Weifeng Xu

ORCID: 0000-0002-1313-1136
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Software Engineering Research
  • Software Testing and Debugging Techniques
  • Software Reliability and Analysis Research
  • Advanced Malware Detection Techniques
  • Advanced Software Engineering Methodologies
  • Neural dynamics and brain function
  • Digital and Cyber Forensics
  • Software System Performance and Reliability
  • Embedded Systems Design Techniques
  • Web Data Mining and Analysis
  • Service-Oriented Architecture and Web Services
  • Digital Media Forensic Detection
  • Parallel Computing and Optimization Techniques
  • Conducting polymers and applications
  • Web Application Security Vulnerabilities
  • Robotics and Sensor-Based Localization
  • Smart Grid Energy Management
  • Photoreceptor and optogenetics research
  • Organic Electronics and Photovoltaics
  • Organic Light-Emitting Diodes Research
  • Augmented Reality Applications
  • Blockchain Technology Applications and Security
  • Logic, programming, and type systems
  • HVDC Systems and Fault Protection
  • Crystallization and Solubility Studies

North China Electric Power University
2016-2024

University of Baltimore
2018-2024

Shanghai Electric (China)
2024

Lviv National Musical Academy named after Mykola Lysenko
2022

Xi'an University of Architecture and Technology
2021

China Electric Equipment Group (China)
2021

Zhejiang Science and Technology Information Institute
2019-2020

Huadong Hospital
2020

Fujian Agriculture and Forestry University
2018-2019

Nanjing Forestry University
2019

In recent years, type II diabetes has become a serious disease that threaten the health and mind of human. Efficient predictive modeling is required for medical researchers practitioners. This study proposes prediction model based on random forest which aims at analyzing some readily available indicators (age, weight, waist, hip, etc.) effects discovering rules given data. The method can significantly reduce risk through digging out clear understandable from database. Random algorithm uses...

10.1109/aeeicb.2017.7972337 article EN 2017-02-01

We describe methods to achieve high sensitivity in voltage-sensitive dye (VSD) imaging from rat barrel and visual cortices vivo with the use of a blue RH1691 dynamic range device (photodiode array). With an improved staining protocol off-line procedure remove pulsation artifact, VSD recording is comparable that local field potential same location. this sensitivity, one can record approximately 500 individual detectors, each covering area cortical tissue 160 microm diameter (total 4 mm...

10.1152/jn.01169.2006 article EN Journal of Neurophysiology 2007-05-10

Security attacks typically result from unintended behaviors or invalid inputs. testing is labor intensive because a real-world program usually has too many It highly desirable to automate partially security-testing process. This paper presents an approach automated generation of security tests by using formal threat models represented as Predicate/Transition nets. generates all attack paths, i.e., tests, model and converts them into executable test code according the given...

10.1109/tdsc.2012.24 article EN IEEE Transactions on Dependable and Secure Computing 2012-02-22

The rhizosheath, a layer of soil particles that adheres firmly to the root surface by combination hairs and mucilage, may improve tolerance drought stress. Setaria italica (L.) P. Beauv. (foxtail millet), member Poaceae family, is an important food fodder crop in arid regions forms larger rhizosheath under conditions. Rhizosheath formation conditions has been studied, but regulation hair growth size response moisture remains unclear. To address this question, study we monitored development...

10.1111/jipb.12716 article EN Journal of Integrative Plant Biology 2018-09-05

Sleep stage classification, including wakefulness (W), rapid eye movement (REM), and non- (NREM) which includes three sleep stages that describe the depth of sleep, is one most critical steps in effective diagnosis treatment sleep-related disorders. Clinically, staging performed by domain experts through visual inspection polysomnography (PSG) recordings, time-consuming, labor-intensive often subjective nature. Therefore, this study develops an automatic system, uses single channel...

10.1109/access.2020.2982434 article EN cc-by IEEE Access 2020-01-01

Taking aspects as incremental modifications to their base classes, this paper presents an approach testing whether or not aspect-oriented programs and classes conform respective behavior models. We exploit a rigorous extension state models for capturing the impact of on transitions class objects well explicit weaving mechanism composing into generate abstract tests from As are necessarily valid programs, we identify several rules maximizing reuse concrete according state-based classes. To...

10.1145/1119655.1119680 article EN 2006-03-20

The world's increased dependence on software-enabled systems has raised major concerns about software reliability and security. New cost-effective tools for quality assurance are needed. This paper presents an automated test generation technique, called Model-based Integration System Test Automation (MISTA), integrated functional security testing of systems. Given a Model-Implementation Description (MID) specification, MISTA generates code that can be executed immediately with the...

10.1109/tr.2014.2354172 article EN IEEE Transactions on Reliability 2014-10-02

In this paper a hybrid framework is illustrated, with software and hardware integration strategy, for an industrial platform that exploits features from Relational Database (RDB) Triplestore using the blackboard architectural pattern, ensuring efficient accurate communication concerning data transfer among applications devices. Specifically, “Raw Data Handler”, manages unstructured IoT devices are kept in Apache Cassandra instance, while “Production Handler” acts on structured data,...

