Yufeng Zhang

ORCID: 0000-0001-8112-7617
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Software Testing and Debugging Techniques
  • Software Reliability and Analysis Research
  • Image Processing Techniques and Applications
  • Parallel Computing and Optimization Techniques
  • Neural Networks and Reservoir Computing
  • Biometric Identification and Security
  • Software System Performance and Reliability
  • Service-Oriented Architecture and Web Services
  • Advanced Fiber Optic Sensors
  • Advanced SAR Imaging Techniques
  • Advanced Software Engineering Methodologies
  • Advanced Malware Detection Techniques
  • Software Engineering Research
  • Photonic and Optical Devices
  • Optical and Acousto-Optic Technologies
  • Microwave Engineering and Waveguides
  • Advanced Neural Network Applications
  • Wireless Signal Modulation Classification
  • Radiopharmaceutical Chemistry and Applications
  • Digital Holography and Microscopy
  • Computational Physics and Python Applications
  • Dermatoglyphics and Human Traits
  • Interconnection Networks and Systems
  • Innovative Educational Techniques
  • Advanced Technologies in Various Fields

Zhejiang Business Technology Institute
2025

Yunnan University
2019-2024

Shanghai Jiao Tong University
2022-2024

Soochow University
2023

Nanjing University of Aeronautics and Astronautics
2020-2022

Hunan University
2020-2022

Chongqing Technology and Business University
2022

Aalborg University
2021

Southwest Jiaotong University
2020

Beijing University of Posts and Telecommunications
2019

Abstract Aesthetic education is a kind of inner feeling people, it can make people unconsciously produce truth-seeking, good consciousness, under the influence United States, people’s feelings, soul has been nourished, to reach perfect state. education, that is, “to educate with beauty”, profoundly affects outlook on life and values. This study explores way improve aesthetic quality college art students, based analysis current needs how innovation ability students deeply explored.

10.2478/amns-2025-0146 article EN Applied Mathematics and Nonlinear Sciences 2025-01-01

Abstract For wireless transmission, radio-frequency device anti-cloning has become a major security issue. Radio-frequency distinct native attribute (RF-DNA) fingerprint is developing technology to find the difference among RF devices and identify them. Comparing with previous research, (1) this paper proposed that mean ( μ ) feature should be added into RF-DNA fingerprint. Thus, totally four statistics (mean, standard deviation, skewness, kurtosis) were calculated on instantaneous...

10.1186/s13638-019-1544-8 article EN cc-by EURASIP Journal on Wireless Communications and Networking 2019-09-18

Inductive link prediction (ILP) is to predict links for unseen entities in emerging knowledge graphs (KGs), considering the evolving nature of KGs. A more challenging scenario that KGs consist only without any edge connected original KGs, called as disconnected (DEKGs). Existing studies DEKGs focus on predicting enclosing links, i.e., inside KG. The bridging which carry evolutionary information from KG DEKG, have not been investigated by previous work so far. To fill gap, we propose a novel...

10.1109/icde55515.2023.00036 article EN 2022 IEEE 38th International Conference on Data Engineering (ICDE) 2023-04-01

摘要 首先构造了loop代数A~2的一个新的子代数,设计了一个等谱问题.应用屠格式求出了著名的AKNS方程族的一类扩展可积模型,即可积耦合.然后将这种求可积耦合的方法一般化,可用于一大类方程族,如KN族、GJ族、WKI族等谱系的可积耦合.提出的方法具有普遍应用价值.最后作为AKNS方程族的特例,求得了KdV方程和MKdV方程的可积耦合 关键词: 可积耦合 / loop代数 AKNS方程族 Abstract Keywords: 作者及机构信息 郭福奎2, 张玉峰1 (1)大连理工大学应用数学系,大连116024; (2)山东科技大学应用数学系,泰安271019 基金项目: 国家自然科学基金 (批准号 :10 0 72 13)资助的课题~~ Authors and contacts Guo Fu-Kui2, Zhang Yu-Feng1 参考文献 施引文献

10.7498/aps.51.951 article ZH-CN cc-by Acta Physica Sinica 2002-01-01

This paper presents a method of component testing based on algebraic specifications. An algorithm for generating checkable test cases is proposed. A prototype tool called CASCAT Java Enterprise Beans developed. It has the advantages high degree automation, which include case generation, harness construction and result checking. achieves scalability by allowing incremental integration. also allows to focus subset used functions key properties, thus suitable testing. The reports an...

