- Software Engineering Research
- Virtual Reality Applications and Impacts
- Physical Activity and Health
- Misinformation and Its Impacts
- Complex Network Analysis Techniques
- Artificial Intelligence in Games
- Experimental Behavioral Economics Studies
- Software Testing and Debugging Techniques
- Educational Technology and Assessment
- COVID-19 epidemiological studies
- Chronic Obstructive Pulmonary Disease (COPD) Research
- Economic theories and models
- Digital Games and Media
- Recommender Systems and Techniques
- Color perception and design
- Green IT and Sustainability
- Innovative Human-Technology Interaction
- UAV Applications and Optimization
- Maritime Navigation and Safety
- Educational Games and Gamification
- IoT Networks and Protocols
- Stock Market Forecasting Methods
- Education and Work Dynamics
- Data Visualization and Analytics
- Time Series Analysis and Forecasting
Sichuan University
2013-2025
Chengdu University
2013-2025
Harvard University Press
2023
Xiamen University of Technology
2022
Tongji University
2009
Takeda (Japan)
2006
University of Yamanashi
2006
Actual engineering systems will be inevitably affected by uncertain factors. Thus, the Reliability-Based Multidisciplinary Design Optimization (RBMDO) has become a hotspot for recent research and application in complex system design. The Second-Order/First-Order Mean-Value Saddlepoint Approximate (SOMVSA/FOMVSA) are two popular reliability analysis strategies that widely used RBMDO. However, SOMVSA method can only efficiently when distribution of input variables is Gaussian distribution,...
In this report, we explore the ability of language model agents to acquire resources, create copies themselves, and adapt novel challenges they encounter in wild. We refer cluster capabilities as "autonomous replication adaptation" or ARA. believe that systems capable ARA could have wide-reaching hard-to-anticipate consequences, measuring forecasting may be useful for informing measures around security, monitoring, alignment. Additionally, once a system is ARA, placing bounds on system's...
Abstract Objective Conventional physical activity (PA) metrics derived from wearable sensors may not capture the cumulative, transitions sedentary to active, and multidimensional patterns of PA, limiting ability predict function impairment (PFI) in older adults. This study aims identify unique temporal develop novel digital biomarkers wrist accelerometer data for predicting PFI its subtypes using explainable artificial intelligence techniques. Materials Methods Wrist streaming 747...
The higher-order interactions emerging in the network topology affect effectiveness of digital contact tracing (DCT). In this paper, we propose a mathematical model which use hypergraph to describe gathering events. our model, role DCT is modeled as individuals carrying app. When hyperedge all carry app, epidemics cannot spread through hyperedge. We develop generalized percolation theory investigate epidemic outbreak size and threshold. find that can effectively suppress spreading, i.e.,...
Software testing plays a crucial role in ensuring the quality of software systems. Mutation is designed to measure adequacy test suites by detecting artificially induced faults. Despite their potential, expensive cost and scalability mutation with large programs big obstacle its practical use. The selective has been widely investigated considered be an effective approach reduce testing. In case where source code hundreds classes more than 10 KLOC lines code, can still generate thousands...
Handwriting difficulties (HWDs) in children have adverse effects on their confidence and academic progress. Detecting HWDs is the first crucial step toward clinical or teaching intervention for with HWDs. To date, how to automatically detect still a challenge, although digitizing tablets provided an opportunity collect handwriting process information. Especially, our best knowledge, there no exploration into potential of combining machine learning algorithms information Chinese children....
Journal Article The effects of virtual characters on audiences' movie experience Get access Tao Lin, Lin a Department Computer Science, Sichuan University, Chengdu 610065, China Search for other works by this author on: Oxford Academic Google Scholar Shigeo Morishima, Morishima b Waseda Shinjuku-ku Tokyo, 169-8555, Japan Akinobu Maejima, Maejima Ningjiu Tang * Corresponding author. Permanent address: C-3-1801, 1 Nan Yiduan, Yihuan Road, China. Tel./fax: +86 28 85469945. E-mail...
Code reuse has been perceived to be an effective tool for user interface development that is known complex and messy. A fundamental problem in code how effectively retrieve working from existing repositories, which renders functional interfaces similar a programmer's input sketch. Existing generic retrieval techniques are normally inadequate due its associated visual information. In this paper, we put forward novel approach retrieves matching candidate of sketch based on their...
Modern games have shifted their core from game itself to the player enjoyment and preference.RTS are special category of computer which military simulation abstraction.This paper proposes a new evaluation framework for RTS games-RTS-GameFlow is based on quintessence Game Theory an extensive model GameFlow.RTS-GameFlow fills vacancy evaluating games. This not only development GameFlow, but also extended with features. Meanwhile, analyzes relationship among elements RTS-GameFlow , refines...
We study competition among contests in a general model that allows for an arbitrary and heterogeneous space of contest design symmetric contestants. The goal the designers is to maximize contestants' sum efforts. Our main result shows optimal monopolistic setting (i.e., those efforts with single contest) form equilibrium contests. Under very natural assumption these are fact dominant, equilibria they unique. Moreover, Pareto-optimal even cases where other emerge. In many cases, also social welfare.
Encountering difficulties that emerge in programming learning are ubiquitous for novices. Those may reduce novices' motivation learning, even lead them to drop out. Automatically detecting the has been proved as an effective way solve this problem. A potential method detection is identify programmers' behavioural patterns based on sequences of events (e.g., editing, deleting, or debugging) when they experience difficulties. However, due diversity these events, plentiful generated from...
Abstract An intelligent lifestyle has become a hotspot for researchers and industries nowadays. The smart home monitoring controlling system with the Arduino as main controller is designed in this paper, combined sensors, Wi-Fi, cloud technologies. Various sensors collect household environmental information, such indoor temperature humidity, soil moisture, combustible gas concentration, light intensity. processes collected signals automatically operates devices, including refrigeration...
UAVs (Unmanned Aerial Vehicles) are promising tools for efficient data collections of sensors in IoT networks. Existing studies exploited both spatial and temporal correlations to reduce the amount collected redundant data, which first partitioned into different clusters, a master sensor each cluster then collects raw from other compresses received data. An energy-constrained UAV finally maximum compressed sensors. We however notice that only portion clusters by existing studies, while not...
The misinformation spreading in social networks causes unpredictable damage to the networked system, thus inferring source is an important research topic field of network science and security. Many inference algorithms have been proposed find most likely propagation through observable snapshot. However, under limited conditions, observing different nodes states markedly affects algorithm’s effectiveness. Yet, we still lack relevant on which can more accurately assist us completing inference....
Course Management System (CMS) is web-based system which designed to simplify, streamline, and automate many aspects of the course's management. But, traditional CMS has some problems in helping teachers gathering students' information. In this paper, we have a framework association rules application called ARMOCMS, implemented prototype on Moodle platform, popular open-source CMS. We adopted an improved version PredictiveApriori algorithm mine data. Specifically, integrate experience...
Download This Paper Open PDF in Browser Add to My Library Share: Permalink Using these links will ensure access this page indefinitely Copy URL DOI
Frontier AI safety policies highlight automation of research and development (R&D) by agents as an important capability to anticipate. However, there exist few evaluations for R&D capabilities, none that are highly realistic have a direct comparison human performance. We introduce RE-Bench (Research Engineering Benchmark, v1), which consists 7 challenging, open-ended ML engineering environments data from 71 8-hour attempts 61 distinct experts. confirm our experts make progress in the given 8...