Pub Date : 2014-10-23DOI: 10.1109/ICSESS.2014.6933604
Jianmin Bao, Shu Zhang, Junjie Zhang, Kun Wang, Haifeng Hu
The Delay/Disruption Tolerant Network (DTN) is characterized with long delay, high bit-error rate, intermittent connectivity and frequent partitions. Due to this, network coding is introduced to improve its transmission performance significantly. Numerous DTN routing algorithms based on network coding have been developed. However, they are susceptible to various malicious attacks. In this paper, we propose a new kind of networking scheme suitable to the DTN, which can resist the eavesdropping attacks to a certain extant. Firstly, we establish a DTN network model based on the packet path optimization allocation algorithm and redefine the packet format to meet the algorithm requirements. Meanwhile, to resist the dropping attacks, the source node dynamically adds redundancy factors at the certain time. Then the pollution attacks and the data tampering attacks can almost be resisted by means of mutual authentication between intermediate nodes. This approach avoids the traditional anti-tampering attack algorithm over-reliant on the source node. The security analysis and simulation results show that our scheme can effectively resist the joint attacks and optimize the network performance.
{"title":"Secure efficient routing based on network coding in the delay tolerant networks","authors":"Jianmin Bao, Shu Zhang, Junjie Zhang, Kun Wang, Haifeng Hu","doi":"10.1109/ICSESS.2014.6933604","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933604","url":null,"abstract":"The Delay/Disruption Tolerant Network (DTN) is characterized with long delay, high bit-error rate, intermittent connectivity and frequent partitions. Due to this, network coding is introduced to improve its transmission performance significantly. Numerous DTN routing algorithms based on network coding have been developed. However, they are susceptible to various malicious attacks. In this paper, we propose a new kind of networking scheme suitable to the DTN, which can resist the eavesdropping attacks to a certain extant. Firstly, we establish a DTN network model based on the packet path optimization allocation algorithm and redefine the packet format to meet the algorithm requirements. Meanwhile, to resist the dropping attacks, the source node dynamically adds redundancy factors at the certain time. Then the pollution attacks and the data tampering attacks can almost be resisted by means of mutual authentication between intermediate nodes. This approach avoids the traditional anti-tampering attack algorithm over-reliant on the source node. The security analysis and simulation results show that our scheme can effectively resist the joint attacks and optimize the network performance.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"77 1","pages":"456-459"},"PeriodicalIF":0.0,"publicationDate":"2014-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84060596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-23DOI: 10.1109/ICSESS.2014.6933673
Chen Wei, Zhang Yue
This paper demonstrated the design and implementation of the remote multiple physiological parameters monitoring system. It is researched and designed in order to meet the requirement of understanding the trends for the state of human health, how diseases affect the human body, and the need for monitoring of the multiple physiological parameters (ECG, blood pressure, oxygen saturation, etc.). In this paper, the frame of the system for remote multiple physiological parameters monitoring is introduced, as well as the design and implementation of each module. The remote multiple physiological parameters monitoring system can be divided into several parts: mobile data acquisition system, real-time monitoring software system, medical information system and database system. The result shows that medical and health institutions can make significant improvement by applying the advanced computer and network technology.
{"title":"Design and implementation of remote multiple physiological parameters monitoring system","authors":"Chen Wei, Zhang Yue","doi":"10.1109/ICSESS.2014.6933673","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933673","url":null,"abstract":"This paper demonstrated the design and implementation of the remote multiple physiological parameters monitoring system. It is researched and designed in order to meet the requirement of understanding the trends for the state of human health, how diseases affect the human body, and the need for monitoring of the multiple physiological parameters (ECG, blood pressure, oxygen saturation, etc.). In this paper, the frame of the system for remote multiple physiological parameters monitoring is introduced, as well as the design and implementation of each module. The remote multiple physiological parameters monitoring system can be divided into several parts: mobile data acquisition system, real-time monitoring software system, medical information system and database system. The result shows that medical and health institutions can make significant improvement by applying the advanced computer and network technology.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"47 2 1","pages":"740-743"},"PeriodicalIF":0.0,"publicationDate":"2014-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80670863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-23DOI: 10.1109/ICSESS.2014.6933747
Xiaotong Wang, Zhen Liu, Su Deng
By the analysis of problems of mood spread diffusion, combining the theory of Agent, Agent-Based mood diffusion model was established, using CUDA programming tool, which is suitable for parallel computing of the part to carry on the design implementation, thus proving the GPU computing can improve the efficiency of the model calculation.
