<<

2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C) QRS-C 2020

Table of Contents

Message from the Steering Committee Chairs and General Chairs xviii Message from the Program Chairs xix Organizing Committee xx Program Committee xxii Steering Committee xxv List of Additional Reviewers xxvi Chairs of Workshops Co-Located with QRS 2020 xxvii ICCLC-Committee xxix

Automated and Intelligent Software Testing

Metamorphic Relations Identification on Chebyshev Rational Approximation Method in the Nuclide Depletion Calculation Program 1 Meng Li (University of South , China; CNNC Key Laboratory on High Trusted Computing, China), Lijun Wang (University of South China, China), Shiyu Yan (University of South China, China; CNNC Key Laboratory on High Trusted Computing, China), Xiaohua Yang (University of South China, China; CNNC Key Laboratory on High Trusted Computing, China), Jie Liu (University of South China, China), and Yapin Wan (University of South China, China) Online Prediction of Server Crash Based on Running Data 7 Zou Zhuoliang (, China) and Ai Jun (Beihang University, China) Efficiency Metrics and Test Case Design for Test Automation 15 Davrondzhon Gafurov (Norsk Helsenett SF) and Arne Erik Hurum (Norsk Helsenett SF) Agent-Based Software Testing: A Definition and Systematic Mapping Study 24 Pavithra Perumal Kumaresen (Mälardalen University), Mirgita Frasheri (Mälardalen University), and Eduard Enoiu (Mälardalen University) Intelligent Radar Software Defect Prediction Approach and Its Application 32 Xi Liu ( Research Institute of Electronics Technology), Haifeng Li (Beihang University), and Xuyang Xie (Castle () Technology Co., Ltd.)

v Graph-Based Vulnerability Detection via Extracting Features from Sliced Code 38 Peng Wu ( of Defense Technology), Liangze Yin (National University of Defense Technology), Xiang Du (National University of Defense Technology), Liyuan Jia (National University of Defense Technology), and Wei Dong (National University of Defense Technology) Vulnerability Analysis through Interface-Based Checker Design 46 Xiang Du (National University of Defense Technology), Liangze Yin (National University of Defense Technology), Peng Wu (National University of Defense Technology), Liyuan Jia (National University of Defense Technology), and Wei Dong (National University of Defense Technology) Coverage Guided Multiple Base Choice Testing 53 Tugkan Tuglular (Izmir Institute of Technology, Turkey) and Onur Leblebici (Univera, Inc., Turkey) Calculating Minimal Failure-Causing Schema Based on Relational Tree Model Method 61 Qian Ji (PICC Property and Casualty Company Limited Branch), Chiya Xu ( of Posts and Telecommunications), and Ziyuan Wang (Nanjing University of Posts and Telecommunications) UI Components Recognition System Based on Image Understanding 65 Xiaolei Sun (Wuhu Institute of Technology), Tongyu Li (Nanjing Mooctest Inc.), and Jianfeng Xu (Nanjing Mooctest Inc.)

Specification, Testing, and Verification for Error Prevention and Detection

Improving Spectrum-Based Fault Localization Using Quality Assessment and Optimization of a Test Suite 72 Chang Liu (Chinese Aeronautical Radio Electronics Research Institute), Chunyan Ma (Northwestern Polytechnical University), and Tao Zhang (Northwestern Polytechnical University) Parallel Stratified Random Testing for Concurrent Programs 79 Canh Minh Do (JAIST, Japan) and Kazuhiro Ogata (JAIST, Japan) Trace-Based Error Prevention and Detection of Consistency Maintenance via Bidirectional Graph Transformations 87 Soichiro Hidaka (Hosei University, Japan) Parallelizing Flow-Sensitive Demand-Driven Points-to Analysis 91 Haibo Yu (Kyushu Sangyo University, Japan), Qiang Sun (Huawei Technologies, China), Kejun Xiao ( Palline Data Technology, China), Yuting Chen (Shanghai Jiao Tong University, China), Tsunenori Mine (Kyushu University, Japan), and Jianjun Zhao (Kyushu University, Japan) Specification-Based Test Case Generation with Constrained Genetic Programming 98 Yuji Sato (Hosei University) Range Partition Testing: Principle and Technique 104 Shaoying Liu (Hiroshima University)

