首页 > 最新文献

2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS)最新文献

英文 中文
An abstract method linearization for detecting source code plagiarism in object-oriented environment 面向对象环境下源代码抄袭检测的抽象线性化方法
Oscar Karnalim
Despite the fact that plagiarizing source code is a trivial task for most CS students, detecting such unethical behavior requires a considerable amount of effort. Thus, several plagiarism detection systems were developed to handle such issue. This paper extends Karnalim's work, a low-level approach for detecting Java source code plagiarism, by incorporating abstract method linearization. Such extension is incorporated to enhance the accuracy of low-level approach in term of detecting plagiarism in object-oriented environment. According to our evaluation, which was conducted based on 23 design-pattern source code pairs, our extended low-level approach is more effective than state-of-the-art and Karnalim's approach. On the one hand, when compared to state-of-the-art approach, our approach can generate less coincidental similarities and provide more accurate result. On the other hand, when compared to Karnalim's approach, our approach, at some extent, can generate higher similarity when simple abstract method invocation is incorporated.
尽管抄袭源代码对大多数计算机科学专业的学生来说是一件微不足道的事情,但检测这种不道德的行为需要付出相当大的努力。因此,开发了几个剽窃检测系统来处理这一问题。本文扩展了Karnalim的工作,这是一种检测Java源代码抄袭的低级方法,通过合并抽象方法线性化。为了提高底层方法在面向对象环境下抄袭检测的准确性,引入了这种扩展。根据我们基于23个设计模式源代码对进行的评估,我们扩展的低级方法比最先进的方法和Karnalim的方法更有效。一方面,与最先进的方法相比,我们的方法可以产生更少的巧合相似点,提供更准确的结果。另一方面,与Karnalim的方法相比,我们的方法在某种程度上可以在合并简单抽象方法调用时产生更高的相似性。
{"title":"An abstract method linearization for detecting source code plagiarism in object-oriented environment","authors":"Oscar Karnalim","doi":"10.1109/ICSESS.2017.8342863","DOIUrl":"https://doi.org/10.1109/ICSESS.2017.8342863","url":null,"abstract":"Despite the fact that plagiarizing source code is a trivial task for most CS students, detecting such unethical behavior requires a considerable amount of effort. Thus, several plagiarism detection systems were developed to handle such issue. This paper extends Karnalim's work, a low-level approach for detecting Java source code plagiarism, by incorporating abstract method linearization. Such extension is incorporated to enhance the accuracy of low-level approach in term of detecting plagiarism in object-oriented environment. According to our evaluation, which was conducted based on 23 design-pattern source code pairs, our extended low-level approach is more effective than state-of-the-art and Karnalim's approach. On the one hand, when compared to state-of-the-art approach, our approach can generate less coincidental similarities and provide more accurate result. On the other hand, when compared to Karnalim's approach, our approach, at some extent, can generate higher similarity when simple abstract method invocation is incorporated.","PeriodicalId":179815,"journal":{"name":"2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128184916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Research on simulation technology of communication network for power system protection 电力系统保护通信网络仿真技术研究
G. Jin, Jiangsheng Li, Yaoxian Liu, Yi Sun, Bin Li
With the rapid growth of power system scale, the grid needs to be more responsive to disruption and disruption and improve the capability to maintain its safety and reliability. Furthermore, a robust power protection system built by the latest communication technology is introduced to make a breakthrough in stability control technology. Based on the collected wide-area situation information, the protection system can predict network status and provide a quick solution when a fault occurs. This paper presents a communication network simulation technology scheme based on grid system protection and can achieve reliable operation of the network.
