Pub Date : 2016-08-01DOI: 10.1109/ICSESS.2016.7883142
Shufan Zhang, Sanxing Cao
With the rapid development of mobile smart phone and 4G network, online micro-video has come into the view of more and more people. The providers for the micro-videos hope that if they put their micro-video on a video website, they can get as much attention as possible. So it is becoming more and more meaningful to research the users' interest in different video websites. First of all, this system captures the static data, dynamic data and comments data. Then it applies the algorithm of data mining to find which kind of micro-video is more preferred in one video website. Finally the results are submitted to the providers for the micro-videos and they can decide which website is more suitable to put their micro-video on.
{"title":"Data analysis system for users' interest on micro-video in different websites","authors":"Shufan Zhang, Sanxing Cao","doi":"10.1109/ICSESS.2016.7883142","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883142","url":null,"abstract":"With the rapid development of mobile smart phone and 4G network, online micro-video has come into the view of more and more people. The providers for the micro-videos hope that if they put their micro-video on a video website, they can get as much attention as possible. So it is becoming more and more meaningful to research the users' interest in different video websites. First of all, this system captures the static data, dynamic data and comments data. Then it applies the algorithm of data mining to find which kind of micro-video is more preferred in one video website. Finally the results are submitted to the providers for the micro-videos and they can decide which website is more suitable to put their micro-video on.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122330678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the rapid development of regional economy in Shandong Province, the demand of electric power increases rapidly. So, the development of the substation construction and its status information detection system has led to the massive power equipment status information data, which needs to be sorted out and standardized work. In this paper, the MapReduce technology is used for the degradation processing of monitor information according to the station control layer, bay layer and process layer; meanwhile, the voltage level of substation is used as the breakthrough point, and the similar or same monitoring information is combined and processed. Compared with the traditional method of processing power equipment monitoring information on cluster computer platform, the MapReduce technique can be verified to achieve monitoring data simplification, recursive and transplantation in substation monitoring and control information cloud platform. It could improve work efficiency in the three aspects of utility value, completion time and load balance.
{"title":"Optimized design of hierarchical substation monitoring information based on MapReduce technology","authors":"Shaoxiao Han, Xianghua Pan, Chen Li, Shengyuan Gao","doi":"10.1109/ICSESS.2016.7883204","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883204","url":null,"abstract":"With the rapid development of regional economy in Shandong Province, the demand of electric power increases rapidly. So, the development of the substation construction and its status information detection system has led to the massive power equipment status information data, which needs to be sorted out and standardized work. In this paper, the MapReduce technology is used for the degradation processing of monitor information according to the station control layer, bay layer and process layer; meanwhile, the voltage level of substation is used as the breakthrough point, and the similar or same monitoring information is combined and processed. Compared with the traditional method of processing power equipment monitoring information on cluster computer platform, the MapReduce technique can be verified to achieve monitoring data simplification, recursive and transplantation in substation monitoring and control information cloud platform. It could improve work efficiency in the three aspects of utility value, completion time and load balance.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114893905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-01DOI: 10.1109/ICSESS.2016.7883112
Su Linping, Mu Hongtao, Min Yunlang, Cheng Rui
Information security access platform is a core security practices of foundation to construct security access platform system of smart grid, and undertake a various important function of real-time monitoring, security access, secure data transmission and exchange, active defense in all kinds of complex network environments. However, the monitoring of network traffic classification is directly related to the electric power information network in smart grid environment has a far-reaching significance; this page is showing aiming at the problem of instability in traditional traffic classification methods, a traffic classification method based on C4.5 decision tree is proposed, which establishes models on the information gain ratio from the training set. Classifier is tested by attributes on test dataset, as well as network traffic is classified by searching classification models; Experiments show that the overall accuracy of our method achieves more than 93% , and the accuracy signal class is more than 90% on open dataset. So the method is effective for classifying various kinds of traffic.
