首页 > 最新文献

2021 8th NAFOSTED Conference on Information and Computer Science (NICS)最新文献

英文 中文
Federated learning-based intrusion detection in SDN-enabled IIoT networks 支持sdn的工业物联网网络中基于联邦学习的入侵检测
Pub Date : 2021-12-21 DOI: 10.1109/NICS54270.2021.9701525
Phan The Duy, Tran Van Hung, Nguyen Hong Ha, Hien Do Hoang, V. Pham
Witnessing the explosion in the number of Internet of Things (IoTs) in industries, Software Defined Networking (SDN) is considered as a flexible, efficient, and programmable approach for network management and security policy enforcement. Particularly, it is more suitable in the context of industrial Internet of Things (IIoT) network comprising heterogeneous devices. Meanwhile, the demand of ensuring cyber threat resistance has more become the serious concern from both academia and industry due to incidents, cyberattacks, personal data breaches reported recently. Many intrusion detection systems (IDS) leverage the advances in machine learning (ML) to build the more efficient attack detector against the unknown malicious actions in the network. Such an approach requires gathering a large amount of network traffic for model training in a centralized platform. It obviously violates the data privacy protection since the network traffic is sensitive information if accessed and used by a third party. To take advantage of private network data from various sources for mutually training detection model, federated learning (FL) is recently introduced as a solution that can address the problem of violating data privacy for ML-based cybersecurity solution during training phase. Thus, this work introduces the FL approach for IDS to facilitate the privacy preserving in model training while collaboratively maintaining the efficiency of attack detection in IIoT context with the leverage of SDN.
随着工业中物联网(iot)数量的爆炸式增长,软件定义网络(SDN)被认为是一种灵活、高效、可编程的网络管理和安全策略实施方法。特别是,它更适合于由异构设备组成的工业物联网(IIoT)网络。与此同时,由于最近发生的事件、网络攻击、个人数据泄露等事件,确保抵御网络威胁的需求越来越受到学术界和工业界的严重关注。许多入侵检测系统(IDS)利用机器学习(ML)的进步来构建针对网络中未知恶意行为的更有效的攻击检测器。这种方法需要在一个集中的平台上收集大量的网络流量来进行模型训练。这显然违反了数据隐私保护,因为网络流量是敏感信息,如果被第三方访问和使用。为了利用来自各种来源的专用网络数据来相互训练检测模型,最近引入了联邦学习(FL)作为解决基于ml的网络安全解决方案在训练阶段侵犯数据隐私问题的解决方案。因此,本工作引入了IDS的FL方法,以促进模型训练中的隐私保护,同时利用SDN协同保持IIoT环境下攻击检测的效率。
{"title":"Federated learning-based intrusion detection in SDN-enabled IIoT networks","authors":"Phan The Duy, Tran Van Hung, Nguyen Hong Ha, Hien Do Hoang, V. Pham","doi":"10.1109/NICS54270.2021.9701525","DOIUrl":"https://doi.org/10.1109/NICS54270.2021.9701525","url":null,"abstract":"Witnessing the explosion in the number of Internet of Things (IoTs) in industries, Software Defined Networking (SDN) is considered as a flexible, efficient, and programmable approach for network management and security policy enforcement. Particularly, it is more suitable in the context of industrial Internet of Things (IIoT) network comprising heterogeneous devices. Meanwhile, the demand of ensuring cyber threat resistance has more become the serious concern from both academia and industry due to incidents, cyberattacks, personal data breaches reported recently. Many intrusion detection systems (IDS) leverage the advances in machine learning (ML) to build the more efficient attack detector against the unknown malicious actions in the network. Such an approach requires gathering a large amount of network traffic for model training in a centralized platform. It obviously violates the data privacy protection since the network traffic is sensitive information if accessed and used by a third party. To take advantage of private network data from various sources for mutually training detection model, federated learning (FL) is recently introduced as a solution that can address the problem of violating data privacy for ML-based cybersecurity solution during training phase. Thus, this work introduces the FL approach for IDS to facilitate the privacy preserving in model training while collaboratively maintaining the efficiency of attack detection in IIoT context with the leverage of SDN.","PeriodicalId":296963,"journal":{"name":"2021 8th NAFOSTED Conference on Information and Computer Science (NICS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125841378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
UIT-Anomaly: A Modern Vietnamese Video Dataset for Anomaly Detection 单元异常:用于异常检测的现代越南视频数据集
Pub Date : 2021-12-21 DOI: 10.1109/NICS54270.2021.9701556
D. Vo, T. Tran, Nguyen D. Vo, Khang Nguyen
Anomaly detection in videos is of utmost importance for numerous tasks in the field of computer vision. We introduce the UIT-Anomaly dataset captured in Vietnam with a total duration of 200 minutes. It contains 224 videos with six different types of anomalies. Moreover, we apply a method for weakly supervised video anomaly detection, called Robust Temporal Feature Magnitude learning (RTFM) based on feature magnitude learning to detect abnormal snippets. The approached method yields competitive results, compared to other state-of-the-art algorithms using publicly available datasets such as ShanghaiTech and UCF–Crime.