随着电力系统规模的快速增长,电网需要提高对中断和中断的响应能力,提高维护其安全可靠性的能力。采用最新通信技术构建的鲁棒电源保护系统,实现了稳定控制技术的突破。保护系统可以根据采集到的广域态势信息,预测网络状态,并在故障发生时提供快速的解决方案。提出了一种基于电网系统保护的通信网络仿真技术方案,能够实现网络的可靠运行。
{"title":"Research on simulation technology of communication network for power system protection","authors":"G. Jin, Jiangsheng Li, Yaoxian Liu, Yi Sun, Bin Li","doi":"10.1109/ICSESS.2017.8342987","DOIUrl":"https://doi.org/10.1109/ICSESS.2017.8342987","url":null,"abstract":"With the rapid growth of power system scale, the grid needs to be more responsive to disruption and disruption and improve the capability to maintain its safety and reliability. Furthermore, a robust power protection system built by the latest communication technology is introduced to make a breakthrough in stability control technology. Based on the collected wide-area situation information, the protection system can predict network status and provide a quick solution when a fault occurs. This paper presents a communication network simulation technology scheme based on grid system protection and can achieve reliable operation of the network.","PeriodicalId":179815,"journal":{"name":"2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128369261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The research of path planning for general aviation based on improved A∗ algorithm 基于改进A *算法的通用航空路径规划研究
H. Sun, Xiling Luo, Yifu Xu
To solve the problem of large search space, large number of extended nodes, long searching time and large memory consumption for 3D path planning in general aviation(GA), this paper proposes an improved A∗ algorithm based on classical A∗ algorithm. The improved method first dynamically build 3D grid search space based on initial node and target node. Then nodes are extended by improving cost function, setting dynamic step length, and maintaining current flight state. Also optimize data structure to improve search efficiency. Finally, this paper has developed an application for real terrain that can be used to quickly and efficiently plan an optimized path.
针对通用航空(GA)三维路径规划中搜索空间大、扩展节点多、搜索时间长、内存消耗大的问题,在经典A∗算法的基础上提出了一种改进的A∗算法。该方法首先基于初始节点和目标节点动态构建三维网格搜索空间;然后通过改进代价函数、设置动态步长和保持当前飞行状态来扩展节点。同时优化数据结构,提高搜索效率。最后,本文开发了一个适用于实际地形的应用程序,可用于快速有效地规划优化路径。
{"title":"The research of path planning for general aviation based on improved A∗ algorithm","authors":"H. Sun, Xiling Luo, Yifu Xu","doi":"10.1109/ICSESS.2017.8342939","DOIUrl":"https://doi.org/10.1109/ICSESS.2017.8342939","url":null,"abstract":"To solve the problem of large search space, large number of extended nodes, long searching time and large memory consumption for 3D path planning in general aviation(GA), this paper proposes an improved A∗ algorithm based on classical A∗ algorithm. The improved method first dynamically build 3D grid search space based on initial node and target node. Then nodes are extended by improving cost function, setting dynamic step length, and maintaining current flight state. Also optimize data structure to improve search efficiency. Finally, this paper has developed an application for real terrain that can be used to quickly and efficiently plan an optimized path.","PeriodicalId":179815,"journal":{"name":"2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131926524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software complexity measurement based on complex network 基于复杂网络的软件复杂度度量
Liu Hanyan, Wang Shihai, Liu Bin, X. Peng
Usually the complexity metric of software focuses on the complexity of code level, function level or structure level separately. It lacks of measurement for the comprehensive complexity of software system. This paper proposes a complexity metric model of three-level cascade network that based on complex network theory. In this metric model, the complexity of code level, function level and structure level are measured and the cascaded relationship between the three levels are analyzed. At last, the three-level cascade network model is built and the comprehensive complexity of software system is measured though the three-level cascade network model. The experiment result shows that the comprehensive complexity of the software system is correlated positively to the number of software defects.
