International Conferences on Dependable Systems and Their Applications最新文献

筛选
英文 中文
Software Defect Classification Approach Based on the Modified Latent Dirichlet Allocation Topic Model Considering the Domain Characters 基于考虑领域特征的改进潜狄利克雷分配主题模型的软件缺陷分类方法
International Conferences on Dependable Systems and Their Applications Pub Date : 1900-01-01 DOI: 10.1109/DSA51864.2020.00081
Junruo Sun, Huancheng Su, Haifeng Li, Chang Liu, Jiabin Chen, Xi Liu
{"title":"Software Defect Classification Approach Based on the Modified Latent Dirichlet Allocation Topic Model Considering the Domain Characters","authors":"Junruo Sun, Huancheng Su, Haifeng Li, Chang Liu, Jiabin Chen, Xi Liu","doi":"10.1109/DSA51864.2020.00081","DOIUrl":"https://doi.org/10.1109/DSA51864.2020.00081","url":null,"abstract":"The existing defect classification approaches do not consider the domain characters of software defects, such as aeronautics domain, astronautics domain and so on. Therefore, the precision rate and the recall rate of these defect classification approaches are not very accurate in many conditions. To resolve this problem4 we present a new defect classification approach based on the modified Latent Dirichlet Allocation (LDA for short) topic model combining with domain characters to improve the performance of the defect classification. First, we propose the defect segmentation approach based on the special domain characters. Then, we propose a modified LDA topic model combining with software requirements. Based on the proposed modified LDA model, we obtain a new defect classification approach. Finally, the experiment result shows that the precision rate and the recall rate of the defect classification are au improved up to 15%~20% compared with the existing classification models. Thus, we consider that this new classification approach is very suitable for classifying the defects with obvious domain characters.","PeriodicalId":436097,"journal":{"name":"International Conferences on Dependable Systems and Their Applications","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116680784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Embedded Virtualization Computing Platform Security Architecture Based on Trusted Computing 基于可信计算的嵌入式虚拟化计算平台安全体系结构
International Conferences on Dependable Systems and Their Applications Pub Date : 1900-01-01 DOI: 10.1109/DSA51864.2020.00043
Shuang Zhang, Xinyu Wan, Deqi Kong, Yangming Guo
{"title":"Embedded Virtualization Computing Platform Security Architecture Based on Trusted Computing","authors":"Shuang Zhang, Xinyu Wan, Deqi Kong, Yangming Guo","doi":"10.1109/DSA51864.2020.00043","DOIUrl":"https://doi.org/10.1109/DSA51864.2020.00043","url":null,"abstract":"With the application of virtualization and multi-core processor in embedded system, the computing capacity of embedded system has been improved comprehensively, but it is also faced with malicious attacks against virtualization technology. First, it was analyzed the security requirements of each layer of embedded virtualization computing platform. Aiming at the security requirements, it was proposed the security architecture of embedded virtualization computing platform based on trusted computing module. It was designed the hardware trusted root on the hardware layer, the virtualization trusted root on the virtual machine manager layer, trusted computing component and security function component on guest operation system layer. Based on the trusted roots, it was built the static extension of the trusted chain on the platform. This security architecture can improve the active security protection capability of embedded virtualization computing platform.","PeriodicalId":436097,"journal":{"name":"International Conferences on Dependable Systems and Their Applications","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126737102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Software Reliability Test Suite Generating Approach Based on Hybrid Model for Complex Equipment System 基于混合模型的复杂装备系统软件可靠性测试套件生成方法
International Conferences on Dependable Systems and Their Applications Pub Date : 1900-01-01 DOI: 10.1109/DSA.2017.32
Yin Li, Zhi-an Sun, Ting-Ting Jiang
{"title":"A Software Reliability Test Suite Generating Approach Based on Hybrid Model for Complex Equipment System","authors":"Yin Li, Zhi-an Sun, Ting-Ting Jiang","doi":"10.1109/DSA.2017.32","DOIUrl":"https://doi.org/10.1109/DSA.2017.32","url":null,"abstract":"As a large software-intensive system, the reliability of complex equipment system has a significant impact on the weapon equipment operational effectiveness and the battle field survival rate. Software testing profile is the difficult point in the software reliability testing. The existing theory of software reliability test profile can not respond to the needs of reliability test for complicated complex equipment system. In addition, it's lack of effective methods for generating test data. Hence, founded on the analysis of the software task features for complex equipment, we divide the task profile by combining Musa profile and Markov chain model based on hybrid model. Then we can get reliability test cases by combining the use cases defined by operational profile model and the Markov state transition model. As a result, the problems of huge task decomposition and multiple interactions incentive profile division for complicated complex equipment system are solved. Cases show that the generating test case framework has a good stability and there is no repeated phenomenon. What's more, this method combines the advantages of operational profile model and the Markov model. And it can be used to generate software reliability test.","PeriodicalId":436097,"journal":{"name":"International Conferences on Dependable Systems and Their Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129721039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design of a Center of Gravity Control Law with Unbalanced Fuel in Aircraft Wing Tanks 飞机机翼油箱燃油不平衡时重心控制律的设计
