28 results on '"Mingxue Wang"'
Search Results
2. Risk factors for delirium: are therapeutic interventions part of it?
- Author
-
Yunbo Sun, Jinyan Xing, Zhiyong Yuan, Yaqi Jie, Mingxue Wang, and Ying Liu
- Subjects
Mechanical ventilation ,Univariate analysis ,medicine.medical_specialty ,Multivariate analysis ,business.industry ,medicine.medical_treatment ,Psychological intervention ,Intensive care unit ,030227 psychiatry ,law.invention ,03 medical and health sciences ,0302 clinical medicine ,law ,Emergency medicine ,medicine ,Delirium ,Arterial line ,medicine.symptom ,Airway ,business ,030217 neurology & neurosurgery - Abstract
Background: Delirium is associated with increased morbidity and mortality in critically ill patients. Research on risk factors for delirium allows clinicians to identify high-risk patients, which is the basis for early prevention and diagnosis. Besides the risk factors for delirium that are commonly studied, here we more focused on the less-studied therapeutic interventions for critically ill patients which are potentially modifiable. Materials and methods: A total of 320 non-comatose patients admitted to the ICU for more than 24 hrs during 9 months were eligible for the study. Delirium was screened once daily using the CAM-ICU. Demographics, admission clinical data, and daily interventions were collected. Results: Ninety-two patients (28.75%) experienced delirium at least once. Delirious patients were more likely to have longer duration of mechanical ventilation, ICU stay, and hospital stay. Most of the less-studied therapeutic interventions were linked to delirium in the univariate analysis, including gastric tube, artificial airway, deep intravenous catheter, arterial line, urinary catheter, use of vasoactive drugs, and sedative medication. After adjusting with age and ICU length of stay, mechanical ventilation (OR: 5.123; 95% CI: 2.501-10.494), Acute Physiology and Chronic Health Evaluation (APACHE) II score≥20 at admission (OR: 1.897; 95% CI: 1.045-3.441), and gastric tube (OR: 1.935, 95% CI: 1.012-3.698) were associated with increased risk of delirium in multivariate analysis. Conclusion: Delirium was associated with prolonged mechanical ventilation, ICU stay, and hospital stay. Multivariate risk factors were gastric tube, mechanical ventilation, and APACHE II score. Although being a preliminary study, this study suggests the necessity of earliest removal of tubes and catheters when no longer needed.
- Published
- 2019
3. Real-time monitoring of intracellular nitric oxide using a long-wavelength-emitting probe via one-photon or two-photon excitation
- Author
-
Qingdong Zheng, Mingxue Wang, Deguang Huang, Changquan Tang, Xueyuan Chen, and Xiaoying Shang
- Subjects
Detection limit ,chemistry.chemical_classification ,Materials science ,Photon ,business.industry ,Biomolecule ,02 engineering and technology ,General Chemistry ,010402 general chemistry ,021001 nanoscience & nanotechnology ,01 natural sciences ,Fluorescence ,0104 chemical sciences ,Two-photon excitation microscopy ,chemistry ,Microscopy ,Materials Chemistry ,Optoelectronics ,0210 nano-technology ,business ,Biological imaging ,Absorption (electromagnetic radiation) - Abstract
In biological imaging, the use of long-wavelength-emitting (>650 nm) fluorescent probes can significantly reduce the interference from cell auto-fluorescence and thus greatly improve the imaging resolution because intrinsic biomolecules rarely absorb light and emit fluorescence in the long-wavelength region. In this work, a long-wavelength-emitting two-photon fluorescent probe (TTNO) for nitric oxide (NO) detection in living cells is designed and synthesized. TTNO shows ∼28-fold enhanced fluorescence intensity (at 658 nm) with a low detection limit of 9 nM, a fast response to NO within ∼40 seconds and a high selectivity for NO. In addition, it is worth mentioning that TTNO can also be excited with near-infrared light via two-photon absorption. Its biological application for real-time imaging of exogenous and endogenous NO in living cells is successfully demonstrated by using one-photon and two-photon microscopy, respectively.
- Published
- 2019
4. An Automatic Verification Method of Intelligent Substation Operation Order Based on Chinese Semantic Deep Learning
- Author
-
Mingxue Wang, Miao Jiang, Li Lee, Jinyu Chen, and Daming Zhou
- Subjects
Correctness ,business.industry ,Semantics (computer science) ,Computer science ,Deep learning ,computer.software_genre ,Recurrent neural network ,Operations order ,Image tracing ,Artificial intelligence ,Data mining ,business ,computer ,Reliability (statistics) ,Word (computer architecture) - Abstract
Verifying the intelligent substation Chinese operation order is an important step to ensure the accuracy of substation operations. The current manual verification method based on experience has strong subjectivity, low efficiency and low reliability. In view of this, this paper proposes an automatic verification method of operation order based on the Chinese semantic deep learning model: Global vectors for word representation-convolution Recurrent Neural Network (Glove-RCNN). By combining the text vectorization model Glove and text mining model RCNN, this method is feasible in realizing the semantic discrimination and automatic verification of correctness and error of the operation order texts. The experimental result shows that the MicroF score and MacroF score of the operation order verification model is 93.98% and 94.19%, which can accurately judge the correctness of the operation order, so as to effectively improve the verification efficiency.
