- Software Engineering Research
- Advanced Malware Detection Techniques
- Web Data Mining and Analysis
- Distributed systems and fault tolerance
- Software Testing and Debugging Techniques
- Topic Modeling
- Software System Performance and Reliability
- Advanced Data Storage Technologies
- Software Reliability and Analysis Research
- Cloud Computing and Resource Management
- Advanced Computational Techniques and Applications
- Machine Learning and ELM
- Mobile Crowdsensing and Crowdsourcing
- Distributed and Parallel Computing Systems
- Parallel Computing and Optimization Techniques
- MicroRNA in disease regulation
- AI in cancer detection
- Brain Tumor Detection and Classification
- Blockchain Technology Applications and Security
- Sentiment Analysis and Opinion Mining
- Algorithms and Data Compression
- Radiomics and Machine Learning in Medical Imaging
- Forest, Soil, and Plant Ecology in China
- Environmental and Agricultural Sciences
- Venous Thromboembolism Diagnosis and Management
Wuhan University of Technology
2004-2024
Nanjing University
2016-2023
University of Science and Technology Beijing
2021-2023
Shanxi University of Finance and Economics
2018-2022
Inspur (China)
2020-2021
Taiyuan University of Technology
2011-2020
Institute of Soil and Water Conservation
2009-2011
Crowdsourced testing has been widely adopted to improve the quality of various software products. workers typically perform tasks and report their experiences through test reports. While crowdsourced reports provide feedbacks from real usage scenarios, inspecting such a large number becomes time-consuming yet inevitable task. To efficiency this task, existing used issue-tracking systems, as JIRA, Bugzilla, Mantis, have provided keyword-search-based methods assist users in identifying...
API recommendation in real-time is challenging for dynamic languages like Python. Many existing techniques are highly effective, but they mainly support static languages. A few Python IDEs provide functionalities based on type inference and training a large corpus of libraries third-party libraries. As such, may fail to recommend or make poor recommendations when information missing target APIs project-specific. In this paper, we propose novel approach, PyART, programs real-time. It features...
The red palm weevil (RPW, Rhynchophorus ferrugineus) is an invasive and highly destructive pest that poses a serious threat to plants. To improve the efficiency of adult RPWs' management, enhanced YOLOv5 object detection algorithm based on attention mechanism proposed in this paper. Firstly, capabilities for small targets are by adding convolutional layer backbone network forming quadruple down-sampling splicing layers. Secondly, Squeeze-and-Excitation (SE) Convolutional Block Attention...
Crowdsourced testing provides an effective way to deal with the problem of Android system fragmentation, as well application scenario diversity faced by testing. The generation test requirements is a significant part crowdsourced However, manually generating tedious, which requires issuers have domain knowledge under test. To solve these problems, we developed tool named KARA, short for Knowledge Graph Aided Requirements Generation Testing. KARA first analyzes result automatic on...
To parallelize data processing within BFT consensus protocols, <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">Directed Acyclic Graph</i> (DAG) structures have been integrated into design, shaping the realm of DAG-based protocols. Existing protocols rely on xmlns:xlink="http://www.w3.org/1999/xlink">Reliable Broadcast</i> (RBC) protocol or its variants for block dissemination, which ensures consistency and totality properties delivery....
This is the research artifact of paper titled 'PyART: Python API Recommendation in Real-Time'. PyART a real-time recommendation tool for Python, which includes two main functions: data-flow analysis and both incomplete complete code context. Compared to classical tools, has important particularities: it able work on scenario, provides dynamic language. Classical tools often fail make static due incompletion syntax. And features language also bring challenges type inference recommendation....
Owing to their mighty fitting ability, the supervised learning-based deep-learning (DL) models have been widely used in area of optical performance monitoring (OPM) improve monitors’ performance. However, DL OPM are based on two important premises. The first premise is enough training data with labels; second same distribution and test data. Nevertheless, it hard meet premises real-world environment where monitors deployed, since unlabeled network dynamic (such as component aging caused by...
Acceleration of large-scale graph processing by FPGA has been proved an energy efficient method, especially in edge computation scenarios. acceleration calculation includes inter partition parallel and intra parallel. In this paper, we focus on present a novel data selection network less complexity. Moreover, sub-graph compression, proper subgraph scheduling, some initialization modules, get our architecture. We test PageRank algorithm set Twitter using the Experiment shows that can support...
In the computer-aided detection (CAD) system of pulmonary nodules, a high false positive rate is common because density and computed tomography (CT) values vessel nodule in CT images are similar, which affects accuracy nodules.In this paper, method automatic nodules based on multi-scale enhancement filters 3D shape features proposed.The uses an iterative threshold region growing algorithm to segment lung parenchyma.Two types constructed enhance blood vessels images, most nodular removed...
In this paper, we present CTRAS, a tool for automatically aggregating and summarizing duplicate crowdsourced test reports on the fly. CTRAS can detect duplicates based both textual information screenshots, further aggregates summarizes reports. provides end users with comprehensive comprehensible understanding of all by identifying main topics across group aggregated highlighting supplementary that are mentioned in subgroups Also, it classic issue tracking systems, such as project-report...
To effectively improve the diagnosis of pulmonary nodules, this paper proposes a new automatic method for nodules based on hierarchical extreme learning machine (H-ELM) that can automatically carry out feature extraction, model training and nodule detection. In our method, an adaptive histogram equalisation is used first to enhance contrast original image. The processed images are then input into (ELM)-based unsupervised multilayer auto-encoder obtain more compact meaningful high-level...
Blockchain technology has gained prominence for its potential to address security and privacy challenges in Internet-of-Things (IoT) services Cyber-Physical Systems (CPS) due decentralized, traceable, immutable nature. However, the considerable energy consumption associated with blockchain, exemplified by Bitcoin, raised sustainability concerns. This paper introduces BitFT, a consensus protocol that combines strengths of both lottery-based voting-based mechanisms offer sustainable,...
Manually reading all the product reviews to find a satisfying item is not only labor-intensive, but also tedious for consumers.In this paper, we propose feature-opinion mining approach automatically summarize reviews.Specifically, in our first utilize regression model generate sentiment word, including phrase and its weight, then extract feature based on dependency relationship between word finally assign score according relationship.The experimental results demonstrate that can effectively...
The manual reading of all the product reviews to find a satisfying item is not only labor-intensive, but also tedious for consumers. In this paper, we propose feature-opinion mining approach automatically summarize reviews, which based on dependency parsing. Specifically, in our first utilize regression model generate sentiment word, including phrase and its weight, then extract feature relationship between word finally assign score according relationship. experimental results demonstrate...
Based on the analysis of current intrusion detection technologies, article focuses application Data Mining and Genetic Algorithm to Intrusion Detection System. The integration them would be competent for solving some traditional problems like block in course knowledge acquisition expert system dynamic update rules. Meanwhile, according practical characteristics network intrusions, makes improvements FP growth algorithm by adopting restrictions key properties guide process mining, which can...