2019 6th International Conference on Dependable Systems and Their Applications (DSA)最新文献

筛选
英文 中文
Design of Embedded Vacuum Packaging System Based on Single-Chip Microcomputer Touch Screen 基于单片机触摸屏的嵌入式真空包装系统设计
Ming-fei Qu, Dan Zhao, Nan Chen
{"title":"Design of Embedded Vacuum Packaging System Based on Single-Chip Microcomputer Touch Screen","authors":"Ming-fei Qu, Dan Zhao, Nan Chen","doi":"10.1109/DSA.2019.00096","DOIUrl":"https://doi.org/10.1109/DSA.2019.00096","url":null,"abstract":"In order to improve the intelligent control ability of the embedded vacuum packaging machinery, the control system is optimized and the embedded vacuum packaging system based on the touch screen of single chip microcomputer is constructed. The system is composed of many modules and uses 51 single chip microcomputer as the digital processing chip of energy-saving control of embedded vacuum packaging machinery. Combined with the touch screen control technology of single chip microcomputer, the automatic assembly control design of the embedded vacuum packaging system is carried out, and the optimal transmission protocol of the energy-saving control system of the embedded vacuum packaging mechanical equipment is designed. In the program loading module, the instruction loading and output conversion control of the embedded vacuum packaging system are realized, and the intelligent design of the embedded vacuum packaging system is realized in the embedded integrated processor.","PeriodicalId":342719,"journal":{"name":"2019 6th International Conference on Dependable Systems and Their Applications (DSA)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130867643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Traffic Data Classification to Detect Man-in-the-Middle Attacks in Industrial Control System 基于流量数据分类的工业控制系统中间人攻击检测
Haiyan Lan, Xiaodong Zhu, Jianguo Sun, Sizhao Li
{"title":"Traffic Data Classification to Detect Man-in-the-Middle Attacks in Industrial Control System","authors":"Haiyan Lan, Xiaodong Zhu, Jianguo Sun, Sizhao Li","doi":"10.1109/DSA.2019.00067","DOIUrl":"https://doi.org/10.1109/DSA.2019.00067","url":null,"abstract":"Industrial Control Systems (ICS) are widely used in critical infrastructure in industries such as power, rail transit, and water conservancy. As the connection between the corporate network and the Internet continues to increase, the industrial control system has gradually become the target of hackers, which constantly threaten the personal safety of citizens. The Man-inthe-Middle (MITM) attack is one of the most famous attacks in the field of computer security. Once being used in the factory control network, it will not only cause data leakage, but also control the core industrial component PLC and cause serious security accidents. This paper proposes a method for classifying network traffic data in industrial control system to detect MITM attacks. In the simulation experiment, the method can identify normal and abnonnal data packets that have been tampered by the MITM, and the classification accuracy is up to 99.74%.","PeriodicalId":342719,"journal":{"name":"2019 6th International Conference on Dependable Systems and Their Applications (DSA)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126626883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Internet-Based Researcher Interest Mining 基于互联网的研究者兴趣挖掘
Song Kang, Nanchang Cheng
{"title":"Internet-Based Researcher Interest Mining","authors":"Song Kang, Nanchang Cheng","doi":"10.1109/DSA.2019.00011","DOIUrl":"https://doi.org/10.1109/DSA.2019.00011","url":null,"abstract":"In today's knowledge-based economy society, the rapid spread of a trend, personalized knowledge service has become the mainstream of development, so that the Web information users can meet the variety, high level of precision and content requirements of the high-level service form. Through analysis, we can find that the mining of researchers' interest can serve as the main learning content of personalized knowledge services. So the realization of research interest mining based on Internet is to meet the special information needs of the users, which can be called an effective method to optimize the content of personalized business. Therefore, a more effident algorithm is used to optimize the search search program for Internet information and improve the search efficiency. This optimization can become the research direction of the present age of all things in the world. The information data mining strategy to the simple to can improve the information retrieval efficiency of the network resources, and can provide the accurate, reliable summary of the Internet information resources, meet the convenience and precision of the researchers to retrieve the Internet information resources, thus can be accurate and high. The research interest mining based on the Internet includes the use of search engines to obtain the relevant information of the researchers. Through data mining and machine learning algorithms, the results information returned by the search engine are analyzed, and the research interests of the researchers are obtained from the contents of these results.","PeriodicalId":342719,"journal":{"name":"2019 6th International Conference on Dependable Systems and Their Applications (DSA)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126715293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
