- Service-Oriented Architecture and Web Services
- Business Process Modeling and Analysis
- Petri Nets in System Modeling
- Advanced Software Engineering Methodologies
- Software Engineering Research
- Advanced Computational Techniques and Applications
- Distributed and Parallel Computing Systems
- Cloud Computing and Resource Management
- Software Reliability and Analysis Research
- Advanced Wireless Network Optimization
- Software System Performance and Reliability
- Recommender Systems and Techniques
- Advanced Wireless Communication Techniques
- Radiation Effects in Electronics
- Caching and Content Delivery
- Software Engineering Techniques and Practices
- Distributed systems and fault tolerance
- Web Data Mining and Analysis
- Wireless Communication Networks Research
- Advanced Graph Neural Networks
- Topic Modeling
- Industrial Technology and Control Systems
- Education and Work Dynamics
- Advanced Database Systems and Queries
- Digital Filter Design and Implementation
Yunnan University
2011-2022
Huazhong University of Science and Technology
2007-2009
Yancheng Teachers University
2008
Ningbo Dahongying University
2008
Beijing University of Posts and Telecommunications
2006-2007
The design of monitoring and predictive alarm systems is necessary for successful overhead power transmission line icing. Given the characteristics complexity, nonlinearity, fitfulness in icing process, a model based on multivariable time series presented here to predict load line. In this model, effects micrometeorology parameters process have been analyzed. phase-space reconstruction theory machine learning method were then applied establish prediction which fully utilized history data...
Software evolution has become one of the important characteristics in software life cycle. Based on SDDM2 (Second Generation System Dynamic Development Model), a modeling method which is configurable and reusable for supporting modeling, we propose performance analysis optimization resource processes, so as to effectively support its improvement.
Software process reuse emphasizes to compose software processes from existing components. However, research does not provide a practical solution. According the similarities between products and processes, we argue that architecture can play very important role in reuse. This paper defines made of evolution components connectors. A top-down approach composing into is proposed based on architecture. In order shorten gap definitions descriptions, stepwise for mapping high level specification...
The importance and popularity of software evolution are increasing as more successful systems have become legacy systems. SDDM system dynamic development model, which supports concurrent engineering, is extended with standardization, role resource model hierarchy. And by doing so, we produce the SDDM, configurable reusable to support standardization modeling.
Petri nets are a graphical and mathematical modeling tool applicable to many systems. But there is problem which bars net development: too much nodes lead ldquostation explosionrdquo, especially when analyzing large complicated system. To relieve the problem, new extended - OR-transition presented, based on it, colored presented. This paper gives basic relation between transitions in an also analyzes properties of net, introduces its application software
The component plays an essential role in the component-based software engineering. cohesion is important attribute system, which represents tight degree of a component. Obviously, high can effectively improve quality. However, it difficult to measure cohesion. In this paper concept structure entropy and firstly overviewed. Secondly, dependence relations graph (CDG) are presented, made up three sub-graph: IPTG, TOPG TTG. Finally, based on entropy, approach proposed
Due to the inherent characteristics of ad hoc network, traditional intrusion detection technology (IDS) can not function effectively in network. We apply idea systems analysis and integration constructing IDS model. And by doing so, we produce an system model for networks, which is with a local character repository only distributed mobile agents adjacent nodes.
The credibility of software systems is an important indicator in measuring the performance systems. Effective analysis a controversial topic research trusted software. In this paper, boot and integrity metrics system are analyzed. different trust chain models, star, obtained by using methods for detection functional modules operation. Finally, based on operation system, failure relation graphs established to analyze measure system.
With the wide spread of cloud computing technologies, we assume that increasing amount attentions will be given to area software evolution processes in context environments. Some major problems are here facing now include: What kind process a model under circumstances must possess properties have as an attribute order effectively support How modeling While aiming solve these mentioned problems, focused our research on establishing with independent functions component. In this article,...
