Matching the conceptual definitions from different formal ontologies is the main task in ontology integration. The matching is done based on similarity relations. Evaluation and comparison of the approaches is very difficult and impedes usability as well as methodological interoperability. In this paper, we discuss ontology integration similarity relation, and discuss ontology integration equality in detail. Then, we, introduce the syntax and semantics of the process algebra CCS, giving the definition of strong bisimulation, we also examine the transitions of, showing, there is a matching transition from,. We show that strong bisimulation can be used to resolve ontology integration equality, a approach is presented.
{"title":"Using strong bisimulation to resolve ontology integration equality","authors":"Jia Shu-bin, Zhang Yin-fa","doi":"10.1109/WCSE.2010.144","DOIUrl":"https://doi.org/10.1109/WCSE.2010.144","url":null,"abstract":"Matching the conceptual definitions from different formal ontologies is the main task in ontology integration. The matching is done based on similarity relations. Evaluation and comparison of the approaches is very difficult and impedes usability as well as methodological interoperability. In this paper, we discuss ontology integration similarity relation, and discuss ontology integration equality in detail. Then, we, introduce the syntax and semantics of the process algebra CCS, giving the definition of strong bisimulation, we also examine the transitions of, showing, there is a matching transition from,. We show that strong bisimulation can be used to resolve ontology integration equality, a approach is presented.","PeriodicalId":376358,"journal":{"name":"2010 Second World Congress on Software Engineering","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115682814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Based on the theory of spectral response, the physical basis of remote sensing technology, with CBERS-2 and measured data, Tibet Zhabuye salt lake as study area, by the way of spectral correlation analysis, fitting and inversion, carry on research about the depth of salt lake with high density.
{"title":"The Depth Research for Salt Lake by Remote Sensing Technology","authors":"Li Li, Tong Liqiang, Lin Xiaohui","doi":"10.1109/WCSE.2010.18","DOIUrl":"https://doi.org/10.1109/WCSE.2010.18","url":null,"abstract":"Based on the theory of spectral response, the physical basis of remote sensing technology, with CBERS-2 and measured data, Tibet Zhabuye salt lake as study area, by the way of spectral correlation analysis, fitting and inversion, carry on research about the depth of salt lake with high density.","PeriodicalId":376358,"journal":{"name":"2010 Second World Congress on Software Engineering","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116956194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the network between any two computer's correspondence is stochastic, when the health and the non-health's computer corresponds whether is infected the virus is also stochastic, if has known these stochastic rules, may estimate that has how many computers to infect every day equally the virus or the probability which infects is had in a big way, the paper has studied the network virus dissemination mathematical model, has analyzed virus's dissemination mechanism, has confirmed the model feasibility.
{"title":"Network Virus Transmission Probability Model of Random","authors":"Y. Jiang","doi":"10.1109/WCSE.2010.9","DOIUrl":"https://doi.org/10.1109/WCSE.2010.9","url":null,"abstract":"In the network between any two computer's correspondence is stochastic, when the health and the non-health's computer corresponds whether is infected the virus is also stochastic, if has known these stochastic rules, may estimate that has how many computers to infect every day equally the virus or the probability which infects is had in a big way, the paper has studied the network virus dissemination mathematical model, has analyzed virus's dissemination mechanism, has confirmed the model feasibility.","PeriodicalId":376358,"journal":{"name":"2010 Second World Congress on Software Engineering","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117204870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Adjacent multi-station rotational scanning the target band with the 3D laser scanner ¿Leica Scan Station II¿, acquires the 3D point cloud models of every rotational position. Adjacent multi-station point seriate cloud models have been registered, acquires the correspondent points. Then combines point cloud models with the theory of single strip aerial triangulation, acquires coordinates of cloud models in the same coordinate system, nonlinear correction to the model, excludes the cumulative errors caused by model combination, completes a high precision splicing of more stations continuous strip of point cloud model.
