首页 > 最新文献

2019 6th International Conference on Dependable Systems and Their Applications (DSA)最新文献

英文 中文
Design of Embedded Vacuum Packaging System Based on Single-Chip Microcomputer Touch Screen 基于单片机触摸屏的嵌入式真空包装系统设计
Ming-fei Qu, Dan Zhao, Nan Chen
In order to improve the intelligent control ability of the embedded vacuum packaging machinery, the control system is optimized and the embedded vacuum packaging system based on the touch screen of single chip microcomputer is constructed. The system is composed of many modules and uses 51 single chip microcomputer as the digital processing chip of energy-saving control of embedded vacuum packaging machinery. Combined with the touch screen control technology of single chip microcomputer, the automatic assembly control design of the embedded vacuum packaging system is carried out, and the optimal transmission protocol of the energy-saving control system of the embedded vacuum packaging mechanical equipment is designed. In the program loading module, the instruction loading and output conversion control of the embedded vacuum packaging system are realized, and the intelligent design of the embedded vacuum packaging system is realized in the embedded integrated processor.
为了提高嵌入式真空包装机械的智能控制能力,对控制系统进行了优化,构建了基于单片机触摸屏的嵌入式真空包装系统。该系统由多个模块组成,采用51单片机作为嵌入式真空包装机节能控制的数字处理芯片。结合单片机触摸屏控制技术,进行了嵌入式真空包装系统的自动装配控制设计,设计了嵌入式真空包装机械设备节能控制系统的最优传输协议。在程序加载模块中,实现了嵌入式真空包装系统的指令加载和输出转换控制,并在嵌入式集成处理器中实现了嵌入式真空包装系统的智能化设计。
{"title":"Design of Embedded Vacuum Packaging System Based on Single-Chip Microcomputer Touch Screen","authors":"Ming-fei Qu, Dan Zhao, Nan Chen","doi":"10.1109/DSA.2019.00096","DOIUrl":"https://doi.org/10.1109/DSA.2019.00096","url":null,"abstract":"In order to improve the intelligent control ability of the embedded vacuum packaging machinery, the control system is optimized and the embedded vacuum packaging system based on the touch screen of single chip microcomputer is constructed. The system is composed of many modules and uses 51 single chip microcomputer as the digital processing chip of energy-saving control of embedded vacuum packaging machinery. Combined with the touch screen control technology of single chip microcomputer, the automatic assembly control design of the embedded vacuum packaging system is carried out, and the optimal transmission protocol of the energy-saving control system of the embedded vacuum packaging mechanical equipment is designed. In the program loading module, the instruction loading and output conversion control of the embedded vacuum packaging system are realized, and the intelligent design of the embedded vacuum packaging system is realized in the embedded integrated processor.","PeriodicalId":342719,"journal":{"name":"2019 6th International Conference on Dependable Systems and Their Applications (DSA)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130867643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Traffic Data Classification to Detect Man-in-the-Middle Attacks in Industrial Control System 基于流量数据分类的工业控制系统中间人攻击检测
Haiyan Lan, Xiaodong Zhu, Jianguo Sun, Sizhao Li
Industrial Control Systems (ICS) are widely used in critical infrastructure in industries such as power, rail transit, and water conservancy. As the connection between the corporate network and the Internet continues to increase, the industrial control system has gradually become the target of hackers, which constantly threaten the personal safety of citizens. The Man-inthe-Middle (MITM) attack is one of the most famous attacks in the field of computer security. Once being used in the factory control network, it will not only cause data leakage, but also control the core industrial component PLC and cause serious security accidents. This paper proposes a method for classifying network traffic data in industrial control system to detect MITM attacks. In the simulation experiment, the method can identify normal and abnonnal data packets that have been tampered by the MITM, and the classification accuracy is up to 99.74%.
