{"title":"A kind of two-level cooperation distributed scheduling strategy","authors":"Dongru Ruan, Yu Hua, Zhifeng Pang","doi":"10.1109/ICSESS.2014.6933594","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933594","url":null,"abstract":"This paper studies the two-level collaborative work architecture of resources allocation mechanism for remote collaborative distribution, researches on key technologies of two-level organization activities in real-time dynamic allocate resources, proposed a two-level collaborative scheduling algorithm to support resources co-allocation. The application showed that the system had a good serviceability.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"30 1","pages":"410-413"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77564734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research and design on Web application vulnerability scanning service","authors":"Wu Qianqian, L. Xiangjun","doi":"10.1109/ICSESS.2014.6933657","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933657","url":null,"abstract":"Web application has got a remarkable change in the past few years, many new technologies are reshaping the pattern of Web applications. Since many manufacturers' promotion on HTML5 technology, more and more websites are using HTML5 gradually. The new technology provides users with a variety of Internet applications, but introduces new security problems at the same time. Currently, most Web application scanners can not detect the security problems with HTML5 features, which make HTML5 security issues become blind spots in security vulnerability scanning process. The paper focuses on a research among the existing Web application scanners firstly. Then we selected W3af(Web Application Attack and Audit Framework) as a basic platform for transformation, and by customizing scanning modules and scripts, we designed a Web application security scanning service. The practical scan results show that it can not only detect the Clickjacking vulnerabilities brought by HTML5, but also provide efficient Web application security scanning and evaluation services for the websites.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"134 1","pages":"671-674"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80031367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on object transaction based on networked RFID systems","authors":"Xuan Shen, Chenqi Bao, Jianmin Bao, Huan Wang","doi":"10.1109/ICSESS.2014.6933660","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933660","url":null,"abstract":"Radio Frequency IDentification(RFID) is a novel technology of automated identification. The use of RFID, however, raises great concerns due to the serious security issue. In this paper, we at first propose a Secure Transaction Frame(STF) and a flow of object transaction based on networked RFID systems. Then, it is worth mentioning that the authentication technology in Secure Transaction Frame(STF) is able to verify the ownership of electric tags in order to deal with common attacks in the networked RFID system. Meanwhile, this paper presents an encryption scheme to protect the information stored in electric tags from being illegally used. After collecting relevant statistics and analyzing cases based on networked RFID systems, this paper also researches the mass requests for the information stored in the electric tags by the reader and eventually, gives a cache mechanism to solve that problem.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"7 1","pages":"683-687"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79362943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"WSN-based monitoring system for factory aquaculture","authors":"Yanhua Chen, G. Hou, J. Ou","doi":"10.1109/ICSESS.2014.6933600","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933600","url":null,"abstract":"This paper proposes a WSN-based monitoring system for factory aquaculture, which is used to monitor the parameters of water quality. This system is composed of two parts, which are a wireless sensor network and an upper computer. The solution of this system is designed by using the wireless sensor network and ZigBee technologies. The hardware architectures of nodes and related circuits are designed according to the design principles of hardware. We also show the design of software running on this system. Experiments are conducted to test the performance and the function of our proposed system, and experimental results show that our proposed monitoring system performs well for monitoring the parameters of water quality.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"9 1","pages":"439-442"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85638204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Aspect-oriented reuse mechanism for security targets and protection profiles","authors":"Y. Goto, Huilin Chen, Da Bao","doi":"10.1109/ICSESS.2014.6933536","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933536","url":null,"abstract":"Common Criteria (CC) is an international standard for evaluation and certification of IT products. Although a security target (ST) is an important and central document used in the security evaluation process of CC, creating STs is not so easy task for most of software engineers. On the other hand, there are dependency relations among several elements of an ST and a protection profile (PP). Elements of an ST/PP are elements of mandatory contents of STs/PPs defined in CC part 1, e.g., security problems, security objectives, security requirements, and so on. If there is a same element in both an ST/PP and other ST/PP, then what to describe and how to describe elements that depend on the same element are probably similar. Such same element and its dependent elements are a cross-cutting concern among the STs/PPs. Although retrieving cross-cutting concerns among certified STs and PPs are useful for creation and evaluation of STs and PPs, it is difficult, not impossible, to do that because certified STs and PPs are published as PDF files. This paper presents an aspect-oriented reuse mechanism for STs and PPs to help creation and evaluation of STs. The paper also shows technical issues and current implementation of the mechanism.