{"title":"Theoretical Research on Adjacent Multi-station Point Cloud Data Precision Combination in 3D Laser Scanning","authors":"Tianzi Li, Youfeng Zou","doi":"10.1109/WCSE.2010.157","DOIUrl":"https://doi.org/10.1109/WCSE.2010.157","url":null,"abstract":"Adjacent multi-station rotational scanning the target band with the 3D laser scanner ¿Leica Scan Station II¿, acquires the 3D point cloud models of every rotational position. Adjacent multi-station point seriate cloud models have been registered, acquires the correspondent points. Then combines point cloud models with the theory of single strip aerial triangulation, acquires coordinates of cloud models in the same coordinate system, nonlinear correction to the model, excludes the cumulative errors caused by model combination, completes a high precision splicing of more stations continuous strip of point cloud model.","PeriodicalId":376358,"journal":{"name":"2010 Second World Congress on Software Engineering","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124887117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Although many studies have used Genetic Algorithms (GA) to generate test cases for white box software testing, very little attention has been paid to path testing. The paper aims to expose some of challenges posed by path testing, and to analyze what control parameters most affect GA's performance with respect to path testing. Each step in path testing is analyzed based on its complexity and automation. Experiments consist of running GA-based path testing on 12 test problems taken from the literature, using different combinations of values for important control parameters (population size, number of generations, allele range, and mutation rate). The results show that population size matters most in terms of path coverage and number of fitness evaluations, followed by allele range. Changing number of generations or mutation rate has less impact. We also make some observations about what sorts of paths are most difficult to cover. The understanding gained from these results will help to guide future research into GA-based path testing.
{"title":"Genetic Algorithm Based Path Testing: Challenges and Key Parameters","authors":"I. Hermadi, C. Lokan, R. Sarker","doi":"10.1109/WCSE.2010.82","DOIUrl":"https://doi.org/10.1109/WCSE.2010.82","url":null,"abstract":"Although many studies have used Genetic Algorithms (GA) to generate test cases for white box software testing, very little attention has been paid to path testing. The paper aims to expose some of challenges posed by path testing, and to analyze what control parameters most affect GA's performance with respect to path testing. Each step in path testing is analyzed based on its complexity and automation. Experiments consist of running GA-based path testing on 12 test problems taken from the literature, using different combinations of values for important control parameters (population size, number of generations, allele range, and mutation rate). The results show that population size matters most in terms of path coverage and number of fitness evaluations, followed by allele range. Changing number of generations or mutation rate has less impact. We also make some observations about what sorts of paths are most difficult to cover. The understanding gained from these results will help to guide future research into GA-based path testing.","PeriodicalId":376358,"journal":{"name":"2010 Second World Congress on Software Engineering","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125011398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In order to solve the real-time monitor problem and large-scale network monitor problem in wireless network communication of power grid environment monitoring system, a power grid environment monitoring system based on WLAN is designed. The ARM+Linux embedded operating system and WLAN are used at the system monitoring terminal to gather, process and convey the power grid environment monitoring data. Besides,.NET platform is employed at the server terminal to establish the central control program of the power grid environment monitoring system with powerful function and friendly interface. Tests show that this system runs stably and communicates smoothly and can satisfy the need of real-time automatic monitor and large-scale network monitor in power grid environment.
{"title":"Design of Power Grid Environment Monitoring System Based on WLAN","authors":"Jie Cao, Guang-You Tu, Lei Liang, Mei Jiang","doi":"10.1109/WCSE.2010.99","DOIUrl":"https://doi.org/10.1109/WCSE.2010.99","url":null,"abstract":"In order to solve the real-time monitor problem and large-scale network monitor problem in wireless network communication of power grid environment monitoring system, a power grid environment monitoring system based on WLAN is designed. The ARM+Linux embedded operating system and WLAN are used at the system monitoring terminal to gather, process and convey the power grid environment monitoring data. Besides,.NET platform is employed at the server terminal to establish the central control program of the power grid environment monitoring system with powerful function and friendly interface. Tests show that this system runs stably and communicates smoothly and can satisfy the need of real-time automatic monitor and large-scale network monitor in power grid environment.","PeriodicalId":376358,"journal":{"name":"2010 Second World Congress on Software Engineering","volume":"263 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115020846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jun Guo, Weiyue Li, Xin Song, Bin Zhang, Yunsheng Wang
Since Component-Based Software Development technology has been widely used, traditional software rejuvenation strategy seems too rough on solving Component-Software aging, the whole system will be regenerated even only a few components aging, which leads to high cost of software rejuvenation and reduces the stability of the system. Therefore, we propose a component-based software rejuvenation strategy and we make components be the objects of rejuvenation. The aging components will be rejuvenated when software ages. In this paper, the process of judging software aging and software rejuvenation are described, then we propose the methods of judging software aging, determining the sequence that the aging components to be rejuvenated and rejuvenating components. Finally, an experiment is done to certify the efficiency of the strategy.
