Tik-Tok is a famous entertainment and art creation app that is used all around the world,which enables everyone to make short video clip ranging from 30 seconds to 1 minute and which is published and shared with famil...Tik-Tok is a famous entertainment and art creation app that is used all around the world,which enables everyone to make short video clip ranging from 30 seconds to 1 minute and which is published and shared with family,friends,and public.This app is downloaded about 1.5 billion times with 800 million users all around the world,Tik-Tok users from China,India,USA,Russia,and Turkey are at the top.This paper explores the usage of Tik-Tok under the pandemic COVID-19 and how does it impact on personal,academic,and social life of youngsters and teenagers in Turkey.We collected primary data by using questionnaires from four big provinces:Istanbul,Ankara,Izmir,and Antalya(mainly top tourist provinces),500 samples were collected by using convenience sampling method,data collected in between 1 April 2021 to 2 May 2021,data analyzed by Multiple ANOVA,three times simple regression was used to explore the impact of Tik-Tok on personal,academic,and social life separately,furthermore correlation test was also applied to show strength among variables.Results indicate statistical significance(p<0.01)which supports the hypotheses.展开更多
As an innovative software application mode,Software as a service(SaaS) shows many attractive advantages.Migrating legacy system to SaaS can make outdated systems revived.In the process of migration,the existing valuab...As an innovative software application mode,Software as a service(SaaS) shows many attractive advantages.Migrating legacy system to SaaS can make outdated systems revived.In the process of migration,the existing valuable components need to be discovered and reused in order that the target system could be developed/integrated more efficiently.An innovative approach is proposed in this paper to extract the reusable components from legacy systems.Firstly,implementation models of legacy system are recovered through reverse engineering.Secondly,function models are derived by vertical clustering,and then logical components are discovered by horizontal clustering based on the function models.Finally,the reusable components with specific feature descriptions are extracted.Through experimental verification,the approach is considered to be efficient in reusable component discovery and to be helpful to migrating legacy system to SaaS.展开更多
With the rapidly escalating use of smart devices and fraudulent transaction of users' data from their devices, efficient and reliable techniques for authentication of the smart devices have become an obligatory issue...With the rapidly escalating use of smart devices and fraudulent transaction of users' data from their devices, efficient and reliable techniques for authentication of the smart devices have become an obligatory issue. This paper reviews the security risks for mobile devices and studies several authentication techniques available for smart devices. The results from field studies enable a comparative evaluation of user-preferred authentication mechanisms and their opinions about reliability, biometric authentication and visual authentication techniques.展开更多
One of the challenging tasks in cognitive radio(CR) networks is to agree on a common control channel to exchange control information. This paper presents a novel medium access control(MAC) protocol for CR network whic...One of the challenging tasks in cognitive radio(CR) networks is to agree on a common control channel to exchange control information. This paper presents a novel medium access control(MAC) protocol for CR network which efficiently and intelligently establishes a common control channel between CR nodes. The proposed protocol is the first CR MAC protocol which is hybrid in nature and lies between global common control channel(GCCC) and non-GCCC family of MAC protocols. The dynamic nature of the protocol makes the CR nodes converge on a newly found control channel quicker whenever the interference from a licensed user is sensed. The analytical results show that the dynamic, hybrid and adaptive nature of proposed protocol yields higher throughputs when compared with other CR MAC protocols.展开更多
In software engineering, a scenario describes an anticipated usage of a software system. As scenarios are useful to understand the requirements and functionalities of a software system, the scenario-based analysis is ...In software engineering, a scenario describes an anticipated usage of a software system. As scenarios are useful to understand the requirements and functionalities of a software system, the scenario-based analysis is widely used in various tasks, especially in the design stage of software architectures. Although researchers have proposed various scenario-based approaches to analyse software architecture, there are still limitations in this research field, and a key limitation is that scenarios are typically not formally defined and thus may contain ambiguities. As these ambiguities may lead to defects, it is desirable to reduce them as many as possible. In order to reduce ambiguity in scenario-based software architecture