Flying Ad-Hoc Network is the information bridge for autonomous aerocraft flying formation. This paper mainly investigates a given FANETs application system of autonomous aerocraft flying formation. At first the given FANETs system scheme and its specific characteristics have been described respectively. Also,the communication protocol stack model of five layers and its protocol stack software have been proposed. The communication terminal design and the flying test scene have been discussed. Finally, the test results show the system scheme and its communication protocol stack model are feasible.
{"title":"A FANETs System for Autonomous Aerocraft Flying Formation","authors":"Jinyong Lin, Wenlong Cai, Xiangrui Fan, Wenjie Dong, Shuo Zhang","doi":"10.1109/QRS-C57518.2022.00105","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00105","url":null,"abstract":"Flying Ad-Hoc Network is the information bridge for autonomous aerocraft flying formation. This paper mainly investigates a given FANETs application system of autonomous aerocraft flying formation. At first the given FANETs system scheme and its specific characteristics have been described respectively. Also,the communication protocol stack model of five layers and its protocol stack software have been proposed. The communication terminal design and the flying test scene have been discussed. Finally, the test results show the system scheme and its communication protocol stack model are feasible.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133649142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper focuses on the dependability analysis and verification technology of artificial intelligence software. Aiming at the dependability problems caused by the uncontrollable algorithm output of artificial intelligence software, misguided learning models and unpredictable software defects, as well as the current intelligent software testing and verification requirements, this paper analyzes the connotation and characteristics of artificial intelligence software dependability, and studies artificial intelligence software dependability mechanism and defect mode analysis method, break through artificial intelligence software dependability verification technology, innovatively build artificial intelligence software dependability index system, and finally form a comprehensive evaluation method for software dependability.
{"title":"Dependability Analysis and Verification Technology of Artificial Intelligence Software","authors":"Yaming Zhang, Lijin Wu, Xiaomei Shen, Zehua Shen, Tongli Tang","doi":"10.1109/QRS-C57518.2022.00041","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00041","url":null,"abstract":"This paper focuses on the dependability analysis and verification technology of artificial intelligence software. Aiming at the dependability problems caused by the uncontrollable algorithm output of artificial intelligence software, misguided learning models and unpredictable software defects, as well as the current intelligent software testing and verification requirements, this paper analyzes the connotation and characteristics of artificial intelligence software dependability, and studies artificial intelligence software dependability mechanism and defect mode analysis method, break through artificial intelligence software dependability verification technology, innovatively build artificial intelligence software dependability index system, and finally form a comprehensive evaluation method for software dependability.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133714328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-01DOI: 10.1109/QRS-C57518.2022.00110
Qinyun Liu, Xiaopeng Xu
The online broadcast scene is a novel scenario in culture and tourism industry in new period. However, the online broadcast control system has not been solved at the technical level. This research describes a collaborative smart control system for seizing actors and scenarios in broadcast online scene based on drama script with pattern recognition. Based on the script of the cultural and artistic forms under the online broadcast scenario, the training parameters of the pattern recognition algorithm are set to recognize the real-time capture of the face, dress, clothing, etc., and the tracking and overall setting control. The kernel algorithm is set with smart decision making system based for seizing actors and clustering algorithm (discrimination analysis) for seizing different scenarios on stage. Connections between equipment serving for the entire broadcasting drama and online presentations are achieved by the wireless network, software and kernel control system.
