Jinwei Xu

ORCID: 0009-0004-5157-1118
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Software Engineering Research
  • Asphalt Pavement Performance Evaluation
  • Software Engineering Techniques and Practices
  • Cooperative Communication and Network Coding
  • Caching and Content Delivery
  • Software Testing and Debugging Techniques
  • Software Reliability and Analysis Research
  • Infrastructure Maintenance and Monitoring
  • Software System Performance and Reliability
  • Geotechnical Engineering and Underground Structures
  • Opportunistic and Delay-Tolerant Networks
  • Scientific Computing and Data Management
  • Advanced X-ray Imaging Techniques
  • Wireless Power Transfer Systems
  • Energy Harvesting in Wireless Networks
  • Cloud Data Security Solutions
  • Model-Driven Software Engineering Techniques
  • Photoacoustic and Ultrasonic Imaging
  • Tribology and Wear Analysis
  • Advanced Fiber Optic Sensors
  • Lignin and Wood Chemistry
  • Grouting, Rheology, and Soil Mechanics
  • Remote Sensing and Land Use
  • Oil Palm Production and Sustainability
  • Tunneling and Rock Mechanics

Nanjing University
2012-2024

Nanjing University of Aeronautics and Astronautics
2019-2024

Institute of Software
2023-2024

Ministry of Education of the People's Republic of China
2023

Guangxi Normal University
2023

National Chung Cheng University
2023

Changshu Institute of Technology
2022

Novelis (Canada)
2019

Tianjin University
2009

10.1016/j.csite.2025.105837 article EN cc-by-nc Case Studies in Thermal Engineering 2025-02-01

Mobile phone localization plays a key role in the fast-growing Location Based Applications domain. Most of existing schemes rely on infrastructure support such as GSM, WiFi or GPS. In this paper, we present FTrack, novel floor system to identify level multi-floor building which mobile user is located. FTrack uses phone's accelerometer only without any support. It does not require prior knowledge height. By capturing encounters and analyzing trails, finds mapping from traveling time (when...

10.1109/percom.2012.6199843 article EN IEEE International Conference on Pervasive Computing and Communications 2012-03-01

10.1016/j.colsurfa.2023.132194 article EN Colloids and Surfaces A Physicochemical and Engineering Aspects 2023-08-05

Temporal compressive coherent diffraction imaging is a lensless technique with the capability to capture fast-moving small objects. However, accuracy of reconstruction often hindered by loss frequency domain information, critical factor limiting quality reconstructed images. To improve these images, method dual-domain mean-reverting diffusion model-enhanced temporal (DMDTC) has been introduced. DMDTC leverages model acquire prior information in both and spatial through sample learning. The...

10.1364/oe.517567 article EN cc-by Optics Express 2024-03-26

In recent years, unmanned aerial vehicles (UAVs) have attracted extensive interests from both academia and industry due to the potential wide applications with universal applicable nature of deployment. However, currently bottleneck for UAVs is limited carried energy resources (e.g. oil box, battery), especially electric-driven UAVs. For a system consisting multiple using batteries, its stability depends on each UAV. Therefore, lifetime UAV expected be extended. this paper, we propose...

10.1109/msn48538.2019.00046 article EN 2019-12-01

In large-scale, active software projects, one of the main challenges with code review is prioritizing many Code Review Requests (CRRs) these projects receive. Prior studies have developed Learning-to-Rank (LtR) models in support CRRs and adopted rich evaluation metrics to compare their performances. However, was performed before observing complex interactions between reviewers, activities real-world reviews. Such a pre-review provides few indications about how effective LtR contribute This...

10.1109/saner56733.2023.00050 article EN 2022 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER) 2023-03-01

Typhoon is one type of disaster weather which can impose serious impact on the life and production human society. It has special physical characteristics clouds with structure cloud eye, walls spiral bands. Much information about motion, wind field heavy rainfall contained in Therefore it very important to segment recognize its bands as clearly possible. As difficult achieve expected result existing image segmentation algorithms, study support vector machine was applied while problem be...

10.1109/icmlc.2009.5212398 article EN International Conference on Machine Learning and Cybernetics 2009-07-01

In code reviews, developers examine changes authored by peers and provide feedback through comments. Despite the importance of these comments, no accepted approach currently exists for assessing their quality. Therefore, this study has two main objectives: (1) to devise a conceptual model an explainable evaluation review comment quality, (2) develop models automated comments according model. To do so, we conduct mixed-method studies propose new approach: EvaCRC (Evaluating Code Review...

