首页 > 最新文献

2009 International Conference on Computer Technology and Development最新文献

英文 中文
Security Model Based on Network Business Security 基于网络业务安全的安全模型
Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.160
Wu Ke-he, Zhang Tong, Li Wei, Ma Gang
Enterprise Network Information System is not only the platform for information sharing and information exchanging, but also the platform for Enterprise Production Automation System and Enterprise Management System working together. As a result, the security defense of Enterprise Network Information System does not only include information system network security and data security, but also include the security of network business running on information system network, which is the confidentiality, integrity, continuity and real-time of network business. According to the security defense of Enterprise Network Information System, this paper proposes the "network business security" concept. In this paper, the object of information security is defined in three parts - - data security, network system security and network business security, and the network business security model is described. The proposal of the concept "network business security" provides theoretical basis for security defense of enterprise automatic production system and enterprise management information system.
企业网络信息系统不仅是信息共享和信息交换的平台,也是企业生产自动化系统和企业管理系统协同工作的平台。因此,企业网络信息系统的安全防御不仅包括信息系统网络安全和数据安全,还包括在信息系统网络上运行的网络业务的安全,即网络业务的保密性、完整性、连续性和实时性。针对企业网络信息系统的安全防御,提出了“网络业务安全”的概念。本文从数据安全、网络系统安全、网络业务安全三部分定义了信息安全的对象,并对网络业务安全模型进行了描述。“网络业务安全”概念的提出,为企业自动化生产系统和企业管理信息系统的安全防御提供了理论依据。
{"title":"Security Model Based on Network Business Security","authors":"Wu Ke-he, Zhang Tong, Li Wei, Ma Gang","doi":"10.1109/ICCTD.2009.160","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.160","url":null,"abstract":"Enterprise Network Information System is not only the platform for information sharing and information exchanging, but also the platform for Enterprise Production Automation System and Enterprise Management System working together. As a result, the security defense of Enterprise Network Information System does not only include information system network security and data security, but also include the security of network business running on information system network, which is the confidentiality, integrity, continuity and real-time of network business. According to the security defense of Enterprise Network Information System, this paper proposes the \"network business security\" concept. In this paper, the object of information security is defined in three parts - - data security, network system security and network business security, and the network business security model is described. The proposal of the concept \"network business security\" provides theoretical basis for security defense of enterprise automatic production system and enterprise management information system.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121036995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Study on Expressing Principles of Semantics in Product Design 产品设计中语义学表达原则研究
Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.236
Zhang Xin, Zhang Jianwu, Yang Mei
Product semantics is a tool in product design to generate newer, better and more meaningful forms. Consumer preference and perception of products strongly influence a product's acceptability. Both are expressed by words that may be studied using product semantics. As product semantics spreads rapidly in product design, it faces more interrogative challenges from the lack of empirical evidence to substantiate the claims of some product semanticists. Based on the study of product semantics design methods, this paper presents several principles which should be followed for expressing semantics in product design. Then, it explains the meanings of these principles by some examples. These principles should be helpful in product design.
