{"title":"Ontological Model of an Electronic Archive Document","authors":"A. Zarubin, A. Koval, V. Moshkin","doi":"10.1145/3397056.3397065","DOIUrl":"https://doi.org/10.1145/3397056.3397065","url":null,"abstract":"The task of semantic structuring and extracting the necessary knowledge from large electronic archives when making management decisions is very urgent. This work presents an ontological model of a project document and an algorithm for classifying a large amount of unstructured information in an electronic archive. The work also presents the results of experiments on data from the electronic archive of the Federal Scientific and Practical Center MARS. The experimental results show the effectiveness of the developed models and algorithms.","PeriodicalId":365314,"journal":{"name":"Proceedings of the 2020 3rd International Conference on Geoinformatics and Data Analysis","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115772566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research and Design of the Mutual Aid Tokenized Economy Structure Based on Blockchain Technology: Taking Time Bank as an Example","authors":"Qing Xu, Feng Liu, Zilong Xiao","doi":"10.1145/3397056.3397086","DOIUrl":"https://doi.org/10.1145/3397056.3397086","url":null,"abstract":"In the current time bank system, problems such as difficult time token to circulate, difficult to trust data, and insecure data exist. In order to solve these problems, a design and implementation of a time bank system architecture based on blockchain technology is proposed. Firstly, analyze the business process of the time bank system and draw the use case diagram; then layer the overall architecture of the system: the application interface layer and the blockchain layer; then carry out a detailed architecture design, including the division of system functional modules: login registration module, publishing service requirements module, accepting service requirements module, managing service recipients, performing public service module, token management module, and drawing the main function flow chart of the system, and the design of the table in the server database of the system. The time bank system based on blockchain technology reduces the difficulty of time token flow, realizes data tamper-resistance through timestamp technology, distributed storage guarantees data security, and reduces the difficulty of time banking system operation.","PeriodicalId":365314,"journal":{"name":"Proceedings of the 2020 3rd International Conference on Geoinformatics and Data Analysis","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126087716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on the Deduction of Flood Situation in Yangtze River Basin Based on Virtual Earth","authors":"Rui Ma, Lingyan Dong, Chengkun Liu","doi":"10.1145/3397056.3397080","DOIUrl":"https://doi.org/10.1145/3397056.3397080","url":null,"abstract":"Flood disaster is one of the natural disasters with high frequency and wide range of harm in the world. The loss caused by flood can be effectively eliminated or reduced through the rational utilization of water conservancy projects for scientific dispatching. The occurrence, development and dispatching of flood is a dynamic process, and the visualization of flood control situation is an important means to study the internal change law of flood disaster. Based on the actual requirements of large-scale flood dispatching and flood deduction in the basin, this paper develops a 3D virtual earth-ark platform (3DGIS-Ark) and constructs a 3D visualization system architecture of flood control situation deduction, aiming at the characteristics of large data volume, multi-dimensional multi-scale and dynamic simulation in the basin. Combined with the operational characteristics of flood deduction, the paper focuses on the seamless integration of massive data and 3D roaming, 3D flood control situation deduction and disaster loss estimation. The system software has been successfully applied to the flood control situation of the Yangtze river basin, giving full play to the advantages of 3DGIS analysis and 3D display.","PeriodicalId":365314,"journal":{"name":"Proceedings of the 2020 3rd International Conference on Geoinformatics and Data Analysis","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122034279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Real Data Based Carrier-to-Noise Density Ratio Evaluation of GNSS Signal in Interference Environment","authors":"Zukun Lu, Yuchen Xie, Honglei Lin, Feiqiang Chen","doi":"10.1145/3397056.3397063","DOIUrl":"https://doi.org/10.1145/3397056.3397063","url":null,"abstract":"The radio frequency interference has become a rising problem to the signal of Global Navigation Satellite System (GNSS). Many researchers have analyzed the impact of interferences, and the effective Carrier-to-Noise density ratio (C/N0) of receivers after post-correlation has been deduced in theory. However, few outdoor tests have been done to verify the