首页 > 最新文献

2018 IEEE International Conference of Safety Produce Informatization (IICSPI)最新文献

英文 中文
Application software front-end modeling, verification and case based on the Interface Window Tree 基于界面窗口树的应用软件前端建模、验证和用例
Pub Date : 2018-12-01 DOI: 10.1109/IICSPI.2018.8690506
Yue Li, J. Lv, Shilong Ma, Qianchen Xia, Qiqige Wuniri
According to authoritative statistics, more than 70% of errors found in software testing are caused by requirements or architectural design [1]. Therefore, the modeling and verification of the application front-end design can help improve the development quality of the front-end system and reduce the cost of rework which caused by the design not meeting the requirements. This paper takes the application software front-end system as the research object, aims to verify whether the design of the application software front-end system meets the requirements, use the Interface Window Tree Model to model the user interface composition and behavior, and use the State Transition Graph to specify the composition and behavior correctness of the user interface, and proposes corresponding verification rules and automatic verification algorithms based on the State Transition Graph. Based on the above method, a large-scale web application front-end modeling and verification is completed through an actual case, which shows the effectiveness of the proposed method.
据权威统计,在软件测试中发现的错误中,有70%以上是由需求或架构设计引起的[1]。因此,对应用程序前端设计进行建模和验证,有助于提高前端系统的开发质量,减少因设计不符合要求而导致的返工成本。本文以应用软件前端系统为研究对象,旨在验证应用软件前端系统的设计是否满足要求,使用界面窗口树模型对用户界面的组成和行为进行建模,使用状态转移图来指定用户界面的组成和行为正确性。提出了相应的基于状态转移图的验证规则和自动验证算法。在此基础上,通过实际案例完成了大规模web应用前端建模与验证,验证了所提方法的有效性。
{"title":"Application software front-end modeling, verification and case based on the Interface Window Tree","authors":"Yue Li, J. Lv, Shilong Ma, Qianchen Xia, Qiqige Wuniri","doi":"10.1109/IICSPI.2018.8690506","DOIUrl":"https://doi.org/10.1109/IICSPI.2018.8690506","url":null,"abstract":"According to authoritative statistics, more than 70% of errors found in software testing are caused by requirements or architectural design [1]. Therefore, the modeling and verification of the application front-end design can help improve the development quality of the front-end system and reduce the cost of rework which caused by the design not meeting the requirements. This paper takes the application software front-end system as the research object, aims to verify whether the design of the application software front-end system meets the requirements, use the Interface Window Tree Model to model the user interface composition and behavior, and use the State Transition Graph to specify the composition and behavior correctness of the user interface, and proposes corresponding verification rules and automatic verification algorithms based on the State Transition Graph. Based on the above method, a large-scale web application front-end modeling and verification is completed through an actual case, which shows the effectiveness of the proposed method.","PeriodicalId":6673,"journal":{"name":"2018 IEEE International Conference of Safety Produce Informatization (IICSPI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89879152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Application and Research of New Technology in Intelligent Substation Communication 智能变电站通信新技术的应用与研究
Pub Date : 2018-12-01 DOI: 10.1109/IICSPI.2018.8690432
Zhang Xiaoyun, Li Wencui, Wang Lei, Li Xiong, Ren Yinlin
Based on the analysis of the characteristics of new communication technologies, the paper mainly analyzes the adaptability of OTN technology, PTN technology and softswitch technology in power system communication network. According to the demand for the construction of the communication system in the intelligent substation, an application scheme for new intelligent substation communication technologies is proposed, then the technical and economic level of each scheme is compared to optimize equipment allocation, improve reliability, reduce maintenance investment, and reduce investment and energy saving.
