2014 IEEE 5th International Conference on Software Engineering and Service Science最新文献

筛选
英文 中文
A kind of two-level cooperation distributed scheduling strategy 一种两级协作分布式调度策略
2014 IEEE 5th International Conference on Software Engineering and Service Science Pub Date : 2014-06-27 DOI: 10.1109/ICSESS.2014.6933594
Dongru Ruan, Yu Hua, Zhifeng Pang
{"title":"A kind of two-level cooperation distributed scheduling strategy","authors":"Dongru Ruan, Yu Hua, Zhifeng Pang","doi":"10.1109/ICSESS.2014.6933594","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933594","url":null,"abstract":"This paper studies the two-level collaborative work architecture of resources allocation mechanism for remote collaborative distribution, researches on key technologies of two-level organization activities in real-time dynamic allocate resources, proposed a two-level collaborative scheduling algorithm to support resources co-allocation. The application showed that the system had a good serviceability.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"30 1","pages":"410-413"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77564734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research and design on Web application vulnerability scanning service Web应用漏洞扫描服务的研究与设计
2014 IEEE 5th International Conference on Software Engineering and Service Science Pub Date : 2014-06-27 DOI: 10.1109/ICSESS.2014.6933657
Wu Qianqian, L. Xiangjun
{"title":"Research and design on Web application vulnerability scanning service","authors":"Wu Qianqian, L. Xiangjun","doi":"10.1109/ICSESS.2014.6933657","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933657","url":null,"abstract":"Web application has got a remarkable change in the past few years, many new technologies are reshaping the pattern of Web applications. Since many manufacturers' promotion on HTML5 technology, more and more websites are using HTML5 gradually. The new technology provides users with a variety of Internet applications, but introduces new security problems at the same time. Currently, most Web application scanners can not detect the security problems with HTML5 features, which make HTML5 security issues become blind spots in security vulnerability scanning process. The paper focuses on a research among the existing Web application scanners firstly. Then we selected W3af(Web Application Attack and Audit Framework) as a basic platform for transformation, and by customizing scanning modules and scripts, we designed a Web application security scanning service. The practical scan results show that it can not only detect the Clickjacking vulnerabilities brought by HTML5, but also provide efficient Web application security scanning and evaluation services for the websites.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"134 1","pages":"671-674"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80031367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Study on object transaction based on networked RFID systems 基于网络化RFID系统的对象事务研究
2014 IEEE 5th International Conference on Software Engineering and Service Science Pub Date : 2014-06-27 DOI: 10.1109/ICSESS.2014.6933660
Xuan Shen, Chenqi Bao, Jianmin Bao, Huan Wang
{"title":"Study on object transaction based on networked RFID systems","authors":"Xuan Shen, Chenqi Bao, Jianmin Bao, Huan Wang","doi":"10.1109/ICSESS.2014.6933660","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933660","url":null,"abstract":"Radio Frequency IDentification(RFID) is a novel technology of automated identification. The use of RFID, however, raises great concerns due to the serious security issue. In this paper, we at first propose a Secure Transaction Frame(STF) and a flow of object transaction based on networked RFID systems. Then, it is worth mentioning that the authentication technology in Secure Transaction Frame(STF) is able to verify the ownership of electric tags in order to deal with common attacks in the networked RFID system. Meanwhile, this paper presents an encryption scheme to protect the information stored in electric tags from being illegally used. After collecting relevant statistics and analyzing cases based on networked RFID systems, this paper also researches the mass requests for the information stored in the electric tags by the reader and eventually, gives a cache mechanism to solve that problem.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"7 1","pages":"683-687"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79362943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
WSN-based monitoring system for factory aquaculture 基于wsn的工厂化养殖监测系统
2014 IEEE 5th International Conference on Software Engineering and Service Science Pub Date : 2014-06-27 DOI: 10.1109/ICSESS.2014.6933600
Yanhua Chen, G. Hou, J. Ou
