首页 > 最新文献

2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)最新文献

英文 中文
Software reliability case development method based on software reliability characteristic model and measures of defect control 基于软件可靠性特征模型和缺陷控制措施的软件可靠性用例开发方法
L. Yuhua, Lu Min-yan, X. Biao
For high reliability software, mission critical system software and embedded system software, to demonstrate convincingly and validly that the software satisfies the reliability requirements is one of the most challenging issues. In this paper, we present a method for developing software reliability case based on software reliability characteristic model and measures of defect control. Three software reliability argument patterns are proposed. As a case study, we take the load control software to demonstrate how a software reliability case can be generated using the proposed method and corresponding argument patterns.
对于高可靠性软件、关键任务系统软件和嵌入式系统软件,如何令人信服、有效地证明软件满足可靠性要求是最具挑战性的问题之一。本文提出了一种基于软件可靠性特征模型和缺陷控制措施的软件可靠性案例开发方法。提出了三种软件可靠性论证模式。最后以负载控制软件为例,说明了如何利用本文提出的方法和相应的参数模式生成软件可靠性案例。
{"title":"Software reliability case development method based on software reliability characteristic model and measures of defect control","authors":"L. Yuhua, Lu Min-yan, X. Biao","doi":"10.1109/ICSESS.2016.7883004","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883004","url":null,"abstract":"For high reliability software, mission critical system software and embedded system software, to demonstrate convincingly and validly that the software satisfies the reliability requirements is one of the most challenging issues. In this paper, we present a method for developing software reliability case based on software reliability characteristic model and measures of defect control. Three software reliability argument patterns are proposed. As a case study, we take the load control software to demonstrate how a software reliability case can be generated using the proposed method and corresponding argument patterns.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130297747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research on building trustworthy software system by self-adaptation 基于自适应构建可信软件系统的研究
Shan Tang, Liping Li, Xiaolin Cao
The execution context of today's software systems changes continually, which makes systems have to cope with changing environments while at the same time facing high non-functional requirements such as flexibility and dependability. Runtime adaptation technology can modify behaviors and structures in response to changes in the system itself or in its environment and thus improve dependability at run time. This leads to a more flexible and effective way to build dependable software system. However, current works address adaptation often remain a neglected gap between the architecture model and the system state. To solve this problem, we present a systematic process that covers requirements modeling, architecture and system modeling of trustworthy software based on a runtime self-adaptation perspective.
当今软件系统的执行环境不断变化,这使得系统在应对不断变化的环境的同时,还要面对高的非功能性需求,如灵活性和可靠性。运行时适应技术可以修改行为和结构,以响应系统本身或其环境中的变化,从而提高运行时的可靠性。这为构建可靠的软件系统提供了更灵活、更有效的方法。然而,目前的工作解决适应往往仍然是架构模型和系统状态之间的一个被忽视的差距。为了解决这个问题,我们提出了一个系统的过程,该过程涵盖了基于运行时自适应视角的可信赖软件的需求建模、体系结构和系统建模。
{"title":"Research on building trustworthy software system by self-adaptation","authors":"Shan Tang, Liping Li, Xiaolin Cao","doi":"10.1109/ICSESS.2016.7883250","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883250","url":null,"abstract":"The execution context of today's software systems changes continually, which makes systems have to cope with changing environments while at the same time facing high non-functional requirements such as flexibility and dependability. Runtime adaptation technology can modify behaviors and structures in response to changes in the system itself or in its environment and thus improve dependability at run time. This leads to a more flexible and effective way to build dependable software system. However, current works address adaptation often remain a neglected gap between the architecture model and the system state. To solve this problem, we present a systematic process that covers requirements modeling, architecture and system modeling of trustworthy software based on a runtime self-adaptation perspective.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134175807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A security risk assessment method of website based on threat analysis combined with AHP and entropy weight 基于威胁分析的AHP与熵权相结合的网站安全风险评估方法
Zhiquan Lai, Yongjun Shen, Guidong Zhang
In the field of information security, risk assessment is the core of the risk management and control. This paper proposes a security risk assessment method based on threat analysis combined with AHP and entropy weight. This method has features that are suitable for website such as practical, easy operative and independent. And the AHP and entropy weight make the evaluation results more objective. This paper gives the calculation model of the method and the main procedures of risk assessment. Finally, take a website as an example to verify the rationality and effectiveness of this method.
