In order to improve the server software performance of the mine positioning system based on B / S mode.This paper first introduces the B / S mode characteristics and the Ajax SVG technology. Then, for improving the efficiency of the system response, the Ajax's data refresh technology but not refreshing the whole page is proposed, and a vector graphics to display personnel positioning by using SVG technology is created. Finally, coal positioning system is put into the computer through the network management system , it is benefit to coal mine safety production and emergency rescue.
{"title":"Ajax-based Positioning System for Coal Miners","authors":"Xiaokui Chen, X. Fang, Xinqing Lin","doi":"10.1109/WCSE.2012.33","DOIUrl":"https://doi.org/10.1109/WCSE.2012.33","url":null,"abstract":"In order to improve the server software performance of the mine positioning system based on B / S mode.This paper first introduces the B / S mode characteristics and the Ajax SVG technology. Then, for improving the efficiency of the system response, the Ajax's data refresh technology but not refreshing the whole page is proposed, and a vector graphics to display personnel positioning by using SVG technology is created. Finally, coal positioning system is put into the computer through the network management system , it is benefit to coal mine safety production and emergency rescue.","PeriodicalId":244586,"journal":{"name":"2012 Third World Congress on Software Engineering","volume":"124 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122873284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Concepts similarity calculation is the basis for ontology mapping. Vocabulary, meaning of the word, property and instance of concepts are the important facts when calculating concepts similarity. All the facts above are combined and a composite method is proposed to calculate concepts similarity in this paper. In order to keep the effectiveness and comprehensiveness of the method, we combine concepts vocabularies matching algorithm, synonyms basing on Word Net matching algorithm, concepts properties and instances similarities. By calculating test data, the experiment result shows that the method can calculate concepts similarity effectively between two steel ontologies.
{"title":"Study of Concept Similarity Algorithm between Steel Ontologies","authors":"Yu Hu, Wenjie Li, Si-Ling Liu","doi":"10.1109/WCSE.2012.12","DOIUrl":"https://doi.org/10.1109/WCSE.2012.12","url":null,"abstract":"Concepts similarity calculation is the basis for ontology mapping. Vocabulary, meaning of the word, property and instance of concepts are the important facts when calculating concepts similarity. All the facts above are combined and a composite method is proposed to calculate concepts similarity in this paper. In order to keep the effectiveness and comprehensiveness of the method, we combine concepts vocabularies matching algorithm, synonyms basing on Word Net matching algorithm, concepts properties and instances similarities. By calculating test data, the experiment result shows that the method can calculate concepts similarity effectively between two steel ontologies.","PeriodicalId":244586,"journal":{"name":"2012 Third World Congress on Software Engineering","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124570463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper proposes an approach to evaluate user satisfaction of adaptation in service-based business processes execution. First, Withdrawal business spanning graph is introduced to achieve adaptation of service-based business processes at run-time. Second, a set of well-defined Quality of Service (QoS) criteria is used to evaluate user satisfaction. Finally, three simulation examples of adaptation in service-based business processes are given. Simulations prove that this approach can efficiently guarantee the reliability of service-based business processes at run-time.
{"title":"User Satisfaction of Adaptation in Service-based Business Processes Execution","authors":"Zongmin Shang","doi":"10.1109/WCSE.2012.24","DOIUrl":"https://doi.org/10.1109/WCSE.2012.24","url":null,"abstract":"This paper proposes an approach to evaluate user satisfaction of adaptation in service-based business processes execution. First, Withdrawal business spanning graph is introduced to achieve adaptation of service-based business processes at run-time. Second, a set of well-defined Quality of Service (QoS) criteria is used to evaluate user satisfaction. Finally, three simulation examples of adaptation in service-based business processes are given. Simulations prove that this approach can efficiently guarantee the reliability of service-based business processes at run-time.","PeriodicalId":244586,"journal":{"name":"2012 Third World Congress on Software Engineering","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126284487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Soil erosion causes the loss of soil resources, the degradation of land fertility and the deterioration of regional ecological environment. Supported by the Geographical Information System (GIS), this paper takes Changting County in Fujian Province as an example. According to the intensity status quo of soil erosion, and on the statistical basis of the demarcation of the erodibility hazard rating, the 3S (Remote Sensing, Geographical Information System and Global Positioning System) technology and the spatial modeling functions are adopted to build a soil erosion control research system of demarcation ranging from the erodibility status quo to the erosion control pattern and the erosion control measures supported by the 3S technology to demarcate the spatial suitability of a series of soil erosion control measures. The result indicates that the intuitively feasible and operable advantage of the 3S technology in spatial data processing, integration and analysis could lay a theoretical and practical foundation for the further in-depth development of soil erosion control and a basis for competent departments' policy-making via the analysis of the soil erosion control pattern and the spatially rationalized deployments for the control measures.