analysis, this paper introduces a creative computing approach to scenario-based software requirements analysis. Our work expands this idea in three directions. Firstly, we extend an architecture description language(ADL)-based language – Breeze/ADL to model the software architecture. Secondly, we use a creative rule – combinational rule(CR) to combine the vector clock algorithm for reducing the ambiguities in modelling scenarios. Then, another creative rule – transformational rule(TR) is employed to help to transform our Breeze/ADL model to a popular model – unified modelling language(UML) model. We implement our approach as a plugin of Breeze, and illustrate a running example of modelling a poetry to music system in our case study.Our results show the proposed creative approach is able to reduce ambiguities of the software architecture in practice.展开更多
Usually, the security requirements are addressed by abstracting the security problems arising in a specific context and providing a well proven solution to them. Security patterns incorporating proven security experti...Usually, the security requirements are addressed by abstracting the security problems arising in a specific context and providing a well proven solution to them. Security patterns incorporating proven security expertise solution to the recurring security problems have been widely accepted by the community of security engineering. The fllndamental challenge for using security patterns to satisfy security requirements is the lack of defined syntax, which makes it impossible to ask meaningful questions and get semantically meaningful answers. Therefore, this paper presents an ontological approach to facilitating security knowledge mapping from security requirements to their corresponding solutions security patterns. Ontologies have been developed using Web Ontology Language (OWL) and then incorporated into a security pattern search engine which enables sophisticated search and retrieval of security patterns using the proposed algorithm. Applying the introduced approach allows security novices to reuse security expertise to develop secure software system.展开更多
Architecture description languages play an important role in modelling software architectures. However, many architecture description languages (ADLs) are either unable to deal with the verification and dynamic chan...Architecture description languages play an important role in modelling software architectures. However, many architecture description languages (ADLs) are either unable to deal with the verification and dynamic changes directly or too formal to be understood and manipulated. This paper presents xBreeze/ADL, a novel extensible markup language (XML)-based verification and evolution supported architecture description language, which is specifically designed for modelling the software architecture of large, complex systems. Five principle design goals are 1) to separate template from instance to define a loose coupling structure, 2) to present virtual and concrete link to identify service execution flow, 3) to clearly represent component behaviour to specify architecture semantics, 4) to introduce multi-dimension restrictions to define the architecture constraints, and 5) to use the graph transformation theory to implement the architecture configuration management (i.e., reconfiguration and verification). Various advanced features of xBreeze/ADL are illustrated by using an example on online movie ticket booking system.展开更多
Logic flaws within web applications will allow malicious operations to be triggered towards back-end database. Existing approaches to identifying logic flaws of database accesses are strongly tied to structured query ...Logic flaws within web applications will allow malicious operations to be triggered towards back-end database. Existing approaches to identifying logic flaws of database accesses are strongly tied to structured query language (SQL) statement construction and cannot be applied to the new generation of web applications that use not only structured query language (NoSQL) databases as the storage tier. In this paper, we present Lom, a black-box approach for discovering many categories of logic flaws within MongoDB- based web applications. Our approach introduces a MongoDB operation model to support new features of MongoDB and models the application logic as a mealy finite state machine. During the testing phase, test inputs which emulate state violation attacks are constructed for identifying logic flaws at each application state. We apply Lom to several MongoDB-based web applications and demonstrate its effectiveness.展开更多
Activity is now playing a vital role in software processes. To ensure the high-level efficiency of software processes, a key point is to locate those activities that own bigger resource occupation probabilities with r...Activity is now playing a vital role in software processes. To ensure the high-level efficiency of software processes, a key point is to locate those activities that own bigger resource occupation probabilities with respect to average execution time, called delayed activities, and then improve them. To this end, we firstly propose an approach to locating delayed activities in software processes. Furthermore, we present a case study, which exhibits the high-level efficiency of the approach, to concretely illustrate this new solution. Some beneficial analysis and reasonable modification are developed in the end.展开更多
