{"title":"Using Format Migration and Preservation Metadata to Support Digital Preservation of Scientific Data","authors":"Jiajun Xie, Min Zhang, Yongqi Ma","doi":"10.1109/ICSESS47205.2019.9040683","DOIUrl":"https://doi.org/10.1109/ICSESS47205.2019.9040683","url":null,"abstract":"With the development of e-Science and data intensive scientific discovery, it needs to ensure scientific data available for the long-term, with the goal that the valuable scientific data should be discovered and re-used for downstream investigations, either alone, or in combination with newly generated data. As such, the preservation of scientific data enables that not only might experiment be reproducible and verifiable, but also new questions can be raised by other scientists to promote research and innovation. In this paper, we focus on the two main problems of digital preservation that are format migration and preservation metadata. Format migration includes both format verification and object transformation. The system architecture of format migration and preservation metadata is presented, mapping rules of object transformation are analyzed, data fixity and integrity and authenticity, digital signature and so on are discussed and an example is shown in detail.","PeriodicalId":203944,"journal":{"name":"2019 IEEE 10th International Conference on Software Engineering and Service Science (ICSESS)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134389967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Trace Agent with Code No-invasion Based on Byte Code Enhancement Technology","authors":"Hongrun Wang, Wei Fang","doi":"10.1109/ICSESS47205.2019.9040725","DOIUrl":"https://doi.org/10.1109/ICSESS47205.2019.9040725","url":null,"abstract":"With the popularity of microservice architecture and the increasing complexity of services, how to effectively monitor application performance becomes more and more important. Under the guidance of the Dapper system of Google, many distributed tracking systems have emerged. The most essential part of the distributed tracking system is how to access the information of trace. In this paper, a trace agent based on byte code enhancement technology is presented. Then, the design of the agent and the construction of the trace logic are described in detail. The availability of agents is verified from the aspects of overhead and effectiveness under real environment. Finally, the result of experiment proves that it is convenient and effective to use the trace agent to get the information of trace from applications in Java language.","PeriodicalId":203944,"journal":{"name":"2019 IEEE 10th International Conference on Software Engineering and Service Science (ICSESS)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132980821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"[ICSESS 2019 Front Matter]","authors":"","doi":"10.1109/icsess47205.2019.9040813","DOIUrl":"https://doi.org/10.1109/icsess47205.2019.9040813","url":null,"abstract":"","PeriodicalId":203944,"journal":{"name":"2019 IEEE 10th International Conference on Software Engineering and Service Science (ICSESS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131120786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Improvement on the Authentication and Encryption of Ceph in Unreliable Environments","authors":"Kangning Dai, Bo Chen","doi":"10.1109/ICSESS47205.2019.9040836","DOIUrl":"https://doi.org/10.1109/ICSESS47205.2019.9040836","url":null,"abstract":"Although distributed systems are mostly used in internal environments, they are also inevitably exposed to some untrusted environments where some potential security problems exist. The TLS 1.3 [1], a new network security standard, was officially released in August 2018. It is of great significance for the authentication and secure transmission of public keys. At the same time, it can be used as a reference for the implementation of the bi-directional authentication between the subsystems in distributed systems. Based on the principle and thought of TLS1.3, an improvement on the authentication subsystem is proposed, taking Ceph, a distributed storage system, as an example. This paper designed an improved solution for Ceph's communication in an insecure environment.","PeriodicalId":203944,"journal":{"name":"2019 IEEE 10th International Conference on Software Engineering and Service Science (ICSESS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116972758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Unmatching Observer-based Controller Design for T-S Time-delay Systems","authors":"Zejian Zhang, Peng Li, Dawei Wang, X. Gao","doi":"10.1109/ICSESS47205.2019.9040814","DOIUrl":"https://doi.org/10.1109/ICSESS47205.2019.9040814","url":null,"abstract":"In this paper, the problem of stabilization for imperfect premise matching is studied, in which the T-S fuzzy observer model with time-delay and the fuzzy controller does not share the same membership functions. A sufficient condition for the stabilization via observer-based state feedback under imperfect premise matching is presented, and an unmatching observer-based state feedback controller is also constructed. The proposed control scheme enhances the design flexibility as the membership functions of the observer-based controller can be arbitrarily selected. A numerical example is given to illustrate the conservative of the proposed design method.","PeriodicalId":203944,"journal":{"name":"2019 IEEE 10th International Conference on Software Engineering and Service Science (ICSESS)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123735603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Murtaza, S. J. H. Pirzada, M. N. Hasan, Tongge Xu, Jianwei Liu
