首页 > 最新文献

Other Conferences最新文献

英文 中文
Software vulnerability detection method based on code attribute graph presentation and Bi-LSTM neural network extraction 基于代码属性图展示和 Bi-LSTM 神经网络提取的软件漏洞检测方法
Pub Date : 2024-06-06 DOI: 10.1117/12.3032032
Hanqing Jiang, Shaopei Ji, Chengchao Zha, Yanhong Liu
Nowadays, the scale of software is getting larger and more complex. The forms of vulnerability also tend to be more diversified. Traditional vulnerability detection methods have the disadvantages of high manual participation and weak ability to detect unknown vulnerabilities. It can no longer meet the detection requirements of diversified vulnerabilities. In order to improve the detection effect of unknown vulnerabilities, A large number of machine learning methods have been applied to the field of software vulnerability detection. Because the existing methods have high loss of syntax and semantic information in the process of code representation, Lead to high false alarm rate and false alarm rate. To solve this problem, this paper presents a software vulnerability detection method based on code attribute graph and Bi-LSTM (Long Short-Term Memory), in which abstract syntax tree sequence and control flow graph sequence are extracted from the code attribute graph of function, Reduce the loss of information in the process of code representation, Bi-LSTM is selected to build a feature extraction model, Experimental results show that, compared with the method based on abstract syntax tree, this method can greatly improve the accuracy and recall of vulnerability detection, improve the vulnerability detection effect for real data sets mixed with multiple software source codes, and effectively reduce the false positive rate and false negative rate.
如今,软件的规模越来越大,也越来越复杂。漏洞的形式也趋于多样化。传统的漏洞检测方法存在人工参与度高、对未知漏洞的检测能力弱等缺点。已无法满足多样化漏洞的检测要求。为了提高未知漏洞的检测效果,大量机器学习方法被应用到软件漏洞检测领域。由于现有方法在代码表示过程中语法和语义信息丢失较多,导致误报率和误判率较高。为了解决这一问题,本文提出了一种基于代码属性图和 Bi-LSTM (长短期记忆)的软件漏洞检测方法,即从函数的代码属性图中提取抽象语法树序列和控制流图序列,减少代码表示过程中的信息损失、实验结果表明,与基于抽象语法树的方法相比,该方法能极大地提高漏洞检测的准确率和召回率,改善混合了多个软件源代码的真实数据集的漏洞检测效果,有效降低假阳性率和假阴性率。
{"title":"Software vulnerability detection method based on code attribute graph presentation and Bi-LSTM neural network extraction","authors":"Hanqing Jiang, Shaopei Ji, Chengchao Zha, Yanhong Liu","doi":"10.1117/12.3032032","DOIUrl":"https://doi.org/10.1117/12.3032032","url":null,"abstract":"Nowadays, the scale of software is getting larger and more complex. The forms of vulnerability also tend to be more diversified. Traditional vulnerability detection methods have the disadvantages of high manual participation and weak ability to detect unknown vulnerabilities. It can no longer meet the detection requirements of diversified vulnerabilities. In order to improve the detection effect of unknown vulnerabilities, A large number of machine learning methods have been applied to the field of software vulnerability detection. Because the existing methods have high loss of syntax and semantic information in the process of code representation, Lead to high false alarm rate and false alarm rate. To solve this problem, this paper presents a software vulnerability detection method based on code attribute graph and Bi-LSTM (Long Short-Term Memory), in which abstract syntax tree sequence and control flow graph sequence are extracted from the code attribute graph of function, Reduce the loss of information in the process of code representation, Bi-LSTM is selected to build a feature extraction model, Experimental results show that, compared with the method based on abstract syntax tree, this method can greatly improve the accuracy and recall of vulnerability detection, improve the vulnerability detection effect for real data sets mixed with multiple software source codes, and effectively reduce the false positive rate and false negative rate.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141376948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimization of parallel compilation techniques using genetic algorithms 利用遗传算法优化并行编译技术
Pub Date : 2024-06-06 DOI: 10.1117/12.3031912
Lin Han, Pengyan Yan
This paper addresses the issue of low parallel efficiency resulting from fixed thread allocation in automatic parallelization compilation technology. The authors employ a genetic algorithm to determine the optimal number of threads for individual parallelizable loops. They then utilize iterative compilation techniques to produce the suitable number of threads for each parallelizable loop structure, thereby enhancing the efficiency of automatic parallelization compilation. The proposed method demonstrated an average performance enhancement of 26% across ten benchmarks in the SPEC CPU2006 test suite and an overall performance improvement of 3.7% in the NPB3.4.2 test suite, thereby indicating the viability and efficacy of the approach. The approach outlined in this paper can be utilized as a benchmark for enhancing the effectiveness of automated parallel computing and promoting the progression of automated parallel computing technology.