Breeze/architecture description language(ADL), is an eX tensible markup language(XML) based architecture description language which is used to model software systems at the architecture level. Though Breeze/ADL pr...Breeze/architecture description language(ADL), is an eX tensible markup language(XML) based architecture description language which is used to model software systems at the architecture level. Though Breeze/ADL provides an appropriate basis for architecture modelling, it can neither analyse nor evaluate the architecture reliability. In this paper, we propose a Breeze/ADL based strategy which, by combining generalized stochastic Petri net(GSPN) and tools for reliability analysis, supports architecture reliability modelling and evaluation. This work expands the idea in three directions: Firstly, we give a Breeze/ADL reliability model in which we add error attributes to Breeze/ADL error model for capturing architecture error information, and at the same time perform the system error state transition through the Breeze/ADL production. Secondly, we present how to map a Breeze/ADL reliability model to a GSPN model, which in turn can be used for reliability analysis. The other task is to develop a Breeze/ADL reliability analysis modelling tool–EXGSPN(Breeze/ADL reliability analysis modelling tool), and combine it with platform independent petri net editor 2(PIPE2) to carry out a reliability assessment.Abstract: Breeze/architecture description language (ADL), is an eXtensible markup language (XML) based architecture description language which is used to model software systems at the architecture level. Though Breeze/ADL provides an appropriate basis for architecture modelling, it can neither analyse nor evaluate the architecture reliability. In this paper, we propose a Breeze/ADL based strategy which, by combining generalized stochastic Petri net (GSPN) and tools for reliability analysis, supports architecture reliability modelling and evaluation. This work expands the idea in three directions: Firstly, we give a Breeze/ADL reliability model in which we add error attributes to Breeze/ADL error model for capturing architecture error information, and at the same time perform the system error state transition through the Breeze/ADL production. Secondly, we present how to map a Breeze/ADL reliability model to a GSPN model, which in turn can be used for reliability analysis. The other task is to develop a Breeze/ADL reliability analysis modelling tool-EXGSPN (Breeze/ADL reliability analysis modelling tool), and combine it with platform independent petri net editor 2 (PIPE2) to carry out a reliability assessment.展开更多
文摘Tik-Tok is a famous entertainment and art creation app that is used all around the world,which enables everyone to make short video clip ranging from 30 seconds to 1 minute and which is published and shared with family,friends,and public.This app is downloaded about 1.5 billion times with 800 million users all around the world,Tik-Tok users from China,India,USA,Russia,and Turkey are at the top.This paper explores the usage of Tik-Tok under the pandemic COVID-19 and how does it impact on personal,academic,and social life of youngsters and teenagers in Turkey.We collected primary data by using questionnaires from four big provinces:Istanbul,Ankara,Izmir,and Antalya(mainly top tourist provinces),500 samples were collected by using convenience sampling method,data collected in between 1 April 2021 to 2 May 2021,data analyzed by Multiple ANOVA,three times simple regression was used to explore the impact of Tik-Tok on personal,academic,and social life separately,furthermore correlation test was also applied to show strength among variables.Results indicate statistical significance(p<0.01)which supports the hypotheses.
基金supported by National Natural Science Foundation of China(No.61262082,No.61462066)Key Project of Chinese Ministry of Education(No.212025)+1 种基金Inner Mongolia Science Foundation for Distinguished Young Scholars(No.2012JQ03)Inner Mongolia Natural Science Foundation of Inner Mongolia(No.2012MS0922)
文摘As an innovative software application mode,Software as a service(SaaS) shows many attractive advantages.Migrating legacy system to SaaS can make outdated systems revived.In the process of migration,the existing valuable components need to be discovered and reused in order that the target system could be developed/integrated more efficiently.An innovative approach is proposed in this paper to extract the reusable components from legacy systems.Firstly,implementation models of legacy system are recovered through reverse engineering.Secondly,function models are derived by vertical clustering,and then logical components are discovered by horizontal clustering based on the function models.Finally,the reusable components with specific feature descriptions are extracted.Through experimental verification,the approach is considered to be efficient in reusable component discovery and to be helpful to migrating legacy system to SaaS.
