Shaohua Chen, Xiaoguang Fan, Yong-jian Yang, Jinke Huang, Xianming Sun
{"title":"The grid-based identity signcryption algorithm and application in Ad Hoc network","authors":"Shaohua Chen, Xiaoguang Fan, Yong-jian Yang, Jinke Huang, Xianming Sun","doi":"10.1109/ICSESS.2016.7883098","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883098","url":null,"abstract":"Identity-based signcryption which guarantees the confidentiality and authentication of message is suitable for the key management of Ad Hoc network due to its low computation cost. Aiming at the deficiencies of the existing identity-based signcryption algorithms, this paper proposes an efficient grid-based identity signcryption algorithm which adopts a low overhand, high expandability and high connectivity grid as the logical structure. By using this signcryption algorithm in the key management scheme of Ad Hoc network, the communication and computation cost of key management is reduced and the safety and efficiency of the key management scheme is enhanced. The analyses show that the Ad Hoc network has a good ability of resistance to the attack when the new signcryption algorithm is used in key management.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116881661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Transmission of clinical information based on HL7 CDA standard","authors":"Yiming Yang, Liang Xiao, Jingbai Tian","doi":"10.1109/ICSESS.2016.7883222","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883222","url":null,"abstract":"At present, the phenomenon of electronic medical institutions is becoming more and more popular. In order to provide or get better medical services, the demand for exchange and sharing of clinical information is also increasing. However, due to the heterogeneity of the medical system, the problem of data format is not uniform, which has seriously hindered the delivery of clinical information, so that the patient's clinical information can not be fully utilized. In this paper, we apply the information model of HL7 CDA standard to package clinical information documents, use XML language to achieve a simple CDA document and its format output. At the same time, through the JDBC and XML parser to achieve the automatic generation and analysis of CDA documents. By encapsulating the CDA document in the HL7 message, the transmission of clinical information is realized.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117009421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Image fusion using the Wavelet TRW and Haar transforms: Enhancement of spatial resolution for the Ikonos images from Ortophotos","authors":"Rubén Javier Medina Daza, E. Upegui","doi":"10.1109/ICSESS.2016.7883048","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883048","url":null,"abstract":"This article has as a purpose to develop and assess two methodologies that allow to enhance spatial resolution without significant loss of the spectral resolution, with an Ikonos image and a Ortophoto. Using the RGB-IHS transform and the wavelet implementation of the Wavelet TRWH transform (Fast Haar transform) and Haar. Applying the fusion to the intensity components of the multispectral image (Im) and the ones from the ortophoto (Io) through the Wavelet haar transform predefined in Matlab together with the ARSIS technique, a new intensity l is generated respectively. To perform the inverse transforms IHS-RGB and thus obtain an multispectral image. Finally the obtained results are shown with the mathematical-statistical indexes CC, ERGAS, RSE and Qu.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"41 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120849694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A test platform for baseband signal processing module of ADS-B","authors":"Weilu Chen, Qibin Lu, Zhengxiang Li","doi":"10.1109/ICSESS.2016.7883236","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883236","url":null,"abstract":"In this paper, a test platform for baseband signal processing module of ADS-B is introduced, which is simple and efficient. The baseband signal processing module of ADS-B used in receiving system of ADS-B analyzes 1090ES ADS-B message of baseband. In order to reduce the risk of technology and business, it is necessary to ensure that the signal processing module of ADS-B works normally before delivery. The test platform based on hardware-software co-design architecture may make sure the signal processing module of ADS-B works normally and locate some hardware fault.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124832525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A multi-dimensional integrated design framework for CNC system","authors":"Di Li, Zhenkun Zhai","doi":"10.1109/ICSESS.2016.7883234","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883234","url":null,"abstract":"With regard to the challenges for CNC system design stemming from the diversity of design requirements, a multi-dimensional integrated design framework is proposed in this paper, which can provide a convenient and efficient way for CNC system design. As an important part of this framework, a modelling language is developed based on IEC 61499 and hierarchical policy. By encapsulating CNC functions into function blocks and constructing the control system in a bottom-up way, a variety of architectures of CNC system can be flexibly built. To investigate the reliability of CNC system in the early stage of the design, formal verification is combined into the design framework With formal model and specification, the dynamic and static properties of a CNC system can be automatically verified by use of model checking. Deliberating the multi-objective characteristic of system performance, the design framework employs the multi-objective optimization technique to detect the most appropriate design scheme. To achieve the seamless integration between the above steps, a design platform in the form of a tool chain is developed, which can effectively improve the efficiency of system design. At last, an experiment on the design of a motion controller is conducted, by which the validity of the proposed framework can be proved.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128171863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chuansen Chai, Xuexiong Yan, Qingxian Wang, Shukai Liu
