Pub Date : 2020-12-01DOI: 10.1109/QRS-C51114.2020.00110
Tian Liu, Hongji Yang, Feng-Jian Wang
Humour is valued by people for its many positive social functions, which is also of great merit for computing exploration. Especially in this era, many advanced computing science and technologies allow new perspectives to address this topic. Among them, creative computing, which aims to offer new and surprising computing solutions, can lend its theoretical and technical supports to humour generation and exploitation. Based on it, the proposed research first raises the concept of the humour degree to bridge the more qualitative topic of humour with the quantitative nature of computing, so as to build a new basis for the following computing work. Secondly, a creative system is designed to calculate the humour degree for utterances. Thirdly, the experiment is conducted to validate the effectiveness of the system. The results show that it is feasible and significant to calculate the humour degree for utterances through a creative computing approach.
{"title":"A Creative Approach to Humour Degree Calculation for Utterances","authors":"Tian Liu, Hongji Yang, Feng-Jian Wang","doi":"10.1109/QRS-C51114.2020.00110","DOIUrl":"https://doi.org/10.1109/QRS-C51114.2020.00110","url":null,"abstract":"Humour is valued by people for its many positive social functions, which is also of great merit for computing exploration. Especially in this era, many advanced computing science and technologies allow new perspectives to address this topic. Among them, creative computing, which aims to offer new and surprising computing solutions, can lend its theoretical and technical supports to humour generation and exploitation. Based on it, the proposed research first raises the concept of the humour degree to bridge the more qualitative topic of humour with the quantitative nature of computing, so as to build a new basis for the following computing work. Secondly, a creative system is designed to calculate the humour degree for utterances. Thirdly, the experiment is conducted to validate the effectiveness of the system. The results show that it is feasible and significant to calculate the humour degree for utterances through a creative computing approach.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126785437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-01DOI: 10.1109/QRS-C51114.2020.00065
T. Phillips, T. McJunkin, C. Rieger, J. Gardner, Hoda Mehrpouyan
The electrical power system is the backbone of our nations critical infrastructure. It has been designed to withstand single component failures based on a set of reliability metrics which have proven acceptable during normal operating conditions. However, in recent years there has been an increasing frequency of extreme weather events. Many have resulted in widespread long-term power outages, proving reliability metrics do not provide adequate energy security. As a result, researchers have focused their efforts resilience metrics to ensure efficient operation of power systems during extreme events. A resilient system has the ability to resist, adapt, and recover from disruptions. Therefore, resilience has demonstrated itself as a promising concept for currently faced challenges in power distribution systems. In this work, we propose an operational resilience metric for modern power distribution systems. The metric is based on the aggregation of system assets adaptive capacity in real and reactive power. This metric gives information to the magnitude and duration of a disturbance the system can withstand. We demonstrate resilience metric in a case study under normal operation and during a power contingency on a microgrid. In the future, this information can be used by operators to make more informed decisions based on system resilience in an effort to prevent power outages.
{"title":"An Operational Resilience Metric for Modern Power Distribution Systems","authors":"T. Phillips, T. McJunkin, C. Rieger, J. Gardner, Hoda Mehrpouyan","doi":"10.1109/QRS-C51114.2020.00065","DOIUrl":"https://doi.org/10.1109/QRS-C51114.2020.00065","url":null,"abstract":"The electrical power system is the backbone of our nations critical infrastructure. It has been designed to withstand single component failures based on a set of reliability metrics which have proven acceptable during normal operating conditions. However, in recent years there has been an increasing frequency of extreme weather events. Many have resulted in widespread long-term power outages, proving reliability metrics do not provide adequate energy security. As a result, researchers have focused their efforts resilience metrics to ensure efficient operation of power systems during extreme events. A resilient system has the ability to resist, adapt, and recover from disruptions. Therefore, resilience has demonstrated itself as a promising concept for currently faced challenges in power distribution systems. In this work, we propose an operational resilience metric for modern power distribution systems. The metric is based on the aggregation of system assets adaptive capacity in real and reactive power. This metric gives information to the magnitude and duration of a disturbance the system can withstand. We demonstrate resilience metric in a case study under normal operation and during a power contingency on a microgrid. In the future, this information can be used by operators to make more informed decisions based on system resilience in an effort to prevent power outages.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127113982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-01DOI: 10.1109/QRS-C51114.2020.00086
Xinyi Wang, Gaolei Yi, Yichen Wang
Cyber-Physical Systems (CPS) is a multidimensional complex system that integrates computing, network and physical environment. Flight control system enables the aircraft to interact with the outside world and other components, which is a typical CPS. The Verification of safety has been a research hotspot. Model checking is a formal verification method with a high degree of automation, including three steps: model construction, properties specifications and execution. In general, Properties has been generated based on the subjective experience of the verifier, and there is a lack of a strict process. We focus on the process of establishing specifications using Failure mode and effect analysis (FMEA) And then use our improved method to do the requirement level model checking about the return process and collision prevention based on PX4 flight control system. The results prove that our method makes the model checking logic clearer and has good adaptability.
