e Informatica Softw. Eng. J.最新文献

筛选
英文 中文
TCP/IP Model for Metaverse Networks and Some Potential Applications 元宇宙网络的TCP/IP模型及其潜在应用
e Informatica Softw. Eng. J. Pub Date : 2022-07-01 DOI: 10.17706/jsw.17.4.158-167
Xinyue Liang, Mengyao Chen, Weijun Zhu, Yiran Wang, Zhen Luo, Mengmeng Xu, Jian Wang
{"title":"TCP/IP Model for Metaverse Networks and Some Potential Applications","authors":"Xinyue Liang, Mengyao Chen, Weijun Zhu, Yiran Wang, Zhen Luo, Mengmeng Xu, Jian Wang","doi":"10.17706/jsw.17.4.158-167","DOIUrl":"https://doi.org/10.17706/jsw.17.4.158-167","url":null,"abstract":"It is well known that internet will play a key role to the infrastructure of metaverse, while different immerging virtual worlds communicate with each other. However, the common TCP/IP model is not suitable enough for metaverse networks. To this end, we explore a preliminary frame of revised TCP/IP model. At first, a new layer called metaverse layer is defined. And then, this layer is placed as the top layer, i.e., the upper of the application layer in TCP/IP model. As a result, a novel network model having the six layers is obtained. Our simulated experiments indicate the feasibility of the new model. Furthermore, we explore several potential application scenes of metaverse networks in this paper.","PeriodicalId":11452,"journal":{"name":"e Informatica Softw. Eng. J.","volume":"124 1","pages":"158-167"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86434523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Simulation of Covid-19 Transmission until the Steady State Using Graph Algorithm 基于图算法的稳态前Covid-19传播模拟
e Informatica Softw. Eng. J. Pub Date : 2022-05-01 DOI: 10.17706/jsw.17.3.130
Toshinari Baba
{"title":"A Simulation of Covid-19 Transmission until the Steady State Using Graph Algorithm","authors":"Toshinari Baba","doi":"10.17706/jsw.17.3.130","DOIUrl":"https://doi.org/10.17706/jsw.17.3.130","url":null,"abstract":"This research computes the average days to reach the steady state of COVID-19 infection by repeated simulation of human interactions using a bi-directed graph. It examines the effect of one infected person on a community comprising groups of people who interacts daily with each other such as school, commuter train, family, etc. Randomization is used to determine group structure and a bi-directed graph models the network of frequently interacting people. Once a person is infected, the incubation period is 5 days, and this person possibly infects other people for the next 6 days. A randomization distribution determines whether each person directly linked to an already infected person will be infected, or not. The effective reproduction number of the actual data is used in the study. Finally, this study examines how many days are required to reach the steady state where a new infected person is not observed any more. The study highlights number of days at the infections peak and how many days are required to reach the steady state. Future research would consider multiple starting points, variants, ages, genders, ethnicities, seasons, and regions. Furthermore, comparison with results of AI machine learning will be examined.","PeriodicalId":11452,"journal":{"name":"e Informatica Softw. Eng. J.","volume":"19 1","pages":"130-136"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81842799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Implementation of Graduate Student Integrated Information Management System - Degree Management 研究生综合信息管理系统-学位管理的设计与实现
e Informatica Softw. Eng. J. Pub Date : 2022-05-01 DOI: 10.17706/jsw.17.3.121-129
Dong-Xu Liu, Feng Qin, Ying-Ming Wang, Xiu-Ru Li, Qiangguo Yin, Dandan Zuo, Y. Zheng
{"title":"Design and Implementation of Graduate Student Integrated Information Management System - Degree Management","authors":"Dong-Xu Liu, Feng Qin, Ying-Ming Wang, Xiu-Ru Li, Qiangguo Yin, Dandan Zuo, Y. Zheng","doi":"10.17706/jsw.17.3.121-129","DOIUrl":"https://doi.org/10.17706/jsw.17.3.121-129","url":null,"abstract":"Degree management is considered the kernel of the Degree Informationization Construction. With the continue population and development of information and technology, the government put great emphasis on college graduation student, effective and standard graduate student degree management system has been the mainstream direction of college graduation management system, as well as thenecessary means and effective ways to educate college graduation student. Firstly, this paper introduced the application status of graduate comprehensive information management system at home and abroad. Citing Anhui University of technology’s graduation student education, we have analysised and researched the reality problems and emergency situations in the process of degree management, proposing reasonable solutions. Next, basing