在信息安全领域,风险评估是风险管理和控制的核心。提出了一种基于威胁分析、层次分析法和熵权法相结合的安全风险评估方法。该方法具有实用性强、操作简便、独立性强等特点。层次分析法和熵权法使评价结果更加客观。本文给出了该方法的计算模型和风险评估的主要步骤。最后以某网站为例,验证了该方法的合理性和有效性。
{"title":"A security risk assessment method of website based on threat analysis combined with AHP and entropy weight","authors":"Zhiquan Lai, Yongjun Shen, Guidong Zhang","doi":"10.1109/ICSESS.2016.7883113","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883113","url":null,"abstract":"In the field of information security, risk assessment is the core of the risk management and control. This paper proposes a security risk assessment method based on threat analysis combined with AHP and entropy weight. This method has features that are suitable for website such as practical, easy operative and independent. And the AHP and entropy weight make the evaluation results more objective. This paper gives the calculation model of the method and the main procedures of risk assessment. Finally, take a website as an example to verify the rationality and effectiveness of this method.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134522823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Image retrieval using two-dimensional inverted index and semantic attributes 基于二维倒排索引和语义属性的图像检索
Wang Lei, Guoqiang Xiao
Most of the current image retrieval systems for large scale database rely on the Bag-of-Words (BoW) representation and inverted index. We analyze these systems and find that the retrieval performance is largely determined by the discriminative ability of their inverted indexes. This motivates us to combine SIFT and local color features into a two-dimensional inverted index (TD-II). Each dimension of TD-II corresponds to one kind of features, so the precision of visual match is enhanced. After constructing the TD-II of local features, we introduce a semantic-aware co-indexing algorithm which utilizes 1000 semantic attributes to insert similar images to the initial set of TD-II. Embedding semantic attributes into TD-II is totally off-line and effectively enhances the retrieval performance of TD-II. Experimental results demonstrate the competitive performance of our method, comparing with recent retrieval methods on two benchmark datasets, i.e., Ukbench and Holidays.
目前大多数面向大型数据库的图像检索系统都依赖于词袋(BoW)表示和倒排索引。我们对这些系统进行了分析,发现检索性能在很大程度上取决于它们的倒排索引的判别能力。这促使我们将SIFT和局部颜色特征结合成一个二维倒转指数(TD-II)。TD-II的每个维度对应一种特征,提高了视觉匹配的精度。在构造了局部特征的TD-II之后,我们引入了一种语义感知的协同索引算法,该算法利用1000个语义属性将相似的图像插入到TD-II的初始集合中。将语义属性嵌入到TD-II中是完全离线的,有效地提高了TD-II的检索性能。实验结果表明,我们的方法在两个基准数据集(Ukbench和Holidays)上与最近的检索方法进行了比较。
{"title":"Image retrieval using two-dimensional inverted index and semantic attributes","authors":"Wang Lei, Guoqiang Xiao","doi":"10.1109/ICSESS.2016.7883159","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883159","url":null,"abstract":"Most of the current image retrieval systems for large scale database rely on the Bag-of-Words (BoW) representation and inverted index. We analyze these systems and find that the retrieval performance is largely determined by the discriminative ability of their inverted indexes. This motivates us to combine SIFT and local color features into a two-dimensional inverted index (TD-II). Each dimension of TD-II corresponds to one kind of features, so the precision of visual match is enhanced. After constructing the TD-II of local features, we introduce a semantic-aware co-indexing algorithm which utilizes 1000 semantic attributes to insert similar images to the initial set of TD-II. Embedding semantic attributes into TD-II is totally off-line and effectively enhances the retrieval performance of TD-II. Experimental results demonstrate the competitive performance of our method, comparing with recent retrieval methods on two benchmark datasets, i.e., Ukbench and Holidays.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130959046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Link inference in the presense of load balancing 在负载均衡的情况下进行链路推理
Shaolei Wang, Lei Zhang, Chaojing Tang
In this paper, the problem of false traceroute links caused by load balancing is analysed and formulated. To solve this problem, the authors proposed a novel reliable assumption called the Last Link Assumption based on a fact that neglected by most researchers. The limitations of proposed assumption is analysed and presented. Then, the authors proposed an effective probing algorithm called the Last Link Inference Algorithm based on the proposed assumption. After that, the effectiveness of proposed algorithm for link inference in the presence of symmetric and asymmetric per-packet load balancing is demonstrated by comparing the topology measurement results of experimental networks with classic traceroute and Paris traceroute. The support rate of proposed algorithm in the Internet environment could reach 87.5% according to our topology measurement experiment.