视频异常检测在计算机视觉领域的许多任务中都是至关重要的。我们介绍了在越南捕获的总持续时间为200分钟的unit - anomaly数据集。它包含224个视频,有六种不同类型的异常。此外,我们应用了一种弱监督视频异常检测方法,称为基于特征幅度学习的鲁棒时间特征幅度学习(RTFM)来检测异常片段。与其他使用公开数据集(如ShanghaiTech和UCF-Crime)的最先进算法相比,该方法产生了具有竞争力的结果。
{"title":"UIT-Anomaly: A Modern Vietnamese Video Dataset for Anomaly Detection","authors":"D. Vo, T. Tran, Nguyen D. Vo, Khang Nguyen","doi":"10.1109/NICS54270.2021.9701556","DOIUrl":"https://doi.org/10.1109/NICS54270.2021.9701556","url":null,"abstract":"Anomaly detection in videos is of utmost importance for numerous tasks in the field of computer vision. We introduce the UIT-Anomaly dataset captured in Vietnam with a total duration of 200 minutes. It contains 224 videos with six different types of anomalies. Moreover, we apply a method for weakly supervised video anomaly detection, called Robust Temporal Feature Magnitude learning (RTFM) based on feature magnitude learning to detect abnormal snippets. The approached method yields competitive results, compared to other state-of-the-art algorithms using publicly available datasets such as ShanghaiTech and UCF–Crime.","PeriodicalId":296963,"journal":{"name":"2021 8th NAFOSTED Conference on Information and Computer Science (NICS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126542139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Performance evaluation of cooperative NOMA-IRS network using particle swarm optimization 基于粒子群优化的协同NOMA-IRS网络性能评价
Pub Date : 2021-12-21 DOI: 10.1109/NICS54270.2021.9701464
Anh Le Thi, Hong Nguyen Thi, Trung Pham Viet, Vo Nguyen Quoc Bao
In this paper, we investigate the performance of intelligent reflecting surface (IRS) aided cooperative non-orthogonal multiple access (NOMA) system in an energy-harvesting (EH) relay network. Particularly, in our proposed system, a base station communicates with two NOMA users with a help of the best EH relay employing a power-splitting (PS) architecture and IRS component. To boost the system performance, an important object is the maximization of sum data rate (SDR) which is proposed by using particle swarm optimization (PSO) based on power allocation (PA) for each destination user and phase shift of IRS. To validate the performance of PSO, another swarm intelligence technique as Genetic Algorithm (GA) and Exhaustive Search (ES) methods are considered. Finally, the outstanding performance of NOMA-supported IRS in comparison with the system without IRS is also shown in this paper.
