Yingjie Zhao

ORCID: 0009-0007-8236-8608
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Data Storage Technologies
  • Parallel Computing and Optimization Techniques
  • Distributed systems and fault tolerance
  • Caching and Content Delivery
  • Structural Health Monitoring Techniques
  • Machine Learning in Bioinformatics
  • Bioinformatics and Genomic Networks
  • Cloud Computing and Resource Management
  • Infrastructure Maintenance and Monitoring
  • Security in Wireless Sensor Networks
  • Anomaly Detection Techniques and Applications
  • Blockchain Technology Applications and Security
  • Computational Drug Discovery Methods
  • Advanced Computational Techniques and Applications
  • Concrete Corrosion and Durability
  • IoT and Edge/Fog Computing
  • Engineering Diagnostics and Reliability
  • RNA modifications and cancer
  • Advanced Authentication Protocols Security
  • Gene expression and cancer classification
  • RNA and protein synthesis mechanisms
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Building materials and conservation
  • Machine Fault Diagnosis Techniques
  • 3D Surveying and Cultural Heritage

Beijing University of Civil Engineering and Architecture
2024

Lanzhou University of Technology
2024

National University of Defense Technology
2008-2011

Structural health monitoring (SHM) is widely used to monitor and assess the condition performance of engineering structures such as, buildings, bridges, dams, tunnels. Owing sensor defects, data acquisition errors, environmental interference, abnormal are often collected stored in systems. The this study essentially different from so-called "abnormal state data," which result structural physical damage or degradation. Abnormal totally related external interference rather than changes...

10.1016/j.dibe.2024.100337 article EN cc-by-nc-nd Developments in the Built Environment 2024-01-19

Abstract A photovoltaic system employs solar cell modules and supplementary apparatus to transform energy into electrical energy. Its stable operation security are directly related people’s livelihood social development. variety of authentication schemes have been put forth as potential solutions the challenges in system. However, majority these approaches continue exhibit shortcomings terms privacy and/or performance. To enhance efficiency systems, we propose a lightweight efficient scheme...

10.1088/1742-6596/2963/1/012011 article EN Journal of Physics Conference Series 2025-02-01

Accurate prediction of the structural temperature field is required for performance assessment engineering structures and maintaining safety. However, there are complex time-lag effects between ambient temperature. It difficult to accurately describe predict using traditional linear nonlinear fitting methods. Hence, this study uses advantages gated recurrent unit (GRU) neural networks in dealing with mapping issues, further considering solar radiation developing a framework deep learning...

10.1080/15583058.2024.2380414 article EN International Journal of Architectural Heritage 2024-07-17

This paper presents our replacement algorithm named RED for storage caches. is exclusive. It can eliminate the duplications between a cache and its client cache. high performance. A new criterion Resident Distance proposed making an efficient decision instead of Recency Frequency. Moreover, non-intrusive to client. does not need change software could be used in real-life system. Previous work on management attain one or two above benefits, but all them. We have evaluated performance by using...

10.1109/msst.2010.5496988 article EN 2010-05-01

As the performance gap between disks and processors continues to increase, dozens of cache replacement policies come up handle problem. Unfortunately, most are static. Nimrod Megiddo etc put forward a low overhead adaptive policy called ARC. It outperforms static in situations. But, ARC adapts itself workloads by feedback missed pages. hasn 't carried out adaption before pages discovered. We propose high policy. hit pages, so, it is more sensitive changes than stares at tails queues...

10.1109/hpcc.2009.82 article EN 2009-01-01

Abstract Deep learning has been extensively applied in the rolling bearing fault diagnosis domain due to its superior data analysis and feature extraction capabilities. However, practical applications, normal operating state occupies most of service life equipment, occurrence probability each kind is different, leading imbalanced that significantly degrades performance neural network. In order solve this problem, a dual-feature enhanced hybrid convolutional network (DEHCNet) proposed....

10.1088/1361-6501/ad8cfe article EN cc-by-nc-nd Measurement Science and Technology 2024-10-30

Current cache replacement policies mostly work at the block device level. Block level try to achieve better hit ratio by balancing frequently and recently visited pages, however, further improvements can be realized using file-system metadata. There are two reasons for this. First, sequential access of disk data is more quickly than non-sequential access, that say, penalty blocks miss significantly lower random miss. Second, in most storage systems, files stored accessed sequentially. We...

10.1109/pdcat.2008.33 article EN 2008-01-01

Although many endeavors have been done in the field of RNA secondary structure prediction, it is still an open problem computational molecular biology. The comparative sequence analysis golden standard method when given homologous alignment. essential this can be regarded as classifier problem: to judge whether any two columns alignment correspond a base pair using provided information by Here, we employ SVMs resolve problem, and select covaration score, fraction complementary nucleotides...

10.1109/icbbe.2008.31 article EN 2008-05-01

Ever since a long time ago, recency and frequency are not to be sneezed at design of cache management policy. Meanwhile, hit ratio is used estimate whether replacement policy good or not. The influence miss penalty on performance neglected incorrectly. In fact, the can vary by almost one two orders magnitude among different policies because tremendous divergence between sequential access rate random disk. We notice phenomena propose novel policy, namely, based replacement, Saber for short,...

10.1109/icycs.2008.342 article EN 2008-11-01

Multi-level cache hierarchies are very common in today's networked storage environments. Dedicated data servers or file simultaneously accessed by multi-applications of multi-clients. Workload shift results pollution and degrade hit ratio. Widely used policies work well on the case when a single level separates provider consumer, but poorly second buffer scenarios. To avoid threshing induced improper policies, Lustre system even abandons idea employing server-side caches. However, it suffers...

10.1109/gcc.2008.68 article EN 2008-10-01

The computational prediction of protein-protein interactions is currently an important issue in biology. In this paper, a K-local hyperplane distance nearest neighbor (HKNN) classifiers with symmetrical encoding scheme proposed to predict interactions. Moreover, new sample scheme, named (SYES), for protein pair developed by which single mapped two points the space. To evaluate performance ten-fold cross validation has been employed on real data sets. results indicate that outperforms sum...

10.1109/icbbe.2009.5163216 article EN 2009-06-01
Coming Soon ...