{"title":"An Empirical Study of Flight Control System Model Checking Integrated with FMEA","authors":"Xinyi Wang, Gaolei Yi, Yichen Wang","doi":"10.1109/QRS-C51114.2020.00086","DOIUrl":"https://doi.org/10.1109/QRS-C51114.2020.00086","url":null,"abstract":"Cyber-Physical Systems (CPS) is a multidimensional complex system that integrates computing, network and physical environment. Flight control system enables the aircraft to interact with the outside world and other components, which is a typical CPS. The Verification of safety has been a research hotspot. Model checking is a formal verification method with a high degree of automation, including three steps: model construction, properties specifications and execution. In general, Properties has been generated based on the subjective experience of the verifier, and there is a lack of a strict process. We focus on the process of establishing specifications using Failure mode and effect analysis (FMEA) And then use our improved method to do the requirement level model checking about the return process and collision prevention based on PX4 flight control system. The results prove that our method makes the model checking logic clearer and has good adaptability.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133862127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-01DOI: 10.1109/QRS-C51114.2020.00052
Michael Shoga, Celia Chen, B. Boehm
Despite the importance of software qualities, they are not well understood, especially in the context of the interrelationships between qualities. A number of systematic mapping studies have been conducted prior to 2015 to summarize the literature on the topic and to identify research gaps. To provide a better understanding of the current state of the art, we conducted a systematic mapping study on relevant studies from 2015 to 2019 through a database search and a subsequent snowballing approach. In total, 18 studies were selected as the study subjects wherein we evaluated the types of software quality interrelationships and the qualities that comprise them. Based on our findings, we report on the progress made to address previously identified research gaps.
{"title":"Recent Trends in Software Quality Interrelationships: A Systematic Mapping Study","authors":"Michael Shoga, Celia Chen, B. Boehm","doi":"10.1109/QRS-C51114.2020.00052","DOIUrl":"https://doi.org/10.1109/QRS-C51114.2020.00052","url":null,"abstract":"Despite the importance of software qualities, they are not well understood, especially in the context of the interrelationships between qualities. A number of systematic mapping studies have been conducted prior to 2015 to summarize the literature on the topic and to identify research gaps. To provide a better understanding of the current state of the art, we conducted a systematic mapping study on relevant studies from 2015 to 2019 through a database search and a subsequent snowballing approach. In total, 18 studies were selected as the study subjects wherein we evaluated the types of software quality interrelationships and the qualities that comprise them. Based on our findings, we report on the progress made to address previously identified research gaps.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134180228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
State Grid ICT call center has a large number of data, such as structured work orders and unstructured voice files, and its rich value needs to be developed. Based on the existing cross-media data of State Grid ICT call center, constructing a large-scale knowledge graph, studies data entity extraction technology and entity relationship extraction model, and traces the hot questions of the system according to its data relevance. Auxiliary analysis system of ICT call center data uses hot events to analyze user needs, shortens the time of ICT system fault detection, improves the efficiency of system fault recovery, improves the level of ICT call center intelligence, and guides the optimization direction of service system. Through the pilot application of typical business scenarios such as e-commerce platform, it can effectively improve the answer coverage and answer accuracy of user questions, and improve customer service satisfaction and intelligent analysis level of business system.
{"title":"Research and Development of ICT Call Center Data Auxiliary Analysis System Based on Knowledge Discovery","authors":"Xiangna Li, Zhongping Xu, Xuedong Li, Tao Zhang, Rongrong Zheng, Xiao Han, Chenhui Wang, Bing Tian","doi":"10.1109/QRS-C51114.2020.00066","DOIUrl":"https://doi.org/10.1109/QRS-C51114.2020.00066","url":null,"abstract":"State Grid ICT call center has a large number of data, such as structured work orders and unstructured voice files, and its rich value needs to be developed. Based on the existing cross-media data of State Grid ICT call center, constructing a large-scale knowledge graph, studies data entity extraction technology and entity relationship extraction model, and traces the hot questions of the system according to its data relevance. Auxiliary analysis system of ICT call center data uses hot events to analyze user needs, shortens the time of ICT system fault detection, improves the efficiency of system fault recovery, improves the level of ICT call center intelligence, and guides the optimization direction of service system. Through the pilot application of typical business scenarios such as e-commerce platform, it can effectively improve the answer coverage and answer accuracy of user questions, and improve customer service satisfaction and intelligent analysis level of business system.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134565059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-01DOI: 10.1109/QRS-C51114.2020.00022
Xiaolei Sun, Tongyu Li, Jianfeng Xu
Before the release of mobile application products, a lot of repeated testing is often required. In the process of mobile application testing, the core problem is to locate the UI components on the mobile application screenshots. There are many methods to automatically identify UI components, but in some cases, such as crowdsourcing testing, it is difficult to use automatic methods to identify UI components. In view of this, the APP UI components recognition system based on image understanding provides new solutions and methods for application scenarios that are difficult to automatically locate components. We investigate Android UI component information, use image understanding analysis to extract component images on screenshot, design and implement a convolutional neural networks, and then use trained CNN to classify these images. The classification accuracy is up to 96.97%. In the end, we get the component information contained in screenshot.
