There is much comparability between natural immune system and computer security, and the key point is how to distinguish self from other. Based on the principles and structures of artificial immune system, the simulation modeling of network intrusion detection was developed. The model consisted of many nodes that distributed across different locations. The nodes needed not be centralized controlled. The purpose of model was to distinguish between illegitimate behavior (non-self) and legitimate behavior (self). In case of finding abnormity, model could give an alarm to user.
{"title":"Simulation Modeling of Network Intrusion Detection Based on Artificial Immune System","authors":"Jing Yu, Feng Wang","doi":"10.1109/WCSE.2010.78","DOIUrl":"https://doi.org/10.1109/WCSE.2010.78","url":null,"abstract":"There is much comparability between natural immune system and computer security, and the key point is how to distinguish self from other. Based on the principles and structures of artificial immune system, the simulation modeling of network intrusion detection was developed. The model consisted of many nodes that distributed across different locations. The nodes needed not be centralized controlled. The purpose of model was to distinguish between illegitimate behavior (non-self) and legitimate behavior (self). In case of finding abnormity, model could give an alarm to user.","PeriodicalId":376358,"journal":{"name":"2010 Second World Congress on Software Engineering","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128470145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zheping Xu, Jinzhong Cui, Zhaogai Wang, Fenghong Liu, Guojun Liu
Digital library is the trend of current traditional library. However, many problems, such as data collection, sharing, cooperation among different libraries and the copyright, disturb the development of digital library. Based on previous work and the cooperation with BHL (Biodiversity Heritage Library), this paper gives a description on lots of affairs in the construction of digital library in biodiversity: the hardware and software, the workflow with IA (Internet Archive), database basis, the architecture and the function. Some development works and future work are also demonstrated in the paper. The application of digital library in biodiversity will largely improve the service of related resources in traditional libraries and also have a pilot effect for many libraries in other disciplines.
{"title":"The Architecture and Implementation of Biodiversity Digital Library in China","authors":"Zheping Xu, Jinzhong Cui, Zhaogai Wang, Fenghong Liu, Guojun Liu","doi":"10.1109/WCSE.2010.167","DOIUrl":"https://doi.org/10.1109/WCSE.2010.167","url":null,"abstract":"Digital library is the trend of current traditional library. However, many problems, such as data collection, sharing, cooperation among different libraries and the copyright, disturb the development of digital library. Based on previous work and the cooperation with BHL (Biodiversity Heritage Library), this paper gives a description on lots of affairs in the construction of digital library in biodiversity: the hardware and software, the workflow with IA (Internet Archive), database basis, the architecture and the function. Some development works and future work are also demonstrated in the paper. The application of digital library in biodiversity will largely improve the service of related resources in traditional libraries and also have a pilot effect for many libraries in other disciplines.","PeriodicalId":376358,"journal":{"name":"2010 Second World Congress on Software Engineering","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129984023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
GPS is a new generation of satellite navigation and positioning system which is most widely applied at present. This article introduces briefly the receiving and analysis of GPS data, and the application of GPS positioning, path analysis and navigation module in power inspection instrument software.
{"title":"Application of GPS in the Power Inspection Instrument Software Design","authors":"Na Li, Z. Piao, Nan Hao","doi":"10.1109/WCSE.2010.127","DOIUrl":"https://doi.org/10.1109/WCSE.2010.127","url":null,"abstract":"GPS is a new generation of satellite navigation and positioning system which is most widely applied at present. This article introduces briefly the receiving and analysis of GPS data, and the application of GPS positioning, path analysis and navigation module in power inspection instrument software.","PeriodicalId":376358,"journal":{"name":"2010 Second World Congress on Software Engineering","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130077798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
one of the great benefits of using a Stream X-machine (SXM) to specify a system is its associated testing method. Under certain test conditions, this method produces a test suite that can determine the correctness of the implementation under test (IUT). However, the size of the test suite is generally very large, the manual test suite generation is very complex and error-prone. With the more and more application for SXM in test area, developing the automatic support tool is urgent. The paper introduces the algorithm of obtaining the key values and sets, and develops the tool SXMtool which supports the editing of SXM models, automatic generation of SXM test suite. An example of using the SXMtool is then given to present its function.