vi Blockchain and Smart Contracts

Modeling and Analyzing Smart Contracts Using Predicate Transition Nets 108 Xudong He (Florida International University) Timely Publication of Transaction Records in a Private Blockchain 116 Rui Ming (University of Massachusetts Dartmouth, USA) and Haiping Xu (University of Massachusetts Dartmouth, USA) Blockchain-Based Solutions for IoT: A Tertiary Study 124 Qianwen Xu (Nanjing University, China), Xiudi Chen (Nanjing University, China), Shanshan Li (Nanjing University, China), He Zhang (Nanjing University, China), Muhammad Ali Babar (University of Adelaide, Australia), and Nguyen Khoi Tran (University of Adelaide, Australia) Exchange of Preparatory Information for Secure and Usable Cryptocurrency Transactions 132 Oliver Kattwinkel (Bonn-Rhein-Sieg University of Applied Sciences, Germany) and Michael Rademacher (Bonn-Rhein-Sieg University of Applied Sciences, Germany) Blockchain-Based Slice Orchestration for Enabling Cross-Slice Communication at the Network Edge 140 Konstantinos Papadakis-Vlachopapadopoulos (National Technical University of Athens), Ioannis Dimolitsas (National Technical University of Athens), Dimitrios Dechouniotis (National Technical University of Athens), Eirini Eleni Tsiropoulou (University of New Mexico), Ioanna Roussaki (National Technical University of Athens), and Symeon Papavassiliou (National Technical University of Athens) Mining Power Misestimation in PoW Blockchain 148 Sang-Yoon Chang (University of Colorado Colorado Springs, USA) Secure Storage and Access for Task-Scheduling Schemes on Consortium Blockchain and Inter-Planetary File System 153 Dongcheng Li (University of Texas at Dallas), W. Eric Wong (University of Texas at Dallas), Man Zhao (China University of Geosciences (Wuhan)), and Qiang Hou (China University of Geosciences (Wuhan))

Cyber Forensics in Software Engineering

A Practical Solution Against Business Email Compromise (BEC) Attack Using Invoice Checksum 160 Songpon Teerakanok (Ritsumeikan University, Japan), Hiroaki Yasuki (Ritsumeikan University, Japan), and Tetsutaro Uehara (Ritsumeikan University, Japan) STAMP S&S: Safety & Security Scenario for Specification and Standard in the Society of AI/IoT 168 Tomoko Kaneko (National Institute of Informatics), Nobukazu Yoshioka (National Institute of Informatics), and Ryoichi Sasaki (Tokyo Denki University)

vii Time-Aware Multi-resolutional Approach to Re-identifying Location Histories by Using Social Networks 176 Takuto Ohka (University of Electro-Communications), Shun Matsumoto (University of Electro-Communications), Masatsugu Ichino (University of Electro-Communications), and Hiroshi Yoshiura (University of Electro-Communications) Trial Development of a Cyber Risk Visualization System with Function of k-Anonymity and Compatibility with Other Organizations 184 Haruki Kobayashi (Tokyo Denki University), Taiichi Saito (Tokyo Denki University), and Ryoichi Sasaki (Tokyo Denki University) Risk Assessment Method for Balancing Safety, Security, and Privacy in Medical IoT Systems with Remote Maintenance Function 190 Ryoichi Sasaki (Tokyo Denki University)