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"19 1","pages":"161-164"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81144346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An adaptive RRT based on dynamic step for UAVs route planning","authors":"Na Lin, Ya-lun Zhang","doi":"10.1109/ICSESS.2014.6933760","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933760","url":null,"abstract":"Executing task in the complex environment, the traditional RRT algorithm is easy to make the tree fall into local minimum area which resulted in poor efficiency. In order to solve the problem, this paper proposes an adaptive RRT algorithm based on dynamic step for path planning and uses the cubic polynomial BSpline curve fitting to smooth the plannned path. The simulation results show that the number of explore failures reduced 35186 times, consuming time reduced 963 ms, distance reduced 33 km at the 3000th iteration by using the adaptive RRT based on dynamic step comparing to the traditional RRT algorithm.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"291 1","pages":"1111-1114"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76261507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Signal extraction and fault identification of steam turbine vibration","authors":"Junru Gao, Xin Meng, Yajun Sun","doi":"10.1109/ICSESS.2014.6933610","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933610","url":null,"abstract":"This paper, the vibration signal of steam turbine which are detected by fault diagnosis are influenced by environmental noise and detecting instrument itself, leading to vibration signal waveform distortion which contains a large number of non-stationary composition, and cannot effectively react turbine fault characteristics, and the coupling among different fault characteristics of unilateral fault features make it difficult to identify fault accurately. Aiming at solving this problem, this paper combine the axis of spectrum analysis with path analysis of vibration signal processing and recognition method, two kinds of detection method in the fault diagnosis process validation to ensure the accuracy of test results.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"22 1","pages":"481-483"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77850440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reliability analysis of power supply based on recursive algorithm","authors":"Ma Weiqing, Zhan Huiming, Kang Chaoqun, Z. Ye","doi":"10.1109/ICSESS.2014.6933574","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933574","url":null,"abstract":"Aimed at improving power supply reliability, according to the radial pattern of power supply network, reliability analysis of power supply network based on recursive algorithm is put forward in this paper. The power supply network is represented by a binary tree, and by means of recursive algorithm in a reverse order, the reliability of sub-feeders are reasonably equivalent by a line to simplify the whole power supply network. Thus, time and space of computation are saved. Finally, a case has been used to illustrate the effectiveness of the method.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"308 1","pages":"327-330"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77955222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quick search algorithms based on ethnic facial image database","authors":"BaoWei Hou, Rui Zheng, Guosheng Yang","doi":"10.1109/ICSESS.2014.6933633","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933633","url":null,"abstract":"The current popular image features index structure can be divided into tree-based structures, hash-based structures and machine learning based structures. In face recognition, selecting the appropriate image feature indexing structure to achieve large-scale face image matching has aways been a problem. In this paper, we present a global image features indexing method based on complete binary tree, using the ethnic facial image database, by contrast with the local sensitive hash(LSH), and principal component analysis (PCA) is adopted to extract facial image features for convienent. Experimental results show that the proposed method is superior to the local sensitive hashing in velocity.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"50 1","pages":"573-576"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78092576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Stereoscopic video color correction based on decorrelation color space","authors":"Chaohui Lu, J. Pan, Yaran Chen","doi":"10.1109/ICSESS.2014.6933554","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933554","url":null,"abstract":"In the production of stereoscopic video, there are some color differences between different views. In this paper, a color correction method based on decorrelation color space is proposed. Image features from the reference image and original image are first extracted by Harris algorithm, and Normalized Cross-Correlation algorithm (NCC) is used to find the corresponding match points of the images. Then the RGB color space is converted into decorrelation color space in which colors are corrected with a formula which includes mean and variance. After that, images are converted back into the RGB color space. Experiment results show that the proposed method can produce a better correction result than histogram match.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"77 1","pages":"244-247"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72864408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}