在分析新型通信技术特点的基础上,重点分析了OTN技术、PTN技术和软交换技术在电力系统通信网络中的适应性。根据智能变电站通信系统建设的需求,提出了一种新型智能变电站通信技术的应用方案,并对各方案的技术经济水平进行了比较,以达到优化设备配置、提高可靠性、减少维护投资、减少投资和节能的目的。
{"title":"Application and Research of New Technology in Intelligent Substation Communication","authors":"Zhang Xiaoyun, Li Wencui, Wang Lei, Li Xiong, Ren Yinlin","doi":"10.1109/IICSPI.2018.8690432","DOIUrl":"https://doi.org/10.1109/IICSPI.2018.8690432","url":null,"abstract":"Based on the analysis of the characteristics of new communication technologies, the paper mainly analyzes the adaptability of OTN technology, PTN technology and softswitch technology in power system communication network. According to the demand for the construction of the communication system in the intelligent substation, an application scheme for new intelligent substation communication technologies is proposed, then the technical and economic level of each scheme is compared to optimize equipment allocation, improve reliability, reduce maintenance investment, and reduce investment and energy saving.","PeriodicalId":6673,"journal":{"name":"2018 IEEE International Conference of Safety Produce Informatization (IICSPI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75842475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IPv6 Security Test Model Research based on Cloud Computing Environment 基于云计算环境的IPv6安全测试模型研究
Pub Date : 2018-12-01 DOI: 10.1109/IICSPI.2018.8690337
Jing Zhong, W. Liu
Cloud computing is a hot topic in the field of Information Technology, and it is the focus of attention in industry, academia and government. The capacity of the IP address space and the security of the IP protocol is one of the basic parameters of cloud computing that must be considered and valued. IPv4 protocol cannot meet the cloud computing to a large number of new network application requirements; IPv6 protocol is an inevitable choice for cloud computing development. In this article, in-depth analysis for IPv6 security issues in cloud computing environments is conducted, and IPv6 security test model in the cloud computing environment is proposed to help improve and enhance the security of cloud computing.
云计算是信息技术领域的一个热门话题,是工业界、学术界和政府关注的焦点。IP地址空间的容量和IP协议的安全性是云计算必须考虑和重视的基本参数之一。IPv4协议不能满足云计算对大量新网络应用的需求;IPv6协议是云计算发展的必然选择。本文对云计算环境下的IPv6安全问题进行了深入分析,提出了云计算环境下的IPv6安全测试模型,以帮助改进和增强云计算的安全性。
{"title":"IPv6 Security Test Model Research based on Cloud Computing Environment","authors":"Jing Zhong, W. Liu","doi":"10.1109/IICSPI.2018.8690337","DOIUrl":"https://doi.org/10.1109/IICSPI.2018.8690337","url":null,"abstract":"Cloud computing is a hot topic in the field of Information Technology, and it is the focus of attention in industry, academia and government. The capacity of the IP address space and the security of the IP protocol is one of the basic parameters of cloud computing that must be considered and valued. IPv4 protocol cannot meet the cloud computing to a large number of new network application requirements; IPv6 protocol is an inevitable choice for cloud computing development. In this article, in-depth analysis for IPv6 security issues in cloud computing environments is conducted, and IPv6 security test model in the cloud computing environment is proposed to help improve and enhance the security of cloud computing.","PeriodicalId":6673,"journal":{"name":"2018 IEEE International Conference of Safety Produce Informatization (IICSPI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73334016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Model of Wind Power Short-Term Prediction Based on Artificial Fish Swarm Algorithm of Support Vector Machine 基于支持向量机人工鱼群算法的风电短期预测模型
Pub Date : 2018-12-01 DOI: 10.1109/IICSPI.2018.8690469
Yang Zheng, Li Hong
In order to improve the accuracy of wind power prediction and solve the parameter selection problem of support vector machine(SVM)model for the wind power prediction, the artificial fish swarm algorithm(AFSA) is proposed to look for the support vector machine’s optimal parameter of kernel function and the parameter of error penalty. The model of AFSA-SVW is established to predict the wind power with the numerical weather forecast(NWP) data after clustering analysis. Form the result of simulation experiment, it shows that the model of AFSA-SVW has a higher accuracy than the model of BP and the model of BP and the model of BP and the model of PSO-SVM in the short-term wind power prediction.