工业控制系统(ICS)广泛应用于电力、轨道交通、水利等行业的关键基础设施。随着企业网络与互联网连接的不断增加,工业控制系统逐渐成为黑客攻击的目标,不断威胁着公民的人身安全。中间人攻击(MITM)是计算机安全领域最著名的攻击之一。一旦在工厂控制网络中使用,不仅会造成数据泄露,还会控制核心工业部件PLC,造成严重的安全事故。提出了一种工业控制系统中网络流量数据分类检测MITM攻击的方法。在仿真实验中,该方法能够识别出被MITM篡改的正常和异常数据包,分类准确率高达99.74%。
{"title":"Traffic Data Classification to Detect Man-in-the-Middle Attacks in Industrial Control System","authors":"Haiyan Lan, Xiaodong Zhu, Jianguo Sun, Sizhao Li","doi":"10.1109/DSA.2019.00067","DOIUrl":"https://doi.org/10.1109/DSA.2019.00067","url":null,"abstract":"Industrial Control Systems (ICS) are widely used in critical infrastructure in industries such as power, rail transit, and water conservancy. As the connection between the corporate network and the Internet continues to increase, the industrial control system has gradually become the target of hackers, which constantly threaten the personal safety of citizens. The Man-inthe-Middle (MITM) attack is one of the most famous attacks in the field of computer security. Once being used in the factory control network, it will not only cause data leakage, but also control the core industrial component PLC and cause serious security accidents. This paper proposes a method for classifying network traffic data in industrial control system to detect MITM attacks. In the simulation experiment, the method can identify normal and abnonnal data packets that have been tampered by the MITM, and the classification accuracy is up to 99.74%.","PeriodicalId":342719,"journal":{"name":"2019 6th International Conference on Dependable Systems and Their Applications (DSA)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126626883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Internet-Based Researcher Interest Mining 基于互联网的研究者兴趣挖掘
Song Kang, Nanchang Cheng
In today's knowledge-based economy society, the rapid spread of a trend, personalized knowledge service has become the mainstream of development, so that the Web information users can meet the variety, high level of precision and content requirements of the high-level service form. Through analysis, we can find that the mining of researchers' interest can serve as the main learning content of personalized knowledge services. So the realization of research interest mining based on Internet is to meet the special information needs of the users, which can be called an effective method to optimize the content of personalized business. Therefore, a more effident algorithm is used to optimize the search search program for Internet information and improve the search efficiency. This optimization can become the research direction of the present age of all things in the world. The information data mining strategy to the simple to can improve the information retrieval efficiency of the network resources, and can provide the accurate, reliable summary of the Internet information resources, meet the convenience and precision of the researchers to retrieve the Internet information resources, thus can be accurate and high. The research interest mining based on the Internet includes the use of search engines to obtain the relevant information of the researchers. Through data mining and machine learning algorithms, the results information returned by the search engine are analyzed, and the research interests of the researchers are obtained from the contents of these results.
在当今知识经济社会迅速蔓延的一种趋势中,个性化的知识服务已成为发展的主流,使Web信息能够满足用户对服务形式的多样化、高精度和内容高水平的要求。通过分析可以发现,研究者兴趣的挖掘可以作为个性化知识服务的主要学习内容。因此,基于Internet的研究兴趣挖掘的实现是为了满足用户的特殊信息需求,是一种优化个性化业务内容的有效方法。因此,采用一种更有效的算法来优化网络信息搜索程序,提高搜索效率。这种优化可以成为当今世界万物时代的研究方向。该信息数据挖掘策略力求简单,能够提高网络资源的信息检索效率,并能提供准确、可靠的互联网信息资源汇总,满足研究人员检索互联网信息资源的便利性和精确性,从而能够准确、高。基于Internet的研究兴趣挖掘包括利用搜索引擎获取研究人员的相关信息。通过数据挖掘和机器学习算法,对搜索引擎返回的结果信息进行分析,并从这些结果的内容中获得研究人员的研究兴趣。
{"title":"Internet-Based Researcher Interest Mining","authors":"Song Kang, Nanchang Cheng","doi":"10.1109/DSA.2019.00011","DOIUrl":"https://doi.org/10.1109/DSA.2019.00011","url":null,"abstract":"In today's knowledge-based economy society, the rapid spread of a trend, personalized knowledge service has become the mainstream of development, so that the Web information users can meet the variety, high level of precision and content requirements of the high-level service form. Through analysis, we can find that the mining of researchers' interest can serve as the main learning content of personalized knowledge services. So the realization of research interest mining based on Internet is to meet the special information needs of the users, which can be called an effective method