{"title":"Modeling of real-time embedded systems using SysML and its verification using UPPAAL and DiVinE","authors":"Muhammad Abdul Basit-Ur-Rahim, F. Arif, J. Ahmad","doi":"10.1109/ICSESS.2014.6933529","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933529","url":null,"abstract":"SysML is a graphical modeling language that is more suitable for modeling of real-time and embedded systems. The application modeled in SysML must be verified in earlier phases of software development life cycle to increase the reliability and reduce the modeling and verification cost. The available tools for verification are sequential and parallel types. The sequential verification tools either fail or unable to show the significant performance to verify a large scale embedded real-time system. The limitations of sequential verification tools have increased the importance of parallel verification tools. While, DiVinE is parallel verification tool that doesn't support the timed verification of model. By keeping in view the limitations of both types of model checkers and their compatibility, we have proposed a methodology to use both types of model checkers for verification of real-time system that are graphically modeled using SysML. We demonstrate the suitability of the framework by applying it on a case study of embedded real-time system. The case study is modeled using state machine diagram of SysML and verified against specified timed properties using UPPAAL while the untimed properties are verified using DiVinE.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"31 1","pages":"132-136"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82312548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A lightweight anomaly mining algorithm in the Internet of Things","authors":"Yan-bing Liu, Qi Wu","doi":"10.1109/ICSESS.2014.6933768","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933768","url":null,"abstract":"The security of Internet of Things (IoT) has already become a thorny problem because of opening deployment and limited resources. Thus, as the essential part of intrusion detection anomaly mining gets more and more attention. However, complexity of algorithm is the vital issue due to the specialty of IoT. Meanwhile, traditional methods with Euclidean distance may cause misjudgment at some extent. So this paper proposes a lightweight anomaly mining algorithm which employ Jaccard coefficient firstly as the judging criterion instead of Euclidean distance. The experiment verifies the availability of proposed algorithm.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"23 1","pages":"1142-1145"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82828802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Specification and modeling of QoS based on AADL","authors":"Lichen Zhang","doi":"10.1109/ICSESS.2014.6933759","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933759","url":null,"abstract":"Specifying and modeling Quality of Service (QoS) properties represents a key challenge for cyber physical system development. Quality of Service (QoS) is a general term that specifies system quality and performance, as opposed to system functionality of cyber physical systems. QoS specification is concerned with capturing application level QoS requirements and management policies of cyber physical systems. Architecture Analysis and Design Language (AADL) is a textual and graphic language used to design and analyze the software and hardware architectures of embedded and realtime systems for performance-critical characteristics (e.g., end-to-end latency, schedulability, and reliability), AADL supports the representation of end-to-end flows through the concept of a flow specification This paper proposes an approach to specify and model QoS based on AADL. We present our current effort to apply and extend AADL to specify and model QoS of cyber physical systems, finally, we illustrate QoS specifying and modeling via an example of specifying and modeling Vehicular Ad-hoc NETwork (VANET).","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"4 1","pages":"1107-1110"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81579661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A semantic similarity retrieval model based on Lucene","authors":"Ya Zhou, Xinqiang Wu, Ruyi Wang","doi":"10.1109/ICSESS.2014.6933700","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933700","url":null,"abstract":"In recent years, more and more users hope the search results can meet human's demand when they use a search engine. On the basis of analysis and study on the open source Lucene system architecture, a semantic search system is designed based on the special XML data sources in this paper. What's more, we use the word item location and word semantic to improve the Lucene's search results and conduct experiments to test and verify the retrieval performance, the accuracy of similarity search, the space efficiency of index and the time-efficiency of supporting inquiry: And finally by deploying the Tomcat server to implement our implement system. The experiment results prove that compared with the original Lucene indexing system, our system can improve the indexing efficiency, query efficiency and accuracy.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"17 1","pages":"854-858"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86962779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A replicated experiment on architecture pattern recommendation based on quality requirements","authors":"Xiuhong Chen, Wenqian Zhang, Peng Liang, K. He","doi":"10.1109/ICSESS.2014.6933508","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933508","url":null,"abstract":"Applying software architecture patterns in architecture design is an important way to construct high quality design of software architecture. Meanwhile, the selection of architecture patterns has a close relationship to the quality requirements of software systems to be developed. Applying a specific architecture pattern can usually address several quality requirements, and further optimize architecture design. In this paper, we review existing recommendation methods of architecture patterns based on quality requirements, then analyze and verify the validity of a recommendation method through a replicated experiment in software engineering. The result of this work provides architects a verified method to select suitable architecture patterns based on quality requirements.