文摘With the rapidly escalating use of smart devices and fraudulent transaction of users' data from their devices, efficient and reliable techniques for authentication of the smart devices have become an obligatory issue. This paper reviews the security risks for mobile devices and studies several authentication techniques available for smart devices. The results from field studies enable a comparative evaluation of user-preferred authentication mechanisms and their opinions about reliability, biometric authentication and visual authentication techniques.
文摘One of the challenging tasks in cognitive radio(CR) networks is to agree on a common control channel to exchange control information. This paper presents a novel medium access control(MAC) protocol for CR network which efficiently and intelligently establishes a common control channel between CR nodes. The proposed protocol is the first CR MAC protocol which is hybrid in nature and lies between global common control channel(GCCC) and non-GCCC family of MAC protocols. The dynamic nature of the protocol makes the CR nodes converge on a newly found control channel quicker whenever the interference from a licensed user is sensed. The analytical results show that the dynamic, hybrid and adaptive nature of proposed protocol yields higher throughputs when compared with other CR MAC protocols.
基金partially supported by the Japam Society for the Promotion of Science (JSPS) KAKENHI (Nos. 25420232 and 16K06203)
文摘In software engineering, a scenario describes an anticipated usage of a software system. As scenarios are useful to understand the requirements and functionalities of a software system, the scenario-based analysis is widely used in various tasks, especially in the design stage of software architectures. Although researchers have proposed various scenario-based approaches to analyse software architecture, there are still limitations in this research field, and a key limitation is that scenarios are typically not formally defined and thus may contain ambiguities. As these ambiguities may lead to defects, it is desirable to reduce them as many as possible. In order to reduce ambiguity in scenario-based software architecture analysis, this paper introduces a creative computing approach to scenario-based software requirements analysis. Our work expands this idea in three directions. Firstly, we extend an architecture description language(ADL)-based language – Breeze/ADL to model the software architecture. Secondly, we use a creative rule – combinational rule(CR) to combine the vector clock algorithm for reducing the ambiguities in modelling scenarios. Then, another creative rule – transformational rule(TR) is employed to help to transform our Breeze/ADL model to a popular model – unified modelling language(UML) model. We implement our approach as a plugin of Breeze, and illustrate a running example of modelling a poetry to music system in our case study.Our results show the proposed creative approach is able to reduce ambiguities of the software architecture in practice.
基金supported by Research Project of Education department of Liaoning Province(No.L2013156)National Scholarship(No.201208210386)Key Industry Problem Plan of Liaoning Province(No.2012219001)
文摘Usually, the security requirements are addressed by abstracting the security problems arising in a specific context and providing a well proven solution to them. Security patterns incorporating proven security expertise solution to the recurring security problems have been widely accepted by the community of security engineering. The fllndamental challenge for using security patterns to satisfy security requirements is the lack of defined syntax, which makes it impossible to ask meaningful questions and get semantically meaningful answers. Therefore, this paper presents an ontological approach to facilitating security knowledge mapping from security requirements to their corresponding solutions security patterns. Ontologies have been developed using Web Ontology Language (OWL) and then incorporated into a security pattern search engine which enables sophisticated search and retrieval of security patterns using the proposed algorithm. Applying the introduced approach allows security novices to reuse security expertise to develop secure software system.
基金supported by National Natural Science Foundation of China(No.71473018)
文摘Architecture description languages play an important role in modelling software architectures. However, many architecture description languages (ADLs) are either unable to deal with the verification and dynamic changes directly or too formal to be understood and manipulated. This paper presents xBreeze/ADL, a novel extensible markup language (XML)-based verification and evolution supported architecture description language, which is specifically designed for modelling the software architecture of large, complex systems. Five principle design goals are 1) to separate template from instance to define a loose coupling structure, 2) to present virtual and concrete link to identify service execution flow, 3) to clearly represent component behaviour to specify architecture semantics, 4) to introduce multi-dimension restrictions to define the architecture constraints, and 5) to use the graph transformation theory to implement the architecture configuration management (i.e., reconfiguration and verification). Various advanced features of xBreeze/ADL are illustrated by using an example on online movie ticket booking system.