本文分析并阐述了负载均衡引起的假跟踪路由链路问题。为了解决这个问题,作者基于一个被大多数研究者忽视的事实,提出了一个新颖可靠的假设——最后一环假设。分析并指出了上述假设的局限性。在此基础上,提出了一种有效的探测算法——最后链路推理算法。然后,通过与经典traceroute和Paris traceroute的实验网络拓扑测量结果对比,验证了该算法在对称和非对称单包负载均衡情况下链路推断的有效性。根据我们的拓扑测量实验,本文算法在互联网环境下的支持度可以达到87.5%。
{"title":"Link inference in the presense of load balancing","authors":"Shaolei Wang, Lei Zhang, Chaojing Tang","doi":"10.1109/ICSESS.2016.7883010","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883010","url":null,"abstract":"In this paper, the problem of false traceroute links caused by load balancing is analysed and formulated. To solve this problem, the authors proposed a novel reliable assumption called the Last Link Assumption based on a fact that neglected by most researchers. The limitations of proposed assumption is analysed and presented. Then, the authors proposed an effective probing algorithm called the Last Link Inference Algorithm based on the proposed assumption. After that, the effectiveness of proposed algorithm for link inference in the presence of symmetric and asymmetric per-packet load balancing is demonstrated by comparing the topology measurement results of experimental networks with classic traceroute and Paris traceroute. The support rate of proposed algorithm in the Internet environment could reach 87.5% according to our topology measurement experiment.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130981453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simultaneous Support Vector selection and parameter optimization using Support Vector Machines for sentiment classification 基于支持向量机的情感分类支持向量选择和参数优化
Ye Fei
Sentiment classification is widely used in some areas, such as product reviews, movie reviews, and micro-blogging reviews. Sentiment classification method is mainly bag of words model, Naive Bayes and Support Vector Machine. In recent years, the machine learning method represented by support vector machine (SVM) is widely used in the field of sentiment classification. There are more and more experiments show that support vector machine (SVM) performs better than the traditional bag of words model in the field of sentiment classification. However, more researches mainly focus on semantic analysis and feature extraction on sentiment, but also did not consider the case of sample imbalance. The purpose of this study was to test the feasibility of sentiment classification based on the genetic algorithm to optimize SVM model. Genetic algorithm is an optimization algorithm, which often used for selecting the feature subset and the optimization of the SVM parameters. This paper presents a novel optimization method, which select the optimal support vector subset by genetic algorithm and optimize SVM parameters. We construct the experiment show that the proposed method has improved significantly on sentiment classification than the traditional SVM modeling capabilities.
情感分类广泛应用于产品评论、电影评论、微博评论等领域。情感分类方法主要有词袋模型、朴素贝叶斯和支持向量机。近年来,以支持向量机(SVM)为代表的机器学习方法在情感分类领域得到了广泛的应用。越来越多的实验表明,支持向量机(SVM)在情感分类领域的表现优于传统的词袋模型。然而,更多的研究主要集中在情感的语义分析和特征提取上,而没有考虑样本不平衡的情况。本研究的目的是检验基于遗传算法的情感分类对SVM模型进行优化的可行性。遗传算法是一种优化算法,常用于特征子集的选择和支持向量机参数的优化。提出了一种新的优化方法,利用遗传算法选择最优支持向量子集,并对支持向量机参数进行优化。我们构建的实验表明,所提出的方法在情感分类方面比传统的SVM建模能力有了显著的提高。
{"title":"Simultaneous Support Vector selection and parameter optimization using Support Vector Machines for sentiment classification","authors":"Ye Fei","doi":"10.1109/ICSESS.2016.7883015","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883015","url":null,"abstract":"Sentiment classification is widely used in some areas, such as product reviews, movie reviews, and micro-blogging reviews. Sentiment classification method is mainly bag of words model, Naive Bayes and Support Vector Machine. In recent years, the machine learning method represented by support vector machine (SVM) is widely used in the field of sentiment classification. There are more and more experiments show that support vector machine (SVM) performs better than the traditional bag of words model in the field of sentiment classification. However, more researches mainly focus on semantic analysis and feature extraction on sentiment, but also did not consider the case of sample imbalance. The purpose of this study was to test the feasibility of sentiment classification based on the genetic algorithm to optimize SVM model. Genetic algorithm is an optimization algorithm, which often used for selecting the feature subset and the optimization of the SVM parameters. This paper presents a novel optimization method, which select the optimal support vector subset by genetic algorithm and optimize SVM parameters. We construct the experiment show that the proposed method has improved significantly on sentiment classification than the traditional SVM modeling capabilities.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132141703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
A kind of semi-supervised classifying method research for power transformer fault diagnosis 一种用于电力变压器故障诊断的半监督分类方法研究
Siping Chen
Dissolved gas analysis is one of the most common techniques to detect the faults in the power transformers. Most of existing diagnosis method will need large amount of labeled data sets to construct classifier, while normally ignoring without unlabeled data sets. This paper presents a power transformer fault diagnosis method which based on semi-supervised classifying. In Its learning process, the semi-supervised classifying method can simultaneously use labeled data sets and unlabeled data sets to acquire more information so that make better learning effect. A semi-supervised classifying (SSC) method adopting fuzzy nearest neighborhood label propagation (FNNLP-SSC)is adopted to diagnose the fault of power transformer, in the meantime, the proposed method, based on the similarity connections between a sample and its K nearest data, classifies the unlabeled data by making the labels propagate from the labeled data to unlabeled data. The experiments indicate that method of this paper has been proposed has higher fault diagnosis accuracy compared with C-means (FCM) algorithm and the three ratio method IEC. Also, it verifies the effectiveness and feasibility of the proposed method in the transformer fault diagnosis.