to optimize the content of personalized business. Therefore, a more effident algorithm is used to optimize the search search program for Internet information and improve the search efficiency. This optimization can become the research direction of the present age of all things in the world. The information data mining strategy to the simple to can improve the information retrieval efficiency of the network resources, and can provide the accurate, reliable summary of the Internet information resources, meet the convenience and precision of the researchers to retrieve the Internet information resources, thus can be accurate and high. The research interest mining based on the Internet includes the use of search engines to obtain the relevant information of the researchers. Through data mining and machine learning algorithms, the results information returned by the search engine are analyzed, and the research interests of the researchers are obtained from the contents of these results.","PeriodicalId":342719,"journal":{"name":"2019 6th International Conference on Dependable Systems and Their Applications (DSA)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126715293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
[Title page i] [标题页i]
{"title":"[Title page i]","authors":"","doi":"10.1109/dsa.2019.00001","DOIUrl":"https://doi.org/10.1109/dsa.2019.00001","url":null,"abstract":"","PeriodicalId":342719,"journal":{"name":"2019 6th International Conference on Dependable Systems and Their Applications (DSA)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123206821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Blockchain for Enterprise Using Hyperledger Fabric and Composer 基于Hyperledger Fabric和Composer的企业区块链研究
Dongcheng Li, W. Eric Wong, Jincui Guo
The potential of blockchain technology is immense and is currently regarded as a new technological trend with a rapid growth rate. Blockchain platforms like Bitcoin are public, open, and permission-less. They are also decentralized, immutable, and append-only ledger; those ledgers can store any type of data and are shared among all the participants of the network. These platforms provide a high degree of anonymity for their users’ identity and full transparency of the activities recorded on the ledger while simultaneously ensuring data security and tamper-resistance. All nodes on the network collectively work to validate the same set of data and to achieve group consensus. Blockchain platforms like Ethereum have the ability to develop smart contracts and embed business logic. This allows the use of blockchain beyond cryptocurrency as a business management solution. Besides the issues of scalability and the expensive nature of most blockchain systems, many attributes of traditional public blockchain are not desirable in a business or enterprise context such as anonymity, full transparency, and permissionless. Permissioned blockchain platforms like Hyperledger Fabric are designed and built with enterprise and business in mind, retaining the desirable qualities of blockchain for enterprise while replacing the qualities of blockchain that are undesirable for the enterprise. In this paper, we present a comprehensive review on the Hyperledger enterprise blockchain technologies.
区块链技术的潜力是巨大的,目前被认为是一种快速增长的新技术趋势。像比特币这样的区块链平台是公开的、开放的、无需许可的。它们也是分散的、不可变的、只追加的分类账;这些分类账可以存储任何类型的数据,并在网络的所有参与者之间共享。这些平台为用户的身份提供了高度的匿名性,并为记录在分类账上的活动提供了完全的透明度,同时确保了数据安全性和防篡改性。网络上的所有节点共同工作以验证同一组数据并实现群体共识。像以太坊这样的区块链平台有能力开发智能合约和嵌入业务逻辑。这使得区块链可以在加密货币之外作为商业管理解决方案使用。除了可扩展性和大多数区块链系统的昂贵性质之外,传统公共区块链的许多属性在商业或企业环境中是不可取的,例如匿名、完全透明和无权限。像Hyperledger Fabric这样的许可区块链平台是在设计和构建时考虑到企业和业务的,保留了区块链对企业的理想品质,同时取代了区块链对企业的不理想品质。在本文中,我们对Hyperledger企业区块链技术进行了全面的回顾。
{"title":"A Survey on Blockchain for Enterprise Using Hyperledger Fabric and Composer","authors":"Dongcheng Li, W. Eric Wong, Jincui Guo","doi":"10.1109/DSA.2019.00017","DOIUrl":"https://doi.org/10.1109/DSA.2019.00017","url":null,"abstract":"The potential of blockchain technology is immense and is currently regarded as a new technological trend with a rapid growth rate. Blockchain platforms like Bitcoin are public, open, and permission-less. They are also decentralized, immutable, and append-only ledger; those ledgers can store any type of data and are shared among all the participants of the network. These platforms provide a high degree of anonymity for their users’ identity and full transparency of the activities recorded on the ledger while simultaneously ensuring data security and tamper-resistance. All