Pub Date : 2014-06-27DOI: 10.1109/ICSESS.2014.6933594
Dongru Ruan, Yu Hua, Zhifeng Pang
This paper studies the two-level collaborative work architecture of resources allocation mechanism for remote collaborative distribution, researches on key technologies of two-level organization activities in real-time dynamic allocate resources, proposed a two-level collaborative scheduling algorithm to support resources co-allocation. The application showed that the system had a good serviceability.
{"title":"A kind of two-level cooperation distributed scheduling strategy","authors":"Dongru Ruan, Yu Hua, Zhifeng Pang","doi":"10.1109/ICSESS.2014.6933594","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933594","url":null,"abstract":"This paper studies the two-level collaborative work architecture of resources allocation mechanism for remote collaborative distribution, researches on key technologies of two-level organization activities in real-time dynamic allocate resources, proposed a two-level collaborative scheduling algorithm to support resources co-allocation. The application showed that the system had a good serviceability.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"30 1","pages":"410-413"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77564734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-06-27DOI: 10.1109/ICSESS.2014.6933657
Wu Qianqian, L. Xiangjun
Web application has got a remarkable change in the past few years, many new technologies are reshaping the pattern of Web applications. Since many manufacturers' promotion on HTML5 technology, more and more websites are using HTML5 gradually. The new technology provides users with a variety of Internet applications, but introduces new security problems at the same time. Currently, most Web application scanners can not detect the security problems with HTML5 features, which make HTML5 security issues become blind spots in security vulnerability scanning process. The paper focuses on a research among the existing Web application scanners firstly. Then we selected W3af(Web Application Attack and Audit Framework) as a basic platform for transformation, and by customizing scanning modules and scripts, we designed a Web application security scanning service. The practical scan results show that it can not only detect the Clickjacking vulnerabilities brought by HTML5, but also provide efficient Web application security scanning and evaluation services for the websites.
Web应用程序在过去的几年中发生了显著的变化,许多新技术正在重塑Web应用程序的模式。由于许多厂商对HTML5技术的推广,越来越多的网站逐渐开始使用HTML5。新技术为用户提供了多种互联网应用,但同时也带来了新的安全问题。目前,大多数Web应用程序扫描器无法检测到HTML5特性的安全问题,这使得HTML5安全问题成为安全漏洞扫描过程中的盲点。本文首先对现有的Web应用程序扫描器进行了研究。然后选择W3af(Web Application Attack and Audit Framework)作为基本的转换平台,通过定制扫描模块和脚本,设计了一个Web应用安全扫描服务。实际扫描结果表明,该方法不仅可以检测出HTML5带来的点击劫持漏洞,还可以为网站提供高效的Web应用安全扫描和评估服务。
{"title":"Research and design on Web application vulnerability scanning service","authors":"Wu Qianqian, L. Xiangjun","doi":"10.1109/ICSESS.2014.6933657","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933657","url":null,"abstract":"Web application has got a remarkable change in the past few years, many new technologies are reshaping the pattern of Web applications. Since many manufacturers' promotion on HTML5 technology, more and more websites are using HTML5 gradually. The new technology provides users with a variety of Internet applications, but introduces new security problems at the same time. Currently, most Web application scanners can not detect the security problems with HTML5 features, which make HTML5 security issues become blind spots in security vulnerability scanning process. The paper focuses on a research among the existing Web application scanners firstly. Then we selected W3af(Web Application Attack and Audit Framework) as a basic platform for transformation, and by customizing scanning modules and scripts, we designed a Web application security scanning service. The practical scan results show that it can not only detect the Clickjacking vulnerabilities brought by HTML5, but also provide efficient Web application security scanning and evaluation services for the websites.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"134 1","pages":"671-674"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80031367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-06-27DOI: 10.1109/ICSESS.2014.6933660
Xuan Shen, Chenqi Bao, Jianmin Bao, Huan Wang
Radio Frequency IDentification(RFID) is a novel technology of automated identification. The use of RFID, however, raises great concerns due to the serious security issue. In this paper, we at first propose a Secure Transaction Frame(STF) and a flow of object transaction based on networked RFID systems. Then, it is worth mentioning that the authentication technology in Secure Transaction Frame(STF) is able to verify the ownership of electric tags in order to deal with common attacks in the networked RFID system. Meanwhile, this paper presents an encryption scheme to protect the information stored in electric tags from being illegally used. After collecting relevant statistics and analyzing cases based on networked RFID systems, this paper also researches the mass requests for the information stored in the electric tags by the reader and eventually, gives a cache mechanism to solve that problem.
