2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)最新文献

筛选
英文 中文
A FANETs System for Autonomous Aerocraft Flying Formation 自主飞行器编队飞行的FANETs系统
Jinyong Lin, Wenlong Cai, Xiangrui Fan, Wenjie Dong, Shuo Zhang
{"title":"A FANETs System for Autonomous Aerocraft Flying Formation","authors":"Jinyong Lin, Wenlong Cai, Xiangrui Fan, Wenjie Dong, Shuo Zhang","doi":"10.1109/QRS-C57518.2022.00105","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00105","url":null,"abstract":"Flying Ad-Hoc Network is the information bridge for autonomous aerocraft flying formation. This paper mainly investigates a given FANETs application system of autonomous aerocraft flying formation. At first the given FANETs system scheme and its specific characteristics have been described respectively. Also,the communication protocol stack model of five layers and its protocol stack software have been proposed. The communication terminal design and the flying test scene have been discussed. Finally, the test results show the system scheme and its communication protocol stack model are feasible.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133649142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dependability Analysis and Verification Technology of Artificial Intelligence Software 人工智能软件可靠性分析与验证技术
Yaming Zhang, Lijin Wu, Xiaomei Shen, Zehua Shen, Tongli Tang
{"title":"Dependability Analysis and Verification Technology of Artificial Intelligence Software","authors":"Yaming Zhang, Lijin Wu, Xiaomei Shen, Zehua Shen, Tongli Tang","doi":"10.1109/QRS-C57518.2022.00041","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00041","url":null,"abstract":"This paper focuses on the dependability analysis and verification technology of artificial intelligence software. Aiming at the dependability problems caused by the uncontrollable algorithm output of artificial intelligence software, misguided learning models and unpredictable software defects, as well as the current intelligent software testing and verification requirements, this paper analyzes the connotation and characteristics of artificial intelligence software dependability, and studies artificial intelligence software dependability mechanism and defect mode analysis method, break through artificial intelligence software dependability verification technology, innovatively build artificial intelligence software dependability index system, and finally form a comprehensive evaluation method for software dependability.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133714328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Script Based Pattern Recognition for a Portrait Tracking System on Broadcast Online Scenes 基于脚本的在线广播场景人像跟踪系统模式识别
Qinyun Liu, Xiaopeng Xu
{"title":"Script Based Pattern Recognition for a Portrait Tracking System on Broadcast Online Scenes","authors":"Qinyun Liu, Xiaopeng Xu","doi":"10.1109/QRS-C57518.2022.00110","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00110","url":null,"abstract":"The online broadcast scene is a novel scenario in culture and tourism industry in new period. However, the online broadcast control system has not been solved at the technical level. This research describes a collaborative smart control system for seizing actors and scenarios in broadcast online scene based on drama script with pattern recognition. Based on the script of the cultural and artistic forms under the online broadcast scenario, the training parameters of the pattern recognition algorithm are set to recognize the real-time capture of the face, dress, clothing, etc., and the tracking and overall setting control. The kernel algorithm is set with smart decision making system based for seizing actors and clustering algorithm (discrimination analysis) for seizing different scenarios on stage. Connections between equipment serving for the entire broadcasting drama and online presentations are achieved by the wireless network, software and kernel control system.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133991490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Creative Computing Approach to Optimising Citizens' Fashion Education based on Design Thinking for Responding to Micro-Level Needs of Smart City Development 基于设计思维的创新计算方法优化市民时尚教育响应智慧城市发展微观层面需求
Yue Wu, Xiang Li, Jiafeng Zhou
{"title":"A Creative Computing Approach to Optimising Citizens' Fashion Education based on Design Thinking for Responding to Micro-Level Needs of Smart City Development","authors":"Yue Wu, Xiang Li, Jiafeng Zhou","doi":"10.1109/QRS-C57518.2022.00114","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00114","url":null,"abstract":"This paper proposes a creative computing approach to introduce design thinking principles for optimising fashion design students' capabilities, thereby fulfilling the micro-level needs of smart city development. One of the most typical micro-level needs in smart cities is to optimise citizens' well-being and happiness through problem definition, solution generation and consensus-making based on quick, direct, and up-to-date data and information reflecting citizens' situations. Designers, as citizens and significant constructors of smart cities, usually dedicate themselves to optimising people's life qualities by creating products, services and artistic works based on people's needs. Therefore, the design industry usually expects practitioners to possess the