本文探讨了自动并行化编译技术中固定线程分配导致并行效率低的问题。作者采用遗传算法来确定单个可并行循环的最佳线程数。然后,他们利用迭代编译技术为每个可并行循环结构生成合适的线程数,从而提高了自动并行化编译的效率。所提出的方法在 SPEC CPU2006 测试套件的十个基准中平均提高了 26% 的性能,在 NPB3.4.2 测试套件中总体性能提高了 3.7%,从而表明了该方法的可行性和有效性。本文概述的方法可作为提高自动并行计算效率和促进自动并行计算技术发展的基准。
{"title":"Optimization of parallel compilation techniques using genetic algorithms","authors":"Lin Han, Pengyan Yan","doi":"10.1117/12.3031912","DOIUrl":"https://doi.org/10.1117/12.3031912","url":null,"abstract":"This paper addresses the issue of low parallel efficiency resulting from fixed thread allocation in automatic parallelization compilation technology. The authors employ a genetic algorithm to determine the optimal number of threads for individual parallelizable loops. They then utilize iterative compilation techniques to produce the suitable number of threads for each parallelizable loop structure, thereby enhancing the efficiency of automatic parallelization compilation. The proposed method demonstrated an average performance enhancement of 26% across ten benchmarks in the SPEC CPU2006 test suite and an overall performance improvement of 3.7% in the NPB3.4.2 test suite, thereby indicating the viability and efficacy of the approach. The approach outlined in this paper can be utilized as a benchmark for enhancing the effectiveness of automated parallel computing and promoting the progression of automated parallel computing technology.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141377852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new zhoneypot defence for deep neural networks 针对深度神经网络的新型 "zhoneypot "防御系统
Pub Date : 2024-06-06 DOI: 10.1117/12.3031913
Zhou Zhou
Deep Neural Networks (DNNs) have been found to be vulnerable to adversarial attacks. Numerous prior studies aim to address vulnerabilities in trained models, either by patching these weaknesses or by introducing measures to make it challenging or resource-intensive to compute adversarial examples exploiting them. In our research, we take a distinctive approach by exploring and developing a "honeypot" (DMZ-enabled) strategy for Deep Neural Networks (DNNs) to safeguard against adversarial attacks, setting our work apart from existing methods in the protection of DNN models. Unlike other methods, instead of modifying the original model, we split this high dimensional space to get DMZ (demilitarized zone). We intentionally keep weaknesses like traditional honeypot do in the classification model that allow adversaries to search for adversarial examples. The adversary's optimization algorithms gravitate towards DMZ, the examples they generate in the feature space will eventually fall into the DMZ. Then, by checking if the input example falls into the DMZ, we can pick out the adversarial example. More specifically, in this paper, we introduce DMZ in DNN classifiers and show an implementation of a DMZ-enabled defense named zHoneypot. We integrate the current SOTA (state-of-the-art) adversarial example defense methods, i.e., mitigation and detection, into a single approach zHoneypot, we show experimentally that DMZ-protected models can proper handling adversarial examples which generated by state-of-the-art white-box attacks (such as FGSM, PGD, CW, OnePixel and DeepFool) with high accuracy, and with negligible impact on normal benign model. In the end, our defense method achieved a score of 97.66 on MNIST, 86.1 on CIFAR10, and 90.94 on SVHN.