为了提高风电功率预测的精度,解决支持向量机(SVM)模型用于风电功率预测的参数选择问题,提出了人工鱼群算法(AFSA)寻找支持向量机的最优核函数参数和误差惩罚参数。利用数值天气预报(NWP)数据进行聚类分析,建立了AFSA-SVW预测模型。仿真实验结果表明,AFSA-SVW模型在短期风电功率预测中具有比BP模型、BP模型、BP模型和PSO-SVM模型更高的精度。
{"title":"The Model of Wind Power Short-Term Prediction Based on Artificial Fish Swarm Algorithm of Support Vector Machine","authors":"Yang Zheng, Li Hong","doi":"10.1109/IICSPI.2018.8690469","DOIUrl":"https://doi.org/10.1109/IICSPI.2018.8690469","url":null,"abstract":"In order to improve the accuracy of wind power prediction and solve the parameter selection problem of support vector machine(SVM)model for the wind power prediction, the artificial fish swarm algorithm(AFSA) is proposed to look for the support vector machine’s optimal parameter of kernel function and the parameter of error penalty. The model of AFSA-SVW is established to predict the wind power with the numerical weather forecast(NWP) data after clustering analysis. Form the result of simulation experiment, it shows that the model of AFSA-SVW has a higher accuracy than the model of BP and the model of BP and the model of BP and the model of PSO-SVM in the short-term wind power prediction.","PeriodicalId":6673,"journal":{"name":"2018 IEEE International Conference of Safety Produce Informatization (IICSPI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73352524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Application Research of ESO in Solving Parasitic Resistance in CPL System ESO在解决CPL系统寄生电阻中的应用研究
Pub Date : 2018-12-01 DOI: 10.1109/IICSPI.2018.8690421
Jian Cui, Jianguo Li, Jiuhe Wang, Xiaobin Mu
In this paper, extended state observer(ESO) is used to solve the static-state error caused by parasitic resistance in Buck converter with constant power load(CPL). Firstly, the control algorithm based on passivity-based control(PBC) is designed to solve the problem that the Buck converter with CPL can not operate stably, and the influence of parameter change on the control system is analyzed by using the zero-pole map. The influence caused by parasitic resistance is regarded as unknown disturbance, and it is estimated by ESO to reduce the control static-state error. Finally, the problem of non-convergence is solved by improving the fal function commonly used in ESO. Computer simulation shows the effectiveness and feasibility of the control strategy designed in this paper.
本文采用扩展状态观测器(ESO)来解决恒功率负载Buck变换器中寄生电阻引起的静态误差。首先,设计了基于无源控制(PBC)的控制算法,解决了带CPL的Buck变换器不能稳定运行的问题,并利用零极图分析了参数变化对控制系统的影响。将寄生电阻的影响视为未知扰动,采用ESO方法对其进行估计,以减小控制的静态误差。最后,通过改进ESO中常用的fal函数,解决了非收敛性问题。计算机仿真验证了所设计控制策略的有效性和可行性。
{"title":"Application Research of ESO in Solving Parasitic Resistance in CPL System","authors":"Jian Cui, Jianguo Li, Jiuhe Wang, Xiaobin Mu","doi":"10.1109/IICSPI.2018.8690421","DOIUrl":"https://doi.org/10.1109/IICSPI.2018.8690421","url":null,"abstract":"In this paper, extended state observer(ESO) is used to solve the static-state error caused by parasitic resistance in Buck converter with constant power load(CPL). Firstly, the control algorithm based on passivity-based control(PBC) is designed to solve the problem that the Buck converter with CPL can not operate stably, and the influence of parameter change on the control system is analyzed by using the zero-pole map. The influence caused by parasitic resistance is regarded as unknown disturbance, and it is estimated by ESO to reduce the control static-state error. Finally, the problem of non-convergence is solved by improving the fal function commonly used in ESO. Computer simulation shows the effectiveness and feasibility of the control strategy designed in this paper.","PeriodicalId":6673,"journal":{"name":"2018 IEEE International Conference of Safety Produce Informatization (IICSPI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79362842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A FPGA-based Low-latency Multi-channel Video Network Transmission System Design 基于fpga的低延迟多通道视频网络传输系统设计
Pub Date : 2018-12-01 DOI: 10.1109/IICSPI.2018.8690417
Jun Lu, Yao Ding
Based on FPGA-based real-time video data transmission and coding-decoding technology, this paper realized automatic PAL and NTSC modulation recognition with four-channel AV analog signal as the input. After BT.656 digital video signals were compressed at high compression ratio, long-distance transmission of video signals was realized through GPHY gigabit Ethernet. Uncompressed by the receiver terminal, data reached YCbCr422 through BT.656 and then were output at VGA in RGB format and at HDMI in high-definition format. four-channel AV signals were put under parallel processing, which gave full play to high concurrency of FPGA and high real-time data-handling capacity. Compared with traditional video network transmission system, latency was reduced from about 500ms to 200ms to realize low-latency multi-channel video signal network transmission based on FPGA.