{"title":"Study on object transaction based on networked RFID systems","authors":"Xuan Shen, Chenqi Bao, Jianmin Bao, Huan Wang","doi":"10.1109/ICSESS.2014.6933660","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933660","url":null,"abstract":"Radio Frequency IDentification(RFID) is a novel technology of automated identification. The use of RFID, however, raises great concerns due to the serious security issue. In this paper, we at first propose a Secure Transaction Frame(STF) and a flow of object transaction based on networked RFID systems. Then, it is worth mentioning that the authentication technology in Secure Transaction Frame(STF) is able to verify the ownership of electric tags in order to deal with common attacks in the networked RFID system. Meanwhile, this paper presents an encryption scheme to protect the information stored in electric tags from being illegally used. After collecting relevant statistics and analyzing cases based on networked RFID systems, this paper also researches the mass requests for the information stored in the electric tags by the reader and eventually, gives a cache mechanism to solve that problem.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"7 1","pages":"683-687"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79362943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-06-27DOI: 10.1109/ICSESS.2014.6933600
Yanhua Chen, G. Hou, J. Ou
This paper proposes a WSN-based monitoring system for factory aquaculture, which is used to monitor the parameters of water quality. This system is composed of two parts, which are a wireless sensor network and an upper computer. The solution of this system is designed by using the wireless sensor network and ZigBee technologies. The hardware architectures of nodes and related circuits are designed according to the design principles of hardware. We also show the design of software running on this system. Experiments are conducted to test the performance and the function of our proposed system, and experimental results show that our proposed monitoring system performs well for monitoring the parameters of water quality.
{"title":"WSN-based monitoring system for factory aquaculture","authors":"Yanhua Chen, G. Hou, J. Ou","doi":"10.1109/ICSESS.2014.6933600","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933600","url":null,"abstract":"This paper proposes a WSN-based monitoring system for factory aquaculture, which is used to monitor the parameters of water quality. This system is composed of two parts, which are a wireless sensor network and an upper computer. The solution of this system is designed by using the wireless sensor network and ZigBee technologies. The hardware architectures of nodes and related circuits are designed according to the design principles of hardware. We also show the design of software running on this system. Experiments are conducted to test the performance and the function of our proposed system, and experimental results show that our proposed monitoring system performs well for monitoring the parameters of water quality.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"9 1","pages":"439-442"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85638204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-06-27DOI: 10.1109/ICSESS.2014.6933536
Y. Goto, Huilin Chen, Da Bao
Common Criteria (CC) is an international standard for evaluation and certification of IT products. Although a security target (ST) is an important and central document used in the security evaluation process of CC, creating STs is not so easy task for most of software engineers. On the other hand, there are dependency relations among several elements of an ST and a protection profile (PP). Elements of an ST/PP are elements of mandatory contents of STs/PPs defined in CC part 1, e.g., security problems, security objectives, security requirements, and so on. If there is a same element in both an ST/PP and other ST/PP, then what to describe and how to describe elements that depend on the same element are probably similar. Such same element and its dependent elements are a cross-cutting concern among the STs/PPs. Although retrieving cross-cutting concerns among certified STs and PPs are useful for creation and evaluation of STs and PPs, it is difficult, not impossible, to do that because certified STs and PPs are published as PDF files. This paper presents an aspect-oriented reuse mechanism for STs and PPs to help creation and evaluation of STs. The paper also shows technical issues and current implementation of the mechanism.
