture and AI
  • Traffic Prediction and Management Techniques
  • Web Data Mining and Analysis
  • Digital Transformation in Industry
  • Service-Oriented Architecture and Web Services
  • Environmental Monitoring and Data Management
  • Spectroscopy and Chemometric Analyses
  • Advanced Technologies in Various Fields
  • Advanced Technology in Applications
  • Vehicle License Plate Recognition
  • Water Quality Monitoring Technologies
  • Cloud Computing and Resource Management
  • Maritime Navigation and Safety

Yunnan University
2016-2024

Yunnan Agricultural University
2021-2024

Hebei Agricultural University
2020

In traffic accident, an accurate and timely severity prediction method is necessary for the successful deployment of intelligent transportation system to provide corresponding levels medical aid in a manner. The existing accident's methods mainly use shallow models statistical models. To promote accuracy, novel prediction-convolutional neural network (TASP-CNN) model proposed that considers combination relationships among features. Based on weights features, feature matrix gray image (FM2GI)...

10.1109/access.2019.2903319 article EN cc-by-nc-nd IEEE Access 2019-01-01

Digital twin technology, a new type of digital technology emerging in recent years, realizes real-time simulation, prediction and optimization by digitally modeling the physical world, providing idea method for design, operation management water conservancy projects, which is great significance realization transformation informatization to intelligent conservancy. In view this, this paper systematically discusses concept development history smart conservancy, compares its differences with...

10.3390/w16142038 article EN Water 2024-07-18

Summary Cloud services are open, shared, and complex. These characteristics will lead to many security risks affect the development of cloud services. Therefore, it is necessary identify measure However, there still deficiencies in this area. In light this, paper carries out an in‐depth study from perspective technical risk. Firstly, combines three aspects on service problems, objectives, technologies. It attempts explore technological solutions get risk problems achieve expected goals,...

10.1002/cpe.6423 article EN Concurrency and Computation Practice and Experience 2021-07-26

Crop diseases pose a major threat to agricultural production, quality, and sustainable development, highlighting the importance of early disease risk prediction for effective control. Tea anthracnose can easily occur in Yunnan under high-temperature high-humidity environments, which seriously affects ecosystem tea gardens. Therefore, establishment accurate, non-destructive, rapid models has positive impact on conservation biodiversity plantations. Because linear relationship between...

10.3390/agronomy14071501 article EN cc-by Agronomy 2024-07-10

A digital twin is a new trend in the development of current smart water conservancy industry. The main research content intelligent clarified. This paper first summarizes and combs relevant system architecture conservancy, puts forward framework based on twins, highlighting characteristics virtual real interaction, symbiosis platform. Secondly, status quo “sky, air, ground water” integrated monitoring technology, big data artificial intelligence, model platform knowledge graph security...

10.3390/app14177809 article EN cc-by Applied Sciences 2024-09-03

Deep learning models are widely used in crop leaf disease image recognition. These can be divided into two categories: global model and local model. The directly takes the whole images as input to training It achieve end-to-end recognition, which is very convenient use. But this kind of cannot accurately completely extract features from small diseased spots image. Before recognizing, needs part by segmentation technology. Then Features extracted more accurate complete. will bring additional...

10.1155/2022/2948506 article EN Mathematical Problems in Engineering 2022-04-25

The abundance of event data in current software configuration management systems makes it possible to discover process models automatically by using actual observed behavior. However, traditional mining algorithms cannot be applied logs recorded (SCM) systems, such as SVN, because missing activity attributes. To address this problem, a classifier is proposed build event-activity mapping relationships from development streams, revealing attributes and associating the original SVN log....

10.1109/access.2019.2945608 article EN cc-by IEEE Access 2019-01-01

Software knowledge community contains a large scale of software entities with complex structure and rich semantic relations. Semantic relation extraction is critical task for graph construction, which has an important impact on based tasks such as document generation expert recommendation. Due to the problems entity sparsity, ambiguity, lack annotated dataset in user-generated content community, it difficult apply existing methods domain. To address these issues, we propose novel model...