{"title":"Agent-based mood spread diffusion model for GPU","authors":"Xiaotong Wang, Zhen Liu, Su Deng","doi":"10.1109/ICSESS.2014.6933747","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933747","url":null,"abstract":"By the analysis of problems of mood spread diffusion, combining the theory of Agent, Agent-Based mood diffusion model was established, using CUDA programming tool, which is suitable for parallel computing of the part to carry on the design implementation, thus proving the GPU computing can improve the efficiency of the model calculation.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"91 1","pages":"1056-1059"},"PeriodicalIF":0.0,"publicationDate":"2014-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85635886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-06-27DOI: 10.1109/ICSESS.2014.6933771
Bi Haixia, W. Zhiqiang
Based on the background of WiFi-based Ad-hoc network, four route protocols are simulated using OPNET plat form. Experimental result shows that AODV protocol has a better performance than other algorithms under the circumstance of high throughout and heavy burden. To meet the communication requirement of vehicle-borne Ad-hoc network under battlefield circumstance, a ne w cluster route protocol (CRP) is proposed based on AODV protocol. Its cluster architecture design reduces the influence of topology change on route search process and the flooding cost during route discovery process. It is proved that the performance of CRP is better than AODV protocol and ZRP protocol, and the end-to-end delay is reduced dramatically.
{"title":"Research on route protocols of WiFi-based Ad-hoc network","authors":"Bi Haixia, W. Zhiqiang","doi":"10.1109/ICSESS.2014.6933771","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933771","url":null,"abstract":"Based on the background of WiFi-based Ad-hoc network, four route protocols are simulated using OPNET plat form. Experimental result shows that AODV protocol has a better performance than other algorithms under the circumstance of high throughout and heavy burden. To meet the communication requirement of vehicle-borne Ad-hoc network under battlefield circumstance, a ne w cluster route protocol (CRP) is proposed based on AODV protocol. Its cluster architecture design reduces the influence of topology change on route search process and the flooding cost during route discovery process. It is proved that the performance of CRP is better than AODV protocol and ZRP protocol, and the end-to-end delay is reduced dramatically.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"35 1","pages":"1154-1157"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73523172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-06-27DOI: 10.1109/ICSESS.2014.6933676
Lichen Zhang, Shuguang Feng
Cyber physical system is hard to develop because developers need to consider functional properties, nonfunctional properties, such as timeliness, energy, memory, safety and reliability, dynamic continuous properties, spatial requirements and the interaction with physical world. In this paper, we propose an integrated approach to develop cyber physical systems based on multi-dimensions, multi-views and multi-paradigm. This model-integrated development approach addresses the development needs of cyber physical systems through the pervasive use of models. Model transformation is a central concept in model-driven development approaches and integration development approaches in cyber physical systems, as it provides a mechanism for automating the manipulation of models. We present the model transformation methods of cyber physical systems, we propose an approach to transform the models of AADL into the models of Modelica, and Modelica into AADL, clarify the transformation principles and to illustrate the important synergies resulting from the integration between these two languages.
{"title":"Integration design and model transformation for cyber physical systems","authors":"Lichen Zhang, Shuguang Feng","doi":"10.1109/ICSESS.2014.6933676","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933676","url":null,"abstract":"Cyber physical system is hard to develop because developers need to consider functional properties, nonfunctional properties, such as timeliness, energy, memory, safety and reliability, dynamic continuous properties, spatial requirements and the interaction with physical world. In this paper, we propose an integrated approach to develop cyber physical systems based on multi-dimensions, multi-views and multi-paradigm. This model-integrated development approach addresses the development needs of cyber physical systems through the pervasive use of models. Model transformation is a central concept in model-driven development approaches and integration development approaches in cyber physical systems, as it provides a mechanism for automating the manipulation of models. We present the model transformation methods of cyber physical systems, we propose an approach to transform the models of AADL into the models of Modelica, and Modelica into AADL, clarify the transformation principles and to illustrate the important synergies resulting from the integration between these two languages.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"20 1","pages":"754-757"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75807439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-06-27DOI: 10.1109/ICSESS.2014.6933697
Yun Lin, Jie Wang
A new text classification algorithm has been put forward based on basic support vector machine algorithm. The SVM-KNN algorithm for text classification has been proposed which combined SVM algorithm and KNN algorithm. The SVM-KNN algorithm can improve the performance of classifier by the feedback and improvement of classifying prediction probability. The actual effect of SVM-KNN algorithm is tested and the performance is proved in related Chinese web page classification test system.
{"title":"Research on text classification based on SVM-KNN","authors":"Yun Lin, Jie Wang","doi":"10.1109/ICSESS.2014.6933697","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933697","url":null,"abstract":"A new text classification algorithm has been put forward based on basic support vector machine algorithm. The SVM-KNN algorithm for text classification has been proposed which combined SVM algorithm and KNN algorithm. The SVM-KNN algorithm can improve the performance of classifier by the feedback and improvement of classifying prediction probability. The actual effect of SVM-KNN algorithm is tested and the performance is proved in related Chinese web page classification test system.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"11 1","pages":"842-844"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74462889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-06-27DOI: 10.1109/ICSESS.2014.6933528
Meng Su, Jingxin Gao
Formal verification of Web service composition is an important means for ensuring the quality of Web service. The Web service composition modeling is a key step of the validation of Web services interaction. Based on the semantic consistency of the Web services description semantic OWL-S and Coloured Petri net, this dissertation proposes a modeling method of Web services interaction based on the OWL-S and Coloured Petri Net and the description rules of OWL-S service operation semantics by CPN. And the analysis and verification of this modeling method has also been done.
