Rong Peng's research while affiliated with Guangxi Normal University and other places
What is this page?
This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
Publications (46)
Ontology alignment is an essential and complex task to integrate heterogeneous ontology. The meta-heuristic algorithm has proven to be an effective method for ontology alignment. However, it only applies the inherent advantages of meta-heuristics algorithm and rarely considers the execution efficiency, especially the multi-objective ontology alignm...
Knowledge graphs usually consist of billions of triplet facts describing the real world. Although most of the existing knowledge graphs are huge in scale, they are still far from completion. As a result, varieties of knowledge graph embedding approaches have emerged, which have been proven to be an effective and efficient solution for knowledge gra...
The grasshopper optimization algorithm (GOA) has received extensive attention from scholars in various real applications in recent years because it has a high local optima avoidance mechanism compared to other meta-heuristic algorithms. However, the small step moves of grasshopper lead to slow convergence. When solving larger-scale optimization pro...
With the rapid development and widespread application of Knowledge graphs (KGs) in many artificial intelligence tasks, a large number of efforts have been made to refine them and increase their quality. Knowedge graph embedding (KGE) has become one of the main refinement tasks, which aims to predict missing facts based on existing ones in KGs. Howe...
Knowledge Graph (KG) entity alignment aims to identify entities across different KGs that refer to the same real world object, and it is the key step towards KG integration and KG complement. Recently, Graph Attention Network (GAT) based models become a popular paradigm in entity alignment community owing to its ability in modelling structural data...
The ontology matching is a significant task for data integration and semantic interoperability. Although a large number of effective ontology matching methods have been proposed in a fully automated way, user involvement during the matching process is needed for real-world applications. It has been recognized as an effective method for further impr...
Trace links between requirements and software artifacts provide available traceability information and in-depth insights for different stakeholders. Unfortunately, establishing requirements trace links is a tedious, labor-intensive and fallible task. To alleviate this problem, Information Retrieval (IR) methods, such as Vector Space Model (VSM), La...
More and more attention has been paid to automatic keyphrase generation as it facilitates a wide variety of downstream AI applications, such as information retrieval, text summarization and opinion mining. Although sequence-to-sequence architecture with attention and copy mechanisms (CopyNet) to this task shows promising results, it still suffered...
We study the problem of finding entities referring to the same real world object in multilingual knowledge graphs(KGs), i.e., entity alignment for multilingual KGs. Recently, embedding-based entity alignment methods get extended attention in this area. Most of them firstly embed the entities in low dimensional vectors space via relation structure o...
Ontology alignment is a fundamental task to support information sharing and reuse in heterogeneous information systems. Optimizing the combination of matchers through evolutionary algorithms to align ontology is an effective method. However, such methods have two significant shortcomings: weights need to be set manually to combine matchers, and a r...
A context-aware system always needs to adapt its behaviors according to context changes; therefore, modeling context-aware requirements is a complex task. With the increasing use of mobile computing, research on methods of modeling context-aware requirements have become increasingly important, and a large number of relevant studies have been conduc...
It is of great importance to recommend collaborators for scholars in academic social networks, which can benefit more scientific research results. Facing the problem of data sparsity of co-author recommendation in academic social networks, a novel recommendation algorithm named HeteroRWR (Heterogeneous Random Walk with Restart) is proposed. Differe...
Pointer-generator networks have recently shown superior performance in Natural Language Generation (NLG) tasks, such as automatic generating descriptions for entities in Knowledge Graph (KG). In the absence of the introductory description about an entity we intend to know, the natural language text automatically generated by neural network model ca...
Knowledge Graph (KG) usually contains billions of facts about the real world, where a fact is represented as a triplet in the form of (head entity, relation, tail entity). KG is a complex network and consists of numerous nodes (entities) and edges (relations). Given that most KGs are noisy and far from being complete, KG analysis and completion met...
With the development of cloud computing and the rise of smart city, smart city cloud service platforms are widely accepted by more and more enterprises and individuals. The underlying cloud workflow systems accumulate large numbers of business process models. How to achieve efficiently querying large process model repositories in smart city cloud w...
The bad behaviors of some users and the drawbacks of public bicycles have hindered the promotion of public bicycles. The current problems include low utilization rate, uneven distribution, high loss rate and insecure lock. However, there is few feasible research in this new field. To address these issues of public bicycles, we propose a public bicy...
Requirements traceability (RT) is a core activity in Requirements Engineering. Various types of RT technologies have been extensively studied for decades. In this paper, we present a systematic literature review from 114 papers between 2006 and 2016 on RT techniques. We summarized 10 major challenges in current RT activities, and categorized existi...
Context-aware applications are becoming increasingly popular as they can adapt their behaviors to situations. However, the modeling of context-aware requirements is challenging owing to the inherent complexity and dynamicity of the context. Therefore, learning from existing studies can help academia and industry overcome the challenges. The primary...
Malicious software programs usually bypass the detection of anti-virus software by hiding themselves among apparently legitimate programs. In this work, we propose Windows Virtual Machine Introspection (WVMI) to accurately detect those hidden processes by analyzing memory data. WVMI dumps in-memory data of the target Windows operating systems from...