10.1109/icst.2008.39 article EN International Conference on Software Testing, Verification, and Validation 2008-04-01

Symbolic execution is an effective path oriented and constraint based program analysis technique. Recently, there a significant development in the research application of symbolic execution. However, still suffers from scalability problem practice, especially when applied to large-scale or very complex programs. In this paper, we propose new fashion execution, named Speculative Execution (SSE), speed up by reducing invocation times solver. SSE, encountering branch statement, search procedure...

10.1109/issre.2012.8 article EN 2012-11-01

Idiopathic inflammatory myopathies (IIMs) are a clinically heterogeneous group of immune-mediated muscle diseases characterized by weakness and multisystem involvement. Early diagnosis IIMs can contribute to better prognosis clinical management. The classifier based on deep learning framework has proven be an effective noninvasive technique for classifying from ultrasound images. However, as the availability data is always in paucity, augmentation indispensable improve classification...

10.1109/icet58434.2023.10211926 article EN 2023-05-12

Brillouin optical time-domain analyzer (BOTDA) is used to monitor the temperature and strain along a fiber. So far, neural network machine learning methods have been successfully applied for extraction. But different frequency scanning steps, networks should be designed trained. Here, BOTDA assisted by kernel extreme (K-ELM) with high generalization proposed experimentally demonstrated. By utilizing K-ELM, raw gain spectra measured from system are classified into classes. The performance of...

10.1109/jlt.2020.3035810 article EN Journal of Lightwave Technology 2020-11-04

This paper presents a service oriented architecture for testing Web Services. In this architecture, various parties interoperate with each other to complete tasks through registration, discovery and invocation. The analysis of the in typical scenario shows that it has advantages supporting dynamic invocation services as required by normal functional without compromising security, privacy intellectual property rights. It is flexible extendable. also helps reduce risk unnecessary disturbances...

10.1109/sose.2008.35 article EN 2008-12-01

Path explosion and constraint solving are two challenges to symbolic execution's scalability. Symbolic execution explores the program's path space with a searching strategy invokes underlying solver in black-box manner check feasibility of path. Inside solver, another procedure is employed prove or disprove feasibility. Hence, there exists problem double searchings execution. In this paper, we propose unify procedures improve scalability We Multiplex Execution (MuSE) that utilizes...

10.1145/3324884.3416645 article EN 2020-12-21

Due to the huge amount of collected echo data caused by working principle synthetic aperture radar (SAR), use digital processing relies heavily on performance chips. Because limitation Moore's law, technology signal exposes computing speed and power consumption in face SAR processing. Against this background, optical method based 4f system is introduced into imaging. A spatial light modulator (SLM) placed input surface spectrum load matched filter function SAR. Using Fourier transform...

10.1364/oe.471716 article EN cc-by Optics Express 2022-10-17

Electronic reconnaissance is to detect signals, extract their parameters, modulation types or direction of arrival and so on from a wide bandwidth range. It difficult for digital signal processing device process in real time under an ultra-wide environment. This paper proposed programmable optical system which can signals instantaneous up 40GHz time. In the system, are reconstructed at wavefront laser beam. The beam carrying passes through composed by lens, splitter, light modulator, etc....

10.1364/oe.460018 article EN cc-by Optics Express 2022-05-27

This paper presents a highly parallelized signal and image recognition method based on spatial optics by joint multiplexing of the position angular spectrum. By mapping different processor features into positions overlaying spectral components diffraction sources, this can simultaneously process multiple sequences using processors. Due to decimeter-scale length optical path all-optical processing flow, has nanosecond delay high-performance power consumption ratio. is strictly proven in...

