- IoT and Edge/Fog Computing
- Cloud Computing and Resource Management
- Software System Performance and Reliability
- Network Security and Intrusion Detection
- Caching and Content Delivery
- Vehicular Ad Hoc Networks (VANETs)
- Anomaly Detection Techniques and Applications
- Advanced Computing and Algorithms
- Water resources management and optimization
- Mobile Agent-Based Network Management
- Multimedia Communication and Technology
- Web and Library Services
- Privacy-Preserving Technologies in Data
- Vehicle emissions and performance
- Water Systems and Optimization
- Blockchain Technology Applications and Security
- Context-Aware Activity Recognition Systems
- Hydrology and Drought Analysis
- Urban Heat Island Mitigation
- Distributed and Parallel Computing Systems
- Urban Stormwater Management Solutions
- E-Government and Public Services
- Web Data Mining and Analysis
- Traffic Prediction and Management Techniques
- Transportation Planning and Optimization
Chongqing University
2018-2023
Shandong Youth University of Political Science
2023
Hunan University of Science and Technology
2021-2023
Northwestern Polytechnical University
2021
Beijing Information Science & Technology University
2021
South China University of Technology
2008
IHI Corporation (United States)
2001
Mobile edge computing (MEC) has become an extremely hot topic in recent years. cloud relies on storage and resources network to provide users with delay-sensitive services. However, the transmission delay among microservices load of servers tend increase due improper service placement unreasonable resource allocation under MEC. In this paper, strategy based improved fast non-domination sorted genetic algorithm is proposed. First, a microservice optimization model built goal minimizing...
With the concept of edge computing being put forward, node should play an important role in resource allocation and local computation. However, there are two basic problems to confront this arena: performance safety message (BSM) exchange frequency service migration, both which related vehicle's mobility feature. To decrease migration enhance efficiency BSM exchange, paper, a bus-oriented mobile fog nodes infrastructure is proposed, while similarity-based clustering method given. In proposed...
With the popularization of Internet application, online business systems is becoming more and common. To ensure normal running systems, IT operations are required to closely monitor various KPIs (Key Performance Indicators), such as network throughput, page views, user's order status, discover anomalies in accurately time. However, due diversity complexity anomalies, this task confronted with great challenges, especially without labels. In paper, we propose an unsupervised anomaly detection...
With the development of data mining and intelligent information technology, complex processing paradigm based on artificial intelligence has become a mainstream trend. In this paper, starting from discussions abnormal detection, novel system intrusion detection is designed for construction AIFF model. The model starts with recognition accuracy improvement, in scheme, weighted Naive Bayes algorithm clustering are combined to effectively information. Then, by adopting rule that modification...
Abstract To investigate the impacts of inflow on overflow suspended solids (SS) concentration in rain gardens, field experiments were carried out Guangming New District, Shenzhen, China. The pollutant degradation process was assumed to follow first-order decay theory. Inflow rate and SS data measured from a mild rainfall event first used calculate constant based continuously stirred tank reactor (CSTR) theory, which sediment remobilization be negligible due small inflow. Then, release rates...
With the popularity of cloud native and DevOps, container technology is widely used combined with microservices. The deployment container-based microservices in distributed cloud-edge infrastructure requires suitable strategies to ensure quality service for users. However, existing orchestration tools cannot flexibly select best location according user's cost budget, are insufficient personalized solutions. From perspective application providers, this paper considers distribution users,...
With the development of dynamic e-government and network, application system becomes more complicated. Traditional will have an inherent scalability problem as number applications increases continuously. To solve this problem, platform based on multi-tier architecture is presented. By integrating applications, resources modules, provides effective mechanism to reduce communication cost. This paper intensively discusses design rationale practical solutions platform, including structured data...
With the deepening requirements of development for Internet Vehicles technology, intelligent vehicles need to complete complex task in a fast response time meet needs, which brings great challenges reliable vehicle service provision. In order solve this problem, we propose offloading scheme into Vehicles, can reduce execution tasks. paper, introduce location-aware distributed storage system called LDSS support offloading. Data be written, stored, computed and read out through different...
The cluster system presents multi-level and complex heterogeneous features with GPUs computing. Job scheduling technology determines computing resource utilization throughput of the system. On basis system, two-level is proposed in this paper. In first level, a job priority algorithm based on user value designed at level using analytical hierarchy processes. second to act nodes that contain GPUs, design GPU sharing policy manages jobs more fine-grained manner. Through experiments, it shows...
Summary With the increasing popularity of cloud native and DevOps, container technology has become widely used in combination with microservices. However, deploying container‐based microservices distributed edge‐cloud infrastructure requires complex selection strategies to ensure high‐quality service for users. Existing orchestration tools lack flexibility selecting best deployment location based on user cost budgets are insufficient providing personalized solutions. This paper proposes a...
SWMM (Stormwater Management Model) is one of the most widely used software in urban flooding mitigation and runoff pollution control practices. Traditionally, selection rainfall data for model calibration arbitrary because it unclear what type suitable. The complex rainfll process nature greatly simplified by a series governing equations hydrological module. simplification coupled with measurement errors make parameters highly uncertain. In this study, influences events watershed...
With the concept of multiaccess edge computing (MEC) being put forward, Roadside Unit (RSU) is considered as a valid application provider, which not only executes transmission resource allocation and data processing-related but also provides real-time applications to road vehicles. However, when fixed roadside nodes communicate with mobile vehicles, high service migration rate could influence feature corresponding service. Moreover, vehicle density affects performance. Hence, in this paper,...
WeChat public account has become an important part of microservice system libraries, and its service content setting is the key to affect quality libraries. This paper takes provincial libraries as research objects, combining analysis social network methods analyze collected data. The classification summarized on basic analysis, association constructed explore contents' relative importance correlation based their co-occurrence relationship. results show that higher, while featured lower. At...