Pub Date : 2016-08-01DOI: 10.1109/ICSESS.2016.7883125
Yingjie Lv, Wei Cen, Yi-Lun Fu, Chao Lu, Bin Li
In this paper, we have studied the application of P-cycle in OpenADR communication network. The notions of OpenADR and P-cycle are presented in section I . Then section II put forward a set of algorithms to create P-cycles to protect specific tree network, and simulation results of the algorithm is illustrated in section III. Results show that the algorithm is efficient to calculate P-cycle of high quality for OpenADR communication network.
{"title":"Application of P-cycle in OpenADR communication network protection","authors":"Yingjie Lv, Wei Cen, Yi-Lun Fu, Chao Lu, Bin Li","doi":"10.1109/ICSESS.2016.7883125","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883125","url":null,"abstract":"In this paper, we have studied the application of P-cycle in OpenADR communication network. The notions of OpenADR and P-cycle are presented in section I . Then section II put forward a set of algorithms to create P-cycles to protect specific tree network, and simulation results of the algorithm is illustrated in section III. Results show that the algorithm is efficient to calculate P-cycle of high quality for OpenADR communication network.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132615630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-01DOI: 10.1109/ICSESS.2016.7883166
X. Zu, Yan Bai, Xu Yao
Smart grid is an important application of Internet Of Things (IOT). Monitoring data in large-scale smart grid are massive, real-time and dynamic that collected by a lot of sensors, services components etc. There are many challenges in deploying and managing distributed real time monitoring systems. This paper adopted data-centric approach in deploying Distributed Complex Event Processing (DCEP) monitoring system based on OMG Data Distribution Service (DDS) middleware, to bring about a more robust and scalable distributed monitoring system, and that easier to maintain and enhance over time. The DDS data-centric publish-subscribe programming model with support for a number of QoS properties gives many advantages for supporting DCEP components communications, that reliably transports events from data producers to Event Processing Agents (EPAs), between internal DCEP Processing Node (PN), and from the EPAs to the event consumers. This paper analyzed DCEP requirements in IoT, and its PN configuration and deployment flow, designed a DDS/DCEP integration architecture for smart grid IoT monitoring system, and gave a detail design about DCEP development and configuration method based on DDS data-centric programming model, that can simplify the DCEP complex deployment work. This work has beneficial for DECP large scale development & deployment research.
{"title":"Data-centric publish-subscribe approach for Distributed Complex Event Processing deployment in smart grid Internet of Things","authors":"X. Zu, Yan Bai, Xu Yao","doi":"10.1109/ICSESS.2016.7883166","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883166","url":null,"abstract":"Smart grid is an important application of Internet Of Things (IOT). Monitoring data in large-scale smart grid are massive, real-time and dynamic that collected by a lot of sensors, services components etc. There are many challenges in deploying and managing distributed real time monitoring systems. This paper adopted data-centric approach in deploying Distributed Complex Event Processing (DCEP) monitoring system based on OMG Data Distribution Service (DDS) middleware, to bring about a more robust and scalable distributed monitoring system, and that easier to maintain and enhance over time. The DDS data-centric publish-subscribe programming model with support for a number of QoS properties gives many advantages for supporting DCEP components communications, that reliably transports events from data producers to Event Processing Agents (EPAs), between internal DCEP Processing Node (PN), and from the EPAs to the event consumers. This paper analyzed DCEP requirements in IoT, and its PN configuration and deployment flow, designed a DDS/DCEP integration architecture for smart grid IoT monitoring system, and gave a detail design about DCEP development and configuration method based on DDS data-centric programming model, that can simplify the DCEP complex deployment work. This work has beneficial for DECP large scale development & deployment research.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131864329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-01DOI: 10.1109/ICSESS.2016.7883025
Jing Li, Jun Liu, Wenli Zhou
The Paper presents an improved algorithm for finding frequent elements over a sliding window. It makes no assumption on the distribution of the input items' frequency. Its main structure composes of only a few maps and short queues. By using hash table and other data structure to manage counters, the running time is dramatically decreased. After thorough experiment and logical analysis, the running time has reduced to constant.
{"title":"A real-time algorithm for finding frequent items over sliding window","authors":"Jing Li, Jun Liu, Wenli Zhou","doi":"10.1109/ICSESS.2016.7883025","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883025","url":null,"abstract":"The Paper presents an improved algorithm for finding frequent elements over a sliding window. It makes no assumption on the distribution of the input items' frequency. Its main structure composes of only a few maps and short queues. By using hash table and other data structure to manage counters, the running time is dramatically decreased. After thorough experiment and logical analysis, the running time has reduced to constant.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134347289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-01DOI: 10.1109/ICSESS.2016.7883083
Sun Weixuan, Zhang Hong, Fu Yangzhen, Feng Chao
The semi-formal language UML has become a standard notation for describing analysis and design models of complex software systems. But it's difficult to be verified formally. In order to solve this problem, a method to translate the UML models to the Event-B models has been proposed. The specific research is on the translation of the use case diagram and sequence diagram in UML. In the use case diagram, the users, the use cases and the relationship between them are taken into main consideration; In the sequence diagram, the objects of communication, the messages and the sending sequence of the messages are taken into main consideration. The translated models could be verificatied formally by the proof obligations in the platform of Rodin. Thus the purpose of formal verification for the semi-formal UML models has been achieved. Then the problem existing in the models could be found and the accuracy of the models could be guaranteed.