10.1145/3611643.3616245 article EN 2023-11-30

Trustworthy Open Source Software (OSS) development processes are the basis that secures long-term trustworthiness of software projects and products. With aim to investigate Pull Request (PR) process, common model collaborative in OSS community, we exploit process mining identify analyze normal anomalous patterns PR processes, propose our approach identifying anomalies from both control-flow semantic aspects, then synthesize root causes identified anomalies. We 17531 PRs 18 on GitHub,...

10.1145/3597503.3639196 article EN 2024-04-12

Abstract “Shift To Left” is the cornerstone of successful implementation DevSecOps. By testing projects for vulnerabilities in early stages development, teams can save overall costs before security issues reach build phase. As one popular practices Left,” Software Composition Analysis (SCA) system aims to leverage Bill Materials (SBOM) enhance software supply chain security. However, SBOM lacks mature generation and distribution mechanisms, requiring incentive measures drive industry...

10.1002/smr.2675 article EN Journal of Software Evolution and Process 2024-06-11

Large language model-generated code (LLMgCode) has become increasingly prevalent in software development. Many studies report that LLMgCode more quality and security issues than human-authored (HaCode). It is common for to mix with HaCode a change, while the change signed by only human developers, without being carefully checked. automated methods have been proposed detect from HaCode, which perplexity-based method (PERPLEXITY short) state-of-the-art method. However, efficacy evaluation of...

10.48550/arxiv.2412.16525 preprint EN arXiv (Cornell University) 2024-12-21

Coded caching technique is an efficient approach to reduce the transmission load in networks. In this paper, we consider a new widespread system called <inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> <tex-math notation="LaTeX">$(K_{1},K_{2},U,r,M,N)$ </tex-math></inline-formula> two-dimensional (2D) caching-aided ultra-dense networks (UDNs) with server containing notation="LaTeX">$N$ files, notation="LaTeX">$K_{1}K_{2}$ cache nodes...

10.1109/tcomm.2023.3299971 article EN IEEE Transactions on Communications 2023-07-31

In this paper, we consider a two-dimensional caching-aided ultra-dense network caching system, which consists of server containing N files, K <inf xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">1</inf> xmlns:xlink="http://www.w3.org/1999/xlink">2</inf> cache nodes that are arranged neatly on the grid with rows and columns, U cacheless users randomly distributed around nodes. The connects to through an error-free shared-link, can be served by nearby...

10.1109/isit54713.2023.10206864 article EN 2022 IEEE International Symposium on Information Theory (ISIT) 2023-06-25

This study conducted experiments and tests to validate the performance of a mango picking drone. The results demonstrated that utilization YOLOv4-tiny object detection model accurately detects locates ripe fruits within orchards. accelerated inference computation provided by TensorRT enhances real-time capability, enabling unmanned aerial vehicles (UAV) make prompt harvesting decisions. three-point localization method calculates distances ensure precise measurements between UAV target...

10.1109/aris59192.2023.10268556 article EN 2023-08-30

Coded caching technique is an efficient approach to reduce the transmission load in networks and has been studied heterogeneous network settings recent years. In this paper, we consider a new widespread system called $(K_1,K_2,U,r,M,N)$ two-dimensional (2D) caching-aided ultra-dense (UDN) with server containing $N$ files, $K_1K_2$ cache nodes arranged neatly on grid $K_1$ rows $K_2$ columns, $U$ cache-less users randomly distributed around nodes. Each node can at most $M\leq N$ files certain...

10.48550/arxiv.2212.12992 preprint EN other-oa arXiv (Cornell University) 2022-01-01

The work aims to design a food sorting control system based on ADT8940A1 with and grabbing as the research object solve problems of high missing picking wrong rate difficult sorting. In actual process, shape be sorted was diverse, distribution messy, situation complex, so traditional method generally meet requirements. To overcome methods, fuzzy neural network PID proposed through parallel robot ADT8940A1motion controller core. maximum grasping speed 150 times / min. less than 0.1% false...

10.1109/imcec55388.2022.10019898 article EN 2022 IEEE 5th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC) 2022-12-16
Coming Soon ...