on Anhui University of Technology graduation degree management rules and degree management requirements, we designed graduation comprehensive information management system—degeree management software. The system has been devided five subsystem: thesis proposal management subsystem, mid-term examination subsystem, degree management subsystem,scientific information subsystem and fostering plan subsystem. Lastly, this paper not only introduced the test cases of the system but also summarized the system and put forward the prospect. This system is based on B/S(Browse/Server) and used OOD(Object-Oriented Design) method. In addition, software reuse and MVC(Model + View + Hibernate) pattern has been used in the paper. The degeree management software has improved the development efficiency greatly and reduced the development cost.Users can learn and master the software by its simple interactive inference.","PeriodicalId":11452,"journal":{"name":"e Informatica Softw. Eng. J.","volume":"1 1","pages":"121-129"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82903478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Intimacy and Influence Based Scheduling Algorithm for Vehicle-to-Grid Network 基于亲密度和影响的车网调度算法
e Informatica Softw. Eng. J. Pub Date : 2022-03-01 DOI: 10.17706/jsw.17.2.48-57
Jianyu Hu, Jing Zhang, Hongrui Nian
{"title":"Intimacy and Influence Based Scheduling Algorithm for Vehicle-to-Grid Network","authors":"Jianyu Hu, Jing Zhang, Hongrui Nian","doi":"10.17706/jsw.17.2.48-57","DOIUrl":"https://doi.org/10.17706/jsw.17.2.48-57","url":null,"abstract":"The increasing number of Electric Vehicles (EVs) makes vehicle communication and vehicle charging linked together to form a part of the intelligent transportation system, which promotes the development of Vehicle-to-Grid (V2G) and Vehicular Ad Hoc Network (VANET). At the same time, the charging behavior of electric vehicles affects the energy distribution and storage of each charging pile. Scheduling technology plays an important role in the field of power and communication. The charging behavior is closely related to vehicle communication and will eventually affect vehicle scheduling. Therefore, analyzing the relationship between user charging and user communication is the basis of vehicle scheduling. In order to solve the problem, Intimacy and Influence based Connected Dominating Set Scheduling Algorithm (IICDSA) is proposed in this paper to adjust the charging behavior of users to realize vehicle scheduling: Firstly, V2G network model is constructed to describe the vehicle communication network, and then, Intimacy Measurement algorithm based on Relationship of Attribute (IMRA) is designed to analyze the relationship between users; secondly, Influence Walk algorithm based on the Intimacy between Users (IWIU) is designed to measure the user influence; at last, Connected Dominated Set Scheduling algorithm based on user Influence and user Location (CDSSIL) is designed to schedule users in groups. Furthermore, the simulation results show that the algorithm reduces the system scheduling cost and improves the utilization of charging pile.","PeriodicalId":11452,"journal":{"name":"e Informatica Softw. Eng. J.","volume":"5 1","pages":"48-57"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87428844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trajectory Privacy Protection Mechanism based on Salp-Like Swarm Algorithm 基于类salp群算法的轨迹隐私保护机制
e Informatica Softw. Eng. J. Pub Date : 2022-03-01 DOI: 10.17706/jsw.17.2.71-86
Sitong Shi, Jing Zhang, Yanzi Li, Jianyu Hu
{"title":"Trajectory Privacy Protection Mechanism based on Salp-Like Swarm Algorithm","authors":"Sitong Shi, Jing Zhang, Yanzi Li, Jianyu Hu","doi":"10.17706/jsw.17.2.71-86","DOIUrl":"https://doi.org/10.17706/jsw.17.2.71-86","url":null,"abstract":"Location-based services have been widely used in daily life, providing diversified services for users. However, users may face the risk of trajectory privacy disclosure while enjoying the convenience of location-based services. Most of the existing trajectory protection schemes cannot match the road network and are vulnerable to attacks based on background information. In this paper, the concept of salp swarm algorithm is introduced to construct salp-like swarm algorithm, which can generate K−1 false trajectories that are highly similar to real trajectories. It is difficult for attackers to distinguish them. Besides, a road network matching model is designed in order to match the proposed trajectory privacy protection algorithm with the real road network environment, so that the effect of trajectory privacy protection is improved. Morever, a false location selection mechanism is proposed to find false location points, which not only considers the location and speed of users, but also ensures that the selection of false location points is more in line with the road network environment. The experimental results show that, under the condition of satisfying the same service quality, the trajectory privacy leakage probability of this scheme is reduced by 33% compared with the existing schemes, and it has better privacy protection effect.","PeriodicalId":11452,"journal":{"name":"e Informatica Softw. Eng. J.","volume":"17 1","pages":"71-86"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90977497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-agent-based Modelling and Virtual Reality Simulation System of Major Accidents in Petrochemical Enterprise 基于多智能体的石化企业重大事故建模与虚拟现实仿真系统