Data Quality for Intelligent Systems

Evaluating Interaction Content in Online Learning Using Deep Learning for Quality Classification 198 Lei Wu (Central China Normal University) and Di Wu (Central China Normal University) SemOIR: An Ontology-Based Semantic Information Retrieval System 204 Mingwei Tang (Nanjing Audit University), Jiangping Chen (University of North Texas), and Haihua Chen (University of North Texas) Mining Author Identifiers for PubMed by Linking to Open Bibliographic Databases 209 Li Zhang (, China), Yong Huang (Wuhan University, China), Qikai Cheng (Wuhan University, China), and Wei Lu (Wuhan University, China) Result Diversification in Clinical Case Reports Retrieval Based on Main Finding 213 Mengqi Luo (Wuhan University), Fengchang Yu (Wuhan University), and Haihua Chen (University of North Texas)

Electrical and Autonomous Vehicle Software

Survey of State-of-Art Autonomous Driving Technologies with Deep Learning 221 Yu Huang (Black Sesame Technology Inc.) and Yue Chen (Futurewei Technology Inc.) Enable an Open Software Defined Mobility Ecosystem Through VEC-OF 229 Sanchu Han (Futurewei Technologies Inc.), Yong He (Futurewei Technologies Inc.), and Yin Ding (Futurewei Technologies Inc.) Driver's Perception Model in Driving Assist 237 Renzhi Tang (ShanghaiTech University) and Zhihao Jiang (ShanghaiTech University)

viii A Study on Testing Autonomous Driving Systems 241 Xudong Zhang (State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences; University of Chinese Academy of Sciences), Yan Cai (State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences), and Zijiang Yang (GuardStrike Inc.) Interpretation Area-Guided Detection of Adversarial Samples 245 JiaLi Wei (Xi'an Jiaotong University, China), Ming Fan (Xi'an Jiaotong University, China), Xi Xu (Xi'an Jiaotong University, China), Ang Jia (Xi'an Jiaotong University, China), Zhou Xu ( University, China), and Lei Xue (The Hong Kong Polytechnic University, China) Formal Verification of CAN Bus in Cyber Physical System 249 Rui Wang (Capital Normal University), Yong Guan (Capital Normal University), Xiaojuan Li (Capital Normal University), and Rui Zhang (Capital Normal University) Depth Estimation and Object Detection for Monocular Semantic SLAM Using Deep Convolutional Network 256 Changbo Hou (Harbin Engineering University of China), Xuejiao Zhao (Harbin Engineering University of China), and Yun Lin (Harbin Engineering University of China)

Human and Social Aspects of Software Quality

Recent Trends in Software Quality Interrelationships: A Systematic Mapping Study 264 Michael Shoga (University of Southern California, USA), Celia Chen (Occidental College, USA), and Barry Boehm (University of Southern California, USA) Towards a Model of Testers' Cognitive Processes: Software Testing as a Problem Solving Approach 272 Eduard Enoiu (Mälardalen University), Gerald Tukseferi (Mälardalen University), and Robert Feldt (Chalmers University of Technology) Test Data Augmentation for Image Recognition Software 280 Pu Wang (Nanjing University of Aeronautics and Astronautics), Zhiyi Zhang (Nanjing University of Aeronautics and Astronautics), Yuqian Zhou (Nanjing University of Aeronautics and Astronautics), and Zhiqiu Huang (Nanjing University of Aeronautics and Astronautics) Boosting UI Rendering in Android Applications 285 Subrota Kumar Mondal (Macau University of Science and Technology, Macau, China.), Yu Pei (The Hong Kong Polytechnic University, Hong Kong, China.), Hong Ning Dai (Macau University of Science and Technology, Macau, China.), H M Dipu Kabir (Deakin University, Australia), and Jyoti Prakash Sahoo (Institute of Technical Education and Research (ITER), India.)

ix Predictive Maintenance

Optimal Maintenance Policy Considering Innovation Replacement 287 Di Wu (Xi'an Jiaotong University, China), Rui Peng (Beijing University of Technology, China), Shaomin Wu (University of Kent, United Kingdom), Ye Ma (Beijing University of Technology, China), and Yingchun Li (Beijing University of Technology, China) Predicting Remaining Useful Life with Uncertainty Using Recurrent Neural Process 291 Guozhen Gao ( University, China), Zijun Que (, China), and Zhengguo Xu (Zhejiang University, China) An Overview of the EMUs Maintenance Scheduling in China 297 Wenqiang Zheng (, China), Taotao Zhou (Tsinghua University, China), and Yan-Fu Li (Tsinghua University, China)

