Pub Date : 2016-08-01DOI: 10.1109/ICSESS.2016.7883022
Zhao Yang, Rongjing Hu, Ruisheng Zhang
human life is more and more dependent on the safety, reliability and effective operation of a variety of complex networks; however, most of networks are sparse, which means the network data is incomplete. To solve the problem, various link prediction methods have been proposed to find missing links in given networks. Among these methods, similarity-based methods are effective, however, still imperfect. In order to improve the predicting results, we combined local and global information of the network and then proposed a method based on one of similarity-based methods with community information. Experiments results show that the inclusion of community information improves the accuracy of results of predicting missing links.
{"title":"An improved link prediction algorithm based on common neighbors index with community membership information","authors":"Zhao Yang, Rongjing Hu, Ruisheng Zhang","doi":"10.1109/ICSESS.2016.7883022","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883022","url":null,"abstract":"human life is more and more dependent on the safety, reliability and effective operation of a variety of complex networks; however, most of networks are sparse, which means the network data is incomplete. To solve the problem, various link prediction methods have been proposed to find missing links in given networks. Among these methods, similarity-based methods are effective, however, still imperfect. In order to improve the predicting results, we combined local and global information of the network and then proposed a method based on one of similarity-based methods with community information. Experiments results show that the inclusion of community information improves the accuracy of results of predicting missing links.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127925628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-01DOI: 10.1109/ICSESS.2016.7883161
Yongqiang Cheng, Yan Zhou
Most power information platforms are using IEC 61970 common information model (CIM) which has not focused on the on-line monitoring system at all. This is also the reason why each manufacturer produced its own productions and they usually have their own designing system. This situation has already become an obstacle for designing and implement the visual management system for power transmission and transformation equipment. This paper analyzed the method to extend CIM and proposed a CIM extended power transmission and transformation on-line monitoring system model which is able to comprehensively describe the monitoring equipment. This model shows a strong versatility and scalability while it's used in power transmission and transformation equipment status visual management system. The system shows the main connection drawing through combining this model with SVG.
{"title":"A CIM extended power transmission and transformation on-line monitoring system model","authors":"Yongqiang Cheng, Yan Zhou","doi":"10.1109/ICSESS.2016.7883161","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883161","url":null,"abstract":"Most power information platforms are using IEC 61970 common information model (CIM) which has not focused on the on-line monitoring system at all. This is also the reason why each manufacturer produced its own productions and they usually have their own designing system. This situation has already become an obstacle for designing and implement the visual management system for power transmission and transformation equipment. This paper analyzed the method to extend CIM and proposed a CIM extended power transmission and transformation on-line monitoring system model which is able to comprehensively describe the monitoring equipment. This model shows a strong versatility and scalability while it's used in power transmission and transformation equipment status visual management system. The system shows the main connection drawing through combining this model with SVG.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122796954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-01DOI: 10.1109/ICSESS.2016.7883133
Xu Guo, Zongyuang Yang
This paper presents a quantitative analysis of Itai's leader election algorithm using probabilistic model checking. In particular, a leading probabilistic model checker PRISM is utilized to simulate the algorithm executions. From performance analysis perspective, this paper investigates execution efficiency of this algorithm. Properties to be considered is the expected round of leader election under certain situations. Moreover, as an important performance concern, energy consumption is also simulated in the experiment. This paper also extends the assumptions of the original algorithm to study the performance over unreliable channels. Experimental results show that for certain number of processes, the algorithm will terminate with probability 1. Conclusion can also be drawn that the reliability of channels does have great effect on the performance of this algorithm. In order to achieve better performance, it is a better choice to decrease the number of process in the election and extend the choice scope for each process.
{"title":"Analyzing leader election protocol by probabilistic model checking","authors":"Xu Guo, Zongyuang Yang","doi":"10.1109/ICSESS.2016.7883133","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883133","url":null,"abstract":"This paper presents a quantitative analysis of Itai's leader election algorithm using probabilistic model checking. In particular, a leading probabilistic model checker PRISM is utilized to simulate the algorithm executions. From performance analysis perspective, this paper investigates execution efficiency of this algorithm. Properties to be considered is the expected round of leader election under certain situations. Moreover, as an important performance concern, energy consumption is also simulated in the experiment. This paper also extends the assumptions of the original algorithm to study the performance over unreliable channels. Experimental results show that for certain number of processes, the algorithm will terminate with probability 1. Conclusion can also be drawn that the reliability of channels does have great effect on the performance of this algorithm. In order to achieve better performance, it is a better choice to decrease the number of process in the election and extend the choice scope for each process.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"598 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126905532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-01DOI: 10.1109/ICSESS.2016.7883108
Lan Zhang, Hong-yun Ning, Yun-yun Du, Yan-xia Cui, Yang Yang
At present, multi-database identity authentication is mostly based on centralized global user management mechanism. In this paper, we analyze the defects of the current identity authentication in multi-database and propose a new single sign on for multi-database identity authentication based on the idea of database union domain. Compared with the traditional methods of authentication, the scheme adopts decentralized authentication mode which without centralized management, so it can avoid single point failure and single point overload, and it can also prevent password theft attack, replay attack and other various attacks. Through the case analysis, we know that the new scheme can improve the safety of the multi-database system.