产品语义是产品设计中的一种工具,用于生成更新、更好和更有意义的形式。消费者的偏好和对产品的认知强烈地影响着产品的可接受性。两者都是用可以用产品语义来研究的词语来表达的。随着产品语义学在产品设计中的迅速传播,由于缺乏经验证据来证实一些产品语义学家的主张,它面临着更多的疑问挑战。本文在研究产品语义设计方法的基础上,提出了产品设计中语义表达应遵循的几个原则。然后,通过实例说明了这些原则的意义。这些原则在产品设计中应该是有用的。
{"title":"Study on Expressing Principles of Semantics in Product Design","authors":"Zhang Xin, Zhang Jianwu, Yang Mei","doi":"10.1109/ICCTD.2009.236","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.236","url":null,"abstract":"Product semantics is a tool in product design to generate newer, better and more meaningful forms. Consumer preference and perception of products strongly influence a product's acceptability. Both are expressed by words that may be studied using product semantics. As product semantics spreads rapidly in product design, it faces more interrogative challenges from the lack of empirical evidence to substantiate the claims of some product semanticists. Based on the study of product semantics design methods, this paper presents several principles which should be followed for expressing semantics in product design. Then, it explains the meanings of these principles by some examples. These principles should be helpful in product design.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121067609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Impulse Detection Adaptive Fuzzy (IDAF) Filter 脉冲检测自适应模糊(IDAF)滤波器
Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.157
H. Kam, W. Tan
An Impulse Detection Adaptive Fuzzy (IDAF) filter is proposed in this paper, to achieve improved filtering of impulsive noise while preserving image details. It is a spatial filter which operates in 2-stage 3x3 windows where the update value of the central pixel is a function of the median value of the pixels in the window. The proposed IDAF filter operates as follows. First, an impulse detection method classifies each pixel to be noisy pixel or image pixel. Then, if a pixel is assumed to be noisy, it is not used for deciding the new value of other pixels. A scheme is introduced to obtain a good replacement pixel value, which is then stored. The median of the stored values is a considered a good estimate of the image pixel. Finally, the adaptive fuzzy filter will then assign weights to the stored pixel values to produce the central pixel’s new value. Weights are assigned to remove impulse noise or preserve the image details, depending on the pixel’s characteristics. These characteristics are identified from the noisy image beforehand using a compatibility measure. The process detailed above enables the IDAF filter to remove impulse noise while preserving image details. Through testing, our experimental results show that the IDAF filter performs better than other standard median based methods.
本文提出了一种脉冲检测自适应模糊(IDAF)滤波器,在保留图像细节的同时实现对脉冲噪声的改进滤波。它是一个空间过滤器,在2-stage 3x3窗口中运行,其中中心像素的更新值是窗口中像素的中值的函数。建议的IDAF过滤器的操作如下。首先,脉冲检测方法将每个像素分类为噪声像素或图像像素。然后,如果假设一个像素是有噪声的,它不用于确定其他像素的新值。介绍了一种获取良好的替换像素值的方案,并对其进行存储。存储值的中位数被认为是对图像像素的一个很好的估计。最后,自适应模糊滤波器将为存储的像素值分配权重,以产生中心像素的新值。根据像素的特性,分配权重以去除脉冲噪声或保留图像细节。这些特征是事先使用兼容性措施从噪声图像中识别出来的。上面详细介绍的过程使IDAF滤波器能够在保留图像细节的同时去除脉冲噪声。通过测试,我们的实验结果表明,IDAF滤波器的性能优于其他标准的基于中值的方法。
{"title":"Impulse Detection Adaptive Fuzzy (IDAF) Filter","authors":"H. Kam, W. Tan","doi":"10.1109/ICCTD.2009.157","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.157","url":null,"abstract":"An Impulse Detection Adaptive Fuzzy (IDAF) filter is proposed in this paper, to achieve improved filtering of impulsive noise while preserving image details. It is a spatial filter which operates in 2-stage 3x3 windows where the update value of the central pixel is a function of the median value of the pixels in the window. The proposed IDAF filter operates as follows. First, an impulse detection method classifies each pixel to be noisy pixel or image pixel. Then, if a pixel is assumed to be noisy, it is not used for deciding the new value of other pixels. A scheme is introduced to obtain a good replacement pixel value, which is then stored. The median of the stored values is a considered a good estimate of the image pixel. Finally, the adaptive fuzzy filter will then assign weights to the stored pixel values to produce the central pixel’s new value. Weights are assigned to remove impulse noise or preserve the image details, depending on the pixel’s characteristics. These characteristics are identified from the noisy image beforehand using a compatibility measure. The process detailed above enables the IDAF filter to remove impulse noise while preserving image details. Through testing, our experimental results show that the IDAF filter performs better than other standard median based methods.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121113339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A New S-Box Structure to Increase Complexity of Algebraic Expression for Block Cipher Cryptosystems 一种提高分组密码系统代数表达式复杂度的新s盒结构
Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.235
B.N. Tran, T. Nguyen, T. D. Tran
In this paper, we propose a new approach to represent general S-Box based on linear-transform and a given non-linear function that increases the complexity of algebraic expression and size of S-Box. In the case of size of 8, the proposed S-Box can archive the maximum number of terms (255 terms) and therefore it can be used to replace the classical S-Box component in the original AES. Furthermore, the proposed S-Box inherits all good cryptographic characteristics of the original AES S-Box, such as nonlinearity, differential uniformity, and strict avalanche.