通常,软件的复杂性度量分别关注代码级、功能级和结构级的复杂性。它缺乏对软件系统综合复杂性的度量。基于复杂网络理论,提出了三级级联网络的复杂度度量模型。该度量模型测量了代码层、功能层和结构层的复杂度,并分析了这三个层次之间的级联关系。最后,建立了三级级联网络模型,并通过三级级联网络模型测量了软件系统的综合复杂性。实验结果表明,软件系统的综合复杂性与软件缺陷数呈正相关。
{"title":"Software complexity measurement based on complex network","authors":"Liu Hanyan, Wang Shihai, Liu Bin, X. Peng","doi":"10.1109/ICSESS.2017.8342910","DOIUrl":"https://doi.org/10.1109/ICSESS.2017.8342910","url":null,"abstract":"Usually the complexity metric of software focuses on the complexity of code level, function level or structure level separately. It lacks of measurement for the comprehensive complexity of software system. This paper proposes a complexity metric model of three-level cascade network that based on complex network theory. In this metric model, the complexity of code level, function level and structure level are measured and the cascaded relationship between the three levels are analyzed. At last, the three-level cascade network model is built and the comprehensive complexity of software system is measured though the three-level cascade network model. The experiment result shows that the comprehensive complexity of the software system is correlated positively to the number of software defects.","PeriodicalId":179815,"journal":{"name":"2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134257486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on survivability of multi-layer electric power service 多层电力服务的生存能力研究
Li Wei, S. Pei, Wang Wenjin, Y. Hao, Chen Zhuo, Sun Yi, Lin Bin
The terminal communication access network of power system is an information channel to guarantee the normal operation of the power grid, the rapid response of the fault, the efficient utilization of resources, the real-time transmission of the business and the sustainable production of electricity. For multi-layer networks, the use of single-layer survivability strategy may lead to the intensification of resource competition and the protection of the business, which requires the multi-layer network survivability strategy for inter-level coordination. In view of the current application status of multilayer communication bearer network, the survivability technology of multilayer network service carrier is researched, and the multi tier survivability network layer coordination is mainly studied.
电力系统终端通信接入网是保证电网正常运行、故障快速响应、资源高效利用、业务实时传输和电力可持续生产的信息通道。对于多层网络,采用单层生存性策略可能导致资源竞争加剧和业务保护,这就需要多层网络生存性策略进行层间协调。针对当前多层通信承载网的应用现状,对多层网络业务载体的生存性技术进行了研究,重点研究了多层生存性网络的层协调问题。
{"title":"Research on survivability of multi-layer electric power service","authors":"Li Wei, S. Pei, Wang Wenjin, Y. Hao, Chen Zhuo, Sun Yi, Lin Bin","doi":"10.1109/ICSESS.2017.8342988","DOIUrl":"https://doi.org/10.1109/ICSESS.2017.8342988","url":null,"abstract":"The terminal communication access network of power system is an information channel to guarantee the normal operation of the power grid, the rapid response of the fault, the efficient utilization of resources, the real-time transmission of the business and the sustainable production of electricity. For multi-layer networks, the use of single-layer survivability strategy may lead to the intensification of resource competition and the protection of the business, which requires the multi-layer network survivability strategy for inter-level coordination. In view of the current application status of multilayer communication bearer network, the survivability technology of multilayer network service carrier is researched, and the multi tier survivability network layer coordination is mainly studied.","PeriodicalId":179815,"journal":{"name":"2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134411513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Web application for automatic code generator using a structured flowchart Web应用程序使用结构化流程图自动生成代码
Chanchai Supaartagorn
A flowchart can be a graphic diagram representation of a programming logic. There are shapes and connectors that represent the different types of actions or steps in a process. A flowchart is a very important tool in the planning phase in a program development cycle. Programmers can use it to design and develop an algorithm of a program. Moreover, a flowchart is also very effective for visual learners to write and comprehend algorithms in computer programming courses. This paper aims to provide a tool which serves as an automatic code generator using a structured flowchart. The tool is composed of basic flowchart shapes to be combined into a structured flowchart that can be converted into source codes. In addition, the system's performance has been evaluated by two groups: 5 experts and 93 general users. The results showed the average values of the satisfaction levels were 4.48 and 4.27 with standard deviations at 0.59 and 0.64 for the experts and the general users respectively. It was found that the system performance of the tool reached an agree level. It was revealed that the developed system can be used precisely as intended in an effective manner.