{"title":"UI Components Recognition System Based On Image Understanding","authors":"Xiaolei Sun, Tongyu Li, Jianfeng Xu","doi":"10.1109/QRS-C51114.2020.00022","DOIUrl":"https://doi.org/10.1109/QRS-C51114.2020.00022","url":null,"abstract":"Before the release of mobile application products, a lot of repeated testing is often required. In the process of mobile application testing, the core problem is to locate the UI components on the mobile application screenshots. There are many methods to automatically identify UI components, but in some cases, such as crowdsourcing testing, it is difficult to use automatic methods to identify UI components. In view of this, the APP UI components recognition system based on image understanding provides new solutions and methods for application scenarios that are difficult to automatically locate components. We investigate Android UI component information, use image understanding analysis to extract component images on screenshot, design and implement a convolutional neural networks, and then use trained CNN to classify these images. The classification accuracy is up to 96.97%. In the end, we get the component information contained in screenshot.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"14 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132781927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-01DOI: 10.1109/QRS-C51114.2020.00036
Songpon Teerakanok, Hiroaki Yasuki, T. Uehara
This research presents a practical countermeasure against the problem of the bogus invoice scheme, one of the most threatening BEC attacks in modern business. We introduce a straightforward yet highly practical method of creating a checksum from the invoice and shared secret information. Using the generated checksum allows the recipient to confirm the authenticity and integrity of the invoice before proceeding with the actual payment. In this work, generating and verifying of checksum information are done via a smartphone application. Also, the predetermined secret information is stored inside the smartphone to provide better protection against data theft. Lastly, an Android-based application for checksum generation and verification, supporting both manual input and QR code scan, is implemented to demonstrate the use case scenario and practicability of the proposed method.
{"title":"A Practical Solution Against Business Email Compromise (BEC) Attack using Invoice Checksum","authors":"Songpon Teerakanok, Hiroaki Yasuki, T. Uehara","doi":"10.1109/QRS-C51114.2020.00036","DOIUrl":"https://doi.org/10.1109/QRS-C51114.2020.00036","url":null,"abstract":"This research presents a practical countermeasure against the problem of the bogus invoice scheme, one of the most threatening BEC attacks in modern business. We introduce a straightforward yet highly practical method of creating a checksum from the invoice and shared secret information. Using the generated checksum allows the recipient to confirm the authenticity and integrity of the invoice before proceeding with the actual payment. In this work, generating and verifying of checksum information are done via a smartphone application. Also, the predetermined secret information is stored inside the smartphone to provide better protection against data theft. Lastly, an Android-based application for checksum generation and verification, supporting both manual input and QR code scan, is implemented to demonstrate the use case scenario and practicability of the proposed method.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134220991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-01DOI: 10.1109/QRS-C51114.2020.00083
Chong Wang, Yunwei Dong, Pengpeng Sun, Yin Lu
Cascading failures may lead to large scale outages, which brings about significant economic losses and serious social impacts. It is very important to predict cross-domain cascading failures paths for identification of weak nodes, which contributes to the control policies for preventing cascading failures and blocking their propagation between cyber domain and physical domain in cyber-physical active distribution networks. This paper proposes an algorithm based on the Frequent-Patterns-Growth (FP-Growth) to predict cascading failure paths, which predicts the potential failure node set by analyzing a large number of simulation datum and mining the hidden association relationship among datum. To demonstrate the effectiveness of the proposed cascading failure path prediction approach, an empirical study on a cyber-physical active distribution network, named CEPRI-CPS from Electric Power Research Institute of China, is performed, and the result shows the robustness of cyber-physical active distribution networks can be improved with prediction approach in this paper.