e Informatica Softw. Eng. J. Pub Date : 2022-03-01 DOI: 10.17706/jsw.17.2.58-70
Wenjiang Chen, Jinxing Hu, Diping Yuan, J. Liu
{"title":"Multi-agent-based Modelling and Virtual Reality Simulation System of Major Accidents in Petrochemical Enterprise","authors":"Wenjiang Chen, Jinxing Hu, Diping Yuan, J. Liu","doi":"10.17706/jsw.17.2.58-70","DOIUrl":"https://doi.org/10.17706/jsw.17.2.58-70","url":null,"abstract":"The major accidents usually cause massive property loss and casualties in petrochemical enterprise. The simulation system of major accidents plays an important role in safety management, risk assessment, accident prevention and emergency drill and others. In this paper, the Multi-Agent block model for simulating major accidents is based on Multi-Agent technology. A method for reconstructing major accidents is proposed based on virtual reality (VR) idea. Then, a VR simulation system (VRSS) of major accidents is developed by introducing the established methodologies. Finally, the VRSS is applied to simulate the occurrence and consequences of major accidents including fire, explosion, leakage and diffusion triggered by liquefied petroleum gas tank in the storage area of petrochemical enterprise. The application results show that the established methodologies are reasonable and stable. The advantages of VRSS include intelligence, real-time consequence assessment, high efficiency and immersive sense.","PeriodicalId":11452,"journal":{"name":"e Informatica Softw. Eng. J.","volume":"3 1","pages":"58-70"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78494107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software Fault Severity Prediction Using Git History Metrics and Commits 使用Git历史指标和提交的软件故障严重性预测
e Informatica Softw. Eng. J. Pub Date : 2022-03-01 DOI: 10.17706/jsw.17.2.36-47
Herimanitra Ranaivoson, M. Badri
{"title":"Software Fault Severity Prediction Using Git History Metrics and Commits","authors":"Herimanitra Ranaivoson, M. Badri","doi":"10.17706/jsw.17.2.36-47","DOIUrl":"https://doi.org/10.17706/jsw.17.2.36-47","url":null,"abstract":"In this paper, we propose new software agnostic metrics extracted from Git history. We compared the proposed metrics to many traditional code-based metrics in terms of fault severity prediction. We used three Machine Learning Algorithms (Random Forest, SVM and Multilayer Perceptron) to build the prediction models. We used data (source code, source code metrics, fault severity information) collected from three different data sources. Results show that the proposed software agnostic metrics perform better in terms of fault severity prediction compared to traditional code-based metrics. They were able to achieve 84% of accuracy in fault severity prediction. We also introduced some terms extracted from commits and showed their effectiveness for fault severity classification.","PeriodicalId":11452,"journal":{"name":"e Informatica Softw. Eng. J.","volume":"387 1","pages":"36-47"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84989445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automated Collection of Redirect Chains from Search Results Pages to Prize Scam Pages 自动收集重定向链从搜索结果页到奖品骗局页
e Informatica Softw. Eng. J. Pub Date : 2022-02-01 DOI: 10.17706/jsw.18.1.31-43
Mizuki Takagi, Konan Nagashima, Kazunari Mitan, Masatake Shirai, Taiichi Saito
{"title":"Automated Collection of Redirect Chains from Search Results Pages to Prize Scam Pages","authors":"Mizuki Takagi, Konan Nagashima, Kazunari Mitan, Masatake Shirai, Taiichi Saito","doi":"10.17706/jsw.18.1.31-43","DOIUrl":"https://doi.org/10.17706/jsw.18.1.31-43","url":null,"abstract":"Currently, there is an increasing number of prize scams in which users are tricked into entering their personal information to claim that they have won a smartphone or other device. In addition, the scams are not only led by email or SMS but also by Google searches in some cases. Users who access a linked page (Entrance page) from a search result are redirected to a scam page through several intermediate pages. In SCIS2021 and SCIS2022, we collected and