{"title":"A FANETs System for Autonomous Aerocraft Flying Formation","authors":"Jinyong Lin, Wenlong Cai, Xiangrui Fan, Wenjie Dong, Shuo Zhang","doi":"10.1109/QRS-C57518.2022.00105","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00105","url":null,"abstract":"Flying Ad-Hoc Network is the information bridge for autonomous aerocraft flying formation. This paper mainly investigates a given FANETs application system of autonomous aerocraft flying formation. At first the given FANETs system scheme and its specific characteristics have been described respectively. Also,the communication protocol stack model of five layers and its protocol stack software have been proposed. The communication terminal design and the flying test scene have been discussed. Finally, the test results show the system scheme and its communication protocol stack model are feasible.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133649142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dependability Analysis and Verification Technology of Artificial Intelligence Software","authors":"Yaming Zhang, Lijin Wu, Xiaomei Shen, Zehua Shen, Tongli Tang","doi":"10.1109/QRS-C57518.2022.00041","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00041","url":null,"abstract":"This paper focuses on the dependability analysis and verification technology of artificial intelligence software. Aiming at the dependability problems caused by the uncontrollable algorithm output of artificial intelligence software, misguided learning models and unpredictable software defects, as well as the current intelligent software testing and verification requirements, this paper analyzes the connotation and characteristics of artificial intelligence software dependability, and studies artificial intelligence software dependability mechanism and defect mode analysis method, break through artificial intelligence software dependability verification technology, innovatively build artificial intelligence software dependability index system, and finally form a comprehensive evaluation method for software dependability.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133714328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Script Based Pattern Recognition for a Portrait Tracking System on Broadcast Online Scenes","authors":"Qinyun Liu, Xiaopeng Xu","doi":"10.1109/QRS-C57518.2022.00110","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00110","url":null,"abstract":"The online broadcast scene is a novel scenario in culture and tourism industry in new period. However, the online broadcast control system has not been solved at the technical level. This research describes a collaborative smart control system for seizing actors and scenarios in broadcast online scene based on drama script with pattern recognition. Based on the script of the cultural and artistic forms under the online broadcast scenario, the training parameters of the pattern recognition algorithm are set to recognize the real-time capture of the face, dress, clothing, etc., and the tracking and overall setting control. The kernel algorithm is set with smart decision making system based for seizing actors and clustering algorithm (discrimination analysis) for seizing different scenarios on stage. Connections between equipment serving for the entire broadcasting drama and online presentations are achieved by the wireless network, software and kernel control system.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133991490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Creative Computing Approach to Optimising Citizens' Fashion Education based on Design Thinking for Responding to Micro-Level Needs of Smart City Development","authors":"Yue Wu, Xiang Li, Jiafeng Zhou","doi":"10.1109/QRS-C57518.2022.00114","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00114","url":null,"abstract":"This paper proposes a creative computing approach to introduce design thinking principles for optimising fashion design students' capabilities, thereby fulfilling the micro-level needs of smart city development. One of the most typical micro-level needs in smart cities is to optimise citizens' well-being and happiness through problem definition, solution generation and consensus-making based on quick, direct, and up-to-date data and information reflecting citizens' situations. Designers, as citizens and significant constructors of smart cities, usually dedicate themselves to optimising people's life qualities by creating products, services and artistic works based on people's needs. Therefore, the design industry usually expects practitioners to possess the capabilities of defining problems, creating concepts, gathering feedback and redesigning. These capabilities constitute the significant parts of the design thinking principles discussed and justify the importance of introducing design thinking. However, challenges still exist when introducing design thinking for instructors. The primary incentives behind these challenges are instructors' limited knowledge, making it difficult to be on the same page with students when selecting the topics, defining problems, and generating design concepts. A creative computing approach could complement instructors' knowledge to support students' topic selection and novel design generation through data collection, manipulation, and presentation. This approach consists of four modules: i) input module, ii) Topic Generation Module, iii) Topic-Design Connection Module, and iv) Supplementary Knowledge Library Module. The creative computing approach would provide a starting point for studying the possibilities of optimising the communication process between educators/instructors and students.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133064454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Code Generation Method based on Structured Tree Input and AST Decoder Attention Augmentation","authors":"Wenjun Wei, Junhua Wu","doi":"10.1109/QRS-C57518.2022.00077","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00077","url":null,"abstract":"Automatic code generation based on natural language input is important to research in the field of software engineering. In the past, it was mostly a seq2seq structure and used the RNN model. Input and output are regarded as simple sequences, and syntactic structure information in source information is often ignored. This paper proposes a code generation method Tx(Tree-Tree). It uses structured trees to replace simple word sequences so that the model can better learn the syntactic and semantic information in the source information. Therefore, it can alleviate the long dependency problem caused by too long source information. At the same time, the enhanced attention mechanism is adopted in the decoder to distinguish the influence of different historical actions on the current predicted action. The model is validated on three datasets: DJANGO, CONALA, and ATIS. Compared with some typical models, Tx(Tree-Tree) improves both accuracy and BLEU.