{"title":"A Network Performance Optimization Solution for X2Go Kdrive in Low-bandwidth Environments","authors":"Yinsen Kou","doi":"10.1109/ISSSR58837.2023.00068","DOIUrl":"https://doi.org/10.1109/ISSSR58837.2023.00068","url":null,"abstract":"Remote desktop technology has been widely adopted by enterprises, education institutions, and individual users due to its ability to improve remote work efficiency, convenience, and security. However, many existing remote desktop protocols suffer from high bandwidth consumption, resulting in severe latency and lag in low-bandwidth environments. In this paper, we propose a frame caching algorithm based on the X2Go protocol architecture in low-motion scenarios to cache frequently appearing frame images on the client-side, thereby avoiding redundant transmissions of identical frames. Additionally, we propose an adaptive compression rate algorithm in high-motion scenarios that automatically adjusts the image compression rate based on the current network congestion, improving video smoothness while sacrificing some picture quality. Experimental results show that our proposed method effectively reduces bandwidth consumption and network latency, and improves the performance of the original protocol in low-bandwidth environments.","PeriodicalId":185173,"journal":{"name":"2023 9th International Symposium on System Security, Safety, and Reliability (ISSSR)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117178699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quantitative Risk Assessment and Management of Hydrogen Leaks from Offshore Rocket Launching Platforms","authors":"X. Kong, Yan Dong, Jichuan Kang, J. Paik","doi":"10.1109/ISSSR58837.2023.00031","DOIUrl":"https://doi.org/10.1109/ISSSR58837.2023.00031","url":null,"abstract":"Liquid hydrogen in cryogenic condition can incidentally leak from offshore rocket launching platforms, leading to catastrophic impacts. Risk assessment and management of hydrogen leaks are required to prevent such accidents. The aim of the paper is to develop a methodology for quantitative risk assessment on hydrogen leak hazards from offshore rocket launching platforms during their filling process. A set of credible leak scenarios are chosen using Latin Hypercube Sampling (LHS) technique. The flows of hydrogen leaks for the selected scenarios are simulated using Computational Fluid Dynamics (CFD) method. A probabilistic model for predicting hydrogen leaks is established based on the computed results, where a long short-term memory (LSTM) network is used. Individual risks are defined as likelihood of explosion and fire due to hydrogen leaks. As an illustrative example, the developed methodology was applied to a hypothetical offshore rocket launching platform, confirming that the hydrogen leak risk level of the platform meets the ALARP (As Low As Reasonably Practicable) criteria. Risk mitigation options are also discussed to reduce the risk level.","PeriodicalId":185173,"journal":{"name":"2023 9th International Symposium on System Security, Safety, and Reliability (ISSSR)","volume":"152 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127314896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Type Accounting: A Mechanism for Growing Implicit Geo-Number Chains for Multi-Objective Evolutionary Geometry","authors":"Ziyang Weng, Shuhao Wang, Yang Ming","doi":"10.1109/ISSSR58837.2023.00052","DOIUrl":"https://doi.org/10.1109/ISSSR58837.2023.00052","url":null,"abstract":"Empirical evidence from studies linking geographic factors such as topography and natural resources to map artifacts is often weak, and procedural management of different samples or codes is unreliable. We found a general weakness in these investigations: Although most map products are limited in their historical conception to the functional validity study component, the analysis of implicit geo-data therein relies almost exclusively on national-level data. Based on algorithmic interventions, We extrapolated the use of GIS to accurately measure spatial variation factors in conflicting map products. A comparison of several relevant variables measured at the national and conflict scale showed that national statistics were found to be poor approximations of conflict areas (areas where civilizations meet). The computational analysis further shows that some of the survey results do depend on the scale of measurement, and that a suture mechanism for the implicit geo-number chain can be identified. Finally, we discuss how multi-objective optimization algorithms can be applied in future research for rapid ranking and improvement of GIS and space to increase our understanding of conflict regions, durations, and biased outcomes during the multi-objective evolution of this type of map products.","PeriodicalId":185173,"journal":{"name":"2023 9th International Symposium on System Security, Safety, and Reliability (ISSSR)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122959468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xinlong Zhang, Jingdong Wang, Shao Qi, Pan Liu, Li Li, W. E. Wong