Reliability and Resilience of Complex Systems

A Model-Based RCM Analysis Method 301 Zhibao Mian (North Minzu University), Shuli Jia (North Minzu University), Xiaodong Shi (North Minzu University), Cairong Tang (North Minzu University), Junjie Chen (North Minzu University), and Yaqing Gao (North Minzu University) Decomposition of Attributes Oriented Software Trustworthiness Measure Based on Axiomatic Approaches 308 Hongwei Tao ( of Light Industry, China), Yixiang Chen (East China Normal University, China), and Wu (Shanghai Polytechnic University, China) Resilience Evaluation of Complex Networks with Attack Intensity 316 Shubin Si (Northwestern Polytechnical University) and Ning Wang (Chang’an University) Research on Safety Modeling and Analysis to the Task Process of Airborne Weather System 317 Haotian Niu (School of Aeronautics, Northwestern Polytechnical University), Cunbao Ma (School of Aeronautics, Northwestern Polytechnical University), Pei Han (Communication Division, 20th Institute, China Electronics Technology Group Center), Siyuan Li (School of Aeronautics, Northwestern Polytechnical University), Qi Ma (School of Aeronautics, Northwestern Polytechnical), and Shenghui Zhang (Technique Center, AVIC Qianshan Avionic Co. Ltd) Reliability Analysis of Phased-Mission K-out-of-n Systems with Cascading Effect 324 Zhiqiang Cai (Northwestern Polytechnical University, China), Mi Zhou (Northwestern Polytechnical University, China), and Shuai Zhang (Northwestern Polytechnical University, China)

x Selection of Network Feature Attribute Based on Classification Discrimination and Correlation Analysis 328 Yang Liu (Beijing Institute of Astronautical Systems Engineering, China), Hongwei Ma (Beijing Institute of Astronautical Systems Engineering, China), Kuangdai Li (Beijing Institute of Astronautical Systems Engineering, China), Hang Yi (Beijing Institute of Astronautical Systems Engineering, China), Xiaotao Yan (Beijing Institute of Astronautical Systems Engineering, China), and Jian Kang (Beijing Institute of Astronautical Systems Engineering, China) An Operational Resilience Metric for Modern Power Distribution Systems 334 Tyler Phillips (Idaho National Laboratory), Timothy McJunkin (Idaho National Laboratory), Craig Rieger (Idaho National Laboratory), John Gardner (Boise State University), and Hoda Mehrpouyan (Boise State University)

Software Engineering and Big Data

Research and Development of ICT Call Center Data Auxiliary Analysis System Based on Knowledge Discovery 343 Xiangna Li (Beijing FibrLink Communications Co., Ltd. State Grid Information & Telecommunication Group Co., Ltd., China), Zhongping Xu (Beijing SGITG-Accenture Information Technology Co., Ltd., China), Xuedong Li (Beijing FibrLink Communications Co., Ltd., China), Tao Zhang (Beijing SGITG-Accenture Information Technology Co., Ltd., China), Rongrong Zheng (State Grid Information & Telecommunication Co., Ltd., China), Xiao Han (State Grid Information & Telecommunication Co., Ltd., China), Chenhui Wang (State Grid Information & Telecommunication Co., Ltd., China), and Bing Tian (Information & Telecommunications Company, State Grid electric Power Company, China) Intelligence and Emotion Application Framework in Interactive Art Design 350 Yihang Bo (), Zuqiang Yi (Beijing Film Academy), and Xi Chen (Beijing Film Academy) The Optimal Inverter DC/AC Value Selection Method Based on Big Data Technology 358 Ying Wang (Dongfang Electrical corporation, Chengdu, China), Yu Wang (Dongfang Electrical corporation, Chengdu, China), Yongling Tan (Dongfang Electrical corporation, Chengdu, China), Zhuojun Zhong (Dongfang Electrical corporation, Chengdu, China), Mingli Zhang (Dongfang Electrical corporation, Chengdu, China), and Yixuan Zhang (Dongfang Electrical corporation, Chengdu, China)

