{"title":"ERP Low-Code Cloud Development","authors":"Long-ye Tang","doi":"10.1109/ICSESS54813.2022.9930146","DOIUrl":"https://doi.org/10.1109/ICSESS54813.2022.9930146","url":null,"abstract":"Constructing ERP business process as required has always been focused by manufacturing enterprises. Nowadays the low-code development is expected to provide an ability to develop ERP systems with high efficiency, using well-established component/service and cloud platform technologies. And nonprofessional staff who understand business can easily participate in ERP development. Any change of ERP process is always driven by that of business requirements. So, requirement-driven business process design was discussed in this paper to implement the ERP low-code development. And a framework was proposed to demonstrate the implementation of such development, in which any change of business requirement was decomposed into that of composing parts, process nodes and the involved cloud services/components.","PeriodicalId":265412,"journal":{"name":"2022 IEEE 13th International Conference on Software Engineering and Service Science (ICSESS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115116139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Method for Mining API Call Pattern Using Sample Codes","authors":"ZiHao Xia, Linhui Zhong, Chaoyi Yang, JunJie Mo, RongJing Gao, HaoRan Chen","doi":"10.1109/ICSESS54813.2022.9930263","DOIUrl":"https://doi.org/10.1109/ICSESS54813.2022.9930263","url":null,"abstract":"In the process of software development, developers usually use API to improve development efficiency and code reuse rate. API provides developers with a set of accessible services, and developers do not need to care about the internal source code of API, which greatly reduces the workload of developers. Due to the increasing scale and complexity of modern software, more and more APIs are used by developers in software. In order to solve the problem of insufficient recall rate in up miner, this paper proposes an API call pattern mining method based on examples, be miner, which collects data from some Q&A websites, such as stack Overflow, which extracts the API call sequences from some code examples, uses these API call sequences to mine the API call patterns that appear less frequently in the project, and does not produce a large number of redundant results. The experimental results show that the API call pattern mining method based on example can effectively mine the call patterns that appear less frequently in the project from the source program, and has higher recall rate and F-measure value than up-miner.","PeriodicalId":265412,"journal":{"name":"2022 IEEE 13th International Conference on Software Engineering and Service Science (ICSESS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115118069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cross-Domain Authentication Scheme for IoT Devices Based on BlockChain","authors":"Wenzheng Li, Shengnan Zhang, Zhu Chen, Liu Sen","doi":"10.1109/ICSESS54813.2022.9930157","DOIUrl":"https://doi.org/10.1109/ICSESS54813.2022.9930157","url":null,"abstract":"With the popularity of Internet of Things (IoT) technology, the scale of IoT is gradually becoming huge and demand-driven to form multi-domain IoT, and the demand for cross-domain access of devices in multi-domain scenarios has greatly increased. Secure cross-domain authentication is an important step in securing multi-domain IoT. The current cross-domain authentication architecture for IoT devices has limitations such as single point of failure, low authentication efficiency, poor scalability and other limitations. To address these problems, this paper designs a blockchain-based cross-domain authentication scheme for IoT terminals, which adopts an authentication architecture based on a combination of blockchain and edge computing technology to eliminate the problems of traditional cross-domain authentication for IoT devices and achieve distributed authentication. Considering that IoT devices have the characteristics of heterogeneity, massiveness, and limited resources, a lightweight and secure certificateless signature scheme is introduced in the cross-domain authentication process, eliminating complex certificate management and key escrow, and achieving secure and efficient cross-domain authentication of IoT terminals.","PeriodicalId":265412,"journal":{"name":"2022 IEEE 13th International Conference on Software Engineering and Service Science (ICSESS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116143585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling Data Requirements for Machine Learning Systems","authors":"Wenting Shao, Xi Wang","doi":"10.1109/ICSESS54813.2022.9930317","DOIUrl":"https://doi.org/10.1109/ICSESS54813.2022.9930317","url":null,"abstract":"As machine learning technology penetrates into various fields, how to ensure the quality of machine learning systems becomes an urgent problem. Current requirements modeling methods for machine learning systems are still in their infancy and rarely include data requirements modeling. In this paper, we propose a two-layer data requirements modeling method for machine learning systems. The bottom layer is the learning context used to describe the elements of the machine learning system and environment and relationships between them. A feature-oriented domain analysis approach is used to describe the learning context with feature