基于fpga的实时视频数据传输和编解码技术,以四路AV模拟信号为输入,实现了PAL和NTSC调制的自动识别。BT.656数字视频信号经过高压缩比压缩后,通过GPHY千兆以太网实现视频信号的远距离传输。接收端解压缩后,数据通过BT.656到达YCbCr422,然后以RGB格式输出VGA,以高清格式输出HDMI。对四通道AV信号进行并行处理,充分发挥了FPGA的高并发性和高实时数据处理能力。与传统的视频网络传输系统相比,将时延从500ms左右降低到200ms,实现了基于FPGA的低时延多路视频信号网络传输。
{"title":"A FPGA-based Low-latency Multi-channel Video Network Transmission System Design","authors":"Jun Lu, Yao Ding","doi":"10.1109/IICSPI.2018.8690417","DOIUrl":"https://doi.org/10.1109/IICSPI.2018.8690417","url":null,"abstract":"Based on FPGA-based real-time video data transmission and coding-decoding technology, this paper realized automatic PAL and NTSC modulation recognition with four-channel AV analog signal as the input. After BT.656 digital video signals were compressed at high compression ratio, long-distance transmission of video signals was realized through GPHY gigabit Ethernet. Uncompressed by the receiver terminal, data reached YCbCr422 through BT.656 and then were output at VGA in RGB format and at HDMI in high-definition format. four-channel AV signals were put under parallel processing, which gave full play to high concurrency of FPGA and high real-time data-handling capacity. Compared with traditional video network transmission system, latency was reduced from about 500ms to 200ms to realize low-latency multi-channel video signal network transmission based on FPGA.","PeriodicalId":6673,"journal":{"name":"2018 IEEE International Conference of Safety Produce Informatization (IICSPI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85238720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Safety Assessment of Military ATC system Based on Fuzzy Matter-element Model 基于模糊物元模型的军用空中交通管制系统安全评价研究
Pub Date : 2018-12-01 DOI: 10.1109/IICSPI.2018.8690392
Liu Ping-ni
In order to assure the safety operation of military ATC system, on the basis of fuzzy matter-element analysis theory, a safety assessment model of military ATC system is proposed on the basis of safety assessment index system of military ATC system. The example analysis result shows that the assessment result basically reflects the actual safety level of the of military ATC system, providing a new way for military ATC safety assessment.
为了保证军用空中交通管制系统的安全运行,基于模糊物元分析理论,在军用空中交通管制系统安全评价指标体系的基础上,提出了军用空中交通管制系统安全评价模型。算例分析结果表明,评估结果基本反映了军用空管系统的实际安全水平,为军用空管安全评估提供了一种新的途径。
{"title":"Research on Safety Assessment of Military ATC system Based on Fuzzy Matter-element Model","authors":"Liu Ping-ni","doi":"10.1109/IICSPI.2018.8690392","DOIUrl":"https://doi.org/10.1109/IICSPI.2018.8690392","url":null,"abstract":"In order to assure the safety operation of military ATC system, on the basis of fuzzy matter-element analysis theory, a safety assessment model of military ATC system is proposed on the basis of safety assessment index system of military ATC system. The example analysis result shows that the assessment result basically reflects the actual safety level of the of military ATC system, providing a new way for military ATC safety assessment.","PeriodicalId":6673,"journal":{"name":"2018 IEEE International Conference of Safety Produce Informatization (IICSPI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85457820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Personnel Evacuation of Departure Platform of Nanjing South Railway Station Based on Anylogic 基于Anylogic的南京南站发车站台人员疏散研究
Pub Date : 2018-12-01 DOI: 10.1109/IICSPI.2018.8690367
Hao Xuetong, Zhu Shunbing, Li Xun, Zhu Weiqiang
The paper uses Anylogic simulation software to take the Nanjing South Railway Station departure platform as an example to set up evacuation routes and evacuation numbers and establish an evacuation simulation model for different personnel structure ratios by analyzing the video surveillance of Nanjing South Railway Station. Evacuation flow and evacuation time are analyzed by comparing different evacuation modes. The result shows: (1) The evacuation can be completed within the prescribed time when the departure platform accommodates 4,000 and 6,000 people respectively. (2) The fewer people the evacuation platform accommodates, the shorter the evacuation time used, and the more efficient the evacuation is. (3) Different proportion of personnel age structures have an impact on evacuation flow and evacuation time, the evacuation flow is larger and the evacuation time used is shorter when the middle-aged population accounts for a higher proportion.