theory of jamming impact because it is illegal to broadcast high-power interference in open area. In this paper, an outdoor experiment as well as the data analysis is presented to compare the performances of GNSS signals under jamming with their theoretical performances, including the signals of Global Position System and BeiDou system. The real data result shows that the software defined receiver can maintain its tracking loop under the Jamming-to-Signal power ratio up to 45dB in the test condition, and the descending trend of real data C/N0 matches the theoretical curve of effective C/N0.","PeriodicalId":365314,"journal":{"name":"Proceedings of the 2020 3rd International Conference on Geoinformatics and Data Analysis","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130354203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research of Global Strategic Cyberspace Security Risk Evaluation System Based on Knowledge Service","authors":"Chunhui Hu, Ling Zhang, Xian Luo, Jianfeng Chen","doi":"10.1145/3397056.3397084","DOIUrl":"https://doi.org/10.1145/3397056.3397084","url":null,"abstract":"In recent years, cyberspace has been formed and is continuously developing. It has fundamentally revolutionized the mechanism by which information is disseminated and utilized, in order to be closely involved in the physical world and human activities. However, from global perspective, factors such as the continuously increasing complexity of structure and function of cyberspace, the rising benefits from both economic and political aspects, the exposing of inherent vulnerabilities have all contributed to even severe security threats and risks targeting cyberspace, which have become a key factor in national security in the challenging situations. Strategic cyberspace risks are different kinds of core, structural and systematic risk that if were neglected to prevent and control, significant damage to cyberspace will be dealt and cause great economic loss. Aiming at exploring new ways and tackling with such strategic threats, the concept, elements and relationship between tactical and strategic risk in cyberspace was studied. A knowledge-based cyberspace strategic risk warning and assessment system with four data-driven layers was built, and two scenarios of heartbleed and Teamviewer vulnerability event are investigated to suggest possible use cases for our system.","PeriodicalId":365314,"journal":{"name":"Proceedings of the 2020 3rd International Conference on Geoinformatics and Data Analysis","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121412678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"From Spatial Demographic Data Analysis towards Population Atlases","authors":"V. Voženílek","doi":"10.1145/3397056.3397081","DOIUrl":"https://doi.org/10.1145/3397056.3397081","url":null,"abstract":"The paper aims to interconnect arguments for extending spatial demography methods by spatial synthesis techniques leading to systematic visualization in the form of thematic maps in population atlases. The paper also aims to bring together experts of demography, cartography and geoinformation technologies. Academicians, scientists and industrialists are involved for knowledge sharing, exchange of ideas, collaborations and presentation of their research outcomes in spatial data analysis in demography and cartography.","PeriodicalId":365314,"journal":{"name":"Proceedings of the 2020 3rd International Conference on Geoinformatics and Data Analysis","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117274963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Afanasyev, N. Voit, M. Ukhanova, S. Kirillov, S. Bochkov
{"title":"Ontology-Based Organizational and Technical Components Semantic Model Development","authors":"A. Afanasyev, N. Voit, M. Ukhanova, S. Kirillov, S. Bochkov","doi":"10.1145/3397056.3397089","DOIUrl":"https://doi.org/10.1145/3397056.3397089","url":null,"abstract":"Authors propose ontology-based semantic model of product and a scheme of design solutions semantic model synthesis. Methods of data extraction from product lifecycle management (PLM) systems on the example of Loodsman-PLM and developed product verification in accordance with requirements are proposed by authors. The workflow design of complex technical products is described in this article. There are examples.","PeriodicalId":365314,"journal":{"name":"Proceedings of the 2020 3rd International Conference on Geoinformatics and Data Analysis","volume":"8 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122282190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhengjun Liu, Zhi Sun, Jianfeng Chen, Yujing Zhou, Tao Yang, Hui Yang, Jie Liu