{"title":"Spatial Decision Analysis on Soil Erosion Control Measures Research Based on GIS: Taking Changting Country as an Example","authors":"X. Sui, Chen Lin, Shenglu Zhou","doi":"10.1109/WCSE.2012.29","DOIUrl":"https://doi.org/10.1109/WCSE.2012.29","url":null,"abstract":"Soil erosion causes the loss of soil resources, the degradation of land fertility and the deterioration of regional ecological environment. Supported by the Geographical Information System (GIS), this paper takes Changting County in Fujian Province as an example. According to the intensity status quo of soil erosion, and on the statistical basis of the demarcation of the erodibility hazard rating, the 3S (Remote Sensing, Geographical Information System and Global Positioning System) technology and the spatial modeling functions are adopted to build a soil erosion control research system of demarcation ranging from the erodibility status quo to the erosion control pattern and the erosion control measures supported by the 3S technology to demarcate the spatial suitability of a series of soil erosion control measures. The result indicates that the intuitively feasible and operable advantage of the 3S technology in spatial data processing, integration and analysis could lay a theoretical and practical foundation for the further in-depth development of soil erosion control and a basis for competent departments' policy-making via the analysis of the soil erosion control pattern and the spatially rationalized deployments for the control measures.","PeriodicalId":244586,"journal":{"name":"2012 Third World Congress on Software Engineering","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130470711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
So far open source software has been developed for several decades. Linux has gradually become one of the major operating systems. The issue that Windows application migration can be migrate to Linux is raised. However, there is great difference in the implementation mechanism between Windows and Linux. In this research, we try to build an middle layer which between application and operating system to shield the differences between the underlying operating system for the upper layer application. The middle layer provide unified fixed interface by packaging different operating system calls, so as to make the same source code can be directly translated on different operating systems with no change. It can achieve the migration of the application in source code level. In this paper, we introduce the Simulation Windows memory management mechanism. We build a Windows-like virtual memory management mechanism which simulates Windows virtual memory management on Linux. And also implement Windows heap management mechanism on Linux. And finally, two experiments are given to test and verify our approach.
{"title":"An Approach of Windows Memory Management Simulation on Linux","authors":"Rui Li, Nanjun Yang, Shilong Ma","doi":"10.1109/WCSE.2012.34","DOIUrl":"https://doi.org/10.1109/WCSE.2012.34","url":null,"abstract":"So far open source software has been developed for several decades. Linux has gradually become one of the major operating systems. The issue that Windows application migration can be migrate to Linux is raised. However, there is great difference in the implementation mechanism between Windows and Linux. In this research, we try to build an middle layer which between application and operating system to shield the differences between the underlying operating system for the upper layer application. The middle layer provide unified fixed interface by packaging different operating system calls, so as to make the same source code can be directly translated on different operating systems with no change. It can achieve the migration of the application in source code level. In this paper, we introduce the Simulation Windows memory management mechanism. We build a Windows-like virtual memory management mechanism which simulates Windows virtual memory management on Linux. And also implement Windows heap management mechanism on Linux. And finally, two experiments are given to test and verify our approach.","PeriodicalId":244586,"journal":{"name":"2012 Third World Congress on Software Engineering","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132685425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the growing popularity of Android platform, Android application market becomes a major distribution center where Android users download apps. Unlike most of the PC apps, Android apps manipulates personal information such as contract and SMS messages, and leakage of such information may cause great loss to the Android users. Thus, detecting information leakage on Android is in urgent need. However, till now, there is still no complete vetting process applied to Android markets. State-of-the-art approaches for detecting Android information leakage apply dynamic analysis on user site, thus they introduce large runtime overhead to the Android apps. This paper proposes a new approach called Leak Miner, which detects leakage of sensitive information on Android with static taint analysis. Unlike dynamic approaches, Leak Miner analyzes Android apps on market site. Thus, it does not introduce runtime overhead to normal execution of target apps. Besides, Leak Miner can detect information leakage before apps are distributed to users, so malicious apps can be removed from market before users download them. Our evaluation result shows that Leak Miner can detect 145 true information leakages inside a 1750 app set.