{"title":"Global Nuclear Weapons Trends Forecast Via Machine Learning","authors":"Xinlong Zhang, Jingdong Wang, Shao Qi, Pan Liu, Li Li, W. E. Wong","doi":"10.1109/ISSSR58837.2023.00021","DOIUrl":"https://doi.org/10.1109/ISSSR58837.2023.00021","url":null,"abstract":"Nuclear weapons have seriously threatened the survival of the global human race. To predict the development trend of global nuclear weapons, we downloaded the nuclear weapons data of major countries from the website of APMCM 2022. Then we analyze these data using machine learning and predict the number of nuclear weapons in the world for the next 100 years. Finally, we predict the main areas of future nuclear war and the death toll caused by nuclear war by constructing a model. The purpose of this paper is to call on all countries to limit the use of nuclear weapons and realize the common peace of mankind by predicting the trend of global nuclear weapons and the disastrous consequences brought by nuclear weapons.","PeriodicalId":185173,"journal":{"name":"2023 9th International Symposium on System Security, Safety, and Reliability (ISSSR)","volume":"150 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124610811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Louzhaohan Wang, Yun Huang, Haifeng Dai, Guanghan Bai, J. Tao
{"title":"A Simple Algorithm for Disintegrating Information Exchange Network of UAV Swarm","authors":"Louzhaohan Wang, Yun Huang, Haifeng Dai, Guanghan Bai, J. Tao","doi":"10.1109/ISSSR58837.2023.00067","DOIUrl":"https://doi.org/10.1109/ISSSR58837.2023.00067","url":null,"abstract":"UAV swarm has self-organizing and adaptive characteristics, which has been widely studied. Efficient information exchange (IE for short) among the UAVs is essential for the swarm to accomplish the mission. Currently, the IE network of UAV swarm is regarded as a complex network, where each UAV is represented as a node and each link denotes information exchange between UAVs. In adversarial environments, UAV swarm may encounter disruptions and attacks. Several researchers have studied the process of recovering after destruction, while less attention has been given to the disintegration strategies of such scenario. Existing disintegration strategies for complex networks may not be appropriate for UAV swarm, which is capable of restore its capability in terms of rewiring. In addition, the computational efforts of current disintegration strategies seem not reasonable for disintegrating UAV swarm under highly intensive and adversarial situation. Based on the IE network model proposed by Bai, this paper proposes a new disintegration strategy by searching for ‘Closely-LinkedGroup’ for disintegrating IE network of UAV Swarm under adversarial environment. The proposed algorithm is able to find out the potential removal nodes and reducing the cost by increasing the number of nodes by maintaining the number of connected pieces. Results and comparisons with extant studies indicate that the proposed model leads to a more efficient disintegration strategies. The proposed model can provide a reference for studying the enemy swarm attack strategy and optimizing swarm model.","PeriodicalId":185173,"journal":{"name":"2023 9th International Symposium on System Security, Safety, and Reliability (ISSSR)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129200163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Senzao Liu, Kunpeng Li, J. Mi, Rui Huang, Tong Guo
{"title":"Multi-source Navigation Sensor Backend Information Fusion Technology Based on D-S Evidence Theory","authors":"Senzao Liu, Kunpeng Li, J. Mi, Rui Huang, Tong Guo","doi":"10.1109/ISSSR58837.2023.00037","DOIUrl":"https://doi.org/10.1109/ISSSR58837.2023.00037","url":null,"abstract":"Multi-source navigation sensors can provide high-precision navigation solutions. To achieve back-end information fusion, this paper presents a fault detection algorithm and an information fusion algorithm. The fault detection algorithm is designed to detect anomalies in multisource navigation sensor data, while the information fusion algorithm is used to integrate data from multiple sensors for obtaining more accurate and reliable navigation information. These two algorithms are based on the D-S evidence theory and Murphy’s improved method, which effectively detect and judge abnormal data and handle conflicts and uncertainties among multiple sources of information, thereby outputting more reliable navigation information. By applying the algorithms to actual flight data, this study demonstrates their effectiveness in abnormal situations, such as abnormal inertial attitude angle, constant difference between inertial pitch angle and heading pitch angle, and sudden changes in GPS output position information.","PeriodicalId":185173,"journal":{"name":"2023 9th International Symposium on System Security, Safety, and Reliability (ISSSR)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132065082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yimin Wei, Xiaolong Wang, Zheng Lin, Minjie Shi, Bin Feng
{"title":"Performance Evaluation for an Elevator by Analyzing the Vibration Data of the car","authors":"Yimin Wei, Xiaolong Wang, Zheng Lin, Minjie Shi, Bin Feng","doi":"10.1109/ISSSR58837.2023.00055","DOIUrl":"https://doi.org/10.1109/ISSSR58837.2023.00055","url":null,"abstract":"Elevators have become an essential means of transportation for people living in high-rise buildings, but many elevators are getting old and of poor performance and which may lead to fatal accidents, thus elevators need to be evaluated for safety purposes to be decided to use further or replace them. Currently, the elevator is evaluated by experts according to national or local laws and rules, the evaluation process is time-consuming, and the results from different experts may be different, there is a lack of useful evaluation methods for elevators. In this paper, an evaluation method for elevator performance based on the improved Grey Relational Analysis (GRA) by analyzing the vibration data of the car of an elevator is proposed. Firstly, the relationship between the vibration and the performance is analyzed. The vibration data of the cars of three selected elevators in 300 days was collected, and then the features of the vibration data are analyzed and