溶解气体分析是电力变压器故障检测中最常用的技术之一。现有的诊断方法大多需要大量的标记数据集来构建分类器,而通常忽略未标记的数据集。提出了一种基于半监督分类的电力变压器故障诊断方法。在其学习过程中,半监督分类方法可以同时使用标记数据集和未标记数据集来获取更多的信息,从而获得更好的学习效果。采用模糊最近邻标签传播(FNNLP-SSC)半监督分类(SSC)方法对电力变压器故障进行诊断,同时,该方法根据样本与其K个最近邻数据之间的相似关系,通过标签从有标签的数据传播到无标签的数据,对未标记的数据进行分类。实验表明,与c均值(FCM)算法和三比值法(IEC)相比,本文提出的方法具有更高的故障诊断精度。验证了该方法在变压器故障诊断中的有效性和可行性。
{"title":"A kind of semi-supervised classifying method research for power transformer fault diagnosis","authors":"Siping Chen","doi":"10.1109/ICSESS.2016.7883238","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883238","url":null,"abstract":"Dissolved gas analysis is one of the most common techniques to detect the faults in the power transformers. Most of existing diagnosis method will need large amount of labeled data sets to construct classifier, while normally ignoring without unlabeled data sets. This paper presents a power transformer fault diagnosis method which based on semi-supervised classifying. In Its learning process, the semi-supervised classifying method can simultaneously use labeled data sets and unlabeled data sets to acquire more information so that make better learning effect. A semi-supervised classifying (SSC) method adopting fuzzy nearest neighborhood label propagation (FNNLP-SSC)is adopted to diagnose the fault of power transformer, in the meantime, the proposed method, based on the similarity connections between a sample and its K nearest data, classifies the unlabeled data by making the labels propagate from the labeled data to unlabeled data. The experiments indicate that method of this paper has been proposed has higher fault diagnosis accuracy compared with C-means (FCM) algorithm and the three ratio method IEC. Also, it verifies the effectiveness and feasibility of the proposed method in the transformer fault diagnosis.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133140647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Optimization WIFI indoor positioning KNN algorithm location-based fingerprint 优化WIFI室内定位KNN算法定位指纹
Xingbin Ge, Zhiyi Qu
Location-based services have been deep into all aspects of life and it provides a convenient and efficient service experience for people. Currently, technology is relatively mature and widely used in the outdoor positioning. By contrast, for indoor positioning, although there are a lot of hot technology, but they are mostly insufficient lead to it is hard to popularize. So how to improve the popularity of indoor positioning in the case of improve the positioning accuracy has became a hot research topoc. This paper analyzes and studies several typical fingerprint localization algorithm, including NN, KNN and WKNN, and then propose an algorithmic improvement program, it introduces signal propagation model, finds and narrows the K-gon.