- Published
- 2021
5. The pathogenesis of autoimmune hepatitis
- Author
-
Hua Zhang and Mingxue Wang
- Subjects
Antibody-dependent cell-mediated cytotoxicity ,biology ,business.industry ,medicine.medical_treatment ,lcsh:R ,lcsh:Medicine ,Autoimmune hepatitis ,medicine.disease ,digestive system diseases ,Immune tolerance ,Pathogenesis ,03 medical and health sciences ,0302 clinical medicine ,Immune system ,Cytokine ,Antigen ,immune system diseases ,Immunology ,medicine ,biology.protein ,030211 gastroenterology & hepatology ,030212 general & internal medicine ,Antibody ,business - Abstract
Autoimmune hepatitis (AIH) is a liver inflammatory disease via induction of debris-like necrosis in the liver portal area, which is characterized by hypergammaglobulinemia and a variety of autoantibodies. And its performance is very similar to viral hepatitis, but with absolutely different treatment. The pathogenesis of AIH is not clear, genetic susceptibility is considered to be the main factor. AIH is a cause of multiple pathogenic disease, and can induce viruses, bacteria, chemicals and drugs which are potential causes for genetic sensitive individuals, to participate in inflammatory disease processes. Due to the destruction of immune tolerance, liver-specific membrane proteins were expressed on the surface of liver cells, asialoglycoprotein receptor (ASGP-R) and microsomal cytochrome P4502D6 are considered to be more clearly present to stimulate AIH antigen. Activation of CD4+ T cells by direct exposure and release of cytokines stimulates B cells to produce antibodies that initiate immune injury responses. At the same time cytokine activation of CD8+ T cells mediates antibody-dependent cell-mediated cytotoxicity (ADCC) effect to kill hepatocytes, activating tumour necrosis factor (TNF) or Fas-mediated hepatocellular death. However, AIH patients are always proved to be lack of immunoregulatory function, which is newly considered to be the cardinal cause of AIH. Genetic susceptibility, molecular simulation theory, and immune pathogenesis are main points of this review article. Especially, in-depth statement has been made from several aspects of AIH’s immune pathogenesis such as cellular immune mechanism, humoral immunity with ADCC, immunosuppressive effects of regulatory T cells, and cytokine theory. Thus, a better understanding of the pathogenesis of AIH is of great importance. Keywords: Autoimmune hepatitis, Molecular simulation theory, Immune pathogenesis
- Published
- 2018
6. Establishing reference intervals for urine and serum iodine levels: A nationwide multicenter study of a euthyroid Chinese population
- Author
-
Xinqi Cheng, Benzhang Yu, Ling Qiu, Xiuming Zhang, Danchen Wang, Dandan Li, Songlin Yu, Qiong Zhang, Mingxue Wang, Li'an Hou, Haipeng Guo, Yutong Zou, Pengchang Li, Qian Cheng, Liangyu Xia, Yicong Yin, Kiyoshi Ichihara, Chaochao Ma, Honglei Li, and Dandan Sun
- Subjects
0301 basic medicine ,Adult ,Male ,medicine.medical_specialty ,China ,Clinical Biochemistry ,Population ,chemistry.chemical_element ,Context (language use) ,Urine ,Thyroid Function Tests ,Iodine ,Biochemistry ,Thyroid function tests ,Gastroenterology ,03 medical and health sciences ,Young Adult ,0302 clinical medicine ,Reference Values ,Internal medicine ,medicine ,Humans ,Euthyroid ,Thyroid Nodule ,education ,Aged ,education.field_of_study ,medicine.diagnostic_test ,business.industry ,Biochemistry (medical) ,Thyroid ,General Medicine ,Middle Aged ,Healthy Volunteers ,030104 developmental biology ,medicine.anatomical_structure ,chemistry ,030220 oncology & carcinogenesis ,Female ,Thyroid function ,business - Abstract
Context Urinary iodine (UI) is commonly used for evaluating iodine status, whereas serum iodine (SI) is more closely correlated with bioavailable iodine. However, no reliable reference intervals (RIs) for clinical use are available. We aimed to establish RIs for SI, UI, and a ratio of UI to urinary creatinine (U-Cre) applicable to the Chinese population. Methods This multicenter cross-sectional study enrolled 930 apparently healthy adults from six representative cities in China (Beijing, Dongying, Guiyang, Urumqi, Shenzhen, and Qiqihar) in 2017. Thyroid ultrasonography and thyroid function tests, including antithyroid antibody tests, were performed to exclude individuals with latent thyroid diseases. An iodine intake-related questionnaire survey was performed. SI and UI were measured using inductively coupled plasma-mass spectrometry. Possible influencing factors of iodine levels were evaluated using multiple regression analysis. Results Post-exclusion, the final analysis included 894 individuals. Seafood intake frequency was positively correlated with SI (standardized partial regression coefficient = 0.23) but not with UI and UI/U-Cre. SI was positively correlated with serum TT4 (Spearman correlation coefficient: 0.40), TT3 (0.23), and FT4 (0.18). SI and UI showed no age- or sex-specific variations. Significantly higher UI/U-Cre values were observed in Qiqihar than in Beijing, Guizhou, and Shenzhen. Shenzhen showed the lowest UI levels among all evaluated cities. With application of latent abnormal values exclusion procedurere, the RIs for SI, UI, and UI/U-Cre in the population were 36.0–79.3 μg/L, 19–385 μg/L, 22–450 μg/g, respectively. Conclusions We established RIs for UI and SI among healthy Chinese individuals with no thyroid nodule or dysfunction.
