Chao Liu

ORCID: 0000-0001-9486-6742
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Digital Holography and Microscopy
  • Complex Network Analysis Techniques
  • Advanced Computational Techniques and Applications
  • Advanced Authentication Protocols Security
  • Sustainable Supply Chain Management
  • Construction Project Management and Performance
  • Optical measurement and interference techniques
  • User Authentication and Security Systems
  • FinTech, Crowdfunding, Digital Finance
  • Advanced Decision-Making Techniques
  • Virtual Reality Applications and Impacts
  • Game Theory and Applications
  • Complex Systems and Time Series Analysis
  • Advanced Vision and Imaging
  • Advanced Optical Imaging Technologies
  • Metaheuristic Optimization Algorithms Research
  • Experimental Behavioral Economics Studies
  • Environmental Sustainability in Business
  • Software Engineering Research
  • Team Dynamics and Performance
  • Financial Risk and Volatility Modeling
  • Energy, Environment, Economic Growth
  • Multi-Criteria Decision Making
  • Advanced Technologies in Various Fields
  • Augmented Reality Applications

Beijing University of Technology
2010-2024

Zhejiang University
2023-2024

State Grid Corporation of China (China)
2021

King University
2021

Shanghai University
2021

Beijing Normal University
2020

Chinese Institute for Brain Research
2020

Chongqing Jiaotong University
2020

University of Maryland, Baltimore
2019

Institute of Information Engineering
2019

Mining subtopics from weblogs and analyzing their spatiotemporal patterns have applications in multiple domains. In this paper, we define the novel problem of mining theme propose a probabilistic approach to model subtopic themes simultaneously. The proposed discovers by (1) extracting common weblogs; (2) generating life cycles for each given location; (3) snapshots time period. Evolution can be discovered comparative analysis snapshots. Experiments on three different data sets show that...

10.1145/1135777.1135857 article EN 2006-05-23

Previous chapter Next Full AccessProceedings Proceedings of the 2005 SIAM International Conference on Data Mining (SDM)Mining Behavior Graphs for "Backtrace" Noncrashing BugsChao Liu, Xifeng Yan, Hwanjo Yu, Jiawei Han, and Philip S. YuChao Yupp.286 - 297Chapter DOI:https://doi.org/10.1137/1.9781611972757.26PDFBibTexSections ToolsAdd to favoritesExport CitationTrack CitationsEmail SectionsAboutAbstract Analyzing executions a buggy software program is essentially data mining process. Although...

10.1137/1.9781611972757.26 article EN 2005-01-09

Fast and noise-suppressed incoherent coded aperture correlation holographic imaging is proposed, which utilized by employing an annular sparse phase mask together with adaptive phase-filter cross-correlation reconstruction method. Thus the proposed technique here coined as interferenceless holography (AI-COACH). In AI-COACH, first designed generated Gerchberg-Saxton algorithm for suppressing background noise during reconstruction. order to demonstrate three-dimensional sectional capabilities...

10.1364/oe.418918 article EN cc-by Optics Express 2021-02-23

With the rapid depletion of fossil fuels and increasing concern about climate change, photovoltaic systems have become a key technology option for realizing decarbonized power sector sustainable energy supply. The global trade in cells has increased dramatically last two decades deserves dedicated investigation. First, from static analysis perspective, this study builds cell network competition 2000 to 2019 analyzes characteristics pattern trade. Second, dynamic potential impacts coronavirus...

10.1016/j.apenergy.2021.116744 article EN cc-by Applied Energy 2021-03-12

Evolutionary algorithms have shown their promise in coping with many-objective optimization problems. However, the strategies of balancing convergence and diversity effectiveness handling problems irregular Pareto fronts (PFs) are still far from perfect. To address these issues, this paper proposes an adaptive sorting-based evolutionary algorithm based on idea decomposition. First, we propose environmental selection strategy. Solutions each subpopulation (partitioned by reference vectors)...

10.1109/tevc.2018.2848254 article EN IEEE Transactions on Evolutionary Computation 2018-06-18

With respect to multicriteria group decision‐making (MCGDM) problems in which the experts have different priority levels, criteria values are form of Pythagorean fuzzy uncertain linguistic variables (PFULVs), and information about weights is completely unknown, a novel method developed. Firstly, concept PFULV defined, some operational laws, score function, accuracy normalized Hamming distance PFULVs presented. Then, aggregate given by all experts, prioritized weighted averaging aggregation...