{"title":"Script Based Pattern Recognition for a Portrait Tracking System on Broadcast Online Scenes","authors":"Qinyun Liu, Xiaopeng Xu","doi":"10.1109/QRS-C57518.2022.00110","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00110","url":null,"abstract":"The online broadcast scene is a novel scenario in culture and tourism industry in new period. However, the online broadcast control system has not been solved at the technical level. This research describes a collaborative smart control system for seizing actors and scenarios in broadcast online scene based on drama script with pattern recognition. Based on the script of the cultural and artistic forms under the online broadcast scenario, the training parameters of the pattern recognition algorithm are set to recognize the real-time capture of the face, dress, clothing, etc., and the tracking and overall setting control. The kernel algorithm is set with smart decision making system based for seizing actors and clustering algorithm (discrimination analysis) for seizing different scenarios on stage. Connections between equipment serving for the entire broadcasting drama and online presentations are achieved by the wireless network, software and kernel control system.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133991490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-01DOI: 10.1109/QRS-C57518.2022.00114
Yue Wu, Xiang Li, Jiafeng Zhou
This paper proposes a creative computing approach to introduce design thinking principles for optimising fashion design students' capabilities, thereby fulfilling the micro-level needs of smart city development. One of the most typical micro-level needs in smart cities is to optimise citizens' well-being and happiness through problem definition, solution generation and consensus-making based on quick, direct, and up-to-date data and information reflecting citizens' situations. Designers, as citizens and significant constructors of smart cities, usually dedicate themselves to optimising people's life qualities by creating products, services and artistic works based on people's needs. Therefore, the design industry usually expects practitioners to possess the capabilities of defining problems, creating concepts, gathering feedback and redesigning. These capabilities constitute the significant parts of the design thinking principles discussed and justify the importance of introducing design thinking. However, challenges still exist when introducing design thinking for instructors. The primary incentives behind these challenges are instructors' limited knowledge, making it difficult to be on the same page with students when selecting the topics, defining problems, and generating design concepts. A creative computing approach could complement instructors' knowledge to support students' topic selection and novel design generation through data collection, manipulation, and presentation. This approach consists of four modules: i) input module, ii) Topic Generation Module, iii) Topic-Design Connection Module, and iv) Supplementary Knowledge Library Module. The creative computing approach would provide a starting point for studying the possibilities of optimising the communication process between educators/instructors and students.
{"title":"A Creative Computing Approach to Optimising Citizens' Fashion Education based on Design Thinking for Responding to Micro-Level Needs of Smart City Development","authors":"Yue Wu, Xiang Li, Jiafeng Zhou","doi":"10.1109/QRS-C57518.2022.00114","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00114","url":null,"abstract":"This paper proposes a creative computing approach to introduce design thinking principles for optimising fashion design students' capabilities, thereby fulfilling the micro-level needs of smart city development. One of the most typical micro-level needs in smart cities is to optimise citizens' well-being and happiness through problem definition, solution generation and consensus-making based on quick, direct, and up-to-date data and information reflecting citizens' situations. Designers, as citizens and significant constructors of smart cities, usually dedicate themselves to optimising people's life qualities by creating products, services and artistic works based on people's needs. Therefore, the design industry usually expects practitioners to possess the capabilities of defining problems, creating concepts, gathering feedback and redesigning. These capabilities constitute the significant parts of the design thinking principles discussed and justify the importance of introducing design thinking. However, challenges still exist when introducing design thinking for instructors. The primary incentives behind these challenges are instructors' limited knowledge, making it difficult to be on the same page with students when selecting the topics, defining problems, and generating design concepts. A creative computing approach could complement instructors' knowledge to support students' topic selection and novel design generation through data collection, manipulation, and presentation. This approach consists of four modules: i) input module, ii) Topic Generation Module, iii) Topic-Design Connection Module, and iv) Supplementary Knowledge Library Module. The creative computing approach would provide a starting point for studying the possibilities of optimising the communication process between educators/instructors and students.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133064454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-01DOI: 10.1109/QRS-C57518.2022.00023
Yixin Fan, Guozhi Hao, Jun Wu
Currently, Machine Learning as a Service (MLaaS) greatly benefits artificial intelligence (AI) model trading. However, threats such as model piracy and patent grabbing devastatingly violate the copyright of AI models. Current invasive copyright protection solutions mainly rely on watermarking to embed specific information into AI models, which inevitably decreases the accuracy. While non-invasive schemes, such as adversarial samples, cannot guarantee uniqueness as the adversarial sample generation algorithm would be known to all traders, and thus need to be changed after trading. To enable the ownership information transferable across AI model trading, we propose a blockchain-driven Non-Fungible Token (NFT) approach for trading-oriented AI model copyright protection. We design a mapping mechanism from AI models parameters to NFTs which can identify uniqueness and ownership of AI models across trading. Besides, a reputation-based rewards and penalties scheme is proposed to prevent NFT piracy. Lastly, the evaluation verifies the applicability of our approach.