- Published
- 2019
7. Probabilistic Knowledge-Graph based Workflow Recommender for Network Management Automation
- Author
-
Erik Aumayr, Anne-Marie Bosneag, and MingXue Wang
- Subjects
business.industry ,Computer science ,Knowledge engineering ,020206 networking & telecommunications ,Context (language use) ,02 engineering and technology ,Recommender system ,Network management ,Knowledge-based systems ,Workflow ,Documentation ,Management system ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,business ,Software engineering - Abstract
The move towards more complex and dynamic telecommunication networks renders the need for more automation in the management system stringent. This is especially true in the context of 5G networks, where understanding context for providing the right management recommendations is crucial. Our work focuses on gathering context from the current status of the network and correlating it with useful information from existing documents in the network provider and operator's domain. We propose an architecture that, based on collected and interlinked information, can provide automatic recommendations for addressing existing problems in the network. More specifically, our approach is based on creating a knowledge-graph to direct workflow recommendations for network incidents. We implemented this system using the actual OSS product documentation and real network events and we show that our approach adds new value for automated network management, including improved efficiency and customer experience.
- Published
- 2019
8. Development of a Novel EGFR-Targeting Antibody-Drug Conjugate for Pancreatic Cancer Therapy
- Author
-
Changjiang Huang, Xue Li, Mingxue Wang, Deling Yu, Zhuanglin Li, Yaocheng Qu, Yao Xuejing, Jianmin Fang, and Luo Wenting
- Subjects
0301 basic medicine ,Cancer Research ,Antibody-drug conjugate ,Immunoconjugates ,medicine.drug_class ,Mice, Nude ,Apoptosis ,Monoclonal antibody ,Antibodies, Monoclonal, Humanized ,03 medical and health sciences ,chemistry.chemical_compound ,Mice ,0302 clinical medicine ,Nude mouse ,In vivo ,Pancreatic cancer ,medicine ,Tumor Cells, Cultured ,Animals ,Humans ,Pharmacology (medical) ,Epidermal growth factor receptor ,Cell Proliferation ,Mice, Inbred BALB C ,biology ,business.industry ,biology.organism_classification ,medicine.disease ,Xenograft Model Antitumor Assays ,body regions ,ErbB Receptors ,Pancreatic Neoplasms ,030104 developmental biology ,Oncology ,Monomethyl auristatin E ,chemistry ,030220 oncology & carcinogenesis ,Monoclonal ,Cancer research ,biology.protein ,Female ,business - Abstract
Overexpression of epidermal growth factor receptor (EGFR) is common in pancreatic cancer and associated with the poor prognosis of this malignancy. To develop anti-EGFR antibody–drug conjugates (ADCs) for use in a novel EGFR-targeting approach to treat pancreatic cancer. A humanized anti-EGFR monoclonal antibody (RC68) was generated by mouse immunization and complementary-determining region grafting technology. Two RC68-based ADCs, RC68-MC-VC-PAB-MMAE and RC68-PY-VC-PAB-MMAE, were synthesized by conjugating monomethyl auristatin E (MMAE), a small-molecule cytotoxin, to RC68 through two distinct linkers (MC and PY). Internalization of the RC68-based ADCs was examined by flow cytometry. The in vitro and in vivo antitumor activities of RC68-based ADCs were evaluated in human pancreatic cancer cells and in a BXPC-3 xenograft nude mouse model, respectively. The RC68-based ADCs bound to EGFR on the surface of tumor cells and were effectively internalized, resulting in the death of EGFR-positive cancer cell lines. The RC68-based ADCs (at 5 or 10 mg/kg) were more potent than gemcitabine hydrochloride (60 mg/kg) at inhibiting the growth of BXPC-3 xenografts. Moreover, RC68-PY-VC-PAB-MMAE was found to have superior stability in human plasma compared with RC68-MC-VC-PAB-MMAE. A novel EGFR-targeting ADC, RC68-PY-VC-PAB-MMAE, shows promise as an effective, selective, and safe therapeutic agent for EGFR-positive pancreatic cancer.
