Pub Date : 2017-11-01DOI: 10.1109/ICSESS.2017.8342863
Oscar Karnalim
Despite the fact that plagiarizing source code is a trivial task for most CS students, detecting such unethical behavior requires a considerable amount of effort. Thus, several plagiarism detection systems were developed to handle such issue. This paper extends Karnalim's work, a low-level approach for detecting Java source code plagiarism, by incorporating abstract method linearization. Such extension is incorporated to enhance the accuracy of low-level approach in term of detecting plagiarism in object-oriented environment. According to our evaluation, which was conducted based on 23 design-pattern source code pairs, our extended low-level approach is more effective than state-of-the-art and Karnalim's approach. On the one hand, when compared to state-of-the-art approach, our approach can generate less coincidental similarities and provide more accurate result. On the other hand, when compared to Karnalim's approach, our approach, at some extent, can generate higher similarity when simple abstract method invocation is incorporated.
{"title":"An abstract method linearization for detecting source code plagiarism in object-oriented environment","authors":"Oscar Karnalim","doi":"10.1109/ICSESS.2017.8342863","DOIUrl":"https://doi.org/10.1109/ICSESS.2017.8342863","url":null,"abstract":"Despite the fact that plagiarizing source code is a trivial task for most CS students, detecting such unethical behavior requires a considerable amount of effort. Thus, several plagiarism detection systems were developed to handle such issue. This paper extends Karnalim's work, a low-level approach for detecting Java source code plagiarism, by incorporating abstract method linearization. Such extension is incorporated to enhance the accuracy of low-level approach in term of detecting plagiarism in object-oriented environment. According to our evaluation, which was conducted based on 23 design-pattern source code pairs, our extended low-level approach is more effective than state-of-the-art and Karnalim's approach. On the one hand, when compared to state-of-the-art approach, our approach can generate less coincidental similarities and provide more accurate result. On the other hand, when compared to Karnalim's approach, our approach, at some extent, can generate higher similarity when simple abstract method invocation is incorporated.","PeriodicalId":179815,"journal":{"name":"2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128184916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/ICSESS.2017.8342987
G. Jin, Jiangsheng Li, Yaoxian Liu, Yi Sun, Bin Li
With the rapid growth of power system scale, the grid needs to be more responsive to disruption and disruption and improve the capability to maintain its safety and reliability. Furthermore, a robust power protection system built by the latest communication technology is introduced to make a breakthrough in stability control technology. Based on the collected wide-area situation information, the protection system can predict network status and provide a quick solution when a fault occurs. This paper presents a communication network simulation technology scheme based on grid system protection and can achieve reliable operation of the network.
{"title":"Research on simulation technology of communication network for power system protection","authors":"G. Jin, Jiangsheng Li, Yaoxian Liu, Yi Sun, Bin Li","doi":"10.1109/ICSESS.2017.8342987","DOIUrl":"https://doi.org/10.1109/ICSESS.2017.8342987","url":null,"abstract":"With the rapid growth of power system scale, the grid needs to be more responsive to disruption and disruption and improve the capability to maintain its safety and reliability. Furthermore, a robust power protection system built by the latest communication technology is introduced to make a breakthrough in stability control technology. Based on the collected wide-area situation information, the protection system can predict network status and provide a quick solution when a fault occurs. This paper presents a communication network simulation technology scheme based on grid system protection and can achieve reliable operation of the network.","PeriodicalId":179815,"journal":{"name":"2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128369261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/ICSESS.2017.8342939
H. Sun, Xiling Luo, Yifu Xu
To solve the problem of large search space, large number of extended nodes, long searching time and large memory consumption for 3D path planning in general aviation(GA), this paper proposes an improved A∗ algorithm based on classical A∗ algorithm. The improved method first dynamically build 3D grid search space based on initial node and target node. Then nodes are extended by improving cost function, setting dynamic step length, and maintaining current flight state. Also optimize data structure to improve search efficiency. Finally, this paper has developed an application for real terrain that can be used to quickly and efficiently plan an optimized path.
