It is a new breakthrough that Chaos in tele-communications technology will load the user's password authentication in telecommunications systems, using chaotic sequence code on the mobile phone user information allows users to encrypt the information in the disordered state of the protection code, the paper design a password authentication system for CDMA user, use the newly designed double-chaos algorithm, adding Logistic mapping structural design, character information system to control by this new algorithm to complete the test of chaotic cryptography. Test results show that the algorithm is an effective chaotic encryption algorithm, if we can get the support of the actual project, there will be a great development for the appication.
{"title":"An Application of Mobile Phone Encryption Based on Fibonacci Structure of Chaos","authors":"Fenmei Wang, Jing Ding, Zongyou Dai, Yihang Peng","doi":"10.1109/WCSE.2010.43","DOIUrl":"https://doi.org/10.1109/WCSE.2010.43","url":null,"abstract":"It is a new breakthrough that Chaos in tele-communications technology will load the user's password authentication in telecommunications systems, using chaotic sequence code on the mobile phone user information allows users to encrypt the information in the disordered state of the protection code, the paper design a password authentication system for CDMA user, use the newly designed double-chaos algorithm, adding Logistic mapping structural design, character information system to control by this new algorithm to complete the test of chaotic cryptography. Test results show that the algorithm is an effective chaotic encryption algorithm, if we can get the support of the actual project, there will be a great development for the appication.","PeriodicalId":376358,"journal":{"name":"2010 Second World Congress on Software Engineering","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123370449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Service Oriented Architecture (SOA) and components as technologies for rapid development still have not reached their maturity. One of the insufficiently explored areas is the one of a selection of a service or a component in terms of extra-functional properties. A lot of current approaches partly target extra-functional properties but do not provide a meta-model that would cover aspects such as the definition of properties, their assignment and their evaluation. Their practical application is limited, because a lot of specialized partial approaches may hardly be put together. In this work we propose a general and loosely coupled meta-model that covers all above mentioned aspects. The model is useful for developers to create a complete extra-functional support in applications.
{"title":"A Complex Meta-model for Extra-Functional Properties Concerning Common Data Types: Their Comparing and Binding","authors":"Kamil Jezek","doi":"10.1109/WCSE.2010.10","DOIUrl":"https://doi.org/10.1109/WCSE.2010.10","url":null,"abstract":"Service Oriented Architecture (SOA) and components as technologies for rapid development still have not reached their maturity. One of the insufficiently explored areas is the one of a selection of a service or a component in terms of extra-functional properties. A lot of current approaches partly target extra-functional properties but do not provide a meta-model that would cover aspects such as the definition of properties, their assignment and their evaluation. Their practical application is limited, because a lot of specialized partial approaches may hardly be put together. In this work we propose a general and loosely coupled meta-model that covers all above mentioned aspects. The model is useful for developers to create a complete extra-functional support in applications.","PeriodicalId":376358,"journal":{"name":"2010 Second World Congress on Software Engineering","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121420897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Some proper indexes, AHP method and GIS model are adopted for quantitative analysis and comprehensive evaluation of the ecological environment carrying capacity on coal mining. The ecological environment carrying capacity evaluation information system on coal mining is developed based on Visual C++ 6•0, ADO, SQL Server 2000, GIS and so on. This information system has many effective functions such as data management and procession, information query, map operation and spatial analysis, mathematical statistics, comprehensive evaluation, evaluation map drawing, visualization display and so on, and has intuitive and the spatiality characteristic, which can cause the evaluation data and the graph connection and can be the evaluation results direct-viewing demonstration on the graph. This information system was applied in the 22 plan coal mines, Shanxi.
采用适当的指标、层次分析法和GIS模型对采煤生态环境承载力进行了定量分析和综合评价。基于Visual c++ 6.0、ADO、SQL Server 2000、GIS等开发了煤矿生态环境承载力评价信息系统。该信息系统具有数据管理与处理、信息查询、地图操作与空间分析、数理统计、综合评价、评价地图绘制、可视化显示等多种有效功能,具有直观性和空间性特点,可实现评价数据与图形的连接,并可将评价结果直观地展示在图形上。该信息系统已在山西22个计划煤矿得到应用。
{"title":"Application and Development of the Ecological Environment Carrying Capacity Evaluation Information System on Coal Mining","authors":"Ying Wei, D. Cao, Jian Wu, Chaoyin Yu","doi":"10.1109/WCSE.2010.56","DOIUrl":"https://doi.org/10.1109/WCSE.2010.56","url":null,"abstract":"Some proper indexes, AHP method and GIS model are adopted for quantitative analysis and comprehensive evaluation of the ecological environment carrying capacity on coal mining. The ecological environment carrying capacity evaluation information system on coal mining is developed based on Visual C++ 6•0, ADO, SQL Server 2000, GIS and so on. This information system has many effective functions such as data management and procession, information query, map operation and spatial analysis, mathematical statistics, comprehensive evaluation, evaluation map drawing, visualization display and so on, and has intuitive and the spatiality characteristic, which can cause the evaluation data and the graph connection and can be the evaluation results direct-viewing demonstration on the graph. This information system was applied in the 22 plan coal mines, Shanxi.","PeriodicalId":376358,"journal":{"name":"2010 Second World Congress on Software Engineering","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116296629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Software metric models can be used in predicting the interested target software metric(s) for future software project based on certain related metric(s). However, during the construction of such a model, incomplete data often appear in data sample gained from analogous past projects. In addition, whether a particular continuous predictor metric or a particular category for a certain categorical predictor metric should be included in the model must be determined in practice. To solve these problems, this paper introduces a methodology integrating the k-nearest neighbors (k-NN) multiple imputation method, kernel smoothing, Monte Carlo simulation, and a latest variable selection method. Thus, a more flexible model is constructed. A case study is given to illustrate the proposed procedures.
