December 2024
·
20 Reads
Journal of Building Engineering
This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.
December 2024
·
20 Reads
Journal of Building Engineering
November 2024
·
1 Read
·
1 Citation
Engineering Structures
October 2024
·
6 Reads
·
1 Citation
Journal of Building Engineering
July 2024
·
12 Reads
Case Studies in Construction Materials
April 2024
·
10 Reads
IEEE Transactions on Cloud Computing
In recent years, Coded Edge Computing (CEC) has been greatly studied as a promising technology to effectively mitigate the impact of stragglers and provide confidentiality in edge collaborative computing. It is crucial to verify the correctness of both intermediate results and the final result especially in untrustable and unreliable edge computing scenarios. However, the existing works on verification in CEC always verify and directly discard the whole incorrect intermediate results. In this paper, we propose the Partial Decode and Compare (PDC) verification scheme, which can fully utilize the correct part in the incorrect intermediate results to reduce the complexity and tolerate more abnormal edge devices. The PDC verification scheme consists of two parts: Final Result Verification (FRV) and Abnormal Edge Device Identification (AEDI). By deeply analyzing the decoding impact of the intermediate results on the final result, the PDC verification scheme divides the intermediate results and final results into subresult vectors . It decodes, compares, and verifies the final result in units of subresult vectors. In this way, the obtained parts which verified to be correct do not need to participate in the following verification. Therefore, it can significantly reduce the verification overhead including both the number of required decoding rounds and the complexity of each decoding round. Based on the correct final result verified by the PDC verification scheme, we also propose an Abnormal Edge Devices Identification scheme to identify all abnormal edge devices that return incorrect intermediate results. We then present extensive theoretical analyses and simulation experiments of the PDC verification scheme, which demonstrates that the PDC verification scheme can tolerate a higher ratio of incorrect intermediate results and achieve lower verification overhead than the state-of-the-art verification works. Therefore, the proposed PDC verification scheme enables CEC to provide reliable services in unstable and unreliable edge computing scenarios.
March 2024
·
18 Reads
·
3 Citations
Soil Dynamics and Earthquake Engineering
February 2024
·
9 Reads
Lecture Notes in Computer Science
Coded computing has proven its efficiency in tolerating stragglers in distributed computing. Workers return the sub-computation results to the master after computing, and the master recovers the final computation result by decoding. However, the workers may provide incorrect results, which leads to wrong final result. Therefore, it is meaningful to improve the resilience of coded computing against errors. Most existing verification schemes only use the workers’ fully correct computations to recover the final result, and the defective computations are not considered for decoding. In this paper, we focus on matrix multiplication and design a general Test-and-Decode (TD) scheme to recover the final result efficiently. Furthermore, we divide each sub-computation result into multiple parts and fully use the correct parts for partial recovery, which can improve the tolerance for errors in computations. Decoding is performed only when the verification result satisfies the permission, which avoids repetitive decoding. We conduct extensive simulation experiments to evaluate the probability of successful recovery of the results and the computation time of the TD scheme. We also compare the TD scheme with other verification schemes and the results show that it outperforms the current schemes in terms of efficiency in verifying and recovering computational results.
February 2024
·
1 Read
Lecture Notes in Computer Science
Recently, permissioned blockchain has been extensively explored in various fields, such as asset management, supply chain, healthcare, and many others. Many scholars are dedicated to improving its verifiability, scalability, and performance based on sharding techniques, including grouping nodes and handling cross-shard transactions. However, they ignore the node vulnerability problem, i.e., there is no guarantee that nodes will not be maliciously controlled throughout their life cycle. Facing this challenge, we propose RecAGT, a novel identification scheme aimed at reducing communication overhead and identifying potential malicious nodes. First, shard testable codes are designed to encode the original data in case of a leak of confidential data. Second, a new identity proof protocol is presented as evidence against malicious behavior. Finally, adaptive group testing is chosen to identify malicious nodes. Notably, our work focuses on the internal operation within the committee and can thus be applied to any sharding permissioned blockchains. Simulation results show that our proposed scheme can effectively identify malicious nodes with low communication and computational costs.
February 2024
·
8 Reads
·
1 Citation
Soil Dynamics and Earthquake Engineering
February 2024
·
3 Reads
Polymer
... The indirect methods to achieve a seismic resilience-based design include replacing conventional concrete in the plastic hinge zones with ultra-high-performance concrete (UHPC) [31][32][33][34] or engineered cementitious composites (ECC) [35][36][37][38][39] to prevent longitudinal rebar buckling and reduce plastic deformation. Replaceable precast segments [40][41][42][43] or external energy dissipation devices [44][45][46][47][48] can also decrease post-earthquake recovery time and enhance seismic resilience. ...
