- Software Engineering Research
- Software Testing and Debugging Techniques
- Software Engineering Techniques and Practices
- Music and Audio Processing
- Software Reliability and Analysis Research
- Speech Recognition and Synthesis
- Speech and Audio Processing
- Software System Performance and Reliability
- Video Surveillance and Tracking Methods
- Advanced Measurement and Metrology Techniques
- Optical measurement and interference techniques
- Advanced Software Engineering Methodologies
- Educational Technology and Assessment
- AI-based Problem Solving and Planning
- Optical Systems and Laser Technology
- Anomaly Detection Techniques and Applications
- Human Pose and Action Recognition
- Network Security and Intrusion Detection
- Topic Modeling
- Higher Education and Teaching Methods
- Natural Language Processing Techniques
- Web Data Mining and Analysis
- Cognitive Science and Mapping
- Service-Oriented Architecture and Web Services
- Dermatology and Skin Diseases
Inner Mongolia Normal University
2010-2024
Geely (China)
2024
Anhui University
2023
North China University of Technology
2023
Zhejiang University of Science and Technology
2023
University of Science and Technology of China
2022
Guilin University of Electronic Technology
2021-2022
Peking University
2018-2021
Center for Life Sciences
2021
China Astronaut Research and Training Center
2010-2020
In safety critical domains, system test cases are often derived from functional requirements in natural language (NL) and traceability between their corresponding is usually mandatory. The definition of therefore time-consuming error prone, especially so given the quickly rising complexity embedded systems many domains. Though considerable research has been devoted to automatic generation NL requirements, most proposed approaches re- quire significant manual intervention or additional,...
Acceptance testing is a validation activity performed to ensure the conformance of software systems with respect their functional requirements. In safety critical systems, it plays crucial role since enforced by standards, which mandate that each requirement be validated such in clearly traceable manner. Test engineers need identify all representative test execution scenarios from requirements, determine runtime conditions trigger these scenarios, and finally provide input data satisfy...
Non-fungible token (NFT) emerges with the marvelous explosion of metaverse. NFT digital works are profoundly impacting existing copyright system, which needs to be amended and responded in time. There is a possibility that it will completely change distribution pattern rights interests field law. Currently, legal nature casting trading remains controversial. The liability creators, as well service platforms, required further identified. This article starts an analysis right attributes based...
We present UMTG, a toolset for automatically generating executable and traceable system test cases from use case specifications. UMTG employs Natural Language Processing (NLP), restricted form of specifications, constraint solving. Use are expected to follow template with restriction rules that reduce imprecision enable NLP. NLP is used capture the control flow implicitly described in Finally, generate input, solving applied OCL constraints referring domain model system. integrated two tools...
In this paper a simple and effective crowd behavior normality method is proposed. We use the histogram of oriented social force (HOSF) as feature vector to encode observed events surveillance video. A dictionary codewords trained include typical HOSFs. To detect whether an event normal accomplished by comparing how similar closest codeword via z-value. The proposed includes following characteristic: (1) training automatic without human labeling; (2) instead object tracking, integrates...
In the context of use-case centric development and requirements-driven testing, this paper addresses problem automatically deriving system test cases to verify timing requirements. Inspired by engineering practice in an automotive software context, we rely on analyzable form use case specifications augment such functional descriptions with timed automata, capturing requirements, following a methodology aiming at minimizing modeling overhead. We automate generation executable using strategy...
System testing plays a crucial role in safety-critical domains, e.g., automotive, where system test cases are used to demonstrate the compliance of software with its functional and safety requirements. Unfortunately, since requirements typically written natural language, significant engineering effort is required derive from In such context, automated support for generating specifications language would be highly beneficial. existing approaches have limited applicability. For example, some...
Uncertainty in timing properties (e.g., detection time of external events) is a common occurrence embedded software systems, since these systems interact with complex physical environments. Such uncertainty leads to non-determinism. For example, time-triggered operations may either generate different valid outputs across executions or experience failures results not being generated the expected window) that occur only occasionally over many executions. reasons, makes generation effective...
