- Cloud Computing and Resource Management
- IoT and Edge/Fog Computing
- Service-Oriented Architecture and Web Services
- Caching and Content Delivery
- Simulation Techniques and Applications
- Distributed and Parallel Computing Systems
- Advanced Computational Techniques and Applications
- Topic Modeling
- Scientific Computing and Data Management
- Wireless Communication Networks Research
- Natural Language Processing Techniques
- Security and Verification in Computing
- Software System Performance and Reliability
- Cloud Data Security Solutions
- Fusion materials and technologies
- Privacy-Preserving Technologies in Data
- Parallel Computing and Optimization Techniques
- Metaheuristic Optimization Algorithms Research
- Educational Technology and Assessment
- Advanced Graph Neural Networks
- Technology and Security Systems
- Material Properties and Failure Mechanisms
- Distributed Control Multi-Agent Systems
- Smart Parking Systems Research
- Stochastic Gradient Optimization Techniques
Stockholm University
2025
National University of Defense Technology
2020-2024
Beihang University
2016-2023
Chongqing University of Technology
2023
University of Science and Technology Beijing
2014-2022
Academy of Military Transportation
2011-2020
Beijing Institute of Technology
2016-2018
Xi'an University of Technology
2003
Summary The cloud infrastructures provide a suitable environment for the execution of large‐scale scientific workflow application. However, it raises new challenges to efficiently allocate resources application and also meet user's quality service requirements. In this paper, we propose an adaptive penalty function strict constraints compared with other genetic algorithms. Moreover, coevolution approach is used adjust crossover mutation probability, which able accelerate convergence prevent...
Workflow application can be executed in cloud computing environments utility-based fashion. In our paper, we first give a survey of workflow and present the cloud-based architecture for Smart City. Then variety scheduling algorithms are reviewed. The purpose this paper is to making taxonomy management environment, also applying City environments, further presenting several research challenges area.
Efficient and long-lasting electrocatalysts are one of the key factors in determining their large-scale commercial viability. Although fundamentals deactivation regeneration crucial for understanding sustaining durable activity, little has been conducted on metalloids compared to metal-derived ones. Herein, by virtue situ seconds-resolved X-ray absorption spectroscopy, we discovered chemical evolution during deactivation-regeneration cycles tellurium clusters supported nitrogen-doped carbon...
Cloud computing as a widely used platform can provide number of services for customers in pay-as-you-go fashion. Enabling further growing and complex needs users, service different independent cloud provider should be composed to deliver uniform Quality Service (QoS) single request. An open valid question is how select partner chain optimize the compositions order satisfy both functional non-functional requirements across multiple services. It NP-hard problem faces trade-off among various...
This paper focuses on how to maximize accuracy of Cloud service discovery and give enough flexibility customers discover their best suited services from a range providers. An ontology-based approach is proposed, which works based modeling semantically enriched services, ontology reasoning logic matchmaking. have different preferences for non-functional attributes, ranking discovered according preference can help select the most appropriate cloud service. Experimental results show that not...
Service composition in the Inter-Cloud raises new challenges that are caused by different Quality of (QoS) requirements users, which served geo-distributed Cloud providers.This paper aims to explore how select and compose such services while considering reach high efficiency on cost response time, low network latency, reliability across multiple providers.A hybrid multi-objective evolutionary algorithm perform above task called LS-NSGA-II-DE is proposed, differential evolution (DE) uses...
College students have gradually become the main force of entrepreneurship in mass and innovation. However, their entrepreneurial performance was not as good expected. We carried out research to analyze predictive factors college put forward targeted suggestions, hoping be helpful improve them. Based on questionnaire data obtained from 2,097 student entrepreneurs, this study uses structural equation model students. The survey results show that both personal behavioral influence In study,...
Edge computing is a good complement to cloud for deploying large-scale geo-distributed simulation applications, which are very sensitive the communication delay among different components (also called tasks in this paper) and users. We mainly focus on efficient scheduling of collaborative edge environments. As should be deployed jointly with consideration capacity constraints hosts, it actually an NP-complete multi-dimensional bin packing problem. Meanwhile, dynamic changes component host...
Integrating lexical information into Chinese character embedding is a valid method to figure out the named entity recognition (NER) issue. However, most existing methods focus only on discovery of boundaries, considering words matched by characters. They ignore association between characters and their left right matching words. local semantic character’s neighborhood, which crucial for NER. The language incorporates significant number polysemous words, meaning that single word can possess...
Multiple Cloud services can be composed as a single service to fulfill the execution of large-scale workflow application. It faces trade-offs among several QoS metrics causing by users' preferences. Most existing works utilize multi-objective evolutionary algorithms address this problem. However, it is hardly express different This paper proposes an algorithm for composition, combining NSGA-II with Decision-Making method calculate Crowding Distance triangular fuzzy number based on AHP. The...
This paper introduces the circuit design of voltage-controlled color changing lamp based on Multisim. The mainly comprises reference signal generating and voltage comparator. With Multisim software simulating debugging, simulation results show function can be achieved.
Abstract Particle Swarm Optimization (PSO) is kind of algorithm that can be used to solve optimization problems. In practice, many problems are discrete but PSO was initially designed meet the requirements continuous A lot researches had made efforts handle this case and varieties algorithms were proposed. However, these just focus on specific problem, performance it significantly degrades when extending other For now, there no reasonable unified principle or method for analyzing application...
How to select different independent cloud service compose an optimization satisfy user’s QoS requirement is a challenge problem. A oriented particle swarm algorithm proposed in this paper, which considers multiple parameters the process of composition.
This paper studies the consensus problem for high-order nonlinear multi agent systems via edge Laplacian. By using Laplacian agreement, can be turned into stabilization of based state, which implies that has much potential to solve leaderless problem. Benefit from backstepping technique, a distributed protocol is proposed. Then we prove convergence algorithm by Lyapunov stability theory. Finally, simulation results are provided illustrate effectiveness theoretical analysis.
The requirements for low latency and high stability in large-scale geo-distributed training simulations have made cloud-edge collaborative simulation an emerging trend. However, there is currently limited research on how to deploy run-time resources (SRR), including edge servers, services, members. On one hand, the deployment schemes of these are coupled mutual impacts. It difficult ensure overall optimum by deploying separately. other pursuit system often challenging achieve simultaneously...
The co-resident attack across virtual machines is a serious security challenge to the resource sharing mechanism in cloud computing. existing defensive solutions, mainly aiming at improving isolation and dynamics of machines, require modification monitor or frequent migration which are hard be deployed large scale scenarios. Considering strong dependence attacks on type operating system, diversified assignment strategy systems for proposed mitigate by increasing cost attackers. Specifically,...