{"title":"SXMTool A Tool for Stream X-Machine Testing","authors":"Chunyan Ma, Junsheng Wu, Tao Zhang","doi":"10.1109/WCSE.2010.139","DOIUrl":"https://doi.org/10.1109/WCSE.2010.139","url":null,"abstract":"one of the great benefits of using a Stream X-machine (SXM) to specify a system is its associated testing method. Under certain test conditions, this method produces a test suite that can determine the correctness of the implementation under test (IUT). However, the size of the test suite is generally very large, the manual test suite generation is very complex and error-prone. With the more and more application for SXM in test area, developing the automatic support tool is urgent. The paper introduces the algorithm of obtaining the key values and sets, and develops the tool SXMtool which supports the editing of SXM models, automatic generation of SXM test suite. An example of using the SXMtool is then given to present its function.","PeriodicalId":376358,"journal":{"name":"2010 Second World Congress on Software Engineering","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125326096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In china, with the development of GPS, GIS, RS, 3S technology is gradually used in the agriculture in recent years. This paper introduced the concepts of GPS, GIS, RS. Considering the fact of the Chinese agriculture, we developed the farmland information support system based on the integration of GPS, GIS, RS. With the application of this system in some counties of Yunnan province, the work mode of the department of the agriculture has started to be changed.
{"title":"3S-Based Farmland Information Support System at County Level","authors":"Wu Xuequn, Zuo Xiaoqing, Fang Yuanmin","doi":"10.1109/WCSE.2010.148","DOIUrl":"https://doi.org/10.1109/WCSE.2010.148","url":null,"abstract":"In china, with the development of GPS, GIS, RS, 3S technology is gradually used in the agriculture in recent years. This paper introduced the concepts of GPS, GIS, RS. Considering the fact of the Chinese agriculture, we developed the farmland information support system based on the integration of GPS, GIS, RS. With the application of this system in some counties of Yunnan province, the work mode of the department of the agriculture has started to be changed.","PeriodicalId":376358,"journal":{"name":"2010 Second World Congress on Software Engineering","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125464076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Insider threat makes great damage to the security of information system, traditional security methods are extremely difficult to work. Insider attack identification plays an important role in insider threat detection. Monitoring user’s abnormal behavior is an effective method to detect impersonation, this method is applied to insider threat identification, to built user’s behavior attribute information database based on weights changeable feedback tree augmented Bayes network, but data is massive, using the dimensionality reduction based on rough set, to establish the process information model of user’s behavior attribute. Using the minimum risk Bayes decision can effectively identify the real identity of the user when user’s behavior departs from the characteristic model.
{"title":"Insider Threat Identification System Model Based on Rough Set Dimensionality Reduction","authors":"Tao Zhang, Peng Zhao","doi":"10.1109/WCSE.2010.106","DOIUrl":"https://doi.org/10.1109/WCSE.2010.106","url":null,"abstract":"Insider threat makes great damage to the security of information system, traditional security methods are extremely difficult to work. Insider attack identification plays an important role in insider threat detection. Monitoring user’s abnormal behavior is an effective method to detect impersonation, this method is applied to insider threat identification, to built user’s behavior attribute information database based on weights changeable feedback tree augmented Bayes network, but data is massive, using the dimensionality reduction based on rough set, to establish the process information model of user’s behavior attribute. Using the minimum risk Bayes decision can effectively identify the real identity of the user when user’s behavior departs from the characteristic model.","PeriodicalId":376358,"journal":{"name":"2010 Second World Congress on Software Engineering","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122220695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Java Modeling Language (JML) is a formal interface specification language to document the behavior of Java program modules and has been used in many research and industrial projects. However, its inability to support Java 5 features such as generics is reducing its user base significantly. Besides, the JML compiler is on average 8.5 times slower than the javac Java compiler. In this paper, we present a new JML compiler built on the Eclipse Java compiler to support Java 5 features. We used a technique called emph{AST merging} to implement coarse-grained incremental compilation. In our experiments we observed a significant improvement in compilation speed, the new compiler is 3 to 4.5 times faster than the current one.
{"title":"A New Eclipse-Based JML Compiler Built Using AST Merging","authors":"A. Sarcar, Yoonsik Cheon","doi":"10.1109/WCSE.2010.92","DOIUrl":"https://doi.org/10.1109/WCSE.2010.92","url":null,"abstract":"The Java Modeling Language (JML) is a formal interface specification language to document the behavior of Java program modules and has been used in many research and industrial projects. However, its inability to support Java 5 features such as generics is reducing its user base significantly. Besides, the JML compiler is on average 8.5 times slower than the javac Java compiler. In this paper, we present a new JML compiler built on the Eclipse Java compiler to support Java 5 features. We used a technique called emph{AST merging} to implement coarse-grained incremental compilation. In our experiments we observed a significant improvement in compilation speed, the new compiler is 3 to 4.5 times faster than the current one.","PeriodicalId":376358,"journal":{"name":"2010 Second World Congress on Software Engineering","volume":"242 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116207193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The capability of Bidirectional Model Transformation (BMT) has been continuously investigated by the software engineering community. BMT approach is able to improve the productivity of software development and save the production cost through a precise transformation definition process. However, nowadays a systematic study that is related to the current issue and supporting approaches of BMT does not exist yet. Therefore, this paper aims to analyse and explore the current issues on BMT by using a systematic literature review (SLR). Based on the results of the SLR, seven issues related to BMT were identified and two prominent approaches in solving the inherent BMT problem were discovered and reviewed. These results will be useful as an input in designing a better framework of BMT in the future.