nodes on the network collectively work to validate the same set of data and to achieve group consensus. Blockchain platforms like Ethereum have the ability to develop smart contracts and embed business logic. This allows the use of blockchain beyond cryptocurrency as a business management solution. Besides the issues of scalability and the expensive nature of most blockchain systems, many attributes of traditional public blockchain are not desirable in a business or enterprise context such as anonymity, full transparency, and permissionless. Permissioned blockchain platforms like Hyperledger Fabric are designed and built with enterprise and business in mind, retaining the desirable qualities of blockchain for enterprise while replacing the qualities of blockchain that are undesirable for the enterprise. In this paper, we present a comprehensive review on the Hyperledger enterprise blockchain technologies.","PeriodicalId":342719,"journal":{"name":"2019 6th International Conference on Dependable Systems and Their Applications (DSA)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126094385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
Social Network Influence Analysis 社会网络影响分析
Yuning Guo, Jianxiang Cao, Weiguo Lin
Social networking platforms, such as weibo, WeChat, Twitter and Facebook etc. It have greatly changed people's daily life in the past. Compared with traditional media information dissemination, information dissemination based on social network has the characteristics of simplicity, speed and wide audience. Besides network technology, the influence of social network users is also a major factor. Under the influence, the behavior of a single user implicitly or explicitly affects the behavior of many other users, and may also affect the whole dynamic trend of social network. Therefore, social network influence analysis is one of the important contents of social network research. The this paper will expound the related concepts, mainly summarize the social network influence communication model and evaluation methods, and look into the future of social network influence analysis.
社交网络平台,如微博、微信、Twitter、Facebook等。它在过去极大地改变了人们的日常生活。与传统媒体信息传播相比,基于社交网络的信息传播具有简单、快捷、受众广泛等特点。除了网络技术,社交网络用户的影响也是一个重要因素。在这种影响下,单个用户的行为或隐或显地影响着许多其他用户的行为,也可能影响整个社交网络的动态趋势。因此,社会网络影响分析是社会网络研究的重要内容之一。本文将对相关概念进行阐述,主要总结社会网络影响力传播模型和评价方法,并展望社会网络影响力分析的未来。
{"title":"Social Network Influence Analysis","authors":"Yuning Guo, Jianxiang Cao, Weiguo Lin","doi":"10.1109/DSA.2019.00093","DOIUrl":"https://doi.org/10.1109/DSA.2019.00093","url":null,"abstract":"Social networking platforms, such as weibo, WeChat, Twitter and Facebook etc. It have greatly changed people's daily life in the past. Compared with traditional media information dissemination, information dissemination based on social network has the characteristics of simplicity, speed and wide audience. Besides network technology, the influence of social network users is also a major factor. Under the influence, the behavior of a single user implicitly or explicitly affects the behavior of many other users, and may also affect the whole dynamic trend of social network. Therefore, social network influence analysis is one of the important contents of social network research. The this paper will expound the related concepts, mainly summarize the social network influence communication model and evaluation methods, and look into the future of social network influence analysis.","PeriodicalId":342719,"journal":{"name":"2019 6th International Conference on Dependable Systems and Their Applications (DSA)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121007811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Application of Test Method Based on State Transition Diagram in Flight Control Software 基于状态转换图的测试方法在飞控软件中的应用
Dongmei Dong, Yunyu Fang, Ying Chen
Flight control software is the nerve center of flight control system, which has strong coupling of structure and function, which greatly increases the difficulty of test case design. In this paper, Test method based on state transition diagram (STD) is adopted. By analyzing the task scheduling of flight control software, the state transition diagram is designed according to the construction rules, and test paths are extracted according to the coverage rules, so as to guide the generation of test cases. An instance shows that the method can meet the requirements of flight control software test for sufficient coverage and improve the effectiveness of software test.