[Title page i] [标题页i]
{"title":"[Title page i]","authors":"","doi":"10.1109/dsa.2019.00001","DOIUrl":"https://doi.org/10.1109/dsa.2019.00001","url":null,"abstract":"","PeriodicalId":342719,"journal":{"name":"2019 6th International Conference on Dependable Systems and Their Applications (DSA)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123206821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Blockchain for Enterprise Using Hyperledger Fabric and Composer 基于Hyperledger Fabric和Composer的企业区块链研究
Dongcheng Li, W. Eric Wong, Jincui Guo
{"title":"A Survey on Blockchain for Enterprise Using Hyperledger Fabric and Composer","authors":"Dongcheng Li, W. Eric Wong, Jincui Guo","doi":"10.1109/DSA.2019.00017","DOIUrl":"https://doi.org/10.1109/DSA.2019.00017","url":null,"abstract":"The potential of blockchain technology is immense and is currently regarded as a new technological trend with a rapid growth rate. Blockchain platforms like Bitcoin are public, open, and permission-less. They are also decentralized, immutable, and append-only ledger; those ledgers can store any type of data and are shared among all the participants of the network. These platforms provide a high degree of anonymity for their users’ identity and full transparency of the activities recorded on the ledger while simultaneously ensuring data security and tamper-resistance. All nodes on the network collectively work to validate the same set of data and to achieve group consensus. Blockchain platforms like Ethereum have the ability to develop smart contracts and embed business logic. This allows the use of blockchain beyond cryptocurrency as a business management solution. Besides the issues of scalability and the expensive nature of most blockchain systems, many attributes of traditional public blockchain are not desirable in a business or enterprise context such as anonymity, full transparency, and permissionless. Permissioned blockchain platforms like Hyperledger Fabric are designed and built with enterprise and business in mind, retaining the desirable qualities of blockchain for enterprise while replacing the qualities of blockchain that are undesirable for the enterprise. In this paper, we present a comprehensive review on the Hyperledger enterprise blockchain technologies.","PeriodicalId":342719,"journal":{"name":"2019 6th International Conference on Dependable Systems and Their Applications (DSA)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126094385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
Social Network Influence Analysis 社会网络影响分析
Yuning Guo, Jianxiang Cao, Weiguo Lin
{"title":"Social Network Influence Analysis","authors":"Yuning Guo, Jianxiang Cao, Weiguo Lin","doi":"10.1109/DSA.2019.00093","DOIUrl":"https://doi.org/10.1109/DSA.2019.00093","url":null,"abstract":"Social networking platforms, such as weibo, WeChat, Twitter and Facebook etc. It have greatly changed people's daily life in the past. Compared with traditional media information dissemination, information dissemination based on social network has the characteristics of simplicity, speed and wide audience. Besides network technology, the influence of social network users is also a major factor. Under the influence, the behavior of a single user implicitly or explicitly affects the behavior of many other users, and may also affect the whole dynamic trend of social network. Therefore, social network influence analysis is one of the important contents of social network research. The this paper will expound the related concepts, mainly summarize the social network influence communication model and evaluation methods, and look into the future of social network influence analysis.","PeriodicalId":342719,"journal":{"name":"2019 6th International Conference on Dependable Systems and Their Applications (DSA)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121007811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Application of Test Method Based on State Transition Diagram in Flight Control Software 基于状态转换图的测试方法在飞控软件中的应用
Dongmei Dong, Yunyu Fang, Ying Chen