December 2023
Structures
... In this paper, the Gini coefficient (Gini) is introduced, which is a relative index that conforms to the principle of scale invariability and transfer, and can generally reflect the different degrees of the overall distribution (Gini 1912;Gini 1921). As the demand for EMS in disaster areas varies greatly, the Gini coefficient of the satisfaction rate of medical supplies is used to calculate the fairness index of EMS when measuring the fairness of EMS distribution (Zhang et al. 2023). In this paper, a distributive equity index G based on the Gini coefficient is constructed, and the calculation is shown in Formulas (5) and (6). ...
January 2023
IEEE Transactions on Computational Social Systems
... Moreover, to solve the problems of difficult construction, long construction period and environmental impact in the construction process of SHPs, fabricated technology [18,19] was regarded as the development direction of SHPs. The introduction of fabricated joints would cause the construction and seismic performance of fabricated SHPs to be more complex [20,21]. ...
September 2022
Sustainability
... The vehicle-bridge coupling problem has been extensively studied. [2][3][4][5][6][7][8][9] Bridge model tests on vehicle-bridge coupling vibration problems [10][11][12] showed that bridge vibration leads to greater deformations and stress than those under static train loads. Dynamic tests on highway bridge has also been carried out, [13][14][15] it indicated a more complex excitation mechanism of the vehicle-bridge coupling vibration problem on highways. ...
August 2022
... Qu et al. [23] performed shaking table experiments on precast piers linked by grouted splice sleeve couplers and investigated finite element modeling techniques employing OpenSEES. Subsequently, Ding et al. [24], Lei et al. [25], and Li et al. [26] constructed a finite element model for precast concrete bridge columns with grouted sleeve connections, which was then calibrated using test results. Additionally, Huang et al. [27] conducted a finite element analysis on precast beam-column connection components using ABAQUS, validating the effectiveness of their finite element modeling approach through tests. ...
May 2022
Journal of Building Engineering
... To speed up the training process of heterogeneous FL while retaining a certain level of security, [99] proposes a linear coded federated learning under multiple stragglers (LCFLMS) framework by designing a client-based multiple stragglers task outsourcing (C-MSTO) scheme and a server-based multiple stragglers task outsourcing (S-MSTO) scheme. Linear coding computing schemes will be applied to the process of outsourcing and the results reveal that LCFLMS scheme can speed up the training process. ...
May 2022
... With the construction of railways and expressways in western mountainous areas of China, bridge structures have been developing in the direction of high piers and long spans [1][2][3]. Chinese relevant codes have not yet given a clear definition of super-high piers. Drawing on the concept of super-high-rise buildings in civil building standards [4], a pier height of more than 100 m and a calculation of the first-order vibration mass participation coefficient of less than 60% is defined as a super-high pier [5]. ...
March 2022
Sustainability
... Against the background of changes in the spectrum of human diseases and an increase in public health emergencies, there is a growing demand from the public for health services and health, with corresponding increasing expectations for public health personnel [1][2][3]. With the maturation of China's public health system, the significance of cultivating public health experts has become increasingly prominent [4][5][6]. ...
March 2022
ACM Transactions on Sensor Networks
... An important challenge is developing an efficient scheduling strategy that can place and execute complex applications on the attached edge devices in a timely manner, while efficiently managing available resources as drones visit their assigned locations. For example, modern applications (i.e., face recognition (Koubaa et al., 2022), image classification (Cheng et al., 2021), crowd counting (Graziosi et al., 2021), etc.,), as shown in Fig. 1 are becoming more complex in nature, structured on micro-services architectural style, consisting of a large number of inter-dependent applications and often latency-sensitive (Shu et al., 2020;Liu and Shen, 2016;Lee et al., 2020). It is naturally important to intelligently schedule such inter-dependent applications in a best possible way, such that they are quickly executed and immediately sent back to the IoT and end devices. ...
October 2021
... Therefore, a real-time driver fatigue warning system has far-reaching significance towards reducing vehicle crashes. In order to improve the comprehensive ability of neural networks, more researchers are focusing on neural networks training [2], algorithm accuracy [3], generalization capability and robustness [4], multi-sensing [5][6][7][8], power consumption [9], and motion sensing and face recognition [10][11][12][13], making real-time, accurate computer vision applications possible. ...
December 2021
IEEE Internet of Things Journal