CC (Common Criteria)是一个用于评估和认证IT产品的国际标准。虽然安全目标(ST)是CC安全评估过程中重要的中心文件,但对于大多数软件工程师来说,创建ST并不是一件容易的事情。另一方面,ST和保护配置文件(PP)的几个要素之间存在依赖关系。ST/PP的要素是在CC第1部分中定义的ST/PP的强制性内容的要素,例如,安全问题、安全目标、安全要求等。如果在一个ST/PP和其他ST/PP中都有相同的元素,那么描述什么以及如何描述依赖于同一元素的元素可能是相似的。这些相同的元素及其相关的元素是化粪池/PPs之间的交叉关注。虽然检索经认证的化粪池和pp之间的交叉关注点对创建和评估化粪池和pp很有用,但很难做到这一点,因为经认证的化粪池和pp是以PDF文件的形式发布的。本文提出了一种面向方面的STs和pp重用机制,以帮助STs的创建和评估。文章还介绍了该机制的技术问题和目前的实施情况。
{"title":"Aspect-oriented reuse mechanism for security targets and protection profiles","authors":"Y. Goto, Huilin Chen, Da Bao","doi":"10.1109/ICSESS.2014.6933536","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933536","url":null,"abstract":"Common Criteria (CC) is an international standard for evaluation and certification of IT products. Although a security target (ST) is an important and central document used in the security evaluation process of CC, creating STs is not so easy task for most of software engineers. On the other hand, there are dependency relations among several elements of an ST and a protection profile (PP). Elements of an ST/PP are elements of mandatory contents of STs/PPs defined in CC part 1, e.g., security problems, security objectives, security requirements, and so on. If there is a same element in both an ST/PP and other ST/PP, then what to describe and how to describe elements that depend on the same element are probably similar. Such same element and its dependent elements are a cross-cutting concern among the STs/PPs. Although retrieving cross-cutting concerns among certified STs and PPs are useful for creation and evaluation of STs and PPs, it is difficult, not impossible, to do that because certified STs and PPs are published as PDF files. This paper presents an aspect-oriented reuse mechanism for STs and PPs to help creation and evaluation of STs. The paper also shows technical issues and current implementation of the mechanism.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"19 1","pages":"161-164"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81144346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-06-27DOI: 10.1109/ICSESS.2014.6933760
Na Lin, Ya-lun Zhang
Executing task in the complex environment, the traditional RRT algorithm is easy to make the tree fall into local minimum area which resulted in poor efficiency. In order to solve the problem, this paper proposes an adaptive RRT algorithm based on dynamic step for path planning and uses the cubic polynomial BSpline curve fitting to smooth the plannned path. The simulation results show that the number of explore failures reduced 35186 times, consuming time reduced 963 ms, distance reduced 33 km at the 3000th iteration by using the adaptive RRT based on dynamic step comparing to the traditional RRT algorithm.
{"title":"An adaptive RRT based on dynamic step for UAVs route planning","authors":"Na Lin, Ya-lun Zhang","doi":"10.1109/ICSESS.2014.6933760","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933760","url":null,"abstract":"Executing task in the complex environment, the traditional RRT algorithm is easy to make the tree fall into local minimum area which resulted in poor efficiency. In order to solve the problem, this paper proposes an adaptive RRT algorithm based on dynamic step for path planning and uses the cubic polynomial BSpline curve fitting to smooth the plannned path. The simulation results show that the number of explore failures reduced 35186 times, consuming time reduced 963 ms, distance reduced 33 km at the 3000th iteration by using the adaptive RRT based on dynamic step comparing to the traditional RRT algorithm.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"291 1","pages":"1111-1114"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76261507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-06-27DOI: 10.1109/ICSESS.2014.6933610
Junru Gao, Xin Meng, Yajun Sun
This paper, the vibration signal of steam turbine which are detected by fault diagnosis are influenced by environmental noise and detecting instrument itself, leading to vibration signal waveform distortion which contains a large number of non-stationary composition, and cannot effectively react turbine fault characteristics, and the coupling among different fault characteristics of unilateral fault features make it difficult to identify fault accurately. Aiming at solving this problem, this paper combine the axis of spectrum analysis with path analysis of vibration signal processing and recognition method, two kinds of detection method in the fault diagnosis process validation to ensure the accuracy of test results.