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115316033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automated Modeling of Web Service Composition and Testing: A UML Sequence Diagram-Based Approach","authors":"Yao Huang, Bingqing Zhang, Yichen Wang","doi":"10.1109/QRS-C57518.2022.00037","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00037","url":null,"abstract":"The application of Service-Oriented Architecture (SOA) system software in safety-critical areas such as aerospace is gradually increasing, and the demand of high-quality SOA system software is increasing too. Due to the feature of loose coupling, SOA system software depends strongly on the correctness of the interfaces among services. Web service composition (WSC) testing in the integration phase of service composition thus becomes exceptionally critical. In a model-based testing framework., the test model lays a foundation for the subsequent test activities to proceed smoothly. In this paper, we propose an approach to automate modeling for WSC testing. The idea is to automate the construction of a highly visualized model by fetching adequate test information from two documents in the design phase. Compared to the existing modeling methods, the proposed method is more sufficient in WSC test information extraction. In addition, we also promote the degree of visualization and automation for test modeling. In the end, a case study is conducted to verify the effectiveness of the proposed modeling approach.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130887244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Light-Weight Convolutional Neural Network for Facial Expression Recognition using Mini-Xception Neural Networks","authors":"Changjian Li, Dongcheng Li, Man Zhao, Hui Li","doi":"10.1109/QRS-C57518.2022.00104","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00104","url":null,"abstract":"This paper builds a convolutional neural network model based on Xception; we delete the fully connected layer in the traditional convolutional neural network model and use four depthwise separable convolutions to replace the convolution layer in convolutional neural network; we use batch normalization to process the output data after each convolution operation, and use the ReLU activation function to add nonlinear factors to the output data, and finally use the SoftMax function for final result classification. Our model achieved an accuracy rate of 73% on the FER2013 dataset, which is a particular improvement compared to the original model Xception. We design and implement a facial recognition system that can be used for static images and real-time recognition, which can quickly and accurately recognize authentic facial expressions.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130089715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analyzing Metadata in PDF Files Published by Police Agencies in Japan","authors":"Taichi Hasegawa, Taiichi Saito, R. Sasaki","doi":"10.1109/QRS-C57518.2022.00029","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00029","url":null,"abstract":"In recent years, new types of cyber attacks called targeted attacks have been observed. It targets specific organizations or individuals, while usual large-scale attacks do not focus on specific targets. Organizations have published many Word or PDF files on their websites. These files may provide the starting point for targeted attacks if they include hidden data unintentionally generated in the authoring process. Adhatarao and Lauradoux analyzed hidden data found in the PDF files published by security agencies in many countries and showed that many PDF files potentially leak information like author names, details on the information system and computer architecture. In this study, we analyze hidden data of PDF files published on the website of police agencies in Japan and compare the results with Adhatarao and Lauradoux's. We gathered 110989 PDF files. 56% of gathered PDF files contain personal names, organization names, usernames, or numbers that seem to be IDs within the organizations. 96% of PDF files contain software names.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122001824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deep Reinforcement Learning for Video Summarization with Semantic Reward","authors":"Haoran Sun, Xiaolong Zhu, Conghua Zhou","doi":"10.1109/QRS-C57518.2022.00119","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00119","url":null,"abstract":"Video summarization aims to improve the efficiency of large-scale video browsing through producting concise summaries. It has been popular among many scenarios such as video surveillance, video review and data annotation. Traditional video summarization techniques focus on filtration in image features dimension or image semantics dimension. However, such techniques can make a large amount of possible useful information lost, especially for many videos with rich text semantics like interviews, teaching videos, in that only the information relevant to the image dimension will be retained. In order to solve the above problem, this paper considers video summarization as a continuous multi-dimensional decision-making process. Specifically, the summarization model predicts a probability for each frame and its corresponding text, and then we designs reward methods for each of them. Finally, comprehensive summaries in two dimensions, i.e. images and semantics, is generated. This approach is not only unsupervised and does not rely on labels and user interaction, but also decouples the semantic and image summarization models to provide more usable interfaces for subsequent engineering use.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126675077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Resilience Analysis under the Impact of Cell Failures in the Practical Telecommunication base Station Networks","authors":"Zongqi Xue, Zhenglin Liang","doi":"10.1109/QRS-C57518.2022.00131","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00131","url":null,"abstract":"With the importance of wireless telecommunication services increasing in our daily lives and society operation, the demand for reliable telecommunication networks rapidly grows. However, in contrast to the high reliability of the core telecom systems, the base stations have low redundancy and high failure rate, which lead to a bottleneck in the reliability improvement of the telecommunication network. To figure out the characteristic of the reliability of the base station network, we analyze the compensation mechanism upon the failures of the base station cell by practice data. The results show that the loss of demands caused by base station failures can be compensated by two types of resilience: intrasector resilience and inter-sector resilience. Intra-sector resilience describes the demands absorption occurred between co-sector cells in a base station. Inter-sector resilience is manifested in the demand absorption by the neighbor base stations. We observe these two types of resilience in practical cases and analyze their compensation effects. The results of this paper show that resilience widely exists in base station network and act as an important factor in ensuring the reliability of telecommunication network.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123805014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}