Bingming Wang

ORCID: 0000-0002-8723-0970
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Software System Performance and Reliability
  • Network Security and Intrusion Detection
  • Anomaly Detection Techniques and Applications
  • Software Reliability and Analysis Research
  • Cloud Computing and Resource Management
  • Refrigeration and Air Conditioning Technologies
  • Heat Transfer and Optimization
  • Carbon Dioxide Capture Technologies
  • Software Engineering Research
  • Advanced Thermodynamics and Statistical Mechanics
  • Mechanical Failure Analysis and Simulation
  • Data Stream Mining Techniques
  • Spacecraft and Cryogenic Technologies
  • Advanced Thermodynamic Systems and Engines
  • Advanced Battery Technologies Research
  • Superconducting Materials and Applications
  • Engineering Applied Research
  • Engineering Diagnostics and Reliability
  • Power Systems and Technologies
  • Advanced Algorithms and Applications
  • IoT and Edge/Fog Computing
  • Advanced Sensor and Control Systems
  • Software Testing and Debugging Techniques
  • Thermodynamic and Exergetic Analyses of Power and Cooling Systems

Technical Institute of Physics and Chemistry
2014-2024

Chinese Academy of Sciences
2014-2024

Wuhan University
2018-2021

Logs that record system abnormal states (anomaly logs) can be regarded as outliers, and the k-Nearest Neighbor (kNN) algorithm has relatively high accuracy in outlier detection methods. Therefore, we use kNN to detect anomalies log data. However, there are some problems when using anomalies, three of which are: excessive vector dimension leads inefficient algorithm, unlabeled data cannot support imbalance number distorts classification decision algorithm. In order solve these problems,...

10.1145/3441448 article EN ACM Transactions on Knowledge Discovery from Data 2021-04-21

10.1016/j.jpdc.2020.10.010 article EN Journal of Parallel and Distributed Computing 2020-11-17

Logs play an important role in the maintenance of large-scale systems. The number logs which indicate normal (normal logs) differs greatly from that anomalies (abnormal logs), and two types have certain differences. To automatically obtain faults by K-Nearest Neighbor (KNN) algorithm, outlier detection method with high accuracy, is effective way to detect logs. However, characteristics large scale very uneven samples, will affect results KNN algorithm on log-based anomaly detection. Thus, we...

10.1142/s0218194020500114 article EN International Journal of Software Engineering and Knowledge Engineering 2020-02-01

Exception handling is widely used in software development to guarantee code robustness and system reliability. Developers are expected choose appropriate strategies ensure exceptions handled properly without causing program crashes or unintended behaviors. However, making such choices challenging especially for the novices due lack of experience on exceptional flow design. To assist developers deciding how handle exceptions, we propose a method automatically recommend exception based...

10.1109/iceccs2018.2018.00019 article EN 2018-12-01

Using the k -nearest neighbor (kNN) algorithm in supervised learning method to detect anomalies can get more accurate results. However, when using kNN anomaly, it is inefficient at finding neighbors from large-scale log data; same time, data are imbalanced quantity, so a challenge select proper for different distributions. In this paper, we propose log-based anomaly detection with efficient selection of and automatic neighbors. First, search based on minhash MVP-tree. The used group similar...

10.1155/2020/4365356 article EN cc-by Scientific Programming 2020-06-02

The log analysis-based system fault diagnosis method can help engineers analyze the events generated by system. K-means algorithm perform analysis well and does not require a lot of prior knowledge, but K-means-based needs to be improved in both efficiency accuracy. To solve this problem, we propose based on reclustering algorithm. First, vectorization PV-DM language model obtain low-dimensional vectors which provide effective data support for subsequent diagnosis; then, improve make effect...

10.1155/2021/6617882 article EN cc-by Scientific Programming 2021-03-09

Distributed systems have been widely used in the information technology industry. However, with increasing scale and complexity of distributed systems, efficiency accuracy manual anomaly detection system logs decreased. Therefore, there is a great demand for highly accurate efficient automatic method based on log analysis to ensure reliability stability large-scale systems. In this paper, we propose VeLog, an variational autoencoders (VAEs). offline training phase, VeLog learns patterns...

10.1109/smc42975.2020.9283078 article EN 2022 IEEE International Conference on Systems, Man, and Cybernetics (SMC) 2020-10-11

A control system comprised of the structure, key logic, alarm and interlock is presented in this article for using it helium liquefier. The process instrumentation diagram architecture are analysed. With architecture, logic including open-loop control, closed-loop subsection investigated. Finally liquefier intoduced. proposed paper has been successfully applied to developed by TIPC.

10.2139/ssrn.4705974 preprint EN 2024-01-01

Log analysis can be used for software system anomaly detection, and ensemble learning handle log data with imbalanced characteristics. Therefore, log-based detection is a good choice. However, the existing balancing methods in may destroy distribution of original affect accuracy results. Besides, rules do not take into account relationship between samples to detected historical data. we propose method NW (Neighbor Weighting) rules, which uses based on spectral clustering so that balanced...

10.1109/qrs51102.2020.00022 article EN 2020-12-01

A diagnostic method for screw compressor faults using vibration signals was introduced and applied to a new type of helium oil-injected in the 80L/h liquefier. The study revealed that destruction oil film due impurity particles could lead rotor rubbing poor meshing, compromising reliability these compressors. Based on frequency-domain analysis, major occurred at meshing frequency rotors series its harmonics. characteristic bearing parts also indicated had slight wear early stage. waveform's...

10.2139/ssrn.4481467 preprint EN 2023-01-01

10.2514/6.2008-5668 article EN 6th International Energy Conversion Engineering Conference (IECEC) 2008-07-28

When SaaS software suffers from the problem of response time degradation, scaling deployment resources that support operation can improve time, but also means an increase in costs due to additional resources. For purpose saving while improving out is alternative approach. However, how affects case important issue for effectively time. Therefore, this paper, we propose a method analysing impact on Specifically, define scaling-out and then leverage queueing theory analyse According conclusions...

10.1155/2021/6629867 article EN cc-by Scientific Programming 2021-04-03
Coming Soon ...