本文利用Anylogic仿真软件,以南京南站发车站台为例,通过分析南京南站的视频监控,设置疏散路线和疏散人数,建立不同人员结构比例下的疏散仿真模型。通过对不同疏散方式的比较,分析疏散流程和疏散时间。结果表明:(1)当发车平台分别容纳4000人和6000人时,可在规定时间内完成疏散。(2)疏散平台容纳的人数越少,疏散时间越短,疏散效率越高。(3)人员年龄结构占比不同对疏散流量和疏散时间有影响,中年人口占比越高,疏散流量越大,使用的疏散时间越短。
{"title":"Research on Personnel Evacuation of Departure Platform of Nanjing South Railway Station Based on Anylogic","authors":"Hao Xuetong, Zhu Shunbing, Li Xun, Zhu Weiqiang","doi":"10.1109/IICSPI.2018.8690367","DOIUrl":"https://doi.org/10.1109/IICSPI.2018.8690367","url":null,"abstract":"The paper uses Anylogic simulation software to take the Nanjing South Railway Station departure platform as an example to set up evacuation routes and evacuation numbers and establish an evacuation simulation model for different personnel structure ratios by analyzing the video surveillance of Nanjing South Railway Station. Evacuation flow and evacuation time are analyzed by comparing different evacuation modes. The result shows: (1) The evacuation can be completed within the prescribed time when the departure platform accommodates 4,000 and 6,000 people respectively. (2) The fewer people the evacuation platform accommodates, the shorter the evacuation time used, and the more efficient the evacuation is. (3) Different proportion of personnel age structures have an impact on evacuation flow and evacuation time, the evacuation flow is larger and the evacuation time used is shorter when the middle-aged population accounts for a higher proportion.","PeriodicalId":6673,"journal":{"name":"2018 IEEE International Conference of Safety Produce Informatization (IICSPI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79821279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Backtracking and Visualization Techniques for Financial Network Security 金融网络安全回溯与可视化技术
Pub Date : 2018-12-01 DOI: 10.1109/IICSPI.2018.8690462
Jaehan Jeong, Keunho Park, Wooyeon Jo, Taeshik Shon
Security has been constantly threatened since computers began. The greater the importance of computer roles, the greater the importance of security. Financial security involves a lot of personal information and money, and because it is directly linked to money, the damage is also great. The threat will continue unless you find and block these attackers. If you know the location of the attacker through backtracking, you can essentially block the attack. In addition, if you visualize the attacks, you can easily analyze the attack because you can see at a glance. Our research suggests monitoring attacks that are threatened by financial security and backtracking attackers.
自从有了计算机,安全就不断受到威胁。计算机角色的重要性越大,安全的重要性就越大。金融安全涉及到大量的个人信息和金钱,由于与金钱直接相关,损害也很大。除非你找到并阻止这些攻击者,否则威胁还会继续。如果您通过回溯知道攻击者的位置,则基本上可以阻止攻击。此外,如果您将攻击可视化,您可以很容易地分析攻击,因为您可以一目了然。我们的研究建议监控受到金融安全威胁的攻击,并追踪攻击者。
{"title":"Backtracking and Visualization Techniques for Financial Network Security","authors":"Jaehan Jeong, Keunho Park, Wooyeon Jo, Taeshik Shon","doi":"10.1109/IICSPI.2018.8690462","DOIUrl":"https://doi.org/10.1109/IICSPI.2018.8690462","url":null,"abstract":"Security has been constantly threatened since computers began. The greater the importance of computer roles, the greater the importance of security. Financial security involves a lot of personal information and money, and because it is directly linked to money, the damage is also great. The threat will continue unless you find and block these attackers. If you know the location of the attacker through backtracking, you can essentially block the attack. In addition, if you visualize the attacks, you can easily analyze the attack because you can see at a glance. Our research suggests monitoring attacks that are threatened by financial security and backtracking attackers.","PeriodicalId":6673,"journal":{"name":"2018 IEEE International Conference of Safety Produce Informatization (IICSPI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84029111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
LCBNI: link completion bipartite network inference for predicting new lncRNA-miRNA interactions LCBNI:用于预测新的lncRNA-miRNA相互作用的链路完成二部网络推断
Pub Date : 2018-12-01 DOI: 10.1109/IICSPI.2018.8690403