流程图可以是表示编程逻辑的图形图。有一些形状和连接器表示流程中不同类型的操作或步骤。在程序开发周期的计划阶段,流程图是一个非常重要的工具。程序员可以使用它来设计和开发程序的算法。此外,在计算机编程课程中,流程图对于视觉学习者编写和理解算法也是非常有效的。本文旨在提供一个使用结构化流程图作为自动代码生成器的工具。该工具由基本流程图形状组成,可组合成可转换为源代码的结构化流程图。此外,还对系统的性能进行了两组评价:5名专家和93名一般用户。结果表明,专家和普通用户的满意度均值分别为4.48和4.27,标准差分别为0.59和0.64。结果表明,该工具的系统性能达到了一致的水平。据透露,开发的系统可以准确地按照预期有效地使用。
{"title":"Web application for automatic code generator using a structured flowchart","authors":"Chanchai Supaartagorn","doi":"10.1109/ICSESS.2017.8342876","DOIUrl":"https://doi.org/10.1109/ICSESS.2017.8342876","url":null,"abstract":"A flowchart can be a graphic diagram representation of a programming logic. There are shapes and connectors that represent the different types of actions or steps in a process. A flowchart is a very important tool in the planning phase in a program development cycle. Programmers can use it to design and develop an algorithm of a program. Moreover, a flowchart is also very effective for visual learners to write and comprehend algorithms in computer programming courses. This paper aims to provide a tool which serves as an automatic code generator using a structured flowchart. The tool is composed of basic flowchart shapes to be combined into a structured flowchart that can be converted into source codes. In addition, the system's performance has been evaluated by two groups: 5 experts and 93 general users. The results showed the average values of the satisfaction levels were 4.48 and 4.27 with standard deviations at 0.59 and 0.64 for the experts and the general users respectively. It was found that the system performance of the tool reached an agree level. It was revealed that the developed system can be used precisely as intended in an effective manner.","PeriodicalId":179815,"journal":{"name":"2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133246683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A vessel imagery enhancement method of spaceborne SAR based on CS-TFD 基于CS-TFD的星载SAR舰船图像增强方法
Guochao Lao, W. Ye, Guozhu Liu
The spaceborne synthetic aperture radar (SAR) image would become defocused and fuzzy when aiming to a moving vessel. To solve the problem, a vessel imagery enhancement method combining compressed sensing (CS) with time frequency distribution (TFD) is presented, by which, the imaging result is improved, and a series of images at different azimuth time are obtained showing the vessel posture changing. The validity of the method is verified by processing a measured SAR image.
星载合成孔径雷达(SAR)在瞄准运动舰船时,图像会出现离焦和模糊。针对这一问题,提出了一种将压缩感知(CS)与时频分布(TFD)相结合的船舶图像增强方法,提高了成像效果,得到了一系列不同方位时间下船舶姿态变化的图像。通过对SAR实测图像的处理,验证了该方法的有效性。
{"title":"A vessel imagery enhancement method of spaceborne SAR based on CS-TFD","authors":"Guochao Lao, W. Ye, Guozhu Liu","doi":"10.1109/ICSESS.2017.8342961","DOIUrl":"https://doi.org/10.1109/ICSESS.2017.8342961","url":null,"abstract":"The spaceborne synthetic aperture radar (SAR) image would become defocused and fuzzy when aiming to a moving vessel. To solve the problem, a vessel imagery enhancement method combining compressed sensing (CS) with time frequency distribution (TFD) is presented, by which, the imaging result is improved, and a series of images at different azimuth time are obtained showing the vessel posture changing. The validity of the method is verified by processing a measured SAR image.","PeriodicalId":179815,"journal":{"name":"2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133276473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SQL injection attack detection using fingerprints and pattern matching technique 使用指纹和模式匹配技术检测SQL注入攻击
Benjamin Appiah, Eugene Opoku-Mensah, Zhiguang Qin
Web-Based applications are becoming more increasingly technically complex and sophisticated. The very nature of their feature-rich design and their capability to collate, process, and disseminate information over the Internet or from within an intranet makes them a popular target for attack. According to Open Web Application Security Project (OWASP) Top Ten Cheat sheet-2017, SQL Injection Attack is at peak among online attacks. This can be attributed primarily to lack of awareness on software security. Developing effective SQL injection detection approaches has been a challenge in spite of extensive research in this area. In this paper, we propose a signature based SQL injection attack detection framework by integrating fingerprinting method and Pattern Matching to distinguish genuine SQL queries from malicious queries. Our framework monitors SQL queries to the database and compares them against a dataset of signatures from known SQL injection attacks. If the fingerprint method cannot determine the legitimacy of query alone, then the Aho Corasick algorithm is invoked to ascertain whether attack signatures appear in the queries. The initial experimental results of our framework indicate the approach can identify wide variety of SQL injection attacks with negligible impact on performance.