{"title":"Transferable Unique Copyright Across AI Model Trading: A Blockchain-Driven Non-Fungible Token Approach","authors":"Yixin Fan, Guozhi Hao, Jun Wu","doi":"10.1109/QRS-C57518.2022.00023","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00023","url":null,"abstract":"Currently, Machine Learning as a Service (MLaaS) greatly benefits artificial intelligence (AI) model trading. However, threats such as model piracy and patent grabbing devastatingly violate the copyright of AI models. Current invasive copyright protection solutions mainly rely on watermarking to embed specific information into AI models, which inevitably decreases the accuracy. While non-invasive schemes, such as adversarial samples, cannot guarantee uniqueness as the adversarial sample generation algorithm would be known to all traders, and thus need to be changed after trading. To enable the ownership information transferable across AI model trading, we propose a blockchain-driven Non-Fungible Token (NFT) approach for trading-oriented AI model copyright protection. We design a mapping mechanism from AI models parameters to NFTs which can identify uniqueness and ownership of AI models across trading. Besides, a reputation-based rewards and penalties scheme is proposed to prevent NFT piracy. Lastly, the evaluation verifies the applicability of our approach.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124384534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-01DOI: 10.1109/QRS-C57518.2022.00103
Haocheng Guan, Dongcheng Li, Hui Li, Man Zhao
Cross-site scripting attacks, as a means of attack against Web applications, are widely used in phishing, information theft and other fields by unscrupulous people because of their wide targeting and hidden implementation methods. Nevertheless, cross-site scripting vulnerability detection is still in its infancy, with plenty of challenges not yet fully explored. In this paper, we propose Crawler-based Cross Site Scripting Detector, a tool based on crawler technology that can effectively detect stored Cross Site Scripting vulnerabilities and reflected Cross Site Scripting vulnerabilities. Subsequently, in order to verify the effectiveness of the tool, we experim ented this tool with existing tools such as XSSer and Burp Suite by selecting 100 vulnerable websites for the tool's efficiency, false alarm rate and underreporting rate. The results show that our tool can effectively detect Cross Site Scripting vulnerabilities.
{"title":"A Crawler-Based Vulnerability Detection Method for Cross-Site Scripting Attacks","authors":"Haocheng Guan, Dongcheng Li, Hui Li, Man Zhao","doi":"10.1109/QRS-C57518.2022.00103","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00103","url":null,"abstract":"Cross-site scripting attacks, as a means of attack against Web applications, are widely used in phishing, information theft and other fields by unscrupulous people because of their wide targeting and hidden implementation methods. Nevertheless, cross-site scripting vulnerability detection is still in its infancy, with plenty of challenges not yet fully explored. In this paper, we propose Crawler-based Cross Site Scripting Detector, a tool based on crawler technology that can effectively detect stored Cross Site Scripting vulnerabilities and reflected Cross Site Scripting vulnerabilities. Subsequently, in order to verify the effectiveness of the tool, we experim ented this tool with existing tools such as XSSer and Burp Suite by selecting 100 vulnerable websites for the tool's efficiency, false alarm rate and underreporting rate. The results show that our tool can effectively detect Cross Site Scripting vulnerabilities.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132167090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-01DOI: 10.1109/QRS-C57518.2022.00052
Wei Guo, Leyang Zhou, Jia Liu, Miaomiao Liu
Based on a systematical discussion of the logical relationship between social mentality as a psychological basis of social actions and institutions and social governance, and the online emotion as the core element of the dynamic tendency of internet-based social mentality to form emotional energy to promote the operation of the internet society, this paper conducts an empirical study on the online social mentality and public sentiment guidance during the COVID-19 epidemic in mainland China. We use more than 1 million Weibo dynamic data of 104 accounts of three different types including official media, self-media, and big V media and conduct emotional calculation and judgment to address our objectives. The results show that the public sentiment presented by Weibo as the carrier is mainly positive, among which the official media play a positive role in guiding emotions, while the role played by big Vs' is limited during the COVID-19 epidemic. There exists different public sentiment stemmed from the regional differences brought by the heterogeneity of social governance, economic and social development beyond the media guidance. The study provides valuable internet governance experience on how the government can guide the public to respond to and deal with the crisis with a positive attitude when major public health emergencies occur in the future.
