Chunling Cheng

ORCID: 0000-0003-4933-3132
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Peer-to-Peer Network Technologies
  • Mobile Agent-Based Network Management
  • Access Control and Trust
  • Power Systems and Technologies
  • Service-Oriented Architecture and Web Services
  • Hand Gesture Recognition Systems
  • Anomaly Detection Techniques and Applications
  • Web Data Mining and Analysis
  • Advanced Decision-Making Techniques
  • Advanced Computational Techniques and Applications
  • Caching and Content Delivery
  • Energy Efficient Wireless Sensor Networks
  • Cloud Computing and Resource Management
  • Image and Video Stabilization
  • Recommender Systems and Techniques
  • Emotion and Mood Recognition
  • Advanced Algorithms and Applications
  • Speech Recognition and Synthesis
  • Spam and Phishing Detection
  • Video Coding and Compression Technologies
  • Blind Source Separation Techniques
  • Digital Media Forensic Detection
  • Power Systems Fault Detection
  • Technology and Security Systems
  • Cryptography and Data Security

Nanjing University of Posts and Telecommunications
2010-2019

Nanjing University
2010

High energy consumption is one of the key issues cloud computing systems. Incoming jobs in environments have nature randomness, and compute nodes to be powered on all time await incoming tasks. This results a great waste energy. An energy-saving task scheduling algorithm based vacation queuing model for systems proposed this paper. First, we use with exhaustive service schedule heterogeneous system. Next, busy period cycle under steady state, analyze expectations sojourn Subsequently,...

10.1109/tst.2015.7040511 article EN Tsinghua Science & Technology 2015-02-01

Emotional recognition is a very challenging nature of the topic in field Brain - Computer Interface (BCI). This technology has been applied many fields, such as The electroencephalogram (EEG) signals. EEG signals can intuitively express human emotional state and attracted attentions researchers. Besides, it strong correlation during period. To preserve correlation, this paper presents an emotion algorithm based on convolution neural network (ERACNN). In paper, are pretreated, then parameters...

10.1109/iske.2017.8258786 article EN 2021 16th International Conference on Intelligent Systems and Knowledge Engineering (ISKE) 2017-11-01

10.1007/s11633-012-0617-5 article EN International Journal of Automation and Computing 2012-02-01

Chord has been widely used as a routing protocol in structured peer-to-peer overlay networks, but there is lot of redundant information the node finger table. This paper proposes strategy that using node's counterclockwise to replace information, uses space effectively which occupied by information. also solve problem repeated search p2p network establishing an objective resource Then this designs advanced chord algorithm based on replaced and table (AChord). Theoretical experimental...

10.1109/iccsit.2010.5563760 article EN 2010-07-01

It is a challenging task to improve the real-time property and objectivity of effect assessment for distance education. This paper presents QoE (Quality Experience) system based on attention online user. The captures video frames from two cameras periodically synchronously, using adaptive image binarization linear average threshold pretreatment, then processing with edge detection filtering in cross-directions at same time. System gets position computer screen user eyeball. Analyzing results...

10.4236/eng.2011.31011 article EN Engineering 2011-01-01

Abstract Outlier detection plays a crucial role in secure monitoring Wireless Sensor Networks (WSN). Moreover, outlier techniques WSN face the problem of limited resources transmission bandwidth, energy consumption and storage capacity. In this paper, similar flocking model is proposed cluster algorithm based on (CASFM) put forward to detect outliers real-time stream data collected by sensor nodes. The improves Vicsek introducing similarity between individuals velocity updating rule, which...

10.21307/ijssis-2017-526 article EN International Journal on Smart Sensing and Intelligent Systems 2013-01-01

In wireless sensor networks (WSN), Sybil attack can destroy the routing and data distributed storage mechanisms through fabricating identity information of legitimate nodes. This paper presents a chain key predistribution based approach against attack. To enhance security common keys between neighboring nodes, during phase, our uses lightweight hash function to generate several by hashing unique every node sequentially in trusted base station. These construct pool keys. During pairwise...

10.1155/2013/839320 article EN cc-by International Journal of Distributed Sensor Networks 2013-11-01

A precise calculation method of absolute phase angles and stable power frequency is presented in this paper. Firstly, the angle positive sequence voltages/currents relative to 1 PPS (1 pulse per second) from GPS calculated by using discrete Fourier transforms (DFT). Then a most direct measurement excursion /spl Delta/f proposed every directly. The main point algorithm that sampling number period fundamental signal can be considered as reciprocal nominal for angle-1PPS. here not only obtains...