人们发现,深度神经网络(DNN)很容易受到恶意攻击。之前的许多研究都旨在解决训练模型中的漏洞,要么修补这些弱点,要么引入措施,使利用这些弱点计算对抗性示例变得具有挑战性或资源密集型。在我们的研究中,我们采取了一种与众不同的方法,探索并开发了一种针对深度神经网络(DNN)的 "蜜罐"(DMZ-enabled)策略,以防范对抗性攻击,从而使我们的工作有别于现有的保护深度神经网络模型的方法。与其他方法不同的是,我们没有修改原始模型,而是将这个高维空间分割成 DMZ(非军事区)。我们有意在分类模型中保留了像传统蜜罐一样的弱点,允许对手搜索敌对示例。对手的优化算法倾向于 DMZ,他们在特征空间中生成的示例最终会落入 DMZ。然后,通过检查输入示例是否落入 DMZ,我们就能找出对抗示例。更具体地说,在本文中,我们在 DNN 分类器中引入了 DMZ,并展示了名为 zHoneypot 的 DMZ 防御实现。我们将当前的 SOTA(最先进的)对抗性示例防御方法(即缓解和检测)集成到了一个单一的方法 zHoneypot 中,我们通过实验证明,受 DMZ 保护的模型可以高精度地正确处理由最先进的白盒攻击(如 FGSM、PGD、CW、OnePixel 和 DeepFool)产生的对抗性示例,并且对正常良性模型的影响可以忽略不计。最终,我们的防御方法在 MNIST 上获得了 97.66 分,在 CIFAR10 上获得了 86.1 分,在 SVHN 上获得了 90.94 分。
{"title":"A new zhoneypot defence for deep neural networks","authors":"Zhou Zhou","doi":"10.1117/12.3031913","DOIUrl":"https://doi.org/10.1117/12.3031913","url":null,"abstract":"Deep Neural Networks (DNNs) have been found to be vulnerable to adversarial attacks. Numerous prior studies aim to address vulnerabilities in trained models, either by patching these weaknesses or by introducing measures to make it challenging or resource-intensive to compute adversarial examples exploiting them. In our research, we take a distinctive approach by exploring and developing a \"honeypot\" (DMZ-enabled) strategy for Deep Neural Networks (DNNs) to safeguard against adversarial attacks, setting our work apart from existing methods in the protection of DNN models. Unlike other methods, instead of modifying the original model, we split this high dimensional space to get DMZ (demilitarized zone). We intentionally keep weaknesses like traditional honeypot do in the classification model that allow adversaries to search for adversarial examples. The adversary's optimization algorithms gravitate towards DMZ, the examples they generate in the feature space will eventually fall into the DMZ. Then, by checking if the input example falls into the DMZ, we can pick out the adversarial example. More specifically, in this paper, we introduce DMZ in DNN classifiers and show an implementation of a DMZ-enabled defense named zHoneypot. We integrate the current SOTA (state-of-the-art) adversarial example defense methods, i.e., mitigation and detection, into a single approach zHoneypot, we show experimentally that DMZ-protected models can proper handling adversarial examples which generated by state-of-the-art white-box attacks (such as FGSM, PGD, CW, OnePixel and DeepFool) with high accuracy, and with negligible impact on normal benign model. In the end, our defense method achieved a score of 97.66 on MNIST, 86.1 on CIFAR10, and 90.94 on SVHN.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141380776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of a flow detection system for high pressure reducing valves in ships 船舶高压减压阀流量检测系统的设计
Pub Date : 2024-06-06 DOI: 10.1117/12.3031899
Jing Rui, Lidong Zhang
This paper designs a flow detection system for marine high-pressure pressure reducing valves, focusing on the hardware selection and inspection methods of the system. The detection system software is completed according to the design requirements to achieve the function of the flow detection system.
