Lu Yi, Meng Fanbo, Wang Nan, Yu Miao, Wang Junnan, Cao Wangzhang
{"title":"OpenADR protocol of the wireless transmission","authors":"Lu Yi, Meng Fanbo, Wang Nan, Yu Miao, Wang Junnan, Cao Wangzhang","doi":"10.1109/ICSESS.2015.7339235","DOIUrl":"https://doi.org/10.1109/ICSESS.2015.7339235","url":null,"abstract":"This paper mainly introduces OpenADR(Open automatic demand response) transfer agreement. At the same time, this paper will introduce a new concept of wireless transmission in this protocol. The thesis also introduces the contents of protocol, such as the transfer mechanism and interactive mode. In this article, we based on OMNeT + + software to simulate the protocol communication behavior.","PeriodicalId":335871,"journal":{"name":"2015 6th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"11 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131956635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chunyang Lu, Xiangzhe An, Guangyuan Du, Jiangfeng Cao, Zhiying Jiang
{"title":"A platform for gathering multilayer runtime data in a datacenter","authors":"Chunyang Lu, Xiangzhe An, Guangyuan Du, Jiangfeng Cao, Zhiying Jiang","doi":"10.1109/ICSESS.2015.7339094","DOIUrl":"https://doi.org/10.1109/ICSESS.2015.7339094","url":null,"abstract":"There are different kinds of datacenter monitor system, but most of them just monitor a few aspects of runtime data. Some of them just focused on temperature monitoring and power consumption. And others are focusing on application behaviors and system resources. So they can't reflect the running state of a datacenter precisely. In this paper, we introduce a platform which aims at monitoring multilayer runtime data from the underlying hardware to upper application layers. Based on these data, we evaluate the health of datacenter and provide a set of alarm mechanism.","PeriodicalId":335871,"journal":{"name":"2015 6th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121760713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A multi-level knowledge representation ontology for conceptual design","authors":"Qiantong Guo, Ling Tian, Yuanhao Wu","doi":"10.1109/ICSESS.2015.7339084","DOIUrl":"https://doi.org/10.1109/ICSESS.2015.7339084","url":null,"abstract":"Designers often have difficulty in efficiently reusing and sharing the implicit knowledge in design activities, due to the lack of powerful knowledge management systems. The approach of representation of knowledge plays a crucial role in knowledge management systems. This paper proposed a multi-level knowledge representation ontology (KRO), formalized on three levels, i.e. part level, assembly level and product level. The logical structure for design object based on KRO is discussed. The organizational modeling of the knowledge base is also proposed. Finally the modeling of design knowledge is illustrated; further semantic representations of structural components and desired functions based on the KRO are demonstrated by concrete cases.","PeriodicalId":335871,"journal":{"name":"2015 6th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121032802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhongjiang Zhang, Shiqiao Qin, Xingshu Wang, D. Zhan
{"title":"Implementation of embedded Linux based on PC/104 platform","authors":"Zhongjiang Zhang, Shiqiao Qin, Xingshu Wang, D. Zhan","doi":"10.1109/ICSESS.2015.7339238","DOIUrl":"https://doi.org/10.1109/ICSESS.2015.7339238","url":null,"abstract":"Currently, Linux operating system has become a research focus in the embedded system field, due to its unique advantages such as open-source and security. In this case, this paper provides an idea to transplant the navigation program from VxWorks system to Linux operating system. Therefore, in order to achieve the objective mentioned above, this paper focuses on the analysis of startup process of Linux and kernel based on x86 platform. Then, the key techniques will be resolved to establish a complete development environment and construct an embedded Linux operating system to meet application requirements. In this paper, the method taking advantages of Clonezilla is recommended to backup and restore the embedded Linux.","PeriodicalId":335871,"journal":{"name":"2015 6th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"213 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122825395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and implementation of a real-time data acquisition system based on IEC61870-5-104 for distribution network","authors":"Kehe Wu, Xuewei Ding, S. An, Siyuan Zheng","doi":"10.1109/ICSESS.2015.7339170","DOIUrl":"https://doi.org/10.1109/ICSESS.2015.7339170","url":null,"abstract":"This paper designs and implements a stable, high-performance and secure real-time data acquisition system for distribution network. The data acquisition system completes the data communication module which supports the standard IEC61870-5-104 protocol and improves the traditional data acquisition method of poll according to the actual environment of the distribution network to ensure the efficiency and security of data communication. And the system is based on the real time application platform (RTAP) and ensures its stable operation effectively by utilizing the real-time database and tool set that provided by RTAP. In addition, the system uses a unified data interface to facilitate the integration with the upper application for power distribution network, such as GIS, marketing system and so on.","PeriodicalId":335871,"journal":{"name":"2015 6th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115494986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Component based data and image processing systems — A conceptual and practical approach","authors":"Thomas Hoegg, C. Koehler, A. Kolb","doi":"10.1109/ICSESS.2015.7339007","DOIUrl":"https://doi.org/10.1109/ICSESS.2015.7339007","url":null,"abstract":"Setting up new data and image processing systems is an always recurring task. Since reusing algorithms and other functionality leads to higher program quality and mostly shorter development time, this approach introduces a novel Component-Based Software Engineering