基金supported by China Scholarship Council,Tianjin Science and Technology Committee(No.12JCZDJC20800)Science and Technology Planning Project of Tianjin(No.13ZCZDGX01098)+2 种基金NSF TRUST(The Team for Research in Ubiquitous Secure Technology)Science and Technology Center(No.CCF-0424422)National High Technology Research and Development Program of Chia(863Program)(No.2013BAH01B05)National Natural Science Foundation of China(No.61402264)
文摘Logic flaws within web applications will allow malicious operations to be triggered towards back-end database. Existing approaches to identifying logic flaws of database accesses are strongly tied to structured query language (SQL) statement construction and cannot be applied to the new generation of web applications that use not only structured query language (NoSQL) databases as the storage tier. In this paper, we present Lom, a black-box approach for discovering many categories of logic flaws within MongoDB- based web applications. Our approach introduces a MongoDB operation model to support new features of MongoDB and models the application logic as a mealy finite state machine. During the testing phase, test inputs which emulate state violation attacks are constructed for identifying logic flaws at each application state. We apply Lom to several MongoDB-based web applications and demonstrate its effectiveness.
基金supported by National Natural Science Foundation of China(No.61462091)High-tech Industrial Development Program of Yunnan Province(No.1956,in 2012)+2 种基金New Academic Researcher Award for Doctoral Candidates of Yunnan Province of China(No.ynu201414)Natural Science Youth Foundation of Yunnan Province of China(No.2014FD006)the Postgraduates Science Foundation of Yunnan University(No.ynuy201424)
文摘Activity is now playing a vital role in software processes. To ensure the high-level efficiency of software processes, a key point is to locate those activities that own bigger resource occupation probabilities with respect to average execution time, called delayed activities, and then improve them. To this end, we firstly propose an approach to locating delayed activities in software processes. Furthermore, we present a case study, which exhibits the high-level efficiency of the approach, to concretely illustrate this new solution. Some beneficial analysis and reasonable modification are developed in the end.
基金supported by Jilin Province Science Foundation for Youths(No.20150520060JH)
文摘Breeze/architecture description language(ADL), is an eX tensible markup language(XML) based architecture description language which is used to model software systems at the architecture level. Though Breeze/ADL provides an appropriate basis for architecture modelling, it can neither analyse nor evaluate the architecture reliability. In this paper, we propose a Breeze/ADL based strategy which, by combining generalized stochastic Petri net(GSPN) and tools for reliability analysis, supports architecture reliability modelling and evaluation. This work expands the idea in three directions: Firstly, we give a Breeze/ADL reliability model in which we add error attributes to Breeze/ADL error model for capturing architecture error information, and at the same time perform the system error state transition through the Breeze/ADL production. Secondly, we present how to map a Breeze/ADL reliability model to a GSPN model, which in turn can be used for reliability analysis. The other task is to develop a Breeze/ADL reliability analysis modelling tool–EXGSPN(Breeze/ADL reliability analysis modelling tool), and combine it with platform independent petri net editor 2(PIPE2) to carry out a reliability assessment.Abstract: Breeze/architecture description language (ADL), is an eXtensible markup language (XML) based architecture description language which is used to model software systems at the architecture level. Though Breeze/ADL provides an appropriate basis for architecture modelling, it can neither analyse nor evaluate the architecture reliability. In this paper, we propose a Breeze/ADL based strategy which, by combining generalized stochastic Petri net (GSPN) and tools for reliability analysis, supports architecture reliability modelling and evaluation. This work expands the idea in three directions: Firstly, we give a Breeze/ADL reliability model in which we add error attributes to Breeze/ADL error model for capturing architecture error information, and at the same time perform the system error state transition through the Breeze/ADL production. Secondly, we present how to map a Breeze/ADL reliability model to a GSPN model, which in turn can be used for reliability analysis. The other task is to develop a Breeze/ADL reliability analysis modelling tool-EXGSPN (Breeze/ADL reliability analysis modelling tool), and combine it with platform independent petri net editor 2 (PIPE2) to carry out a reliability assessment.