{"title":"A new identity authentication scheme of single sign on for multi-database","authors":"Lan Zhang, Hong-yun Ning, Yun-yun Du, Yan-xia Cui, Yang Yang","doi":"10.1109/ICSESS.2016.7883108","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883108","url":null,"abstract":"At present, multi-database identity authentication is mostly based on centralized global user management mechanism. In this paper, we analyze the defects of the current identity authentication in multi-database and propose a new single sign on for multi-database identity authentication based on the idea of database union domain. Compared with the traditional methods of authentication, the scheme adopts decentralized authentication mode which without centralized management, so it can avoid single point failure and single point overload, and it can also prevent password theft attack, replay attack and other various attacks. Through the case analysis, we know that the new scheme can improve the safety of the multi-database system.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114172712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-01DOI: 10.1109/ICSESS.2016.7883116
Na Dang, Xiangyu Bai
Recently, content delivery has become a hot research field. However, with the increase of network scale and the mobility of users, content delivery in traditional network needs to deploy a number of content servers to cache contents, so as to satisfy multilevel users. Deploying so many servers will lead to a lot of costs, and it will cause the delay of network increase at the same time. Therefore, in order to improve the efficiency of content delivery, scholars propose to distribute contents in Delay Tolerant Network (DTN), which utilizes the mobility of nodes to deliver contents and can bear delay. In this paper, we qualitatively analyze and compare content delivery schemes have been raised, which are based on the analysis of the basic characteristics of the delay tolerant network. Through analyzing the advantages and disadvantages of each scheme, we make a conclusion and point out the further research directions.
{"title":"Content delivery mechanism in Delay Tolerant Network","authors":"Na Dang, Xiangyu Bai","doi":"10.1109/ICSESS.2016.7883116","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883116","url":null,"abstract":"Recently, content delivery has become a hot research field. However, with the increase of network scale and the mobility of users, content delivery in traditional network needs to deploy a number of content servers to cache contents, so as to satisfy multilevel users. Deploying so many servers will lead to a lot of costs, and it will cause the delay of network increase at the same time. Therefore, in order to improve the efficiency of content delivery, scholars propose to distribute contents in Delay Tolerant Network (DTN), which utilizes the mobility of nodes to deliver contents and can bear delay. In this paper, we qualitatively analyze and compare content delivery schemes have been raised, which are based on the analysis of the basic characteristics of the delay tolerant network. Through analyzing the advantages and disadvantages of each scheme, we make a conclusion and point out the further research directions.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"187 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114480013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-01DOI: 10.1109/ICSESS.2016.7883156
J. Chen
Based on the digital bit synchronization technology, Compared the characteristic QPSK demodulation and QAM demodulation of signals, To improve Gardner algorithm and use the Matlab simulation. Designed based on the Gardner algorithm 16QAM baseband signal bit synchronization, and used Modelsim simulation analysis, Demodution the improved algorithm to achieve the desired results.
{"title":"Research and implementation of 16QAM based on FPGA","authors":"J. Chen","doi":"10.1109/ICSESS.2016.7883156","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883156","url":null,"abstract":"Based on the digital bit synchronization technology, Compared the characteristic QPSK demodulation and QAM demodulation of signals, To improve Gardner algorithm and use the Matlab simulation. Designed based on the Gardner algorithm 16QAM baseband signal bit synchronization, and used Modelsim simulation analysis, Demodution the improved algorithm to achieve the desired results.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121858688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-01DOI: 10.1109/ICSESS.2016.7883067
Jiong Fu, Ai-min Luo, Xueshan Luo, Junxian Liu
Service deployment is an important phase of aligning business to IT systems in the Service-oriented Architecture (SOA)-based C4ISR system integration. Current methodologies of service deployment mostly focus on system-level service deployment as well as service composition, while the deployment of enterprise-level services to align business processes to IT systems is ignored. This paper deals with the service deployment for business/IT alignments in the perspective of architecture designing. First, we redefine the service deployment problem in C4ISR system integration, and then propose the process of service deployment based on DoDAF 2.0 to meet the business requirements and goals. Finally, we present a service deployment model based on the Quality of Service (QoS) and use the Immune Genetic Algorithm (IGA) to solve an optimal problem. Through a comprehensive case study, we find that IT systems can align with business by applying our process and model in service deployment.