Traditional security framework in cloud platform usually brings self-vulnerability and considerable additional resource consumption. To solve these problems, we propose an external processes monitoring architecture for current popular cloud platform OpenStack with kernel-based virtual machine (KVM). With this architecture, we can monitor all active...
There are many types of dependencies between software requirements, such as the contributions dependencies (Make, Some+, Help, Break, Some-, Hurt) and business dependencies modeled in the i* framework. However, current approaches for prioritizing requirements seldom take these dependencies into consideration, because it is difficult for stakeholder...
Enormous commercial value brought by big data analysis promotes the vigorous development of big data analysis industry. Due to the difficulties existed in the modeling process, reusing existing analysis experiences becomes a good choice to find an optimal way from problem domain to solution domain efficiently. To help data analysts reuse previous e...
Analytical requirements are the basis for building the enterprise data models that are used to develop the IT assets that deliver the analytical requirements to business users [10]. Due to the difficulties existed in the modeling and analysis process, reusing existing analysis experiences becomes a good choice to find an optimal way from problem do...
Perceiving the location of dangerous moving vehicles and broadcasting this information to vehicles nearby are essential to achieve active safety in the Internet of Vehicles (IOV). To address this issue, we implement a real-time high-precision lane-level danger region service for moving vehicles. A traditional service depends on static geofencing an...
As cloud computing platforms are widely accepted by more and more enterprises and individuals, the underlying cloud workflow systems accumulate large numbers of business process models. Retrieving and recommending the most similar process models according to the tenant?s requirements become extremely important, for it is not only beneficial to prom...
With the increasingly intense competition in mobile applications, more and more attention has been paid to online comments. For the masses, comments have been viewed as reliable references to guide the choice of applications; for providers, they have been regarded as an important channel to learn expectations, demands and complaints of users. There...
SaaS (Software as a Service) has been attracted significant attentions from both industry and academia. Owing to serving multiple clients in the Long Tail, many notable SaaS applications have accomplished big successes in many traditional domains, such as CRM (Customer Relationship Management) and HRM (Human Resource Management).
To promote the eff...
Requirements Elicitation (RE) is a critical process in system/software engineering. Its goal is to capture the stakeholders’ expectations, needs and constraints, which can be elicited, analyzed and specified as requirements. Gathering the requirements correctly, clearly and completely in a natural way is a typical challenging problem, because requi...
Requirements Elicitation (RE) is a critical process in system/software engineering. Its goal is to capture the stakeholders’ expectations, needs and constraints, which can be elicited, analyzed and specified as requirements. Gathering the requirements correctly, clearly and completely in a natural way is a typical challenging problem, because requi...
Recently many companies have featured their applications as SaaS (Software as a Service) applications where applications will be treated as services and provided online for thousands and millions of users. Social Networking SaaS (SNS) is one of the most popular kinds of SaaS. The key to the success of a SNS heavily relies on the scale of users. Wit...
The distinguished features of mobile computing bring both opportunities and challenges to the development of Mobile Social Networking (MSN) applications. Learning the successful experiences from existing MSN applications is valuable to both industry and academy. The paper aims at identifying the success factors of Instagram, a well-known MSN applic...
With the popularization of information technology, more and more attentions have been paid to the quality of software systems. The demands on the quality of a software system are named as NFRs (Non-Functional Requirements). Abstractness, subjectivity and uncertainty are the remarkable characteristics of NFRs, which brings huge obstacles to requirem...
With the pervasiveness of the success cases of SaaS applications, outsourcing the manuscript submission and review system of periodical presses to SaaS providers becomes a new trend. This study proposes a solution for constructing the journal manuscript submission and review system based on level-3 maturity model of SaaS. In this article, the requi...
Wiki technology, represented by Wikipedia, has attracted serious concern due to its capability to support collaboratively online contents' creation in a flexible and simple manner. Under the guidance of Wiki technology, developing specific wiki-based requirements management tools, namely RE-specific wikis, through extending various open source wiki...
Building trustworthy requirements specification is difficult for its inherent complexity and interdisciplinary of requirements engineering and security. This paper deals with two challenges: (1) nonstandard architecture and definition of trustworthy attributes and (2) the inadequacy existing methodologies to support obtaining implicit trustworthy r...
Social tagging has become a popular solution for recognition and management of resources in Web2.0 era. To solve the current problem of insufficient capacity of semantic description of Web services, a multi-dimensional social tagging approach for Web services semantics is proposed. Under the guidance of social tagging model, users can choose severa...
Wikis, as typical well-known knowledge management tools that support collaborative work, are adopted by more and more practitioners and researchers as the basis to develop Distributed Requirements Engineering (DRE) tools. Thus, many wikis which are enhanced specially for supporting various activities in Distributed Requirements Engineering (namely...
Nowadays, lots of open source communities adopt forum to acquire scattered
stakeholders' requirements. But the requirements collection process always
suffers from the unformatted description and unfocused discussions. In this
paper, we establish a framework ReqForum to define the metamodel of the
requirement elicitation forum. Based on it, we propo...
