- Software Engineering Research
- Asphalt Pavement Performance Evaluation
- Software Engineering Techniques and Practices
- Cooperative Communication and Network Coding
- Caching and Content Delivery
- Software Testing and Debugging Techniques
- Software Reliability and Analysis Research
- Infrastructure Maintenance and Monitoring
- Software System Performance and Reliability
- Geotechnical Engineering and Underground Structures
- Opportunistic and Delay-Tolerant Networks
- Scientific Computing and Data Management
- Advanced X-ray Imaging Techniques
- Wireless Power Transfer Systems
- Energy Harvesting in Wireless Networks
- Cloud Data Security Solutions
- Model-Driven Software Engineering Techniques
- Photoacoustic and Ultrasonic Imaging
- Tribology and Wear Analysis
- Advanced Fiber Optic Sensors
- Lignin and Wood Chemistry
- Grouting, Rheology, and Soil Mechanics
- Remote Sensing and Land Use
- Oil Palm Production and Sustainability
- Tunneling and Rock Mechanics
Nanjing University
2012-2024
Nanjing University of Aeronautics and Astronautics
2019-2024
Institute of Software
2023-2024
Ministry of Education of the People's Republic of China
2023
Guangxi Normal University
2023
National Chung Cheng University
2023
Changshu Institute of Technology
2022
Novelis (Canada)
2019
Tianjin University
2009
Mobile phone localization plays a key role in the fast-growing Location Based Applications domain. Most of existing schemes rely on infrastructure support such as GSM, WiFi or GPS. In this paper, we present FTrack, novel floor system to identify level multi-floor building which mobile user is located. FTrack uses phone's accelerometer only without any support. It does not require prior knowledge height. By capturing encounters and analyzing trails, finds mapping from traveling time (when...
Temporal compressive coherent diffraction imaging is a lensless technique with the capability to capture fast-moving small objects. However, accuracy of reconstruction often hindered by loss frequency domain information, critical factor limiting quality reconstructed images. To improve these images, method dual-domain mean-reverting diffusion model-enhanced temporal (DMDTC) has been introduced. DMDTC leverages model acquire prior information in both and spatial through sample learning. The...
In recent years, unmanned aerial vehicles (UAVs) have attracted extensive interests from both academia and industry due to the potential wide applications with universal applicable nature of deployment. However, currently bottleneck for UAVs is limited carried energy resources (e.g. oil box, battery), especially electric-driven UAVs. For a system consisting multiple using batteries, its stability depends on each UAV. Therefore, lifetime UAV expected be extended. this paper, we propose...
In large-scale, active software projects, one of the main challenges with code review is prioritizing many Code Review Requests (CRRs) these projects receive. Prior studies have developed Learning-to-Rank (LtR) models in support CRRs and adopted rich evaluation metrics to compare their performances. However, was performed before observing complex interactions between reviewers, activities real-world reviews. Such a pre-review provides few indications about how effective LtR contribute This...
Typhoon is one type of disaster weather which can impose serious impact on the life and production human society. It has special physical characteristics clouds with structure cloud eye, walls spiral bands. Much information about motion, wind field heavy rainfall contained in Therefore it very important to segment recognize its bands as clearly possible. As difficult achieve expected result existing image segmentation algorithms, study support vector machine was applied while problem be...
In code reviews, developers examine changes authored by peers and provide feedback through comments. Despite the importance of these comments, no accepted approach currently exists for assessing their quality. Therefore, this study has two main objectives: (1) to devise a conceptual model an explainable evaluation review comment quality, (2) develop models automated comments according model. To do so, we conduct mixed-method studies propose new approach: EvaCRC (Evaluating Code Review...
Trustworthy Open Source Software (OSS) development processes are the basis that secures long-term trustworthiness of software projects and products. With aim to investigate Pull Request (PR) process, common model collaborative in OSS community, we exploit process mining identify analyze normal anomalous patterns PR processes, propose our approach identifying anomalies from both control-flow semantic aspects, then synthesize root causes identified anomalies. We 17531 PRs 18 on GitHub,...
Abstract “Shift To Left” is the cornerstone of successful implementation DevSecOps. By testing projects for vulnerabilities in early stages development, teams can save overall costs before security issues reach build phase. As one popular practices Left,” Software Composition Analysis (SCA) system aims to leverage Bill Materials (SBOM) enhance software supply chain security. However, SBOM lacks mature generation and distribution mechanisms, requiring incentive measures drive industry...
Large language model-generated code (LLMgCode) has become increasingly prevalent in software development. Many studies report that LLMgCode more quality and security issues than human-authored (HaCode). It is common for to mix with HaCode a change, while the change signed by only human developers, without being carefully checked. automated methods have been proposed detect from HaCode, which perplexity-based method (PERPLEXITY short) state-of-the-art method. However, efficacy evaluation of...
Coded caching technique is an efficient approach to reduce the transmission load in networks. In this paper, we consider a new widespread system called <inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> <tex-math notation="LaTeX">$(K_{1},K_{2},U,r,M,N)$ </tex-math></inline-formula> two-dimensional (2D) caching-aided ultra-dense networks (UDNs) with server containing notation="LaTeX">$N$ files, notation="LaTeX">$K_{1}K_{2}$ cache nodes...
In this paper, we consider a two-dimensional caching-aided ultra-dense network caching system, which consists of server containing N files, K <inf xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">1</inf> xmlns:xlink="http://www.w3.org/1999/xlink">2</inf> cache nodes that are arranged neatly on the grid with rows and columns, U cacheless users randomly distributed around nodes. The connects to through an error-free shared-link, can be served by nearby...
This study conducted experiments and tests to validate the performance of a mango picking drone. The results demonstrated that utilization YOLOv4-tiny object detection model accurately detects locates ripe fruits within orchards. accelerated inference computation provided by TensorRT enhances real-time capability, enabling unmanned aerial vehicles (UAV) make prompt harvesting decisions. three-point localization method calculates distances ensure precise measurements between UAV target...
Coded caching technique is an efficient approach to reduce the transmission load in networks and has been studied heterogeneous network settings recent years. In this paper, we consider a new widespread system called $(K_1,K_2,U,r,M,N)$ two-dimensional (2D) caching-aided ultra-dense (UDN) with server containing $N$ files, $K_1K_2$ cache nodes arranged neatly on grid $K_1$ rows $K_2$ columns, $U$ cache-less users randomly distributed around nodes. Each node can at most $M\leq N$ files certain...
The work aims to design a food sorting control system based on ADT8940A1 with and grabbing as the research object solve problems of high missing picking wrong rate difficult sorting. In actual process, shape be sorted was diverse, distribution messy, situation complex, so traditional method generally meet requirements. To overcome methods, fuzzy neural network PID proposed through parallel robot ADT8940A1motion controller core. maximum grasping speed 150 times / min. less than 0.1% false...