capabilities of defining problems, creating concepts, gathering feedback and redesigning. These capabilities constitute the significant parts of the design thinking principles discussed and justify the importance of introducing design thinking. However, challenges still exist when introducing design thinking for instructors. The primary incentives behind these challenges are instructors' limited knowledge, making it difficult to be on the same page with students when selecting the topics, defining problems, and generating design concepts. A creative computing approach could complement instructors' knowledge to support students' topic selection and novel design generation through data collection, manipulation, and presentation. This approach consists of four modules: i) input module, ii) Topic Generation Module, iii) Topic-Design Connection Module, and iv) Supplementary Knowledge Library Module. The creative computing approach would provide a starting point for studying the possibilities of optimising the communication process between educators/instructors and students.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133064454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Code Generation Method based on Structured Tree Input and AST Decoder Attention Augmentation 基于结构化树输入和AST解码器注意力增强的代码生成方法
Wenjun Wei, Junhua Wu
{"title":"Code Generation Method based on Structured Tree Input and AST Decoder Attention Augmentation","authors":"Wenjun Wei, Junhua Wu","doi":"10.1109/QRS-C57518.2022.00077","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00077","url":null,"abstract":"Automatic code generation based on natural language input is important to research in the field of software engineering. In the past, it was mostly a seq2seq structure and used the RNN model. Input and output are regarded as simple sequences, and syntactic structure information in source information is often ignored. This paper proposes a code generation method Tx(Tree-Tree). It uses structured trees to replace simple word sequences so that the model can better learn the syntactic and semantic information in the source information. Therefore, it can alleviate the long dependency problem caused by too long source information. At the same time, the enhanced attention mechanism is adopted in the decoder to distinguish the influence of different historical actions on the current predicted action. The model is validated on three datasets: DJANGO, CONALA, and ATIS. Compared with some typical models, Tx(Tree-Tree) improves both accuracy and BLEU.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115316033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automated Modeling of Web Service Composition and Testing: A UML Sequence Diagram-Based Approach Web服务组合和测试的自动化建模:基于UML序列图的方法
Yao Huang, Bingqing Zhang, Yichen Wang
{"title":"Automated Modeling of Web Service Composition and Testing: A UML Sequence Diagram-Based Approach","authors":"Yao Huang, Bingqing Zhang, Yichen Wang","doi":"10.1109/QRS-C57518.2022.00037","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00037","url":null,"abstract":"The application of Service-Oriented Architecture (SOA) system software in safety-critical areas such as aerospace is gradually increasing, and the demand of high-quality SOA system software is increasing too. Due to the feature of loose coupling, SOA system software depends strongly on the correctness of the interfaces among services. Web service composition (WSC) testing in the integration phase of service composition thus becomes exceptionally critical. In a model-based testing framework., the test model lays a foundation for the subsequent test activities to proceed smoothly. In this paper, we propose an approach to automate modeling for WSC testing. The idea is to automate the construction of a highly visualized model by fetching adequate test information from two documents in the design phase. Compared to the existing modeling methods, the proposed method is more sufficient in WSC test information extraction. In addition, we also promote the degree of visualization and automation for test modeling. In the end, a case study is conducted to verify the effectiveness of the proposed modeling approach.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130887244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Light-Weight Convolutional Neural Network for Facial Expression Recognition using Mini-Xception Neural Networks 基于mini - exception神经网络的面部表情识别轻量级卷积神经网络
Changjian Li, Dongcheng Li, Man Zhao, Hui Li
{"title":"A Light-Weight Convolutional Neural Network for Facial Expression Recognition using Mini-Xception Neural Networks","authors":"Changjian Li, Dongcheng Li, Man Zhao, Hui Li","doi":"10.1109/QRS-C57518.2022.00104","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00104","url":null,"abstract":"This paper builds a convolutional neural network model based on Xception; we delete the fully connected layer in the traditional convolutional neural network model and use four depthwise separable convolutions to replace the convolution layer in convolutional neural network; we use batch normalization to process the output data after each convolution operation, and use the ReLU activation function to add nonlinear factors to the output data, and finally use the SoftMax function for final result classification. Our model achieved an accuracy rate of 73% on the FER2013 dataset, which is a particular improvement compared to the original model Xception. We design and implement a facial recognition system that can be used for static images and real-time recognition, which can quickly and accurately recognize authentic facial expressions.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130089715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analyzing Metadata in PDF Files Published by Police Agencies in Japan 分析日本警察机构出版的PDF文件中的元数据