{"title":"LeakMiner: Detect Information Leakage on Android with Static Taint Analysis","authors":"Zhemin Yang, Min Yang","doi":"10.1109/WCSE.2012.26","DOIUrl":"https://doi.org/10.1109/WCSE.2012.26","url":null,"abstract":"With the growing popularity of Android platform, Android application market becomes a major distribution center where Android users download apps. Unlike most of the PC apps, Android apps manipulates personal information such as contract and SMS messages, and leakage of such information may cause great loss to the Android users. Thus, detecting information leakage on Android is in urgent need. However, till now, there is still no complete vetting process applied to Android markets. State-of-the-art approaches for detecting Android information leakage apply dynamic analysis on user site, thus they introduce large runtime overhead to the Android apps. This paper proposes a new approach called Leak Miner, which detects leakage of sensitive information on Android with static taint analysis. Unlike dynamic approaches, Leak Miner analyzes Android apps on market site. Thus, it does not introduce runtime overhead to normal execution of target apps. Besides, Leak Miner can detect information leakage before apps are distributed to users, so malicious apps can be removed from market before users download them. Our evaluation result shows that Leak Miner can detect 145 true information leakages inside a 1750 app set.","PeriodicalId":244586,"journal":{"name":"2012 Third World Congress on Software Engineering","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131413620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cloud computing launches a new direction for manufacturers to innovate and collaborate across the value chain via cloud-based technologies. To explore the possibility of cloud manufacturing collaboration, this paper first reviews relevant literature about agile manufacturing and cloud computing, and then investigates main manufacturing scenarios to identify key interactive processes between customers and manufacturers in electronic industries. We finally propose a cloud-based framework for manufacturing collaboration, which enables manufacturers to collaborate with their demanding customers and to combine internal operation with supply chain coordination via integration of their existing in-house systems and cloud-based applications.
{"title":"Cloud Manufacturing Collaboration: An Initial Exploration","authors":"Y. Lu, Chen-Yi Liu, Bao-Chang Ju","doi":"10.1109/WCSE.2012.39","DOIUrl":"https://doi.org/10.1109/WCSE.2012.39","url":null,"abstract":"Cloud computing launches a new direction for manufacturers to innovate and collaborate across the value chain via cloud-based technologies. To explore the possibility of cloud manufacturing collaboration, this paper first reviews relevant literature about agile manufacturing and cloud computing, and then investigates main manufacturing scenarios to identify key interactive processes between customers and manufacturers in electronic industries. We finally propose a cloud-based framework for manufacturing collaboration, which enables manufacturers to collaborate with their demanding customers and to combine internal operation with supply chain coordination via integration of their existing in-house systems and cloud-based applications.","PeriodicalId":244586,"journal":{"name":"2012 Third World Congress on Software Engineering","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116031854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The model of road roughness is extremely important to the analysis of vehicle ride comfort and handling stability. In terms of hybrid vehicles, it is fateful in particular. IFFT(Inverse Fast Fourier Transform) theory was described in this paper. Simulation programs were compiled with Matlab software, and the results were compared with the same class of standard power spectral density. The paper had fitted the power spectral density of the same set of data with different window functions, compared the difference of the outcomes, and discussed why the difference occured. At the same time, results of IFFT and trigonometric series method were also contrasted. Overall, IFFT is of robustness, rigorous mathematical derivation", "ideal accuracy and easy to use. It can provide theoretical basis for road safety, indoor bench, optimal control strategy and dynamic load calculations.