本文设计了一种船用高压减压阀流量检测系统,重点介绍了系统的硬件选型和检测方法。根据设计要求完成了检测系统软件,实现了流量检测系统的功能。
{"title":"Design of a flow detection system for high pressure reducing valves in ships","authors":"Jing Rui, Lidong Zhang","doi":"10.1117/12.3031899","DOIUrl":"https://doi.org/10.1117/12.3031899","url":null,"abstract":"This paper designs a flow detection system for marine high-pressure pressure reducing valves, focusing on the hardware selection and inspection methods of the system. The detection system software is completed according to the design requirements to achieve the function of the flow detection system.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141379076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On-chain federated learning approach for Internet of Vehicles 用于车联网的链上联合学习方法
Pub Date : 2024-06-06 DOI: 10.1117/12.3031889
Chen Fang, Wenkai Di, Mengqi Cao
In the field of telematics, the nature of traffic data leads to its scattering, involving numerous traffic objects with individual sensitive information. Consequently, sharing a large amount of data becomes difficult, resulting in the existence of "data silos". To address this issue, this paper proposes a scheme that combines coalition learning and blockchain for the purpose of data sharing and privacy protection. The scheme involves modeling multi-source vehicle data using federated learning and storing the trained model parameters and reputation values of participating vehicles on the blockchain. Furthermore, a reputation value calculation method based on the double subjective logic model is proposed, which analyzes the impact of data source quality on the performance of the federated learning algorithm. This calculation method helps in the selection of the client for federated learning, ensuring efficient screening of data sources, improving sharing efficiency, and achieving privacy protection in data sharing. Finally, a simulation analysis is conducted to evaluate the proposed scheme, and the results demonstrate its capability to filter high-quality data sources in real-time dynamic data exchange scenarios of telematics, thereby enhancing the accuracy of federated learning training.
在远程信息处理领域,交通数据的性质导致其分散性,涉及到众多交通对象的个人敏感信息。因此,共享大量数据变得困难,导致 "数据孤岛 "的存在。针对这一问题,本文提出了一种将联盟学习和区块链相结合的方案,以实现数据共享和隐私保护的目的。该方案包括利用联盟学习对多源车辆数据建模,并将训练好的模型参数和参与车辆的信誉值存储在区块链上。此外,还提出了一种基于双重主观逻辑模型的声誉值计算方法,该方法分析了数据源质量对联合学习算法性能的影响。该计算方法有助于联合学习客户端的选择,确保高效筛选数据源,提高共享效率,实现数据共享中的隐私保护。最后,对提出的方案进行了仿真分析评估,结果表明该方案能够在远程信息处理的实时动态数据交换场景中筛选出高质量的数据源,从而提高联合学习训练的准确性。
{"title":"On-chain federated learning approach for Internet of Vehicles","authors":"Chen Fang, Wenkai Di, Mengqi Cao","doi":"10.1117/12.3031889","DOIUrl":"https://doi.org/10.1117/12.3031889","url":null,"abstract":"In the field of telematics, the nature of traffic data leads to its scattering, involving numerous traffic objects with individual sensitive information. Consequently, sharing a large amount of data becomes difficult, resulting in the existence of \"data silos\". To address this issue, this paper proposes a scheme that combines coalition learning and blockchain for the purpose of data sharing and privacy protection. The scheme involves modeling multi-source vehicle data using federated learning and storing the trained model parameters and reputation values of participating vehicles on the blockchain. Furthermore, a reputation value calculation method based on the double subjective logic model is proposed, which analyzes the impact of data source quality on the performance of the federated learning algorithm. This calculation method helps in the selection of the client for federated learning, ensuring efficient screening of data sources, improving sharing efficiency, and achieving privacy protection in data sharing. Finally, a simulation analysis is conducted to evaluate the proposed scheme, and the results demonstrate its capability to filter high-quality data sources in real-time dynamic data exchange scenarios of telematics, thereby enhancing the accuracy of federated learning training.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141381107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Zero trust-based federated autonomous technology for code repository 基于零信任的联合自主代码库技术
Pub Date : 2024-06-06 DOI: 10.1117/12.3031893
Fuxi Wang, Bo Shen, Xi Zhao, Jian Huang
The code repository stores all the code, configuration files, and historical versions of the enterprise, which is an essential tool in the software development process. However, it also brings unprecedented security threats to enterprises, and the traditional network security architecture has been unable to satisfy the high-security and high-reliability management requirements of the code assets of research institutions. To this end, based on the Zero Trust (ZT) security paradigm, we propose a code repository federated autonomous technology, build a decentralized and distributed autonomous security protection mechanism, realize bidirectional identity authentication and dynamic trust evaluation mechanism for the authorization management of code resources, improve the security and protection level of the code repository, and effectively solve the security protection shortcomings of the existing collaborative research and development environment.