{"title":"Signal extraction and fault identification of steam turbine vibration","authors":"Junru Gao, Xin Meng, Yajun Sun","doi":"10.1109/ICSESS.2014.6933610","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933610","url":null,"abstract":"This paper, the vibration signal of steam turbine which are detected by fault diagnosis are influenced by environmental noise and detecting instrument itself, leading to vibration signal waveform distortion which contains a large number of non-stationary composition, and cannot effectively react turbine fault characteristics, and the coupling among different fault characteristics of unilateral fault features make it difficult to identify fault accurately. Aiming at solving this problem, this paper combine the axis of spectrum analysis with path analysis of vibration signal processing and recognition method, two kinds of detection method in the fault diagnosis process validation to ensure the accuracy of test results.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"22 1","pages":"481-483"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77850440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-06-27DOI: 10.1109/ICSESS.2014.6933574
Ma Weiqing, Zhan Huiming, Kang Chaoqun, Z. Ye
Aimed at improving power supply reliability, according to the radial pattern of power supply network, reliability analysis of power supply network based on recursive algorithm is put forward in this paper. The power supply network is represented by a binary tree, and by means of recursive algorithm in a reverse order, the reliability of sub-feeders are reasonably equivalent by a line to simplify the whole power supply network. Thus, time and space of computation are saved. Finally, a case has been used to illustrate the effectiveness of the method.
{"title":"Reliability analysis of power supply based on recursive algorithm","authors":"Ma Weiqing, Zhan Huiming, Kang Chaoqun, Z. Ye","doi":"10.1109/ICSESS.2014.6933574","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933574","url":null,"abstract":"Aimed at improving power supply reliability, according to the radial pattern of power supply network, reliability analysis of power supply network based on recursive algorithm is put forward in this paper. The power supply network is represented by a binary tree, and by means of recursive algorithm in a reverse order, the reliability of sub-feeders are reasonably equivalent by a line to simplify the whole power supply network. Thus, time and space of computation are saved. Finally, a case has been used to illustrate the effectiveness of the method.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"308 1","pages":"327-330"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77955222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-06-27DOI: 10.1109/ICSESS.2014.6933633
BaoWei Hou, Rui Zheng, Guosheng Yang
The current popular image features index structure can be divided into tree-based structures, hash-based structures and machine learning based structures. In face recognition, selecting the appropriate image feature indexing structure to achieve large-scale face image matching has aways been a problem. In this paper, we present a global image features indexing method based on complete binary tree, using the ethnic facial image database, by contrast with the local sensitive hash(LSH), and principal component analysis (PCA) is adopted to extract facial image features for convienent. Experimental results show that the proposed method is superior to the local sensitive hashing in velocity.
{"title":"Quick search algorithms based on ethnic facial image database","authors":"BaoWei Hou, Rui Zheng, Guosheng Yang","doi":"10.1109/ICSESS.2014.6933633","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933633","url":null,"abstract":"The current popular image features index structure can be divided into tree-based structures, hash-based structures and machine learning based structures. In face recognition, selecting the appropriate image feature indexing structure to achieve large-scale face image matching has aways been a problem. In this paper, we present a global image features indexing method based on complete binary tree, using the ethnic facial image database, by contrast with the local sensitive hash(LSH), and principal component analysis (PCA) is adopted to extract facial image features for convienent. Experimental results show that the proposed method is superior to the local sensitive hashing in velocity.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"50 1","pages":"573-576"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78092576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-06-27DOI: 10.1109/ICSESS.2014.6933554
Chaohui Lu, J. Pan, Yaran Chen
In the production of stereoscopic video, there are some color differences between different views. In this paper, a color correction method based on decorrelation color space is proposed. Image features from the reference image and original image are first extracted by Harris algorithm, and Normalized Cross-Correlation algorithm (NCC) is used to find the corresponding match points of the images. Then the RGB color space is converted into decorrelation color space in which colors are corrected with a formula which includes mean and variance. After that, images are converted back into the RGB color space. Experiment results show that the proposed method can produce a better correction result than histogram match.
{"title":"Stereoscopic video color correction based on decorrelation color space","authors":"Chaohui Lu, J. Pan, Yaran Chen","doi":"10.1109/ICSESS.2014.6933554","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933554","url":null,"abstract":"In the production of stereoscopic video, there are some color differences between different views. In this paper, a color correction method based on decorrelation color space is proposed. Image features from the reference image and original image are first extracted by Harris algorithm, and Normalized Cross-Correlation algorithm (NCC) is used to find the corresponding match points of the images. Then the RGB color space is converted into decorrelation color space in which colors are corrected with a formula which includes mean and variance. After that, images are converted back into the RGB color space. Experiment results show that the proposed method can produce a better correction result than histogram match.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"77 1","pages":"244-247"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72864408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}