{"title":"A Systematic Literature Review to Identify the Issues in Bidirectional Model Transformation","authors":"Lusiana Efrizoni, W. M. Wan-Kadir, R. Mohamad","doi":"10.1109/WCSE.2010.118","DOIUrl":"https://doi.org/10.1109/WCSE.2010.118","url":null,"abstract":"The capability of Bidirectional Model Transformation (BMT) has been continuously investigated by the software engineering community. BMT approach is able to improve the productivity of software development and save the production cost through a precise transformation definition process. However, nowadays a systematic study that is related to the current issue and supporting approaches of BMT does not exist yet. Therefore, this paper aims to analyse and explore the current issues on BMT by using a systematic literature review (SLR). Based on the results of the SLR, seven issues related to BMT were identified and two prominent approaches in solving the inherent BMT problem were discovered and reviewed. These results will be useful as an input in designing a better framework of BMT in the future.","PeriodicalId":376358,"journal":{"name":"2010 Second World Congress on Software Engineering","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127828091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
According to the shortage of analysis software for temperature control while massive concrete structures were widely used, the special temperature control aided analysis software (TCAS) was developed. A mature Fortran program was applied with a precise method for pipe cooling calculation added during development. Friendly graphic user interface was developed, by using Microsoft foundation classes (MFC). Open graphics library (OpenGL) was applied for the display of the model and results. TCAS has strong practicality, pertinence and easy operation, comparing with general commercial finite element analysis software. Theory of temperature control for concrete construction and mechanism of major measures for temperature control were analyzed. In particular, various concrete cooling simulation methods were compared and the cooling pipe discrete element method using in this software was introduced in detail. Details on the development process, software modules, and functions of major modules were introduced in this paper. With the help of TCAS, the choice of concrete temperature control measures and designing of temperature control scheme will become simpler and more convenient.
{"title":"Development of Simulation and Analysis Software of Temperature Control for Massive Concrete Construction","authors":"Z. Xie, S. Qiang, Xiao Sun, Wei Shuai, R. Zheng","doi":"10.1109/WCSE.2010.85","DOIUrl":"https://doi.org/10.1109/WCSE.2010.85","url":null,"abstract":"According to the shortage of analysis software for temperature control while massive concrete structures were widely used, the special temperature control aided analysis software (TCAS) was developed. A mature Fortran program was applied with a precise method for pipe cooling calculation added during development. Friendly graphic user interface was developed, by using Microsoft foundation classes (MFC). Open graphics library (OpenGL) was applied for the display of the model and results. TCAS has strong practicality, pertinence and easy operation, comparing with general commercial finite element analysis software. Theory of temperature control for concrete construction and mechanism of major measures for temperature control were analyzed. In particular, various concrete cooling simulation methods were compared and the cooling pipe discrete element method using in this software was introduced in detail. Details on the development process, software modules, and functions of major modules were introduced in this paper. With the help of TCAS, the choice of concrete temperature control measures and designing of temperature control scheme will become simpler and more convenient.","PeriodicalId":376358,"journal":{"name":"2010 Second World Congress on Software Engineering","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121842531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents the shared interface gateway software model based on the project of CWPS(Cooperative Workflow Platform Service). Firstly, the shared interface gateway framework is built and the meta-models of shared interface gateway software are given using BNF. Then, the protocol configuration model is designed using strategy structure pattern and its class diagram is given using UML. The content format of the configured protocol is defined using IDL and the description of content of configured protocol is given using xml. Finally, the implementation of communication semantic is discussed and asynchronous communication is implemented. Experimental results show that the proposed software model can make effective use of resources and achieve high performance.
{"title":"Shared Interface Gateway Softway Model in Communication Management","authors":"Xin Xu, Jiefeng Xu, Tongxin Xie, Xi Shao","doi":"10.1109/WCSE.2010.98","DOIUrl":"https://doi.org/10.1109/WCSE.2010.98","url":null,"abstract":"This paper presents the shared interface gateway software model based on the project of CWPS(Cooperative Workflow Platform Service). Firstly, the shared interface gateway framework is built and the meta-models of shared interface gateway software are given using BNF. Then, the protocol configuration model is designed using strategy structure pattern and its class diagram is given using UML. The content format of the configured protocol is defined using IDL and the description of content of configured protocol is given using xml. Finally, the implementation of communication semantic is discussed and asynchronous communication is implemented. Experimental results show that the proposed software model can make effective use of resources and achieve high performance.","PeriodicalId":376358,"journal":{"name":"2010 Second World Congress on Software Engineering","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124505176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}