{"title":"Employee Portrait Construction based on Deep Neural Networks","authors":"Wei Zhu, Rongling Zhou","doi":"10.1109/DSA56465.2022.00026","DOIUrl":"https://doi.org/10.1109/DSA56465.2022.00026","url":null,"abstract":"Human management is critical in the enterprise. Employee portrait is a skill and method in modern human resource management and risk assignment. This paper proposes employee portraits based on a deep neural network. The employee portraits are abstracted from the labeling employee information model, such as employees' theoretical level, operational ability, exception handling level, accident analysis level, standard compliance level, and historical project level. Employee portraits can bring a particularly positive effect to the enterprise, improve the efficiency of human management, and help the enterprise's employees find more practical tasks, thereby improving the efficiency of the enterprise. In addition, we have also carried out a visual design for employee portraits so that enterprise managers can directly understand the status of employees. Finally, we demonstrate the effectiveness of the method.","PeriodicalId":208148,"journal":{"name":"2022 9th International Conference on Dependable Systems and Their Applications (DSA)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121103492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Local Matrix Stack Graph Convolutional Networks for Classification","authors":"Jian Kong, Xuehan Zhong, M. Ding","doi":"10.1109/DSA56465.2022.00100","DOIUrl":"https://doi.org/10.1109/DSA56465.2022.00100","url":null,"abstract":"In order to make full use of the spectral and spatial information of hyperspectral images, a spatial spectral joint composition method based on nuclear spectral Angle method is designed in this paper. Graph Convolutional Networks(GCN) does not use regular convolution kernels for convolution, so it can adaptively capture geometric changes of different object regions in hyperspectral images. However, for the construction of adjacency matrix and the determination of graph structure, the traditional graph convolution network method needs very high computational cost. To solve the above problems, this paper developed a Graph Convolutional Networks based on local pixel discrimination (LS-GCN), which can predict the whole image according to part of the sampled pixels and their neighborhoods, reducing the time complexity of the composition process by an order of magnitude and improving the image recognition rate to a certain extent.","PeriodicalId":208148,"journal":{"name":"2022 9th International Conference on Dependable Systems and Their Applications (DSA)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123411849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adversarial Attacks on Deep Neural Network based Modulation Recognition","authors":"Mingqian Liu, Zhenju Zhang","doi":"10.1109/DSA56465.2022.00159","DOIUrl":"https://doi.org/10.1109/DSA56465.2022.00159","url":null,"abstract":"Modulation recognition technology based on deep learning (DL) has great advantages in feature extraction and recognition. However, due to the vulnerability of deep neural network (DNN), the automatic modulation recognition model based on DNN is vulnerable to attacks. Some researchers have successfully attacked automatic modulation recognition model-s using adversarial techniques, but the resulting adversarial samples have poor attack performance on high-performance recognition models. Therefore, this paper proposes an attack method based on double loop iteration, which can update the initial conditions of each iteration with the change of the number of iterations when generating adversarial examples. Simulation results show that the proposed attack method has better attack performance than the traditional attack methods.","PeriodicalId":208148,"journal":{"name":"2022 9th International Conference on Dependable Systems and Their Applications (DSA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122081555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Jiang, Xiaokang Zhu, Wei Xue, Rangda Wu, Yu Cao
{"title":"A Novel Method to Estimate Mean Lifetime with Censoring in the Context of Reliability Improvement with Design of Experiments","authors":"R. Jiang, Xiaokang Zhu, Wei Xue, Rangda Wu, Yu Cao","doi":"10.1109/DSA56465.2022.00020","DOIUrl":"https://doi.org/10.1109/DSA56465.2022.00020","url":null,"abstract":"Design of experiments has been widely applied to improve product quality and reliability. When the objective is to improve the reliability, the response of experiments is usually a life observation, and experiment is often stopped at a pre-specified time (i.e., type-I censoring) so that the gathered life data are incomplete. In this case, the traditional methods such as the Taguchi and response surface methods cannot be applied, and some assumptions have to be made so that the data can be analyzed using those methods. A typical assumption is that a right-censored time is treated as a failure time. This assumption is obviously unrealistic. To address this issue, this paper proposes a novel method to estimate mean lifetime with censoring of a right-censored time, which is used to replace the censored time. The proposed method first sorts the data in ascending order. Then, a weighted least squares method is used to fit the ordered data to a power-law model of the order number. Finally, the fitted model is used to extrapolate the mean lifetime with censoring. Three examples are included to illustrate the appropriateness and usefulness of the proposed method.","PeriodicalId":208148,"journal":{"name":"2022 9th International Conference on Dependable Systems and Their Applications (DSA)","volume":"60 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129519243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jinfu Chen, Haibo Chen, Yiming Wu, Chengying Mao, Saihua Cai
