- Pulsars and Gravitational Waves Research
- Gamma-ray bursts and supernovae
- Geophysics and Gravity Measurements
- Distributed and Parallel Computing Systems
- Astrophysical Phenomena and Observations
- Cloud Computing and Resource Management
- Cosmology and Gravitation Theories
- Astrophysics and Cosmic Phenomena
- Parallel Computing and Optimization Techniques
- Advanced Data Storage Technologies
- Caching and Content Delivery
- Peer-to-Peer Network Technologies
- Geophysics and Sensor Technology
- Graph Theory and Algorithms
- Radio Astronomy Observations and Technology
- High-pressure geophysics and materials
- Seismic Waves and Analysis
- IoT and Edge/Fog Computing
- Algorithms and Data Compression
- Scientific Computing and Data Management
- Advanced Frequency and Time Standards
- Data Management and Algorithms
- Statistical and numerical algorithms
- Atomic and Subatomic Physics Research
- Advanced Database Systems and Queries
State Key Laboratory of Food Science and Technology
2024
Jiangnan University
2024
Tsinghua University
2013-2024
China Building Materials Academy
2024
Hainan University
2024
New Jersey Institute of Technology
2020-2024
Qingdao University
2024
University of International Business and Economics
2023
John Wiley & Sons (United Kingdom)
2023
University of Oxford
2023
Advanced Virgo is the project to upgrade interferometric detector of gravitational waves, with aim increasing number observable galaxies (and thus detection rate) by three orders magnitude. The now in an advanced construction phase and assembly integration will be completed end 2015. part a network, alongside two LIGO detectors US GEO HF Germany, goal contributing early waves opening new window observation on universe. In this paper we describe main features outline status construction.
This paper presents the Summed Parallel Infinite Impulse Response (SPIIR) pipeline used for public alerts during third advanced LIGO and Virgo observation run (O3 run). The SPIIR uses infinite impulse response (IIR) filters to perform extremely low-latency matched filtering this process is further accelerated with graphics processing units (GPUs). It first online select candidates from multiple detectors using a coherent statistic based on maximum network likelihood ratio principle. Here we...
Service-oriented architecture and cloud computing are becoming a dominant paradigm, as all major companies supporting this paradigm more organizations adopting paradigm. Robotics service-oriented robotics start to joint new in the past five years now ready participate large scale. This paper reports our research on design, implementation, evaluation of Robot Service (RaaS) unit. To fully qualify RaaS unit, we have kept design comply with common service standards, development platforms,...
With the wide deployment of cloud computing in many business enterprises as well science and engineering domains, high quality security services are increasingly critical for processing workflow applications with sensitive intermediate data. Unfortunately, most existing worklfow scheduling approaches disregard requirements data produced by workflows, overlook performance impact encryption time on start subsequent tasks. Furthermore, idle slots resources, resulting from dependencies among...
A honeypot is a type of security facility deliberately created to be probed, attacked and compromised. It often used for protecting production systems by detecting deflecting unauthorized accesses. also useful investigating the behaviour attackers, in particular, unknown attacks. For past 17 years much effort has been invested research development based techniques tools they have evolved become an increasingly powerful means defending against creations blackhat community. In this paper,...
Internet-of-Things (IoT) environment has a dynamic nature with high risks of confidentiality, integrity, and availability violations. The loss information, denial access, information leakage, collusion, technical failures, data security breaches are difficult to predict anticipate in advance. These types nonstationarity one the main issues design reliable IoT infrastructure capable mitigating their consequences. It is not sufficient propose solutions for given scenario, but mechanisms adapt...
The Advanced Virgo interferometer is the upgraded version of detector having goal to extend by a factor 10 observation horizon in universe and consequently increase detection rate three orders magnitude. Its installation progress expected be completed late 2015. In this proceeding we will present scheme main challenging technical features give an outline status foreseen time schedule which bring its full operation.
Honeypots are designed to trap the attacker with purpose of investigating its malicious behavior. Owing increasing variety and sophistication cyber attacks, how capture high-quality attack data has become a challenge in context honeypot area. All-round honeypots, which mean significant improvement sensibility, countermeasure stealth, necessary tackle problem. In this paper, we propose novel architecture termed HoneyDOC support all-round design implementation. Our clearly identifies three...
Difucosyllactose (DFL) is a significant and plentiful oligosaccharide found in human breast milk. In this study, an artificial metabolic pathway of DFL was designed, focusing on the de novo biosynthesis GDP-fucose from only glycerol. This achieved by engineering
Service-oriented architecture and cloud computing have become the prevalent paradigm. In this paradigm, resources can be accessed like other utility services available in today's society. meantime, robotics applications are joining trend. More more robot shifting from manufacture to non-manufacture service industries. However, for on-demand supply of large-scale heterogeneous robots, It is still a problem not yet been studied, including fundamental management efficiency issues using these...
The tight formation of unmanned aerial vehicles (UAVs) provides numerous advantages in practical applications, increasing not only their range but also efficiency during missions. However, the wingman aerodynamics are affected by tail vortices generated leading aircraft a formation, resulting unpredictable interference. In this study, mathematical model wake vortex was developed, and aerodynamic characteristics were simulated using Xflow software. A robust control method for formations...
3-Fucosyllactose (3-FL), an important fucosylated human milk oligosaccharide in breast milk, offers numerous health benefits to infants. Previously, we metabolically engineered
We consider a new tree mining problem that aims to discover restrictedly embedded subtree patterns from set of rooted labeled unordered trees. study the properties canonical form trees, and develop Apriori-based techniques generate all candidate subtrees level by through two efficient rightmost expansion operations: 1) pairwise joining 2) leg attachment. Next, we show detection can be achieved calculating restricted edit distance between data tree. These are then integrated into an...
Serving as cache disks, flash-based solid-state drives (SSDs) can significantly boost the performance of read-intensive applications. However, frequent data updating, necessary condition for classical replacement algorithms (e.g., LRU, MQ, LIRS, and ARC) to achieve a high hit rate, makes SSDs wear out quickly. To address this problem, we propose new approach—write-efficient caching (WEC)—to greatly improve write durability SSD cache. WEC is conducive reducing total number writes issued while...
Robot autonomous exploration is a challenging and valuable research field that has attracted widespread interest in recent years. However, existing methods often encounter problems such as incomplete exploration, repeated paths, low efficiency when facing large-scale scenes. Considering many indoor outdoor scenes usually have prior topological map, road navigation maps, satellite network computer-aided design (CAD) etc., this paper incorporated information into the framework proposed an...