Person re-identification (Re-ID) is a research hot spot in the field of intelligent video analysis, and it also challenging task. As number samples grows larger, traditional metric feature learning methods fall into bottleneck, while just meets needs deep algorithm, which perform very well person re-identification. Although they have achieved good results supervised learning, their application real-world scenarios not satisfactory. This mainly because real world, huge labeled images are hard...
Student plagiarism is epidemic in universities.In computer programming education process, it very common that students copy or modify other's code as their own work.Because every course having numerous assignments, detected will be difficult and extremely time consuming.How to prevent the an important problem education.This paper analyzes expatiates reasons methods about code's plagiarism, thinks there are two phases preventing this plagiarism: one from occur, other detect cases of when...
A reliable outdoor binocular camera calibration method for a multi-GPS (Global Positioning System) apparatuses and multi-cameras based surveillance system is introduced in this paper. Different to other system, the user needs our track motion estimate shape of selected vehicle real time by cameras. So we implement these steps below: 1) fixing GPS apparatus each collect location information. 2) Calibrating interior exterior parameters 3) Computing coordinate transform matrix between system....
We report the development of a portable cavity ring-down spectrometer (CRDS) for direct and absolute measurement HO2 radical concentration using distributed feedback (DFB) diode laser operating at 1506 nm. The has compact design with all optics in 1000 × 400 140 mm3 box. At pressure 100 mbar time (τ0) 136 µs, detection limit CRDS was ∼ 7.3 107 molecule/cm3 (1σ, 10s). corresponding sensitivity 1.5 10-11 cm-1, which close to state-of-the-art performance. By replacing DFB narrow linewidth...
Most of the requirements embedded systems are written in natural language by users or customers. When size document is large, it not easy for developers to understand and analyze these requirements. Requirements modeling has been widely used proven be helpful Manual analysis extracting models time-consuming error-prone. Therefore, this paper, we present a framework extract model elements semi-automatically generate from NL systems. This leads considerably simplify accelerate development
Determining the location of zero order fringes is one key aspects in scanning white-light interferometry. The measurement principle interferometry introduced at first; then as calculated by four different algorithms; namely Weight-center, Phase-shift, Frequency Domain Analysis (FDA), and Coherent Correlation are compared. Finally, numerical simulations on random generated surfaces done to reach conclusions comparing analyzing results. research important understanding development
Eye movement-based human-computer interactions are emerging in diverse scenarios. When selecting targets on a user interface, the method of combining fast gaze pointing with reliable manual action is becoming increasingly popular. However, this suffers from noise caused by eye jitters and users' habitual early move-away before actions. Here we propose novel solution to mitigate these problems locking cursor at target for imminent selection. We compared gaze-lock conventional typing task...
This paper researched on the quality of code clone in software, evaluated current versions. Then using Bayesian network to train existing sample data get prediction model that is able predict quality. The results are help developers decide which should be reconstructed or efficiently reused. experiment shows method can used software more accurately.
Spatial cognition is a typical human cognitive activity. It attractive that can interact with the robot naturally and efficiently in task of spatial cognition. And so many scientists have thrown themselves into research great thing. This paper systematically summarized related work human-robot natural interaction tasks. We arranged this two parts, analysis tasks modeling respectively. progress architecture was highlighted here. In addition, we studied how to realize through combining...
Recently, deep convolutional neural networks have resulted in noticeable improvements image classification and been used to transfer artistic style of images. Gatys et al. proposed the use a learned Convolutional Neural Network (CNN) architecture VGG style, but problems occur during back propagation process because there is heavy computational load. This paper solves these problems, including simplification computation chains derivatives, accelerating adjustments, efficiently choosing...
Acceptance testing is a validation activity performed to ensure the conformance of software systems with respect their functional requirements. In safety critical systems, it plays crucial role since enforced by standards. Test engineers need identify all representative test execution scenarios from requirements, determine runtime conditions that trigger these scenarios, and finally provide input data satisfy conditions. Given requirements specifications are typically large often provided in...