{"title":"The research of path planning for general aviation based on improved A∗ algorithm","authors":"H. Sun, Xiling Luo, Yifu Xu","doi":"10.1109/ICSESS.2017.8342939","DOIUrl":"https://doi.org/10.1109/ICSESS.2017.8342939","url":null,"abstract":"To solve the problem of large search space, large number of extended nodes, long searching time and large memory consumption for 3D path planning in general aviation(GA), this paper proposes an improved A∗ algorithm based on classical A∗ algorithm. The improved method first dynamically build 3D grid search space based on initial node and target node. Then nodes are extended by improving cost function, setting dynamic step length, and maintaining current flight state. Also optimize data structure to improve search efficiency. Finally, this paper has developed an application for real terrain that can be used to quickly and efficiently plan an optimized path.","PeriodicalId":179815,"journal":{"name":"2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131926524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/ICSESS.2017.8342910
Liu Hanyan, Wang Shihai, Liu Bin, X. Peng
Usually the complexity metric of software focuses on the complexity of code level, function level or structure level separately. It lacks of measurement for the comprehensive complexity of software system. This paper proposes a complexity metric model of three-level cascade network that based on complex network theory. In this metric model, the complexity of code level, function level and structure level are measured and the cascaded relationship between the three levels are analyzed. At last, the three-level cascade network model is built and the comprehensive complexity of software system is measured though the three-level cascade network model. The experiment result shows that the comprehensive complexity of the software system is correlated positively to the number of software defects.
{"title":"Software complexity measurement based on complex network","authors":"Liu Hanyan, Wang Shihai, Liu Bin, X. Peng","doi":"10.1109/ICSESS.2017.8342910","DOIUrl":"https://doi.org/10.1109/ICSESS.2017.8342910","url":null,"abstract":"Usually the complexity metric of software focuses on the complexity of code level, function level or structure level separately. It lacks of measurement for the comprehensive complexity of software system. This paper proposes a complexity metric model of three-level cascade network that based on complex network theory. In this metric model, the complexity of code level, function level and structure level are measured and the cascaded relationship between the three levels are analyzed. At last, the three-level cascade network model is built and the comprehensive complexity of software system is measured though the three-level cascade network model. The experiment result shows that the comprehensive complexity of the software system is correlated positively to the number of software defects.","PeriodicalId":179815,"journal":{"name":"2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134257486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/ICSESS.2017.8342988
Li Wei, S. Pei, Wang Wenjin, Y. Hao, Chen Zhuo, Sun Yi, Lin Bin
The terminal communication access network of power system is an information channel to guarantee the normal operation of the power grid, the rapid response of the fault, the efficient utilization of resources, the real-time transmission of the business and the sustainable production of electricity. For multi-layer networks, the use of single-layer survivability strategy may lead to the intensification of resource competition and the protection of the business, which requires the multi-layer network survivability strategy for inter-level coordination. In view of the current application status of multilayer communication bearer network, the survivability technology of multilayer network service carrier is researched, and the multi tier survivability network layer coordination is mainly studied.
{"title":"Research on survivability of multi-layer electric power service","authors":"Li Wei, S. Pei, Wang Wenjin, Y. Hao, Chen Zhuo, Sun Yi, Lin Bin","doi":"10.1109/ICSESS.2017.8342988","DOIUrl":"https://doi.org/10.1109/ICSESS.2017.8342988","url":null,"abstract":"The terminal communication access network of power system is an information channel to guarantee the normal operation of the power grid, the rapid response of the fault, the efficient utilization of resources, the real-time transmission of the business and the sustainable production of electricity. For multi-layer networks, the use of single-layer survivability strategy may lead to the intensification of resource competition and the protection of the business, which requires the multi-layer network survivability strategy for inter-level coordination. In view of the current application status of multilayer communication bearer network, the survivability technology of multilayer network service carrier is researched, and the multi tier survivability network layer coordination is mainly studied.","PeriodicalId":179815,"journal":{"name":"2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134411513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/ICSESS.2017.8342876
Chanchai Supaartagorn
A flowchart can be a graphic diagram representation of a programming logic. There are shapes and connectors that represent the different types of actions or steps in a process. A flowchart is a very important tool in the planning phase in a program development cycle. Programmers can use it to design and develop an algorithm of a program. Moreover, a flowchart is also very effective for visual learners to write and comprehend algorithms in computer programming courses. This paper aims to provide a tool which serves as an automatic code generator using a structured flowchart. The tool is composed of basic flowchart shapes to be combined into a structured flowchart that can be converted into source codes. In addition, the system's performance has been evaluated by two groups: 5 experts and 93 general users. The results showed the average values of the satisfaction levels were 4.48 and 4.27 with standard deviations at 0.59 and 0.64 for the experts and the general users respectively. It was found that the system performance of the tool reached an agree level. It was revealed that the developed system can be used precisely as intended in an effective manner.