{"title":"Internet Governance: Social Mentality and Public Emotion Analysis on Online Media during the COVID-19 Epidemic in Mainland China","authors":"Wei Guo, Leyang Zhou, Jia Liu, Miaomiao Liu","doi":"10.1109/QRS-C57518.2022.00052","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00052","url":null,"abstract":"Based on a systematical discussion of the logical relationship between social mentality as a psychological basis of social actions and institutions and social governance, and the online emotion as the core element of the dynamic tendency of internet-based social mentality to form emotional energy to promote the operation of the internet society, this paper conducts an empirical study on the online social mentality and public sentiment guidance during the COVID-19 epidemic in mainland China. We use more than 1 million Weibo dynamic data of 104 accounts of three different types including official media, self-media, and big V media and conduct emotional calculation and judgment to address our objectives. The results show that the public sentiment presented by Weibo as the carrier is mainly positive, among which the official media play a positive role in guiding emotions, while the role played by big Vs' is limited during the COVID-19 epidemic. There exists different public sentiment stemmed from the regional differences brought by the heterogeneity of social governance, economic and social development beyond the media guidance. The study provides valuable internet governance experience on how the government can guide the public to respond to and deal with the crisis with a positive attitude when major public health emergencies occur in the future.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132103164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-01DOI: 10.1109/QRS-C57518.2022.00077
Wenjun Wei, Junhua Wu
Automatic code generation based on natural language input is important to research in the field of software engineering. In the past, it was mostly a seq2seq structure and used the RNN model. Input and output are regarded as simple sequences, and syntactic structure information in source information is often ignored. This paper proposes a code generation method Tx(Tree-Tree). It uses structured trees to replace simple word sequences so that the model can better learn the syntactic and semantic information in the source information. Therefore, it can alleviate the long dependency problem caused by too long source information. At the same time, the enhanced attention mechanism is adopted in the decoder to distinguish the influence of different historical actions on the current predicted action. The model is validated on three datasets: DJANGO, CONALA, and ATIS. Compared with some typical models, Tx(Tree-Tree) improves both accuracy and BLEU.
{"title":"Code Generation Method based on Structured Tree Input and AST Decoder Attention Augmentation","authors":"Wenjun Wei, Junhua Wu","doi":"10.1109/QRS-C57518.2022.00077","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00077","url":null,"abstract":"Automatic code generation based on natural language input is important to research in the field of software engineering. In the past, it was mostly a seq2seq structure and used the RNN model. Input and output are regarded as simple sequences, and syntactic structure information in source information is often ignored. This paper proposes a code generation method Tx(Tree-Tree). It uses structured trees to replace simple word sequences so that the model can better learn the syntactic and semantic information in the source information. Therefore, it can alleviate the long dependency problem caused by too long source information. At the same time, the enhanced attention mechanism is adopted in the decoder to distinguish the influence of different historical actions on the current predicted action. The model is validated on three datasets: DJANGO, CONALA, and ATIS. Compared with some typical models, Tx(Tree-Tree) improves both accuracy and BLEU.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115316033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-01DOI: 10.1109/QRS-C57518.2022.00131
Zongqi Xue, Zhenglin Liang
With the importance of wireless telecommunication services increasing in our daily lives and society operation, the demand for reliable telecommunication networks rapidly grows. However, in contrast to the high reliability of the core telecom systems, the base stations have low redundancy and high failure rate, which lead to a bottleneck in the reliability improvement of the telecommunication network. To figure out the characteristic of the reliability of the base station network, we analyze the compensation mechanism upon the failures of the base station cell by practice data. The results show that the loss of demands caused by base station failures can be compensated by two types of resilience: intrasector resilience and inter-sector resilience. Intra-sector resilience describes the demands absorption occurred between co-sector cells in a base station. Inter-sector resilience is manifested in the demand absorption by the neighbor base stations. We observe these two types of resilience in practical cases and analyze their compensation effects. The results of this paper show that resilience widely exists in base station network and act as an important factor in ensuring the reliability of telecommunication network.