While cloud computing related technologies are gaining increasing amount of popularities nowadays, we focusing our resent research on the aspects software evolution processes under environments computing. During pervious research, have proposed SEPUCCC, a process prototype circumstancees In this article, going to further disscussion SEPUCCC by giving it’s in-depth performance analysis, which model’s abilities, abilities supporting circumstances as well reducing cost improvemnet, was demomstrated.
Business process modelling is the way business processes are expressed. foundation of analysis, reengineering, reorganization and optimization. It can not only help enterprises to achieve internal information system integration reuse, but also with external collaboration. Based on prototype Petri net, this paper adds time cost factors form an extended generalized stochastic net. a formal description process. The semi-formalized algorithm based nets proposed. Finally, case from logistics...
Congestion control of TCP protocol will reduce the size congestion window to insure data transmission and degree network when a packet loss event that is regarded as symbolic occurs. This method can be very effective in low BER link, but it causes sharp reduction performance high link such wireless because reasons cause include not only congestion, also single attenuation, electromagnetic interference, abrupt change routing, quick move terminal so on. Network gradual process, relatively...
Software process play an important role in improving the quality of software products. Formal model is conducive to accurate description processes. A meta-model a formal tool used define models. In this paper, SPMM designed. Firstly, five properties processes are discussed. Furthermore, based on CSP and Hoare Logic, definition rules build models proposed. SPMM, not only components, e.g. tasks, activities processes, formally defined, but also embodied. Therefore, can at different abstract...
To better reorganize and optimize business process, Petri nets is a good formal tool. However, the prototype can't fully describe related properties of process. In this paper, time cost attributes are added to it called extended generalized stochastic nets. On basis, performance evaluation model proposed. Execution efficiency Business process can be got by model. They provide direct basis for reengineering optimization. Finally, effectiveness validated through case study.
In the TD-SCDMA system, joint detection (JD) is used to detect data symbols of whole timeslot on receiver, which based channel estimates from midamble part timeslot. However, for a rapidly time-varying environment, states may vary lot within one timeslot, leading worse performance receiver. Considering multiple timeslots per subframe user in 144 kbps and 384 services, novel design using interpolation JD different blocks introduced solve this problem. Simulation results show that there...
Software evolution process model (EPM) is created in terms of a formal meta-model (EPMM) and semi-formal approach to modeling based on EPMM. EPM still abstract at higher level general while software concrete, so must be instantiated before its enactment. The method transform any execution logic programming proposed. Since activity contains the imports resource, roles exports resource tasks, rules four parts are respectively proposed by analyzing semantics activities tasks EPM. converter...
In order to solve the serial execution caused by multithreaded concurrent access shared data and realize dynamic load balance of tasks on memory symmetric multi-processor (multi-core) computing platform, new design methods are presented.By presenting multicore distributed locks, localization, queue, can greatly decrease number accessing tasks.For illustration, scheme task manager server software given using methods.Results shows reduce resources, partially resolve cooperative threads...
In order to solve the serial execution caused by multithreaded concurrent access shared data and realize dynamic load balance of tasks on memory symmetric multi-processor (multi-core) computing platform, new design methods are presented. By presenting multicore distributed locks, localization, queue, can greatly decrease number accessing tasks. For illustration, scheme task manager server software given using methods. Results shows reduce resources, partially resolve cooperative threads...
The development and evolution of trusted software is the focus attention in fields engineering at home abroad. In view its complexity diversity, this article proceeds with component, which basic element architecture, discusses refinement component. Refine one operations local environment using OR-transition colored Petri net to achieve purpose gradual refinement.
In recent year, the combination of machine learning and complex networks is gaining more attention. Some network-based methods which transform vector-based instances into a network has shown lot potential. researchers believe that can show information than datasets. this paper, we proposed classifier named decision network(DN). DN abstracts corresponding relationships between attribute values class labels weighted bipartite network. The weight edge an value node label represents tendency to...