Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061329
Gyuseong Lee, Minsung Son, Nakhoon Choi, Seongho Hong, Heeyoul Kim
Since the use of removable storage devices, security of the storage devices has been required as needed. In response to this demand, a method of managing/controlling removable storage devices through software is being utilized. However, because common management software stores logs about the use of the storage device on a personal PC or on a central server, there may be situations in which insiders tamper with the logs after malicious behavior. This paper proposes a blockchain-based log management system to solve the problem of log tamperability of existing removable storage management software.
{"title":"Blockchain based Removable Storage Device Log Management System","authors":"Gyuseong Lee, Minsung Son, Nakhoon Choi, Seongho Hong, Heeyoul Kim","doi":"10.23919/ICACT48636.2020.9061329","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061329","url":null,"abstract":"Since the use of removable storage devices, security of the storage devices has been required as needed. In response to this demand, a method of managing/controlling removable storage devices through software is being utilized. However, because common management software stores logs about the use of the storage device on a personal PC or on a central server, there may be situations in which insiders tamper with the logs after malicious behavior. This paper proposes a blockchain-based log management system to solve the problem of log tamperability of existing removable storage management software.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128564089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061426
EunSun Chae, Dong-Seok Kang, Jong Yik Si, Sangoh Yun, Pilwoon Jung, Soyoung Park, Haewon Lee, Kyoungjin Choi
Automated administration, as a part of e-administration, is showing different characteristics from conventional automated administration in the digital age. This paper presents the development stages of automated administration, the concept and characteristics of automated administration in the digital age, and the legal challenges for its use. For the first time in academia, we defined automated administration as “machines performing all or part of administration without human intervention” and structured its development in 5 stages. Accordingly, machines will perform administrative acts from the current stage of automated administration after the third stage. Therefore, we need to resolve issues related to the scope and procedures of administrative tasks that will be performed by machines before introducing automated administration to specific administrative acts.
{"title":"Automating Public Administration in the Digital Age","authors":"EunSun Chae, Dong-Seok Kang, Jong Yik Si, Sangoh Yun, Pilwoon Jung, Soyoung Park, Haewon Lee, Kyoungjin Choi","doi":"10.23919/ICACT48636.2020.9061426","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061426","url":null,"abstract":"Automated administration, as a part of e-administration, is showing different characteristics from conventional automated administration in the digital age. This paper presents the development stages of automated administration, the concept and characteristics of automated administration in the digital age, and the legal challenges for its use. For the first time in academia, we defined automated administration as “machines performing all or part of administration without human intervention” and structured its development in 5 stages. Accordingly, machines will perform administrative acts from the current stage of automated administration after the third stage. Therefore, we need to resolve issues related to the scope and procedures of administrative tasks that will be performed by machines before introducing automated administration to specific administrative acts.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"167 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133690665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061512
K. Harada, H. Charles, H. Nishi
Recently, the number of Internet of Things (IoT) sensors has been increasing rapidly; hence, various data are gathered. As a secondary use of the data, they are useful in providing new services, such as the demand response service in the Smart Grid. However, data services cause several problems in preserving privacy and during computation. This study focuses on these two significant problems. First, the invasion of privacy while using the data to provide such new services is problematic. A lot of private information is available in the data. For example, power consumption data may reveal the lifestyle of the residents, and the technique of obtaining information is known as nonintrusive load monitoring. Second, the penetration of IoT devices and sensors increases the computational and communicating energy consumption for processing the data and for providing various services using the data. In this paper, a new method is proposed to solve these two problems. This method is based on the fact that the anonymization process reduces the amount of information itself, as well as the quantity of computational resources required. This leads to a trade-off between anonymization level and computational cost. For example, raw data have a maximum amount of information and maximum computational cost. In contrast, fully generalized data (all zero data) have minimum amount of information and minimum computational cost. Compared to the conventional method, the proposed method demonstrated lower precision and a higher error rate. Therefore, the proposed method aims to control the trade-off and enables the provision of anonymized data with less information, the required anonymity level, and low computational cost compared to the conventional method. The proposed method is practiced using power consumption data gathered from the Urban Design Center Misiono (UDCMi) and the demand response service is evaluated as an experiment using the data. In this evaluation, a simple model of energy consumption was used in the calculation, which uses the required bit width of the arithmetic logic unit (ALU) for providing the service. The computational efficiency of the proposed method was increased by 60% when k = 2 and by 65% when k = 3, 4, 5, 6 compared to the conventional method. The method can also maintain an acceptable range of service error. The transprecision platform can restrict energy consumption by reducing the bit width of the data. Therefore, the proposed anonymization method can also reduce energy consumption by achieving lower usage of the ALU based on the transprecision architecture.