10.1155/2021/7466114 article EN Scientific Programming 2021-12-22

<title>Abstract</title> The index weight determines the scientificity and rationality of comprehensive evaluation results. However, traditional calculation method, which is scored directly by decision-makers, excessively depends on degree experience knowledge accumulation decision-makers. Different decision-makers’ understandings have great differences fuzziness, makes results biased or even wrong due to influence human subjective factors. To solve this problem, paper considers that value...

10.21203/rs.3.rs-4333443/v1 preprint EN cc-by Research Square (Research Square) 2024-05-07

Urban–Rural Water supply integration is one of the effective ways to address rural drinking water safety issues. With rapid economic development and urbanization, gap between urban has become increasingly evident, areas face severe challenges such as insufficient sources substandard quality. Yunnan Province, due its unique topography natural environment, encounters numerous difficulties in promoting construction urban–rural integration, there a lack research specifically focused on...

10.3390/w16223232 article EN Water 2024-11-10

Background: Problems of cloud user privacy leaks have already hindered the further development computing, as described in various patents. Therefore, comprehensive analysis and measurement computing risks factors is an effective way to control identify risks. However, researches about this issue not yet been discovered, so relevant issues focused paper. Methods: This paper combines Analytic Hierarchy Process(AHP) with Information Entropy theory measure security computing. Results: constructs...

10.2174/2213275911666180216153940 article EN Recent Patents on Computer Science 2018-02-20

Background: Event log data generated in the software development process contains historical information and future trends activities. The mining analysis of event contribute to identify discover activities provide effective support for modeling. Methods: Firstly, a deep learning model (Word2vec) was used feature extraction vectorization logs. Then, K-means clustering algorithm measure silhouette coefficient intra-cluster SSE were effect evaluation vectorized Results: This paper obtained...

10.2174/2666255813666191204144931 article EN Recent Advances in Computer Science and Communications 2019-12-05

Background: The most important question about the application and development of cloud computing is privacy risk, as it has become key factor for users in selecting services. In order to have a better understanding resolve or make controllable an acceptable range, risk assessment very necessary. However, specialized research on not yet been found. Methods: This paper used Information Entropy Theory Fuzzy Set evaluate security risk. Results: analyzes actuality combs number risks basis digging...

10.2174/2213275911666180719121041 article EN Recent Patents on Computer Science 2018-07-20

Software is rapidly evolving and operates in a changing environment; therefore, addition to software design testing, it essential observe understand the execution behavior by modeling data recorded during of improve its reliability. The nested call relationship between methods common, but most process-mining are unable discover them, only generating flat models with low fitness. Meanwhile, easy generate “spaghetti-like” comprehensibility when dealing complex data. This paper proposes...

10.1155/2021/4788357 article EN cc-by Scientific Programming 2021-08-26

The current algorithm for detecting drift in the business process can only detect of log multi-instance. However, generated software development is mainly single-instance. Hence, this paper proposes an sudden First, we apply LDA topic model extraction to obtain Then location point single-instance be detected according change lowest frequency direct successor relation. Finally, numbers actual points were obtained by corresponding original data. Multiple sets simulated data evaluate algorithm....

10.1109/phm-besancon49106.2020.00069 article EN 2020-05-01

Abstract The text of software knowledge community contains abundant engineering field. triplet can be extracted automatically and efficiently to form the graph, which is helpful for knowledge-centric intelligent applications, such as question answering, automatic document generation expert recommendation. Most existing methods are confronted with problems task dependence entity overlap. In this paper, we propose a extraction method based on span-level contrastive learning. From level...

10.21203/rs.3.rs-2182156/v1 preprint EN cc-by Research Square (Research Square) 2022-10-24
Coming Soon ...