Taichi Hasegawa, Taiichi Saito, R. Sasaki
{"title":"Analyzing Metadata in PDF Files Published by Police Agencies in Japan","authors":"Taichi Hasegawa, Taiichi Saito, R. Sasaki","doi":"10.1109/QRS-C57518.2022.00029","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00029","url":null,"abstract":"In recent years, new types of cyber attacks called targeted attacks have been observed. It targets specific organizations or individuals, while usual large-scale attacks do not focus on specific targets. Organizations have published many Word or PDF files on their websites. These files may provide the starting point for targeted attacks if they include hidden data unintentionally generated in the authoring process. Adhatarao and Lauradoux analyzed hidden data found in the PDF files published by security agencies in many countries and showed that many PDF files potentially leak information like author names, details on the information system and computer architecture. In this study, we analyze hidden data of PDF files published on the website of police agencies in Japan and compare the results with Adhatarao and Lauradoux's. We gathered 110989 PDF files. 56% of gathered PDF files contain personal names, organization names, usernames, or numbers that seem to be IDs within the organizations. 96% of PDF files contain software names.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122001824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Reinforcement Learning for Video Summarization with Semantic Reward 基于语义奖励的视频摘要深度强化学习
Haoran Sun, Xiaolong Zhu, Conghua Zhou
{"title":"Deep Reinforcement Learning for Video Summarization with Semantic Reward","authors":"Haoran Sun, Xiaolong Zhu, Conghua Zhou","doi":"10.1109/QRS-C57518.2022.00119","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00119","url":null,"abstract":"Video summarization aims to improve the efficiency of large-scale video browsing through producting concise summaries. It has been popular among many scenarios such as video surveillance, video review and data annotation. Traditional video summarization techniques focus on filtration in image features dimension or image semantics dimension. However, such techniques can make a large amount of possible useful information lost, especially for many videos with rich text semantics like interviews, teaching videos, in that only the information relevant to the image dimension will be retained. In order to solve the above problem, this paper considers video summarization as a continuous multi-dimensional decision-making process. Specifically, the summarization model predicts a probability for each frame and its corresponding text, and then we designs reward methods for each of them. Finally, comprehensive summaries in two dimensions, i.e. images and semantics, is generated. This approach is not only unsupervised and does not rely on labels and user interaction, but also decouples the semantic and image summarization models to provide more usable interfaces for subsequent engineering use.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126675077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resilience Analysis under the Impact of Cell Failures in the Practical Telecommunication base Station Networks 实际电信基站网络中小区故障影响下的弹性分析
Zongqi Xue, Zhenglin Liang
{"title":"Resilience Analysis under the Impact of Cell Failures in the Practical Telecommunication base Station Networks","authors":"Zongqi Xue, Zhenglin Liang","doi":"10.1109/QRS-C57518.2022.00131","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00131","url":null,"abstract":"With the importance of wireless telecommunication services increasing in our daily lives and society operation, the demand for reliable telecommunication networks rapidly grows. However, in contrast to the high reliability of the core telecom systems, the base stations have low redundancy and high failure rate, which lead to a bottleneck in the reliability improvement of the telecommunication network. To figure out the characteristic of the reliability of the base station network, we analyze the compensation mechanism upon the failures of the base station cell by practice data. The results show that the loss of demands caused by base station failures can be compensated by two types of resilience: intrasector resilience and inter-sector resilience. Intra-sector resilience describes the demands absorption occurred between co-sector cells in a base station. Inter-sector resilience is manifested in the demand absorption by the neighbor base stations. We observe these two types of resilience in practical cases and analyze their compensation effects. The results of this paper show that resilience widely exists in base station network and act as an important factor in ensuring the reliability of telecommunication network.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123805014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信