Regression testing is the process of validating modified software to provide confidence that the changed parts of the software behave as intended and that the unchanged parts have not been adversely affected by the mo...Regression testing is the process of validating modified software to provide confidence that the changed parts of the software behave as intended and that the unchanged parts have not been adversely affected by the modifications. The goal of regression testing is to reduce the test suit by testing the new characters and the modified parts of a program with the original test suit. Regression testing is a high cost testing method. This paper presents a regression testing selection technique that can reduce the test suit on the basis of Control Flow Graph (CFG). It import the inherit strategy of object-oriented language to ensure an edge’s control domain to reduce the test suit size effectively. We implement the idea by coding the edge. An algorithm is also presented at last.展开更多
For estimation group competition and multiagent coordination strategy, this paper introduces a notion based on multiagent group. According to the control domain, it analyzes the multiagent strategy during competition ...For estimation group competition and multiagent coordination strategy, this paper introduces a notion based on multiagent group. According to the control domain, it analyzes the multiagent strategy during competition in the macroscopic. It has been adopted in robot soccer and result enunciates that our method does not depend on competition result. It can objectively quantitatively estimate coordination strategy.展开更多
In order to understand the community capacity for sustainable community-based dengue prevention and control,this paper proposes the approach of a previous study about meaning and domains of dengue prevention and contr...In order to understand the community capacity for sustainable community-based dengue prevention and control,this paper proposes the approach of a previous study about meaning and domains of dengue prevention and control,an assessment tool and a community capacity building model for sustainable community-based dengue prevention and control in the Southern Thailand. A study of dengue community capacity domains was conducted by utilizing a qualitative method, whereby ten initial community domains were identified by means of a literature review,in-depth interviews of sixty community leaders,and eight focus group discussions with sixty non-leaders in four sub-districts of southern Thailand.In the final study,there were 14 identifiable domains in leaders group and 11 domains in non-leaders.The resulting dengue community capacity-assessment tool(DCCAT) consisted of two parts:one for leaders(DCCAT-L) and the other for non-leaders (DCCAT-NL).DCCAT-L was composed of 115 items within 14 domains and 83 items within 11 domains for the DCCAT-NL.The key domains of leaders and non-leaders had a partial overlap of domains such as critical situation management,personal leadership,health care provider capacity,needs assessment,senses of community,leader group networking,communication of dengue information,community leadership,religious capacity,leader group and community networking,resource mobilization,dengue working group,community participation,and continuing activities.The application of the new tool consisted of five steps:1) community preparation,2) assessment,3) a community hearing meeting,4) interventions,and 5) conclusion and improvement step.All stakeholders in the community should use the new tool based on a clear understanding of the measurement objectives,the desired outcomes,resources available and characteristics of their community.If communities need to develop and build dengue community capacity,then the designed pre-post intervention assessments or serial assessments are essential.展开更多
Access control in multi-domain environments is an important question in building coalition between domains. Based on the RBAC access control model and the concepts of secure domain, the role delegation and role mappin...Access control in multi-domain environments is an important question in building coalition between domains. Based on the RBAC access control model and the concepts of secure domain, the role delegation and role mapping are proposed, which support the third-party authorization. A distributed RBAC model is then presented. Finally implementation issues are discussed.展开更多
The secure interaction among multiple security domains is a major concern. In this paper, we highlight the issues of secure interoperability among multiple security domains operating under the widely accepted Role Bas...The secure interaction among multiple security domains is a major concern. In this paper, we highlight the issues of secure interoperability among multiple security domains operating under the widely accepted Role Based Access Control (RBAC) model. We propose a model called CRBAC that easily establishes a global policy for roles mapping among multiple security domains. Our model is based on an extension of the RBAC model. Also, multiple security domains were composed to one abstract security domain. Also roles in the multiple domains are translated to permissions of roles in the abstract security domain. These permissions keep theirs hierarchies. The roles in the abstract security domain implement roles mapping among the multiple security domains. Then, authorized users of any security domain can transparently access resources in the multiple domains.展开更多