{"title":"Parallelized Key Expansion Algorithm for Advanced Encryption Standard","authors":"A. Murtaza, S. J. H. Pirzada, M. N. Hasan, Tongge Xu, Jianwei Liu","doi":"10.1109/ICSESS47205.2019.9040825","DOIUrl":"https://doi.org/10.1109/ICSESS47205.2019.9040825","url":null,"abstract":"Advance Encryption Standard (AES) is an algorithm widely used for encryption, authentication, authenticated encryption as well as in security protocols for providing security services in many modern-day applications. The primary reasons for the extensive use of AES are its stronger security and faster speed than its competitors. In the AES algorithm, different keys derived from the main key are used in encryption rounds, to provide strength to the security of the algorithm. However, in standard AES key expansion algorithm, the sub-keys are derived sequentially, that is one after other. This dependence on the previous sub-key has two problems. Firstly, the key generation cannot be parallelized, secondly, if any single sub-key is known to the attacker, all the other sub-keys, including master key, can be extracted. Also, Differential Power Analysis attack is known effective on standard AES key schedule. In this paper, we proposed a new key parallelized expansion algorithm for AES. The proposed algorithm removes the dependence on other sub-keys to provide faster speed and enhanced security. The proposed algorithm has been implemented in MATLAB software and on FPGA. The results of implementation validate that the computational efficiency of the proposed algorithm is superior to standard AES Key expansion.","PeriodicalId":203944,"journal":{"name":"2019 IEEE 10th International Conference on Software Engineering and Service Science (ICSESS)","volume":"463 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123052568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mao Yang, Yi Yang, Lian Li, Durong Yin, Zhigang Yang
{"title":"An Improved Interval-Valued Campbell-Bennett OCC Model Based on PSO","authors":"Mao Yang, Yi Yang, Lian Li, Durong Yin, Zhigang Yang","doi":"10.1109/ICSESS47205.2019.9040786","DOIUrl":"https://doi.org/10.1109/ICSESS47205.2019.9040786","url":null,"abstract":"This paper proposes a method for parameter optimization of the interval-valued Campbell-Bennett model proposed by Utkin and Chekh using the Particle Swarm optimization (PSO) method. Campbell-Bennett model is a OneClass Classification (OCC) model, whose dual problems can be expressed as a set of simple linear programming problems. Utkin uses the triangular kernel function approximation to replace the Gaussian kernel function in the Campbell-Bennett model, and thus obtains a finite set of simple linear optimization problems for processing interval-valued data. However, the complexity of this method is too high, making it difficult to optimize model parameters. In order to avoid this high complexity, we use a special method to optimize the model parameters with PSO and verify it with numerical experiments.","PeriodicalId":203944,"journal":{"name":"2019 IEEE 10th International Conference on Software Engineering and Service Science (ICSESS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123587825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A GAN-based Motion Blurred Image Restoration Algorithm","authors":"Jiaqi Qiu, K. Xie","doi":"10.1109/ICSESS47205.2019.9040717","DOIUrl":"https://doi.org/10.1109/ICSESS47205.2019.9040717","url":null,"abstract":"Motion blurred images have a wide application in film and television and computer visual technology. The paper, aimed at solving the restoration problems of motion blurred images, regards the mapping from dynamic blurred images to sharp images as a kind of mode mapping, and proposes a motion blurred image restoration algorithm based on GAN in combination with convolution. By learning the mode via the training of image sets, the fitting output can achieve that sharp images correspond to the blurred images. As is demonstrated by the experimental results, the image restoration effect by the algorithm is remarkable and the definition is high.","PeriodicalId":203944,"journal":{"name":"2019 IEEE 10th International Conference on Software Engineering and Service Science (ICSESS)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114957069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Jointly Temporal Pooling Networks and Multi-loss Fusion for Video-based Person Re-Identification","authors":"Huanhuan Xu, Xuemei Sun","doi":"10.1109/ICSESS47205.2019.9040764","DOIUrl":"https://doi.org/10.1109/ICSESS47205.2019.9040764","url":null,"abstract":"with the increasing demand in surveillance and camera networks, video-based person re-identification is an important task in the field of computer vision. The video contains rich samples of person's appearances, how to effectively use this information is a challenge. We propose a hierarchical network that joint temporal pooling and multi-loss fusion function to obtain the representation of videos. The network can be trained efficiently with end-to-end way. We conducted experiments on the large-scale MARS, iLIDS-VID and PRID-2011 datasets to confirm the effectiveness of our proposed method.","PeriodicalId":203944,"journal":{"name":"2019 IEEE 10th International Conference on Software Engineering and Service Science (ICSESS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128387684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Visual Analysis of Cybersecurity Situational Awareness","authors":"Yuanfa Zhang, Jingjing Zhang, Bing Zhang","doi":"10.1109/ICSESS47205.2019.9040716","DOIUrl":"https://doi.org/10.1109/ICSESS47205.2019.9040716","url":null,"abstract":"In response to the anti-terrorism needs of networks, this article visually analyzes the network topology and visualizes the network structure features. It not only displays the overall structure of the network through rich visualization methods, but also combines interactive analysis tools. Hidden structural features and connection modes of the expression network are explored, reflecting the process of network security analysts analyzing and inferring, obtaining key nodes and weak links in the network structure, identifying potential vulnerabilities and attacks, and being able to perform quick identify responses for efficient cybersecurity situational awareness.","PeriodicalId":203944,"journal":{"name":"2019 IEEE 10th International Conference on Software Engineering and Service Science (ICSESS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128490045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}