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"11 1","pages":"32-36"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89678052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A design of cross-terminal web system based on JSON and REST","authors":"Zhixiang Niu, Cheng Yang, Yingya Zhang","doi":"10.1109/ICSESS.2014.6933711","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933711","url":null,"abstract":"A cross-terminal web system refers to a web system which can be accessed through various terminal platforms, including the web browsers on personal computers, the mobile applications on smart phones and so on. Traditional design of such a system usually uses XML data format and RPCful web services. There are some issues lying in this design such as the low efficiency of data exchange, the complex interfaces, and the difficulty in modifying and expanding. Therefore, it can not meet the demands of designing a cross-terminal case well. In order to solve the issues, a system design based on JSON data format and RESTful web services is presented, which has high efficiency of data exchange, simple interfaces and convenience for modification and expansion. The design also provides good support for the cross-terminal case.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"79 1","pages":"904-907"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87176497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of fuzzy cluster analysis on diagnosing the locations of the hole defects in Acer mono wood using acoustic testing","authors":"Xianjing Meng, T. Xing, Y. Xing, Hao Wang","doi":"10.1109/ICSESS.2014.6933724","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933724","url":null,"abstract":"In order to detect the locations of timber holes defect, a new method based on fuzzy clustering analysis and acoustic non-destructive testing of wood was proposed. There were three kinds of timber samples were taken in the research, and one with a hole at a certain end of it, one with a hole at the middle of it and the other one without a hole. Acoustic signals were collected with hammering method, and time-frequency feature vectors were extracted as the sample data. Cluster analysis was made on the training samples using fuzzy similar matrix based on the transitive closure, after which different classes of fuzzy patterns were created. The test samples were then identified by \"maximum membership degree\" principle. The results showed that the method was able to detect the position of hole defects in Acer mono wood effectively and accurately. The detection accuracy for samples with an end hole was 84%, for samples with a middle hole was 92% and for samples without a hole was 94%.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"5 1","pages":"958-962"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89317084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An improved recurrent neural network language model with context vector features","authors":"Jian Zhang, Dan Qu, Zhen Li","doi":"10.1109/ICSESS.2014.6933694","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933694","url":null,"abstract":"Recurrent neural network language models have solved the problems of data sparseness and dimensionality disaster which exist in traditional N-gram models. RNNLMs have recently demonstrated state-of-the-art performance in speech recognition, machine translation and other tasks. In this paper, we improve the model performance by providing contextual word vectors in association with RNNLMs. This method can reinforce the ability of learning long-distance information using vectors training from Skip-gram model. The experimental results show that the proposed method can improve the perplexity performance significantly on Penn Treebank data. And we further apply the models to speech recognition task on the Wall Street Journal corpora, where we achieve obvious improvements in word-error-rate.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"34 1","pages":"828-831"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89916388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Load adaptive congestion control and rate readjustment for wireless mesh networks","authors":"Maheen Islam, M. L. Rahman, M. Mamun-Or-Rashid","doi":"10.1109/ICSESS.2014.6933755","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933755","url":null,"abstract":"Traffic in WMNs has a wide range of variations which contributes to channel saturation and may bring up congestion due to contention caused by concurrent transmission, buffer overflows and time varying wireless channel condition. In this paper, we propose a distributed congestion control scheme for wireless mesh networks to ensure higher network throughput while avoiding congestion and maintaining inter-flow fairness. Our proposed technique handles congestion by restricting the available transmission rate of downstream nodes among the upstream nodes according to their flow demands based on their: packet arrival rate, service rate and buffer occupancy. We also introduce prioritized queues in each node to treat real time and non-real time traffic differently. Therefore, congestion degree calculation, rate allocation and traffic prioritization ensures higher network throughput and guaranteed delivery of real time traffic. Experiments conducted on ns-2 simulations demonstrate that our proposed algorithm can achieve significant improvements in both overall network throughput and inter-flow fairness for both non real time and delay bound traffic.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"27 1","pages":"1088-1092"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89839044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A general folded encoding structure for quasi-cyclic LDPC codes","authors":"Chen Qi, Guo Xuan, Y. Zhanxin","doi":"10.1109/ICSESS.2014.6933736","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933736","url":null,"abstract":"A general folded encoding structure for multi-rate quasi-cyclic LDPC codes is proposed in this paper to implement LDPC encoder with the advantages of few resources consumption, adjustable parallelism and high coding rate. For the quasi-cyclic LDPC codes mentioned in this paper, folded encoding structure can provide high coding rate and save 66% of the resources compared with the traditional encoding structure.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"34 1","pages":"1011-1014"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84439819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}