- Published
- 2019
9. Alternative cleaning and dust detection method for PV modules and its application
- Author
-
Mingxue Wang, Juan Mu, Zhongyao Fan, and JinYin Yi
- Subjects
Dust detection ,Annual production ,Renewable Energy, Sustainability and the Environment ,business.industry ,020209 energy ,020208 electrical & electronic engineering ,Photovoltaic system ,Net return ,02 engineering and technology ,Power (physics) ,Reliability (semiconductor) ,0202 electrical engineering, electronic engineering, information engineering ,Environmental science ,Production (economics) ,Process engineering ,business - Abstract
An efficient cleaning method is crucial for the power production and equipment reliability of a Photovoltaic (PV) system. This paper presents an alternative cleaning and dust detection method for PV modules. Instead of monitoring the difference between the real and theoretical power production of PV modules, this method analyzes the soiling loss by alternatively cleaning two panels at the beginning of the cleaning period. When the loss reaches the cleaning cost, a cleaning reminder is generated while considering the weather forecast. The efficacy of the proposed theoretical model is established based on 1-year data collected in the Shandong PV system. Annual production improvement of more than 1.33% is achieved with a net return of more than 0.78% on the deduction of cleaning cost, which is equal to $1363/GWh economic benefit per year.
- Published
- 2020
10. A Novel Split-Merge-Evolve k Clustering Algorithm
- Author
-
MingXue Wang, Vincent Huang, and Anne-Marie Cristina Bosneag
- Subjects
Ground truth ,Computer science ,business.industry ,Big data ,k-means clustering ,020206 networking & telecommunications ,02 engineering and technology ,Hierarchical clustering ,Network management ,ComputingMethodologies_PATTERNRECOGNITION ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Algorithm design ,business ,Cluster analysis ,Algorithm - Abstract
Clustering algorithms are used in a large number of big data analytic applications spread across various application domains, including network management. We propose a novel Split-merge-evolve algorithm for clustering data into k number of clusters. The algorithm randomly divides data into k clusters initially, then repeatedly splits bad clusters and merges closest clusters to evolve the final clustering result. A key metric during the clustering process of the Split-merge-evolve algorithm is a user chosen or defined clustering quality metric or internal evaluation. The algorithm evolves the clustering result towards the user expected high quality result, although there is no ground truth or labelled data involved during the clustering process. The algorithm design is flexible in its implementation, with various common techniques, such as centroid and connectivity based measures that can be used in its implementation. The algorithm is easy to implement and effective. With 4 datasets, including 2 real life datasets in our experiments, the Split-merge-evolve algorithm performs better than both most commonly used K-means and Agglomerative hierarchical algorithms.
- Published
- 2018
11. Intelligent network management mechanisms as a step towards SG
- Author
-
Anne-Marie Bosneag and MingXue Wang
- Subjects
Radio access network ,Process management ,business.industry ,Computer science ,Provisioning ,Context (language use) ,Business model ,Virtualization ,computer.software_genre ,Automation ,03 medical and health sciences ,0302 clinical medicine ,Intelligent Network ,business ,Software-defined networking ,computer ,030215 immunology - Abstract
The evolution of telecom networks towards 5G comes with challenges that permeate the entire network structure and its management principles. In this paper, we outline how challenges such as the need to support different types of users and new network business models, the movement towards virtualization, as well as the need for more automation drive the requirement for a holistic and flexible way of managing the networks. We detail the architectural principles that underline such a cognitive management framework and we exemplify its use through a scenario based on software defined networking, where we combine machine learning, control and automation in the context of flexible resource provisioning in the Radio Access Network. Our experiments were conducted in collaboration with a major telecom operator and clearly show the advantages of introducing intelligence and automation into the network.
- Published
- 2017
12. A Streaming Data Anomaly Detection Analytic Engine for Mobile Network Management
- Author
-
MingXue Wang and Sidath Handurukande
- Subjects
Computer science ,business.industry ,Distributed computing ,Real-time computing ,Mobile computing ,020206 networking & telecommunications ,02 engineering and technology ,Networking hardware ,Network management ,Analytics ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Cellular network ,Anomaly detection ,Mobile telephony ,Software-defined networking ,business - Abstract
With emerging Network Functions Virtualization (NFV), Software Defined Networking (SDN) paradigms in Network Management (NM), new network devices, features can immediately become available. Available network resources, services can be altered, optimized in real time to gain the maximum benefit. However, this requires real time analytics information sent to SDN controllers rather than traditional manual offline or batch analytics which deliver outputs in hourly or monthly in NM Systems. As a result, real time analytic is becoming a critical element for NM. In this paper, we describe a configuration free (i.e., non-parametric) streaming data anomaly detection analytic engine for automatic NM system development. We describe the design principles, innovative algorithm design, architecture, implementation of the engine in relation to streaming data, mobile NM. Finally, we present use cases, evaluation results.
