- Parallel Computing and Optimization Techniques
- Distributed and Parallel Computing Systems
- Online Learning and Analytics
- Embedded Systems Design Techniques
- Ship Hydrodynamics and Maneuverability
- Advanced Data Storage Technologies
- Software System Performance and Reliability
- Online and Blended Learning
- Software Testing and Debugging Techniques
- Mobile Ad Hoc Networks
- Embedded Systems and FPGA Design
- Software Reliability and Analysis Research
- Cloud Computing and Resource Management
- Intelligent Tutoring Systems and Adaptive Learning
- Opportunistic and Delay-Tolerant Networks
- Experimental Learning in Engineering
- Interconnection Networks and Systems
- Software Engineering Research
- IPv6, Mobility, Handover, Networks, Security
- Service-Oriented Architecture and Web Services
- Real-Time Systems Scheduling
- Maritime Navigation and Safety
- Fluid Dynamics Simulations and Interactions
- Wave and Wind Energy Systems
- Underwater Acoustics Research
Naval University of Engineering
2001-2025
Hefei University of Technology
2025
Beihang University
2015-2024
Shanghai Tunnel Engineering Rail Transit Design & Research Institute
2023
Beijing University of Technology
2022
China University of Mining and Technology
2022
Alibaba Group (United States)
2020
Air Force Engineering University
2010
PEN American Center
2010
State Key Laboratory of Virtual Reality Technology and Systems
2009
Mobile ad hoc networks are vulnerable to various types of denial service (DoS) attacks for the absence fixed network infrastructure. The gray hole attack is a type DoS attacks. In this attack, an adversary silently drops some or all data packets sent it further forwarding even when no congestion occurs. Firstly, DSR protocol, aggregate signature algorithm and model were introduced. Secondly, we proposed use trace packet dropping nodes. proposal was consisted three related algorithms:...
Mobile applications are becoming more and powerful yet also complex. While mobile application users expect the to be reliable secure, complexity of makes it prone have faults. engineers testers use testing technique ensure quality application. However, is time-consuming hard automate. In this paper, we model from a black box view propose distance metric for test cases software. We further proposed an ART case generation Our experiment shows our tool can both reduce number time needed expose...
Most educational institutions adopted the hybrid teaching mode through learning management systems. The logging data/clickstream could describe learners' online behavior. Many researchers have used them to predict students' performance, which has led a diverse set of findings, but how use insights from captured data enhance engagement is an open question. Furthermore, identifying students at risk failure only first step in truly addressing this issue. It important create actionable...
With the development of mobile computing and pervasive computing, smart devices such as PDAs or smart-phones are gradually becoming an indispensable part our daily life. However, software running on these becomes more powerful complex, testing applications poses great challenges for application vendors phone manufacturers. In this paper, we introduce MobileTest, a tool supporting automatic black box test devices. The objectives design thoroughly discussed. paper also adopts sensitive-event...
This paper proposed an innovative education platform-VREX (Virtual Reality based Education eXpansion), with combination of online and offline, to improve the curriculum building teaching experience. VREX is on Virtual (VR) we believe VR can revolutionize ecosystem. With some trials, found be used promote effectiveness in immersive environment so that students have intuitive sense understand abstract knowledge, which always hard for teachers describe. We tried transfer slides into scenes,...
Small private online courses (SPOCs) have influenced teaching and learning in China's higher education. Learning management systems (LMSs) are important components SPOCs. They can collect various data related to student behavior support pedagogical interventions. This research used feature engineering nearest neighbor smoothing models predict the performance of students. Five features were selected based on Spearman's rank correlation coefficients with students' final grades. Through testing...
With the development of mobile computing and pervasive computing, smart devices such as PDAs or smart-phones are gradually becoming an indispensable part our daily life. However, software running on these becomes more powerful complex, testing applications poses great challenges for application vendors phone manufacturers. In this paper, we introduce MobileTest, a tool supporting automatic black box test devices. The objectives design thoroughly discussed. paper also adopts sensitive-event...
This paper investigates a method for the multi-threshold segmentation of grayscale imaging using local minimum points histogram curve as threshold. By smoothing and judging conditions, expected peaks valleys are identified, corresponding used thresholds to achieve fast image segmentation. Compared OTSU (maximum between-class variance) region growing method, this has less computational complexity. In recognition process solder pads with adhesion underfill in LED Chips, time is than one...
In complex marine environments, accurate prediction of maneuvering motion is crucial for the precise control intelligent ships. This study aims to enhance predictive capabilities ships in such environments. We propose a novel method based on Long Short-Term Memory (LSTM) and Multi-Head Attention Mechanisms (MHAM). To construct foundational dataset, we integrate Computational Fluid Dynamics (CFD) numerical simulation technology develop mathematical model actual ship motions influenced by...