{"title":"Application of Test Method Based on State Transition Diagram in Flight Control Software","authors":"Dongmei Dong, Yunyu Fang, Ying Chen","doi":"10.1109/dsa.2019.00082","DOIUrl":"https://doi.org/10.1109/dsa.2019.00082","url":null,"abstract":"Flight control software is the nerve center of flight control system, which has strong coupling of structure and function, which greatly increases the difficulty of test case design. In this paper, Test method based on state transition diagram (STD) is adopted. By analyzing the task scheduling of flight control software, the state transition diagram is designed according to the construction rules, and test paths are extracted according to the coverage rules, so as to guide the generation of test cases. An instance shows that the method can meet the requirements of flight control software test for sufficient coverage and improve the effectiveness of software test.","PeriodicalId":342719,"journal":{"name":"2019 6th International Conference on Dependable Systems and Their Applications (DSA)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125224355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Software Requirements Change Priorities Based on Complex Networks 基于复杂网络的软件需求变更优先级分析
Junmin Ren, Xuan Zhang, Zhaoyu Pan
{"title":"Analysis of Software Requirements Change Priorities Based on Complex Networks","authors":"Junmin Ren, Xuan Zhang, Zhaoyu Pan","doi":"10.1109/DSA.2019.00039","DOIUrl":"https://doi.org/10.1109/DSA.2019.00039","url":null,"abstract":"Requirement change management is one of the most important process of software engineering. Requirements change occur frequently in open source community software projects. Because of the limited time and energy, it is important for developers of open source communities to decide which issues to be solved first. Understanding the priorities of requirement changes helps developers identify significant issues results in a better process of requirement change management, leading to a more dependable evolution of the project. In this context, a novel complex-network-based approach is proposed to analyze requirement changes with dependencies of requirements. First, the nodes of Associated Network of Requirement Change(ANRC) are issues of corresponding project, while edges are the dependencies of issues in the network. And then, corresponding weights are set according to different dependency types. The nodes in the network are later analyzed and sorted by centrality measures. In addition, temporal dimension is also considered.","PeriodicalId":342719,"journal":{"name":"2019 6th International Conference on Dependable Systems and Their Applications (DSA)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122723509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Feasible Basic Path Generation Based on Genetic Algorithm 基于遗传算法的可行基本路径生成
Chunyan Xia, Xingya Wang, Li Qiao, Yan Zhang, Baoying Ma, Chenyang Shi
{"title":"Feasible Basic Path Generation Based on Genetic Algorithm","authors":"Chunyan Xia, Xingya Wang, Li Qiao, Yan Zhang, Baoying Ma, Chenyang Shi","doi":"10.1109/DSA.2019.00054","DOIUrl":"https://doi.org/10.1109/DSA.2019.00054","url":null,"abstract":"In this paper, a feasible basic path generation method based on a genetic algorithm is proposed, which combines a probabilistic statistical method with a genetic algorithm to generate a feasible basic path. First, conditional probability relations and a maximum likelihood estimation method are used to measure the correlation among the conditional statements and determine the mutually exclusive edges in the Decision-to-Decision Graph of the program under test. Then, the feasibility of generating a path is judged by the exclusive edge relation. Finally, a genetic algorithm is used to generate the feasible basic path set of the program under test. The experimental results based on six benchmark programs and three industrial programs show that, compared with the traditional method, this method can effectively improve the coverage rate of feasible basic path generation and reduce the time cost of software testing.","PeriodicalId":342719,"journal":{"name":"2019 6th International Conference on Dependable Systems and Their Applications (DSA)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121855097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Underwater Target Detection Method Based on Pole Distribution 基于极点分布的水下目标检测方法
Jiarong Zhang, Pengpeng Hu, Kaiyang Liu, Ziqi Zhou, Xuefei Ma
{"title":"Underwater Target Detection Method Based on Pole Distribution","authors":"Jiarong Zhang, Pengpeng Hu, Kaiyang Liu, Ziqi Zhou, Xuefei Ma","doi":"10.1109/DSA.2019.00092","DOIUrl":"https://doi.org/10.1109/DSA.2019.00092","url":null,"abstract":"As pole detection is generally used in radar, this paper proposes a new method for applying pole characteristics to underwater target detection. The methods of extended Prony and matrix pencil are used to extract the poles from the simulated target transient echoes whose parameters are changed, such as different frequencies and different signal to noise ratios. The influence of the factors above on the pole is analyzed, and the exact extraction of the pole and the dependence between these parameters are obtained. The original signal is fitted by using the matrix pencil method to extract the pole.","PeriodicalId":342719,"journal":{"name":"2019 6th International Conference on Dependable Systems and Their Applications (DSA)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133303902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信