10.1109/icpst.2002.1067873 article EN 2003-06-25

10.1007/s12204-019-2147-6 article EN Journal of Shanghai Jiaotong University (Science) 2019-12-03

Traditional information retrieval systems have several shortcomings in common, such as delaying updating, costing additional host and network resources, so on. The promise of mobile multi-agent technology is becoming highly attractive. We approach to apply the order build a brand-new system. Although advantages systems, it also brings new negative problems. most serious one security problem because agent's mobility initiative. In this paper, we firstly analyze drawbacks current then describe...

10.1109/icct.2010.5689164 article EN 2010-11-01

In order to obtain high image representations in limited amount of datasets, a transfer learning method based on residual block is proposed. this method, we follow approach by increasing the number layers network extract higher statistical features image. The main idea conduct feature means ResNet (Deep Residual Network) model with setting ImageNet dataset as source domain. Firstly, all data are pre-processed enhancement. Then, basis modifying model's fully-connected classification layer,...

10.1109/icsess.2018.8663835 article EN 2018-11-01

It is becoming more and popular to share video among multiple users. However, sharing in traditional cellular networks will incur high expense. Device-to-Device (D2D) communication one of the key technologies 5th generation(5G) networks, it enables devices transmit data directly without relay base stations. This paper proposes a network-coding-based distribution scheme for D2D environment. In scheme, network coding technology applied H.264 transmission, which can also provide additional...

10.1109/cyberc.2019.00033 article EN 2019-10-01

On the battlefield, cooperative fighting and communication among combat vehicles require higher service level of real-time transmission. Combat vehicles, fast moving links, frequent disruption lead to increase packet loss rate, delay routing control overhead ratio. This paper proposes an expanding ring prediction location aided AODV algorithm. It improves protocol from both discovery maintenance phases. In phase, algorithm limits scope sending RREQ through predicting topology ring, during...

10.1109/icm.2011.315 article EN International Conference of Information Technology, Computer Engineering and Management Sciences 2011-09-01

Video watermarking technology is a useful method to track piracy for digital videos. However, most algorithms cannot be directly applied H.264 streaming media because of their poor real-time performance, which may cause users watch the video unsmoothly. In order solve this problem, algorithm (RVWA) proposed. First, segmented before embedding watermark, makes watermark and transmission carried on at same time. Then, concept margin frame (WEMF) proposed shorten By calculating value WEMF each B...

10.4156/jdcta.vol6.issue14.59 article EN International Journal of Digital Content Technology and its Applications 2012-08-22

The processing capacity and power of nodes in a Wireless Sensor Network (WSN) are limited. And most image compression algorithms WSN subject to random content changes or have low qualities after the images decoded. Therefore, an method based on multilayer Restricted Boltzmann Machine (RBM) network is proposed this paper. alternative iteration algorithm also applied RBM optimize training process. compared with region interest (ROI) simulations. Under same ratio, reconstructed better than that...

10.1155/2016/1851829 article EN cc-by International Journal of Distributed Sensor Networks 2016-03-01

As a result of lack in fair exchange mechanism for current Peer-to-Peer computing (P2P) systems, unfair situation among peers, the existence free-rider, tragedy commons, and non-cooperation hinders massive kinds valuable resources to be effectively used as possible. A P2P systems is presented this paper. Main idea that, peer firstly supposed select their visiting peers which are always good performance access local or provide them with services they request. And secondly, classified...

10.1109/gcc.2010.55 article EN 2010-11-01

Natural human-computer interaction technology based on gestures has received broad attentions in many fields recently, which requires better performance of gesture recognition algorithms. Real-time is challenging due to the idea dynamic programming. To address this issue, paper, we propose a real-time algorithm boundary-constraint time warping (BC-DTW). The proposed reduces from calculation times and amount DTW distance. reduce varies distance between sequences, transforms sequence...

10.1109/naecon46414.2019.9058155 article EN 2019-07-01

WRKY转录因子家族在植物的抗病、抗逆反应中具有重要功能。已有研究表明,烟草花叶病毒(TMV)的侵染显著地诱导烟草NtWRKY的表达,有必要进一步探明该基因在植物应答病毒侵染过程中的作用。采用PCR的方法克隆获得NtWRKY cDNA,生物信息学分析结果显示,该基因属于WRKY Ⅱa亚族成员,与绒毛状烟草NtoWRKY40高度同源,命名为NtWRKY40。以此建立了过表达该基因的转基因烟草,并以TMV为毒源进行了转基因烟草和野生烟草的侵染实验,以观察NtWRKY40在烟草应答病毒侵染过程中的作用。实验结果表明,野生烟草在TMV侵染后9...

10.13560/j.cnki.biotech.bull.1985.2016.10.023 article ZH-CN 2016-10-26
Coming Soon ...