{"title":"Study on service deployment in C4ISR system integration","authors":"Jiong Fu, Ai-min Luo, Xueshan Luo, Junxian Liu","doi":"10.1109/ICSESS.2016.7883067","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883067","url":null,"abstract":"Service deployment is an important phase of aligning business to IT systems in the Service-oriented Architecture (SOA)-based C4ISR system integration. Current methodologies of service deployment mostly focus on system-level service deployment as well as service composition, while the deployment of enterprise-level services to align business processes to IT systems is ignored. This paper deals with the service deployment for business/IT alignments in the perspective of architecture designing. First, we redefine the service deployment problem in C4ISR system integration, and then propose the process of service deployment based on DoDAF 2.0 to meet the business requirements and goals. Finally, we present a service deployment model based on the Quality of Service (QoS) and use the Immune Genetic Algorithm (IGA) to solve an optimal problem. Through a comprehensive case study, we find that IT systems can align with business by applying our process and model in service deployment.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125719197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-01DOI: 10.1109/ICSESS.2016.7883150
Li Chao, Wu Lingda, Zhao Bin
Flow is one of the most fundamental physical process in natural world. Flow visualization can give an intuitive view of flow fields and contribute to the observation and analysis of flow. Really flow fields are all dynamic while traditional visualization approaches are not able to reflect the trends of flows or the diversity inside them. Based on the research of Lagrangian Coherent Structures in Computational Fluid Dynamics, the concept of flow field topology is redefined, two typical 2D dynamic vector fields are selected for topology analysis, and the results are used to optimize the visual effects of geometric visualization. Experiments show that visualization of 2D dynamic vector fields based on topology analysis can extract the coherent structures of flows which are helpful to the comprehension of flow for researchers and description of characteristic difference inside flows.
{"title":"Application of topology analysis in visualization of 2D dynamic vector fields","authors":"Li Chao, Wu Lingda, Zhao Bin","doi":"10.1109/ICSESS.2016.7883150","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883150","url":null,"abstract":"Flow is one of the most fundamental physical process in natural world. Flow visualization can give an intuitive view of flow fields and contribute to the observation and analysis of flow. Really flow fields are all dynamic while traditional visualization approaches are not able to reflect the trends of flows or the diversity inside them. Based on the research of Lagrangian Coherent Structures in Computational Fluid Dynamics, the concept of flow field topology is redefined, two typical 2D dynamic vector fields are selected for topology analysis, and the results are used to optimize the visual effects of geometric visualization. Experiments show that visualization of 2D dynamic vector fields based on topology analysis can extract the coherent structures of flows which are helpful to the comprehension of flow for researchers and description of characteristic difference inside flows.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125816261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-01DOI: 10.1109/ICSESS.2016.7883031
Hamdi A. Al-Jamimi
Software defect prediction is a discipline that predicts the defects proneness of future modules. Software metrics are used for this kind of predication. However, the predication metrics are associated with uncertainty, thus the metrics need to be expressed in linguistic terms to overcome ambiguity and uncertainty. Two types of knowledge are utilized as input to the prediction models: software metrics and expert's opinions. This paper proposes a framework for developing fuzzy logic-based software predication model using different set of software metrics. It aims to provide a generic set of metrics to be used for software defects prediction. The performance of the proposed Fuzzy-based models has been validated using real software projects data where Takagi-Sugeno fuzzy inference engine is used to predict software defects. Validation results are satisfactory.
{"title":"Toward comprehensible software defect prediction models using fuzzy logic","authors":"Hamdi A. Al-Jamimi","doi":"10.1109/ICSESS.2016.7883031","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883031","url":null,"abstract":"Software defect prediction is a discipline that predicts the defects proneness of future modules. Software metrics are used for this kind of predication. However, the predication metrics are associated with uncertainty, thus the metrics need to be expressed in linguistic terms to overcome ambiguity and uncertainty. Two types of knowledge are utilized as input to the prediction models: software metrics and expert's opinions. This paper proposes a framework for developing fuzzy logic-based software predication model using different set of software metrics. It aims to provide a generic set of metrics to be used for software defects prediction. The performance of the proposed Fuzzy-based models has been validated using real software projects data where Takagi-Sugeno fuzzy inference engine is used to predict software defects. Validation results are satisfactory.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131245862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-01DOI: 10.1109/ICSESS.2016.7883070
Qing Wang
Recommender system is to establish the relationship between the user and the information products, to use the existing selection habits and the similarity of each user's potential interest in the object, and then personalized recommendation. It is one of the effective ways to solve the information overload in the Internet age. But in practical application, because of the large number of products and the number of users, the traditional recommendation system is usually run on the single machine, which has been far from meeting the needs of such big data. In this paper, we design and implement a network recommendation algorithm based on Hadoop platform, which is based on the theory of Hadoop and Map/Reduce programming.
{"title":"Design and implementation of recommender system based on Hadoop","authors":"Qing Wang","doi":"10.1109/ICSESS.2016.7883070","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883070","url":null,"abstract":"Recommender system is to establish the relationship between the user and the information products, to use the existing selection habits and the similarity of each user's potential interest in the object, and then personalized recommendation. It is one of the effective ways to solve the information overload in the Internet age. But in practical application, because of the large number of products and the number of users, the traditional recommendation system is usually run on the single machine, which has been far from meeting the needs of such big data. In this paper, we design and implement a network recommendation algorithm based on Hadoop platform, which is based on the theory of Hadoop and Map/Reduce programming.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123877110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}