Feng Cheng

ORCID: 0000-0002-3733-4114
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Coding theory and cryptography
  • Cooperative Communication and Network Coding
  • Stochastic Gradient Optimization Techniques
  • Cloud Computing and Resource Management
  • graph theory and CDMA systems
  • IoT and Edge/Fog Computing
  • Advanced Algorithms and Applications
  • Metaheuristic Optimization Algorithms Research
  • Sparse and Compressive Sensing Techniques
  • Evolutionary Algorithms and Applications
  • Advanced Sensor and Control Systems
  • Quantum optics and atomic interactions
  • Software System Performance and Reliability
  • DNA and Biological Computing
  • Robotics and Sensor-Based Localization
  • Industrial Vision Systems and Defect Detection
  • Direction-of-Arrival Estimation Techniques
  • Water Quality Monitoring Technologies
  • Advanced Multi-Objective Optimization Algorithms
  • Coastal wetland ecosystem dynamics
  • Software Engineering Research
  • Cold Atom Physics and Bose-Einstein Condensates
  • Age of Information Optimization
  • Advanced Malware Detection Techniques
  • Advanced machining processes and optimization

Southwest Jiaotong University
2017-2024

Shanghai University of Engineering Science
2022-2023

Huazhong University of Science and Technology
2020

Hengshui University
2012

Cloud workloads are highly dynamic and complex, making task scheduling in cloud computing a challenging problem. While several algorithms have been proposed recent years, they mainly designed to handle batch tasks not well-suited for real-time workloads. To address this issue, researchers started exploring the use of Deep Reinforcement Learning (DRL). However, existing models limited handling independent cannot process workflows, which prevalent consist related subtasks. In paper, we propose...

10.1016/j.dcan.2023.12.009 article EN cc-by Digital Communications and Networks 2024-01-01

With some specific characteristics such as elastics and scalability, cloud computing has become the most promising technology for online business nowadays. However, how to efficiently perform real-time job scheduling in still poses significant challenges. The reason is that those jobs are highly dynamic complex, it always hard allocate them resources an optimal way, meet requirements from both service providers users. In recent years, various works demonstrate deep reinforcement learning...

10.1109/tsusc.2023.3303898 article EN IEEE Transactions on Sustainable Computing 2023-08-10

Code clone detection is to find out code fragments with similar functionalities, which has been more and important in software engineering. Many approaches have proposed detect clones, token-based methods are the most scalable but cannot handle semantic clones because of lack consideration program semantics. To address issue, researchers conduct analysis distill semantics into a graph representation by matching graphs. However, such suffer from low scalability since typically time-consuming.

10.1145/3324884.3416562 article EN 2020-12-21

Wolf Pack Algorithm (WPA) is a swarm intelligence algorithm that simulates the food searching process of wolves. It widely used in various engineering optimization problems due to its global convergence and computational robustness. However, has some weaknesses such as low speed easily falling into local optimum. To tackle problems, we introduce an improved approach called OGL-WPA this work, based on employments Opposition-based learning Genetic with Levy's flight. Specifically, OGL-WPA,...

10.1371/journal.pone.0254239 article EN cc-by PLoS ONE 2021-08-26

To address the defects of salp swarm algorithm (SSA) such as slow convergence speed and ease falling into a local minimum, new combining chaotic mapping decay factor is proposed combined with back propagation (BP) neural network to achieve an effective prediction tool wear. Firstly, used enhance formation population, which facilitates iterative search reduces trapping in optimum; secondly, introduced improve update followers so that can be updated adaptively iterations, theoretical analysis...

10.3390/electronics12030769 article EN Electronics 2023-02-03

Due to their important applications in theory and practice, linear complementary dual (LCD) codes self-orthogonal have received much attention the last decade. The objective of this paper is extend a recent construction binary LCD general $ p $-ary case, where an odd prime. Based on extended construction, several classes are obtained. characterizations these be or derived. duals also studied. It turns out that proposed optimal many cases sense parameters meet certain bounds codes. weight...

10.3934/amc.2019018 article EN Advances in Mathematics of Communications 2019-01-01

How to construct asymptotically good codes is one of the hottest topic in modern coding theory. In this paper, we concatenated an extended primitive BCH outer code with a class binary inner constructed by interleaved get codes. It shown that Weldon [1] its special case.