10.1155/2017/6414020 article EN cc-by Mathematical Problems in Engineering 2017-01-01

Drawing on the identity perspective, we investigate roles of organizational and moral identification in relationship between abusive supervision subordinates' deviance. By conducting a multiwave study 182 subordinate–supervisor dyads, found that partially mediated deviance after controlling for perceived leader social support as an alternative mediator. In addition, demonstrated interacted with affecting workplace moderated indirect effect via identification. However, did not find mediating...

10.1080/09585192.2018.1511613 article EN The International Journal of Human Resource Management 2018-12-28

10.1016/j.physa.2019.122980 article EN publisher-specific-oa Physica A Statistical Mechanics and its Applications 2019-09-26

Lwamo et al. recently proposed a robust and efficient remote single multi-server biometric authentication scheme using smart card RSA. The is vulnerable to the lost attacks; therefore, cannot resist offline guessing attacks user impersonation attacks, provide forward security anonymity. To address these issues, we propose new privacy-preserving ring learning with errors (RLWE)-based (RRBAS) for environments. RRBAS first lattice-based Security analysis show that can satisfy authenticated key...

10.1109/access.2019.2933576 article EN cc-by IEEE Access 2019-01-01

Purpose This paper aims to explore the characteristics of knowledge diffusion library and information science reveal its development trend influence on other disciplines. Design/methodology/approach Based ESI discipline classification, this measures from disciplines over last 24 years using indicators in four dimensions: breadth, intensity, speed theme diffusion. Findings The results show that breadth is wide, spreading 21 disciplines; spread mainly concentrates soft or applied disciplines,...

10.1108/lht-01-2021-0016 article EN Library Hi Tech 2021-09-14

Purpose Steered by upper echelon theory, this study aims to scrutinize the prevalence of project manager demographic factors (age, education and experience) in sustainability management performance. Design/methodology/approach We used a sample 209 managers/supervisor/team leaders who were working projects China-Pakistan Economic Corridor (CPEC). Findings The results indicate that have significant influence on performance (except management. Moreover, partially mediates relationship between...

10.1108/cms-08-2021-0333 article EN Chinese Management Studies 2021-12-13

Promoting close and sustainable cooperation between schools, enterprises, government has become an important concern in many countries. Based on evolutionary game theory, this paper constructs a tripartite model of order to analyze the stability strategies different players. The results show that main factor influences schools enterprises is reward positive from sources other than government, strategy benefit under scenario where cooperate with enterprises. Therefore, should focus...

10.20944/preprints202309.0492.v1 preprint EN 2023-09-07

Conventional research on P2P incentive mechanism is based cooperative or non-cooperative game theory. This paper assumes the node in system limited rationality, using evolutionary theory to study mechanism, we first investigate individual population model and replicator dynamics. Mathematics analysis numerical result shows that stable when plays as designed. Then condition with migration ability. We assume divided into different subpopulation according dynamic property, dynamics, prove even...

10.1109/wicom.2008.799 article EN 2008-10-01

Virtual instrument system has received amounts of attention and become a common practice in many fields. is program that implements functions an by software which could replace the work real to save resources. The these systems are limited they commonly have little related information about sensors, navigation, monitoring objects due special requirements. procedure development integration often suffers from low efficiency because non-standard technologies. In this paper, we propose complex...

10.1109/i2mtc.2013.6555480 article EN 2022 IEEE International Instrumentation and Measurement Technology Conference (I2MTC) 2013-05-01

There have been more than 12 million open source software in GitHub so far, but the existing studies about sentiments analysis are not sufcient for GitHub. This paper proposes an approach to analyze correlation of comment and bug fixing speed. It's proved existence certain factors among some relevance after experiments. The experimental results also give suggestions on development process.

10.1109/apsecw.2017.13 article EN 2017-12-01

In this paper, we establish a Bernstein-type inequality for widely orthant dependent random variables, and obtain the rates of strong convergence kernel estimators density hazard functions, under some suitable conditions.

10.1186/s13660-018-1659-1 article EN cc-by Journal of Inequalities and Applications 2018-04-03

Named Entity Recognition (NER) is a basic task of natural language processing and an indispensable part machine translation, knowledge mapping other fields. In this paper, fusion model Chinese named entity recognition using BERT, Bidirectional LSTM (BiLSTM) Conditional Random Field (CRF) proposed. model, BERT generates word vectors as embedding model. Word through BiLSTM can learn the label distribution. Finally, uses Fields to make syntactic restrictions at sentence level get annotation...

10.1145/3404555.3404563 article EN 2020-04-23
Coming Soon ...