Zhenkun Yu, Fuxi Zhu, Gang Tianl, Hao Wang
LncRNAs and miRNAs are two different kinds of non-coding RNAs and are both important for human in the field of health and disease. LncRNAs can interact with miRNAs, and the interactions play key roles in gene regulatory networks. Predicting IncRNA-miRNA interactions is an urgent and significant task and can help to explore the mechanism of involved complicated diseases, but very few computational methods are developed. In this paper, we introduce a computational method named link completion bipartite network inference (LCBNI) to predict the potential interactions between IncRNAs and miRNAs. LCBNI formulates the observed IncRNA-miRNA interactions as a bipartite network. Considering that there is no any known interaction for new IncRNAs or miRNAs, LCBNI calculates the sequence similarity and utilizes weighted nearest neighbor interaction information to construct new interaction scores for these IncRNAs and miRNAs. Then, we implement a resource allocation algorithm on the bipartite network to predict IncRNA-miRNA interactions. The experimental results demonstrate that LCBNI can effectively predict IncRNA-miRNA interactions with higher accuracy compared with other state-of-the-art methods and network-based methods, including random walk with restart (RWR), IncRNA-based collaborative filtering (LncCF) and miRNA-based collaborative filtering (MiCF). Furthermore, case studies are performed to demonstrate the prediction capability of LCBNI using real data.
lncrna和mirna是两种不同的非编码rna,在人类健康和疾病领域都发挥着重要作用。lncrna可以与mirna相互作用,这种相互作用在基因调控网络中起着关键作用。预测IncRNA-miRNA相互作用是一项紧迫而重要的任务,可以帮助探索相关复杂疾病的机制,但很少有计算方法被开发出来。在本文中,我们引入了一种名为链接完成二部网络推理(LCBNI)的计算方法来预测incrna和mirna之间潜在的相互作用。LCBNI将观察到的IncRNA-miRNA相互作用表述为一个双向网络。考虑到新的incrna或mirna没有任何已知的相互作用,LCBNI计算序列相似性并利用加权最近邻相互作用信息来构建这些incrna和mirna的新的相互作用得分。然后,我们在二部网络上实现了一种资源分配算法来预测IncRNA-miRNA相互作用。实验结果表明,与随机行走与重启(RWR)、基于incrna的协同过滤(LncCF)和基于mirna的协同过滤(MiCF)等其他最先进的方法和基于网络的方法相比,LCBNI可以有效地预测IncRNA-miRNA相互作用,准确率更高。通过实例分析,验证了LCBNI在实际数据中的预测能力。
{"title":"LCBNI: link completion bipartite network inference for predicting new lncRNA-miRNA interactions","authors":"Zhenkun Yu, Fuxi Zhu, Gang Tianl, Hao Wang","doi":"10.1109/IICSPI.2018.8690403","DOIUrl":"https://doi.org/10.1109/IICSPI.2018.8690403","url":null,"abstract":"LncRNAs and miRNAs are two different kinds of non-coding RNAs and are both important for human in the field of health and disease. LncRNAs can interact with miRNAs, and the interactions play key roles in gene regulatory networks. Predicting IncRNA-miRNA interactions is an urgent and significant task and can help to explore the mechanism of involved complicated diseases, but very few computational methods are developed. In this paper, we introduce a computational method named link completion bipartite network inference (LCBNI) to predict the potential interactions between IncRNAs and miRNAs. LCBNI formulates the observed IncRNA-miRNA interactions as a bipartite network. Considering that there is no any known interaction for new IncRNAs or miRNAs, LCBNI calculates the sequence similarity and utilizes weighted nearest neighbor interaction information to construct new interaction scores for these IncRNAs and miRNAs. Then, we implement a resource allocation algorithm on the bipartite network to predict IncRNA-miRNA interactions. The experimental results demonstrate that LCBNI can effectively predict IncRNA-miRNA interactions with higher accuracy compared with other state-of-the-art methods and network-based methods, including random walk with restart (RWR), IncRNA-based collaborative filtering (LncCF) and miRNA-based collaborative filtering (MiCF). Furthermore, case studies are performed to demonstrate the prediction capability of LCBNI using real data.","PeriodicalId":6673,"journal":{"name":"2018 IEEE International Conference of Safety Produce Informatization (IICSPI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83096275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2018 IEEE International Conference of Safety Produce Informatization (IICSPI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1