{"title":"The research of classified method of the network traffic in security access platform based on decision tree","authors":"Su Linping, Mu Hongtao, Min Yunlang, Cheng Rui","doi":"10.1109/ICSESS.2016.7883112","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883112","url":null,"abstract":"Information security access platform is a core security practices of foundation to construct security access platform system of smart grid, and undertake a various important function of real-time monitoring, security access, secure data transmission and exchange, active defense in all kinds of complex network environments. However, the monitoring of network traffic classification is directly related to the electric power information network in smart grid environment has a far-reaching significance; this page is showing aiming at the problem of instability in traditional traffic classification methods, a traffic classification method based on C4.5 decision tree is proposed, which establishes models on the information gain ratio from the training set. Classifier is tested by attributes on test dataset, as well as network traffic is classified by searching classification models; Experiments show that the overall accuracy of our method achieves more than 93% , and the accuracy signal class is more than 90% on open dataset. So the method is effective for classifying various kinds of traffic.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115105352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-01DOI: 10.1109/ICSESS.2016.7883097
Nan Jiang, Guoqi Li, B. Liu
As the complexity of the safety-critical system grows, the difficulty for safety engineers to validate and ensure system safety increases too. Formal languages have been introduced as an alternative to natural language (NL) requirement descriptions. Sometimes, the safety requirements are put forward in natural language such as requirements from stakeholders and nonexperts. The transformation and verification work of the requirements are completed manually. A tool called DODT can semi-automatically transforms NL requirements into semi-formal boilerplate requirements which reduce the manual work of transformation largely. Alloy is a formal modeling language which is amenable to automatic analyses. We use it as a tool to make safety analysis taking benefit from the model-based aspect of Alloy and its expressiveness for the specification of the properties to check. In this paper, we combine DDOT with Alloy. The attributes we use in boilerplates can be transformed into Alloy sentences easily. Hence, the formal requirements can be expressed in Alloy easily and checked by Alloy Analyzer, reducing manual work largely. Last, we illustrate our method with a fire detection system.
{"title":"Safety analysis for safety-critical system based on boilerplate and Alloy","authors":"Nan Jiang, Guoqi Li, B. Liu","doi":"10.1109/ICSESS.2016.7883097","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883097","url":null,"abstract":"As the complexity of the safety-critical system grows, the difficulty for safety engineers to validate and ensure system safety increases too. Formal languages have been introduced as an alternative to natural language (NL) requirement descriptions. Sometimes, the safety requirements are put forward in natural language such as requirements from stakeholders and nonexperts. The transformation and verification work of the requirements are completed manually. A tool called DODT can semi-automatically transforms NL requirements into semi-formal boilerplate requirements which reduce the manual work of transformation largely. Alloy is a formal modeling language which is amenable to automatic analyses. We use it as a tool to make safety analysis taking benefit from the model-based aspect of Alloy and its expressiveness for the specification of the properties to check. In this paper, we combine DDOT with Alloy. The attributes we use in boilerplates can be transformed into Alloy sentences easily. Hence, the formal requirements can be expressed in Alloy easily and checked by Alloy Analyzer, reducing manual work largely. Last, we illustrate our method with a fire detection system.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121564728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-01DOI: 10.1109/ICSESS.2016.7883136
Zhang Xin, Chen Yan, Li Taoying
In the face of the situation that the network information is constantly increasing and updating, RSS provides a way to realize information sharing in the Internet age. For the technology of pushing information in RSS, which can dynamically aggregate multi-source information, provide personal service and efficient information, this paper puts forward the application of pushing technology to the field of online news reading. This paper introduces the basic concepts and characteristics of RSS, and then designs and develops the news reader in detail based on the RSS technology, making obtain large amount of information on the Internet in a rapid and efficient way.