代码库存储了企业所有的代码、配置文件和历史版本,是软件开发过程中必不可少的工具。然而,它也给企业带来了前所未有的安全威胁,传统的网络安全架构已无法满足科研机构代码资产高安全性和高可靠性的管理要求。为此,我们基于零信任(ZT)安全范式,提出了代码库联盟自治技术,构建了去中心化的分布式自治安全防护机制,实现了代码资源授权管理的双向身份认证和动态信任评估机制,提高了代码库的安全防护水平,有效解决了现有协同研发环境的安全防护弊端。
{"title":"Zero trust-based federated autonomous technology for code repository","authors":"Fuxi Wang, Bo Shen, Xi Zhao, Jian Huang","doi":"10.1117/12.3031893","DOIUrl":"https://doi.org/10.1117/12.3031893","url":null,"abstract":"The code repository stores all the code, configuration files, and historical versions of the enterprise, which is an essential tool in the software development process. However, it also brings unprecedented security threats to enterprises, and the traditional network security architecture has been unable to satisfy the high-security and high-reliability management requirements of the code assets of research institutions. To this end, based on the Zero Trust (ZT) security paradigm, we propose a code repository federated autonomous technology, build a decentralized and distributed autonomous security protection mechanism, realize bidirectional identity authentication and dynamic trust evaluation mechanism for the authorization management of code resources, improve the security and protection level of the code repository, and effectively solve the security protection shortcomings of the existing collaborative research and development environment.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141378921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient multiparty private set intersection protocol based on function secret sharing 基于函数秘密共享的高效多方私有集合相交协议
Pub Date : 2024-06-06 DOI: 10.1117/12.3031902
Zhen Sun
Multiparty Private Set Intersection (MPSI) protocols afford protection of set data privacy but concurrently introduce substantial computational overhead. While this overhead is tolerable when dealing with modest-sized sets and a limited number of participants, it becomes burdensome as set cardinality and participant count escalate. Consequently, these protocols exhibit constraints regarding set size or participant quantity, thereby diminishing their practical feasibility in scenarios involving extensive sets and numerous participants. To address these challenges, this paper introduces a novel MPSI protocol based on function secret sharing. Our protocol effectively computes the intersection elements while ensuring the confidentiality of set data, rendering it well-suited for scenarios characterized by a considerable number of candidates and large-scale sets. Extensive testing and comparative analysis against other MPSI protocols are conducted to evaluate the proposed protocol's performance and effectiveness.
多方私密集合交集(MPSI)协议可保护集合数据隐私,但同时也会带来巨大的计算开销。虽然在处理规模适中的集合和数量有限的参与者时,这种开销是可以承受的,但随着集合的卡入度和参与者数量的增加,这种开销就会成为一种负担。因此,这些协议在集合大小或参与者数量方面受到了限制,从而降低了它们在涉及大量集合和众多参与者的情况下的实际可行性。为了应对这些挑战,本文介绍了一种基于函数秘密共享的新型 MPSI 协议。我们的协议既能有效计算交集元素,又能确保集合数据的保密性,因此非常适合以大量候选者和大规模集合为特征的场景。我们进行了广泛的测试和与其他 MPSI 协议的比较分析,以评估所提出协议的性能和有效性。
{"title":"Efficient multiparty private set intersection protocol based on function secret sharing","authors":"Zhen Sun","doi":"10.1117/12.3031902","DOIUrl":"https://doi.org/10.1117/12.3031902","url":null,"abstract":"Multiparty Private Set Intersection (MPSI) protocols afford protection of set data privacy but concurrently introduce substantial computational overhead. While this overhead is tolerable when dealing with modest-sized sets and a limited number of participants, it becomes burdensome as set cardinality and participant count escalate. Consequently, these protocols exhibit constraints regarding set size or participant quantity, thereby diminishing their practical feasibility in scenarios involving extensive sets and numerous participants. To address these challenges, this paper introduces a novel MPSI protocol based on function secret sharing. Our protocol effectively computes the intersection elements while ensuring the confidentiality of set data, rendering it well-suited for scenarios characterized by a considerable number of candidates and large-scale sets. Extensive testing and comparative analysis against other MPSI protocols are conducted to evaluate the proposed protocol's performance and effectiveness.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141377273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of civil aircraft project management capability based on improved analytic hierarchy process algorithm 基于改进的层次分析法算法的民用飞机项目管理能力评估
Pub Date : 2024-06-06 DOI: 10.1117/12.3032036
Zhuo Chen
Risk management is a critical factor that influences the success or failure of project management in the development of civil aircraft models. At present, research on project management capability assessment of civil aircraft models is mostly based on qualitative analysis and lacks analysis based on quantitative indicators, which leads to certain limitations in capability assessment. This article uses the Delphi method to obtain the weights of 8 indicators that affect project management ability in the form of a questionnaire. The Analytic Hierarchy Process (AHP) based Analytic Hierarchy Process (YAAHP) software is used to model and calculate the level of project management ability, and suggestions for improving project management ability are proposed.