10.1109/itaic.2019.8785548 article EN 2022 IEEE 10th Joint International Information Technology and Artificial Intelligence Conference (ITAIC) 2019-05-01

Cyclic codes are a subclass of linear and have applications in consumer electronics, data storage systems, communication systems as they efficient encoding decoding algorithms. In this letter, class four-weight binary cyclic presented. Their weight distributions these also settled.

10.1587/transfun.e100.a.965 article EN IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences 2017-01-01

We study stochastic convex optimization subjected to linear equality constraints. Traditional Stochastic Alternating Direction Method of Multipliers and its Nesterov's acceleration scheme can only achieve ergodic O(1/\sqrt{K}) convergence rates, where K is the number iteration. By introducing Variance Reduction (VR) techniques, rates improve O(1/K). In this paper, we propose a new ADMM which elaborately integrates extrapolation VR techniques. prove that our algorithm non-ergodic O(1/K) rate...

10.48550/arxiv.1704.06793 preprint EN other-oa arXiv (Cornell University) 2017-01-01

Cyclic codes are a subclass of linear and have applications in consumer electronics, data storage systems, communication systems as they efficient encoding decoding algorithms compared with the block codes. The objective this letter is to present family p-ary cyclic length $\frac{p^m-1}{p-1}$ dimension $\frac{p^m-1}{p-1}-2m$, where p an arbitrary odd prime m positive integer gcd(p-1,m)=1. minimal distance d proposed shown be 4≤d≤5 which at least almost optimal respect some upper bounds on code.

10.1587/transfun.e100.a.2048 article EN IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences 2017-01-01

Studying about the method of mixed urban road network design problems is considerable practical importance for engineering practice transportation planning. The problem deals with both how to add new links and increase capacity some existing using a quantitative analysis method. objective make an optimal investment decision in order minimize total travel cost network, while accounting route choice behaviors users. In this paper, bi-level programming model presented. And algorithm has been...

10.1061/40996(330)650 article EN Logistics 2009-01-05

Constant composition codes (CCCs) are a special class of constant-weight codes. They include permutation as subclass. The study and constructions CCCs with parameters meeting certain bounds have been an interesting research subject in coding theory. A bridge from zero difference balanced (ZDB) functions to the Luo-Fu-Vinck-Chen bound has established by Ding (IEEE Trans. Information Theory 54(12) (2008) 5766-5770). This provides new approach for obtaining optimal CCCs. objective this letter...

10.1587/transfun.e100.a.2183 article EN IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences 2017-01-01

In this paper, the subsurface flow wetland sewage treatment mathematical model is studied. analytical solution obtained by using Laplace transform technique for non-steady and diffusion characteristics some parameters used in are analyzed. Then which added source on two boundary conditions adomian decomposition method. The examples given compare approximate exact solutions.

10.4028/www.scientific.net/amm.198-199.894 article EN Applied Mechanics and Materials 2012-09-01

A numeric method of solving nonlinear equation group is proposed. The problem equivalently changed to the function optimization, and then a solution obtained by adaptive genetic algorithm, considering it as initial Levenberg-Marquardt more accurate can be obtained, result, time efficiency improved.

10.4028/www.scientific.net/amr.532-533.1636 article EN Advanced materials research 2012-06-01

Local codes are a special kind of error-correcting codes. Locally correctable (LCCs) one type local LCCs can efficiently recover any coordinate its corrupted encoding by probing only few but not all fraction the word. A q-ary LCC which encodes length k messages to N codewords with relative distance Δ has three parameters: r, δ and ε. r is called query complexity recording number queries. tolerance measuring between be locally decoded. ε error probability showing fail recovered at most One...

10.1109/iaeac47372.2019.8997905 article EN 2022 IEEE 6th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC ) 2019-12-01

This study presents an enhanced version of the mayfly method in order to address its deficiencies, such as insufficient population variety and slow convergence time. First, initialization phase, tent mapping is introduced increase diversity so that initial evenly distributed search space. Second, reverse learning mechanism update population, algorithm based on mapping. Diversity facilitates subsequent iterative optimization algorithm. Then, attenuation factor position individual individual's...

10.1109/icimibd58123.2022.00030 article EN 2022-12-09
Coming Soon ...