Pub Date : 2016-08-01DOI: 10.1109/ICSESS.2016.7883125
Yingjie Lv, Wei Cen, Yi-Lun Fu, Chao Lu, Bin Li
In this paper, we have studied the application of P-cycle in OpenADR communication network. The notions of OpenADR and P-cycle are presented in section I . Then section II put forward a set of algorithms to create P-cycles to protect specific tree network, and simulation results of the algorithm is illustrated in section III. Results show that the algorithm is efficient to calculate P-cycle of high quality for OpenADR communication network.
{"title":"Application of P-cycle in OpenADR communication network protection","authors":"Yingjie Lv, Wei Cen, Yi-Lun Fu, Chao Lu, Bin Li","doi":"10.1109/ICSESS.2016.7883125","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883125","url":null,"abstract":"In this paper, we have studied the application of P-cycle in OpenADR communication network. The notions of OpenADR and P-cycle are presented in section I . Then section II put forward a set of algorithms to create P-cycles to protect specific tree network, and simulation results of the algorithm is illustrated in section III. Results show that the algorithm is efficient to calculate P-cycle of high quality for OpenADR communication network.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132615630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-01DOI: 10.1109/ICSESS.2016.7883166
X. Zu, Yan Bai, Xu Yao
Smart grid is an important application of Internet Of Things (IOT). Monitoring data in large-scale smart grid are massive, real-time and dynamic that collected by a lot of sensors, services components etc. There are many challenges in deploying and managing distributed real time monitoring systems. This paper adopted data-centric approach in deploying Distributed Complex Event Processing (DCEP) monitoring system based on OMG Data Distribution Service (DDS) middleware, to bring about a more robust and scalable distributed monitoring system, and that easier to maintain and enhance over time. The DDS data-centric publish-subscribe programming model with support for a number of QoS properties gives many advantages for supporting DCEP components communications, that reliably transports events from data producers to Event Processing Agents (EPAs), between internal DCEP Processing Node (PN), and from the EPAs to the event consumers. This paper analyzed DCEP requirements in IoT, and its PN configuration and deployment flow, designed a DDS/DCEP integration architecture for smart grid IoT monitoring system, and gave a detail design about DCEP development and configuration method based on DDS data-centric programming model, that can simplify the DCEP complex deployment work. This work has beneficial for DECP large scale development & deployment research.
{"title":"Data-centric publish-subscribe approach for Distributed Complex Event Processing deployment in smart grid Internet of Things","authors":"X. Zu, Yan Bai, Xu Yao","doi":"10.1109/ICSESS.2016.7883166","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883166","url":null,"abstract":"Smart grid is an important application of Internet Of Things (IOT). Monitoring data in large-scale smart grid are massive, real-time and dynamic that collected by a lot of sensors, services components etc. There are many challenges in deploying and managing distributed real time monitoring systems. This paper adopted data-centric approach in deploying Distributed Complex Event Processing (DCEP) monitoring system based on OMG Data Distribution Service (DDS) middleware, to bring about a more robust and scalable distributed monitoring system, and that easier to maintain and enhance over time. The DDS data-centric publish-subscribe programming model with support for a number of QoS properties gives many advantages for supporting DCEP components communications, that reliably transports events from data producers to Event Processing Agents (EPAs), between internal DCEP Processing Node (PN), and from the EPAs to the event consumers. This paper analyzed DCEP requirements in IoT, and its PN configuration and deployment flow, designed a DDS/DCEP integration architecture for smart grid IoT monitoring system, and gave a detail design about DCEP development and configuration method based on DDS data-centric programming model, that can simplify the DCEP complex deployment work. This work has beneficial for DECP large scale development & deployment research.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131864329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-01DOI: 10.1109/ICSESS.2016.7883025
Jing Li, Jun Liu, Wenli Zhou
The Paper presents an improved algorithm for finding frequent elements over a sliding window. It makes no assumption on the distribution of the input items' frequency. Its main structure composes of only a few maps and short queues. By using hash table and other data structure to manage counters, the running time is dramatically decreased. After thorough experiment and logical analysis, the running time has reduced to constant.