{"title":"Resilience Analysis under the Impact of Cell Failures in the Practical Telecommunication base Station Networks","authors":"Zongqi Xue, Zhenglin Liang","doi":"10.1109/QRS-C57518.2022.00131","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00131","url":null,"abstract":"With the importance of wireless telecommunication services increasing in our daily lives and society operation, the demand for reliable telecommunication networks rapidly grows. However, in contrast to the high reliability of the core telecom systems, the base stations have low redundancy and high failure rate, which lead to a bottleneck in the reliability improvement of the telecommunication network. To figure out the characteristic of the reliability of the base station network, we analyze the compensation mechanism upon the failures of the base station cell by practice data. The results show that the loss of demands caused by base station failures can be compensated by two types of resilience: intrasector resilience and inter-sector resilience. Intra-sector resilience describes the demands absorption occurred between co-sector cells in a base station. Inter-sector resilience is manifested in the demand absorption by the neighbor base stations. We observe these two types of resilience in practical cases and analyze their compensation effects. The results of this paper show that resilience widely exists in base station network and act as an important factor in ensuring the reliability of telecommunication network.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123805014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-01DOI: 10.1109/QRS-C57518.2022.00037
Yao Huang, Bingqing Zhang, Yichen Wang
The application of Service-Oriented Architecture (SOA) system software in safety-critical areas such as aerospace is gradually increasing, and the demand of high-quality SOA system software is increasing too. Due to the feature of loose coupling, SOA system software depends strongly on the correctness of the interfaces among services. Web service composition (WSC) testing in the integration phase of service composition thus becomes exceptionally critical. In a model-based testing framework., the test model lays a foundation for the subsequent test activities to proceed smoothly. In this paper, we propose an approach to automate modeling for WSC testing. The idea is to automate the construction of a highly visualized model by fetching adequate test information from two documents in the design phase. Compared to the existing modeling methods, the proposed method is more sufficient in WSC test information extraction. In addition, we also promote the degree of visualization and automation for test modeling. In the end, a case study is conducted to verify the effectiveness of the proposed modeling approach.
{"title":"Automated Modeling of Web Service Composition and Testing: A UML Sequence Diagram-Based Approach","authors":"Yao Huang, Bingqing Zhang, Yichen Wang","doi":"10.1109/QRS-C57518.2022.00037","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00037","url":null,"abstract":"The application of Service-Oriented Architecture (SOA) system software in safety-critical areas such as aerospace is gradually increasing, and the demand of high-quality SOA system software is increasing too. Due to the feature of loose coupling, SOA system software depends strongly on the correctness of the interfaces among services. Web service composition (WSC) testing in the integration phase of service composition thus becomes exceptionally critical. In a model-based testing framework., the test model lays a foundation for the subsequent test activities to proceed smoothly. In this paper, we propose an approach to automate modeling for WSC testing. The idea is to automate the construction of a highly visualized model by fetching adequate test information from two documents in the design phase. Compared to the existing modeling methods, the proposed method is more sufficient in WSC test information extraction. In addition, we also promote the degree of visualization and automation for test modeling. In the end, a case study is conducted to verify the effectiveness of the proposed modeling approach.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130887244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}