{"title":"WSN-based monitoring system for factory aquaculture","authors":"Yanhua Chen, G. Hou, J. Ou","doi":"10.1109/ICSESS.2014.6933600","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933600","url":null,"abstract":"This paper proposes a WSN-based monitoring system for factory aquaculture, which is used to monitor the parameters of water quality. This system is composed of two parts, which are a wireless sensor network and an upper computer. The solution of this system is designed by using the wireless sensor network and ZigBee technologies. The hardware architectures of nodes and related circuits are designed according to the design principles of hardware. We also show the design of software running on this system. Experiments are conducted to test the performance and the function of our proposed system, and experimental results show that our proposed monitoring system performs well for monitoring the parameters of water quality.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"9 1","pages":"439-442"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85638204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Aspect-oriented reuse mechanism for security targets and protection profiles 安全目标和保护概要文件的面向方面的重用机制
2014 IEEE 5th International Conference on Software Engineering and Service Science Pub Date : 2014-06-27 DOI: 10.1109/ICSESS.2014.6933536
Y. Goto, Huilin Chen, Da Bao
{"title":"Aspect-oriented reuse mechanism for security targets and protection profiles","authors":"Y. Goto, Huilin Chen, Da Bao","doi":"10.1109/ICSESS.2014.6933536","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933536","url":null,"abstract":"Common Criteria (CC) is an international standard for evaluation and certification of IT products. Although a security target (ST) is an important and central document used in the security evaluation process of CC, creating STs is not so easy task for most of software engineers. On the other hand, there are dependency relations among several elements of an ST and a protection profile (PP). Elements of an ST/PP are elements of mandatory contents of STs/PPs defined in CC part 1, e.g., security problems, security objectives, security requirements, and so on. If there is a same element in both an ST/PP and other ST/PP, then what to describe and how to describe elements that depend on the same element are probably similar. Such same element and its dependent elements are a cross-cutting concern among the STs/PPs. Although retrieving cross-cutting concerns among certified STs and PPs are useful for creation and evaluation of STs and PPs, it is difficult, not impossible, to do that because certified STs and PPs are published as PDF files. This paper presents an aspect-oriented reuse mechanism for STs and PPs to help creation and evaluation of STs. The paper also shows technical issues and current implementation of the mechanism.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"19 1","pages":"161-164"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81144346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An adaptive RRT based on dynamic step for UAVs route planning 基于动态步长的自适应RRT无人机航路规划
2014 IEEE 5th International Conference on Software Engineering and Service Science Pub Date : 2014-06-27 DOI: 10.1109/ICSESS.2014.6933760
Na Lin, Ya-lun Zhang
{"title":"An adaptive RRT based on dynamic step for UAVs route planning","authors":"Na Lin, Ya-lun Zhang","doi":"10.1109/ICSESS.2014.6933760","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933760","url":null,"abstract":"Executing task in the complex environment, the traditional RRT algorithm is easy to make the tree fall into local minimum area which resulted in poor efficiency. In order to solve the problem, this paper proposes an adaptive RRT algorithm based on dynamic step for path planning and uses the cubic polynomial BSpline curve fitting to smooth the plannned path. The simulation results show that the number of explore failures reduced 35186 times, consuming time reduced 963 ms, distance reduced 33 km at the 3000th iteration by using the adaptive RRT based on dynamic step comparing to the traditional RRT algorithm.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"291 1","pages":"1111-1114"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76261507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Signal extraction and fault identification of steam turbine vibration 汽轮机振动信号提取与故障识别
2014 IEEE 5th International Conference on Software Engineering and Service Science Pub Date : 2014-06-27 DOI: 10.1109/ICSESS.2014.6933610
Junru Gao, Xin Meng, Yajun Sun