models, and give the definitions, relationships and constraints of features. The upper layer is a set of property-based specifications. The definition of features and the descriptions of feature relationships provide the basis for the construction of properties. We derive a set of properties to be satisfied on the basis of the constructed learning context, and based on this we give descriptions and specifications of the data requirements for the machine learning systems. To better demonstrate the approach, we use an example of a self-driving system throughout the article.","PeriodicalId":265412,"journal":{"name":"2022 IEEE 13th International Conference on Software Engineering and Service Science (ICSESS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126797661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Construction of Knowledge Graph on Debris Flow Prevention Domain","authors":"Yuzhi Zheng, Bin Wen","doi":"10.1109/ICSESS54813.2022.9930191","DOIUrl":"https://doi.org/10.1109/ICSESS54813.2022.9930191","url":null,"abstract":"Debris flow disaster breaks out frequently and causes serious harm. Therefore, it is of great significance to construct of debris flow prevention knowledge graph to work on disaster prevention and mitigation. Aiming at the problem that the cognitive knowledge correlation in the field of debris flow disasters prevention is not strong, this paper not only proposes a method to construct a knowledge graph of debris flow disasters prevention from the data layer, technology layer, and application layer but also divides debris flow theoretical knowledge, disaster prevention strategies, debris flow disaster events and debris flow method models into four entity types and analysis correlation on the relationship between the four entity types. BiLSTM-CRF method and template matching method are used for knowledge extraction of the above four entities. The experiment result shows that 1233 debris flow entities and 2797 entity relationships are extracted. The accuracy rate of the extracted debris flow entities is about 80%. Finally, the neo4j graph database is used to store the extracted entities and relationships, and a knowledge graph of debris flow prevention for disaster prevention is constructed, which realizes the query and retrieval of debris flow prevention and control knowledge.","PeriodicalId":265412,"journal":{"name":"2022 IEEE 13th International Conference on Software Engineering and Service Science (ICSESS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116214335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Huo, Changtong Lu, Yongfeng Yang, Hong-Mei Guo, Chenggang Li, Qian Li, Xuebin Zhao, Huaiqi Li
{"title":"Quality Outlier Detection for Tobacco Based on Robust Sparse PCA: Advantages and Limitations","authors":"J. Huo, Changtong Lu, Yongfeng Yang, Hong-Mei Guo, Chenggang Li, Qian Li, Xuebin Zhao, Huaiqi Li","doi":"10.1109/ICSESS54813.2022.9930311","DOIUrl":"https://doi.org/10.1109/ICSESS54813.2022.9930311","url":null,"abstract":"Quality control is important for tobacco industry and tobacco leaf is the source material for cigarettes product. For a certain brand’s products, without known standard samples as center, it is difficult to detect outliers of unknown groups with classical PCA. Although classical PCA has been widely used in NIRS for tobacco, the accuracy of classical PCA can not satisfy the industrial requirements to correctly classify the products and identify the outliers. Therefore the robust sparse PCA (RSPCA) here is used for tobacco leaf NIR process, which has advantages over both robust PCA (RPCA) and classical PCA (CPCA) that the RSPCA can suppress the effect of outliers through sparse loadings and has robust dimension projection. Thus RSPCA brings in higher accuracy for tobacco leaf source classification and outlier detection compared to classical PCA. With Eigenvalue Decomposition Discriminant Analysis (EDDA), a Gaussian component based supervised classification method, the tobacco leaf sources from different quality levels are well classified according to the robust score distance(SD) and orthogonal distance(OD) of RSPCA. Furthermore, the principal components (PCs) based classification and SD-OD based classification are also compared between the three types of PCA, which shows the RSPCA SD-OD based classification has the best performance.","PeriodicalId":265412,"journal":{"name":"2022 IEEE 13th International Conference on Software Engineering and Service Science (ICSESS)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132540271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-class Weather Classification using EfficientNet-B4 with Attention","authors":"Anjie Yang, Teoh Teik Toe, Zihan Ran, Shuhan Xiao","doi":"10.1109/ICSESS54813.2022.9930176","DOIUrl":"https://doi.org/10.1109/ICSESS54813.2022.9930176","url":null,"abstract":"Weather classification has long been a crucial area of study for weather monitoring systems. However, it can be difficult to determine the weather from a single image because the weather is constantly changing due to a variety of factors. Despite investing a lot of time and money into manually extracting and changing the features of conventional models, researchers have had little success in achieving accuracy that is satisfactory. Recently, with the advancement of artificial intelligence in computer vision area, researchers have attempted to address the problem with new approaches, such