本文研究了智能反射面(IRS)辅助的协同非正交多址(NOMA)系统在能量收集(EH)中继网络中的性能。特别是,在我们提出的系统中,一个基站与两个NOMA用户通过采用功率分割(PS)架构和IRS组件的最佳EH中继进行通信。为了提高系统的性能,提出了基于目标用户功率分配和IRS相移的粒子群优化算法(PSO),使总数据速率(SDR)最大化。为了验证粒子群算法的性能,考虑了另一种群体智能技术遗传算法和穷举搜索方法。最后,本文还展示了支持noma的IRS与不支持IRS的系统相比的突出性能。
{"title":"Performance evaluation of cooperative NOMA-IRS network using particle swarm optimization","authors":"Anh Le Thi, Hong Nguyen Thi, Trung Pham Viet, Vo Nguyen Quoc Bao","doi":"10.1109/NICS54270.2021.9701464","DOIUrl":"https://doi.org/10.1109/NICS54270.2021.9701464","url":null,"abstract":"In this paper, we investigate the performance of intelligent reflecting surface (IRS) aided cooperative non-orthogonal multiple access (NOMA) system in an energy-harvesting (EH) relay network. Particularly, in our proposed system, a base station communicates with two NOMA users with a help of the best EH relay employing a power-splitting (PS) architecture and IRS component. To boost the system performance, an important object is the maximization of sum data rate (SDR) which is proposed by using particle swarm optimization (PSO) based on power allocation (PA) for each destination user and phase shift of IRS. To validate the performance of PSO, another swarm intelligence technique as Genetic Algorithm (GA) and Exhaustive Search (ES) methods are considered. Finally, the outstanding performance of NOMA-supported IRS in comparison with the system without IRS is also shown in this paper.","PeriodicalId":296963,"journal":{"name":"2021 8th NAFOSTED Conference on Information and Computer Science (NICS)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121654720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Template Waveform Synthesize Technique for Ultra-wide band Signal in Measuring Distance 超宽带距离测量信号的模板波形合成技术
Pub Date : 2021-12-21 DOI: 10.1109/NICS54270.2021.9701521
Nguyen Thi Huyen, Duong Duc Ha, Pham Thanh Hiep
With the very larger bandwidth, the ultra-wide band (UWB) technology has good resolution when used for short-range positioning techniques and the correct detection of the received UWB signals is one of the important factors affect the accuracy of the positioning technique. In this paper, a method used to improve the detection accuracy of the received UWB signal in multi-path environment based on the synthesize sample waveform at the UWB receiver is proposed. The results obtained from the mathematic analysis and computer simulation show that with the proposed technique, the ability to detect the UWB signal is improved, the effect of inter pulse interference (IPI) is eliminated, and the accuracy in measuring the distance is enhanced.
超宽带(UWB)技术具有非常大的带宽,用于近距离定位技术时具有良好的分辨率,对接收到的超宽带信号的正确检测是影响定位技术精度的重要因素之一。本文提出了一种基于UWB接收机处的合成采样波形,提高多径环境下接收到的UWB信号检测精度的方法。数学分析和计算机仿真结果表明,该方法提高了对超宽带信号的检测能力,消除了脉冲间干扰(IPI)的影响,提高了测量距离的精度。
{"title":"Template Waveform Synthesize Technique for Ultra-wide band Signal in Measuring Distance","authors":"Nguyen Thi Huyen, Duong Duc Ha, Pham Thanh Hiep","doi":"10.1109/NICS54270.2021.9701521","DOIUrl":"https://doi.org/10.1109/NICS54270.2021.9701521","url":null,"abstract":"With the very larger bandwidth, the ultra-wide band (UWB) technology has good resolution when used for short-range positioning techniques and the correct detection of the received UWB signals is one of the important factors affect the accuracy of the positioning technique. In this paper, a method used to improve the detection accuracy of the received UWB signal in multi-path environment based on the synthesize sample waveform at the UWB receiver is proposed. The results obtained from the mathematic analysis and computer simulation show that with the proposed technique, the ability to detect the UWB signal is improved, the effect of inter pulse interference (IPI) is eliminated, and the accuracy in measuring the distance is enhanced.","PeriodicalId":296963,"journal":{"name":"2021 8th NAFOSTED Conference on Information and Computer Science (NICS)","volume":"370 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122773845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image Retrieval with Text Feedback based on Transformer Deep Model 基于Transformer深度模型的文本反馈图像检索
Pub Date : 2021-12-21 DOI: 10.1109/NICS54270.2021.9701539
Truc Luong-Phuong Huynh, N. Ly
Image retrieval with text feedback has many potentials when applied in product retrieval for e-commerce platforms. Given an input image and text feedback, the system needs to retrieve images that not only look visually similar to the input image but also have some modified details mentioned in the text feedback. This is a tricky task as it requires a good understanding of image, text, and also their combination. In this paper, we propose a novel framework called Image-Text Modify Attention (ITMA) and a Transformer-based combining function that performs preservation and transformation features of the input image based on the text feedback and captures important features of database images. By using multiple image features at different Convolution Neural Network (CNN) depths, the combining function can have multi-level visual information to achieve an impressive representation that satisfies for effective image retrieval. We conduct quantitative and qualitative experiments on two datasets: CSS and FashionIQ. ITMA outperforms existing approaches on these datasets and can deal with many types of text feedback such as object attributes and natural language. We are also the first ones to discover the exceptional behavior of the attention mechanism in this task which ignores input image regions where text feedback wants to remove or change.
