- Software Testing and Debugging Techniques
- Software Reliability and Analysis Research
- Geophysical Methods and Applications
- Software Engineering Research
- Microwave Imaging and Scattering Analysis
- Geophysical and Geoelectrical Methods
- Advanced SAR Imaging Techniques
- VLSI and Analog Circuit Testing
- Model-Driven Software Engineering Techniques
- Vehicle License Plate Recognition
- Infrared Target Detection Methodologies
- Multi-Criteria Decision Making
- Fire Detection and Safety Systems
- Image and Object Detection Techniques
- Fuzzy and Soft Set Theory
- Underwater Acoustics Research
- Traffic control and management
- Handwritten Text Recognition Techniques
- Petri Nets in System Modeling
- Genomics and Chromatin Dynamics
- Simulation and Modeling Applications
- Advanced Algebra and Logic
- Computer Science and Engineering
- Software System Performance and Reliability
- Machine Fault Diagnosis Techniques
Chongqing Jiaotong University
2021-2023
Electronics and Radar Development Establishment
2010-2022
Shanghai Tunnel Engineering Rail Transit Design & Research Institute
2022
Southwest Jiaotong University
2016-2021
Defence Research and Development Organisation
2012
Abstract The research on incomplete fuzzy soft sets is an integral part of the and has been initiated recently. In this work, we first point out that existing approach to predicting unknown data in set suffers from some limitations then propose improved method. hidden information between both objects parameters revealed our more comprehensive. Furthermore, based similarity measures sets, a new adjustable object-parameter proposed predict sets. Data converts into complete one, which makes...
Detection and classification of an object is growing concern in many application areas. Ground Penetrating Radar (GPR) data has been widely used fields like military, archeology, geophysical exploration such applications. In this paper, we present a combination Singular Value Decomposition (SVD) approach Blob detector for detection buried objects from ground penetrating radar data. Classification done using Speeded Up Robust Feature (SURF) Support Vector Machine (SVM) classifiers landmine...
In this paper, we propose a 3D image analysis method for landmine detection from vehicle mounted Ground Penetrating Radar (GPR) data, using adaptive filtering technique and segmentation algorithm. Conventional methods seldom exploit the information (C-Scan) discrimination algorithms used are computationally expensive. our method, have (3D LMS), which is suitable real-time applications locating anomalies in C-Scan data. Gradient Vector Flow Deformable Model based algorithm applied on...
A track circuit is a critical component of modern railway system. The used to detect the absence train on rail tracks and produce corresponding control signals. has many block sections, each which separate device. receiver analyzes signals sent from sender produces signal relay. When in section, relay must be down, otherwise, up. We tested product that widely high-speed railways China. extracted three input parameters create an Input Domain Model (IDM). generated pair-wise test sets using...
This paper describes a novel computer-controlled intrusion-detector and automatic firing unit, which may be used for the surveillance of borders, either country, or areas requiring high security, especially in regions extreme climatic conditions, where it is difficult to deploy personnel. system not only detects intrusion but also provides video-coverage suspicious area, remote vigilance, via satellite based communication system. It provided with echanisms can automatically locate fire at...
Combinatorial testing typically considers a single input model and creates test set that achieves
EN 50128 gives a general guidance for testing railway safety-critical software. However, it does not specify how to test software in an agile development environment. Based on our observation, has been applied the of Chinese Train Control System (CTCS). Previous research focused methods managing and planning development. There exists little about developing literature.
The onboard Automatic Train Protection System (ATP) is one of the key components Chinese high-speed railway train control system. ATP a safety-critical system since failure could result in serious accidents. This paper reports combinatorial testing practice performed major functions, i.e. Balise Information Processing (BIP). We created input model for each total 7 application scenarios BIP. generated 178 pair-wise tests using ACTS tool. executed all these tests, among which 172 passed and 6...
Model-based testing (MBT) generates tests from behavioral models of systems. When applying MBT to safety-critical systems, one problem is that textual requirements which the behavior model generated focus on commonly used scenarios while missing other may lead hazards. We propose combine with a hazard analysis technique, Hazard and Operability analysis. first derive guide phrases original requirements, use these extend by adding more alternative scenarios. Second, we create timed automata...
In conventional radar applications, signal processor and image are realized as separate individual cards. Handheld Ground Penetrating is a compact, ultra-low power battery operated system. This system operating on small for eight hours of continuous operation. So utmost care required in developing every sub-system terms consumption. paper describes the design steps realizing an card handheld Radar single PCB.Keywords: ARM Processor, Effective Number Bits (ENOB), Signal Field Programmable...
Portable systems are becoming the de-facto necessity of users. The efficacy a portable system depends on battery life, which is determined by power consumption entire system. Handheld Ground Penetrating Radar (HHGPR) sensor used for detection landmines buried under surface earth. HHGPR portable, compact, low operated This needs to be continuously 8 hours battery. So utmost care required in designing and developing every sub-system terms Size, Weight Power (SWaP). As sub increases, weight...
This paper addresses an optimization problem that occurs when we try to remove from a covering array (CA) the rows do not satisfy given set of constraints. That is, how minimize number be removed? The key observation is columns CA can swapped without affecting coverage. makes it possible explore different ways map parameters involved in constraints CA, which further allows us reduce must removed. In order find optimal mapping, our approach maps one parameter at time and employs greedy...
Automatic train protection (ATP) is an important equipment with a safety requirement of SIL 4 for Chinese Train Control System, whose usually guaranteed by testing. Test cases generation method basis and research focus ATP. Taking Petri Net as the modelling tool, test ATP proposed. First, according to technical specification, performing fault mode analysis, testing model established. Then, are generated automatically searching reachability tree model. Finally, taking SOM function example,...
Cooperative Vehicle Infrastructure System (CVIS) is one of the trending solutions that enhance traffic safety and efficiency urban road intersections. The function CVIS itself should be preserved to achieve this goal. In paper, we propose a novel approach model verify its safety. First, Unified Modelling Language (UML) adopted describe process cooperation between vehicles infrastructure at intersections, where mixed situation discussed in detail. Second, timed automata network created using...
Signal software for high-speed railways is safety-critical, controlling communications between trains, tracks, stations, and signals. It necessary to test railway signal rigorously. However, ad-hoc approaches still dominate in practice. We proposed a hybrid approach that uses combinatorial testing (CT) model-based (MBT). applied this systematic track circuit receivers (TCRs) compared it with an approach. The was more effective than the approach.Although our TCR, TCR relatively simple....
The traditional finite state machine (FSM) cannot express complicated systems due to its flattened sequential features. A safe (SSM) is an extension of FSMs with capability expressing hierarchical structure, parallel structure and historical mechanism. Therefore, it can accurately functions a system, SSMs have strict formal semantics. This paper provides method for generating test paths based on SSMs. creating the reachability graph (RG) SSM presented, which eliminate mark history states....
The complete characterization of a target by radar involves estimation its range and Doppler micro-Doppler frequencies. Finite Rate Innovation (FRI) approaches allow for sampling at sub-Nyquist rates. Empirical Mode Decomposition, which recursively decomposes signal into different modes unknown spectral bands, has performance limitations such as sensitivity to noise These are partially addressed several variant algorithms; one them is Variational Decomposition (VMD), an entirely...