Mobile ad hoc networks are vulnerable to various types of denial service (DoS) attacks for the absence fixed network infrastructure. The gray hole attack is a type DoS attacks. In this attack, an adversary silently drops some or all data packets sent it further forwarding even when no congestion occurs. paper, new solution against proposed. proposal consisted two related algorithms: key management algorithm based on gossip protocol and detection aggregate signatures. simulation results using...
With the number of applications running upon virtualized system increased, virtual network circumstance becomes more and complicated; consequent security problems thereby have been a concern for industrial academic fields. However, current solutions are mostly confined to enforcement several patchy-works on which still requires proficient hacking skills administrators cannot ensure continuous protection VM, resulting in potential risks. In this paper we present framework (VNSS) provides both...
To ensure the software quality of mobile device, it is essential to build sophisticated testing automation strategy. In this paper, we introduced idea constructing a framework, elaborated problems encountered in practice and proposed solutions accordingly, where several innovative methods tactics were brought forward discussed details. Furthermore, framework was used for tailor-made program on phone. Testing result analysis proves that not only viable effective device testing, but also shows...
The most important issues of the test framework are its generality, reusability and scalability in a specific area. Mobile application software that constantly updates improves makes it especially difficult for these points. This paper first proposes definition mobile software, as well classification, summarizes testing technology. Then we introduce thought service-oriented architecture into this area, adopt COM technique, aims at designing framework. During design, focus on technical...
Learning in digital systems could be enhanced by applying a learn-by-doing mechanism. In this paper the implementation of web-based remote FPGA laboratory for Computer Organization course is proposed. The projects created are designed towards entry-level users thus producing trouble-free virtualization experimental equipment that turn maximizes educational gain. network had made learners complete all activities through Internet without limitation time, space and resources. We show also some...
In a (t, n) threshold secret sharing scheme, any t- out-of-n participants could recover the shared secret, and less than t get nothing about secret. Most of existing schemes are not flexible enough for fixed threshold. this paper, new dynamic scheme was proposed, which is based on bilinear maps. The basic idea as follows: system consisted some dealer. Each participant holds only one permanent private key. dealer responsible to choose construct linear equations by using 'public keys. realized...
Virtual channel flow control is a well-known technique in design of routers Networks-on-chip (NoC). This paper analyzes two typical virtual-channel router architectures with different sized switch fabrics. In either them, the virtual channels do or not compete for to fabric, and therefore scheduler performs an iterative way not. As basis scheduler, arbiter impacted by architecture fashion scheduling. Two arbiters are proposed these on PPE, round robin arbiter. The take above impact into...
With the development of Internet applications, educational websites have been well developed. This means that more and students acquire knowledge through virtual classroom. The system will produce a large number students' learning behavior data. It doesn't make sense if you just take student data as pure We extract characteristics from these behavioral data, then use mining algorithm to train classifier. Then it predicts final grades students. Warning who risk failing exam in time according...
Previous works on Just-In-Time (JIT) defect prediction tasks have primarily applied pre-trained models directly, neglecting the configurations of their fine-tuning process. In this study, we perform a systematic empirical study to understand impact settings process BERT-style model for JIT prediction. Specifically, explore different parameter freezing settings, initialization and optimizer strategies performance Our findings reveal crucial role first encoder layer in project sensitivity...
The mechanism of the combined process ion beam sputtering (IBS) and HF acid etching on chemical structure defects fused silica its laser damage resistance performance were investigated in this paper. During removal surface material, effect causes lattice atoms to flee their native space locations, a large amount unsaturated structures are produced surface, which improves activity Si O atoms, accelerates reaction between water molecules, increases content hydroxyl groups (OH-) shallow layer,...
Caches play a major role in the performance of high-speed computer systems. Trace-driven simulator is most widely used method to evaluate cache architectures. However, as design moves more complicated architectures, along with size trace becoming larger and larger. Traditional simulation methods are no longer practical due their long cycles. Several techniques have been proposed reduce time sequential trace-driven simulation. This paper considers use generic GPU accelerate which exploits...
Mobile applications are becoming more and popular with the prevalence of mobile operating system Internet. However, bugs in application not only results from buggy code but also unreliable context providers. In this paper, we proposed a statistical fault localization framework targeting at application, especially provider faults. And further propose tolerant design to make immune bugs. Our experiment shows our technique is much effective than existing locate faults can effectively prevent...