{"title":"Software Rejuvenation Strategy Based on Components","authors":"Jun Guo, Weiyue Li, Xin Song, Bin Zhang, Yunsheng Wang","doi":"10.1109/WCSE.2010.113","DOIUrl":"https://doi.org/10.1109/WCSE.2010.113","url":null,"abstract":"Since Component-Based Software Development technology has been widely used, traditional software rejuvenation strategy seems too rough on solving Component-Software aging, the whole system will be regenerated even only a few components aging, which leads to high cost of software rejuvenation and reduces the stability of the system. Therefore, we propose a component-based software rejuvenation strategy and we make components be the objects of rejuvenation. The aging components will be rejuvenated when software ages. In this paper, the process of judging software aging and software rejuvenation are described, then we propose the methods of judging software aging, determining the sequence that the aging components to be rejuvenated and rejuvenating components. Finally, an experiment is done to certify the efficiency of the strategy.","PeriodicalId":376358,"journal":{"name":"2010 Second World Congress on Software Engineering","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116225642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Currently, wavelet packet technology is widely used in Electromyography (EMG) signal de-noising. However, most of these methods use global threshold to remove the noises from EMG signal. This paper proposes a new method, different nodes use different thresholds. The detected EMG signal is the summation of motor unit action potential (MUAP) trains from all active motor units. In our method, we use emglab software to abstract the MUAP of EMG, then calculate the best wavelet package tree and deal with each terminal node by independent threshold. Finally, the signal can be reconstructed by these processed coefficients. Compared with the wavelet packet de-noise with global default threshold, wavelet packet de-noise with level independent default threshold, the proposed method has distinguish advantageous.
{"title":"Study on Best Wavelet Packet Based Independent Threshold De-noising for MUAP","authors":"Tingting Yuan, QUAN LIU, Qingsong Ai","doi":"10.1109/WCSE.2010.23","DOIUrl":"https://doi.org/10.1109/WCSE.2010.23","url":null,"abstract":"Currently, wavelet packet technology is widely used in Electromyography (EMG) signal de-noising. However, most of these methods use global threshold to remove the noises from EMG signal. This paper proposes a new method, different nodes use different thresholds. The detected EMG signal is the summation of motor unit action potential (MUAP) trains from all active motor units. In our method, we use emglab software to abstract the MUAP of EMG, then calculate the best wavelet package tree and deal with each terminal node by independent threshold. Finally, the signal can be reconstructed by these processed coefficients. Compared with the wavelet packet de-noise with global default threshold, wavelet packet de-noise with level independent default threshold, the proposed method has distinguish advantageous.","PeriodicalId":376358,"journal":{"name":"2010 Second World Congress on Software Engineering","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116573322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Requirements changes are difficult to avoid in software development processes, and how to manage requirements change is still an open issue. This paper proposes an innovative algorithm, named LCS-NP++, for comparing different versions of requirement specifications to decide requirement changes. We have integrated this algorithm into a production software process management platform–Qone, which is developed by Institute of Software Chinese Academy of Sciences. Our practices have shown it is effective and efficient in comparing requirement items.
{"title":"Comparison of Requirement Items Based on the Requirements Change Management System of QONE","authors":"Gang Lu, Feng Yuan","doi":"10.1109/WCSE.2010.91","DOIUrl":"https://doi.org/10.1109/WCSE.2010.91","url":null,"abstract":"Requirements changes are difficult to avoid in software development processes, and how to manage requirements change is still an open issue. This paper proposes an innovative algorithm, named LCS-NP++, for comparing different versions of requirement specifications to decide requirement changes. We have integrated this algorithm into a production software process management platform–Qone, which is developed by Institute of Software Chinese Academy of Sciences. Our practices have shown it is effective and efficient in comparing requirement items.","PeriodicalId":376358,"journal":{"name":"2010 Second World Congress on Software Engineering","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117246456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
in order to provide a basis for the natural gas pipeline system to effectively perform a safe management, dangerous sources in this system are analyzed firstly, and a Fault Tree of serious accidents frequently occurring is then established by assessing the system with the fuzzy FMECA method, and some appropriate preventive measures may be finally taken in accordance with the Fault Tree and a FMECA table.
{"title":"Application of Fuzzy FMECA in Gas Network Safety Assessment","authors":"Q. You, Wei Zhu, T. Xing, Zhifen Chen","doi":"10.1109/WCSE.2010.62","DOIUrl":"https://doi.org/10.1109/WCSE.2010.62","url":null,"abstract":"in order to provide a basis for the natural gas pipeline system to effectively perform a safe management, dangerous sources in this system are analyzed firstly, and a Fault Tree of serious accidents frequently occurring is then established by assessing the system with the fuzzy FMECA method, and some appropriate preventive measures may be finally taken in accordance with the Fault Tree and a FMECA table.","PeriodicalId":376358,"journal":{"name":"2010 Second World Congress on Software Engineering","volume":"56 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130546909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}