飞控软件是飞控系统的神经中枢,具有较强的结构和功能耦合,这大大增加了测试用例设计的难度。本文采用基于状态转移图(STD)的测试方法。通过分析飞控软件的任务调度,根据构建规则设计状态转移图,根据覆盖规则提取测试路径,从而指导测试用例的生成。实例表明,该方法能够满足飞行控制软件测试的要求,具有足够的覆盖率,提高了软件测试的有效性。
{"title":"Application of Test Method Based on State Transition Diagram in Flight Control Software","authors":"Dongmei Dong, Yunyu Fang, Ying Chen","doi":"10.1109/dsa.2019.00082","DOIUrl":"https://doi.org/10.1109/dsa.2019.00082","url":null,"abstract":"Flight control software is the nerve center of flight control system, which has strong coupling of structure and function, which greatly increases the difficulty of test case design. In this paper, Test method based on state transition diagram (STD) is adopted. By analyzing the task scheduling of flight control software, the state transition diagram is designed according to the construction rules, and test paths are extracted according to the coverage rules, so as to guide the generation of test cases. An instance shows that the method can meet the requirements of flight control software test for sufficient coverage and improve the effectiveness of software test.","PeriodicalId":342719,"journal":{"name":"2019 6th International Conference on Dependable Systems and Their Applications (DSA)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125224355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Software Requirements Change Priorities Based on Complex Networks 基于复杂网络的软件需求变更优先级分析
Junmin Ren, Xuan Zhang, Zhaoyu Pan
Requirement change management is one of the most important process of software engineering. Requirements change occur frequently in open source community software projects. Because of the limited time and energy, it is important for developers of open source communities to decide which issues to be solved first. Understanding the priorities of requirement changes helps developers identify significant issues results in a better process of requirement change management, leading to a more dependable evolution of the project. In this context, a novel complex-network-based approach is proposed to analyze requirement changes with dependencies of requirements. First, the nodes of Associated Network of Requirement Change(ANRC) are issues of corresponding project, while edges are the dependencies of issues in the network. And then, corresponding weights are set according to different dependency types. The nodes in the network are later analyzed and sorted by centrality measures. In addition, temporal dimension is also considered.
需求变更管理是软件工程中最重要的过程之一。需求变更在开源社区软件项目中经常发生。由于时间和精力有限,对于开源社区的开发人员来说,决定首先解决哪些问题是很重要的。理解需求变更的优先级可以帮助开发人员识别重要的问题,从而产生更好的需求变更管理过程,从而导致项目更加可靠的发展。在此背景下,提出了一种基于复杂网络的需求变化分析方法。首先,需求变化关联网络(ANRC)的节点是对应项目的问题,边缘是网络中问题的依赖关系。然后,根据不同的依赖类型设置相应的权值。然后通过中心性度量对网络中的节点进行分析和排序。此外,还考虑了时间维度。
{"title":"Analysis of Software Requirements Change Priorities Based on Complex Networks","authors":"Junmin Ren, Xuan Zhang, Zhaoyu Pan","doi":"10.1109/DSA.2019.00039","DOIUrl":"https://doi.org/10.1109/DSA.2019.00039","url":null,"abstract":"Requirement change management is one of the most important process of software engineering. Requirements change occur frequently in open source community software projects. Because of the limited time and energy, it is important for developers of open source communities to decide which issues to be solved first. Understanding the priorities of requirement changes helps developers identify significant issues results in a better process of requirement change management, leading to a more dependable evolution of the project. In this context, a novel complex-network-based approach is proposed to analyze requirement changes with dependencies of requirements. First, the nodes of Associated Network of Requirement Change(ANRC) are issues of corresponding project, while edges are the dependencies of issues in the network. And then, corresponding weights are set according to different dependency types. The nodes in the network are later analyzed and sorted by centrality measures. In addition, temporal dimension is also considered.","PeriodicalId":342719,"journal":{"name":"2019 6th International Conference on Dependable Systems and Their Applications (DSA)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122723509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Feasible Basic Path Generation Based on Genetic Algorithm 基于遗传算法的可行基本路径生成
Chunyan Xia, Xingya Wang, Li Qiao, Yan Zhang, Baoying Ma, Chenyang Shi
In this paper, a feasible basic path generation method based on a genetic algorithm is proposed, which combines a probabilistic statistical method with a genetic algorithm to generate a feasible basic path. First, conditional probability relations and a maximum likelihood estimation method are used to measure the correlation among the conditional statements and determine the mutually exclusive edges in the Decision-to-Decision Graph of the program under test. Then, the feasibility of generating a path is judged by the exclusive edge relation. Finally, a genetic algorithm is used to generate the feasible basic path set of the program under test. The experimental results based on six benchmark programs and three industrial programs show that, compared with the traditional method, this method can effectively improve the coverage rate of feasible basic path generation and reduce the time cost of software testing.