analyzed redirection chain logs to reveal the reality of such a prize scam. First, in SCIS2021, we surveyed to gather records of redirect chains. However, we could conduct only 99 small surveys due to manual collection. Next, in SCIS2022, we obtained 496 redirect chain logs through an automatic display of redirect chain logs but could not implement automatic log determination. Therefore, this paper proposes a tool to automatically collect and determine the records of redirection chains using Power Automate Desktop. Furthermore, we will disclose the scam methods and sound a warning by highlighting such scam campaigns.","PeriodicalId":11452,"journal":{"name":"e Informatica Softw. Eng. J.","volume":"26 1","pages":"86-98"},"PeriodicalIF":0.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81849744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Research for Executable Path Automatic Generation Method Based on EFSM 基于EFSM的可执行路径自动生成方法研究
e Informatica Softw. Eng. J. Pub Date : 2022-02-01 DOI: 10.17706/jsw.18.1.15-30
Biao Wu, Q. Ge
{"title":"A Research for Executable Path Automatic Generation Method Based on EFSM","authors":"Biao Wu, Q. Ge","doi":"10.17706/jsw.18.1.15-30","DOIUrl":"https://doi.org/10.17706/jsw.18.1.15-30","url":null,"abstract":"Extended finite state machine (EFSM) is currently one of the most widely used model in the field of software testing. EFSM model is an enhanced model based on finite state machine (FSM). Automated test data generation is still a challenging problem due to the complexity of EFSM which extends the input and output parameters, context variables as well as the predicate condition. These reasons lead to conflict of the context variable with the enable conditions in the transition path. In order to avoid infeasible path generation, this paper proposes a method based on modified breadth first search to generate feasible transition path (MBFS-FTP). To solve the problem of state explosion in path generation, this paper converts state diagram to transition diagram on EFSM model. In order to make the EFSM static model can be driven execution, this paper uses UML model and generate executable model, so that implements EFSM execute dynamically. When using breadth-first search algorithm (MBFS) on every target transition to generate an executable transition path, the conflict detection algorithm is utilized to the transition path for conflict decision, avoiding the occurrence of an infeasible transition path. Considering target transition has multiple feasible transition paths, this paper combines suggested penalized value of definition-predicate-use (def-p-use) pair and length of feasible transition path, and then develops the measurement method of feasible transition path, and obtained a set of feasible transition path containing all of transitions. Through the experiment on two actual EFSM model, verifying the effectiveness of MBFS-FTP for feasible transition automatic generation, the experimental results show that MBFS-FTP can reduce the feasible transition path length, and make transition paths are more easily to be triggered at the times of generating test cases lately, furthermore, it can improve the efficiency of generate feasible transition path and save a lot of time.","PeriodicalId":11452,"journal":{"name":"e Informatica Softw. Eng. J.","volume":"45 1","pages":"15-30"},"PeriodicalIF":0.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73525218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fundamental Algorithms in Distributed Systems 分布式系统中的基本算法
e Informatica Softw. Eng. J. Pub Date : 2022-02-01 DOI: 10.17706/jsw.18.1.44-54
Zhiliang Wan
{"title":"Fundamental Algorithms in Distributed Systems","authors":"Zhiliang Wan","doi":"10.17706/jsw.18.1.44-54","DOIUrl":"https://doi.org/10.17706/jsw.18.1.44-54","url":null,"abstract":"A distributed system is a collection of spatially separated processes that communicate over a network and coordinate their actions by exchanging messages. Because of the failure-prone nature of the network and the processes themselv es, many complex problems arise in distributed systems. If not addressed, these problems can prove to be significantly costly to applications that involve communication and coordination betw een multiple processes. Many of these problems can be overcome through the use of fundamental algorithms for ordering, coordination, and agreement. This paper will review some of these algorithms, including synchroni zation, ordering of events, mutual exclusion, election, multicast, consensus, and Byzantine Generals Problem.","PeriodicalId":11452,"journal":{"name":"e Informatica Softw. Eng. J.","volume":"12 1","pages":"44-54"},"PeriodicalIF":0.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81263402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信