{"title":"A real-time algorithm for finding frequent items over sliding window","authors":"Jing Li, Jun Liu, Wenli Zhou","doi":"10.1109/ICSESS.2016.7883025","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883025","url":null,"abstract":"The Paper presents an improved algorithm for finding frequent elements over a sliding window. It makes no assumption on the distribution of the input items' frequency. Its main structure composes of only a few maps and short queues. By using hash table and other data structure to manage counters, the running time is dramatically decreased. After thorough experiment and logical analysis, the running time has reduced to constant.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134347289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-01DOI: 10.1109/ICSESS.2016.7883083
Sun Weixuan, Zhang Hong, Fu Yangzhen, Feng Chao
The semi-formal language UML has become a standard notation for describing analysis and design models of complex software systems. But it's difficult to be verified formally. In order to solve this problem, a method to translate the UML models to the Event-B models has been proposed. The specific research is on the translation of the use case diagram and sequence diagram in UML. In the use case diagram, the users, the use cases and the relationship between them are taken into main consideration; In the sequence diagram, the objects of communication, the messages and the sending sequence of the messages are taken into main consideration. The translated models could be verificatied formally by the proof obligations in the platform of Rodin. Thus the purpose of formal verification for the semi-formal UML models has been achieved. Then the problem existing in the models could be found and the accuracy of the models could be guaranteed.
{"title":"A method for the translation from UML into Event-B","authors":"Sun Weixuan, Zhang Hong, Fu Yangzhen, Feng Chao","doi":"10.1109/ICSESS.2016.7883083","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883083","url":null,"abstract":"The semi-formal language UML has become a standard notation for describing analysis and design models of complex software systems. But it's difficult to be verified formally. In order to solve this problem, a method to translate the UML models to the Event-B models has been proposed. The specific research is on the translation of the use case diagram and sequence diagram in UML. In the use case diagram, the users, the use cases and the relationship between them are taken into main consideration; In the sequence diagram, the objects of communication, the messages and the sending sequence of the messages are taken into main consideration. The translated models could be verificatied formally by the proof obligations in the platform of Rodin. Thus the purpose of formal verification for the semi-formal UML models has been achieved. Then the problem existing in the models could be found and the accuracy of the models could be guaranteed.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134466729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-01DOI: 10.1109/ICSESS.2016.7883050
Chao Chen, Kejing He, Dongyan Deng
With the increasing demand of computing resources, a lot of large-scale data centers have been established around the world. Data centers provide efficient and convenient computing services while consume enormous energy at the same time. Therefore, reducing the energy consumption in data center is important and meaningful. Virtual machine consolidation (VMC) is an effective strategy that can improve the energy efficiency of data centers. In this research, we have put forward a new overload detection algorithm on the basis of existing algorithms to achieve better tradeoff between energy and service level agreement (SLA) violation. The prediction process of the proposed algorithm is mainly based on the utilization history of VMs. The experimental results demonstrate that compared with the original host-based framework, the proposed VM-based framework reduces the average ESV by 23.4%.