{"title":"Web application for automatic code generator using a structured flowchart","authors":"Chanchai Supaartagorn","doi":"10.1109/ICSESS.2017.8342876","DOIUrl":"https://doi.org/10.1109/ICSESS.2017.8342876","url":null,"abstract":"A flowchart can be a graphic diagram representation of a programming logic. There are shapes and connectors that represent the different types of actions or steps in a process. A flowchart is a very important tool in the planning phase in a program development cycle. Programmers can use it to design and develop an algorithm of a program. Moreover, a flowchart is also very effective for visual learners to write and comprehend algorithms in computer programming courses. This paper aims to provide a tool which serves as an automatic code generator using a structured flowchart. The tool is composed of basic flowchart shapes to be combined into a structured flowchart that can be converted into source codes. In addition, the system's performance has been evaluated by two groups: 5 experts and 93 general users. The results showed the average values of the satisfaction levels were 4.48 and 4.27 with standard deviations at 0.59 and 0.64 for the experts and the general users respectively. It was found that the system performance of the tool reached an agree level. It was revealed that the developed system can be used precisely as intended in an effective manner.","PeriodicalId":179815,"journal":{"name":"2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133246683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/ICSESS.2017.8342961
Guochao Lao, W. Ye, Guozhu Liu
The spaceborne synthetic aperture radar (SAR) image would become defocused and fuzzy when aiming to a moving vessel. To solve the problem, a vessel imagery enhancement method combining compressed sensing (CS) with time frequency distribution (TFD) is presented, by which, the imaging result is improved, and a series of images at different azimuth time are obtained showing the vessel posture changing. The validity of the method is verified by processing a measured SAR image.
{"title":"A vessel imagery enhancement method of spaceborne SAR based on CS-TFD","authors":"Guochao Lao, W. Ye, Guozhu Liu","doi":"10.1109/ICSESS.2017.8342961","DOIUrl":"https://doi.org/10.1109/ICSESS.2017.8342961","url":null,"abstract":"The spaceborne synthetic aperture radar (SAR) image would become defocused and fuzzy when aiming to a moving vessel. To solve the problem, a vessel imagery enhancement method combining compressed sensing (CS) with time frequency distribution (TFD) is presented, by which, the imaging result is improved, and a series of images at different azimuth time are obtained showing the vessel posture changing. The validity of the method is verified by processing a measured SAR image.","PeriodicalId":179815,"journal":{"name":"2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133276473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/ICSESS.2017.8342983
Benjamin Appiah, Eugene Opoku-Mensah, Zhiguang Qin
Web-Based applications are becoming more increasingly technically complex and sophisticated. The very nature of their feature-rich design and their capability to collate, process, and disseminate information over the Internet or from within an intranet makes them a popular target for attack. According to Open Web Application Security Project (OWASP) Top Ten Cheat sheet-2017, SQL Injection Attack is at peak among online attacks. This can be attributed primarily to lack of awareness on software security. Developing effective SQL injection detection approaches has been a challenge in spite of extensive research in this area. In this paper, we propose a signature based SQL injection attack detection framework by integrating fingerprinting method and Pattern Matching to distinguish genuine SQL queries from malicious queries. Our framework monitors SQL queries to the database and compares them against a dataset of signatures from known SQL injection attacks. If the fingerprint method cannot determine the legitimacy of query alone, then the Aho Corasick algorithm is invoked to ascertain whether attack signatures appear in the queries. The initial experimental results of our framework indicate the approach can identify wide variety of SQL injection attacks with negligible impact on performance.
{"title":"SQL injection attack detection using fingerprints and pattern matching technique","authors":"Benjamin Appiah, Eugene Opoku-Mensah, Zhiguang Qin","doi":"10.1109/ICSESS.2017.8342983","DOIUrl":"https://doi.org/10.1109/ICSESS.2017.8342983","url":null,"abstract":"Web-Based applications are becoming more increasingly technically complex and sophisticated. The very nature of their feature-rich design and their capability to collate, process, and disseminate information over the Internet or from within an intranet makes them a popular target for attack. According to Open Web Application Security Project (OWASP) Top Ten Cheat sheet-2017, SQL Injection Attack is at peak among online attacks. This can be attributed primarily to lack of awareness on software security. Developing effective SQL injection detection approaches has been a challenge in spite of extensive research in this area. In this paper, we propose a signature based SQL injection attack detection framework by integrating fingerprinting method and Pattern Matching to distinguish genuine SQL queries from malicious queries. Our framework monitors SQL queries to the database and compares them against a dataset of signatures from known SQL injection attacks. If the fingerprint method cannot determine the legitimacy of query alone, then the Aho Corasick algorithm is invoked to ascertain whether attack signatures appear in the queries. The initial experimental results of our framework indicate the approach can identify wide variety of SQL injection attacks with negligible impact on performance.","PeriodicalId":179815,"journal":{"name":"2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132164392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/ICSESS.2017.8342925
Tin Ban, Zhiqiang Wei, Yun Gao, Z. Li, Changhe Du, Wenjuan Shi
Through analyses on performances of Web frontend, we can learn about the bottlenecks of Web performance, the load limit and connection limit of browser. In this paper, the optimization strategies were carried out to accommodate the bottlenecks and a new request scheduling algorithm with AQSM was proposed to resolve the two connection restrictions. Some optimization strategies were used to settle the frontend performance problems of some webpages, and the results were in good performances.