基于文本反馈的图像检索在电子商务平台的产品检索中具有很大的应用潜力。给定输入图像和文本反馈,系统需要检索图像,这些图像不仅在视觉上看起来与输入图像相似,而且还具有文本反馈中提到的一些修改细节。这是一项棘手的任务,因为它需要对图像、文本及其组合有很好的理解。在本文中,我们提出了一个新的框架,称为图像-文本修改注意(ITMA)和一个基于transformer的组合函数,该函数基于文本反馈对输入图像执行保存和转换特征,并捕获数据库图像的重要特征。通过在不同卷积神经网络(CNN)深度下使用多个图像特征,组合函数可以具有多层次的视觉信息,从而获得令人印象深刻的表示,满足有效的图像检索。我们在CSS和FashionIQ两个数据集上进行了定量和定性实验。ITMA在这些数据集上优于现有的方法,并且可以处理许多类型的文本反馈,如对象属性和自然语言。我们也是第一个发现注意机制在这个任务中的特殊行为的人,它忽略了文本反馈想要删除或改变的输入图像区域。
{"title":"Image Retrieval with Text Feedback based on Transformer Deep Model","authors":"Truc Luong-Phuong Huynh, N. Ly","doi":"10.1109/NICS54270.2021.9701539","DOIUrl":"https://doi.org/10.1109/NICS54270.2021.9701539","url":null,"abstract":"Image retrieval with text feedback has many potentials when applied in product retrieval for e-commerce platforms. Given an input image and text feedback, the system needs to retrieve images that not only look visually similar to the input image but also have some modified details mentioned in the text feedback. This is a tricky task as it requires a good understanding of image, text, and also their combination. In this paper, we propose a novel framework called Image-Text Modify Attention (ITMA) and a Transformer-based combining function that performs preservation and transformation features of the input image based on the text feedback and captures important features of database images. By using multiple image features at different Convolution Neural Network (CNN) depths, the combining function can have multi-level visual information to achieve an impressive representation that satisfies for effective image retrieval. We conduct quantitative and qualitative experiments on two datasets: CSS and FashionIQ. ITMA outperforms existing approaches on these datasets and can deal with many types of text feedback such as object attributes and natural language. We are also the first ones to discover the exceptional behavior of the attention mechanism in this task which ignores input image regions where text feedback wants to remove or change.","PeriodicalId":296963,"journal":{"name":"2021 8th NAFOSTED Conference on Information and Computer Science (NICS)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125062978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CRYScanner: Finding cryptographic libraries misuse CRYScanner:查找密码库误用
Pub Date : 2021-12-21 DOI: 10.1109/NICS54270.2021.9701469
Amit Choudhari, S. Guilley, Khaled Karray
Cryptographic libraries have become an integral part of every digital device. Studies have shown that these systems are not only vulnerable due to bugs in cryptographic libraries, but also due to misuse of these libraries. In this paper, we focus on vulnerabilities introduced by the application developer. We performed a survey on the potential misusage of wellknown libraries such as PKCS # 11. We introduced a generic tool CRYScanner, to identify such misuses during and post-development. It works on the similar philosophy of an intrusion detection system for an internal network. This tool provides verification functions needed to check the safety of the code, such as detecting incorrect call flow and input parameters. We performed a feature-wise comparison with the existing state of the art solutions. CRYScanner includes additional features, preserving the capabilities of both static and dynamic analysis tools. We also show the detection of potential vulnerabilities in the several sample codes found online.