本文提出了一种基于线性变换和给定非线性函数来表示一般S-Box的新方法,增加了代数表达式的复杂性和S-Box的大小。在大小为8的情况下,提议的S-Box可以存档最大数量的术语(255个术语),因此它可以用来替换原始AES中的经典S-Box组件。此外,所提出的S-Box继承了原始AES S-Box的所有良好的加密特性,如非线性、差分均匀性和严格雪崩。
{"title":"A New S-Box Structure to Increase Complexity of Algebraic Expression for Block Cipher Cryptosystems","authors":"B.N. Tran, T. Nguyen, T. D. Tran","doi":"10.1109/ICCTD.2009.235","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.235","url":null,"abstract":"In this paper, we propose a new approach to represent general S-Box based on linear-transform and a given non-linear function that increases the complexity of algebraic expression and size of S-Box. In the case of size of 8, the proposed S-Box can archive the maximum number of terms (255 terms) and therefore it can be used to replace the classical S-Box component in the original AES. Furthermore, the proposed S-Box inherits all good cryptographic characteristics of the original AES S-Box, such as nonlinearity, differential uniformity, and strict avalanche.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":"2016 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114695076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Secure Virtual Application Distribution 安全虚拟应用程序分发
Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.56
W. Z. A. Zakaria, Mohd Azuddin Parman, Zharfan Hamdan, M. S. Rohmad, M. Isa
This paper describes about a framework for secure assignment of virtual application from server to client. The server is a gateway to many applications, which the client can utilize it by requesting the server through the client’s interface. The communication of this system is based on trust, where the Trusted Platform Module plays main role in communication part of this framework. Client machine applies virtualization technology, which is used to run the virtual application downloaded from the server.
本文介绍了一个虚拟应用程序从服务器到客户端安全分配的框架。服务器是许多应用程序的网关,客户机可以通过客户机的接口请求服务器来利用它。该系统的通信是基于信任的,其中可信平台模块在该框架的通信部分起主要作用。客户端机器应用虚拟化技术,用于运行从服务器下载的虚拟应用程序。
{"title":"Secure Virtual Application Distribution","authors":"W. Z. A. Zakaria, Mohd Azuddin Parman, Zharfan Hamdan, M. S. Rohmad, M. Isa","doi":"10.1109/ICCTD.2009.56","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.56","url":null,"abstract":"This paper describes about a framework for secure assignment of virtual application from server to client. The server is a gateway to many applications, which the client can utilize it by requesting the server through the client’s interface. The communication of this system is based on trust, where the Trusted Platform Module plays main role in communication part of this framework. Client machine applies virtualization technology, which is used to run the virtual application downloaded from the server.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116943160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Notice of RetractionReal-time Data Storage Research Based on RAM 基于RAM的实时数据存储研究
Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.36
Zhang Yan, Liu Wenyi
The use of FPGA internal RAM can be an effective alternative to external FIFO, using the method OF Programming FOR the FPGA, Make full use of FPGA internal resources that provided strong support For the realization of a programmable system chip (SOPC, SystemOn Programable Chip). It Effected reducing the use of devices and minimizing the circuit boards. Acquisition and storage respectively controlled by two FPGA chips in this study. Use their own internal RAM, program variety controlling models by VHDL hardware language. And then connect the internal schematic to replace the external FIFO. This is the internal FIFO of FPGA.
