{"title":"Outlier Detection with Double-Sided Control Mechanism and Different Priority Weight Values for Network Security","authors":"Y. Dogan, G. Dalkılıç","doi":"10.1109/WCSE.2010.142","DOIUrl":"https://doi.org/10.1109/WCSE.2010.142","url":null,"abstract":"A server needs strong security systems. For this goal, a new perspective to network security is won by using data mining paradigms like outlier detection, clustering and classification. This study uses K-Nearest Neighbor (KNN) algorithm for clustering and classification. KNN algorithm needs data warehouse which impersonates user profiles to cluster. Therefore, requested time intervals and requested IPs with text mining are used for user profiles. Users in the network are clustered by calculating optimum k and threshold parameters of KNN algorithm. Finally, over these clusters, new requests are separated as outlier or normal by different threshold values with different priority weight values and average similarities with different priority weight values.","PeriodicalId":376358,"journal":{"name":"2010 Second World Congress on Software Engineering","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130158320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Realization of HHT Method to Solar Irradiance Data in MATLAB","authors":"Yong Wang, Yuanyuan Ding, Yongjian He, Qilong Miao","doi":"10.1109/WCSE.2010.120","DOIUrl":"https://doi.org/10.1109/WCSE.2010.120","url":null,"abstract":"The Hilbert-Huang transform (HHT) is a new method of analyzing non-stationary and non-linear time series data. Based on realization of HHT method in MATLAB software, we find that analytical capacity of HHT to time series in time-frequency domains stands out. The results show that (1) Solar irradiance is completely decomposed into four intrinsic mode function (IMF) components and an increasing trend by empirical mode decomposition (EMD) method, (2) it is dominated by raising-up trend for 1800-2000, (3) the Hilbert spectral analysis (HAS) method is very effective on calculation of frequencies.","PeriodicalId":376358,"journal":{"name":"2010 Second World Congress on Software Engineering","volume":"168 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124692273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research and Development of Operation Simulation System for Cryogenic Air Separation Unit","authors":"Lige Tong, L. Wang, Shufeng Sun, Yanping Zhang","doi":"10.1109/WCSE.2010.122","DOIUrl":"https://doi.org/10.1109/WCSE.2010.122","url":null,"abstract":"In this paper an integrated operating simulation system (OSS) for a cryogenic air separation unit (ASU) is developed, which can be used for operators’ training, accident and malfunction analysis and prediction of operating result. Based on the method of modularization an ASU’s components are divided by their physical function. The OSS code includes two parts: the key simulation part which is developed in FORTRAN 5.0 and generally runs in background, and control simulating part which is primary running program and developed in iFix software. The communication between the key simulation part and control part is implemented by boundary module program. The OSS can realize the following operation simulation functions: normal state operation, startup operation and compressor, expander and other machines operations. The OSS has been tested for a 20000Nm3/hr ASU in Jinan Iron and Steel Corporation and 720000Nm3/hr ASU in Bao-Shan Steel Group Corporation in China. The simulating results of the OSS agree with the simulated counterpart.","PeriodicalId":376358,"journal":{"name":"2010 Second World Congress on Software Engineering","volume":"1963 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125691975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Numerical Study on the Chemical Hazard Aiming at the Security during 2008 Beijing Olympic Games","authors":"Shun-xiang Huang, Feng Liu, Hui Li, Yuan Zuo","doi":"10.1109/WCSE.2010.76","DOIUrl":"https://doi.org/10.1109/WCSE.2010.76","url":null,"abstract":"In this study, a comprehensive system was developed to meet the demand of the Security Guarding during 2008 Beijing Olympic Games. In the system, meteorological models, namely, MM5 and RAMS6.0, and a poisonous clouds diffusion model over complex terrain (CDM) were configured in a one-way off-line nested way. In the system, MM5 runs were performed in an real-time operational way with a horizontal resolution of 3000m, which took the output from a Global scale model (T213 from the Chinese Meteorological Administration, CMA) as the initial and boundary conditions, and the output from MM5 was used to drive the RAMS6.0 runs to provide a 36-hour prediction with a horizontal resolution of 1000m. The wind and turbulent field output from RAMS6.0 was sequentially used to drive CDM runs, which can provide the prediction of the concentration field and the dose field of the chemical clouds. During 2008 Beijing Olympic Games, the system was used to provide the scenario prediction results and the security target was set as National Stadium (known as bird’s nest), and the quantitative analysis of the hazard risk was performed based on the scenario prediction results.","PeriodicalId":376358,"journal":{"name":"2010 Second World Congress on Software Engineering","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126093307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automation of Hob Design","authors":"T. Nieszporek, A. Piotrowski","doi":"10.1109/WCSE.2010.87","DOIUrl":"https://doi.org/10.1109/WCSE.2010.87","url":null,"abstract":"Hobs are used for making cylindrical gears by the hobbing method. Their construction and technology are complex, and their accuracy directly influences the accuracy of gears being machined. The developed program is intended to enhance the accuracy of execution of these tools. The application includes also the possibility of remote working by the Internet.","PeriodicalId":376358,"journal":{"name":"2010 Second World Congress on Software Engineering","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127025325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Times-Based