{"title":"Simplifying Software Metric Models via Hierarchical LASSO with Incomplete Data Samples","authors":"T. Xie, W. E. Wong, Wenxing Ding","doi":"10.1109/WCSE.2010.117","DOIUrl":"https://doi.org/10.1109/WCSE.2010.117","url":null,"abstract":"Software metric models can be used in predicting the interested target software metric(s) for future software project based on certain related metric(s). However, during the construction of such a model, incomplete data often appear in data sample gained from analogous past projects. In addition, whether a particular continuous predictor metric or a particular category for a certain categorical predictor metric should be included in the model must be determined in practice. To solve these problems, this paper introduces a methodology integrating the k-nearest neighbors (k-NN) multiple imputation method, kernel smoothing, Monte Carlo simulation, and a latest variable selection method. Thus, a more flexible model is constructed. A case study is given to illustrate the proposed procedures.","PeriodicalId":376358,"journal":{"name":"2010 Second World Congress on Software Engineering","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126550553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Information security risk can be measured by probability of the potential risk incident and its impact. Various quantitative methodologies are given to compute information security risks, but among the existed research, seldom of them considered the difficulties of obtaining data of risk probability and risk impact. Considering the efficiency and operability of collecting data, as well as the effectiveness of output for risk management support, this paper presents a risk assessment methodology for information systems security with the application of group decision making and analytic hierarchy process methods. Procedure of this methodology is provided, and a test case is given to illustrate the effectiveness of this methodology.
{"title":"Information Security Risk Assessment Methodology Research: Group Decision Making and Analytic Hierarchy Process","authors":"Zhang Xinlan, Huang Zhifang, Wei Guangfu, Zhang Xin","doi":"10.1109/WCSE.2010.55","DOIUrl":"https://doi.org/10.1109/WCSE.2010.55","url":null,"abstract":"Information security risk can be measured by probability of the potential risk incident and its impact. Various quantitative methodologies are given to compute information security risks, but among the existed research, seldom of them considered the difficulties of obtaining data of risk probability and risk impact. Considering the efficiency and operability of collecting data, as well as the effectiveness of output for risk management support, this paper presents a risk assessment methodology for information systems security with the application of group decision making and analytic hierarchy process methods. Procedure of this methodology is provided, and a test case is given to illustrate the effectiveness of this methodology.","PeriodicalId":376358,"journal":{"name":"2010 Second World Congress on Software Engineering","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127934014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As there are a lot of factors with complexity and uncertainty, the process of coal-bed methane under balanced drilling has great risk. In order to overcome the one-sidedness and limitation caused by single evaluation method, the combined evaluation model for coal-bed methane under balanced drilling is established based on the combined evaluation theory. And on the basis of the software platform of Visual Basic 2005, the risk assessment system for coal-bed methane under balanced drilling is developed. By practical application and test, it is proved that the system has certain engineering value.
{"title":"Development of Risk Assessment System for Coal-Bed Methane Underbalanced Drilling","authors":"Xiujuan Yang, Q. Wen, Xiangzhen Yan, Yan Xia","doi":"10.1109/WCSE.2010.72","DOIUrl":"https://doi.org/10.1109/WCSE.2010.72","url":null,"abstract":"As there are a lot of factors with complexity and uncertainty, the process of coal-bed methane under balanced drilling has great risk. In order to overcome the one-sidedness and limitation caused by single evaluation method, the combined evaluation model for coal-bed methane under balanced drilling is established based on the combined evaluation theory. And on the basis of the software platform of Visual Basic 2005, the risk assessment system for coal-bed methane under balanced drilling is developed. By practical application and test, it is proved that the system has certain engineering value.","PeriodicalId":376358,"journal":{"name":"2010 Second World Congress on Software Engineering","volume":"20 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115787829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As the complexity of grid environment, grid contains a variety of resources. We introduce the economic model in order to respond the changes of resource supply and demand. In this paper, we based on the original economic model and subdivision the role of resource providers, then we formulate an initial pricing strategy of underlying resources which based on Cournot equilibrium theory to achieve maximum benefits of resource participants. After the initial pricing strategy has been formulated, the initial price and basic information of the resources has been recorded in GIS of grid bank.