International Conferences on Dependable Systems and Their Applications Pub Date : 1900-01-01 DOI: 10.1109/DSA51864.2020.00036
Ying Zhao, Zhongwei Wang, Zhenghong Li, R. Xu, E. Ding
{"title":"Design of a Center of Gravity Control Law with Unbalanced Fuel in Aircraft Wing Tanks","authors":"Ying Zhao, Zhongwei Wang, Zhenghong Li, R. Xu, E. Ding","doi":"10.1109/DSA51864.2020.00036","DOIUrl":"https://doi.org/10.1109/DSA51864.2020.00036","url":null,"abstract":"Aircraft center of gravity (CG) control is important for effectively reducing trim drag and offering potential economic performance benefits. CG control is based on the fuel transfer system, which enables fuel to be transferred among various fuel tanks during flight. However, the fuel consumption of aircraft in flight may lead to the problem of unbalanced amounts of remaining fuel in the wing tanks. Aiming at this problem, this paper proposes a CG control strategy to cope with possible imbalances in fuel in aircraft wing tanks. First, a detailed description of the typical fuel system is presented. Then, the overall structure of the fuel transfer-based CG control system is given, and an aircraft CG control algorithm under the condition of unbalanced fuel in the wing tanks is proposed. Finally, simulations are carried out for the case of unbalanced fuel in the two wing tanks, and the results demonstrate the effectiveness of the proposed algorithm.","PeriodicalId":436097,"journal":{"name":"International Conferences on Dependable Systems and Their Applications","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129818892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multi-Agent Trust Evaluation Model based on Reinforcement Learning 基于强化学习的多智能体信任评估模型
International Conferences on Dependable Systems and Their Applications Pub Date : 1900-01-01 DOI: 10.1109/DSA52907.2021.00088
Haoran Jia, Yuyu Yuan, Q. Han, Pengqian Zhao, Ting Guo
{"title":"Multi-Agent Trust Evaluation Model based on Reinforcement Learning","authors":"Haoran Jia, Yuyu Yuan, Q. Han, Pengqian Zhao, Ting Guo","doi":"10.1109/DSA52907.2021.00088","DOIUrl":"https://doi.org/10.1109/DSA52907.2021.00088","url":null,"abstract":"The establishment of trust between agents is an important part of Multi-agent Reinforcement Learning (MARL). Recent studies on multi-agents have paid more attention to the game relationship between agents, ignoring trust is the basis of cooperation among agents. In this article, we propose a trust evaluation model in MARL to evaluate the trustworthiness of the target agent. The trust evaluation of the target agent is composed of direct trust and reputation. Direct trust is obtained from the historical interaction of agents. Reputation is to evaluate the impact of an agent's behavior by counterfactual action of a high-ranking agent. In addition, this paper also proposes a trust-based reward mechanism in MARL, which divides agent rewards into environmental rewards and trust rewards. Trust rewards are obtained through trust evaluation values, which drive the agents to reach a cooperative state and obtain higher long-term rewards. In this paper, we set up experiments in harvest game to verify that the trust evaluation model can effectively promote the cooperation of agents and avoid the problem of agents facing social dilemmas.","PeriodicalId":436097,"journal":{"name":"International Conferences on Dependable Systems and Their Applications","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124683952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FPGA Physical Automation Verification Technology Based on VCD Waveform 基于VCD波形的FPGA物理自动化验证技术
International Conferences on Dependable Systems and Their Applications Pub Date : 1900-01-01 DOI: 10.1109/DSA51864.2020.00050
Shou-quan Xu
{"title":"FPGA Physical Automation Verification Technology Based on VCD Waveform","authors":"Shou-quan Xu","doi":"10.1109/DSA51864.2020.00050","DOIUrl":"https://doi.org/10.1109/DSA51864.2020.00050","url":null,"abstract":"According to the shortcomings of low real-time simulation test and insufficient physical test in the process of Field-Programmable Gate Array (FPGA) software test.. FPGA physical automation verification technology based on Value Change Dump (VCD) waveform is proposed. By compressing and converting VCD waveform data into selfdefined test vectors, the problem of too large input semaphore is solved. The real-time transmission of self-defined test vectors is realized by PCI-E data bus and DMA data sharing, and the real signal injection of FPGA chip under test is completed by data-pin mapping. Finally, the result comparison is automatically completed by collecting the return signal of the FPGA chip. The verification results on the verification platform of the FPGA show that the technology can complete the physical verification of the FPGA chip on the basis of ensuring the adequacy of the test.","PeriodicalId":436097,"journal":{"name":"International Conferences on Dependable Systems and Their Applications","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122718074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Keynote Speech I The Push to Product - Strategies for Taking Your Research Into Practice 主题演讲:推动产品——将你的研究付诸实践的策略