本文提出了一种基于遗传算法的可行基本路径生成方法,该方法将概率统计方法与遗传算法相结合,生成可行基本路径。首先,利用条件概率关系和极大似然估计方法来度量条件语句之间的相关性,确定待测程序的决策-决策图中的互斥边;然后,利用排他边关系判断路径生成的可行性。最后,利用遗传算法生成待测程序的可行基本路径集。基于6个基准方案和3个工业方案的实验结果表明,与传统方法相比,该方法能有效提高可行基本路径生成的覆盖率,降低软件测试的时间成本。
{"title":"Feasible Basic Path Generation Based on Genetic Algorithm","authors":"Chunyan Xia, Xingya Wang, Li Qiao, Yan Zhang, Baoying Ma, Chenyang Shi","doi":"10.1109/DSA.2019.00054","DOIUrl":"https://doi.org/10.1109/DSA.2019.00054","url":null,"abstract":"In this paper, a feasible basic path generation method based on a genetic algorithm is proposed, which combines a probabilistic statistical method with a genetic algorithm to generate a feasible basic path. First, conditional probability relations and a maximum likelihood estimation method are used to measure the correlation among the conditional statements and determine the mutually exclusive edges in the Decision-to-Decision Graph of the program under test. Then, the feasibility of generating a path is judged by the exclusive edge relation. Finally, a genetic algorithm is used to generate the feasible basic path set of the program under test. The experimental results based on six benchmark programs and three industrial programs show that, compared with the traditional method, this method can effectively improve the coverage rate of feasible basic path generation and reduce the time cost of software testing.","PeriodicalId":342719,"journal":{"name":"2019 6th International Conference on Dependable Systems and Their Applications (DSA)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121855097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Underwater Target Detection Method Based on Pole Distribution 基于极点分布的水下目标检测方法
Jiarong Zhang, Pengpeng Hu, Kaiyang Liu, Ziqi Zhou, Xuefei Ma
As pole detection is generally used in radar, this paper proposes a new method for applying pole characteristics to underwater target detection. The methods of extended Prony and matrix pencil are used to extract the poles from the simulated target transient echoes whose parameters are changed, such as different frequencies and different signal to noise ratios. The influence of the factors above on the pole is analyzed, and the exact extraction of the pole and the dependence between these parameters are obtained. The original signal is fitted by using the matrix pencil method to extract the pole.
由于极点探测在雷达中普遍使用,本文提出了一种将极点特性应用于水下目标探测的新方法。针对不同频率、不同信噪比等参数变化的模拟目标瞬态回波,采用扩展proony法和矩阵铅笔法提取极点。分析了上述因素对极点的影响,得到了极点的精确提取以及这些参数之间的依赖关系。采用矩阵铅笔法拟合原始信号,提取极点。
{"title":"Underwater Target Detection Method Based on Pole Distribution","authors":"Jiarong Zhang, Pengpeng Hu, Kaiyang Liu, Ziqi Zhou, Xuefei Ma","doi":"10.1109/DSA.2019.00092","DOIUrl":"https://doi.org/10.1109/DSA.2019.00092","url":null,"abstract":"As pole detection is generally used in radar, this paper proposes a new method for applying pole characteristics to underwater target detection. The methods of extended Prony and matrix pencil are used to extract the poles from the simulated target transient echoes whose parameters are changed, such as different frequencies and different signal to noise ratios. The influence of the factors above on the pole is analyzed, and the exact extraction of the pole and the dependence between these parameters are obtained. The original signal is fitted by using the matrix pencil method to extract the pole.","PeriodicalId":342719,"journal":{"name":"2019 6th International Conference on Dependable Systems and Their Applications (DSA)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133303902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2019 6th International Conference on Dependable Systems and Their Applications (DSA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1