{"title":"Signal extraction and fault identification of steam turbine vibration","authors":"Junru Gao, Xin Meng, Yajun Sun","doi":"10.1109/ICSESS.2014.6933610","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933610","url":null,"abstract":"This paper, the vibration signal of steam turbine which are detected by fault diagnosis are influenced by environmental noise and detecting instrument itself, leading to vibration signal waveform distortion which contains a large number of non-stationary composition, and cannot effectively react turbine fault characteristics, and the coupling among different fault characteristics of unilateral fault features make it difficult to identify fault accurately. Aiming at solving this problem, this paper combine the axis of spectrum analysis with path analysis of vibration signal processing and recognition method, two kinds of detection method in the fault diagnosis process validation to ensure the accuracy of test results.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"22 1","pages":"481-483"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77850440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Reliability analysis of power supply based on recursive algorithm 基于递归算法的电源可靠性分析
2014 IEEE 5th International Conference on Software Engineering and Service Science Pub Date : 2014-06-27 DOI: 10.1109/ICSESS.2014.6933574
Ma Weiqing, Zhan Huiming, Kang Chaoqun, Z. Ye
{"title":"Reliability analysis of power supply based on recursive algorithm","authors":"Ma Weiqing, Zhan Huiming, Kang Chaoqun, Z. Ye","doi":"10.1109/ICSESS.2014.6933574","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933574","url":null,"abstract":"Aimed at improving power supply reliability, according to the radial pattern of power supply network, reliability analysis of power supply network based on recursive algorithm is put forward in this paper. The power supply network is represented by a binary tree, and by means of recursive algorithm in a reverse order, the reliability of sub-feeders are reasonably equivalent by a line to simplify the whole power supply network. Thus, time and space of computation are saved. Finally, a case has been used to illustrate the effectiveness of the method.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"308 1","pages":"327-330"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77955222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Quick search algorithms based on ethnic facial image database 基于民族人脸图像数据库的快速搜索算法
2014 IEEE 5th International Conference on Software Engineering and Service Science Pub Date : 2014-06-27 DOI: 10.1109/ICSESS.2014.6933633
BaoWei Hou, Rui Zheng, Guosheng Yang
{"title":"Quick search algorithms based on ethnic facial image database","authors":"BaoWei Hou, Rui Zheng, Guosheng Yang","doi":"10.1109/ICSESS.2014.6933633","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933633","url":null,"abstract":"The current popular image features index structure can be divided into tree-based structures, hash-based structures and machine learning based structures. In face recognition, selecting the appropriate image feature indexing structure to achieve large-scale face image matching has aways been a problem. In this paper, we present a global image features indexing method based on complete binary tree, using the ethnic facial image database, by contrast with the local sensitive hash(LSH), and principal component analysis (PCA) is adopted to extract facial image features for convienent. Experimental results show that the proposed method is superior to the local sensitive hashing in velocity.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"50 1","pages":"573-576"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78092576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Stereoscopic video color correction based on decorrelation color space 基于去相关色彩空间的立体视频色彩校正
2014 IEEE 5th International Conference on Software Engineering and Service Science Pub Date : 2014-06-27 DOI: 10.1109/ICSESS.2014.6933554
Chaohui Lu, J. Pan, Yaran Chen
{"title":"Stereoscopic video color correction based on decorrelation color space","authors":"Chaohui Lu, J. Pan, Yaran Chen","doi":"10.1109/ICSESS.2014.6933554","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933554","url":null,"abstract":"In the production of stereoscopic video, there are some color differences between different views. In this paper, a color correction method based on decorrelation color space is proposed. Image features from the reference image and original image are first extracted by Harris algorithm, and Normalized Cross-Correlation algorithm (NCC) is used to find the corresponding match points of the images. Then the RGB color space is converted into decorrelation color space in which colors are corrected with a formula which includes mean and variance. After that, images are converted back into the RGB color space. Experiment results show that the proposed method can produce a better correction result than histogram match.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"77 1","pages":"244-247"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72864408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信