- Published
- 2016
13. Real-world experiences with CQI-based analyses for dense LTE networks
- Author
-
Anne-Marie Bosneag, Sidath Handurukande, James O'Sullivan, and MingXue Wang
- Subjects
Relation (database) ,business.industry ,Computer science ,media_common.quotation_subject ,Big data ,020206 networking & telecommunications ,020302 automobile design & engineering ,Throughput ,02 engineering and technology ,Data science ,Network element ,0203 mechanical engineering ,Transmission (telecommunications) ,User equipment ,0202 electrical engineering, electronic engineering, information engineering ,Quality (business) ,business ,media_common ,Communication channel - Abstract
Much work has been done in the area of telecommunications transmission parameters and, in particular, Channel Quality Indicators, to analyse the best ways to improve the performance and quality of communications. However, there is a gap in published papers when it comes to real-world experiences with CQI reports and network-side analysis of transmission parameters that can provide information about user equipment and network elements behaviour. In this paper, we present our experiences with a real-world analysis of dense LTE networks, focusing on two main aspects — what information can CQI reports give us about the behaviour of user equipment in the network, and what information do they provide in relation to the individual network elements. We show what insights can be derived from a network wide statistical analysis of CQI reports and how these insights can be further used by operators to understand potential problems in their network.
- Published
- 2016
14. Analytical method of thermal-fluid transients in aero-hydraulic systems
- Author
-
Zongxia Jiao, Yuanzhi Xu, and Mingxue Wang
- Subjects
Pipeline transport ,Engineering ,business.product_category ,business.industry ,Thermal ,Transfer-matrix method (optics) ,Mechanical engineering ,Hydraulic machinery ,Thermal analysis ,business ,Actuator ,Electronic circuit ,Airplane - Abstract
The thermal effect in hydraulic circuits becomes a more significant concern, because of the energy demand and management of the new generation airplane. Although fluid transients in pipelines have been researched for decades, thermal effect is hardly considered. This paper models thermo-fluid characteristics in pipe net analytically as well as other hydraulic components, using the transfer matrix method (TMM).
- Published
- 2015
15. A distributed architecture for policy-customisable multi-tenant Processes-as-a-Service
- Author
-
Claus Pahl, Kosala Yapa Bandara, and MingXue Wang
- Subjects
Service (systems architecture) ,Business requirements ,Multitenancy ,Knowledge management ,Software engineering ,Computer Networks and Communications ,Process (engineering) ,Business process ,computer.internet_protocol ,business.industry ,Computer science ,Multi-tenancy ,Services ,Processes ,Policy ,Coordination ,Governance ,020207 software engineering ,Cloud computing ,02 engineering and technology ,Business process modeling ,Business Process Execution Language ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,business ,computer ,Software - Abstract
Service-based business processes are often developed and deployed by single organizations. In distributed, shared resource environments like the cloud on the other hand, consumers share resources owned by cloud providers. %Higher levels of resource sharing gives more economy of scale for providers in the software-as-a-service (SaaS) or business process-as-a-service (BPaaS) space. This requires multi-tenancy capability for service processes that provides customized behaviour for on shared process implementations to meet the varying needs of different process consumers as tenants of the process resource. In this paper, we define a distributed multi-tenant architecture for BPEL processes provided as a service. A single-version BPEL process is deployed by a provider and offered for all process consumers, combined with a customization and management functionality to create a unique experience for different consumers (process tenants). We provide two core components: a policy model for consumers to express customization/business requirements of service processes and a coordination framework for policy enforcement between consumers and providers to achieve on-the-fly customization of service processes.
- Published
- 2015
16. Enterprise Search with Development for Network Management System
- Author
-
Mikel Zuzuarregui, Enda Fallon, Jimmy O'Meara, Eloy Martinez, Robin Grindrod, and MingXue Wang
- Subjects
World Wide Web ,Network management ,User experience design ,Computer science ,business.industry ,Search analytics ,Search engine indexing ,Big data ,Semantic search ,Troubleshooting ,Network monitoring ,business - Abstract
Browsing and searching network information for observation, analysis and troubleshooting is an inherent part of using the features and functions of any Network Management System. Enterprise search has capabilities for handling various data types and sources and big data scalability, and is becoming an emerging technology for such network management functions development. In this paper, we give an overview on work done in our research and prototype team regarding an advanced search project. We provide a brief report on search fundamental knowledge and study of Solr search platform stack. It answers common questions from management and development teams regarding adopting search technology for production development, and gives a Solr reference card for developers. We also introduce two advanced search features, user experience based search recommendation and anomaly detection enhanced search ranking from our research work. Two features are developed to make network searches more efficient as it can help user quickly locate the most valuable search results, but the concept can be adopted for search applications in other domains.