{"title":"The Pricing Scheme of the Grid Resource Based on Cournot Equilibrium","authors":"Hao Li, Bo Wang","doi":"10.1109/WCSE.2010.109","DOIUrl":"https://doi.org/10.1109/WCSE.2010.109","url":null,"abstract":"As the complexity of grid environment, grid contains a variety of resources. We introduce the economic model in order to respond the changes of resource supply and demand. In this paper, we based on the original economic model and subdivision the role of resource providers, then we formulate an initial pricing strategy of underlying resources which based on Cournot equilibrium theory to achieve maximum benefits of resource participants. After the initial pricing strategy has been formulated, the initial price and basic information of the resources has been recorded in GIS of grid bank.","PeriodicalId":376358,"journal":{"name":"2010 Second World Congress on Software Engineering","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125225136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The organizational goal of the enterprises is to meet stakeholder interests and profit goals. Due to the communication of information and communication barriers, the enterprise group of stakeholders in the process of core competence is influenced by the enterprise operation and management control ability level. Because the enterprise stakeholders has different abilities to influence the whole organization, there was a big difference between the specific form. Based on the organizational core competence model design, we constructed the core competence evaluation system and improve the organizational structure of enterprise core competence of a design model of enterprise's core competence of the empirical evaluation of comprehensive effect.
{"title":"Research on the Evaluation for the Enterprise Core Competence in Informationazation","authors":"Sumian Peng, Junfeng Guo","doi":"10.1109/WCSE.2010.125","DOIUrl":"https://doi.org/10.1109/WCSE.2010.125","url":null,"abstract":"The organizational goal of the enterprises is to meet stakeholder interests and profit goals. Due to the communication of information and communication barriers, the enterprise group of stakeholders in the process of core competence is influenced by the enterprise operation and management control ability level. Because the enterprise stakeholders has different abilities to influence the whole organization, there was a big difference between the specific form. Based on the organizational core competence model design, we constructed the core competence evaluation system and improve the organizational structure of enterprise core competence of a design model of enterprise's core competence of the empirical evaluation of comprehensive effect.","PeriodicalId":376358,"journal":{"name":"2010 Second World Congress on Software Engineering","volume":"169 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115753757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A graphical programming system fit for on-site processing is suggested for Computer Numerical Control (CNC) milling machine. Contour information is got through the graphic input module or reading Drawing Exchange File (DXF) file provided by CAD system. After sequencing the graphic elements and interpolation fitting of the non-circular curve by mathematical processing module, and calling the NC programming module with appropriate process parameters, we could generate NC codes automatically. If needed, the simulation module could display tool path dynamically. This system is applied to Lantian series numerical control system successfully in National Engineering Research Center for High-End CNC. It achieves the integration and share of design and process.
{"title":"Design and Realization of NC Graphic Programming System","authors":"Pin Wang, Lansing Su","doi":"10.1109/WCSE.2010.54","DOIUrl":"https://doi.org/10.1109/WCSE.2010.54","url":null,"abstract":"A graphical programming system fit for on-site processing is suggested for Computer Numerical Control (CNC) milling machine. Contour information is got through the graphic input module or reading Drawing Exchange File (DXF) file provided by CAD system. After sequencing the graphic elements and interpolation fitting of the non-circular curve by mathematical processing module, and calling the NC programming module with appropriate process parameters, we could generate NC codes automatically. If needed, the simulation module could display tool path dynamically. This system is applied to Lantian series numerical control system successfully in National Engineering Research Center for High-End CNC. It achieves the integration and share of design and process.","PeriodicalId":376358,"journal":{"name":"2010 Second World Congress on Software Engineering","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121983699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Due to the tight coupling between the game and the STB environment, the ability to migrate the game to different STB environments is greatly restricted. We first analyzed the STB game software porting difficulties, and then put forward a solution to address the causes identified, presented an architecture based on Model-View-Controller pattern. The architecture managed to allow the same game to be ported to different STB environment without or with a little modifying the game. Lastly the architecture performance which revealed the architecture performance strengths and weaknesses was evaluated.
{"title":"Digtal STB Game Portability Based on MVC Pattern","authors":"Jun Huang, Guangping Chen","doi":"10.1109/WCSE.2010.65","DOIUrl":"https://doi.org/10.1109/WCSE.2010.65","url":null,"abstract":"Due to the tight coupling between the game and the STB environment, the ability to migrate the game to different STB environments is greatly restricted. We first analyzed the STB game software porting difficulties, and then put forward a solution to address the causes identified, presented an architecture based on Model-View-Controller pattern. The architecture managed to allow the same game to be ported to different STB environment without or with a little modifying the game. Lastly the architecture performance which revealed the architecture performance strengths and weaknesses was evaluated.","PeriodicalId":376358,"journal":{"name":"2010 Second World Congress on Software Engineering","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117138471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}