利用FPGA内部的RAM可以有效的替代外部的FIFO,利用FPGA的编程方法,充分利用FPGA内部的资源,为实现可编程系统芯片(SOPC, SystemOn programmable chip)提供了强有力的支持。它减少了设备的使用,减少了电路板的使用。在本研究中,采集和存储分别由两块FPGA芯片控制。利用自己的内部RAM,通过VHDL硬件语言编制各种控制模型。然后连接内部原理图来替换外部FIFO。这是FPGA的内部FIFO。
{"title":"Notice of RetractionReal-time Data Storage Research Based on RAM","authors":"Zhang Yan, Liu Wenyi","doi":"10.1109/ICCTD.2009.36","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.36","url":null,"abstract":"The use of FPGA internal RAM can be an effective alternative to external FIFO, using the method OF Programming FOR the FPGA, Make full use of FPGA internal resources that provided strong support For the realization of a programmable system chip (SOPC, SystemOn Programable Chip). It Effected reducing the use of devices and minimizing the circuit boards. Acquisition and storage respectively controlled by two FPGA chips in this study. Use their own internal RAM, program variety controlling models by VHDL hardware language. And then connect the internal schematic to replace the external FIFO. This is the internal FIFO of FPGA.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116050887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancement of Bone Fracture Images by Equalization Methods 用均衡方法增强骨折图像
Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.115
N. Parveen, M. phil, Dr. M. Mohammed Sathik
A fracture is a crack or break in the bone. This can be easily detected by taking an X-ray in that area. But some times these images lack sufficient brightness. Various Equalization Methods can be adapted to enhance the image. In this paper, two such methods are compared. They are Histogram Equalization and Contrast Limited Adaptive Histogram Equalization. The results show that Contrast Limited Adaptive Histogram Equalization gives better result than other Equalization method.
骨折是骨头上的裂缝或断裂。这可以很容易地通过x光检查该区域。但有时这些图像缺乏足够的亮度。可以采用各种均衡方法来增强图像。本文对这两种方法进行了比较。它们是直方图均衡化和对比度有限的自适应直方图均衡化。结果表明,对比度有限的自适应直方图均衡化方法具有较好的均衡化效果。
{"title":"Enhancement of Bone Fracture Images by Equalization Methods","authors":"N. Parveen, M. phil, Dr. M. Mohammed Sathik","doi":"10.1109/ICCTD.2009.115","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.115","url":null,"abstract":"A fracture is a crack or break in the bone. This can be easily detected by taking an X-ray in that area. But some times these images lack sufficient brightness. Various Equalization Methods can be adapted to enhance the image. In this paper, two such methods are compared. They are Histogram Equalization and Contrast Limited Adaptive Histogram Equalization. The results show that Contrast Limited Adaptive Histogram Equalization gives better result than other Equalization method.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121124169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Discovering the Rules in a Poker Player's Mind Based on the Association Rule Mining 基于关联规则挖掘的扑克玩家心理规则发现
Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.117
Afshin Mehrabi, A. Haghighat
One of the weaknesses and drawbacks of a computer compared to a human being is the creativity and intelligence of a human being in encountering with different problems and his power of deduction and reasoning. Therefore computer engineers have been trying to make computers more intelligent and inferential and reasonable in encountering with different problems. Thus in this article we have tried to increase the intelligence and deduction of a computer when playing a poker game. In this article a method is proposed based on the association rule mining which enables the computer to sense thoughts in a poker player's mind and guess his hand by observing his moves. According to the evaluation and a confidence of 78.6%, the rules in a poker player's mind were proven to be guessed correctly by the computer.