{"title":"Precision variable anonymization method supporting transprecision computing","authors":"K. Harada, H. Charles, H. Nishi","doi":"10.23919/ICACT48636.2020.9061512","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061512","url":null,"abstract":"Recently, the number of Internet of Things (IoT) sensors has been increasing rapidly; hence, various data are gathered. As a secondary use of the data, they are useful in providing new services, such as the demand response service in the Smart Grid. However, data services cause several problems in preserving privacy and during computation. This study focuses on these two significant problems. First, the invasion of privacy while using the data to provide such new services is problematic. A lot of private information is available in the data. For example, power consumption data may reveal the lifestyle of the residents, and the technique of obtaining information is known as nonintrusive load monitoring. Second, the penetration of IoT devices and sensors increases the computational and communicating energy consumption for processing the data and for providing various services using the data. In this paper, a new method is proposed to solve these two problems. This method is based on the fact that the anonymization process reduces the amount of information itself, as well as the quantity of computational resources required. This leads to a trade-off between anonymization level and computational cost. For example, raw data have a maximum amount of information and maximum computational cost. In contrast, fully generalized data (all zero data) have minimum amount of information and minimum computational cost. Compared to the conventional method, the proposed method demonstrated lower precision and a higher error rate. Therefore, the proposed method aims to control the trade-off and enables the provision of anonymized data with less information, the required anonymity level, and low computational cost compared to the conventional method. The proposed method is practiced using power consumption data gathered from the Urban Design Center Misiono (UDCMi) and the demand response service is evaluated as an experiment using the data. In this evaluation, a simple model of energy consumption was used in the calculation, which uses the required bit width of the arithmetic logic unit (ALU) for providing the service. The computational efficiency of the proposed method was increased by 60% when k = 2 and by 65% when k = 3, 4, 5, 6 compared to the conventional method. The method can also maintain an acceptable range of service error. The transprecision platform can restrict energy consumption by reducing the bit width of the data. Therefore, the proposed anonymization method can also reduce energy consumption by achieving lower usage of the ALU based on the transprecision architecture.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126968421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061514
Alberto Gallegos Ramonet, Taku Noguchi
For 15 years, the popular IEEE 802.15.4 standard has served as de facto standard for applications with low latency and small energy consumption requirements. During this time, it has evolved and dramatically extend its original purpose. With thousand of possible parameters and combinations, its objectives are not as clear as they were when it was first introduced. In this paper, we present a concise and chronological description of the standard highlighting the main features introduced by each one of its revisions as well as a notion of its usage. A compendium of this kind can be valuable to researchers working on implementations and improvements and to users seeking a general reference. This is relevant now more than ever because the standard must coexist with hundreds of other standards that are also constantly evolving. As presented in this document and despite its popularity and importance, there are very few capable IEEE 802.15.4 simulators and these are often outdated and incomplete. The aim of this paper is to provide a quick reference but also present the evolution of the standard and its future directions. Similarly, we hope that this study fosters the creation of new implementations, particularly new simulations modules.