{"title":"Modeling method of ontology web service interaction based on Coloured Petri Net","authors":"Meng Su, Jingxin Gao","doi":"10.1109/ICSESS.2014.6933528","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933528","url":null,"abstract":"Formal verification of Web service composition is an important means for ensuring the quality of Web service. The Web service composition modeling is a key step of the validation of Web services interaction. Based on the semantic consistency of the Web services description semantic OWL-S and Coloured Petri net, this dissertation proposes a modeling method of Web services interaction based on the OWL-S and Coloured Petri Net and the description rules of OWL-S service operation semantics by CPN. And the analysis and verification of this modeling method has also been done.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"45 1","pages":"128-131"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73979163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-06-27DOI: 10.1109/ICSESS.2014.6933597
Pin Ren, Xingjun Wang
Push-VOD (Video on Demand) is a technique preloading the right video contents to end users used by TV suppliers. This system would benefit from knowing when and what a user watches. Thus there is a need for analyzing and predicting user behaviors. In this paper, we study user model from two aspects, preference and behavior pattern. For the preference part, we study what users watch. We build up the TV user model based on vector spaces. In our model, vectors represent the user profiles and video features. We mainly analyze user watching records and rankings towards videos based on the data from movie-lens and give our conclusions. We also give our survey and research on user behavior pattern, towards when user watches, namely different hours in a day and different days in a week.
{"title":"User preference and behavior pattern in Push VOD systems","authors":"Pin Ren, Xingjun Wang","doi":"10.1109/ICSESS.2014.6933597","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933597","url":null,"abstract":"Push-VOD (Video on Demand) is a technique preloading the right video contents to end users used by TV suppliers. This system would benefit from knowing when and what a user watches. Thus there is a need for analyzing and predicting user behaviors. In this paper, we study user model from two aspects, preference and behavior pattern. For the preference part, we study what users watch. We build up the TV user model based on vector spaces. In our model, vectors represent the user profiles and video features. We mainly analyze user watching records and rankings towards videos based on the data from movie-lens and give our conclusions. We also give our survey and research on user behavior pattern, towards when user watches, namely different hours in a day and different days in a week.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"36 1","pages":"425-429"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74576114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-06-27DOI: 10.1109/ICSESS.2014.6933648
Haiyan Lv, Xiaowei Che, Ren Ying
The main research is the automatic generation of micro-blog user tags based on cluster analysis. Key technologies used in this paper are introduced firstly; mainly include cluster technology and TextRank. A Baseline system is proposed in order to show the validity of the research proposed by this paper. Then the automatic generation method based on clustering analysis is illustrated detailedly. Finally analyze and evaluate the method by experiments. The experimental results show that the user tags generated by the method can solve the problem of synonymy tags stack, and the tags can reflect the users' interest in more dimensions.
{"title":"The research on the automatic generation of micro-blog user tags based on clustering analysis","authors":"Haiyan Lv, Xiaowei Che, Ren Ying","doi":"10.1109/ICSESS.2014.6933648","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933648","url":null,"abstract":"The main research is the automatic generation of micro-blog user tags based on cluster analysis. Key technologies used in this paper are introduced firstly; mainly include cluster technology and TextRank. A Baseline system is proposed in order to show the validity of the research proposed by this paper. Then the automatic generation method based on clustering analysis is illustrated detailedly. Finally analyze and evaluate the method by experiments. The experimental results show that the user tags generated by the method can solve the problem of synonymy tags stack, and the tags can reflect the users' interest in more dimensions.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"734 1","pages":"633-636"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74769945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-06-27DOI: 10.1109/ICSESS.2014.6933550
Yuan Zhou, Y. Goto, Jingde Cheng
Questionnaire is a general and indispensable method used frequently and widely in many academic, engineering, medical, commercial and political survey research activities to collect information about opinion or behavior of some groups of people. Today, many questionnaires are performed on the Internet by some ways of web applications. However, until now, there is no questionnaire specification language that can be used to specify various e-questionnaire systems. This paper proposes the first specification language named “QSL” for various e-questionnaire systems. QSL can be used to specify not only various questionnaires but also various e-questionnaire systems. The paper presents an analysis of the primitive elements of questionnaires and e-questionnaire systems, defines the specification language QSL, and discusses its completeness and effectiveness.
{"title":"QSL: A specification language for e-questionnaire systems","authors":"Yuan Zhou, Y. Goto, Jingde Cheng","doi":"10.1109/ICSESS.2014.6933550","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933550","url":null,"abstract":"Questionnaire is a general and indispensable method used frequently and widely in many academic, engineering, medical, commercial and political survey research activities to collect information about opinion or behavior of some groups of people. Today, many questionnaires are performed on the Internet by some ways of web applications. However, until now, there is no questionnaire specification language that can be used to specify various e-questionnaire systems. This paper proposes the first specification language named “QSL” for various e-questionnaire systems. QSL can be used to specify not only various questionnaires but also various e-questionnaire systems. The paper presents an analysis of the primitive elements of questionnaires and e-questionnaire systems, defines the specification language QSL, and discusses its completeness and effectiveness.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"35 1","pages":"224-230"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78665206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}