10.1109/tim.2024.3398088 article EN IEEE Transactions on Instrumentation and Measurement 2024-01-01

We report a diode-end-pumped Q-switched YVO4/Nd:YVO4/YVO4 self-Raman second-Stokes laser at the wavelength of 1764 nm. With incident pump power 32 W and pulse repetition frequency 20 kHz, maximal average output nm is up to 1.18 W, with corresponding optical conversion efficiency 3.69%. The highest energy peak are 59 mJ 31.7 kW, respectively.

10.3788/col201412.s21405 article EN Chinese Optics Letters 2014-01-01

Message Passing Interfaces (MPI) plays an important role in parallel computing. Many applications are implemented as MPI programs. The existing methods of bug detection for programs have the shortage providing both input and non-determinism coverage, leading to missed bugs. In this paper, we employ symbolic execution ensure propose on-the-fly schedule algorithm reduce interleaving explorations while ensuring soundness completeness. We our approach a tool, called MPISE, which can...

10.48550/arxiv.1403.4813 preprint EN other-oa arXiv (Cornell University) 2014-01-01

Abstract This paper proposes a neural network (NN)‐based over‐the‐air (OTA) linearisation technique for highly non‐linear and wide‐band mmWave active phased array (APA) transmitter compares it with the conventional memory polynomial model (MPM)‐based technique. The proposed NN effectively learns distinctive distortions, which may not easily fit to existing MPM solutions, can, therefore, successfully cope challenges introduced by high non‐linearity wide bandwidth. has been evaluated using...

10.1049/mia2.12220 article EN IET Microwaves Antennas & Propagation 2021-12-14

In forensic investigations, images of evidence can often be obtained from crimes such as child pornography and masked violent riots. However, identifying criminals is usually very difficult sometimes impossible because these contain skin body parts, while their faces other commonly used biometrics are unavailable. Vein patterns a potential biometric to solve this problem. Traditional systems use near-infrared (NIR) imaging technologies obtain vein patterns, which cannot applied analysis...

10.1111/1556-4029.15002 article EN Journal of Forensic Sciences 2022-02-08

Symbolic execution is still facing the scalability problem caused by path explosion and constraint solving overhead. The recently proposed MuSE framework supports exploring multiple paths generating partial solutions in one time of solving. In this work, we improve from two aspects. Firstly, use a light-weight check to reduce redundant for avoiding executions having same results. Secondly, introduce online learning devise an adaptive search strategy target programs. preliminary experimental...

10.1145/3324884.3418902 article EN 2020-12-21

Biometric authentication based on the forearm is less exploited in previous studies than those finger or hand. Therefore, we propose a multimodal biometric method that combines veins and geometry of human forearm, using two features: SURF line-based feature, one feature: shape feature. The proposed introduces score-level fusion approach Cumulative Match Characteristics (CMC) curve. Weighted SUM rule z-score normalization are applied to obtain final score, optimal weights calculated by...

10.1145/3448823.3448840 article EN 2020-12-09

Symbolic execution is an effective path oriented and constraint based program analysis technique. Recently, there a significant development in the research application of symbolic execution. However, still suffers from scalability problem practice, especially when applied to large-scale or very complex programs. In this paper, we propose new fashion execution, named Speculative Execution (SSE), speed up by reducing invocation times solver. SSE, encountering branch statement, search procedure...

10.48550/arxiv.1205.4951 preprint EN cc-by-nc-sa arXiv (Cornell University) 2012-01-01

To obtain wider field of view through optical microscopes, we proposed an image mosaicing method based on the convolutional neural network (CNN). The CNN was designed to discriminate corresponding patches in a pair images. train CNN, training set that contained and their matching labels created from open-access database. pretrained then fine-tuned by self-learning target its transformed With feature points were detected for registration mosaicing. compared with scale-invariant transform...

10.1117/1.jei.28.4.043006 article EN Journal of Electronic Imaging 2019-07-11

Brillouin optical time-domain analyzer (BOTDA) assisted by echo state network (ESN) for fast and accurate temperature extraction is proposed. Compared to curve fitting methods, the processing speed of proposed ESN algorithm accelerated up 20 times. Experimental work carried out verified with good agreement simulation results.

10.1364/acpc.2020.m4a.81 article EN 2020-01-01
Coming Soon ...