{"title":"IEEE 802.15.4 Now and Then: Evolution of the LR-WPAN Standard","authors":"Alberto Gallegos Ramonet, Taku Noguchi","doi":"10.23919/ICACT48636.2020.9061514","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061514","url":null,"abstract":"For 15 years, the popular IEEE 802.15.4 standard has served as de facto standard for applications with low latency and small energy consumption requirements. During this time, it has evolved and dramatically extend its original purpose. With thousand of possible parameters and combinations, its objectives are not as clear as they were when it was first introduced. In this paper, we present a concise and chronological description of the standard highlighting the main features introduced by each one of its revisions as well as a notion of its usage. A compendium of this kind can be valuable to researchers working on implementations and improvements and to users seeking a general reference. This is relevant now more than ever because the standard must coexist with hundreds of other standards that are also constantly evolving. As presented in this document and despite its popularity and importance, there are very few capable IEEE 802.15.4 simulators and these are often outdated and incomplete. The aim of this paper is to provide a quick reference but also present the evolution of the standard and its future directions. Similarly, we hope that this study fosters the creation of new implementations, particularly new simulations modules.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116090247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061285
K. Cheon, Hye-yeon Kwon, Igor Kim, Seungkeun Park, J. Choi
As service traffic increases in cellular networks, the mobile network must expand their system capacity. It is important to balance between the volume of mobile traffic and the capacity of mobile system in terms of user experience and operation cost. There are two approaches to assess the balance of demand and supply in cellular network: single cell and national wide scale. Nevertheless, both methods are insufficient to evaluate the balance reasonably in real cellular network in terms of scale: too narrow or wide. As radio resources cannot be exchanged between cells, network operators must perform statistical management on traffic dense areas. This paper introduces the virtual sample region concept that is composed of set of traffic-intensive cells in metropolitan area. We evaluate mobile traffic and system capacity based on real measurement from live 4G system in Seoul, South Korea. In this paper we provide the measurement results of mobile traffic per 10 MHz in real top 10% traffic-intensive cells about 3 years. We also estimate spectral efficiency of virtual sample region using system level simulation, and evaluate system capacity using spectral reuse factor, 4G spectrum bandwidth, simulated spectral efficiency. The margin of 4G system capacity is estimated about 30% in the last three years.
{"title":"Mobile Traffic Assessment for 4G Network: Virtual Sample Region Approach","authors":"K. Cheon, Hye-yeon Kwon, Igor Kim, Seungkeun Park, J. Choi","doi":"10.23919/ICACT48636.2020.9061285","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061285","url":null,"abstract":"As service traffic increases in cellular networks, the mobile network must expand their system capacity. It is important to balance between the volume of mobile traffic and the capacity of mobile system in terms of user experience and operation cost. There are two approaches to assess the balance of demand and supply in cellular network: single cell and national wide scale. Nevertheless, both methods are insufficient to evaluate the balance reasonably in real cellular network in terms of scale: too narrow or wide. As radio resources cannot be exchanged between cells, network operators must perform statistical management on traffic dense areas. This paper introduces the virtual sample region concept that is composed of set of traffic-intensive cells in metropolitan area. We evaluate mobile traffic and system capacity based on real measurement from live 4G system in Seoul, South Korea. In this paper we provide the measurement results of mobile traffic per 10 MHz in real top 10% traffic-intensive cells about 3 years. We also estimate spectral efficiency of virtual sample region using system level simulation, and evaluate system capacity using spectral reuse factor, 4G spectrum bandwidth, simulated spectral efficiency. The margin of 4G system capacity is estimated about 30% in the last three years.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126067611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061247
Andleeb Aslam, Usman Qamar, Pakizah Saqib, Reda Ayesha Khan, Aiman Qadeer
Large amount of un-structured data is present online in the form of opinions and reviews. The most important task of NLP is to Extract useful information from unstructured data by first converting into structured form. Many customers write down reviews online but do not give rating to them. The main concern of this paper is to perform sentiment analysis by predicting two main types of polarities from reviews available online i-e positive and negative. Neural networks models fail to capture the contextual meaning of words and also fails to save long sequences of words and thus results in reducing performance. To overcome this issue a novel Hybrid model (RNN-LSTM-BiLSTM-CNN) using majority voting, word2vec and pre-trained Glove embedding (100d) is proposed to predict sentiment polarity against each review. Loss function used is Binary cross entropy. The proposed model is tested on different state-of-the-art datasets like SST-1, SST-2 and MR Movie review dataset. Results proved that our proposed model results in improved accuracy.