Software Engineering and Knowledge Management

An Improved Comprehensive Evaluation Method for Software Development Ability 364 Xiao Yu (Beijing Institute of Tracking and Telecommunication Technology), Wenhong Liu (Beijing Institute of Tracking and Telecommunication Technology), and Jun Yang (China Aerospace Academy of Systems Science and Engineer)

xi QMine: A Framework for Mining Quantitative Regular Expressions from System Traces 370 Pradeep Kumar Mahato (The University of British Columbia, Canada) and Apurva Narayan (The University of British Columbia, Canada) Application of Improved Fault Localization Method to Stereo Matching Software 378 Jinfeng Li (Mudanjiang Normal University, China), Yan Zhang (Mudanjiang Normal University, China), Jilong Bian (Northeast Forestry University, China), Tiejun Li (China Unicom, China), and Baoying Ma (Mudanjiang Medical University, China) A Lightweight Decision-Tree Algorithm for Detecting DDoS Flooding Attacks 382 Godswill Lucky (University of Liverpool), Fred Jjunju (University of Liverpool), and Alan Marshall (University of Liverpool) Decision Network: A New Network-Based Classifier 390 Yong Yu ( University, China), Ming Jing (, China), Jie Li (Yunnan University, China), Na Zhao (Yunnan University, China), and Jinzhuo Liu (Yunnan University, China) A Fusion of Java Domain Knowledge Base and Siamese Network for Java API Recommendation 398 Hao Li (Yunnan University), Tao Li (Yunnan University), Sheng Zhong (Yunnan University), Yan Kang (Yunnan University), and Tie Chen (Yunnan University) Specifying and Model Checking Workflows of Single Page Applications with TLA+ 406 Gefei Zhang (Hochschule für Technik und Wirtschaft) An MILP-NLP Decomposition Approach Applied to a Refinery Scheduling Problem 411 Qianqian Duan ( of Engineering Science) Construction of Knowledge Graph for Internal Control of Financial Enterprises 418 Yingying Wang (Credit Card Center, Shanghai Pudong Development Bank), Jun Zhao (Credit Card Center, Shanghai Pudong Development Bank), Feng Li (Credit Card Center, Shanghai Pudong Development Bank), and Min Yu (Credit Card Center, Shanghai Pudong Development Bank) A Threat Analysis Methodology for Security Requirements Elicitation in Machine Learning Based Systems 426 Carl Wilhjelm (Georgia State University) and Awad A Younis (Northern Kentucky University) Design Method of Banquet Intelligent Side Dishes System Based on Data Mining and Correlation Analysis 434 Xing Qiao ( Tourism University) and Jie Luo (Beihang University)

Safety and Security in Cyber-Physical Systems

Research of Micro-Expression Recognition Model Based on Feature Unit 438 Fei Yin (East China Normal University, China), Jinyi Xu (East China Normal University, China), and Yixiang Chen (East China Normal University, China) A General and Efficient Framework for Improving Balanced Failure Biasing 445 Shijian Mao (East China Normal University), Min Zhang (East China Normal University), Jia Yan (East China Normal University), and (East China Normal University)

