- IoT and Edge/Fog Computing
- Cloud Computing and Resource Management
- Software System Performance and Reliability
- Service-Oriented Architecture and Web Services
- IoT Networks and Protocols
- Distributed and Parallel Computing Systems
- Advanced Neural Network Applications
- Energy Efficient Wireless Sensor Networks
- Semantic Web and Ontologies
- Advanced Image and Video Retrieval Techniques
- Adversarial Robustness in Machine Learning
- Interconnection Networks and Systems
- Advanced Decision-Making Techniques
- Physical Unclonable Functions (PUFs) and Hardware Security
- Image Retrieval and Classification Techniques
- Security and Verification in Computing
- Parallel Computing and Optimization Techniques
- Web Data Mining and Analysis
- Advanced Technology in Applications
- Advanced Software Engineering Methodologies
- Hand Gesture Recognition Systems
- Network Time Synchronization Technologies
- Advanced Database Systems and Queries
- Age of Information Optimization
- Video Analysis and Summarization
South China University of Technology
2012-2025
Cleveland State University
2025
University of Chinese Academy of Sciences
2023
PLA 306 Hospital
2022
Shanghai Electric (China)
2022
China Mobile (China)
2021
Wuhan Institute of Technology
2020
Nanyang Technological University
2018
Air Force Engineering University
2016
Peking University
2014
An important objective of the Semantic Web is to make Electronic Commerce interactions more flexible and automated. To achieve this, standardization ontologies, message content protocols will be necessary.In this paper we investigate how Services technologies can used support service advertisement discovery in e-commerce. In particular, describe design implementation a matchmaking prototype which uses DAML-S based ontology Description Logic reasoner compare descriptions. We also present...
Edge computing has recently emerged as an extension to cloud for quality of service (QoS) provisioning particularly delay guarantee delay-sensitive applications. By offloading the computationally intensive workloads edge servers, computation experience, e.g., network transmission and energy consumption, could be improved greatly. However, resource server is so scarce that it cannot respond quickly bursting requirements. Accordingly, queuing un-negligible in a environment, environment...
Fog computing has become the primary infrastructure on Internet for improving quality of service. We consider a fog queueing system with limited resources to accommodate real-time tasks heterogeneities in task types and execution deadlines. Owing uncertain duration, such should jointly resource allocation offloading satisfy deadline requirements. To heterogeneity, parallel virtual queue model is applied buffer each type separate queue. Subsequently, we use framework, including three...
A number of recent studies have reported the phenomenon "software aging", characterized by progressive performance degradation or a sudden hang/crash software system due to exhaustion operating resources, fragmentation and accumulation errors. To counteract this phenomenon, proactive technique called rejuvenation" has been proposed. This essentially involves stopping running software, cleaning its internal state then restarting it. Software rejuvenation, being preventive in nature, begs...
Internet services are increasingly being deployed using cloud computing. However, the workload of an service is not constant; therefore, required computing resources need to be allocated elastically minimize associated costs. Thus, this study proposes a proactive resource scheduling framework. First, we propose new prediction method—named adaptive two-stage multi-neural network based on long short-term memory (LSTM)—which can adaptively route tasks corresponding LSTM sub-model according...
Cross-site scripting (XSS) is one of the main threats Web applications, which has great harm. How to effectively detect and defend against XSS attacks become more important. Due malicious obfuscation attack codes gradual increase in number, traditional detection methods have some defects such as poor recognition codes, inadequate feature extraction low efficiency. Therefore, we present a novel approach based on attention mechanism Long Short-Term Memory (LSTM) recurrent neural network. First...
Fog computing has recently emerged as an extension of cloud in providing high-performance services for delay-sensitive Internet Things (IoT) applications. By offloading tasks to a geographically proximal fog server instead remote cloud, the delay performance can be greatly improved. However, some IoT applications may still experience considerable delays, including queuing and computation when huge amounts instantaneously feed into resource-limited node. Accordingly, cooperation among close...
Vision Transformers (ViTs) mark a revolutionary advance in neural networks with their token mixer's powerful global context capability. However, the pairwise affinity and complex matrix operations limit its deployment on resource-constrained scenarios real-time applications, such as mobile devices, although considerable efforts have been made previous works. In this paper, we introduce CAS-ViT: Convolutional Additive Self-attention Transformers, to achieve balance between efficiency...