{"title":"Cascading Failure Path Prediction based on Association Rules in Cyber-Physical Active Distribution Networks","authors":"Chong Wang, Yunwei Dong, Pengpeng Sun, Yin Lu","doi":"10.1109/QRS-C51114.2020.00083","DOIUrl":"https://doi.org/10.1109/QRS-C51114.2020.00083","url":null,"abstract":"Cascading failures may lead to large scale outages, which brings about significant economic losses and serious social impacts. It is very important to predict cross-domain cascading failures paths for identification of weak nodes, which contributes to the control policies for preventing cascading failures and blocking their propagation between cyber domain and physical domain in cyber-physical active distribution networks. This paper proposes an algorithm based on the Frequent-Patterns-Growth (FP-Growth) to predict cascading failure paths, which predicts the potential failure node set by analyzing a large number of simulation datum and mining the hidden association relationship among datum. To demonstrate the effectiveness of the proposed cascading failure path prediction approach, an empirical study on a cyber-physical active distribution network, named CEPRI-CPS from Electric Power Research Institute of China, is performed, and the result shows the robustness of cyber-physical active distribution networks can be improved with prediction approach in this paper.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134374886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-01DOI: 10.1109/QRS-C51114.2020.00108
Penggui Huang, Bi Huang, Youjie Zhao, Zhenping Qiang, Minmin Qing
The information generated by the internet of vehicles during normal operation involves personal privacy. Due to the lack of appropriate information security mechanisms in IoV architecture, IoV has the risk of privacy leakage. However, the emergence of blockchain brings opportunities to solve these problems. The combination of blockchain and IoV can make full use of the advantages of the blockchain (such as distributed storage, and smart contracts) to solve some problems in the IoV. In this paper, we investigate the combination of blockchain and IoV and name this structure as BCoV. Firstly, we introduce the structure of IoV and discuss the challenges of IoV. Secondly, we outline the blockchain structure, consensus algorithm, and smart contract. Thirdly, we discuss the convergence of blockchain and IoV and propose the architecture of BCoV, and make a comparison with IoV. Fourthly, we introduce some applications of BCoV. Finally, we present the challenges of BCoV.
{"title":"BCoV: a covergence of blockchain and IoV","authors":"Penggui Huang, Bi Huang, Youjie Zhao, Zhenping Qiang, Minmin Qing","doi":"10.1109/QRS-C51114.2020.00108","DOIUrl":"https://doi.org/10.1109/QRS-C51114.2020.00108","url":null,"abstract":"The information generated by the internet of vehicles during normal operation involves personal privacy. Due to the lack of appropriate information security mechanisms in IoV architecture, IoV has the risk of privacy leakage. However, the emergence of blockchain brings opportunities to solve these problems. The combination of blockchain and IoV can make full use of the advantages of the blockchain (such as distributed storage, and smart contracts) to solve some problems in the IoV. In this paper, we investigate the combination of blockchain and IoV and name this structure as BCoV. Firstly, we introduce the structure of IoV and discuss the challenges of IoV. Secondly, we outline the blockchain structure, consensus algorithm, and smart contract. Thirdly, we discuss the convergence of blockchain and IoV and propose the architecture of BCoV, and make a comparison with IoV. Fourthly, we introduce some applications of BCoV. Finally, we present the challenges of BCoV.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133089905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-01DOI: 10.1109/QRS-C51114.2020.00113
Z. Zuo, Yue-Jian Fang, Qing Huang, Yunyan Liao, Yuan-jiang Wang, Changjing Wang
The development of loop invariants for recursive problems of nonlinear data structures is always difficult problem in formal development. The paper studies the derivation and formal proof of binary tree traversal class non-recursive algorithm. The non-recursive Apla (Abstract Programming Language) algorithms of binary tree traversal class problems and their exact and simple loop invariants are derived. Then, the correctness of the algorithm is proved by Dijkstra-Gries standard proving technique. Finally, the PAR platform is used to automatically generate C++ code, which realizes the complete refinement process from abstract specification to concrete executable program. The results of this study point out the direction for the exploration of the loop invariant of the nonrecursive algorithm for recursive problems and have guiding significance for the derivation and formal proof of the algorithm program of the nonlinear data structure.
{"title":"Non-recursive Algorithm Derivation and Formal Proof of Binary Tree Traversal Class Problems","authors":"Z. Zuo, Yue-Jian Fang, Qing Huang, Yunyan Liao, Yuan-jiang Wang, Changjing Wang","doi":"10.1109/QRS-C51114.2020.00113","DOIUrl":"https://doi.org/10.1109/QRS-C51114.2020.00113","url":null,"abstract":"The development of loop invariants for recursive problems of nonlinear data structures is always difficult problem in formal development. The paper studies the derivation and formal proof of binary tree traversal class non-recursive algorithm. The non-recursive Apla (Abstract Programming Language) algorithms of binary tree traversal class problems and their exact and simple loop invariants are derived. Then, the correctness of the algorithm is proved by Dijkstra-Gries standard proving technique. Finally, the PAR platform is used to automatically generate C++ code, which realizes the complete refinement process from abstract specification to concrete executable program. The results of this study point out the direction for the exploration of the loop invariant of the nonrecursive algorithm for recursive problems and have guiding significance for the derivation and formal proof of the algorithm program of the nonlinear data structure.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130553610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}