{"title":"Adaptive Random Testing based on the Modified Metric-memory Tree and Information Entropy","authors":"Jinfu Chen, Haibo Chen, Yiming Wu, Chengying Mao, Saihua Cai","doi":"10.1109/DSA56465.2022.00088","DOIUrl":"https://doi.org/10.1109/DSA56465.2022.00088","url":null,"abstract":"Adaptive Random Testing (ART) is a series of testing techniques proposed as an enhancement to random testing (RT). ART achieves better failure-detection than RT by distributing test cases more evenly throughout the input domain. However, the process of selecting test cases leads to significant computational costs and the increase of dimension leads to the decrease of effectiveness. In this paper, we propose a new ART approach to improve the efficiency and effectiveness of Fixed-size-Candidate-set ART (FSCS-ART) by applying a modified Metric-Memory tree and distance information entropy selection strategy, namely FSCS based on the modified MM-tree and information entropy (MMIE-FSCS). Simulations and empirical studies are conducted to examine the efficiency and effectiveness of the approach. The experimental results show that the approach reduces the computational cost of FSCS-ART and improves failure-detection effectiveness.","PeriodicalId":208148,"journal":{"name":"2022 9th International Conference on Dependable Systems and Their Applications (DSA)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128546168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blocking Bugs Identification via Binary Relevance and Logistic Regression Analysis","authors":"Zhihua Chen, Xiaolin Ju, Guilong Lu, Xiang Chen","doi":"10.1109/DSA56465.2022.00052","DOIUrl":"https://doi.org/10.1109/DSA56465.2022.00052","url":null,"abstract":"Blocking bugs, a type of bugs that prevents other bugs from being fixed, significantly increase the fixed time of both themself and the blocked bugs. Thus, these blocking bugs bring a considerable negative impact on software evolution. Therefore, the timely identification of blocking bugs is essential for software maintenance. This paper proposes an approach based on Binary Relevance(BR) and Logistic Regression(LR) analysis, called BR-LR, to predict bugs' blocking and blocked labels. We first filter and build a dataset consisting of two sets with a specific type of blocking relationship based on the ideas of BR. Then, we extract several fields from the bug reports and train the model by applying the logistic regression analysis with the constructed dataset in the first step, resulting in two prediction models for bug blocked and blocking labels. Finally, our approach combines the two prediction results to identify whether the bug is blocking or blocked. We also conduct empirical studies on seven open-source projects to verify the effectiveness of our approach. The final experimental results show that our model performs better from a partially correct perspective and can accurately predict bug labels than benchmarks. Specifically, the average accuracy of our model is 54.86%, and the average F1-measure is 50.61 %.","PeriodicalId":208148,"journal":{"name":"2022 9th International Conference on Dependable Systems and Their Applications (DSA)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128994340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Spectrum Allocation Algorithm based on Improved Wolf Swarm Algorithm","authors":"Chenggang Cao, Kuixian Li","doi":"10.1109/DSA56465.2022.00143","DOIUrl":"https://doi.org/10.1109/DSA56465.2022.00143","url":null,"abstract":"In the complex and changeable electromagnetic environment, there are many frequency equipments, limited number of spectrum and low spectrum utilization. An improved wolf swarm algorithm is proposed in this paper. Firstly, aiming at the problems that the uncertainty of randomly generated solution set in the initial stage of population may lead to slow convergence speed and easy to fall into local optimization, the algorithm uses mean square deviation and back learning algorithm to improve the diversity of wolves during population initialization; Secondly, the discretization of the traditional wolf swarm is improved to further improve the optimization ability. Finally, when the wolf swarm is updated, the adaptive differential evolution algorithm is introduced to further improve the population diversity and avoid falling into the local optimal