{"title":"Simulation of Road Roughness Based on Using IFFT Method","authors":"C. Jiang, Lin Cheng, S. Fengchun, Chang Hongjie","doi":"10.1109/WCSE.2012.46","DOIUrl":"https://doi.org/10.1109/WCSE.2012.46","url":null,"abstract":"The model of road roughness is extremely important to the analysis of vehicle ride comfort and handling stability. In terms of hybrid vehicles, it is fateful in particular. IFFT(Inverse Fast Fourier Transform) theory was described in this paper. Simulation programs were compiled with Matlab software, and the results were compared with the same class of standard power spectral density. The paper had fitted the power spectral density of the same set of data with different window functions, compared the difference of the outcomes, and discussed why the difference occured. At the same time, results of IFFT and trigonometric series method were also contrasted. Overall, IFFT is of robustness, rigorous mathematical derivation\", \"ideal accuracy and easy to use. It can provide theoretical basis for road safety, indoor bench, optimal control strategy and dynamic load calculations.","PeriodicalId":244586,"journal":{"name":"2012 Third World Congress on Software Engineering","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122609944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper focuses on recording how much a user is interested in the contents displayed on the web page with Fuzzy theory detection and finding out their relationship, as well as the rule of categorizing, via Data Mining technology, websites on-line into related communities. Then, proper adaptations of the web contents will be made in accordance with the most suitable positions of advertisements not only to meet the needs of the most majority of users but make the best benefit of advertisements.
{"title":"An Initial Exploration on Intelligent Contents to Social Network Research Via Fuzzy Based Data Mining","authors":"Bao-Chang Ju","doi":"10.1109/WCSE.2012.36","DOIUrl":"https://doi.org/10.1109/WCSE.2012.36","url":null,"abstract":"This paper focuses on recording how much a user is interested in the contents displayed on the web page with Fuzzy theory detection and finding out their relationship, as well as the rule of categorizing, via Data Mining technology, websites on-line into related communities. Then, proper adaptations of the web contents will be made in accordance with the most suitable positions of advertisements not only to meet the needs of the most majority of users but make the best benefit of advertisements.","PeriodicalId":244586,"journal":{"name":"2012 Third World Congress on Software Engineering","volume":"265 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122909021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
How to effectively generate test cases is the key to software testing. In our previous research, we applied the program dynamic invariant as feedback to guide test case generation, and that can reduce the redundancy and improve the coverage effectively. However, the repeated extraction of program dynamic invariants significantly increased the burden of test case generation. To address this issue, we present a novel technique that automatically converts program dynamic invariant into assertion and then make use of the assertion to direct the process of test case generation. If the new test case does not violate the assertion (that means the new test case will change the program invariant), then the new case is a valid test case, otherwise it is a redundant invalid test case. This method can avoid the repetition of extracting the same program invariant. Our experimental results indicate that, while not reducing the quality of the generated test cases, the assertion-directed method can greatly reduce the time cost of test case generation.
{"title":"Assertion-Directed Test Case Generation","authors":"Fanping Zeng, Chaoqiang Deng, Yuan Yuan","doi":"10.1109/WCSE.2012.16","DOIUrl":"https://doi.org/10.1109/WCSE.2012.16","url":null,"abstract":"How to effectively generate test cases is the key to software testing. In our previous research, we applied the program dynamic invariant as feedback to guide test case generation, and that can reduce the redundancy and improve the coverage effectively. However, the repeated extraction of program dynamic invariants significantly increased the burden of test case generation. To address this issue, we present a novel technique that automatically converts program dynamic invariant into assertion and then make use of the assertion to direct the process of test case generation. If the new test case does not violate the assertion (that means the new test case will change the program invariant), then the new case is a valid test case, otherwise it is a redundant invalid test case. This method can avoid the repetition of extracting the same program invariant. Our experimental results indicate that, while not reducing the quality of the generated test cases, the assertion-directed method can greatly reduce the time cost of test case generation.","PeriodicalId":244586,"journal":{"name":"2012 Third World Congress on Software Engineering","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133563815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}