{"title":"Optimization strategies based on algorithm for queue scheduling model and applications of web frontend performance","authors":"Tin Ban, Zhiqiang Wei, Yun Gao, Z. Li, Changhe Du, Wenjuan Shi","doi":"10.1109/ICSESS.2017.8342925","DOIUrl":"https://doi.org/10.1109/ICSESS.2017.8342925","url":null,"abstract":"Through analyses on performances of Web frontend, we can learn about the bottlenecks of Web performance, the load limit and connection limit of browser. In this paper, the optimization strategies were carried out to accommodate the bottlenecks and a new request scheduling algorithm with AQSM was proposed to resolve the two connection restrictions. Some optimization strategies were used to settle the frontend performance problems of some webpages, and the results were in good performances.","PeriodicalId":179815,"journal":{"name":"2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132338210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/ICSESS.2017.8342967
Fadia Shah, Jianping Li, Y. Shah, F. Shah
The human life is always experiencing problems related to health. The survival is difficult if not treated well. For a better recovery, health problems are solved by treatment plans and medications; which are by health care professional called specialists, doctors or medical practitioners. Whatever these professionals recommend, it is well maintained in the form of reports. The collection of all this record makes Medical Big Data (MBD). Based upon the medical problem, this MBD includes medical history and prescription reports, test reports, X-Ray, CT Scan, and some other types of medical diagnosis. Traditional systems are now improved after the enhancements in telecommunication modes and innovation of smart devices with latest 5G technology has a huge contribution in every field of science. Regarding health care systems, in developed countries, E-Health and Telemedicine systems being developed to improve the quality of treatment. Such systems have many enhanced features like data management, reliable diagnoses; among them a distinct aspect is load reduction for the patient about data availability and management. Since MBD is increasing for every patient as the time passes and the patient consults again and again. Many schemes with efficient models are proposed to make this MBD available over the network by compression and network management tools. This exponential expansion of MBD has unmitigated the domains of MBD generating sources. In this paper, MBD collection, sources are discussed which ensure directly or indirectly how some domains are responsible to increase MBD more than normal ways.
{"title":"Extended definition of medical big data","authors":"Fadia Shah, Jianping Li, Y. Shah, F. Shah","doi":"10.1109/ICSESS.2017.8342967","DOIUrl":"https://doi.org/10.1109/ICSESS.2017.8342967","url":null,"abstract":"The human life is always experiencing problems related to health. The survival is difficult if not treated well. For a better recovery, health problems are solved by treatment plans and medications; which are by health care professional called specialists, doctors or medical practitioners. Whatever these professionals recommend, it is well maintained in the form of reports. The collection of all this record makes Medical Big Data (MBD). Based upon the medical problem, this MBD includes medical history and prescription reports, test reports, X-Ray, CT Scan, and some other types of medical diagnosis. Traditional systems are now improved after the enhancements in telecommunication modes and innovation of smart devices with latest 5G technology has a huge contribution in every field of science. Regarding health care systems, in developed countries, E-Health and Telemedicine systems being developed to improve the quality of treatment. Such systems have many enhanced features like data management, reliable diagnoses; among them a distinct aspect is load reduction for the patient about data availability and management. Since MBD is increasing for every patient as the time passes and the patient consults again and again. Many schemes with efficient models are proposed to make this MBD available over the network by compression and network management tools. This exponential expansion of MBD has unmitigated the domains of MBD generating sources. In this paper, MBD collection, sources are discussed which ensure directly or indirectly how some domains are responsible to increase MBD more than normal ways.","PeriodicalId":179815,"journal":{"name":"2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"78 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133871328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}