10.1016/j.procir.2019.03.221 article EN Procedia CIRP 2019-01-01

ABSTRACT Purpose To identify practices common to both the General Practice Research Database and The Health Improvement Network database for purposes of combining databases analysis without duplicate records. Methods We developed two independent algorithms databases. first used total number patients in therapy clinical data sets etoricoxib celecoxib users each year during study period. second stratified by gender four different categories birth year. Further checking potential matched...

10.1002/pds.3277 article EN Pharmacoepidemiology and Drug Safety 2012-04-30

This paper develops a novel energy universal service bus system (EUSBS) based on emerging Internet (E-net) technologies. EUSBS is unified identification and plug-and-play interface platform to which high penetration distributed equipment (DEE), including photovoltaic (PV), fans, electric vehicle charging stations (EVCSs), storage (ESE), commercial residential users (CRUs), can access in coordinated control optimized utilization mode. First, the functions design, overall framework topology...

10.3390/en11051160 article EN cc-by Energies 2018-05-06

The problem of integration folk art and, in particular, instrumental art, into the works Chinese composers 20th and 21st centuries, light above-mentioned phenomena, is relevant, comprehensive to a certain extent, inexhaustible for researchers world musicological science. This was factor that prompted disclosure topic publication question, which at same time reason writing study. Its relevance stems from importance deep understanding such phenomenon as its implementation compositional...

10.21659/rupkatha.v14n2.19 article EN cc-by-nc Rupkatha Journal on Interdisciplinary Studies in Humanities 2022-06-07

The activity of V1 neurons evoked by stimuli within the classical receptive field (CRF) is known to be modulated in surrounding field, extra-receptive (ERF). By varying relative spatial phase (RSP) between a central grating presented CRF and surround ERF, we studied contextual modulation alert monkeys (Macaca mulata). Results from two show that most with suppressive ERF are sensitive RSP, degree sensitivity strongly dependent on strength suppression. This maximal when RSP generated at or...

10.1093/cercor/bhi046 article EN Cerebral Cortex 2005-02-09

Despite recent advances in smart card technology, most modern cards continue to rely on readers for power and clocking, creating a potential security gap. In this paper, we present an energy-aware architecture that operates using embedded battery crystal. This low-power VLSI system is continually active provides enhanced through periodic internal update when the detached from reader. Our achieves reduced consumption by deactivating majority of its circuitry, including microcontroller, vast...

10.1109/tvlsi.2005.859471 article EN IEEE Transactions on Very Large Scale Integration (VLSI) Systems 2005-10-01

In this paper, a highly conductive and strongly absorptive organic thin film by doping Ag into N,N′-bis (2,6-di-isopropylphenyl)-1,7-bis (4-methoxy-phenyl) perylene-3,4,9,10-tetracarboxydiimide (MPPDI) was demonstrated. Strong absorption resulted from the broadband of MPPDI at visible range plasmon-enhanced around 420 nm nanoparticles. dopants in acted as quenchers, which dramatic decrease photoluminescence intensity MPPDI. Besides, J-V characteristics Ag:MPPDI changed trapped-charge-limited...

10.1063/1.3068493 article EN Applied Physics Letters 2009-01-05

Length of stay (LoS) in the intensive care unit (ICU) is a common outcome measure used as an indicator both quality and resource use. However, existing analysis methods LoS are poorly interpretable extensible, there controversial for predictive performance LoS. In this paper, study includes data from 1,214 unplanned ICU admissions to participate Sichuan Provincial People's Hospital between Dec. 11, 2015 6, 2018. On basis these data, creates highly accurate model using advanced preprocessing...

10.1109/access.2019.2934166 article EN cc-by IEEE Access 2019-01-01

The new constructs in aspect-oriented programming bring types of faults with respect to crosscutting concerns, such as incorrect pointcuts and advice. This paper presents a UML-based approach testing whether or not an program conforms its expected behavior. We explore UML design models derive tests for exercising interactions between aspects classes. Each model consists class diagrams, aspect sequence diagrams. For method under test, we weave the diagrams advice on into method's diagram....

10.1142/s0218194008003672 article EN International Journal of Software Engineering and Knowledge Engineering 2008-05-01

The traditional item-based recommendation algorithm only considers the user's score when calculating, but actual has a malicious evaluation, which seriously affects accuracy of using for prediction. At same time, evaluation is small, and amount usage will also affect recommendation. Aiming at above two problems, this paper proposes collaborative filtering with characteristics item label. Firstly, label feature behavior data are comprehensively considered. Secondly, on selection calculated,...

10.6919/icje.202001_6(1).0024 article EN International Core Journal of Engineering 2020-01-01
Coming Soon ...