In this paper, we consider a numerical approximation for the boundary optimal control problem with the control constraint governed by a heat equation defined in a variable domain. For this variable domain problem, the...In this paper, we consider a numerical approximation for the boundary optimal control problem with the control constraint governed by a heat equation defined in a variable domain. For this variable domain problem, the boundary of the domain is moving and the shape of theboundary is defined by a known time-dependent function. By making use of the Galerkin finite element method, we first project the original optimal control problem into a semi-discrete optimal control problem governed by a system of ordinary differential equations. Then, based on the aforementioned semi-discrete problem, we apply the control parameterization method to obtain an optimal parameter selection problem governed by a lumped parameter system, which can be solved as a nonlinear optimization problem by a Sequential Quadratic Programming (SQP) algorithm. The numerical simulation is given to illustrate the effectiveness of our numerical approximation for the variable domain problem with the finite element method and the control parameterization method.展开更多
This paper studies a stochastically forced chemostat model with feedback control in which two organisms compete for a single growth-limiting substrate. In the deterministic counterpart, previous researches show that t...This paper studies a stochastically forced chemostat model with feedback control in which two organisms compete for a single growth-limiting substrate. In the deterministic counterpart, previous researches show that the coexistence of two competing organisms may be achieved as a stable positive equilibrium or a stable positive periodic solution by different feedback schedules. In the stochastic case, based on the stochastic sensitivity function technique,we construct the confidence domains for different feedback schedules which allow us to find the configurational arrangements of the stochastic attractors and analyze the dispersion of the random states of the stochastic model.展开更多
While Role-Based Access Control Model (RBAC) is being analyzed, the concept of Role of Time-domain Based Access Control Model (T-RBAC) is put forward. With time-domain added, both time-domain and authority control rol...While Role-Based Access Control Model (RBAC) is being analyzed, the concept of Role of Time-domain Based Access Control Model (T-RBAC) is put forward. With time-domain added, both time-domain and authority control roles. The basic idea of T-RBAC is introduced and described formally, and the safely of this model is analyzed. The research shows that T-RBAC fulfills both rules of information security, which are principle of least privilege and separation of duties. With practical application of T-RBCA, it can handle most of the time-related or authority-related problems. What’s more, it also increases the security level, flexibility and dynamic adaptation of the system and has lower complexity than system only handled by authority. This model also can solve conflicts caused by authority.展开更多
基金This work was supported by Shanghai Municipal Science and Technology commission No.04ZR14105and Shanghai UniversitiesTechnology Development Foundation No.2002DZ46
文摘Regression testing is the process of validating modified software to provide confidence that the changed parts of the software behave as intended and that the unchanged parts have not been adversely affected by the modifications. The goal of regression testing is to reduce the test suit by testing the new characters and the modified parts of a program with the original test suit. Regression testing is a high cost testing method. This paper presents a regression testing selection technique that can reduce the test suit on the basis of Control Flow Graph (CFG). It import the inherit strategy of object-oriented language to ensure an edge’s control domain to reduce the test suit size effectively. We implement the idea by coding the edge. An algorithm is also presented at last.
文摘For estimation group competition and multiagent coordination strategy, this paper introduces a notion based on multiagent group. According to the control domain, it analyzes the multiagent strategy during competition in the macroscopic. It has been adopted in robot soccer and result enunciates that our method does not depend on competition result. It can objectively quantitatively estimate coordination strategy.