{"title":"STIX-based Network Security Knowledge Graph Ontology Modeling Method","authors":"Zhengjun Liu, Zhi Sun, Jianfeng Chen, Yujing Zhou, Tao Yang, Hui Yang, Jie Liu","doi":"10.1145/3397056.3397083","DOIUrl":"https://doi.org/10.1145/3397056.3397083","url":null,"abstract":"Network security incidents are complex and unstructured, making them difficult to understand and share. In this paper, we analyzes the commonality between structured threat information representation (STIX) and network security domain knowledge, and proposes a knowledge graph ontology modeling method of network security based on STIX. With the architecture knowledge of STIX, this method generates an ontology schema of network security knowledge graph, through classifying the concepts in the field of network security, describing the attributes of concepts and combing the relationships between concepts. The ontology schema has small redundancy and strong structural hierarchy, and can clearly display the structure of the attack activity and the mutual relationship. Therefore, it can help decision makers to understand security incidents more deeply, and help them make reasonable decisions and share cyber threat intelligence.","PeriodicalId":365314,"journal":{"name":"Proceedings of the 2020 3rd International Conference on Geoinformatics and Data Analysis","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123119132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Low Cost Technique of Enhancement Georeferencing for UAV Linear Projects","authors":"Elsheshtawy M. Amr, G. Larisa, Elshewy A. Mohamed","doi":"10.1145/3397056.3397070","DOIUrl":"https://doi.org/10.1145/3397056.3397070","url":null,"abstract":"Global positioning System (GPS) on Unmanned Aerial Vehicles (UAV) platform depend on MEMS (Micro Electro Mechanical Systems) technology with 10 m accuracy at UAV camera position at shooting time. However, obstacles to GPS signal at the finest flight altitude might avoid accurate retrieval of camera station positions. The aim of this investigation is getting accurate photogrammetric products in UAV linear projects by improving the georeferencing, using a little number of Ground Control Points (GCPs) in a small part and improved camera station positions. This technique is low cost and helpful in disasters especially in projects that cannot be distributing GCPs all over it. DJI PHANTOM 4 PRO acquired 390 images in three flight lines with average flight altitude about 40 m along 1000 m length of study area. The ground sample distance (GSD) is about 1.2 cm. The average end lap and side lap are about 80%. The dimension of area covered by this area is 1000 m by 90 m. Methodology of enhancement GPS auxiliary data is by using Linear Relation (LR) model. In LR model, correlation for the same specified images between the auxiliary by GPS on UAV platform and computed photo centers coordinates through georeferencing using a little of GCPs in small part of project has been determined. The specified images only contained GCPs, which are used in georeferencing. Moreover, using LR model to generate new coordinate values for the rest images to use them in georeferencing. The errors assessment was done using 86 checkpoints (CPs) not used in georeferencing distributed all over the study area. The using of the generated photo centers coordinates by LR model with the four GCPs gives accurate results in georeferencing better than using only the same four GCPs.","PeriodicalId":365314,"journal":{"name":"Proceedings of the 2020 3rd International Conference on Geoinformatics and Data Analysis","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128960685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Multi-factor Regression Estimation Model of Above-ground Carbon Storage in Forest Park","authors":"Xiaofang Wu, Xiaoni Feng, Decai Shen","doi":"10.1145/3397056.3397066","DOIUrl":"https://doi.org/10.1145/3397056.3397066","url":null,"abstract":"Considering the distribution of carbon storage of forests has the characteristics of spatial correlation and spatial heterogeneity, above-ground carbon storage is related with not only the characteristics of tree species but also of spatial position and spatial relationships. Therefore, in this paper the study focuses on six factors of spatial terrain and tree characteristics, which are used to build the estimation model of carbon storage. The research region is Dalingshan Forest Park in Dongguan City. The carbon storage is considered as the dependent variable. The six factors of terrain and tree characteristics, such as slope, elevation, tree height, crown density, tree diameter, and tree age, are considered as the independent variables. The relationship and model between the carbon storage and the six factors are researched by the method of regression analysis. By non-linear regression analysis, the estimation models of carbon storage are built based on the six factors. By using the non-linear regression model, the carbon storage of every compartment in Dalingshan Forest Park is estimated then visualized by means of thematic map.","PeriodicalId":365314,"journal":{"name":"Proceedings of the 2020 3rd International Conference on Geoinformatics and Data Analysis","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127956550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}