- Software Testing and Debugging Techniques
- Software System Performance and Reliability
- Software Reliability and Analysis Research
- Distributed systems and fault tolerance
- Software Engineering Research
- Parallel Computing and Optimization Techniques
- Peer-to-Peer Network Technologies
- Energy Efficient Wireless Sensor Networks
- Cloud Computing and Resource Management
- IoT and Edge/Fog Computing
- IoT Networks and Protocols
- Network Security and Intrusion Detection
- Brain Tumor Detection and Classification
- Advanced Data Storage Technologies
- Real-Time Systems Scheduling
- Indoor and Outdoor Localization Technologies
- Embedded Systems Design Techniques
- Distributed and Parallel Computing Systems
- Mobile Ad Hoc Networks
- Cooperative Communication and Network Coding
- Service-Oriented Architecture and Web Services
- Vehicular Ad Hoc Networks (VANETs)
- Model-Driven Software Engineering Techniques
- Wireless Networks and Protocols
- Distributed Control Multi-Agent Systems
Beihang University
2008-2025
Shandong University of Finance and Economics
2009-2024
Huazhong University of Science and Technology
2019-2024
Tiangong University
2024
Nantong University
2024
Beijing Institute of Technology
2022
NARI Group (China)
2022
Jilin Business and Technology College
2020
Western Norway University of Applied Sciences
2018-2020
Jilin Province Science and Technology Department
2020
Modern GPUs have shown promising results in accelerating computation intensive and numerical workloads with limited dynamic data sharing. However, many real-world applications manifest ample amount of sharing among concurrently executing threads. Often requires mutual exclusion mechanism to ensure integrity multithreaded environment. Although modern provide atomic primitives that can be leveraged construct fine-grained locks, lock-based synchronization significant programming efforts achieve...
Most existing clustering algorithms can be only applied to homogeneous wireless sensor networks with uniform maximal transmission power. And cluster heads elected by some not distribute uniformly under heterogeneous environment where the power of each node may different. So an energy-efficient algorithm which based on virtual area partition (VAP-E) for is proposed in this paper. The simulation results show that VAP-E balance load between clusters, reduce energy consumption nodes, prolong...
mzTab is the most recent standard format developed by Proteomics Standards Initiative. a flexible tab-delimited file that can capture identification and quantification results coming from MS-based proteomics metabolomics approaches. We here present an open-source Java application programming interface for called jmzTab. The software allows efficient processing of files, providing read write capabilities, designed to be embedded in other packages. second key feature jmzTab model it provides...
Abstract Industrial Internet of Things (IIoT) is performed based on the multiple sourced data collection, communication, management and analysis from industrial environment. The can be generated at every point in manufacturing production process by real-time monitoring, connection interaction field through various sensing devices, which creates a big environment for industry. To collect, transfer, store analyse such efficiently economically, several challenges have imposed to conventional...
Web services present a new promising software technology. However, some issues and challenges in testing of them come out due to their characteristics distribution, source code invisibility etc. This paper discusses the traditional mutation then methodology OWL-S requirement model-based web service is brought forward. The traits this are as follows. Firstly, requirements used effectively reduce magnitude mutants. Secondly, mutants generated by AOP technology conveniently promptly. Thirdly,...
Implementing test suites for distributed software systems is a complex and time-consuming task due to the number of cases that need be considered in order obtain high coverage. We show how formal Coloured Petri Net model can used automatically generate suite Paxos consensus protocol. The cover both normal operation protocol as well failure injection. To evaluate our model-based testing approach, we have implemented Go programming language using quorum abstractions provided by Gorums...
Fault location of the distribution network is an important direction in construction automation. For problem slow convergence intelligent optimization algorithms and easy to fall into local optimality, multi-population particle swarm algorithm proposed. The compared with single population on IEEE69 node model, it proved that new can find fault faster. Then effectiveness a variety scenarios verified, including multiple location, also accurately locate when input information distorted which...
During past decades, many automated software faults diagnosis techniques including Spectrum-Based Fault Localization (SBFL) have been proposed to improve the efficiency of debugging activity. In field SBFL, suspiciousness calculation is closely related number failed and passed test cases. Studies shown that ratio case has more significant impact on accuracy SBFL than total cases, a balanced suite beneficial improving SBFL. Based theoretical analysis, we an PNF (Passed Not execute Faulty...
How to evaluate the reliability of Web software has been more and important since various services will be provided through web servers. The evaluation is usually made by models based on workload measurements. This paper considers applying NHPP model with Yamada exponential testing-effort function (TEF) analysis. By using data failure from IIS server logs ICRMS website, it shows that method mining useful proposed can used characterize actual patterns faithfully during website running.
The effective energy control while maintaining reliable detection performance is a key problem in wireless sensor networks surveillance, such as blue-green algae surveillance. An intelligent wakening scheme (IWS) proposed this paper which considers different importance degrees of the grids surveillance zone. It uses voronoi diagram to determine scope each node and calculates probability with degree scope. nodes are then turned on stochastically according probability. Simulation results...
With the capability of reducing multi-path fading and raising channel capacity by obtaining spatial diversity gain, cooperative communication is effective in functionality improvement wireless networks. In this paper, based on characteristic distribution time-variance cognitive radio ad hoc networks (CRAHNs), a dynamic game framework proposed for studying interactions between source node relays, choosing adaptive relays to join cooperation. The constraint optimization problem further...
For a class of fractional-order singular multi-agent systems (FOSMASs) with local Lipschitz nonlinearity, this paper proposes closed-loop Dα-type iterative learning formation control law via input sharing to achieve the stable FOSMASs in finite time. Firstly, issue nonlinearity under fixed communication topology (FCT) is transformed into consensus tracking scenario. Secondly, by virtue utilizing characteristics fractional calculus and generalized Gronwall inequality, sufficient conditions...
In order to isolate each chromosome more accurately and completely, a two-stage method of processing overlapping chromosomes was proposed. the first stage, we propose DA-UNet (dual attention U-Net) network based on improved U-Net segment non-overlapping regions chromosomes. segmentation network, encoder part replaced by pre-trained ResNet50 extraction feature accelerate convergence speed. A dual module designed at jump junction, combining features multi-level parallel decoder. second output...
Fault tolerance overhead of high performance computing (HPC) applications is becoming critical to the efficient utilization HPC systems at large scale. typically tolerate fail-stop failures by checkpointing. Another promising method in algorithm level, called algorithmic recovery. These two methods can achieve efficiency when system scale not very large, but will both lose their effectiveness approach Exaflops, where number processors including expected one million. This paper develops a new...
This paper presents a search-based approach relying on multi-objective reinforcement learning and optimization for test case generation in model-based software testing. Our considers as an exploration versus exploitation dilemma, we address this dilemma by implementing particular strategy of multi-armed bandits with multiple rewards. After optimizing our using the jMetal framework, resulting parameter setting is then used extended version Modbat tool We experimentally evaluate collection...