{"title":"A method for the translation from UML into Event-B","authors":"Sun Weixuan, Zhang Hong, Fu Yangzhen, Feng Chao","doi":"10.1109/ICSESS.2016.7883083","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883083","url":null,"abstract":"The semi-formal language UML has become a standard notation for describing analysis and design models of complex software systems. But it's difficult to be verified formally. In order to solve this problem, a method to translate the UML models to the Event-B models has been proposed. The specific research is on the translation of the use case diagram and sequence diagram in UML. In the use case diagram, the users, the use cases and the relationship between them are taken into main consideration; In the sequence diagram, the objects of communication, the messages and the sending sequence of the messages are taken into main consideration. The translated models could be verificatied formally by the proof obligations in the platform of Rodin. Thus the purpose of formal verification for the semi-formal UML models has been achieved. Then the problem existing in the models could be found and the accuracy of the models could be guaranteed.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134466729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-01DOI: 10.1109/ICSESS.2016.7883050
Chao Chen, Kejing He, Dongyan Deng
With the increasing demand of computing resources, a lot of large-scale data centers have been established around the world. Data centers provide efficient and convenient computing services while consume enormous energy at the same time. Therefore, reducing the energy consumption in data center is important and meaningful. Virtual machine consolidation (VMC) is an effective strategy that can improve the energy efficiency of data centers. In this research, we have put forward a new overload detection algorithm on the basis of existing algorithms to achieve better tradeoff between energy and service level agreement (SLA) violation. The prediction process of the proposed algorithm is mainly based on the utilization history of VMs. The experimental results demonstrate that compared with the original host-based framework, the proposed VM-based framework reduces the average ESV by 23.4%.
{"title":"Optimization of the overload detection algorithm for virtual machine consolidation","authors":"Chao Chen, Kejing He, Dongyan Deng","doi":"10.1109/ICSESS.2016.7883050","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883050","url":null,"abstract":"With the increasing demand of computing resources, a lot of large-scale data centers have been established around the world. Data centers provide efficient and convenient computing services while consume enormous energy at the same time. Therefore, reducing the energy consumption in data center is important and meaningful. Virtual machine consolidation (VMC) is an effective strategy that can improve the energy efficiency of data centers. In this research, we have put forward a new overload detection algorithm on the basis of existing algorithms to achieve better tradeoff between energy and service level agreement (SLA) violation. The prediction process of the proposed algorithm is mainly based on the utilization history of VMs. The experimental results demonstrate that compared with the original host-based framework, the proposed VM-based framework reduces the average ESV by 23.4%.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133374875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-01DOI: 10.1109/ICSESS.2016.7883155
Feifei Guo, Yu Liang
The emergence of TV two-dimensional code not only makes the traditional TV media and new media to connect more closely, but also achieves the “mobile - television - network” direct interaction, greatly promoting the trend of media convergence. This paper, basing on the two-dimensional code generation techniques - PHP QR code, uses the MVC framework and Open API technology to design and complete the TV two-dimensional code publishing system, and finally realizes dual screen interaction between mobile phone and TV.
{"title":"Design and implementation of TV two-dimensional code publishing system","authors":"Feifei Guo, Yu Liang","doi":"10.1109/ICSESS.2016.7883155","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883155","url":null,"abstract":"The emergence of TV two-dimensional code not only makes the traditional TV media and new media to connect more closely, but also achieves the “mobile - television - network” direct interaction, greatly promoting the trend of media convergence. This paper, basing on the two-dimensional code generation techniques - PHP QR code, uses the MVC framework and Open API technology to design and complete the TV two-dimensional code publishing system, and finally realizes dual screen interaction between mobile phone and TV.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130294688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-01DOI: 10.1109/ICSESS.2016.7883108
Lan Zhang, Hong-yun Ning, Yun-yun Du, Yan-xia Cui, Yang Yang
At present, multi-database identity authentication is mostly based on centralized global user management mechanism. In this paper, we analyze the defects of the current identity authentication in multi-database and propose a new single sign on for multi-database identity authentication based on the idea of database union domain. Compared with the traditional methods of authentication, the scheme adopts decentralized authentication mode which without centralized management, so it can avoid single point failure and single point overload, and it can also prevent password theft attack, replay attack and other various attacks. Through the case analysis, we know that the new scheme can improve the safety of the multi-database system.