International Conferences on Dependable Systems and Their Applications Pub Date : 1900-01-01 DOI: 10.1109/DSA51864.2020.00008
D. Shepherd
{"title":"Keynote Speech I The Push to Product - Strategies for Taking Your Research Into Practice","authors":"D. Shepherd","doi":"10.1109/DSA51864.2020.00008","DOIUrl":"https://doi.org/10.1109/DSA51864.2020.00008","url":null,"abstract":"","PeriodicalId":436097,"journal":{"name":"International Conferences on Dependable Systems and Their Applications","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127268704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multimodal Feature Fusion Recognition of Modulated Signals Based on Image and Waveform Domain 基于图像和波形域的调制信号多模态特征融合识别
International Conferences on Dependable Systems and Their Applications Pub Date : 1900-01-01 DOI: 10.1109/DSA51864.2020.00061
Changbo Hou, Guowei Liu, Lijie Hua, Yun Lin
{"title":"Multimodal Feature Fusion Recognition of Modulated Signals Based on Image and Waveform Domain","authors":"Changbo Hou, Guowei Liu, Lijie Hua, Yun Lin","doi":"10.1109/DSA51864.2020.00061","DOIUrl":"https://doi.org/10.1109/DSA51864.2020.00061","url":null,"abstract":"Communication signal modulation type recognition has a wide range of applications in electronic reconnaissance equipment such as electronic support, electronic intelligence and radar threat warning systems. The common modulation feature recognition algorithms usually only focus on one feature, ignoring the complementarity between different features. Considering the importance of feature fusion, this paper proposes a feature fusion method based on deep learning model. Extracting the image domain features and I/Q waveform domain features of the signal through suitable deep learning models, then combine the extracted features and use Kernel Principal Component Analysis (KPCA) to reduce the dimensionality of the joint features, finally obtain the classification recognition result in the classifier. Simulation experiments show that the signal recognition method based on feature fusion can have a higher recognition rate at low SNR than when only single features are considered, which can reach 93.15% at -2 dB. Keywords-Multi-signal; Signal recognition; Feature fusion; KPCA","PeriodicalId":436097,"journal":{"name":"International Conferences on Dependable Systems and Their Applications","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121445731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Architecture of Security Protection technology for Aviation Cyberspace 航空网络空间安全防护技术体系结构
International Conferences on Dependable Systems and Their Applications Pub Date : 1900-01-01 DOI: 10.1109/DSA51864.2020.00009
Zhong-Hua Wang, Jian-Feng Ma, W. Niu, Hui-Ya Li
{"title":"Architecture of Security Protection technology for Aviation Cyberspace","authors":"Zhong-Hua Wang, Jian-Feng Ma, W. Niu, Hui-Ya Li","doi":"10.1109/DSA51864.2020.00009","DOIUrl":"https://doi.org/10.1109/DSA51864.2020.00009","url":null,"abstract":"Under the systematic combat mode, aviation cyberspace is a complicated, dynamic and confrontational information space. How to evaluate network security situation efficiently and precisely will lay a solid foundation for the establishment of architecture of security protection technology. Given that the security attacks on the aviation combat field appear covert, dynamic and intellectualized in the future, in order to analyze and recognize a variety of different threats correctly and fastly, the architecture of security protection technology for aviation cyberspace is proposed in this paper. Furthermore, we give the detailed description of key technologies related to it. Consequently, based on the theories and technologies illustrated by our designed architecture, the intelligent security protection system oriented to aviation cyberspace could be implemented.","PeriodicalId":436097,"journal":{"name":"International Conferences on Dependable Systems and Their Applications","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114739349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Video Subtitle Location and Recognition Based on Edge Features 基于边缘特征的视频字幕定位与识别
International Conferences on Dependable Systems and Their Applications Pub Date : 1900-01-01 DOI: 10.1109/DSA.2019.00072
Yongjiu Liu, Chunfang Li, Changxiang Shen, Minyong Shi
{"title":"Video Subtitle Location and Recognition Based on Edge Features","authors":"Yongjiu Liu, Chunfang Li, Changxiang Shen, Minyong Shi","doi":"10.1109/DSA.2019.00072","DOIUrl":"https://doi.org/10.1109/DSA.2019.00072","url":null,"abstract":"Subtitle location and recognition technology is a special case of natural scene text recognition, but there are sorne differences between them, The subtitles in video frame have fixed position and lots of edge features. This papertakes that as a starting point, extracting edge features with Sobel operatorto locate the subtitle, adjusting color scale and taking the method of binarization to get the text image with pure background, finally obtains the text inthe frame via OCR technology.","PeriodicalId":436097,"journal":{"name":"International Conferences on Dependable Systems and Their Applications","volume":"393 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122083003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信