与人类相比,计算机的弱点和缺点之一是人类在遇到不同问题时的创造力和智慧,以及他的演绎和推理能力。因此,计算机工程师一直在努力使计算机在遇到各种问题时更加智能、推理和合理。因此,在本文中,我们试图在玩扑克游戏时增加计算机的智能和推理能力。本文提出了一种基于关联规则挖掘的方法,使计算机能够感知扑克玩家的思想,并通过观察他的走法来猜测他的手牌。根据评估和78.6%的置信度,扑克玩家头脑中的规则被计算机证明是正确的。
{"title":"Discovering the Rules in a Poker Player's Mind Based on the Association Rule Mining","authors":"Afshin Mehrabi, A. Haghighat","doi":"10.1109/ICCTD.2009.117","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.117","url":null,"abstract":"One of the weaknesses and drawbacks of a computer compared to a human being is the creativity and intelligence of a human being in encountering with different problems and his power of deduction and reasoning. Therefore computer engineers have been trying to make computers more intelligent and inferential and reasonable in encountering with different problems. Thus in this article we have tried to increase the intelligence and deduction of a computer when playing a poker game. In this article a method is proposed based on the association rule mining which enables the computer to sense thoughts in a poker player's mind and guess his hand by observing his moves. According to the evaluation and a confidence of 78.6%, the rules in a poker player's mind were proven to be guessed correctly by the computer.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121187723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-Agent Based Virtual Enterprise 基于多代理的虚拟企业
Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.16
Wei Feng, Rulin Wang
This paper presents an Agent-based architecture of distributed virtual enterprise; describes different Agent’s responsibilities, Agent organizations and their coordination.; proposes the dynamic virtual enterprise distributed processing environment, agent platform, virtual market and a three-tier architecture composed of business process specification, registration and management.
提出了一种基于agent的分布式虚拟企业体系结构;描述了不同代理机构的职责、代理机构及其协调。提出了动态虚拟企业分布式处理环境、代理平台、虚拟市场和业务流程规范、注册和管理三层体系结构。
{"title":"Multi-Agent Based Virtual Enterprise","authors":"Wei Feng, Rulin Wang","doi":"10.1109/ICCTD.2009.16","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.16","url":null,"abstract":"This paper presents an Agent-based architecture of distributed virtual enterprise; describes different Agent’s responsibilities, Agent organizations and their coordination.; proposes the dynamic virtual enterprise distributed processing environment, agent platform, virtual market and a three-tier architecture composed of business process specification, registration and management.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":"403 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123361421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Verification and Validation of Activity Diagrams Using Graph Transformation 使用图转换的活动图的验证和确认
Pub Date : 2009-11-13 DOI: 10.1109/ICCTD.2009.172
V. Rafe, R. Rafeh, S. Azizi, M. Miralvand
Graphical structures (like graphs, diagrams, visual sentences and others) are very useful to describe complex structures and systems. These structures are often augmented by formalisms which add a further dimension to the static description allowing for the modeling of the evolution of systems via any kind of transformation of such graphical structures. Graph transformation has been widely used for modeling. Graphs are well suited to describe the underlying structures of models. They provide a good method to carry out the analysis and verification activities and using the AGG toolset for designing them. A major goal of this paper is the ability to determine the correctness behavior and formal semantics of UML2.0 activity diagrams by Graph Transformation Systems.
图形结构(如图形、图表、视觉句子等)对于描述复杂的结构和系统非常有用。这些结构通常通过形式化来增强,形式化为静态描述添加了进一步的维度,允许通过这种图形结构的任何类型的转换对系统的演化进行建模。图变换已被广泛用于建模。图非常适合描述模型的底层结构。它们提供了一个很好的方法来执行分析和验证活动,并使用AGG工具集来设计它们。本文的主要目标是通过图转换系统确定UML2.0活动图的正确性行为和形式化语义的能力。
{"title":"Verification and Validation of Activity Diagrams Using Graph Transformation","authors":"V. Rafe, R. Rafeh, S. Azizi, M. Miralvand","doi":"10.1109/ICCTD.2009.172","DOIUrl":"https://doi.org/10.1109/ICCTD.2009.172","url":null,"abstract":"Graphical structures (like graphs, diagrams, visual sentences and others) are very useful to describe complex structures and systems. These structures are often augmented by formalisms which add a further dimension to the static description allowing for the modeling of the evolution of systems via any kind of transformation of such graphical structures. Graph transformation has been widely used for modeling. Graphs are well suited to describe the underlying structures of models. They provide a good method to carry out the analysis and verification activities and using the AGG toolset for designing them. A major goal of this paper is the ability to determine the correctness behavior and formal semantics of UML2.0 activity diagrams by Graph Transformation Systems.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130607130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
期刊
2009 International Conference on Computer Technology and Development
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1