{"title":"Optimization of the overload detection algorithm for virtual machine consolidation","authors":"Chao Chen, Kejing He, Dongyan Deng","doi":"10.1109/ICSESS.2016.7883050","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883050","url":null,"abstract":"With the increasing demand of computing resources, a lot of large-scale data centers have been established around the world. Data centers provide efficient and convenient computing services while consume enormous energy at the same time. Therefore, reducing the energy consumption in data center is important and meaningful. Virtual machine consolidation (VMC) is an effective strategy that can improve the energy efficiency of data centers. In this research, we have put forward a new overload detection algorithm on the basis of existing algorithms to achieve better tradeoff between energy and service level agreement (SLA) violation. The prediction process of the proposed algorithm is mainly based on the utilization history of VMs. The experimental results demonstrate that compared with the original host-based framework, the proposed VM-based framework reduces the average ESV by 23.4%.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133374875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-01DOI: 10.1109/ICSESS.2016.7883155
Feifei Guo, Yu Liang
The emergence of TV two-dimensional code not only makes the traditional TV media and new media to connect more closely, but also achieves the “mobile - television - network” direct interaction, greatly promoting the trend of media convergence. This paper, basing on the two-dimensional code generation techniques - PHP QR code, uses the MVC framework and Open API technology to design and complete the TV two-dimensional code publishing system, and finally realizes dual screen interaction between mobile phone and TV.
{"title":"Design and implementation of TV two-dimensional code publishing system","authors":"Feifei Guo, Yu Liang","doi":"10.1109/ICSESS.2016.7883155","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883155","url":null,"abstract":"The emergence of TV two-dimensional code not only makes the traditional TV media and new media to connect more closely, but also achieves the “mobile - television - network” direct interaction, greatly promoting the trend of media convergence. This paper, basing on the two-dimensional code generation techniques - PHP QR code, uses the MVC framework and Open API technology to design and complete the TV two-dimensional code publishing system, and finally realizes dual screen interaction between mobile phone and TV.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130294688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-01DOI: 10.1109/ICSESS.2016.7883175
Wenjun Zhang, Jincai Lin, Ning Jia
A dual-wavelength erbium-doped fiber laser (DW-EDFL) which can output double wavelengths of 1530nm, and 1550nm is proposed in this paper. The optimal condition for optimum output power of two wavelengths is extracted and demonstrated. When the length of EDFL is 4.13m the output power of the two wavelengths can reach 2mW. Additionally, two variable optical attenuators (VOA) are used to balance gain and loss of two signal lights in the ring resonator.
{"title":"A dual-wavelength erbium-doped fiber laser based on annular cavity","authors":"Wenjun Zhang, Jincai Lin, Ning Jia","doi":"10.1109/ICSESS.2016.7883175","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883175","url":null,"abstract":"A dual-wavelength erbium-doped fiber laser (DW-EDFL) which can output double wavelengths of 1530nm, and 1550nm is proposed in this paper. The optimal condition for optimum output power of two wavelengths is extracted and demonstrated. When the length of EDFL is 4.13m the output power of the two wavelengths can reach 2mW. Additionally, two variable optical attenuators (VOA) are used to balance gain and loss of two signal lights in the ring resonator.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124404493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-01DOI: 10.1109/ICSESS.2016.7883202
Dong Huo, Hui Liu, Zhenhong Shang, Runxin Li
The image features play an important role in object detection and recognition, the method of object detection based on Histogram of Oriented Gradient(HOG) for its good detection result receives extensive attention to many researchers. This article describes the approaches to Histogram of Oriented Gradient and support vector machine, focusing on studying the HOG feature and application, detailing the process of HOG feature extracted and the design of classifiers in pedestrian detection. In this paper, pedestrian sample library was built and the Histogram of Oriented Gradient feature of the samples was extracted. The pedestrian classifier was obtained by using support vector machine and the performance of the classifier was tested.
