Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Lan Yuqing is active.

Publication


Featured researches published by Lan Yuqing.


computational intelligence and security | 2013

Using CloudSim to Model and Simulate Cloud Computing Environment

Wang Long; Lan Yuqing; Xia Qingxin

Cloud computing will be a major technology in the development of the future Internet of Services. Service providers want to remove the bottle neck of the cloud computing system in order to satisfy user requirement. And in order to save energy consumption they also need to apply new energy-efficiency mechanism and observe its effects on a data center. As it is difficult to test new mechanism in real cloud computing environment and researchers often cannot reach the real cloud environment, simulation to model the mechanism and evaluate the results is necessary. Simulating a data center avoids spending time and effort to configure a real testing environment. Moreover, as real machines are not used for testing purposes, their computational power can be allocated to profit-making applications. This paper introduces a simulation framework called CloudSim which provides simulation, power to manage services and modeling of cloud infrastructure. And we have also discussed about how to extend it to simulation your own mechanism in cloud computing.


international conference on e-business engineering | 2007

A Requirement Analysis Pattern Selection Method for E-Business Project Situation

Guo Shuhang; Lan Yuqing; Jin Maozhong; Li Hongjuan

During the past decade, information systems investment has grown rapidly worldwide and information systems project development has become one of the most important targets in e-business. Yet, the failure of information systems projects is a common occurrence in many organizations around the world. A theoretical model is derived based upon organizational learning theory and prior research in order to examine the effects of organizational learning on lack of teams expertise risk. A survey method is applied to test the hypotheses proposed by the research model, and Taiwanese corporate companies serve as examples. After survey by questionnaire and analyze the data by structure equation modeling, the result reveals that organizational learning has significantly negative impacts on all of the lack of development expertise risk, lack of domain expertise risk, and lack of general expertise risk. These findings support information systems managers with valuable information to revisit their priorities in terms of the relative efforts in organization learning.Current situations of the e-business project are variety. One of the most difficult jobs for requirements engineers is to adopt the best appropriate RE analysis patterns for the e-business project at hand. It is possible to characterize typical e-business project situation which could be used as a base for selecting best appropriate patterns. To select best appropriate patterns, in this paper, the method was proposed including the pattern clustering analysis and the filtering recommendation for the project situation. Through the contrast with selection method based experience, the new method is feasible and effective.


computer science and software engineering | 2008

Bayesian Network to Construct Interoperability Model of Open Source Software

Lan Yuqing; Zhao Tong

There are few topics more heated than the discussion surrounding open source software versus commercial and proprietary software. They are not only in an opposite relation, but also looking for cooperation. Moreover, there are many unresolved problems between them, in which the most typical one is the interoperability. There is a real need for a widely adopted, standardized method to assess the interoperability of open source software. However, few groups or researchers have given the guide up to now. This paper proposed Bayesian Network to construct the structure of interoperability and then learn the condition probability table of the structure. The structure and its condition probability table constitute the interoperability model. The model can be used not only to help user evaluate the interoperability of open source software, but also to guide the software developer to improve the quality of open source software more efficiently. An application showed how to use the model, and the result proved the validity of this model.


world congress on intelligent control and automation | 2008

A new modeling method of component interaction behavior

Lan Yuqing; Guo Shuhang; Jin Maozhong; Zhao Tong

The behavioral semantics of component interfaces plays a significant role in the reuse, integration, validation and maintenance of components. However, the interface description specification of COTS component usually only contains syntax information, and lacks behavioral semantics information. This paper presents a method, called EKBehavior, for incrementally inferring a behavior model that represents the interplay between variable values and method invocations. EKBehavior extends the KBehavior algorithm for extracting finite state automata from execution traces, to the case of finite state automata with parameters. Popular dynamic analysis techniques synthesize either information on the values of the variables or information on relations between invocations of methods. Thus, these approaches do not capture the important relations that exist between data values and invocation sequences. Compared with the existing techniques, method generates model that represents the sequence constraints of invocations of methods, constraints of variable values, and the relations between variable values and method invocations.


ieee international conference on computer science and automation engineering | 2012

Design and implementation of a light weighted framework for large scale computers management

Zhang Guanxing; Lan Yuqing

It is complicated but essential to manage large scale server computers inside an internal network. Bottom-up architecture is used universally to perform daily management task. Indeed its not perfect. Periodically mass requests from agents result in traffic congestion on the server. Moreover, for the lack of emergency user intervenes, it is almost impossible to make responds when administrators need fast reactions. This paper is devoted to a new light weighted up-down administrative framework supporting fast and automated operations.


world congress on intelligent control and automation | 2008

Requirements engineering knowledge share and retrieve based on situations similarity

Guo Shuhang; Lan Yuqing; Jin Maozhong; Ma Zongda

Project situation is one critical key foundation of requirements engineering (RE) knowledge share and reuse. RE knowledge can be shared and reused under similar project situation. A new knowledge retrieve technology based on project situation similarity is proposed in this paper. Firstly, the tree models or hierarchy models of RE knowledge situation are presented. Secondly, three situation match schemes are summarized and analyzed with reference to the tree matching, including tree inset, tree inclusion and tree intersection. Further, a quick tree matching algorithm is provided upon these three schemes. Through algorithm application, the results show that this solution is feasible and effective for the knowledge retrieve with high recall and precision.


chinese control conference | 2008

Modeling interaction constraints of component interfaces based on dynamic analysis

Lan Yuqing; Jin Maozhong; Guo Shuhang; Li Hongjuan; Zhao Tong

The interface specification of components usually lacks behavioral semantics information. Behavioral semantics information specify component interaction constraints on the usage of interface methods, including the order in which these methods should be called and the constraints on the method arguments and returns of methods. Based on dynamic analysis technique, a method which abstracts interaction constraints of component interfaces from the execution traces of component-based software system test is presented in this paper. These interaction constraints are incrementally modeled as finite state machines with parameters. Compared with the existing techniques which synthesize either information on the values of the variables or information on sequences of method invocations, our method generates models that represent the sequence constraints of method invocations, constraints of variable value, and the relations that exist between data values and method invocations.


chinese control conference | 2008

Requirements analysis knowledge share and reuse on situation

Guo Shuhang; Lan Yuqing; Jin Maozhong; Ma Zongda

One of the most difficult jobs for requirements analysis engineers is to select the appropriate requirements analysis knowledge for the project at hand. Once the selected requirement analysis knowledge does not fit the current project situation, it is doomed that some requirements problems will be emergent and the final system canpsilat fit in with the enterprise needs at a great extent. Requirements analysis knowledge can be shared and reused under similar project situation. A new knowledge reuse method based on project situation similarity is proposed in this paper. Firstly, the tree models or hierarchy models of requirements analysis knowledge situation are presented. Secondly, three situation match schemes are summarized and analyzed with reference to the tree matching, including tree inset, tree inclusion and tree intersection. Further, a quick tree matching algorithm is provided upon these three models. Through the method application, the results show that it is feasible and effective for the improvement of the knowledge reuse quality.


Archive | 2014

Service scheduling method on cloud platform

Lan Yuqing; Wang Jun; Sun Kunjian; Feng Yunhui; Li Li; Zhang Guanxing; Zang Wenjuan


Archive | 2013

Method for deploying services in cloud computing environment

Lan Yuqing; Wang Jun; Zhang Guanxing; Li Li; Sun Kunjian; Feng Yunhui

Collaboration


Dive into the Lan Yuqing's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge