首页 > 最新文献

2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)最新文献

英文 中文
A Creative Approach to Humour Degree Calculation for Utterances 话语幽默度计算的一种创新方法
Tian Liu, Hongji Yang, Feng-Jian Wang
Humour is valued by people for its many positive social functions, which is also of great merit for computing exploration. Especially in this era, many advanced computing science and technologies allow new perspectives to address this topic. Among them, creative computing, which aims to offer new and surprising computing solutions, can lend its theoretical and technical supports to humour generation and exploitation. Based on it, the proposed research first raises the concept of the humour degree to bridge the more qualitative topic of humour with the quantitative nature of computing, so as to build a new basis for the following computing work. Secondly, a creative system is designed to calculate the humour degree for utterances. Thirdly, the experiment is conducted to validate the effectiveness of the system. The results show that it is feasible and significant to calculate the humour degree for utterances through a creative computing approach.
幽默因其许多积极的社会功能而受到人们的重视,这对计算机探索也有很大的价值。特别是在这个时代,许多先进的计算科学和技术为解决这个主题提供了新的视角。其中,创意计算,旨在提供新的和令人惊讶的计算解决方案,可以为幽默的产生和开发提供理论和技术支持。在此基础上,本研究首先提出幽默度的概念,将幽默这一更为定性的话题与计算的定量性质架起一座桥梁,为后续的计算工作奠定新的基础。其次,设计了一个创造性的系统来计算话语的幽默程度。最后,通过实验验证了系统的有效性。结果表明,通过一种创造性的计算方法来计算话语幽默度是可行和有意义的。
{"title":"A Creative Approach to Humour Degree Calculation for Utterances","authors":"Tian Liu, Hongji Yang, Feng-Jian Wang","doi":"10.1109/QRS-C51114.2020.00110","DOIUrl":"https://doi.org/10.1109/QRS-C51114.2020.00110","url":null,"abstract":"Humour is valued by people for its many positive social functions, which is also of great merit for computing exploration. Especially in this era, many advanced computing science and technologies allow new perspectives to address this topic. Among them, creative computing, which aims to offer new and surprising computing solutions, can lend its theoretical and technical supports to humour generation and exploitation. Based on it, the proposed research first raises the concept of the humour degree to bridge the more qualitative topic of humour with the quantitative nature of computing, so as to build a new basis for the following computing work. Secondly, a creative system is designed to calculate the humour degree for utterances. Thirdly, the experiment is conducted to validate the effectiveness of the system. The results show that it is feasible and significant to calculate the humour degree for utterances through a creative computing approach.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126785437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Operational Resilience Metric for Modern Power Distribution Systems 现代配电系统的运行弹性度量
T. Phillips, T. McJunkin, C. Rieger, J. Gardner, Hoda Mehrpouyan
The electrical power system is the backbone of our nations critical infrastructure. It has been designed to withstand single component failures based on a set of reliability metrics which have proven acceptable during normal operating conditions. However, in recent years there has been an increasing frequency of extreme weather events. Many have resulted in widespread long-term power outages, proving reliability metrics do not provide adequate energy security. As a result, researchers have focused their efforts resilience metrics to ensure efficient operation of power systems during extreme events. A resilient system has the ability to resist, adapt, and recover from disruptions. Therefore, resilience has demonstrated itself as a promising concept for currently faced challenges in power distribution systems. In this work, we propose an operational resilience metric for modern power distribution systems. The metric is based on the aggregation of system assets adaptive capacity in real and reactive power. This metric gives information to the magnitude and duration of a disturbance the system can withstand. We demonstrate resilience metric in a case study under normal operation and during a power contingency on a microgrid. In the future, this information can be used by operators to make more informed decisions based on system resilience in an effort to prevent power outages.
电力系统是我国关键基础设施的支柱。它的设计是基于一组在正常操作条件下已被证明是可接受的可靠性指标,以承受单组件故障。然而,近年来极端天气事件越来越频繁。许多事故导致了大范围的长期停电,证明可靠性指标不能提供足够的能源安全。因此,研究人员将精力集中在弹性指标上,以确保电力系统在极端事件下的有效运行。弹性系统具有抵抗、适应和从中断中恢复的能力。因此,对于目前配电系统面临的挑战,弹性已被证明是一个有前途的概念。在这项工作中,我们提出了一个现代配电系统的运行弹性度量。该指标是基于系统资产在实功率和无功功率下的自适应能力的总和。这个度量给出了系统可以承受的扰动的大小和持续时间的信息。我们在一个案例研究中展示了在正常运行和微电网突发事件期间的弹性度量。在未来,这些信息可以被运营商用来根据系统弹性做出更明智的决策,以防止停电。
{"title":"An Operational Resilience Metric for Modern Power Distribution Systems","authors":"T. Phillips, T. McJunkin, C. Rieger, J. Gardner, Hoda Mehrpouyan","doi":"10.1109/QRS-C51114.2020.00065","DOIUrl":"https://doi.org/10.1109/QRS-C51114.2020.00065","url":null,"abstract":"The electrical power system is the backbone of our nations critical infrastructure. It has been designed to withstand single component failures based on a set of reliability metrics which have proven acceptable during normal operating conditions. However, in recent years there has been an increasing frequency of extreme weather events. Many have resulted in widespread long-term power outages, proving reliability metrics do not provide adequate energy security. As a result, researchers have focused their efforts resilience metrics to ensure efficient operation of power systems during extreme events. A resilient system has the ability to resist, adapt, and recover from disruptions. Therefore, resilience has demonstrated itself as a promising concept for currently faced challenges in power distribution systems. In this work, we propose an operational resilience metric for modern power distribution systems. The metric is based on the aggregation of system assets adaptive capacity in real and reactive power. This metric gives information to the magnitude and duration of a disturbance the system can withstand. We demonstrate resilience metric in a case study under normal operation and during a power contingency on a microgrid. In the future, this information can be used by operators to make more informed decisions based on system resilience in an effort to prevent power outages.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127113982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
An Empirical Study of Flight Control System Model Checking Integrated with FMEA 结合FMEA的飞控系统模型校核的实证研究
Xinyi Wang, Gaolei Yi, Yichen Wang
Cyber-Physical Systems (CPS) is a multidimensional complex system that integrates computing, network and physical environment. Flight control system enables the aircraft to interact with the outside world and other components, which is a typical CPS. The Verification of safety has been a research hotspot. Model checking is a formal verification method with a high degree of automation, including three steps: model construction, properties specifications and execution. In general, Properties has been generated based on the subjective experience of the verifier, and there is a lack of a strict process. We focus on the process of establishing specifications using Failure mode and effect analysis (FMEA) And then use our improved method to do the requirement level model checking about the return process and collision prevention based on PX4 flight control system. The results prove that our method makes the model checking logic clearer and has good adaptability.
信息物理系统(CPS)是一个集计算、网络和物理环境于一体的多维复杂系统。飞行控制系统使飞机能够与外界和其他部件进行交互,这是典型的CPS。安全性验证一直是一个研究热点。模型检查是一种自动化程度很高的形式化验证方法,包括模型构建、属性规范和执行三个步骤。一般来说,Properties是基于验证者的主观经验生成的,并且缺乏严格的过程。重点介绍了利用失效模式与影响分析(FMEA)建立规范的过程,然后利用改进的方法对基于PX4飞控系统的返航过程和碰撞预防进行了需求级模型校核。结果表明,该方法使模型检测逻辑更清晰,具有良好的适应性。
{"title":"An Empirical Study of Flight Control System Model Checking Integrated with FMEA","authors":"Xinyi Wang, Gaolei Yi, Yichen Wang","doi":"10.1109/QRS-C51114.2020.00086","DOIUrl":"https://doi.org/10.1109/QRS-C51114.2020.00086","url":null,"abstract":"Cyber-Physical Systems (CPS) is a multidimensional complex system that integrates computing, network and physical environment. Flight control system enables the aircraft to interact with the outside world and other components, which is a typical CPS. The Verification of safety has been a research hotspot. Model checking is a formal verification method with a high degree of automation, including three steps: model construction, properties specifications and execution. In general, Properties has been generated based on the subjective experience of the verifier, and there is a lack of a strict process. We focus on the process of establishing specifications using Failure mode and effect analysis (FMEA) And then use our improved method to do the requirement level model checking about the return process and collision prevention based on PX4 flight control system. The results prove that our method makes the model checking logic clearer and has good adaptability.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133862127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recent Trends in Software Quality Interrelationships: A Systematic Mapping Study 软件质量相互关系的最新趋势:一个系统的映射研究
Michael Shoga, Celia Chen, B. Boehm
Despite the importance of software qualities, they are not well understood, especially in the context of the interrelationships between qualities. A number of systematic mapping studies have been conducted prior to 2015 to summarize the literature on the topic and to identify research gaps. To provide a better understanding of the current state of the art, we conducted a systematic mapping study on relevant studies from 2015 to 2019 through a database search and a subsequent snowballing approach. In total, 18 studies were selected as the study subjects wherein we evaluated the types of software quality interrelationships and the qualities that comprise them. Based on our findings, we report on the progress made to address previously identified research gaps.
尽管软件质量很重要,但它们并没有被很好地理解,特别是在质量之间相互关系的上下文中。在2015年之前,已经进行了一些系统的测绘研究,以总结有关该主题的文献并确定研究空白。为了更好地了解目前的现状,我们通过数据库检索和随后的滚雪球法,对2015年至2019年的相关研究进行了系统的制图研究。总的来说,我们选择了18个研究作为研究对象,在这些研究中我们评估了软件质量相互关系的类型以及组成它们的质量。根据我们的发现,我们报告了在解决先前确定的研究差距方面取得的进展。
{"title":"Recent Trends in Software Quality Interrelationships: A Systematic Mapping Study","authors":"Michael Shoga, Celia Chen, B. Boehm","doi":"10.1109/QRS-C51114.2020.00052","DOIUrl":"https://doi.org/10.1109/QRS-C51114.2020.00052","url":null,"abstract":"Despite the importance of software qualities, they are not well understood, especially in the context of the interrelationships between qualities. A number of systematic mapping studies have been conducted prior to 2015 to summarize the literature on the topic and to identify research gaps. To provide a better understanding of the current state of the art, we conducted a systematic mapping study on relevant studies from 2015 to 2019 through a database search and a subsequent snowballing approach. In total, 18 studies were selected as the study subjects wherein we evaluated the types of software quality interrelationships and the qualities that comprise them. Based on our findings, we report on the progress made to address previously identified research gaps.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134180228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research and Development of ICT Call Center Data Auxiliary Analysis System Based on Knowledge Discovery 基于知识发现的ICT呼叫中心数据辅助分析系统的研究与开发
Xiangna Li, Zhongping Xu, Xuedong Li, Tao Zhang, Rongrong Zheng, Xiao Han, Chenhui Wang, Bing Tian
State Grid ICT call center has a large number of data, such as structured work orders and unstructured voice files, and its rich value needs to be developed. Based on the existing cross-media data of State Grid ICT call center, constructing a large-scale knowledge graph, studies data entity extraction technology and entity relationship extraction model, and traces the hot questions of the system according to its data relevance. Auxiliary analysis system of ICT call center data uses hot events to analyze user needs, shortens the time of ICT system fault detection, improves the efficiency of system fault recovery, improves the level of ICT call center intelligence, and guides the optimization direction of service system. Through the pilot application of typical business scenarios such as e-commerce platform, it can effectively improve the answer coverage and answer accuracy of user questions, and improve customer service satisfaction and intelligent analysis level of business system.
国网ICT呼叫中心拥有大量结构化工单、非结构化语音文件等数据,其丰富的价值有待开发。基于国网ICT呼叫中心现有跨媒体数据,构建大规模知识图谱,研究数据实体抽取技术和实体关系抽取模型,并根据其数据相关性对系统热点问题进行追溯。ICT呼叫中心数据辅助分析系统利用热点事件分析用户需求,缩短ICT系统故障检测时间,提高系统故障恢复效率,提高ICT呼叫中心智能化水平,指导业务系统优化方向。通过电商平台等典型业务场景的试点应用,可以有效提高用户问题的回答覆盖率和回答准确率,提高客户服务满意度和业务系统的智能分析水平。
{"title":"Research and Development of ICT Call Center Data Auxiliary Analysis System Based on Knowledge Discovery","authors":"Xiangna Li, Zhongping Xu, Xuedong Li, Tao Zhang, Rongrong Zheng, Xiao Han, Chenhui Wang, Bing Tian","doi":"10.1109/QRS-C51114.2020.00066","DOIUrl":"https://doi.org/10.1109/QRS-C51114.2020.00066","url":null,"abstract":"State Grid ICT call center has a large number of data, such as structured work orders and unstructured voice files, and its rich value needs to be developed. Based on the existing cross-media data of State Grid ICT call center, constructing a large-scale knowledge graph, studies data entity extraction technology and entity relationship extraction model, and traces the hot questions of the system according to its data relevance. Auxiliary analysis system of ICT call center data uses hot events to analyze user needs, shortens the time of ICT system fault detection, improves the efficiency of system fault recovery, improves the level of ICT call center intelligence, and guides the optimization direction of service system. Through the pilot application of typical business scenarios such as e-commerce platform, it can effectively improve the answer coverage and answer accuracy of user questions, and improve customer service satisfaction and intelligent analysis level of business system.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134565059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
UI Components Recognition System Based On Image Understanding 基于图像理解的UI组件识别系统
Xiaolei Sun, Tongyu Li, Jianfeng Xu
Before the release of mobile application products, a lot of repeated testing is often required. In the process of mobile application testing, the core problem is to locate the UI components on the mobile application screenshots. There are many methods to automatically identify UI components, but in some cases, such as crowdsourcing testing, it is difficult to use automatic methods to identify UI components. In view of this, the APP UI components recognition system based on image understanding provides new solutions and methods for application scenarios that are difficult to automatically locate components. We investigate Android UI component information, use image understanding analysis to extract component images on screenshot, design and implement a convolutional neural networks, and then use trained CNN to classify these images. The classification accuracy is up to 96.97%. In the end, we get the component information contained in screenshot.
在移动应用产品发布之前,通常需要进行大量的重复测试。在移动应用测试过程中,最核心的问题是在移动应用截图上定位UI组件。自动识别UI组件的方法有很多,但在某些情况下,例如众包测试,很难使用自动方法来识别UI组件。鉴于此,基于图像理解的APP UI组件识别系统为难以自动定位组件的应用场景提供了新的解决方案和方法。我们研究Android UI的组件信息,利用图像理解分析提取截图上的组件图像,设计并实现卷积神经网络,然后使用训练好的CNN对这些图像进行分类。分类准确率达96.97%。最后,我们得到了包含在截图中的组件信息。
{"title":"UI Components Recognition System Based On Image Understanding","authors":"Xiaolei Sun, Tongyu Li, Jianfeng Xu","doi":"10.1109/QRS-C51114.2020.00022","DOIUrl":"https://doi.org/10.1109/QRS-C51114.2020.00022","url":null,"abstract":"Before the release of mobile application products, a lot of repeated testing is often required. In the process of mobile application testing, the core problem is to locate the UI components on the mobile application screenshots. There are many methods to automatically identify UI components, but in some cases, such as crowdsourcing testing, it is difficult to use automatic methods to identify UI components. In view of this, the APP UI components recognition system based on image understanding provides new solutions and methods for application scenarios that are difficult to automatically locate components. We investigate Android UI component information, use image understanding analysis to extract component images on screenshot, design and implement a convolutional neural networks, and then use trained CNN to classify these images. The classification accuracy is up to 96.97%. In the end, we get the component information contained in screenshot.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"14 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132781927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Practical Solution Against Business Email Compromise (BEC) Attack using Invoice Checksum 一个实用的解决方案,反对商业电子邮件妥协(BEC)攻击使用发票校验和
Songpon Teerakanok, Hiroaki Yasuki, T. Uehara
This research presents a practical countermeasure against the problem of the bogus invoice scheme, one of the most threatening BEC attacks in modern business. We introduce a straightforward yet highly practical method of creating a checksum from the invoice and shared secret information. Using the generated checksum allows the recipient to confirm the authenticity and integrity of the invoice before proceeding with the actual payment. In this work, generating and verifying of checksum information are done via a smartphone application. Also, the predetermined secret information is stored inside the smartphone to provide better protection against data theft. Lastly, an Android-based application for checksum generation and verification, supporting both manual input and QR code scan, is implemented to demonstrate the use case scenario and practicability of the proposed method.
本文针对现代商业中最具威胁性的BEC攻击之一——假发票攻击,提出了一种切实可行的解决方案。我们介绍了一种简单但非常实用的方法,可以从发票和共享的秘密信息中创建校验和。使用生成的校验和允许接收方在进行实际付款之前确认发票的真实性和完整性。在这项工作中,通过智能手机应用程序生成和验证校验和信息。此外,预定的秘密信息存储在智能手机中,以提供更好的保护,防止数据被盗。最后,实现了一个基于android的校验和生成和验证应用程序,支持手动输入和QR码扫描,以演示所提出方法的用例场景和实用性。
{"title":"A Practical Solution Against Business Email Compromise (BEC) Attack using Invoice Checksum","authors":"Songpon Teerakanok, Hiroaki Yasuki, T. Uehara","doi":"10.1109/QRS-C51114.2020.00036","DOIUrl":"https://doi.org/10.1109/QRS-C51114.2020.00036","url":null,"abstract":"This research presents a practical countermeasure against the problem of the bogus invoice scheme, one of the most threatening BEC attacks in modern business. We introduce a straightforward yet highly practical method of creating a checksum from the invoice and shared secret information. Using the generated checksum allows the recipient to confirm the authenticity and integrity of the invoice before proceeding with the actual payment. In this work, generating and verifying of checksum information are done via a smartphone application. Also, the predetermined secret information is stored inside the smartphone to provide better protection against data theft. Lastly, an Android-based application for checksum generation and verification, supporting both manual input and QR code scan, is implemented to demonstrate the use case scenario and practicability of the proposed method.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134220991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Cascading Failure Path Prediction based on Association Rules in Cyber-Physical Active Distribution Networks 基于关联规则的网络-物理有源配电网级联故障路径预测
Chong Wang, Yunwei Dong, Pengpeng Sun, Yin Lu
Cascading failures may lead to large scale outages, which brings about significant economic losses and serious social impacts. It is very important to predict cross-domain cascading failures paths for identification of weak nodes, which contributes to the control policies for preventing cascading failures and blocking their propagation between cyber domain and physical domain in cyber-physical active distribution networks. This paper proposes an algorithm based on the Frequent-Patterns-Growth (FP-Growth) to predict cascading failure paths, which predicts the potential failure node set by analyzing a large number of simulation datum and mining the hidden association relationship among datum. To demonstrate the effectiveness of the proposed cascading failure path prediction approach, an empirical study on a cyber-physical active distribution network, named CEPRI-CPS from Electric Power Research Institute of China, is performed, and the result shows the robustness of cyber-physical active distribution networks can be improved with prediction approach in this paper.
级联故障可能导致大规模的停电,造成巨大的经济损失和严重的社会影响。预测跨域级联故障路径对于识别弱节点具有重要意义,这有助于制定控制策略,防止级联故障在网络-物理有源配电网中在网络域和物理域之间传播。本文提出了一种基于频率模式增长(frequency - patterns - growth, FP-Growth)的级联故障路径预测算法,该算法通过分析大量仿真数据,挖掘数据之间隐藏的关联关系,预测潜在故障节点集。为验证级联故障路径预测方法的有效性,以中国电力科学研究院CEPRI-CPS网络物理有功配电网为例进行了实证研究,结果表明本文预测方法可以提高网络物理有功配电网的鲁棒性。
{"title":"Cascading Failure Path Prediction based on Association Rules in Cyber-Physical Active Distribution Networks","authors":"Chong Wang, Yunwei Dong, Pengpeng Sun, Yin Lu","doi":"10.1109/QRS-C51114.2020.00083","DOIUrl":"https://doi.org/10.1109/QRS-C51114.2020.00083","url":null,"abstract":"Cascading failures may lead to large scale outages, which brings about significant economic losses and serious social impacts. It is very important to predict cross-domain cascading failures paths for identification of weak nodes, which contributes to the control policies for preventing cascading failures and blocking their propagation between cyber domain and physical domain in cyber-physical active distribution networks. This paper proposes an algorithm based on the Frequent-Patterns-Growth (FP-Growth) to predict cascading failure paths, which predicts the potential failure node set by analyzing a large number of simulation datum and mining the hidden association relationship among datum. To demonstrate the effectiveness of the proposed cascading failure path prediction approach, an empirical study on a cyber-physical active distribution network, named CEPRI-CPS from Electric Power Research Institute of China, is performed, and the result shows the robustness of cyber-physical active distribution networks can be improved with prediction approach in this paper.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134374886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
BCoV: a covergence of blockchain and IoV BCoV:区块链与车联网的融合
Penggui Huang, Bi Huang, Youjie Zhao, Zhenping Qiang, Minmin Qing
The information generated by the internet of vehicles during normal operation involves personal privacy. Due to the lack of appropriate information security mechanisms in IoV architecture, IoV has the risk of privacy leakage. However, the emergence of blockchain brings opportunities to solve these problems. The combination of blockchain and IoV can make full use of the advantages of the blockchain (such as distributed storage, and smart contracts) to solve some problems in the IoV. In this paper, we investigate the combination of blockchain and IoV and name this structure as BCoV. Firstly, we introduce the structure of IoV and discuss the challenges of IoV. Secondly, we outline the blockchain structure, consensus algorithm, and smart contract. Thirdly, we discuss the convergence of blockchain and IoV and propose the architecture of BCoV, and make a comparison with IoV. Fourthly, we introduce some applications of BCoV. Finally, we present the challenges of BCoV.