图像特征在目标检测和识别中起着重要的作用,基于梯度直方图(Histogram of Oriented Gradient, HOG)的目标检测方法以其良好的检测效果受到众多研究者的广泛关注。本文介绍了面向梯度直方图和支持向量机的方法,重点研究了HOG特征及其应用,详细介绍了HOG特征提取过程和分类器在行人检测中的设计。本文建立了行人样本库,提取了样本的梯度特征直方图。利用支持向量机得到行人分类器,并对分类器的性能进行了测试。
{"title":"Research for pedestrian detection classifier","authors":"Dong Huo, Hui Liu, Zhenhong Shang, Runxin Li","doi":"10.1109/ICSESS.2016.7883202","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883202","url":null,"abstract":"The image features play an important role in object detection and recognition, the method of object detection based on Histogram of Oriented Gradient(HOG) for its good detection result receives extensive attention to many researchers. This article describes the approaches to Histogram of Oriented Gradient and support vector machine, focusing on studying the HOG feature and application, detailing the process of HOG feature extracted and the design of classifiers in pedestrian detection. In this paper, pedestrian sample library was built and the Histogram of Oriented Gradient feature of the samples was extracted. The pedestrian classifier was obtained by using support vector machine and the performance of the classifier was tested.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124830393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-01DOI: 10.1109/ICSESS.2016.7883256
M. Babu, M. Ramjee, Somesh Katta, S. K.
Cluster Analysis methods are very important, popular data summarization techniques applied in diverse environments. These techniques retrieve the hidden patterns in large datasets in the form of characterized patterns which can be interpreted further in different contexts. Widespread use of medical information systems and explosive growth of medical databases require traditional manual data analysis coupled with efficient computer assisted analysis. Medical Diagnosis is a difficult process which needs proficiency as well as experience to cope with a disease. Data segmentation is an application in medical domain used to analyze patient records, disease trends and health care resource utilization, which in turn assist a physician in Medical Diagnosis. In the present paper a technique based on classification techniques is proposed to predict liver disorders accurately. The main objective is to examine whether the proposed method can obtain better prediction accuracy to traditional classification algorithms. The classification results using the proposed method are found to be very promising and accurate.
{"title":"Implementation of partitional clustering on ILPD dataset to predict liver disorders","authors":"M. Babu, M. Ramjee, Somesh Katta, S. K.","doi":"10.1109/ICSESS.2016.7883256","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883256","url":null,"abstract":"Cluster Analysis methods are very important, popular data summarization techniques applied in diverse environments. These techniques retrieve the hidden patterns in large datasets in the form of characterized patterns which can be interpreted further in different contexts. Widespread use of medical information systems and explosive growth of medical databases require traditional manual data analysis coupled with efficient computer assisted analysis. Medical Diagnosis is a difficult process which needs proficiency as well as experience to cope with a disease. Data segmentation is an application in medical domain used to analyze patient records, disease trends and health care resource utilization, which in turn assist a physician in Medical Diagnosis. In the present paper a technique based on classification techniques is proposed to predict liver disorders accurately. The main objective is to examine whether the proposed method can obtain better prediction accuracy to traditional classification algorithms. The classification results using the proposed method are found to be very promising and accurate.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134410553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-01DOI: 10.1109/ICSESS.2016.7883199
Zhibo Liu, Qiang Li
Kad is the most popular P2P file sharing system. It is very difficult to capture all the users' lookup traffic because of its full distributed feature. Previous work could only monitors a subset of the lookup traffic. In this paper, we propose a lightweight method to monitor the global lookup traffic by inserting two ‘nearest neighbor’ peers into the peer at the last iteration of Kad lookup path. Since one of the inserted peer is closer than the last peer definitely, the user's search request would be redirected to the trap node. The experiment performed on eMule0.50a shows that this approach could capture most lookup traffic.
{"title":"Capture global Kad lookup traffic","authors":"Zhibo Liu, Qiang Li","doi":"10.1109/ICSESS.2016.7883199","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883199","url":null,"abstract":"Kad is the most popular P2P file sharing system. It is very difficult to capture all the users' lookup traffic because of its full distributed feature. Previous work could only monitors a subset of the lookup traffic. In this paper, we propose a lightweight method to monitor the global lookup traffic by inserting two ‘nearest neighbor’ peers into the peer at the last iteration of Kad lookup path. Since one of the inserted peer is closer than the last peer definitely, the user's search request would be redirected to the trap node. The experiment performed on eMule0.50a shows that this approach could capture most lookup traffic.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133229705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}