The amphiphilic dodecylbenzenesulfonic acid (DBSA) is usually added into wells as an asphaltene precipitation inhibitor. interfacially active DBSA and asphaltenes will be both adsorbed at the oil–water interface, influencing stability of crude oil emulsions. interactive effects between on interfacial properties are investigated in this paper. First, emulsions containing prepared, followed by a bottle test. weakens emulsion migrates from to water phase through interface. Then, adsorption...
The NASA Remote Exploration and Experimentation (REE) Project, managed by the Jet Propulsion Laboratory, has vision of bringing commercial supercomputing technology into space, in a form which meets demanding environmental requirements, to enable new class science investigation discovery. Dependability goals REE system are 99% reliability over 5 years availability. In this paper we focus on reliability/availability modeling analysis system. We carry out task using fault trees, block...
Online services are now commonly deployed via cloud computing based on Infrastructure as a Service (IaaS) to Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS). However, workload is not constant over time, so guaranteeing the quality of service (QoS) resource cost-effectiveness, which determined by on-demand requirements, challenging issue. In this article, authors propose neural network-based-method termed domain knowledge embedding regularization networks (DKRNN) for large-scale...
Handwritten character recognition (HCR) is a mainstream mobile device input method that has attracted significant research interest. Although previous studies have delivered reasonable accuracy, it remains difficult to directly embed the advanced HCR service into software and obtain excellent but fast results. Cloud computing relatively new online computational resource provider which can satisfy elastic requirements of with high-recognition accuracy. However, owing delay sensitivity...
Workload prediction is important for automatic scaling of resource management, and a high accuracy workload can reduce the cost improve utilization in cloud. But, task request usually random mutation, so it difficult to achieve more accurate result single models. Thus, result, authors proposed novel two-stage model based on artificial neural networks (ANNs), which composed one classification two On basis first-order gradient feature, categorize into classes adaptively. Then, predict by using...
Aiming at the application scene with both burst signals and periodic signals, this paper proposes a cluster-based wireless sensor network MAC protocol combining TDMA, FDMA CSMA/CA - CBPMAC/TFC(a for system signals/based on FDMA, CSMA/CA). It adopts TDMA mechanism in clusters, assigns time-slots respectively. In signal time- slot, only one child node sends its signal, while time-slots, all nodes share channel according to mechanism. Among different is adopted. Different cluster works...
Web services, with an emphasis on open standards and flexibility, can provide benefits over existing capital markets integration practices. However, services must first meet certain technical requirements including performance, security so on. SOAP, based Extensible Markup Language (XML), inherits not only the advantages of XML, but its relatively poor performance. This makes SOAP a choice for many high-performance services. In this paper, we propose new approach to improve Focusing avoiding...
Abstract Time-sensitive network requires monitoring the network’s operational status in real-time and dynamically changing traffic scheduling configuration. A method that can timely obtain operation information is needed. In this paper, a for proxy hosts to send packets proposed, which enables visits collection of all switches through single packet. Then, it returns packet CNC controller processing. To verify method, TSN ring topology simulated, mainly delay each hop node. The simulation...
Deep Neural Networks exhibit inherent vulnerabilities to adversarial attacks, which can significantly compromise their outputs and reliability. While existing research primarily focuses on attacking single-task scenarios or indiscriminately targeting all tasks in multi-task environments, we investigate selectively one task while preserving performance others within a framework. This approach is motivated by varying security priorities among real-world applications, such as autonomous...
Entity relation extraction (RE) is an very important research domain in information extraction, we can regard RE as a classification problem this paper, still original study field Chinese language now, maximum entropy (ME)-based machine learning the first time to be used extract entity relations between named entities from texts, Thirteen features have been designed for which includes morphology, grammar and semantic feature. The system architecture has constructed. Experiment shows that...
This paper presents an open source tool for testing the recognition accuracy of Chinese handwriting input methods. The consists two modules, namely PC and Android mobile client. client reads handwritten samples in computer, transfers them individually to accordance with socket communication protocol. After receives data, it simulates on screen device, triggers corresponding method. is recorded by We present design principles describe implementation test platform. construct several datasets...