- Published
- 2015
17. ADAMANT — An Anomaly Detection Algorithm for MAintenance and Network Troubleshooting
- Author
-
Sheila Fallon, Enda Fallon, Eloy Martinez, and MingXue Wang
- Subjects
SQL ,Computer science ,business.industry ,Big data ,Data field ,Complex event processing ,Troubleshooting ,Data structure ,computer.software_genre ,Anomaly detection ,Data mining ,business ,computer ,Network analysis ,computer.programming_language - Abstract
Network operators are increasingly using analytic applications to improve the performance of their networks. Telecommunications analytical applications typically use SQL and Complex Event Processing (CEP) for data processing, network analysis and troubleshooting. Such approaches are hindered as they require an in-depth knowledge of both the telecommunications domain and telecommunications data structures in order to create the required queries. Valuable information contained in free form text data fields such as “additional_info”, “user_text” or “problem_text” can also be ignored. This work proposes An Anomaly Detection Algorithm for MAintenance and Network Troubleshooting (ADAMANT), a text analytic based network anomaly detection approach. Once telecommunications data records have been indexed, ADAMANT uses distance based outlier detection within sliding windows to detect abnormal terms at configurable time intervals. Traditional approaches focus on a specific type of record and create specific cause and effect rules. With the ADAMANT approach all free form text fields of alarms, logs, etc. are treated as text documents similar to Twitter feeds. All documents within a window represent a snapshot of the network state that is processed by ADAMANT. The ADAMANT approach focuses on text analytics to provide automated analysis without the requirement for SQL/CEP queries. Such an approach provides distinct network insights in comparison to traditional approaches.
- Published
- 2015
18. PRISENIT -- A Probabilistic Search Recommendation Algorithm to Improve Search Efficiency for Network Intelligence and Troubleshooting
- Author
-
John Keeney, MingXue Wang, Paul Jacob, Mikel Zuzuarregui, and Enda Fallon
- Subjects
Information retrieval ,Web search query ,Computer science ,business.industry ,Troubleshooting ,Recommender system ,computer.software_genre ,Query expansion ,Search engine ,Network management ,Collaborative filtering ,Beam search ,Data mining ,business ,computer ,Algorithm - Abstract
When searching for data in a telecommunications network management application, large search result sets are common. In order to refine the results to retrieve useful information existing systems normally require additional user intervention such as appending or removing a search keyword, adding a filter, grouping results, etc. This work proposes a Probabilistic Search Recommendation Algorithm to Improve Search Efficiency for Network Intelligence and Troubleshooting (PRISENIT). PRISENIT is a query-based recommendation algorithm intended to improve search efficiency and usability for telecommunication system management. PRISENIT is an extension of an item-based collaborative filtering algorithm. It uses correlation-based similarity and users' implicit feedback in order to improve search efficiency. It learns from previous experiences in order to optimize decision-making. Currently there exists no known query-based recommender adaptation mechanism for network management. Existing search engines use previous user searches to make a suggestion based on the keyword. PRISENIT not only considers search terms, it also considers the influence of filters and features in order to makes network searches more efficient as it removes the necessity for users to manually choose search features or search filters. Experimental results show that PRISENIT can improve user experience in a telecommunications management environment.
- Published
- 2015
19. An extended ontology-based context model and manipulation calculus for dynamic web service processes
- Author
-
MingXue Wang, Kosala Yapa Bandara, and Claus Pahl
- Subjects
Context model ,Service (systems architecture) ,Software engineering ,business.industry ,Computer science ,Service delivery framework ,Quality of service ,Context (language use) ,Dynamic web page ,Ontology (information science) ,computer.software_genre ,Management Information Systems ,World Wide Web ,Hardware and Architecture ,Web service ,business ,Dynamic aspect ,Context model ontology ,Context constraints ,Context manipulation ,Service process ,computer ,Software ,Information Systems - Abstract
Services are offered in an execution context that is determined by how a provider provisions the service and how the user consumes it. The need for more flexibility requires the provisioning and consumption aspects to be addressed at run-time. We propose an ontology-based context model providing a framework for service provisioning and consumption aspects and techniques for managing context constraints for Web service processes where dynamic context concerns can be monitored and validated at service process run-time. We discuss the contextualisation of dynamically relevant aspects of Web service processes as our main goal, i.e. capture aspects in an extended context model. The technical contributions of this paper are a context model ontology for dynamic service context and an operator calculus for integrated and coherent context manipulation, composition and reasoning. The context model ontology formalises dynamic aspects of Web services and facilitates reasoning. We present the context ontology in terms of four core dimensions--functional, QoS, domain and platform--which are internally interconnected.
- Published
- 2013
20. A Domain-Specific Model for Data Quality Constraints in Service Process Adaptations
- Author
-
Neel Mani, Claus Pahl, and MingXue Wang
- Subjects
Service (systems architecture) ,Software engineering ,Database ,Computer science ,business.industry ,media_common.quotation_subject ,020207 software engineering ,Context (language use) ,02 engineering and technology ,Ontology (information science) ,computer.software_genre ,Data type ,Data governance ,Service Process ,Process Adaptation ,Content Services ,Constraint Monitoring ,Quality and Governance ,Domain-Specific Model ,Provenance ,Data quality ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Quality (business) ,business ,Constraint (mathematics) ,computer ,media_common - Abstract
Service processes are often enacted across different boundaries such as organisations, countries or even languages. Specifically, looking at the quality and governance of data or content processed by services in this context is important to control different constraints in this cross-boundary processing. In order to provide a context-aware solution that takes into account data and data processing requirements, a rule-based constraints specification and adaptation of processes shall be proposed. A domain ontology shall capture the key data/content data types, activities and constraints, which forms the basis of a rule-based policy monitoring solution. A provenance model is at the core of this ontology solution. The key contribution is a domain-specific model and specification template for constraint policy definition, which can be applied to adapt service processes to domain-specific needs.