风险管理是影响民机型号研制项目管理成败的关键因素。目前,对民机型号项目管理能力评估的研究多以定性分析为主,缺乏基于定量指标的分析,导致能力评估存在一定的局限性。本文采用德尔菲法,以调查问卷的形式得出影响项目管理能力的 8 个指标的权重。采用基于层次分析法(AHP)的层次分析法(YAAHP)软件对项目管理能力水平进行建模和计算,并提出提高项目管理能力的建议。
{"title":"Evaluation of civil aircraft project management capability based on improved analytic hierarchy process algorithm","authors":"Zhuo Chen","doi":"10.1117/12.3032036","DOIUrl":"https://doi.org/10.1117/12.3032036","url":null,"abstract":"Risk management is a critical factor that influences the success or failure of project management in the development of civil aircraft models. At present, research on project management capability assessment of civil aircraft models is mostly based on qualitative analysis and lacks analysis based on quantitative indicators, which leads to certain limitations in capability assessment. This article uses the Delphi method to obtain the weights of 8 indicators that affect project management ability in the form of a questionnaire. The Analytic Hierarchy Process (AHP) based Analytic Hierarchy Process (YAAHP) software is used to model and calculate the level of project management ability, and suggestions for improving project management ability are proposed.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141380474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prediction and application of wax thickness on tube wall based on improved DGM (1,1) model 基于改进的 DGM (1,1) 模型的管壁蜡厚度预测与应用
Pub Date : 2024-06-06 DOI: 10.1117/12.3032055
Changkun Cheng, Menglong Zhao, Hui Shen, Benquan Li, Yanping Liu, Pei Yang
In order to study the change of wax deposition thickness with time, an improved DGM (1,1) model was established based on the grey theory model. Taking indoor loop experiment and field pipeline data as examples, the weakening buffer operator and translation transform were introduced to improve the smoothness of the original sequence, and the different models were tested and compared. The results show that the average relative error of the traditional DGM (1,1) model is large, and the error of the improved model is greatly reduced after the weakening buffer operator treatment, and the d2 operator is more suitable for predicting the wax thickness of short sequence and wide spacing sequence. Translation transformation of the original sequence can improve the smoothness of the sequence, and different original sequences have selectivity on the offset of translation transformation function. The effect of weakening buffer operator on model improvement is much better than that of translational transformation. It is feasible to use the modified GM (1,1) model to predict the wax thickness of tube wall, and this method has certain popularization value.
