Chunhui Wang

ORCID: 0000-0002-7151-483X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Software Engineering Research
  • Software Testing and Debugging Techniques
  • Software Engineering Techniques and Practices
  • Music and Audio Processing
  • Software Reliability and Analysis Research
  • Speech Recognition and Synthesis
  • Speech and Audio Processing
  • Software System Performance and Reliability
  • Video Surveillance and Tracking Methods
  • Advanced Measurement and Metrology Techniques
  • Optical measurement and interference techniques
  • Advanced Software Engineering Methodologies
  • Educational Technology and Assessment
  • AI-based Problem Solving and Planning
  • Optical Systems and Laser Technology
  • Anomaly Detection Techniques and Applications
  • Human Pose and Action Recognition
  • Network Security and Intrusion Detection
  • Topic Modeling
  • Higher Education and Teaching Methods
  • Natural Language Processing Techniques
  • Web Data Mining and Analysis
  • Cognitive Science and Mapping
  • Service-Oriented Architecture and Web Services
  • Dermatology and Skin Diseases

Inner Mongolia Normal University
2010-2024

Geely (China)
2024

Anhui University
2023

North China University of Technology
2023

Zhejiang University of Science and Technology
2023

University of Science and Technology of China
2022

Guilin University of Electronic Technology
2021-2022

Peking University
2018-2021

Center for Life Sciences
2021

China Astronaut Research and Training Center
2010-2020

In safety critical domains, system test cases are often derived from functional requirements in natural language (NL) and traceability between their corresponding is usually mandatory. The definition of therefore time-consuming error prone, especially so given the quickly rising complexity embedded systems many domains. Though considerable research has been devoted to automatic generation NL requirements, most proposed approaches re- quire significant manual intervention or additional,...

10.1145/2771783.2771812 article EN 2015-07-10

Acceptance testing is a validation activity performed to ensure the conformance of software systems with respect their functional requirements. In safety critical systems, it plays crucial role since enforced by standards, which mandate that each requirement be validated such in clearly traceable manner. Test engineers need identify all representative test execution scenarios from requirements, determine runtime conditions trigger these scenarios, and finally provide input data satisfy...

10.1109/tse.2020.2998503 article EN IEEE Transactions on Software Engineering 2020-05-30

Non-fungible token (NFT) emerges with the marvelous explosion of metaverse. NFT digital works are profoundly impacting existing copyright system, which needs to be amended and responded in time. There is a possibility that it will completely change distribution pattern rights interests field law. Currently, legal nature casting trading remains controversial. The liability creators, as well service platforms, required further identified. This article starts an analysis right attributes based...

10.1051/sands/2023013 article EN cc-by Security and Safety 2023-01-01

We present UMTG, a toolset for automatically generating executable and traceable system test cases from use case specifications. UMTG employs Natural Language Processing (NLP), restricted form of specifications, constraint solving. Use are expected to follow template with restriction rules that reduce imprecision enable NLP. NLP is used capture the control flow implicitly described in Finally, generate input, solving applied OCL constraints referring domain model system. integrated two tools...

10.1145/2786805.2803187 article EN 2015-08-26

In this paper a simple and effective crowd behavior normality method is proposed. We use the histogram of oriented social force (HOSF) as feature vector to encode observed events surveillance video. A dictionary codewords trained include typical HOSFs. To detect whether an event normal accomplished by comparing how similar closest codeword via z-value. The proposed includes following characteristic: (1) training automatic without human labeling; (2) instead object tracking, integrates...

10.1109/icitcs.2013.6717798 article EN International Conference on IT Convergence and Security, ICITCS 2013-12-01

In the context of use-case centric development and requirements-driven testing, this paper addresses problem automatically deriving system test cases to verify timing requirements. Inspired by engineering practice in an automotive software context, we rely on analyzable form use case specifications augment such functional descriptions with timed automata, capturing requirements, following a methodology aiming at minimizing modeling overhead. We automate generation executable using strategy...

10.1109/icst.2017.34 article EN 2017-03-01

System testing plays a crucial role in safety-critical domains, e.g., automotive, where system test cases are used to demonstrate the compliance of software with its functional and safety requirements. Unfortunately, since requirements typically written natural language, significant engineering effort is required derive from In such context, automated support for generating specifications language would be highly beneficial. existing approaches have limited applicability. For example, some...

10.1109/icst.2018.00013 article EN 2018-04-01

Uncertainty in timing properties (e.g., detection time of external events) is a common occurrence embedded software systems, since these systems interact with complex physical environments. Such uncertainty leads to non-determinism. For example, time-triggered operations may either generate different valid outputs across executions or experience failures results not being generated the expected window) that occur only occasionally over many executions. reasons, makes generation effective...