System (CBSE). It supports special types such as diagrams and structures, components and component-instance-diagrams known from UML. The system allows an abstract and object-oriented description of data and image processing tasks. The CBSE system is integrated into a rich client platform (RCP), supporting dynamic, plugin-based GUI-extensions, 2D/3D rendering using OpenGL and also fast data processing using OpenCL.","PeriodicalId":335871,"journal":{"name":"2015 6th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131520446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The grading method for classified protection of information system based on analytic hierarchy process and Dempster/Shafer theory","authors":"Qi An, Yongjun Shen, Guidong Zhang, Yanhua Yang","doi":"10.1109/ICSESS.2015.7339038","DOIUrl":"https://doi.org/10.1109/ICSESS.2015.7339038","url":null,"abstract":"This paper starts with the grading standard of classified protection of information system, and comes up with the grading method based on analytic hierarchy process and Dempster/Shafer theory for classified protection of information system. We proposed a multilevel evaluation index mechanism which is used to classified protection level of information system The quantitative value of each evaluation index was calculated by Dempster/Shafer theory. The integral protection security level of information system was obtained with the value of each evaluation index combining. At last, we use an example to prove it that this method can be used efficiently in the grading of classified protection.","PeriodicalId":335871,"journal":{"name":"2015 6th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125344616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Physical and cyber convergence approach to design future complex aviation cyber physical systems","authors":"Wenqin Chen, Lichen Zhang","doi":"10.1109/ICSESS.2015.7339116","DOIUrl":"https://doi.org/10.1109/ICSESS.2015.7339116","url":null,"abstract":"Aviation Cyber-Physical Systems are the integration of cyber systems and physical systems. Recent concentration to Aviation Cyber Physical Systems (ACPS) is driven by the demand for deeper Convergence of design disciplines that integrate physical and computational worlds. In this paper, we supply a new idea to support cyber-physical system design by proposing multi-dimension and multi-domain approach; we take a combination of different methodologies in a multi-formalism approach from different views. The effectiveness of the approach is illustrated by means of one practical case study: specifying and modeling Aviation Cyber-Physical Systems. We specify and model Aviation Cyber-Physical Systems with integrating Modelica and Architecture Analysis & Design Language (AADL), the physical world is modeled by Modelica, the cyber part is modeled by AADL.","PeriodicalId":335871,"journal":{"name":"2015 6th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116939088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analyzing different validation and verification techniques for safety critical software systems","authors":"Waqas Ahmad, Usman Qamar, Shoaib Hassan","doi":"10.1109/ICSESS.2015.7339076","DOIUrl":"https://doi.org/10.1109/ICSESS.2015.7339076","url":null,"abstract":"Validation and Verification are necessary in the life cycle of any safety-critical software system. It answers the question of “are we building the right product?” It's very important to be able to decide if its outputs are correct and system meets specifications, failing to do so can result in loss of human lives or huge financial loss. V&V process and its planning must start early in SDLC (Software Development Life Cycle). Both aspects are essential, If specifications are met that doesn't mean it's correct and vice versa. There are different V&V techniques available for different stages of the SDLC. In this paper I will analyze different V&V techniques available for critical software systems and will conduct a survey, which will produce results showing which techniques are best for safety-critical software systems.","PeriodicalId":335871,"journal":{"name":"2015 6th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114202063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yi Zheng, Chengcheng Sun, Chengzhang Zhu, Xv Lan, Xiang Fu, Weihong Han
{"title":"LWCS: A large-scale web page classification system based on anchor graph hashing","authors":"Yi Zheng, Chengcheng Sun, Chengzhang Zhu, Xv Lan, Xiang Fu, Weihong Han","doi":"10.1109/ICSESS.2015.7339012","DOIUrl":"https://doi.org/10.1109/ICSESS.2015.7339012","url":null,"abstract":"Nowadays, while we are enjoying the convenience brought by such a huge repository of online web information, we may come across difficulties in finding the web pages we want related to particular information we are searching for. Hence, it is essential to classify web documents to facilitate the search and retrieval of pages. Existing algorithms work well with a small quantity of web pages, whereas, they become slow and even non-effective while dealing with a large scale of web pages. Recently, some of these algorithms were adapted to distributed platforms which boosted their classification speeds effectively. However, due to high dimensions of web page features, the parallel classifiers were still trained with limited capacity training sets. In addition, these methods didn't improve the classification itself, merely boosted by high computing performance of distributed platforms. So oriented to large-scale web page classification, we propose to integrate anchor graph hashing with K-Nearest Neighbour(KNN) classifier to reduce the pages' original feature dimensions. The hash value of each page is used for training and classification instead of the original vectors. Experimental comparison with the original KNN on a large dataset demonstrates the efficacy of our proposed method.","PeriodicalId":335871,"journal":{"name":"2015 6th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"49 14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124320844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}