- Published
- 2013
21. RPig: A scalable framework for machine learning and advanced statistical functionalities
- Author
-
Mohamed Nassar, Sidath Handurukande, and MingXue Wang
- Subjects
Computer science ,business.industry ,Active learning (machine learning) ,Data management ,Big data ,Machine learning ,computer.software_genre ,Support vector machine ,Software ,Computational learning theory ,High-level programming language ,Scalability ,Artificial intelligence ,business ,computer - Abstract
In many domains such as Telecom various scenarios necessitate the processing of large amounts of data using statistical and machine learning algorithms. A noticeable effort has been made to move the data management systems into MapReduce parallel processing environments such as Hadoop and Pig. Nevertheless these systems lack the features of advanced machine learning and statistical analysis. Frame-works such as Mahout on top of Hadoop support machine learning but their implementations are at the preliminary stage. For example Mahout does not provide Support Vector Machine (SVM) algorithms and it is difficult to use. On the other hand traditional statistical software tools such as R containing comprehensive statistical algorithms for advanced analysis are widely used. But such software can only run on a single computer and therefore it is not scalable. In this paper we propose an integrated solution RPig which takes the advantages of R (for machine learning and statistical analysis capabilities) and parallel data processing capabilities of Pig. The RPig framework offers a scalable advanced data analysis solution for machine learning and statistical analysis. Analysis jobs can be easily developed with RPig script in high level languages. We describe the design implementation and an eclipse-based RPigEditor for the RPig framework. Using application scenarios from the Telecom domain we show the usage of RPig and how the framework can significantly reduce the development effort. The results demonstrate the scalability of our framework and the simplicity of deployment for analysis jobs.
- Published
- 2012
22. User-customisable policy monitoring for multi-tenant cloud architectures
- Author
-
MingXue Wang and Claus Pahl
- Subjects
Service (systems architecture) ,Multitenancy ,Software engineering ,business.industry ,Computer science ,Cloud architecture ,Policy customisation ,Monitoring ,Software as a service ,Quality of service ,Cloud computing ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,Computer security ,computer.software_genre ,Personalization ,Cloud testing ,Instrumentation (computer programming) ,business ,computer - Abstract
Cloud computing needs end-user customisation and personalisation of multi-tenant cloud service offerings. Particularly, QoS and governance policy management and monitoring is needed. We propose a user-customisable policy definition solution that can be enforced in multitenant cloud offerings through automated instrumentation and monitoring. Service processes run by cloud and SaaS providers can be made policy-aware in a transparent way.
- Published
- 2012
23. A coordination space architecture for service collaboration and cooperation
- Author
-
Kosala Yapa Bandara, Veronica Gacitua-Decar, Claus Pahl, and MingXue Wang
- Subjects
Engineering ,Service (systems architecture) ,Process management ,Resource-oriented architecture ,Knowledge management ,Software engineering ,computer.internet_protocol ,Event (computing) ,business.industry ,Space architecture ,Software as a service ,Information architecture ,service coordination ,software services ,collaboration ,020207 software engineering ,0102 computer and information sciences ,02 engineering and technology ,Service-oriented architecture ,01 natural sciences ,010201 computation theory & mathematics ,0202 electrical engineering, electronic engineering, information engineering ,Architecture ,business ,computer - Abstract
With software services becoming a strategic capability for the software sector, service engineering needs to address integration problems based on support that helps services to collaborate and coordinate their activities. The increasing need to address dynamic and automated changes - caused by on-demand environments and changing requirements - shall be answered through a service coordination architecture based on event-based collaboration. The solution is based on a service coordination space architecture that acts as a passive infrastructure for event-based collaboration. We discuss the information architecture and the coordination principles of such a collaboration environment.
- Published
- 2011
24. Ontology-Based Composition and Matching for Dynamic Service Coordination
- Author
-
MingXue Wang, Claus Pahl, Kosala Yapa Bandara, and Veronica Gacitua-Decar
- Subjects
Matching (statistics) ,Service (systems architecture) ,Software engineering ,Service delivery framework ,business.industry ,Computer science ,Service design ,020207 software engineering ,02 engineering and technology ,Ontology (information science) ,World Wide Web ,Service coordination ,Tuple space ,Dynamic service composition ,Service Ontology ,Description logic ,Information model ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,business - Abstract
Service engineering needs to address integration problems allowing services to collaborate and coordinate. The need to address dynamic automated changes - caused by on-demand environments and changing requirements - can be addressed through service coordination based on ontology-based composition and matching techniques. Our solution to composition and matching utilises a service coordination space that acts as a passive infrastructure for collaboration. We discuss the information models and the coordination principles of such a collaboration environment in terms of an ontology and its underlying description logics. We provide ontology-based solutions for structural composition of descriptions and matching between requested and provided services.