基于web的应用程序在技术上变得越来越复杂和复杂。其特性丰富的设计及其在Internet上或从内部网中整理、处理和传播信息的能力使其成为攻击的热门目标。根据开放Web应用程序安全项目(OWASP) 2017年十大备查单,SQL注入攻击是在线攻击的高峰。这主要是由于缺乏对软件安全的认识。尽管在这一领域进行了广泛的研究,但开发有效的SQL注入检测方法一直是一个挑战。本文提出了一种基于签名的SQL注入攻击检测框架,该框架将指纹识别方法与模式匹配相结合,用于区分真实的SQL查询和恶意的SQL查询。我们的框架监控对数据库的SQL查询,并将其与来自已知SQL注入攻击的签名数据集进行比较。如果指纹法不能单独确定查询的合法性,则调用Aho Corasick算法来确定查询中是否出现攻击签名。我们的框架的初步实验结果表明,该方法可以识别各种SQL注入攻击,而对性能的影响可以忽略不计。
{"title":"SQL injection attack detection using fingerprints and pattern matching technique","authors":"Benjamin Appiah, Eugene Opoku-Mensah, Zhiguang Qin","doi":"10.1109/ICSESS.2017.8342983","DOIUrl":"https://doi.org/10.1109/ICSESS.2017.8342983","url":null,"abstract":"Web-Based applications are becoming more increasingly technically complex and sophisticated. The very nature of their feature-rich design and their capability to collate, process, and disseminate information over the Internet or from within an intranet makes them a popular target for attack. According to Open Web Application Security Project (OWASP) Top Ten Cheat sheet-2017, SQL Injection Attack is at peak among online attacks. This can be attributed primarily to lack of awareness on software security. Developing effective SQL injection detection approaches has been a challenge in spite of extensive research in this area. In this paper, we propose a signature based SQL injection attack detection framework by integrating fingerprinting method and Pattern Matching to distinguish genuine SQL queries from malicious queries. Our framework monitors SQL queries to the database and compares them against a dataset of signatures from known SQL injection attacks. If the fingerprint method cannot determine the legitimacy of query alone, then the Aho Corasick algorithm is invoked to ascertain whether attack signatures appear in the queries. The initial experimental results of our framework indicate the approach can identify wide variety of SQL injection attacks with negligible impact on performance.","PeriodicalId":179815,"journal":{"name":"2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132164392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Optimization strategies based on algorithm for queue scheduling model and applications of web frontend performance 基于算法的队列调度模型优化策略及web前端性能应用
Tin Ban, Zhiqiang Wei, Yun Gao, Z. Li, Changhe Du, Wenjuan Shi
Through analyses on performances of Web frontend, we can learn about the bottlenecks of Web performance, the load limit and connection limit of browser. In this paper, the optimization strategies were carried out to accommodate the bottlenecks and a new request scheduling algorithm with AQSM was proposed to resolve the two connection restrictions. Some optimization strategies were used to settle the frontend performance problems of some webpages, and the results were in good performances.