密码库已经成为每个数字设备中不可或缺的一部分。研究表明,这些系统的脆弱性不仅在于加密库中的漏洞,还在于这些库的误用。在本文中,我们主要关注应用程序开发人员引入的漏洞。我们对pkcs# 11等知名库的潜在误用进行了调查。我们引入了一个通用工具CRYScanner,以识别开发期间和开发后的滥用。它的工作原理与内部网络的入侵检测系统类似。该工具提供了检查代码安全性所需的验证功能,例如检测不正确的调用流和输入参数。我们将其与现有最先进的解决方案进行了功能比较。CRYScanner包括额外的功能,保留静态和动态分析工具的功能。我们还展示了在线发现的几个示例代码中潜在漏洞的检测。
{"title":"CRYScanner: Finding cryptographic libraries misuse","authors":"Amit Choudhari, S. Guilley, Khaled Karray","doi":"10.1109/NICS54270.2021.9701469","DOIUrl":"https://doi.org/10.1109/NICS54270.2021.9701469","url":null,"abstract":"Cryptographic libraries have become an integral part of every digital device. Studies have shown that these systems are not only vulnerable due to bugs in cryptographic libraries, but also due to misuse of these libraries. In this paper, we focus on vulnerabilities introduced by the application developer. We performed a survey on the potential misusage of wellknown libraries such as PKCS # 11. We introduced a generic tool CRYScanner, to identify such misuses during and post-development. It works on the similar philosophy of an intrusion detection system for an internal network. This tool provides verification functions needed to check the safety of the code, such as detecting incorrect call flow and input parameters. We performed a feature-wise comparison with the existing state of the art solutions. CRYScanner includes additional features, preserving the capabilities of both static and dynamic analysis tools. We also show the detection of potential vulnerabilities in the several sample codes found online.","PeriodicalId":296963,"journal":{"name":"2021 8th NAFOSTED Conference on Information and Computer Science (NICS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133210461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Secret Key Group Implementation Using Chain Topology 使用链拓扑实现秘密密钥组
Pub Date : 2021-12-21 DOI: 10.1109/NICS54270.2021.9701561
Mike Yuliana, Amang Sudarsono
The rapid development of technology is marked by the increasing use of wi-fi technology for the process of exchanging data and information. Over time, the exchange of data and information began to become insecure. Therefore, a secret key is needed. This key is needed to maintain the security and comfort of wi-fi users in exchanging data or information that is confidential and does not want other users to know. In this study, it is proposed to create a secret key group using a chain topology and received signal strength (RSS) as a source of key extraction. The advantage of secret key extraction using Received Signal Strength (RSS) is that it is easy to access to be applied to wireless devices. From the overall test results, it can be seen that scenario 1 produces the best performance in terms of correlation parameters and the number of secret keys generated. The highest correlation obtained reached 0.9064 while the number of keys obtained reached 7 keys with an approximate entropy of 0.528.
技术的快速发展标志着越来越多地使用wi-fi技术来交换数据和信息。随着时间的推移,数据和信息的交换开始变得不安全。因此,需要一个密钥。该密钥用于维护wi-fi用户在交换机密数据或信息时的安全性和舒适性,并且不希望其他用户知道。在本研究中,提出使用链拓扑和接收信号强度(RSS)作为密钥提取源来创建秘密密钥组。使用接收信号强度(RSS)提取密钥的优点是易于访问并应用于无线设备。从整体测试结果可以看出,就相关参数和生成的密钥数量而言,场景1产生了最好的性能。获得的最高相关性达到0.9064,获得的键数达到7个键,近似熵为0.528。
{"title":"Secret Key Group Implementation Using Chain Topology","authors":"Mike Yuliana, Amang Sudarsono","doi":"10.1109/NICS54270.2021.9701561","DOIUrl":"https://doi.org/10.1109/NICS54270.2021.9701561","url":null,"abstract":"The rapid development of technology is marked by the increasing use of wi-fi technology for the process of exchanging data and information. Over time, the exchange of data and information began to become insecure. Therefore, a secret key is needed. This key is needed to maintain the security and comfort of wi-fi users in exchanging data or information that is confidential and does not want other users to know. In this study, it is proposed to create a secret key group using a chain topology and received signal strength (RSS) as a source of key extraction. The advantage of secret key extraction using Received Signal Strength (RSS) is that it is easy to access to be applied to wireless devices. From the overall test results, it can be seen that scenario 1 produces the best performance in terms of correlation parameters and the number of secret keys generated. The highest correlation obtained reached 0.9064 while the number of keys obtained reached 7 keys with an approximate entropy of 0.528.","PeriodicalId":296963,"journal":{"name":"2021 8th NAFOSTED Conference on Information and Computer Science (NICS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124838009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Graph Analysis Based Approach for Specification-Driven Testing of Model Transformations 基于图分析的模型转换规范驱动测试方法
Pub Date : 2021-12-21 DOI: 10.1109/NICS54270.2021.9701514
Thi-Hanh Nguyen, Duc-Hanh Dang
Model transformation plays a critical role of model-driven approaches and is a significant quality factor for final products. Among current approaches to testing transformations, specification-driven testing gains much attention of research community since the black-box testing has many advantages including understandability for modelers and independence of transformation languages. One of the main challenges for this approach is how to systematically and effectively generate test cases from a transformation specification, i.e, rather than from its implementation. This paper aims to introduce a language on the one hand to precisely specify transformation requirements and on the other hand to facilitate the verification and validation of MTs. Within our approach, such a transformation specification language is defined based on triple-graph-grammar (TGG) rules and graph patterns that allow us to express transformation requirements in a visual, precise, and declarative way. Besides, we introduce a systematic testing framework to ensure many important properties of MTs such as syntactical correctness, completeness, functional behavior, and information preservation.
