- Advanced Database Systems and Queries
- Semantic Web and Ontologies
- Data Management and Algorithms
- Mobile Agent-Based Network Management
- Service-Oriented Architecture and Web Services
- Peer-to-Peer Network Technologies
- Distributed systems and fault tolerance
- Advanced Computational Techniques and Applications
- Mathematics Education and Teaching Techniques
- Topic Modeling
- Mathematics Education and Pedagogy
- Evaluation Methods in Various Fields
- Advanced Image and Video Retrieval Techniques
- Network Security and Intrusion Detection
- Advanced Data Storage Technologies
- Web Data Mining and Analysis
- Image and Signal Denoising Methods
- Image Retrieval and Classification Techniques
- Optimization and Search Problems
- Mathematical and Theoretical Epidemiology and Ecology Models
- Multi-Agent Systems and Negotiation
- Recommender Systems and Techniques
- Complex Network Analysis Techniques
- Higher Education and Teaching Methods
- Transportation Planning and Optimization
California State University, Long Beach
2015-2024
Wuhan University
2013-2024
Shanghai Industrial Technology Institute
2023-2024
Shanghai Dianji University
2022-2023
Anhui University of Finance and Economics
2007-2023
Alibaba Group (China)
2023
Zhejiang University
2022
Tongji University
2009-2020
Commercial Aircraft Corporation of China (China)
2016-2019
Beijing Institute of Technology
2017-2018
In this paper, we study the architectures of space-air-ground integration network (SAGIN) proposed by domestic scientific research institutes, and put forward an collaborative federal learning architecture suitable for SAGIN to solve problems insecurity low timeliness caused traffic backhaul. An anomaly detection method is based on requirements characteristics SAGIN. The problem that it difficult manually label extract features in solved through improvement deep algorithm. challenge lack...
Passenger satisfaction is an important factor that affects the choice of travel modes for municipalities, especially in big cities. This evaluation task managers when they are considering improving competitiveness public transportation system. However, passenger difficult as information provided by passengers often vague, imprecise, and uncertain. paper aims to propose a new method, using Pythagorean fuzzy sets multi-objective optimization ratio analysis plus full multiplicative form method...
Storage servers, as well storage clients, typically have large memories in which they cache data blocks. This creates a two-tier hierarchy the presence of first-tier (at client) makes it more difficult to manage second-tier server). Many techniques been proposed for improving management caches, but none these use information that is provided by writes blocks from first tier help cache. In this paper, we illustrate how contained can be used improve performance particular, argue there are very...
An Automated Teller Machine (ATM) is a safety-critical and real-time system that highly complicated in design implementation. This article presents the formal design, specification, modeling of ATM using denotational mathematics known as Real-Time Process Algebra (RTPA). The conceptual model introduced initial requirements for system. architectural created RTPA methodologies refined by set Unified Data Models (UDMs), which share generic mathematical tuples. static behaviors are specified...
It is widely acknowledged that most of problems occurring in requirement engineering activities mainly results from the lack a semantic agreement among stakeholders. implies to find an effective mechanism integrate existing theory, techniques and resources accumulated engineering, furthermore provide favorable base develop novel theory techniques. This paper proposes integrated framework for points out several interesting research avenues.
The shortage of labeled data has been a long-standing challenge for relation extraction (RE) tasks. Semi-supervised RE (SSRE) is promising way through annotating unlabeled samples with pseudolabels as additional training data. However, some on might be erroneous and will bring misleading knowledge into SSRE models. For this reason, we propose novel adversarial multi-teacher distillation (AMTD) framework, which includes (AT), to capture the in refined way. Specifically, first develop general...
Virtual enterprise (VE) has to manage its risk effectively in order guarantee the profit. However, restricting a VE acceptable level is considered difficult due agility and diversity of distributed characteristics. First, this paper, an optimization model for management based on decision making introduced. This two levels, namely, top base model, which describe processes owner partners VE, respectively. In solve proposed effectively, work then applies powerful artificial intelligence...
Small and micro enterprises play a very important role in economic growth, technological innovation, employment social stability etc. Due to the lack of credible financial statements reliable business records small enterprises, they are facing financing difficulties, which has become an factor hindering development enterprises. Therefore, credit risk measurement model based on integrated algorithm improved GSO (Glowworm Swarm Optimization) ELM (Extreme Learning Machine) is proposed this...
In recent years, a bottom-up leadership style has received considerable attention from researchers. However, few empirical studies have been conducted to explore the link between leader humility and employee voice. Drawing on role theory, in this study we examined relationship Using data 222 employees their leaders, our results revealed that was positively related Voice-role conception fully mediated relationship. Further, delineate how employees’ regulatory focus moderates voice, such when...
Providing integrated access to multiple, distributed, heterogeneous databases and other information sources has become one of the leading issues in database research industry. One most effective approaches is extract integrate interest from each source advance store them a centralized repository (known as data warehouse). When query posed, it evaluated directly at warehouse without accessing original sources. techniques that this approach uses improve efficiency processing materialized...
Purpose The purpose of this paper is to explore a semantics representation framework for narrative images, conforming the image-interpretation process. Design/methodology/approach This explores essential features evolution in process images interpretation. It proposes novel framework, ESImage (evolution image) images. adopts hierarchical architecture progressively organize semantic information enabling evolutionary interpretation under support graph-based data model. Also, study shows...
Various query languages have been proposed to extract and restructure information in XML documents. These languages, usually claiming be declarative, mainly consider the conjunctive relationships among data elements. In order present operations where hierarchical disjunctive need considered, such as restructuring hierarchy handling heterogeneity, programs these often exhibit a procedural style thus declarativeness them is not so prominent conventional like SQL. this paper, we propose...
P2P networks have become a popular way to share large volumes of data due its open and anonymous nature. network model is designed with the targets decentralization, well-scaling, fault-tolerance low cost. Meanwhile however, new bring challenges. expose more security threats are vulnerable attacks by malicious peers that an incentive spread viruses, in authentic data, or provide poor quality services. In this paper, we analyze potential trust problems for different kinds networks, then...