- Published
- 2011
25. Process as a Service Distributed Multi-tenant Policy-Based Process Runtime Governance
- Author
-
MingXue Wang, Claus Pahl, and Kosala Yapa Bandara
- Subjects
Business Process Model and Notation ,Business process discovery ,Business process management ,Software engineering ,Process modeling ,Process management ,Computer science ,Business process ,Artifact-centric business process model ,business.industry ,Process mining ,Business process modeling ,business - Abstract
With the emergence of Business Process Outsourcing and Cloud Computing, enterprises are looking for available business processes outside of their organizations to quickly adopt to new business requirements and also reduce process development and maintenance costs. The process execution needs to be governed as policy enforcement might differ between different clients. Since a process is deployed outside of the organizations and serves multiple process clients, distribution and multi-tenancy have become two requirements for runtime governance of service processes. We address this problem by introducing a policy-oriented aspectual business process framework. The runtime governance constraints from process clients are integrated as aspects through dynamic weaving into rpcess execution.
- Published
- 2010
26. Constraint integration and violation handling for BPEL processes
- Author
-
Kosala Yapa Bandara, Claus Pahl, and MingXue Wang
- Subjects
Flexibility (engineering) ,Software engineering ,Database ,Business rule ,business.industry ,computer.internet_protocol ,Computer science ,Context (language use) ,Service-oriented architecture ,computer.software_genre ,Constraint (information theory) ,Business Process Execution Language ,Theory of constraints ,Web service ,business ,computer - Abstract
Autonomic, i.e. dynamic and fault-tolerant Web service composition is a requirement resulting from recent developments such as on-demand services. In the context of planning-based service composition, multi-agent planning and dynamic error handling are still unresolved problems. Recently, business rule and constraint management has been looked at for enterprise SOA to add business flexibility. This paper proposes a constraint integration and violation handling technique for dynamic service composition. Higher degrees of reliability and fault-tolerance, but also performance for autonomously composed WS-BPEL processes are the objectives.
- Published
- 2009
27. An architecture for autonomic web service process planning
- Author
-
Colm Moore, MingXue Wang, Claus Pahl, Binder, Walter, and Dustdar, Schahram
- Subjects
Web standards ,medicine.medical_specialty ,Software engineering ,Web development ,business.industry ,Computer science ,Web Services ,Service composition ,Autonomic composition ,Composition architecture ,computer.software_genre ,web service composition ,autonomic composition ,World Wide Web ,Web design ,medicine ,Mashup ,Web service ,business ,WS-Policy ,computer ,Web modeling ,Data Web - Abstract
Web service composition is a technology that has received considerable attention in the last number of years. Languages and tools to aid in the process of creating composite Web services have been received specific attention. Web service composition is the process of linking single Web services together in order to accomplish more complex tasks. One area of Web service composition that has not received as much attention is the area of dynamic error handling and re-planning, enabling autonomic composition. Given a repository of service descriptions and a task to complete, it is possible for AI planners to automatically create a plan that will achieve this goal. If however a service in the plan is unavailable or erroneous the plan will fail. Motivated by this problem, this paper suggests autonomous re-planning as a means to overcome dynamic problems. Our solution involves automatically recovering from faults and creating a context-dependent alternate plan. We present an architecture that serves as a basis for the central activities autonomous composition, monitoring and fault handling.
- Published
- 2009
28. Ontology-based composition and matching for dynamic cloud service coordination
- Author
-
Kosala Yapa Bandara, Veronica Gacitua-Decar, MingXue Wang, and Claus Pahl
- Subjects
Matching (statistics) ,Service (systems architecture) ,Software engineering ,business.industry ,Computer science ,Cloud computing ,Library and Information Sciences ,Differentiated service ,Ontology (information science) ,Computer Science Applications ,World Wide Web ,Description logic ,Information model ,Tuple space ,Service coordination ,Dynamic service composition ,Service Ontology ,Cloud Service Coordination ,Cloud Mediation ,business ,Information Systems - Abstract
Recent cross-organisational software service offerings, such as cloud computing, create higher integration needs. In particular, services are combined through brokers and mediators, solutions to allow individual services to collaborate and their interaction to be coordinated are required. The need to address dynamic management - caused by cloud and on-demand environments - can be addressed through service coordination based on ontology-based composition and matching techniques. Our solution to composition and matching utilises a service coordination space that acts as a passive infrastructure for collaboration where users submit requests that are then selected and taken on by providers. We discuss the information models and the coordination principles of such a collaboration environment in terms of an ontology and its underlying description logics. We provide ontology-based solutions for structural composition of descriptions and matching between requested and provided services.
- Published
- 2011
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.