模型转换在模型驱动方法中起着至关重要的作用,是最终产品质量的重要因素。在当前的转换测试方法中,由于黑盒测试具有许多优点,包括建模者的可理解性和转换语言的独立性,规格驱动测试受到了研究团体的广泛关注。这种方法的主要挑战之一是如何系统而有效地从转换规范中生成测试用例,而不是从它的实现中生成。本文旨在引入一种语言,一方面精确地指定转换需求,另一方面方便mt的验证和确认。在我们的方法中,这种转换规范语言是基于三重图语法(triple-graph-grammar, TGG)规则和图模式定义的,使我们能够以可视化、精确和声明性的方式表达转换需求。此外,我们还引入了一个系统的测试框架,以确保MTs的许多重要属性,如语法正确性、完整性、功能行为和信息保存。
{"title":"A Graph Analysis Based Approach for Specification-Driven Testing of Model Transformations","authors":"Thi-Hanh Nguyen, Duc-Hanh Dang","doi":"10.1109/NICS54270.2021.9701514","DOIUrl":"https://doi.org/10.1109/NICS54270.2021.9701514","url":null,"abstract":"Model transformation plays a critical role of model-driven approaches and is a significant quality factor for final products. Among current approaches to testing transformations, specification-driven testing gains much attention of research community since the black-box testing has many advantages including understandability for modelers and independence of transformation languages. One of the main challenges for this approach is how to systematically and effectively generate test cases from a transformation specification, i.e, rather than from its implementation. This paper aims to introduce a language on the one hand to precisely specify transformation requirements and on the other hand to facilitate the verification and validation of MTs. Within our approach, such a transformation specification language is defined based on triple-graph-grammar (TGG) rules and graph patterns that allow us to express transformation requirements in a visual, precise, and declarative way. Besides, we introduce a systematic testing framework to ensure many important properties of MTs such as syntactical correctness, completeness, functional behavior, and information preservation.","PeriodicalId":296963,"journal":{"name":"2021 8th NAFOSTED Conference on Information and Computer Science (NICS)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127198506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Approach to Evaluate Alternatives in Multi-Attribute Decision Making Problems based on Linguistic Many-Valued Logic 基于语言多值逻辑的多属性决策问题备选方案评估方法
Pub Date : 2021-12-21 DOI: 10.1109/NICS54270.2021.9701502
Phuong Le Anh, Hoai Nhan Tran, Dinh-Khang Tran
Humans are often faced with decisions, that is, have to choose between different alternatives every day. Many of these decision problems are under uncertain environments with vague and imprecise information. Thus, linguistic decision making problem is important research topic. Besides, decision making is widely applied in fields such as society, economy, medicine, management, and military affairs, etc. In the framework of the linguistic many-valued logic, both comparable and incomparable truth-values can be expressed. This paper further studies the applicability of linguistic many-valued logic for dealing with the decision making problem and proposes a linguistic many-valued reasoning approach for the decision making model. This approach can also address the reasoning of decision making directly on linguistic truth values.