基于位置的服务已经深入到人们生活的方方面面,为人们提供了便捷、高效的服务体验。目前,户外定位技术相对成熟,应用广泛。相比之下,对于室内定位,虽然有很多热门技术,但它们大多是不足的,导致它很难普及。因此如何在提高室内定位普及程度的情况下,提高定位精度成为一个热门的研究课题。本文分析和研究了几种典型的指纹定位算法,包括NN、KNN和WKNN,并提出了一种算法改进方案,该方案引入了信号传播模型,找到并缩小了K-gon。
{"title":"Optimization WIFI indoor positioning KNN algorithm location-based fingerprint","authors":"Xingbin Ge, Zhiyi Qu","doi":"10.1109/ICSESS.2016.7883033","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883033","url":null,"abstract":"Location-based services have been deep into all aspects of life and it provides a convenient and efficient service experience for people. Currently, technology is relatively mature and widely used in the outdoor positioning. By contrast, for indoor positioning, although there are a lot of hot technology, but they are mostly insufficient lead to it is hard to popularize. So how to improve the popularity of indoor positioning in the case of improve the positioning accuracy has became a hot research topoc. This paper analyzes and studies several typical fingerprint localization algorithm, including NN, KNN and WKNN, and then propose an algorithmic improvement program, it introduces signal propagation model, finds and narrows the K-gon.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"292 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114095654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 61
Requirements change management based on object-oriented software engineering with unified modeling language 基于面向对象软件工程的需求变更管理,采用统一的建模语言
Jessada Tomyim, A. Pohthong
User requirements for software development are getting more complicated and are changing all the time. Not only should the requirements engineering process be well-organized but requirements change management should also be effective, especially for complex systems. However, the software engineering methodology employed can also make requirements change difficult to manage. Object-oriented software engineering using unified modeling language (UML) describes software systems by providing multiple views and diagrams. Therefore, software development with UML needs effective requirements change management. This study proposed a requirements change management model for object-oriented methodology with UML. In order to demonstrate the proposed model, business models from the selected case study, Mission Hospital Phuket, were chosen as the user requirements for the prototype system. Two aspects of the proposed system's performance were evaluated in the research laboratory: (1) users' expectation and (2) users' satisfaction.
用户对软件开发的需求变得越来越复杂,并且一直在变化。不仅需求工程过程应该组织良好,而且需求变更管理也应该是有效的,特别是对于复杂的系统。然而,所采用的软件工程方法也会使需求变更难以管理。使用统一建模语言(UML)的面向对象软件工程通过提供多个视图和图来描述软件系统。因此,使用UML进行软件开发需要有效的需求变更管理。本研究提出了一个基于UML的面向对象方法的需求变更管理模型。为了演示所提出的模型,从选定的案例研究,普吉岛使命医院中选择商业模型作为原型系统的用户需求。在研究实验室中对所提出的系统的性能进行了两个方面的评估:(1)用户期望和(2)用户满意度。
{"title":"Requirements change management based on object-oriented software engineering with unified modeling language","authors":"Jessada Tomyim, A. Pohthong","doi":"10.1109/ICSESS.2016.7883005","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883005","url":null,"abstract":"User requirements for software development are getting more complicated and are changing all the time. Not only should the requirements engineering process be well-organized but requirements change management should also be effective, especially for complex systems. However, the software engineering methodology employed can also make requirements change difficult to manage. Object-oriented software engineering using unified modeling language (UML) describes software systems by providing multiple views and diagrams. Therefore, software development with UML needs effective requirements change management. This study proposed a requirements change management model for object-oriented methodology with UML. In order to demonstrate the proposed model, business models from the selected case study, Mission Hospital Phuket, were chosen as the user requirements for the prototype system. Two aspects of the proposed system's performance were evaluated in the research laboratory: (1) users' expectation and (2) users' satisfaction.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134024168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
A study on the power consumption of using cryptography algorithms in mobile devices 在移动设备中使用加密算法的功耗研究
Jiehong Wu, Ilia Detchenkov, Yang Cao
Mobile Ad Hoc network is rapidly developing research area, one of the open question in this area is secure data inside the network. Encryption algorithms play a main role in information security systems. On the other side, those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. This paper provides evaluation of three of the common encryption algorithms: AES, Blowfish, and GOST. A comparison has been conducted for those encryption algorithms at different sizes of data blocks. Key expansion time and encryption/decryption speed was measured. Simulation results are given to demonstrate the effectiveness of each algorithm.
移动自组织网络是一个快速发展的研究领域,网络内部数据的安全是该领域的一个开放性问题。加密算法在信息安全系统中起着重要的作用。另一方面,这些算法消耗了大量的计算资源,如CPU时间、内存和电池电量。本文提供了三种常见的加密算法的评估:AES, Blowfish和GOST。对不同数据块大小的加密算法进行了比较。测量了密钥扩展时间和加解密速度。仿真结果验证了各算法的有效性。
{"title":"A study on the power consumption of using cryptography algorithms in mobile devices","authors":"Jiehong Wu, Ilia Detchenkov, Yang Cao","doi":"10.1109/ICSESS.2016.7883224","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883224","url":null,"abstract":"Mobile Ad Hoc network is rapidly developing research area, one of the open question in this area is secure data inside the network. Encryption algorithms play a main role in information security systems. On the other side, those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. This paper provides evaluation of three of the common encryption algorithms: AES, Blowfish, and GOST. A comparison has been conducted for those encryption algorithms at different sizes of data blocks. Key expansion time and encryption/decryption speed was measured. Simulation results are given to demonstrate the effectiveness of each algorithm.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134526140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
期刊
2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1