10.1145/3280987 article EN ACM Transactions on Software Engineering and Methodology 2018-11-16

Person re-identification (Re-ID) is a research hot spot in the field of intelligent video analysis, and it also challenging task. As number samples grows larger, traditional metric feature learning methods fall into bottleneck, while just meets needs deep algorithm, which perform very well person re-identification. Although they have achieved good results supervised learning, their application real-world scenarios not satisfactory. This mainly because real world, huge labeled images are hard...

10.1142/s0218001420520114 article EN International Journal of Pattern Recognition and Artificial Intelligence 2020-01-31

Student plagiarism is epidemic in universities.In computer programming education process, it very common that students copy or modify other's code as their own work.Because every course having numerous assignments, detected will be difficult and extremely time consuming.How to prevent the an important problem education.This paper analyzes expatiates reasons methods about code's plagiarism, thinks there are two phases preventing this plagiarism: one from occur, other detect cases of when...

10.14257/ijsia.2013.7.5.25 article EN International Journal of Security and Its Applications 2013-09-30

A reliable outdoor binocular camera calibration method for a multi-GPS (Global Positioning System) apparatuses and multi-cameras based surveillance system is introduced in this paper. Different to other system, the user needs our track motion estimate shape of selected vehicle real time by cameras. So we implement these steps below: 1) fixing GPS apparatus each collect location information. 2) Calibrating interior exterior parameters 3) Computing coordinate transform matrix between system....

10.1109/icit.2010.5472690 article EN 2010-01-01

We report the development of a portable cavity ring-down spectrometer (CRDS) for direct and absolute measurement HO2 radical concentration using distributed feedback (DFB) diode laser operating at 1506 nm. The has compact design with all optics in 1000 × 400 140 mm3 box. At pressure 100 mbar time (τ0) 136 µs, detection limit CRDS was ∼ 7.3 107 molecule/cm3 (1σ, 10s). corresponding sensitivity 1.5 10-11 cm-1, which close to state-of-the-art performance. By replacing DFB narrow linewidth...

10.1364/oe.470296 article EN cc-by Optics Express 2022-09-19

Most of the requirements embedded systems are written in natural language by users or customers. When size document is large, it not easy for developers to understand and analyze these requirements. Requirements modeling has been widely used proven be helpful Manual analysis extracting models time-consuming error-prone. Therefore, this paper, we present a framework extract model elements semi-automatically generate from NL systems. This leads considerably simplify accelerate development

10.1109/rew56159.2022.00012 article EN 2022-08-01

Determining the location of zero order fringes is one key aspects in scanning white-light interferometry. The measurement principle interferometry introduced at first; then as calculated by four different algorithms; namely Weight-center, Phase-shift, Frequency Domain Analysis (FDA), and Coherent Correlation are compared. Finally, numerical simulations on random generated surfaces done to reach conclusions comparing analyzing results. research important understanding development

10.1117/12.814597 article EN Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE 2008-09-22

Eye movement-based human-computer interactions are emerging in diverse scenarios. When selecting targets on a user interface, the method of combining fast gaze pointing with reliable manual action is becoming increasingly popular. However, this suffers from noise caused by eye jitters and users' habitual early move-away before actions. Here we propose novel solution to mitigate these problems locking cursor at target for imminent selection. We compared gaze-lock conventional typing task...

10.1080/00140139.2020.1762934 article EN Ergonomics 2020-04-29

This paper researched on the quality of code clone in software, evaluated current versions. Then using Bayesian network to train existing sample data get prediction model that is able predict quality. The results are help developers decide which should be reconstructed or efficiently reused. experiment shows method can used software more accurately.

10.14257/ijseia.2016.10.4.05 article EN International Journal of Software Engineering and Its Applications 2016-04-30

Spatial cognition is a typical human cognitive activity. It attractive that can interact with the robot naturally and efficiently in task of spatial cognition. And so many scientists have thrown themselves into research great thing. This paper systematically summarized related work human-robot natural interaction tasks. We arranged this two parts, analysis tasks modeling respectively. progress architecture was highlighted here. In addition, we studied how to realize through combining...

10.1109/ihmsc.2016.125 article EN 2016-08-01

Recently, deep convolutional neural networks have resulted in noticeable improvements image classification and been used to transfer artistic style of images. Gatys et al. proposed the use a learned Convolutional Neural Network (CNN) architecture VGG style, but problems occur during back propagation process because there is heavy computational load. This paper solves these problems, including simplification computation chains derivatives, accelerating adjustments, efficiently choosing...

10.1142/s021800141954020x article EN International Journal of Pattern Recognition and Artificial Intelligence 2018-09-26

Acceptance testing is a validation activity performed to ensure the conformance of software systems with respect their functional requirements. In safety critical systems, it plays crucial role since enforced by standards. Test engineers need identify all representative test execution scenarios from requirements, determine runtime conditions that trigger these scenarios, and finally provide input data satisfy conditions. Given requirements specifications are typically large often provided in...

10.48550/arxiv.1907.08490 preprint EN other-oa arXiv (Cornell University) 2019-01-01
Coming Soon ...