人类经常面临决策,也就是说,每天都要在不同的选择中做出选择。这些决策问题中有许多是在不确定的环境下,信息模糊、不精确。因此,语言决策问题是一个重要的研究课题。此外,决策被广泛应用于社会、经济、医学、管理、军事等领域。在语言多值逻辑的框架中,可以表达可比较的真值和不可比较的真值。本文进一步研究了语言多值逻辑在处理决策问题中的适用性,提出了一种决策模型的语言多值推理方法。这种方法还可以直接解决基于语言真值的决策推理问题。
{"title":"An Approach to Evaluate Alternatives in Multi-Attribute Decision Making Problems based on Linguistic Many-Valued Logic","authors":"Phuong Le Anh, Hoai Nhan Tran, Dinh-Khang Tran","doi":"10.1109/NICS54270.2021.9701502","DOIUrl":"https://doi.org/10.1109/NICS54270.2021.9701502","url":null,"abstract":"Humans are often faced with decisions, that is, have to choose between different alternatives every day. Many of these decision problems are under uncertain environments with vague and imprecise information. Thus, linguistic decision making problem is important research topic. Besides, decision making is widely applied in fields such as society, economy, medicine, management, and military affairs, etc. In the framework of the linguistic many-valued logic, both comparable and incomparable truth-values can be expressed. This paper further studies the applicability of linguistic many-valued logic for dealing with the decision making problem and proposes a linguistic many-valued reasoning approach for the decision making model. This approach can also address the reasoning of decision making directly on linguistic truth values.","PeriodicalId":296963,"journal":{"name":"2021 8th NAFOSTED Conference on Information and Computer Science (NICS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129551536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Circularly Polarized Array Antenna for GPS Application 一种用于GPS的圆极化阵列天线
Pub Date : 2021-12-21 DOI: 10.1109/NICS54270.2021.9701530
Khuat Dinh Chinh, Tran Thi Lan
The paper proposes a 2×2 array antenna for GPS (Global Positioning System) application in the L1 band (1.575 GHz). In which, the element antenna is a square patch antenna with a diagonal slot in the middle to create circular polarization (CP). The element antennas are fed sequential-phase feeding network to reduce the size of the array antenna. To extend the 3 dB axial ratio (AR) bandwidth (BW), parasitic patches are added to either side of the main radiating patch of the element antennas. The antenna is designed using FR-4 material with compact size of 182×182×1.6 mm3, impedance BW 62.2 MHz (3.95 %), 3 dB AR BW 30.3 MHz (1.92%) and high gain 10 dBi. Especially, the polarization isolation between the right-handed CP (RHCP) and left-handed CP (LHCP) is higher than 24 dB. These results show that the proposed antenna is really effective for GPS applications.
本文提出了一种适用于全球定位系统(GPS) L1频段(1.575 GHz)的2×2阵列天线。其中,单元天线为方形贴片天线,中间有一个对角线槽以产生圆极化(CP)。单元天线采用序相馈电网络馈电,减小了阵列天线的尺寸。为了延长3db轴向比(AR)带宽(BW),在单元天线主辐射片的两侧增加了寄生片。该天线采用FR-4材料设计,尺寸紧凑,为182×182×1.6 mm3,阻抗BW为62.2 MHz (3.95%), 3 dB AR BW为30.3 MHz(1.92%),高增益为10 dBi。特别是,右手CP (RHCP)和左手CP (LHCP)之间的极化隔离度大于24 dB。结果表明,该天线在GPS应用中是有效的。
{"title":"A Circularly Polarized Array Antenna for GPS Application","authors":"Khuat Dinh Chinh, Tran Thi Lan","doi":"10.1109/NICS54270.2021.9701530","DOIUrl":"https://doi.org/10.1109/NICS54270.2021.9701530","url":null,"abstract":"The paper proposes a 2×2 array antenna for GPS (Global Positioning System) application in the L1 band (1.575 GHz). In which, the element antenna is a square patch antenna with a diagonal slot in the middle to create circular polarization (CP). The element antennas are fed sequential-phase feeding network to reduce the size of the array antenna. To extend the 3 dB axial ratio (AR) bandwidth (BW), parasitic patches are added to either side of the main radiating patch of the element antennas. The antenna is designed using FR-4 material with compact size of 182×182×1.6 mm3, impedance BW 62.2 MHz (3.95 %), 3 dB AR BW 30.3 MHz (1.92%) and high gain 10 dBi. Especially, the polarization isolation between the right-handed CP (RHCP) and left-handed CP (LHCP) is higher than 24 dB. These results show that the proposed antenna is really effective for GPS applications.","PeriodicalId":296963,"journal":{"name":"2021 8th NAFOSTED Conference on Information and Computer Science (NICS)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126355190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2021 8th NAFOSTED Conference on Information and Computer Science (NICS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1