as convolutional neural network (CNN). In this study, we built our classification model based on EfficientNet-B4, then improved the performance by adding Attention mechanism to it. In terms of accuracy and cost, our model performs better than the earlier models. Meanwhile, the model exhibits greater robustness in a variety of scenarios when using data augmentation.","PeriodicalId":265412,"journal":{"name":"2022 IEEE 13th International Conference on Software Engineering and Service Science (ICSESS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131608953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Visual Analysis of Network Topology Based on Geometric Constraints","authors":"Zhonghua Yao, Guangliang Liu, Huihua Luo","doi":"10.1109/ICSESS54813.2022.9930168","DOIUrl":"https://doi.org/10.1109/ICSESS54813.2022.9930168","url":null,"abstract":"Large-scale networks have the characteristics of complex topological structure, difficult to display internal characteristics clearly, and different temporal and spatial connection patterns, which makes analysis tasks extremely complicated. Therefore, detecting the structural characteristics of large-scale networks is an important means of cyberspace security situation awareness. However, current related research mainly studies specific analysis tasks from a micro perspective, and it is difficult to provide an overall cyberspace security situation awareness from a macro perspective.. In this paper, driven by the demand for situational awareness in the field of cyberspace security, with traffic monitoring data in network connection activities as the research object, this paper studies rendering technology of large-scale network topology, and gives the analysis methods of the macroscopic and microscopic perspectives of the cyberspace situation.","PeriodicalId":265412,"journal":{"name":"2022 IEEE 13th International Conference on Software Engineering and Service Science (ICSESS)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132149760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Inter-Service Communication among Microservices using Kafka Connect","authors":"Srijith, Karan Bantia R, Govardhan N, Anala M R","doi":"10.1109/ICSESS54813.2022.9930270","DOIUrl":"https://doi.org/10.1109/ICSESS54813.2022.9930270","url":null,"abstract":"The new age software should be highly scalable and easily maintainable. The most used architecture to ensure this is the microservice architecture. The software is composed of independent small services in microservice architecture that communicate over well-defined APIs. The communication for the asynchronous flows cannot be done by HTTP APIs which are synchronous (request-reply pattern) as it leads to high consumption of the resources which in turn leads to increase in the traffic of both the microservices. In order to tackle this problem for asynchronous nature, a message queue like Kafka, RabbitMQs are used where a publisher - subscriber model is employed. The usage of this further leads to the bottlenecks in publisher when there are more threads writing to the publisher, but publisher has fixed number of threads to write to message broker partitions. This bottleneck leads to the decrease in the performance and increase in the response time. In this paper, we present the methodology and the pipeline implementation to decrease the bottleneck and improve the time taken for publish - subscribe model for the microservices and reduce the CPU and memory usage of the containers where the microservice is running.","PeriodicalId":265412,"journal":{"name":"2022 IEEE 13th International Conference on Software Engineering and Service Science (ICSESS)","volume":"488 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124424047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Mekruksavanich, Ponnipa Jantawong, Narit Hnoohom, A. Jitpattanakul
{"title":"Refined LSTM Network for Sensor-based Human Activity Recognition in Real World Scenario","authors":"S. Mekruksavanich, Ponnipa Jantawong, Narit Hnoohom, A. Jitpattanakul","doi":"10.1109/ICSESS54813.2022.9930218","DOIUrl":"https://doi.org/10.1109/ICSESS54813.2022.9930218","url":null,"abstract":"Sensor-based identification of human actions is an essential field of study in ubiquitous computing. This aims to facilitate the assessment or understanding of current occurrences and their context based on sensor signals. Activity recognition is employed in surveillance systems, patient health monitoring, and many other systems involving the interaction between human and intelligent wearable devices, including smartphones and smartwatches. The primary objective of this study work is to identify human behavior in the actual world. We proposed an improved long short-term memory network called RLSTM that uses a squeeze-and-excitation module to efficiently identify human actions and enhance action identification systems’ interpretation. A publicly available real-world dataset known as REALWORLD16 was used to train and validate the model five times to analyze the proposed network. The proposed RLSTM achieved the highest accuracy of 98.04% and F1-score of 97.76%, as determined by several investigations.","PeriodicalId":265412,"journal":{"name":"2022 IEEE 13th International Conference on Software Engineering and Service Science (ICSESS)","volume":"129 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120871501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}