{"title":"A new identity authentication scheme of single sign on for multi-database","authors":"Lan Zhang, Hong-yun Ning, Yun-yun Du, Yan-xia Cui, Yang Yang","doi":"10.1109/ICSESS.2016.7883108","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883108","url":null,"abstract":"At present, multi-database identity authentication is mostly based on centralized global user management mechanism. In this paper, we analyze the defects of the current identity authentication in multi-database and propose a new single sign on for multi-database identity authentication based on the idea of database union domain. Compared with the traditional methods of authentication, the scheme adopts decentralized authentication mode which without centralized management, so it can avoid single point failure and single point overload, and it can also prevent password theft attack, replay attack and other various attacks. Through the case analysis, we know that the new scheme can improve the safety of the multi-database system.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114172712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-01DOI: 10.1109/ICSESS.2016.7883116
Na Dang, Xiangyu Bai
Recently, content delivery has become a hot research field. However, with the increase of network scale and the mobility of users, content delivery in traditional network needs to deploy a number of content servers to cache contents, so as to satisfy multilevel users. Deploying so many servers will lead to a lot of costs, and it will cause the delay of network increase at the same time. Therefore, in order to improve the efficiency of content delivery, scholars propose to distribute contents in Delay Tolerant Network (DTN), which utilizes the mobility of nodes to deliver contents and can bear delay. In this paper, we qualitatively analyze and compare content delivery schemes have been raised, which are based on the analysis of the basic characteristics of the delay tolerant network. Through analyzing the advantages and disadvantages of each scheme, we make a conclusion and point out the further research directions.
{"title":"Content delivery mechanism in Delay Tolerant Network","authors":"Na Dang, Xiangyu Bai","doi":"10.1109/ICSESS.2016.7883116","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883116","url":null,"abstract":"Recently, content delivery has become a hot research field. However, with the increase of network scale and the mobility of users, content delivery in traditional network needs to deploy a number of content servers to cache contents, so as to satisfy multilevel users. Deploying so many servers will lead to a lot of costs, and it will cause the delay of network increase at the same time. Therefore, in order to improve the efficiency of content delivery, scholars propose to distribute contents in Delay Tolerant Network (DTN), which utilizes the mobility of nodes to deliver contents and can bear delay. In this paper, we qualitatively analyze and compare content delivery schemes have been raised, which are based on the analysis of the basic characteristics of the delay tolerant network. Through analyzing the advantages and disadvantages of each scheme, we make a conclusion and point out the further research directions.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"187 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114480013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-01DOI: 10.1109/ICSESS.2016.7883112
Su Linping, Mu Hongtao, Min Yunlang, Cheng Rui
Information security access platform is a core security practices of foundation to construct security access platform system of smart grid, and undertake a various important function of real-time monitoring, security access, secure data transmission and exchange, active defense in all kinds of complex network environments. However, the monitoring of network traffic classification is directly related to the electric power information network in smart grid environment has a far-reaching significance; this page is showing aiming at the problem of instability in traditional traffic classification methods, a traffic classification method based on C4.5 decision tree is proposed, which establishes models on the information gain ratio from the training set. Classifier is tested by attributes on test dataset, as well as network traffic is classified by searching classification models; Experiments show that the overall accuracy of our method achieves more than 93% , and the accuracy signal class is more than 90% on open dataset. So the method is effective for classifying various kinds of traffic.
{"title":"The research of classified method of the network traffic in security access platform based on decision tree","authors":"Su Linping, Mu Hongtao, Min Yunlang, Cheng Rui","doi":"10.1109/ICSESS.2016.7883112","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883112","url":null,"abstract":"Information security access platform is a core security practices of foundation to construct security access platform system of smart grid, and undertake a various important function of real-time monitoring, security access, secure data transmission and exchange, active defense in all kinds of complex network environments. However, the monitoring of network traffic classification is directly related to the electric power information network in smart grid environment has a far-reaching significance; this page is showing aiming at the problem of instability in traditional traffic classification methods, a traffic classification method based on C4.5 decision tree is proposed, which establishes models on the information gain ratio from the training set. Classifier is tested by attributes on test dataset, as well as network traffic is classified by searching classification models; Experiments show that the overall accuracy of our method achieves more than 93% , and the accuracy signal class is more than 90% on open dataset. So the method is effective for classifying various kinds of traffic.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115105352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-01DOI: 10.1109/ICSESS.2016.7883136
Zhang Xin, Chen Yan, Li Taoying
In the face of the situation that the network information is constantly increasing and updating, RSS provides a way to realize information sharing in the Internet age. For the technology of pushing information in RSS, which can dynamically aggregate multi-source information, provide personal service and efficient information, this paper puts forward the application of pushing technology to the field of online news reading. This paper introduces the basic concepts and characteristics of RSS, and then designs and develops the news reader in detail based on the RSS technology, making obtain large amount of information on the Internet in a rapid and efficient way.
{"title":"The design and implementation of news reader based on RSS technology","authors":"Zhang Xin, Chen Yan, Li Taoying","doi":"10.1109/ICSESS.2016.7883136","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883136","url":null,"abstract":"In the face of the situation that the network information is constantly increasing and updating, RSS provides a way to realize information sharing in the Internet age. For the technology of pushing information in RSS, which can dynamically aggregate multi-source information, provide personal service and efficient information, this paper puts forward the application of pushing technology to the field of online news reading. This paper introduces the basic concepts and characteristics of RSS, and then designs and develops the news reader in detail based on the RSS technology, making obtain large amount of information on the Internet in a rapid and efficient way.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"117 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123294148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}