xii Probabilistic Synthesis for Program with Non-API Operations 451 Yating Zhang (National University of Defense Technology), Wei Dong (National University of Defense Technology), Daiyan Wang (National University of Defense Technology), Jiaxin Liu (National University of Defense Technology), and Binbin Liu (National University of Defense Technology) Cascading Failure Path Prediction Based on Association Rules in Cyber-Physical Active Distribution Networks 458 Chong Wang (Northwestern Polytechnical University, China), Yunwei Dong (Northwestern Polytechnical University, China), Pengpeng Sun (Northwestern Polytechnical University, China), and Yin Lu (Northwestern Polytechnical University, China) Rchecker: A CBMC-Based Data Race Detector for Interrupt-Driven Programs 465 Haining Feng (National University of Defense Technology), Liangze Yin (National University of Defense Technology), Wenfeng Lin (China Academy of Engineering Physics), Xudong Zhao (National University of Defense Technology), and Wei Dong (National University of Defense Technology) Security Controller Synthesis for ROS-Based Robot 472 Xudong Zhao (National University of Defense Technology), Shaoxian Shu ( Institute of Traffic Engineering), Yutian Lan (National University of Defense Technology), Haining Feng (National University of Defense Technology), and Wei Dong (National University of Defense Technology) An Empirical Study of Flight Control System Model Checking Integrated with FMEA 478 Xinyi Wang (Beihang University), Gaolei Yi (Beihang University), and Yichen Wang (Beihang University)

System Testing and Validation

Fuzzing of Mobile Application in the Banking Domain: A Case Study 485 Martin A. Schneider (Fraunhofer Institute for Open Communication Systems), Marc-Florian Wendland (Fraunhofer Institute for Open Communication Systems), Abdurrahman Akin (Kuveyt Türk Participation Bank Inc.), and Serafettin Sentürk (Tübitak Informatics and Information Security Research Center) TTCN-3 Based NG112 Test System and Playground for Emergency Communication 492 Ramon Barakat (Fraunhofer Institute for Open Communication Systems (FOKUS)), Faruk Catal (Fraunhofer Institute for Open Communication Systems (FOKUS)), Nikolay Tcholtche (Fraunhofer Institute for Open Communication Systems (FOKUS)), and Yacine Rebahi (Fraunhofer Institute for Open Communication Systems (FOKUS)) A Simple, Lightweight Framework for Testing RESTful Services with TTCN-3 498 Theofanis Vassiliou-Gioles (Technische Universität Berlin, Germany) A Performance Benchmarking Methodology for MQTT Broker Implementations 506 Ilie-Daniel Gheorghe-Pop (Fraunhofer FOKUS, Germany), Alexander Kaiser (Relayr GmbH, Germany), Axel Rennoch (Fraunhofer FOKUS, Germany), and Sascha Hackel (Fraunhofer FOKUS, Germany)

xiii Using TDL for Standardised Test Purpose Definitions 514 Philip Makedonski (Institute of Computer Science, University of Göttingen), Ilie-Daniel Gheorghe-Pop (Fraunhofer FOKUS), Axel Rennoch (Fraunhofer FOKUS), Finn Kristoffersen (Cinderella ApS), Boštjan Pintar (SINTESIO Foundation), and Andreas Ulrich (Siemens AG)

Creative Lifestyle Computing

BIM Design for Reconstruction of Old Factory Building based on Sustainable Perspective 522 Qian Zhao (Beijing Institute of Fashion Technology) Smart Scenic Area Construction Framework for Meeting Demands of Multiple Interests Based on Global Tourism Architecture: An Approach to Educating Smart Scenic Area Construction Framework 527 Lei Song (King Mongkut’s Institute of Technology) and Sirirat Petsangsri (King Mongkut’s Institute of Technology) Graphical Probability Model and Heritage Tourism Routine Design 535 Fengbao Ma (Beijing Institute of Fashion Technology), Sicong Ma (Chinese Academy of Sciences), and Qinyun Liu (Bath Spa University / Collaborative Innovation Centre of eTourism, ) Applying Mobile Technology for Developing Cultural and Creative Products in Tourism: A Case Study on the Forbidden City 542 Lu Zhang (Collaborative Innovation Center of eTourism, Beijing Union University, Beijing, China), Chi Zhang (Collaborative Innovation Center of eTourism, Beijing Union University, Beijing, China), and Meiyu Shi (Beijing Union University, Beijing, China) A Big Data based Decision Framework for Public Management and Service in Tourism 550 Chi Zhang (Collaborative Innovation Center of E-Tourism, Beijing Union University), Xiangjie Qiao (Collaborative Innovation Center of E-Tourism, Beijing Union University), and Xianfeng Chen (Collaborative Innovation Center of E-Tourism, Beijing Union University) Approaching Another Tourism Recommender 556 Xianfeng Chen (Collaborative Innovation Center of E-Tourism, Beijing Union University), Qing Liu (Department of Tourism and National Culture, Xing An Vocational and Technical College), and Xiangjie Qiao (Collaborative Innovation Center of E-Tourism, Beijing Union University) Pricing Decision and Greenness Analysis of Green Food in Dual-Channel Supply Chain with Fairness Concern 563 Chuan Zhao (Beijing Technology and Business University, China), Yan Song (Beijing Technology and Business University, China), and Min Zuo (Beijing Technology and Business University, China) Character-Word Double-Dimensional Semantic Classification Model for Judging Illegal and Irregular Behaviors for Internet Food Safety 571 Min Zuo (Beijing Technology and Business University, China), Siyu He (Beijing Technology and Business University, China), Qingchuan Zhang (Beijing Technology and Business University, China), and Qingbang Wang (Beijing Technology and Business University, China)