{"title":"A Novel Framework For Sentiment Analysis Using Deep Learning","authors":"Andleeb Aslam, Usman Qamar, Pakizah Saqib, Reda Ayesha Khan, Aiman Qadeer","doi":"10.23919/ICACT48636.2020.9061247","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061247","url":null,"abstract":"Large amount of un-structured data is present online in the form of opinions and reviews. The most important task of NLP is to Extract useful information from unstructured data by first converting into structured form. Many customers write down reviews online but do not give rating to them. The main concern of this paper is to perform sentiment analysis by predicting two main types of polarities from reviews available online i-e positive and negative. Neural networks models fail to capture the contextual meaning of words and also fails to save long sequences of words and thus results in reducing performance. To overcome this issue a novel Hybrid model (RNN-LSTM-BiLSTM-CNN) using majority voting, word2vec and pre-trained Glove embedding (100d) is proposed to predict sentiment polarity against each review. Loss function used is Binary cross entropy. The proposed model is tested on different state-of-the-art datasets like SST-1, SST-2 and MR Movie review dataset. Results proved that our proposed model results in improved accuracy.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123869613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061516
Yue Ma, Bo Peng, Mingjun Ma, Yifei Wang, Ding Xiao
With the development of the communication and computer science technology, the traffic prediction of the communication network has attracted more and more interests from the scholars, meanwhile, it is also a significant problem in the real world. A good prediction result can monitor the diversification of the traffic volume and give an early alarm of the outlier. A key challenge of the traffic prediction in the communication network is that how to combine the spatial-temporal information together to make full use of the data. In this paper, we get two observations: (1) At the same timestamp, different square has different traffic volume, while at the same square, different timestamp also has different traffic volume. (2) There exists some periodicity in the traffic volume data along time. To address the challenges we mentioned before, we propose a novel Multi-Channel Spatial-Temporal framework (MCST) to model the spatial-temporal information. The three-channel CNN can mine the spatial information and enrich the temporal information, while the LSTM can model the temporal information. MCST can fuse the spatial-temporal information together to achieve the goal of giving a better prediction. Experiments on the public dataset of the communication network in Milan verify the effectiveness of the proposed model.
{"title":"Traffic Prediction on Communication Network based on Spatial-Temporal Information","authors":"Yue Ma, Bo Peng, Mingjun Ma, Yifei Wang, Ding Xiao","doi":"10.23919/ICACT48636.2020.9061516","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061516","url":null,"abstract":"With the development of the communication and computer science technology, the traffic prediction of the communication network has attracted more and more interests from the scholars, meanwhile, it is also a significant problem in the real world. A good prediction result can monitor the diversification of the traffic volume and give an early alarm of the outlier. A key challenge of the traffic prediction in the communication network is that how to combine the spatial-temporal information together to make full use of the data. In this paper, we get two observations: (1) At the same timestamp, different square has different traffic volume, while at the same square, different timestamp also has different traffic volume. (2) There exists some periodicity in the traffic volume data along time. To address the challenges we mentioned before, we propose a novel Multi-Channel Spatial-Temporal framework (MCST) to model the spatial-temporal information. The three-channel CNN can mine the spatial information and enrich the temporal information, while the LSTM can model the temporal information. MCST can fuse the spatial-temporal information together to achieve the goal of giving a better prediction. Experiments on the public dataset of the communication network in Milan verify the effectiveness of the proposed model.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122361959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061556
Amna Javed Tiwana, M. Zeeshan
Filter-bank Multicarrier (FBMC) modulation is the most promising 5th Generation (5G) waveform candidate in order to fulfill modern day requirements of ultra-high data rates with minimum latency. With lower side-lobes and faster spectral decay, FBMC is also well suited for reconfigurable radios such as Software Defined Radio (SDR) or Cognitive Radio (CR) for efficient spectrum utilization. In this paper, a performance as well as a parametric analysis of FBMC over Stanford University Interim (SUI) channel models has been analyzed. Performance is evaluated on the basis of Bit error rate (BER) using multipath fading environment that is characterized by Rician distribution, under different scenarios. The evaluation provides a useful basis for FBMC-based dynamic link adaptation in SDR wideband waveform.