{"title":"Static detection of execution after redirect vulnerabilities in PHP applications","authors":"Chuansen Chai, Xuexiong Yan, Qingxian Wang, Shukai Liu","doi":"10.1109/ICSESS.2016.7883115","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883115","url":null,"abstract":"In recent years, modern web applications are becoming more and more complex and it makes difficult for developers to audit the code. The number of attacks against these applications has increased rapidly. Automated detection techniques for web applications are badly in need. Execution after execution (EAR) vulnerability is a kind of logic flaws for web application. It allows the server-side execution continuing after the intended halting point. This may result in serious consequences such as information leakage. In this paper, we propose a path-sensitive inter-procedural analysis to detect EAR vulnerabilities in PHP web applications. The analysis improves the traditional detection method by verifying the path conditions and considers more details which may influence the false-positive rate. We have shown how our approach can handle situations where other existing tools may fail by some real-world examples.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127344472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Virtual machine anomaly detection based on partitioning detection domain","authors":"Deyuan Qin, Shuyu Chen, Hancui Zhang, Tianshu Wu","doi":"10.1109/ICSESS.2016.7883102","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883102","url":null,"abstract":"Virtual machine is an important part of cloud platform. Ensuring virtual machine running correctly is of great significance to ensure the availability of cloud service. Due to cloud platform has characteristics of the large number of virtual machines and dynamic change of running environment, it's hard to accept the cost of collecting training data for anomaly detector and training the anomaly detector. This paper focuses on insufficient training data set for anomaly detector training of virtual machine of cloud platform and high cost of detector training, and does research on how to improve anomaly detection accuracy and efficiency under the condition that there is not enough training data for anomaly detector. Concretely speaking, main research contents and highlights of this paper are described as follows: It puts forward a virtual machine detection domain partitioning strategy based on K-medoids according to the virtual machine running environment, thereby, improving the accuracy and efficiency of anomaly detection. Meanwhile, this paper optimizes the steps of clustering iteration updating, to enhance the speed of detecting area partitioning. The experiment result shows that, the improved clustering algorithm has lower time complexity, and the virtual machine anomaly detection strategy based on detection domain partitioning possesses higher accuracy and efficiency.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128780427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Measurement and modelling of the instant messenger service behavior","authors":"Ke Li, Xiao-liang Xu, Li Dong, Xiaoqin Song","doi":"10.1109/ICSESS.2016.7883184","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883184","url":null,"abstract":"Among all the applications and services currently used by the smart phone users, Instant messenger (IM) is the most actively used one, and deserves deep research of its service behavior properties. In this paper, we built an accurate traffic behavior model of the IM services, based on the huge amount of data that collected from the real smart phone users in the mobile network. Finally, an analysis and comparison of the service behavior of several typical IM applications has been provided.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"54 90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122188543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiaoliu Shen, JinSong Sang, Yangbo Sun, Ruixue Liu
{"title":"Application of improved ant colony algorithm in distribution network patrol route planning","authors":"Xiaoliu Shen, JinSong Sang, Yangbo Sun, Ruixue Liu","doi":"10.1109/ICSESS.2016.7883132","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883132","url":null,"abstract":"In order to improve the efficiency of electrical patrol, we need to develop a scientific and reasonable patrol route planning. By analyzing the electrical route patrol work content and features, we establish a patrol route planning model based VRP, and use the improved ant colony algorithm to solve this problem. For traditional ant colony algorithm, improve the algorithms from the transition probability, using of joint control with two parameters, which improves the computational efficiency of ant colony algorithm, makes up the disadvantage that traditional ant colony algorithm's training efficiency is low and easy to produce local minimum because of the parameter settings inaccurate. The experiment result shows that patrol route optimization by this method improves the scientificity and ratio nality of patrol programs as well as improves efficiency of the electrical patrol department.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122319226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Vehicle make and model recognition based on convolutional neural networks","authors":"Yongguo Ren, Shanzhen Lan","doi":"10.1109/ICSESS.2016.7883162","DOIUrl":"https://doi.org/10.1109/ICSESS.2016.7883162","url":null,"abstract":"Vehicle analysis is an important task in many intelligent applications, which involves vehicle-type classification(VTC), license-plate recognition(LPR) and vehicle make and model recognition(MMR). Among these tasks, MMR plays an important complementary role with respect to LPR. In this paper, we propose a novel framework to detect moving vehicle and MMR using convolutional neural networks. The frontal view of vehicle images first extracted and fed into convolutional neural networks for training and testing. The experimental results show that our proposed framework achieves favorable recognition accuracy 98.7% in terms of our vehicle MMR.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122847230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}