通过对Web前端性能的分析,我们可以了解到Web性能的瓶颈,浏览器的负载限制和连接限制。在此基础上,提出了一种新的基于AQSM的请求调度算法来解决这两种连接限制。采用优化策略解决了部分网页的前端性能问题,取得了良好的性能效果。
{"title":"Optimization strategies based on algorithm for queue scheduling model and applications of web frontend performance","authors":"Tin Ban, Zhiqiang Wei, Yun Gao, Z. Li, Changhe Du, Wenjuan Shi","doi":"10.1109/ICSESS.2017.8342925","DOIUrl":"https://doi.org/10.1109/ICSESS.2017.8342925","url":null,"abstract":"Through analyses on performances of Web frontend, we can learn about the bottlenecks of Web performance, the load limit and connection limit of browser. In this paper, the optimization strategies were carried out to accommodate the bottlenecks and a new request scheduling algorithm with AQSM was proposed to resolve the two connection restrictions. Some optimization strategies were used to settle the frontend performance problems of some webpages, and the results were in good performances.","PeriodicalId":179815,"journal":{"name":"2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132338210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Extended definition of medical big data 医疗大数据扩展定义
Fadia Shah, Jianping Li, Y. Shah, F. Shah
The human life is always experiencing problems related to health. The survival is difficult if not treated well. For a better recovery, health problems are solved by treatment plans and medications; which are by health care professional called specialists, doctors or medical practitioners. Whatever these professionals recommend, it is well maintained in the form of reports. The collection of all this record makes Medical Big Data (MBD). Based upon the medical problem, this MBD includes medical history and prescription reports, test reports, X-Ray, CT Scan, and some other types of medical diagnosis. Traditional systems are now improved after the enhancements in telecommunication modes and innovation of smart devices with latest 5G technology has a huge contribution in every field of science. Regarding health care systems, in developed countries, E-Health and Telemedicine systems being developed to improve the quality of treatment. Such systems have many enhanced features like data management, reliable diagnoses; among them a distinct aspect is load reduction for the patient about data availability and management. Since MBD is increasing for every patient as the time passes and the patient consults again and again. Many schemes with efficient models are proposed to make this MBD available over the network by compression and network management tools. This exponential expansion of MBD has unmitigated the domains of MBD generating sources. In this paper, MBD collection, sources are discussed which ensure directly or indirectly how some domains are responsible to increase MBD more than normal ways.
人的一生总是会遇到与健康有关的问题。如果治疗不好,生存是困难的。为了更好地康复,健康问题是通过治疗计划和药物来解决的;这是由被称为专家、医生或医疗从业人员的卫生保健专业人员进行的。无论这些专业人员推荐什么,它都以报告的形式得到了很好的维护。所有这些记录的集合构成了医疗大数据(MBD)。基于医疗问题,本MBD包括病史和处方报告、检查报告、x光片、CT扫描和一些其他类型的医疗诊断。在电信模式的增强之后,传统系统得到了改进,智能设备的创新与最新的5G技术在每个科学领域都有巨大的贡献。关于保健系统,在发达国家,正在开发电子保健和远程医疗系统,以提高治疗质量。这样的系统有许多增强的功能,如数据管理、可靠的诊断;其中一个独特的方面是减轻患者在数据可用性和管理方面的负担。因为随着时间的推移,MBD对每个病人来说都在增加,病人一次又一次地咨询。为了通过压缩和网络管理工具使MBD在网络上可用,提出了许多具有有效模型的方案。这种MBD的指数级扩展扩大了MBD产生源的范围。本文讨论了MBD集合的来源,这些来源直接或间接地确保了某些域如何比正常方式更负责增加MBD。
{"title":"Extended definition of medical big data","authors":"Fadia Shah, Jianping Li, Y. Shah, F. Shah","doi":"10.1109/ICSESS.2017.8342967","DOIUrl":"https://doi.org/10.1109/ICSESS.2017.8342967","url":null,"abstract":"The human life is always experiencing problems related to health. The survival is difficult if not treated well. For a better recovery, health problems are solved by treatment plans and medications; which are by health care professional called specialists, doctors or medical practitioners. Whatever these professionals recommend, it is well maintained in the form of reports. The collection of all this record makes Medical Big Data (MBD). Based upon the medical problem, this MBD includes medical history and prescription reports, test reports, X-Ray, CT Scan, and some other types of medical diagnosis. Traditional systems are now improved after the enhancements in telecommunication modes and innovation of smart devices with latest 5G technology has a huge contribution in every field of science. Regarding health care systems, in developed countries, E-Health and Telemedicine systems being developed to improve the quality of treatment. Such systems have many enhanced features like data management, reliable diagnoses; among them a distinct aspect is load reduction for the patient about data availability and management. Since MBD is increasing for every patient as the time passes and the patient consults again and again. Many schemes with efficient models are proposed to make this MBD available over the network by compression and network management tools. This exponential expansion of MBD has unmitigated the domains of MBD generating sources. In this paper, MBD collection, sources are discussed which ensure directly or indirectly how some domains are responsible to increase MBD more than normal ways.","PeriodicalId":179815,"journal":{"name":"2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"78 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133871328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1