solution.","PeriodicalId":208148,"journal":{"name":"2022 9th International Conference on Dependable Systems and Their Applications (DSA)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121225131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mars Exploration Aided by Intelligent Reflecting Surface","authors":"Hongjun Zhang, Zhendong Yin, Yanlong Zhao, Zhilu Wu","doi":"10.1109/DSA56465.2022.00151","DOIUrl":"https://doi.org/10.1109/DSA56465.2022.00151","url":null,"abstract":"In deep space communication, the traditional point-to-point communication technology has reached a bottleneck and no longer meets the requirements of deep space exploration missions, and the special difficulties faced by deep space communication and the corresponding key technologies are in urgent need of a new communication mode to solve and breakthrough, so the relay mode of communication is used in the exploration mission for Mars. The communication relay system of Mars exploration mission is mainly provided by Mars orbiting relay satellite with relatively short intermittent relay communication, which makes it very difficult to quickly establish the communication link between Mars relay satellite and Mars surface probe due to the fast satellite speed and complex environmental factors such as Mars surface terrain structure. Based on the above problems, this paper applies the intelligent reflective surface as a relay between the relay satellite and the Mars surface probe to the Mars exploration mission, and the intelligent reflecting surface can change the signal direction by configuring the phase shift of each unit to form a beam precisely aligned with the probe, which can achieve the purpose of bypassing obstacles and real-time tracking of the probe by the signal beam, improve the communication performance, and make the Mars exploration communication network more perfect and efficient.","PeriodicalId":208148,"journal":{"name":"2022 9th International Conference on Dependable Systems and Their Applications (DSA)","volume":"294 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114081898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Four Rules for Converting Complex Loops to Regular Expressions","authors":"Pan Liu, Yihao Li, Shili Ai, W. Zhang","doi":"10.1109/DSA56465.2022.00160","DOIUrl":"https://doi.org/10.1109/DSA56465.2022.00160","url":null,"abstract":"It is an effective means to ensure the reliability of critical systems by simulating all possible stats during system operation. In the past, researchers used state diagrams and automata to describe the operation of the system. However, because the system execution sequence directly generated by the state diagram and automata is often incomplete, some states in the system cannot be reached. Therefore, some researches have converted state diagrams or automata into regular expressions, and then generated system execution sequences from regular expressions. However, few researchers have focused on the construction of regular expressions for complex loops. The paper presents a new method for constructing regress expressions for complex loops. We introduce four types of loops and give rules for converting these loops to regular expressions. Our research helps to construct the regular expression model of software and obtain all possible running states of the software.","PeriodicalId":208148,"journal":{"name":"2022 9th International Conference on Dependable Systems and Their Applications (DSA)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124542343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Reuse-oriented Clustering Method for Test Cases","authors":"Yaqing Shi, Song Huang, Jinyong Wan","doi":"10.1109/DSA56465.2022.00028","DOIUrl":"https://doi.org/10.1109/DSA56465.2022.00028","url":null,"abstract":"Different types of data are generated in each stage of software testing. There are a lot of test case data in the historical test asset library, including some case data with high similarity. Clustering test cases can effectively reduce the resource consumption and time cost of reusing test cases and improve the efficiency of test case recommendation. This paper proposes a reuse-oriented clustering method for test cases. Firstly, test case data of historical test projects of command-and-control system are collected, test case corpus is constructed, and word segmentation experiments are carried out using this corpus. Experimental tools are determined by comparing the experimental effects of current mainstream natural language word segmentation tools with self-defining dictionaries. Then, the keywords of test cases are extracted by keyword extraction algorithm, and the test case package is obtained by Spectral Clustering algorithm based on the test case similarity matrix and keyword similarity matrix. Finally, the validity of the proposed method is verified by experimental comparison on the constructed test case corpus.","PeriodicalId":208148,"journal":{"name":"2022 9th International Conference on Dependable Systems and Their Applications (DSA)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124059692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}