Model for Group-centric Secure Information Sharing","authors":"Pei-Wu Li","doi":"10.1109/WCSE.2010.57","DOIUrl":"https://doi.org/10.1109/WCSE.2010.57","url":null,"abstract":"In this paper, we propose a times-based model for Group-centric Secure Information Sharing(g-SIS). The traditional approach to information sharing focuses on attaching attributes and policies to an object as it is disseminated from producer to consumers in a system. In contrast, group-centric sharing brings subjects and objects together in a group to facilitate sharing. In such contexts, authorizations are influenced by the temporal ordering of subject and object group membership. For instance, some subjects may only get future information added to the group while others may also be able to access previously added information. But g-SIS does not consider the constraint of the times that subject access to object. For example, a secure meeting room is open only at 8:00—10:00 am and 15:00—17:00 pm every Monday. And user can only join the meeting in the intervals. We develop a times-based model for group-centric information sharing that considers the times of subject accessing to object. We also discuss a usage scenario to illustrate practical application of secure subscription system.","PeriodicalId":376358,"journal":{"name":"2010 Second World Congress on Software Engineering","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133921451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research and Design of Distributed Sluice Group Joint Dispatch System Based on WCF and OPC Technology","authors":"Zhao Chengping, Ning Qian, Liang Chuan","doi":"10.1109/WCSE.2010.114","DOIUrl":"https://doi.org/10.1109/WCSE.2010.114","url":null,"abstract":"In view of the gradualness, heterogeneity as well as equipment's multiplicity of irrigation area sluice control system construction, simultaneously pay attention to the importance of software construction, this article take the OLE for Process Control (OPC) technology as the foundations, auxiliary by the Windows Communication Foundation (WCF) frame, combining irrigation area sluice dispatching system's feature, has built distributional sluice group union dispatch frame based on OPC and the WCF technology, and take the Dujianyan weir irrigation area canal headwork sluice group union dispatching system as the experiment site, has carried on the application to this frame. The result proved that this frame can realize the integration well from field apparatus level to the central management station, as well as good management to distributional systematically safe, reliable control, and the good promotion.","PeriodicalId":376358,"journal":{"name":"2010 Second World Congress on Software Engineering","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134257101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Structured User Interface Design as a Lateral Thinking Tool for User Interface Design","authors":"Leonel Vinicio Morales Díaz, Jorge Arturo Rivera Perezgil","doi":"10.1109/WCSE.2010.138","DOIUrl":"https://doi.org/10.1109/WCSE.2010.138","url":null,"abstract":"In this paper we explore and argue about the possibilities of the Structured User Interface Design SUID methodology as a Lateral Thinking tool for designing user interfaces. The structured and layered fashion of SUID has been reported to have the characteristics of educing and stimulating creativity that is present in Lateral Thinking techniques, which can help designers in user interface-related tasks. When confronted with key concepts of those techniques the methodology appears to be consistent with them and worth of using for finding new sources of innovation.","PeriodicalId":376358,"journal":{"name":"2010 Second World Congress on Software Engineering","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132643666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data Organization and Management of Image Navigation","authors":"Run-sheng Li, Shu-long Zhu, W. Meng, Wen Cao","doi":"10.1109/WCSE.2010.74","DOIUrl":"https://doi.org/10.1109/WCSE.2010.74","url":null,"abstract":"Generally, traditional maps used in navigation are vector maps. This kind of map is rather poor in visual effects, and it’s updated quite slowly, which can not satisfy users’ requirement. This paper puts forward the concept of using remote sensing Images for navigation and does some research on the most critical Image management technology. We describe a new data organization method(Time-Quad-R-Tree) which is fit for the Image navigation. The experiments show that the method can satisfy the up-to-date demand of Image navigation.","PeriodicalId":376358,"journal":{"name":"2010 Second World Congress on Software Engineering","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131868883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xie Xiaohui, Zhang Lei, Yang Guang, Y. Xiaofang, Du Ruxu
{"title":"Virtual Interventional Treatment Planning on Liver Tumor Using VTK and ITK","authors":"Xie Xiaohui, Zhang Lei, Yang Guang, Y. Xiaofang, Du Ruxu","doi":"10.1109/WCSE.2010.29","DOIUrl":"https://doi.org/10.1109/WCSE.2010.29","url":null,"abstract":"Interventional treatment becomes increasingly popular since this technique means substantially less trauma for the patient. In this paper, we focus on providing three dimensional visualization models and relative information to help doctors in diagnosis and clinic. And also it gives doctors a virtual interventional treatment planning software. It is worthy to note is the segmentation module. There are two ways of segmentation in the designed system that the first one is manual segmentation and another is semi-automatic segmentation. By using VTK and ITK to build a plan system, the treatment can be high efficiency. VTK is responsible for visualization, while the ITK take care of the image segmentation and registration.","PeriodicalId":376358,"journal":{"name":"2010 Second World Congress on Software Engineering","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133392259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}