{"title":"The design and implementation of news reader based on RSS technology","authors":"Zhang Xin, Chen Yan, Li Taoying","doi":"10.1109/ICSESS.2016.7883136","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883136","url":null,"abstract":"In the face of the situation that the network information is constantly increasing and updating, RSS provides a way to realize information sharing in the Internet age. For the technology of pushing information in RSS, which can dynamically aggregate multi-source information, provide personal service and efficient information, this paper puts forward the application of pushing technology to the field of online news reading. This paper introduces the basic concepts and characteristics of RSS, and then designs and develops the news reader in detail based on the RSS technology, making obtain large amount of information on the Internet in a rapid and efficient way.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"117 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123294148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-01DOI: 10.1109/ICSESS.2016.7883078
Qiang Liu, Xiaoshe Dong, Heng Chen, Zhengdong Zhu, Yinfeng Wang
Traditional delay scheduling algorithm processes the task scheduling through a fixed time waiting threshold to achieve better data locality. However, this fixed manner often leads to low resource utilization and job performance degradation, especially for short jobs. This paper proposes a predicting delay scheduling algorithm, called P-Delay. P-Delay leverages both the job characteristic and dynamic resource availability to accelerate the short job execution. It provides a dynamic delay scheduling by comparing the transferring cost with the predicted waiting cost to make reasonable wait. Experimental results show that P-Delay can achieve a speedup of 1.45× for short jobs than traditional Delay Scheduling algorithm.
{"title":"An efficient predicting delay algorithm for short jobs","authors":"Qiang Liu, Xiaoshe Dong, Heng Chen, Zhengdong Zhu, Yinfeng Wang","doi":"10.1109/ICSESS.2016.7883078","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883078","url":null,"abstract":"Traditional delay scheduling algorithm processes the task scheduling through a fixed time waiting threshold to achieve better data locality. However, this fixed manner often leads to low resource utilization and job performance degradation, especially for short jobs. This paper proposes a predicting delay scheduling algorithm, called P-Delay. P-Delay leverages both the job characteristic and dynamic resource availability to accelerate the short job execution. It provides a dynamic delay scheduling by comparing the transferring cost with the predicted waiting cost to make reasonable wait. Experimental results show that P-Delay can achieve a speedup of 1.45× for short jobs than traditional Delay Scheduling algorithm.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128829131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-01DOI: 10.1109/ICSESS.2016.7883193
Xue Li, Jiagang Zhu
The existing consistency checking methods for component-based software designs are unable to check the semantics consistency and the interface consistency because the protocols themselves do not contain these information. Li order to enable the consistency checking method to check semantics consistency and interface consistency besides protocol consistency, we propose a consistency checking method by introducing the idea of method semantics into scenario-based specifications. The semantic extended interface automata (SIA) model is utilized to describe the semantics, interface and protocol information of components. The scenario-based specifications are specified by interaction overview diagrams with semantic constrains. Then according to the analysis of the behaviors of SIA model and interaction overview diagrams with semantic constrains, we developed an algorithm to check the consistency between component-based designs and the scenario-based semantic specifications. Our algorithm not only can check the protocol consistency but also the method semantic consistency which includes the type and semantics of methods.
{"title":"A consistency verification method with semantics for component-based software designs","authors":"Xue Li, Jiagang Zhu","doi":"10.1109/ICSESS.2016.7883193","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883193","url":null,"abstract":"The existing consistency checking methods for component-based software designs are unable to check the semantics consistency and the interface consistency because the protocols themselves do not contain these information. Li order to enable the consistency checking method to check semantics consistency and interface consistency besides protocol consistency, we propose a consistency checking method by introducing the idea of method semantics into scenario-based specifications. The semantic extended interface automata (SIA) model is utilized to describe the semantics, interface and protocol information of components. The scenario-based specifications are specified by interaction overview diagrams with semantic constrains. Then according to the analysis of the behaviors of SIA model and interaction overview diagrams with semantic constrains, we developed an algorithm to check the consistency between component-based designs and the scenario-based semantic specifications. Our algorithm not only can check the protocol consistency but also the method semantic consistency which includes the type and semantics of methods.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128359769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-01DOI: 10.1109/ICSESS.2016.7883135
Z. Chunsheng, Li Yan
Visual data mining techniques can display the process of data mining and results to the user graphically, which makes the user more perceptual and easy to understand the meaning of the mining process and its results and moreover it is very important in data mining. However, most of the visual data mining now is progressed with the result of visualization. At the same time, it is not suitable for the graphical display to the visualization processing of the association rule. In view of the above shortcomings, in this paper, the whole mining process of Apriori association rule is visually conducted under the natural language by the way of the natural language processing method, including data preprocessing, mining process and the visualization display of mining results which provides an integrate set of schemes for the user with characteristics of being more perceptual and more easy to understand.