Wiki, as one of the Web 2.0 technology, has received considerable interest due to its capability to support collaboratively online contents' creation in a flexible and simple manner. Lots of researchers and practitioners committed themselves to enhancing wiki's capability to support Requirements Engineering (RE). The main goal of this study is to d...
With the development of IT, the scale and complexity of information system has been dramatically increased. Followed is that the related stakeholders' size increases sharply. How to promote the requirements negotiation of large scale stakeholders becomes a focus of attention. Wiki, as a lightweight documentation and distributed collaboration platfo...
The development of Service oriented architecture (SOA) has brought new opportunities to requirements engineering. How to utilize
existing services to guide the requestors to express their requirements accurately and completely becomes a new hotspot. In
this paper, a requirements recommendation method based on service description was proposed. It ca...
Citations
... With the aid of some recent works [26][27] [28][29] [30], we also want to lay the groundwork for how researchers have implemented deep learning models in the network embedding technique: ...
... The majority of conventional methods are structure embedding models, which can be classified into three categories [26]: translational distance models, semantic matching models, and neural network models. Translational distance models develop distance-based score functions. ...
... Further, in [27] neuro-symbolic approaches dealing with graph structures are classified into three categories. First, logically informed embedding approaches [28] [29] use predefined logical rules that provide knowledge to a neural system, while both components are mostly distinct. Second, approaches for knowledge graph embedding with logical constraints [30] [31] use prior knowledge as constraints on the neural knowledge graph embedding method in order to modify predictions or embeddings. ...
... To comprehensively evaluate our approach, we compare TTEA with Trans-based, GNNs-based and Semi-supervised entity alignment methods: (Huang et al., 2022b), MRGA (Ding et al., 2021), SHEA (Yan et al., 2021), RAGA-l (Zhu et al., 2021a). ...
... The current research on the secure matching of text strings includes algorithmic improvement of secure text matching (STM) [21,22], approximate matching based on Bloom Filter [23][24][25][26], exact matching [27][28][29][30][31][32][33][34][35][36], and string equality problems [37][38][39]. In STM, keyword matching is a very common and important field. ...
... For instance, for each of these datasets, Table IV provides a link to the open-source datasets, along with other meta-data details associated with it, such as primary studies that used it, trace space (the maximum counts of trace links), and other characteristics of the dataset. • P Primary identifier keywords are converted to comment keywords by their similarity in appearance in the syntax tree location Verb-object Phrases [7] • P Extracting verb-object phrases as main information and essential meaning Analyzing Close Relations [13] • G Calculating the close relations (semantic similarity) between target artifacts Term Classification [17] [30] • G Categorizing class names, comments, and all other terms in code Model-Driven Engineering (MDE) [19] • G Combining use of both MDE and IR, analyzing the textual information (organization and hierarchy) contained in the model to retrieve implicit links between documents Hybrid Method [21] [29] • • G Combing VSM and BTM which can help relieve data sparsity caused by short text Genetic Algorithm [29] • G Configuring initial parameters of BTM by introducing Genetic Algorithm Code Calling Relationships [20] • G Identifying errors between requirements and code traces by code-calling relationships Historical Co-change Information [23] • • G Taking the processed corpora and co-change information of classes as input to reorder and filter baseline links Dynamic Integration of Structural and Co-change Coupling [28] • G Retrieving indirect links based on weighted integration of structural coupling and class coupling based on change history Configuration Management Log [35] [38] • • G Restoring links by finding revisions in the configuration management log that contain words related to requirements Frugal User Feedback with Closeness Analysis on Code [40] • ...
... Knowledge integration is based on the thought of the translation methods [25,35,37], using multiple plausibilities to achieve the integration of heterogeneous knowledge. Knowledge alignment originates from the idea of entity alignment [39]. The process of the knowledge reconstruction is shown in Fig. 3. ...
... Comparing with CEA, PCEA could further decrease the execution time and main memory consumption of the tuning process, without sacrificing the quality of alignment. Lv et al. [23] proposed a new meta-matching technology for ontology alignment with grasshopper optimization (GSOOM), which used The Grasshopper Optimization Algorithm (GOA) to find the corresponding relationship between the source ontology and target ontology by optimizing the weight of multiple similarity measures. They modeled the ontology meta-matching problem as an optimization GOA individual fitness problem with two objective functions. ...
... To set a conceptualized framework for context modeling we begin with setting the requirements. In doing so, we refer to existing studies, such as [10,[12][13][14] and to the experience we gained in context-aware systems. In the following, we list the requirements we gathered. ...
... The question answering approach proposed in this study simplifies the task pipeline by converting the genealogical knowledge graph into text, which is then combined with unstructured genealogical texts and processed by BERT's contextual embeddings. Converting the genealogical graph into text passages can be performed using knowledge-graph-to-text templates and methodologies [21,26,55,76,123], and knowledge-graph-to-text machine learning and DNN models [5,33,63,66,68,78,79,99,106]. Templatebased knowledge-graph-to-text methods use hardcoded or extracted linguistic rules or templates to convert a subgraph into a sentence. ...