xiv Sustainable Food Supply Chain Management and Firm Performance: The Mediating Effect of Food Safety Level 578 Jing Wang (Beijing Technology and Business University, China), Xiaoyue Yang (Beijing Technology and Business University, China), and Chongchong Qu (Renmin University of China, China) A Sentiment Classification Model Based on Bi-directional LSTM with Positional Attention for Fresh Food Consumer Reviews 589 Tong-Qiang Jiang (National Engineering Laboratory for Agri-product QualityTraceability, Beijing Technology and Business University, China), Xue-Mei Xu (National Engineering Laboratory for Agri-product QualityTraceability, Beijing Technology and Business University, China), Qing-Chuan Zhang (National Engineering Laboratory for Agri-product QualityTraceability, Beijing Technology and Business University, China), and Zheng Wang (National Engineering Laboratory for Agri-product QualityTraceability, Beijing Technology and Business University, China) Research on Demand Analysis Model of Hot Product in Food Industry 595 Hao Zhang (Beijing Technology and Business University) and Lin An (Beijing Technology and Business University) Smart Feeder Robot for Severely Disabled Patients 603 Chihhsiong Shih (Tunghai University), Quanen Lai (Tunghai University), Huanran Ho (Tunghai University), and Cheng-Chung Chu (Tunghai University) Best Seller Rank (BSR) to Sales: An Empirical Look at Amazon.com 609 Amit Sharma (San Jose State University), Hongrui Liu (San Jose State University), and Hongwei Liu ( Foreign Studies University) Two Methods for Constructing Independent Spanning Trees in Alternating Group Networks 616 Jie-Fu Huang (National Cheng Kung University) and Sun-Yuan Hsieh (National Cheng Kung University) Loop Destroying Algorithm for Generating Creative Solutions Applying in Health Care Area 622 Fengbao Ma (Beijing Institute of Fashion Technology), Qinyun Liu (Bath Spa University / Collaborative Innovation Centre of eTourism, Beijing Union University), and William ChengChung Chu (Tunghai University) Microservices: Architecture, Container, and Challenges 629 Guozhi Liu (Southwest Forestry University), Bi Huang (Southwest Forestry University), Zhihong Liang (Southwest Forestry University), Minmin Qin (Southwest Forestry University), Hua Zhou (Southwest Forestry University), and (Yunnan Forestry Technological) BCoV: A Covergence of Blockchain and IoV 636 Penggui Huang (Southwest Forestry University), Bi Huang (Southwest Forestry University), Youjie Zhao (Southwest Forestry University), Zhengpin Qiang (Southwest Forestry University), and Minmin Qing (Southwest Forestry University) Development of a Real 3D Display System 644 Chong Zeng (Longyan University), Weihua Li (Longyan University), Hualong Guo (Longyan University), Tung-Lung Wu (Zhaoqing University), and Dennis Bumsoo Kim (Longyan University)