{"title":"The visual mining method of Apriori association rule based on natural language","authors":"Z. Chunsheng, Li Yan","doi":"10.1109/ICSESS.2016.7883135","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883135","url":null,"abstract":"Visual data mining techniques can display the process of data mining and results to the user graphically, which makes the user more perceptual and easy to understand the meaning of the mining process and its results and moreover it is very important in data mining. However, most of the visual data mining now is progressed with the result of visualization. At the same time, it is not suitable for the graphical display to the visualization processing of the association rule. In view of the above shortcomings, in this paper, the whole mining process of Apriori association rule is visually conducted under the natural language by the way of the natural language processing method, including data preprocessing, mining process and the visualization display of mining results which provides an integrate set of schemes for the user with characteristics of being more perceptual and more easy to understand.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130814020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-01DOI: 10.1109/ICSESS.2016.7883171
Zhonghong Xu, Lingjun Yang, Sanxing Cao
People getting video information from the mobile lightweight TV media has become one of mainstream demands. Accordingly, this paper is based on an Android mobile App, which belongs to the Center of Radio and Television in Fengtai Beijing. To design and implementation of this mobile lightweight TV media system based on android, I take use of Java, PHP, HTML5, CSS3, JavaScript technology and the combination of MySQL, Transfer JSON data through the Ajax technology to make the interaction asynchronously come true between the client side and server side. In short, the research of mobile lightweight TV media system is of great significance to the integration of new media and traditional media in our country.
{"title":"Design and implementation of mobile lightweight TV media system based on Android","authors":"Zhonghong Xu, Lingjun Yang, Sanxing Cao","doi":"10.1109/ICSESS.2016.7883171","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883171","url":null,"abstract":"People getting video information from the mobile lightweight TV media has become one of mainstream demands. Accordingly, this paper is based on an Android mobile App, which belongs to the Center of Radio and Television in Fengtai Beijing. To design and implementation of this mobile lightweight TV media system based on android, I take use of Java, PHP, HTML5, CSS3, JavaScript technology and the combination of MySQL, Transfer JSON data through the Ajax technology to make the interaction asynchronously come true between the client side and server side. In short, the research of mobile lightweight TV media system is of great significance to the integration of new media and traditional media in our country.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129605527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-01DOI: 10.1109/ICSESS.2016.7883232
Yao Zhong-hua, Wu Lingda
Visual analysis on network security is a new area, it consists methods and technology of visualization and network security analysis, which has new challenges. Researchers on network security visualization have done certain extent research and accumulated much. Especially with the rapid development of visual analysis, visual network security analysis achieved rich results in recent years. However, there is less study on basic research framework and principle of security visualization analysis, this dissertation summarizes concerned problems in the field of security analysis, data sources, visual analysis techniques and related overview of visual analysis system. Through analysis of these systems, network security visualization on the research questions can be tested and directions for future research can be provided.
{"title":"Summary on network security visual analysis","authors":"Yao Zhong-hua, Wu Lingda","doi":"10.1109/ICSESS.2016.7883232","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883232","url":null,"abstract":"Visual analysis on network security is a new area, it consists methods and technology of visualization and network security analysis, which has new challenges. Researchers on network security visualization have done certain extent research and accumulated much. Especially with the rapid development of visual analysis, visual network security analysis achieved rich results in recent years. However, there is less study on basic research framework and principle of security visualization analysis, this dissertation summarizes concerned problems in the field of security analysis, data sources, visual analysis techniques and related overview of visual analysis system. Through analysis of these systems, network security visualization on the research questions can be tested and directions for future research can be provided.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130827089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}