文摘In order to understand the community capacity for sustainable community-based dengue prevention and control,this paper proposes the approach of a previous study about meaning and domains of dengue prevention and control,an assessment tool and a community capacity building model for sustainable community-based dengue prevention and control in the Southern Thailand. A study of dengue community capacity domains was conducted by utilizing a qualitative method, whereby ten initial community domains were identified by means of a literature review,in-depth interviews of sixty community leaders,and eight focus group discussions with sixty non-leaders in four sub-districts of southern Thailand.In the final study,there were 14 identifiable domains in leaders group and 11 domains in non-leaders.The resulting dengue community capacity-assessment tool(DCCAT) consisted of two parts:one for leaders(DCCAT-L) and the other for non-leaders (DCCAT-NL).DCCAT-L was composed of 115 items within 14 domains and 83 items within 11 domains for the DCCAT-NL.The key domains of leaders and non-leaders had a partial overlap of domains such as critical situation management,personal leadership,health care provider capacity,needs assessment,senses of community,leader group networking,communication of dengue information,community leadership,religious capacity,leader group and community networking,resource mobilization,dengue working group,community participation,and continuing activities.The application of the new tool consisted of five steps:1) community preparation,2) assessment,3) a community hearing meeting,4) interventions,and 5) conclusion and improvement step.All stakeholders in the community should use the new tool based on a clear understanding of the measurement objectives,the desired outcomes,resources available and characteristics of their community.If communities need to develop and build dengue community capacity,then the designed pre-post intervention assessments or serial assessments are essential.
文摘Access control in multi-domain environments is an important question in building coalition between domains. Based on the RBAC access control model and the concepts of secure domain, the role delegation and role mapping are proposed, which support the third-party authorization. A distributed RBAC model is then presented. Finally implementation issues are discussed.
基金Supported by the National Natural Science Foun-dation of China(60403027) the Natural Science Foundation of HubeiProvince(2005ABA258) the Open Foundation of State Key Labo-ratory of Software Engineering(SKLSE05-07)
文摘The secure interaction among multiple security domains is a major concern. In this paper, we highlight the issues of secure interoperability among multiple security domains operating under the widely accepted Role Based Access Control (RBAC) model. We propose a model called CRBAC that easily establishes a global policy for roles mapping among multiple security domains. Our model is based on an extension of the RBAC model. Also, multiple security domains were composed to one abstract security domain. Also roles in the multiple domains are translated to permissions of roles in the abstract security domain. These permissions keep theirs hierarchies. The roles in the abstract security domain implement roles mapping among the multiple security domains. Then, authorized users of any security domain can transparently access resources in the multiple domains.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.61374096 and 61104048)the Natural Science Foundation of Zhejiang Province of China(Grant No.Y6110751)
文摘In this paper, we consider a numerical approximation for the boundary optimal control problem with the control constraint governed by a heat equation defined in a variable domain. For this variable domain problem, the boundary of the domain is moving and the shape of theboundary is defined by a known time-dependent function. By making use of the Galerkin finite element method, we first project the original optimal control problem into a semi-discrete optimal control problem governed by a system of ordinary differential equations. Then, based on the aforementioned semi-discrete problem, we apply the control parameterization method to obtain an optimal parameter selection problem governed by a lumped parameter system, which can be solved as a nonlinear optimization problem by a Sequential Quadratic Programming (SQP) algorithm. The numerical simulation is given to illustrate the effectiveness of our numerical approximation for the variable domain problem with the finite element method and the control parameterization method.
基金Supported by the National Natural Science Foundation of China(11671260,11801224)Natural Science Foundation of Jiangsu Province(BK20180856)
文摘This paper studies a stochastically forced chemostat model with feedback control in which two organisms compete for a single growth-limiting substrate. In the deterministic counterpart, previous researches show that the coexistence of two competing organisms may be achieved as a stable positive equilibrium or a stable positive periodic solution by different feedback schedules. In the stochastic case, based on the stochastic sensitivity function technique,we construct the confidence domains for different feedback schedules which allow us to find the configurational arrangements of the stochastic attractors and analyze the dispersion of the random states of the stochastic model.
文摘While Role-Based Access Control Model (RBAC) is being analyzed, the concept of Role of Time-domain Based Access Control Model (T-RBAC) is put forward. With time-domain added, both time-domain and authority control roles. The basic idea of T-RBAC is introduced and described formally, and the safely of this model is analyzed. The research shows that T-RBAC fulfills both rules of information security, which are principle of least privilege and separation of duties. With practical application of T-RBCA, it can handle most of the time-related or authority-related problems. What’s more, it also increases the security level, flexibility and dynamic adaptation of the system and has lower complexity than system only handled by authority. This model also can solve conflicts caused by authority.