- Service-Oriented Architecture and Web Services
- Cloud Computing and Resource Management
- Advanced Software Engineering Methodologies
- Caching and Content Delivery
- Industrial Vision Systems and Defect Detection
- Cloud Data Security Solutions
- IoT and Edge/Fog Computing
- Lipid metabolism and biosynthesis
- Peer-to-Peer Network Technologies
- Consumer Retail Behavior Studies
- Advanced Vision and Imaging
- AI and Multimedia in Education
- Mobile Ad Hoc Networks
- Target Tracking and Data Fusion in Sensor Networks
- Surface Roughness and Optical Measurements
- Distributed systems and fault tolerance
- Ideological and Political Education
- Advanced Data Storage Technologies
- 3D Shape Modeling and Analysis
- Technology Adoption and User Behaviour
- RNA Research and Splicing
- Web Data Mining and Analysis
- IPv6, Mobility, Handover, Networks, Security
- Software System Performance and Reliability
- Internet Traffic Analysis and Secure E-voting
Nanjing Institute of Technology
2017-2024
Pennsylvania State University
2024
Shaoguan University
2016-2023
Nanjing University of Aeronautics and Astronautics
2013-2016
Heilongjiang Institute of Technology
2010
Central South University
2006-2007
Although post-translational lipidation is prevalent in eukaryotes, its impact on the liquid-liquid phase separation of disordered proteins still poorly understood. Here, we examined thermodynamic boundaries and kinetics aqueous two-phase system (ATPS) formation for a library elastin-like polypeptides modified with saturated fatty acids different chain lengths. By systematically altering physicochemical properties attached lipids, were able to correlate molecular lipids changes kinetic...
Abstract The multi-dimensional characteristics of public opinion in online education lead to the difficulty data cross-dimensional mining. To solve this problem, paper designs a mining model based on fuzzy association rules. Based subject, object, and ontology analyze education, Yaahp software is used calculate influence factor weight education. According analysis results, relationship between dimensions various clarified by using semantic association. This introduces set theory into...
Purpose – The purpose of this paper is to define an evaluation model for cloud services deal with the fuzzy information and propose a novel method based on consistency intensity analyze quantitative value from information. Design/methodology/approach service framework constructed, different trusted indicators infrastructure application are designed, respectively. In method, interval values can be aggregated by Dempster-Shafer Theory transformed into certain linguistic discount factor....
Co-saliency detection, an emerging research area in saliency aims to extract the common from multi images. The extracted co-saliency map has been utilized various applications, such as co-segmentation, co-recognition and so on. With rapid development of image acquisition technology, original digital images are becoming more clearly. existing detection methods processing these need enormous computer memory along with high computational complexity. These limitations made it hard satisfy demand...
The idea of service-oriented architecture is always used for modern software system designing. SOA offers methods development and integration. In order to meet the demand dynamic business, improve quality service experience, this article increases execution engine on integration layer based industry standard model S3. We propose a Dependable Adaptation Dynamic Enterprise Service Bus(DAD-ESB) design Select Algorithm(DSSA). At last, performance evaluation experiment between static dependable...
To improve the insufficiency of super-peer overlay network, an efficient, robust and expansible searching model, SSP2P, is put forward. The peers were organized into varied area autonomy system (AAS) according to their physical topology. Owing heterogeneity, peer with highest capability was selected as in each AAS. And super-peers formed many semantic networks (SSN) based on relationship. Thus a hierarchical P2P network formed. Through simulation Neuogrid, rationality validity model proved....
Analyzed the participants which consist of m-commerce supply chain in China and how these create value information or service flows through whole by investigating top three mobile network operators China, Mobile, Unicom Telecom. Framework models China's are proposed simultaneously. A case study on Mobile is largest operator made to its value-added categories each category. The result indicates that can be used explain all services provided therefore model proved reasonable.
Aiming at the characteristics of underwater pure orientation target tracking, an adaptive box length Kullback-Leibler Distance (KLD) Particle Filter (PF) algorithm is proposed based on traditional KLD PF algorithm. When performing sampling may have a problem that filtering accuracy reduced or even invalid due to fixed box. In in this paper, can be automatically adjusted according current particle distribution range, which well solve precision degradation caused by The effectiveness verified...
Accurate image segmentation results would show a great significance to computer vision-based manufacturing for complex helical surface. However, the surface is always difficult problem because of uneven gray distribution and non-homogeneous feature patterns its images. Therefore, multi-direction evolutionary model constructed multi-population cooperative evolution algorithm proposed solve new model. According characteristics image, an eigenvector extraction description strategy researched by...