为了研究蜡沉积厚度随时间的变化,在灰色理论模型的基础上建立了改进的 DGM (1,1) 模型。以室内环路实验和现场管线数据为例,引入弱化缓冲算子和平移变换来提高原始序列的平滑度,并对不同模型进行了测试和比较。结果表明,传统 DGM (1,1) 模型的平均相对误差较大,而经过削弱缓冲算子处理后的改进模型误差大大减小,且 d2 算子更适合预测短序列和宽间距序列的蜡厚度。对原始序列进行平移变换可以提高序列的平滑度,不同的原始序列对平移变换函数的偏移量具有选择性。弱化缓冲算子对模型改进的效果远远好于平移变换。利用改进的 GM(1,1)模型预测管壁蜡厚度是可行的,该方法具有一定的推广价值。
{"title":"Prediction and application of wax thickness on tube wall based on improved DGM (1,1) model","authors":"Changkun Cheng, Menglong Zhao, Hui Shen, Benquan Li, Yanping Liu, Pei Yang","doi":"10.1117/12.3032055","DOIUrl":"https://doi.org/10.1117/12.3032055","url":null,"abstract":"In order to study the change of wax deposition thickness with time, an improved DGM (1,1) model was established based on the grey theory model. Taking indoor loop experiment and field pipeline data as examples, the weakening buffer operator and translation transform were introduced to improve the smoothness of the original sequence, and the different models were tested and compared. The results show that the average relative error of the traditional DGM (1,1) model is large, and the error of the improved model is greatly reduced after the weakening buffer operator treatment, and the d2 operator is more suitable for predicting the wax thickness of short sequence and wide spacing sequence. Translation transformation of the original sequence can improve the smoothness of the sequence, and different original sequences have selectivity on the offset of translation transformation function. The effect of weakening buffer operator on model improvement is much better than that of translational transformation. It is feasible to use the modified GM (1,1) model to predict the wax thickness of tube wall, and this method has certain popularization value.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141377565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design method and system of software application based on intelligent terminal 基于智能终端的软件应用程序设计方法和系统
Pub Date : 2024-06-06 DOI: 10.1117/12.3031922
Tao Du
Traditional terminal devices generally adopt a process oriented integrated software architecture design scheme, with high coupling between software and hardware modules in various business units. As more and more business modules are connected to intelligent terminals, the software complexity of intelligent terminals also increases exponentially. The complexity of processing new business functions is high, and the development of business software can only be carried out by terminal hardware vendors, making it difficult to meet the needs of flexible business adjustments and rapid installation and deployment. This article designs a software APP based method and system for various data collection needs in intelligent terminals. The hardware of intelligent terminals adopts a modular, scalable, and low-power design, which is adaptable to complex operating environments and has high reliability and stability; By using Docker technology to achieve software and hardware decoupling, APPs communicate through the MQTT protocol, solving the problem of data sharing between different containers and multiple applications within the terminal, and improving the data collection performance of intelligent terminals.
传统终端设备一般采用面向流程的集成软件架构设计方案,各业务单元的软硬件模块之间耦合度较高。随着越来越多的业务模块接入智能终端,智能终端的软件复杂度也呈指数级增长。新业务功能的处理复杂度高,业务软件的开发只能由终端硬件厂商进行,难以满足灵活调整业务、快速安装部署的需求。本文针对智能终端的各种数据采集需求,设计了一种基于软件 APP 的方法和系统。智能终端硬件采用模块化、可扩展、低功耗设计,适应复杂运行环境,具有高可靠性和稳定性;利用Docker技术实现软硬件解耦,APP通过MQTT协议进行通信,解决了终端内不同容器、多个应用之间的数据共享问题,提高了智能终端的数据采集性能。
{"title":"Design method and system of software application based on intelligent terminal","authors":"Tao Du","doi":"10.1117/12.3031922","DOIUrl":"https://doi.org/10.1117/12.3031922","url":null,"abstract":"Traditional terminal devices generally adopt a process oriented integrated software architecture design scheme, with high coupling between software and hardware modules in various business units. As more and more business modules are connected to intelligent terminals, the software complexity of intelligent terminals also increases exponentially. The complexity of processing new business functions is high, and the development of business software can only be carried out by terminal hardware vendors, making it difficult to meet the needs of flexible business adjustments and rapid installation and deployment. This article designs a software APP based method and system for various data collection needs in intelligent terminals. The hardware of intelligent terminals adopts a modular, scalable, and low-power design, which is adaptable to complex operating environments and has high reliability and stability; By using Docker technology to achieve software and hardware decoupling, APPs communicate through the MQTT protocol, solving the problem of data sharing between different containers and multiple applications within the terminal, and improving the data collection performance of intelligent terminals.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141376434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Other Conferences
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1