the sensitive ones are selected as the evaluation indexes. Secondly, a hybrid combining Weight-Minkowski and Distance-Improved GRA performance evaluation method is constructed for elevators’ performance evaluation, in which, the entropy method and interval analytic hierarchy process (IAHP) are combined to give the weight for the selected features. And then, the Weighted GRA is calculated by using the Minkowski distance which can consider the influence of the fluctuation of the gray relational coefficient of each feature to evaluate the performance. Finally, the proposed method is verified by serval other elevators in service as well as an experimental one. The results show that the proposed method can improve the accuracy of the evaluation results compared with the traditional GRA as well as the Weighted GRA method, matching well with the real health states of the elevators being evaluated. The proposed method can be used not only for evaluating the performance of an elevator but also for other traction-drive machines, for example, mining lifts, etc.","PeriodicalId":185173,"journal":{"name":"2023 9th International Symposium on System Security, Safety, and Reliability (ISSSR)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134285467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xinlong Zhang, Jingdong Wang, Shao Qi, Pan Liu, Li Li
{"title":"Simulation of Online Emotional Public Opinion via Cellular Automata Model","authors":"Xinlong Zhang, Jingdong Wang, Shao Qi, Pan Liu, Li Li","doi":"10.1109/ISSSR58837.2023.00059","DOIUrl":"https://doi.org/10.1109/ISSSR58837.2023.00059","url":null,"abstract":"In the era of post-truth, all kinds of emotional truths have been overrun, and online emotional public opinions have been widely spread, resulting in many new malignant social events. To analyze and prevent these social events, the paper constructs a simulation model of emotional public opinion on the Internet using a cellular automaton model. Then, the paper introduces a flow-limiting mechanism for simulation and proposes. Through experimental simulation, it is a concrete and effective control strategy to limit the spread of emotional public opinions by restricting the flow of specific media.","PeriodicalId":185173,"journal":{"name":"2023 9th International Symposium on System Security, Safety, and Reliability (ISSSR)","volume":"200 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131812791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Comparison Between Two Frameworks for Reliability of System Based on Multi-source Data Fusion","authors":"X. Jia","doi":"10.1109/ISSSR58837.2023.00012","DOIUrl":"https://doi.org/10.1109/ISSSR58837.2023.00012","url":null,"abstract":"The reliability estimation is difficult for complex system due to the high reliability, huge components and categories of connection structure. Fusing multiple source data collected for system is useful to improve the reliability estimation. In this work, two frameworks about multi-source data integration are presented for reliability estimation based on multiple levels diagram of system. In the first framework, the data in every level are integrated first and transmitted to higher level continually upward system-level for system reliability estimation. In the second framework, multi-source data are grouped into different data types. The data of each data type in lower level are transmitted to higher level separately. If there are data of identical data type in higher level, they are pooled with the transmitted data. By successive data transmission and pooling to system-level, the transmitted data of all the data types are integrated with native data for system reliability estimation. Further, the two frameworks are applied and compared through an illustrative example. The results demonstrate that the second framework is more robust than first framework, due to the fact that data integration is required only once in system-level for the second framework while it is necessary in each level for the first framework.","PeriodicalId":185173,"journal":{"name":"2023 9th International Symposium on System Security, Safety, and Reliability (ISSSR)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131819950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Optimised Design for Streaming Media in Cloud Desktop System","authors":"Wei-Chen Ma","doi":"10.1109/ISSSR58837.2023.00063","DOIUrl":"https://doi.org/10.1109/ISSSR58837.2023.00063","url":null,"abstract":"As the earliest and most classic cloud desktop protocol, VNC has been limited in its usage scenarios and further development due to its lazy update mechanism and outdated coding methods, which fail to meet the requirements for video playback and other demands. This paper proposes an optimization approach for VNC systems by dynamically adjusting the parameters based on network latency to control the minimum communication time between the client and server, allowing continuous data updates during this period. To address the issues related to outdated coding methods and low bandwidth requirements, a novel algorithm is introduced that utilizes motion vectors to differentiate between high and low motion areas in video frames. High motion areas are encoded and decoded using H.264, while low motion areas maintain the coding and decoding method of the RFB protocol. This approach not only ensures lower bandwidth usage but also provides a satisfactory user experience.","PeriodicalId":185173,"journal":{"name":"2023 9th International Symposium on System Security, Safety, and Reliability (ISSSR)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133691844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}