车联网在正常运行过程中产生的信息涉及个人隐私。由于车联网架构中缺乏适当的信息安全机制,车联网存在隐私泄露的风险。然而,b区块链的出现为解决这些问题带来了机遇。区块链与IoV的结合可以充分利用区块链的优势(如分布式存储、智能合约等)来解决IoV中的一些问题。本文研究区块链与IoV的结合,并将其命名为BCoV。首先,我们介绍了车联网的结构,讨论了车联网面临的挑战。其次,我们概述了区块链结构、共识算法和智能合约。第三,讨论了区块链与IoV的收敛性,提出了BCoV的架构,并与IoV进行了比较。第四,介绍了BCoV的一些应用。最后,我们提出了BCoV的挑战。
{"title":"BCoV: a covergence of blockchain and IoV","authors":"Penggui Huang, Bi Huang, Youjie Zhao, Zhenping Qiang, Minmin Qing","doi":"10.1109/QRS-C51114.2020.00108","DOIUrl":"https://doi.org/10.1109/QRS-C51114.2020.00108","url":null,"abstract":"The information generated by the internet of vehicles during normal operation involves personal privacy. Due to the lack of appropriate information security mechanisms in IoV architecture, IoV has the risk of privacy leakage. However, the emergence of blockchain brings opportunities to solve these problems. The combination of blockchain and IoV can make full use of the advantages of the blockchain (such as distributed storage, and smart contracts) to solve some problems in the IoV. In this paper, we investigate the combination of blockchain and IoV and name this structure as BCoV. Firstly, we introduce the structure of IoV and discuss the challenges of IoV. Secondly, we outline the blockchain structure, consensus algorithm, and smart contract. Thirdly, we discuss the convergence of blockchain and IoV and propose the architecture of BCoV, and make a comparison with IoV. Fourthly, we introduce some applications of BCoV. Finally, we present the challenges of BCoV.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133089905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Non-recursive Algorithm Derivation and Formal Proof of Binary Tree Traversal Class Problems 二叉树遍历类问题的非递归算法推导与形式化证明
Z. Zuo, Yue-Jian Fang, Qing Huang, Yunyan Liao, Yuan-jiang Wang, Changjing Wang
The development of loop invariants for recursive problems of nonlinear data structures is always difficult problem in formal development. The paper studies the derivation and formal proof of binary tree traversal class non-recursive algorithm. The non-recursive Apla (Abstract Programming Language) algorithms of binary tree traversal class problems and their exact and simple loop invariants are derived. Then, the correctness of the algorithm is proved by Dijkstra-Gries standard proving technique. Finally, the PAR platform is used to automatically generate C++ code, which realizes the complete refinement process from abstract specification to concrete executable program. The results of this study point out the direction for the exploration of the loop invariant of the nonrecursive algorithm for recursive problems and have guiding significance for the derivation and formal proof of the algorithm program of the nonlinear data structure.
非线性数据结构递归问题的循环不变量的发展一直是形式化发展中的难题。研究了二叉树遍历类非递归算法的推导和形式化证明。推导了二叉树遍历类问题的非递归算法及其精确和简单的循环不变量。然后用Dijkstra-Gries标准证明技术证明了算法的正确性。最后利用PAR平台自动生成c++代码,实现了从抽象规范到具体可执行程序的完整细化过程。本研究结果为探索递归问题的非递归算法的循环不变量指明了方向,对非线性数据结构的算法程序的推导和形式化证明具有指导意义。
{"title":"Non-recursive Algorithm Derivation and Formal Proof of Binary Tree Traversal Class Problems","authors":"Z. Zuo, Yue-Jian Fang, Qing Huang, Yunyan Liao, Yuan-jiang Wang, Changjing Wang","doi":"10.1109/QRS-C51114.2020.00113","DOIUrl":"https://doi.org/10.1109/QRS-C51114.2020.00113","url":null,"abstract":"The development of loop invariants for recursive problems of nonlinear data structures is always difficult problem in formal development. The paper studies the derivation and formal proof of binary tree traversal class non-recursive algorithm. The non-recursive Apla (Abstract Programming Language) algorithms of binary tree traversal class problems and their exact and simple loop invariants are derived. Then, the correctness of the algorithm is proved by Dijkstra-Gries standard proving technique. Finally, the PAR platform is used to automatically generate C++ code, which realizes the complete refinement process from abstract specification to concrete executable program. The results of this study point out the direction for the exploration of the loop invariant of the nonrecursive algorithm for recursive problems and have guiding significance for the derivation and formal proof of the algorithm program of the nonlinear data structure.","PeriodicalId":358174,"journal":{"name":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130553610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1