xv A Creative Approach to Humour Degree Calculation for Utterances 650 Tian Liu ( Institute of Economics and Trade, China), Hongji Yang (University of Leicester, United Kingdom), and Feng-jian Wang (National Chiao Tung University) Interactive Narrative Generation of Aesthetics of Violence in Films 657 Tao Ma (Tianjin Foreign Studies University), Hongwei Liu (Tianjin Foreign Studies University), and Hongji Yang (University of Leicester, England) Creative Computing Based Experimental Study of Somatosensory Games for Promoting Intention Understanding 663 Jie Jian (Hunan Normal University, China), Xiaotong Zhang (Hunan Normal University, China), and Ping Ma (Hunan Normal University, China)

Fast Abstract

Non-Recursive Algorithm Derivation and Formal Proof of Binary Tree Traversal Class Problems 670 Zhengkang Zuo ( Normal University, China), Yue Fang (Jiangxi Normal University, China), Qing Huang (Jiangxi Normal University, China), Yunyan Liao (Jiangxi Normal University, China), Yuan Wang (Jiangxi Normal University, China), and Changjing Wang (Jiangxi Normal University) Towards Prioritizing Vulnerability Testing 672 Simge Demir (Sabanci University), Şevval Şimşek (Sabanci University), Halit Alptekin (Sabanci University), and Cemal Yilmaz (Sabanci University) Comprehensive Model-Driven Complexity Metrics for Software Systems 674 Omar Masmali (The University of Texas at El Paso) and Omar Badreddin (The University of Texas at El Paso) API Parameter Recommendations Made Effective 676 Wenhua Yang (Nanjing University of Aeronautics and Astronautics) Effective Iterative Program Synthesis with Knowledge Searched from Internet 678 Jiaxin Liu (National University of Defense Technology), Wei Dong (National University of Defense Technology), Binbin Liu (National University of Defense Technology), Yating Zhang (National University of Defense Technology), and Daiyan Wang (National University of Defense Technology) Synthesized Dataset for Search-Based Test Data Generation Methods Focused on MC/DC Criterion 680 Ján Čegiň (Slovak University of Technology in Bratislava, Slovakia), Karol Rástočný (Slovak University of Technology in Bratislava, Slovakia), and Mária Bieliková (Slovak Research Center for Artificial Intelligence slovak.AI Bratislava, Slovakia)

xvi Reliability Evaluation for a Cloud Computer Network with Fog Computing 682 Yi-Fan Chen (National Chiao Tung University), Ding-Hsiang Huang (National Chiao Tung University), Cheng-Fu Huang (Feng Chia University), and Yi-Kuei Lin (National Chiao Tung University; Asia University) Black-Box Testing of Financial Virtual Assistants 684 Iosif Itkin (Exactpro Systems, UK), Elena Treshcheva (Exactpro Systems, UK), Luba Konnova (Exactpro Systems, UK), Pavel Braslavski (Ural Federal University, Russia), and Rostislav Yavorskiy (Surgut State University, Russia) Towards a Holistic Approach to Medical IoT Forensics 686 Jigang Liu (Metropolitan State University, USA), Ryoichi Sasaki (Tokyo Denki University, Japan), and Tetsutaro Uehara (Ritsumeikan University, Japan) Reliability Service Assurance in Public Clouds Based on Blockchain 688 Sa Meng (University of Electronic Science and Technology of China), Liang Luo (University of Electronic Science and Technology of China), Peng Sun (University of Electronic Science and Technology of China), and Yuan Gao (University of Electronic Science and Technology of China) Adaptive Rule Engine for Anomaly Detection in 5G Mobile Edge Computing 690 Peng Sun (University of Electronic Science and Technology of China), Liang Luo (University of Electronic Science and Technology of China), Shangxin Liu (Hebi NLED Company Limited, China), and Weifeng Wu (Henan Shijia Optoelectronic Company Limited)

Author Index 693

xvii