滤波器组多载波(FBMC)调制是最有前途的第五代(5G)波形候选,以满足现代对超高数据速率和最小延迟的要求。FBMC具有更低的旁瓣和更快的频谱衰减,也非常适合用于可重构无线电,如软件定义无线电(SDR)或认知无线电(CR),以实现高效的频谱利用。本文分析了FBMC在Stanford University Interim (SUI)信道模型上的性能和参数分析。基于误码率(BER)在不同场景下的性能评估,采用了以时延分布为特征的多径衰落环境。该评价为基于fbmc的SDR宽带动态链路自适应提供了有益的依据。
{"title":"Parametric Analysis of FBMC/OQAM under SUI Fading Channel Models","authors":"Amna Javed Tiwana, M. Zeeshan","doi":"10.23919/ICACT48636.2020.9061556","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061556","url":null,"abstract":"Filter-bank Multicarrier (FBMC) modulation is the most promising 5th Generation (5G) waveform candidate in order to fulfill modern day requirements of ultra-high data rates with minimum latency. With lower side-lobes and faster spectral decay, FBMC is also well suited for reconfigurable radios such as Software Defined Radio (SDR) or Cognitive Radio (CR) for efficient spectrum utilization. In this paper, a performance as well as a parametric analysis of FBMC over Stanford University Interim (SUI) channel models has been analyzed. Performance is evaluated on the basis of Bit error rate (BER) using multipath fading environment that is characterized by Rician distribution, under different scenarios. The evaluation provides a useful basis for FBMC-based dynamic link adaptation in SDR wideband waveform.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124725273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061537
Xuan Hu, Jie Liu, Bo Wu
Orthogonal defect classification is a multi-dimensional measurement system with both qualitative and quantitative features, which is widely used in the software industry. However, the level of abstraction is high, which leads to limited semantic information. Therefore, it has a limited effect in the process of software engineering of complex software systems. To solve this problem, this paper first analyses the software error lifetime from the perspective of knowledge-based software engineering. Furthermore, based on the orthogonal defect classification, the concept of software error pattern is proposed, and its constituent elements and value sets are given. Moreover construct the software error pattern ontology in the requirements analysis phase, focusing on the elements such as “scenario”, “error-manifestation” and “solution”. The example verification part takes unmanned aerial vehicle flight control and management system software as an example to carry out the software requirements error pattern ontology representation and conducts software verification activities based on this and measures the development quality. The results show that the software error pattern can effectively guide the verification of complex software systems and measure the development quality. Therefore, the proposal of software error pattern is of great significance to improve the quality of software development and verification.
{"title":"The Orthogonal Defect Classification-based Software Error Pattern Ontology Construction Researches","authors":"Xuan Hu, Jie Liu, Bo Wu","doi":"10.23919/ICACT48636.2020.9061537","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061537","url":null,"abstract":"Orthogonal defect classification is a multi-dimensional measurement system with both qualitative and quantitative features, which is widely used in the software industry. However, the level of abstraction is high, which leads to limited semantic information. Therefore, it has a limited effect in the process of software engineering of complex software systems. To solve this problem, this paper first analyses the software error lifetime from the perspective of knowledge-based software engineering. Furthermore, based on the orthogonal defect classification, the concept of software error pattern is proposed, and its constituent elements and value sets are given. Moreover construct the software error pattern ontology in the requirements analysis phase, focusing on the elements such as “scenario”, “error-manifestation” and “solution”. The example verification part takes unmanned aerial vehicle flight control and management system software as an example to carry out the software requirements error pattern ontology representation and conducts software verification activities based on this and measures the development quality. The results show that the software error pattern can effectively guide the verification of complex software systems and measure the development quality. Therefore, the proposal of software error pattern is of great significance to improve the quality of software development and verification.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124178496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061263
A. Ghobadi, H. Alvandi
In these day and age by fast growing the knowledge and internet, producing, distributing and manipulating of digital date become an easy task to do. Based on the other researcher result, illegal reproduction of digital information reported as the main concerned and a real problem [1], [2]. There are many problems, which arise such as copyright protection, tamper detection, ownership rights and so on [3]–[6]. This has raised questions and concerns about [4]. Thus, many researchers try to find the solution to addressing these problems. Digital watermarking provides a solution which purpose to solve these problems [5].
{"title":"Image Color Watermarking within Past Seven Years","authors":"A. Ghobadi, H. Alvandi","doi":"10.23919/ICACT48636.2020.9061263","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061263","url":null,"abstract":"In these day and age by fast growing the knowledge and internet, producing, distributing and manipulating of digital date become an easy task to do. Based on the other researcher result, illegal reproduction of digital information reported as the main concerned and a real problem [1], [2]. There are many problems, which arise such as copyright protection, tamper detection, ownership rights and so on [3]–[6]. This has raised questions and concerns about [4]. Thus, many researchers try to find the solution to addressing these problems. Digital watermarking provides a solution which purpose to solve these problems [5].","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127730488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}