{"title":"Cloud Scheduling System Considering Reliability and Co-Resident Attack","authors":"Yuxi Peng, Xiwei Qiu, Peng Sun","doi":"10.1109/ISSSR56778.2022.00029","DOIUrl":"https://doi.org/10.1109/ISSSR56778.2022.00029","url":null,"abstract":"For developing an efficient job assignment and resource management mechanism considering reliability and cost, this paper proposed a biologically-inspired technology - Bionic Cloud Scheduling System (BCSS). The BCSS is designed to consist of a global job assignment agent, multiple local resource management agents, and large-scale infrastructure. The primary innovation of the BCSS is that it takes the global agent, local agents, and infrastructure as the brain, autonomous nerves, and cyber neurons, respectively. Meanwhile, this paper also presents a realization of the BCSS. Cyber neurons are realized as theoretical models evaluating reliability and service performance while capturing co-resident attack factors in real-time. The autonomous nerve processes an autonomic resource management mechanism to achieve dynamic balances between reliability and cost. The brain is capable of job assignment to ensure global optimization on an object of minimizing penalty and cost. Experimental results illustrated the important correlation between reliability and co-resident attack factors. It also demonstrated that the BCSS could optimize a perception metric related to reliability, co-resident attacks and cost factors.","PeriodicalId":396707,"journal":{"name":"2022 8th International Symposium on System Security, Safety, and Reliability (ISSSR)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115278805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Multi-Objective Dynamically Optimized Fleet Algorithm for Misty Fields Exploration","authors":"Ziyang Weng, Shuhao Wang","doi":"10.1109/ISSSR56778.2022.00015","DOIUrl":"https://doi.org/10.1109/ISSSR56778.2022.00015","url":null,"abstract":"The Fleet algorithm is a new meta-heuristic swarm intelligence algorithm inspired by the behavior of fleet exploring unknown regions, collecting and distributing geo-data and deciding on global voyage data acquisition in the Age of Discovery. To address the problem of solving the optimal path for multi-objective path planning in the exploration of the misty aread, this paper proposes and constructs a dynamic path planning model for a fleet of ships exploring global route geo-data. The global optimal path can be effectively planned by fitting the algorithm model description with the historical archival data for deduction.","PeriodicalId":396707,"journal":{"name":"2022 8th International Symposium on System Security, Safety, and Reliability (ISSSR)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121903679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pan Liu, Yihao Li, Xuankui Zheng, Shili Ai, W. Zhang
{"title":"Design of Four Web Crawlers based on Python","authors":"Pan Liu, Yihao Li, Xuankui Zheng, Shili Ai, W. Zhang","doi":"10.1109/ISSSR56778.2022.00040","DOIUrl":"https://doi.org/10.1109/ISSSR56778.2022.00040","url":null,"abstract":"The data on websites is an important source of data for both big data analysis and machine learning. Due to the limitation of data crawling on some websites, the general web crawler will be invalid. To facilitate the crawling of data in websites with different structures, this paper introduces four types of web crawlers. Then, based on some third party libraries developed for Python, the corresponding Python programs are designed respectively for these four web crawlers. This paper provides a technical guide for those researchers who want to construct web crawlers quickly.","PeriodicalId":396707,"journal":{"name":"2022 8th International Symposium on System Security, Safety, and Reliability (ISSSR)","volume":"125 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131933040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ziyang Weng, Wenhui Wang, Ziyu Zhang, Biyi Dai, Yuhao Liu
{"title":"Underwater Pier Algorithm: Nested Civilizations and Complex Economies in a Multilayered Trade Network in Historical Geographical Perspective","authors":"Ziyang Weng, Wenhui Wang, Ziyu Zhang, Biyi Dai, Yuhao Liu","doi":"10.1109/ISSSR56778.2022.00013","DOIUrl":"https://doi.org/10.1109/ISSSR56778.2022.00013","url":null,"abstract":"Underwater Pier Algorithm (UPA) is a new meta-heuristic swarm intelligence algorithm based on differential evolution algorithm that takes into account the whole process of geo-data infrastructure, trading behavior, road network generation, and city construction in the process of social computing, by constraining the behavior of trading routes, trade kinds of data conditions and expansion laws, social mechanisms that attract data exchange and sharing, data normative standard establishment and the process of common knowledge evolution. The proposed algorithm can realize the organization category, classification index and alternative metric calculation of node data resources by testing the function, so as to realize the analysis observation of core nodes in multi-layer trade networks, significant improvement on the inference ability for local events, fast convergence, strong global search ability and high solution accuracy.","PeriodicalId":396707,"journal":{"name":"2022 8th International Symposium on System Security, Safety, and Reliability (ISSSR)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133598342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Semi-Quantitative Method of Safety Resilience Assessment for Airport Operation System based on FRAM Model","authors":"Jiuxia Guo, Hongyi Li, Changqi Yang","doi":"10.1109/ISSSR56778.2022.00010","DOIUrl":"https://doi.org/10.1109/ISSSR56778.2022.00010","url":null,"abstract":"With the development of civil aviation, the airport system has gradually developed into a highly complex and intelligent soci-technology system. In order to enhance the ability of the airport system to resist emergencies, a safety resilience management framework model for airport operation system based on resilience theory is proposed, which includes pre-during-post stage of accident/incident events. Additionally, this paper mainly constructs a method of the safety resilience loss assessment for airport operation system based on FRAM model with unsafety event of the corridor bridge as a study. The method is used to assess the level of the safety resilience loss of the airport operation system and through the coupling analysis between the elements of the FRAM model the FRAM damping model is obtained. This assessment of airport safety resilience loss verifies the feasibility of this model and provides a new method for solving the multi-factor coupling influence problem of current airport safety research. This method helps managers evaluate the emergency response capabilities of each subsystem in the airport system and contributes to the promotion of safety resilience of airport systems.","PeriodicalId":396707,"journal":{"name":"2022 8th International Symposium on System Security, Safety, and Reliability (ISSSR)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132673953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improvement of Problem Management Process of Combat Software Engineering","authors":"Rui Li, Yuxuan Yan","doi":"10.1109/isssr56778.2022.00024","DOIUrl":"https://doi.org/10.1109/isssr56778.2022.00024","url":null,"abstract":"As the core of warships, the problem of combat software is not terrible. The terrible thing is that after finding the problem, it does not solve the problem quickly and effectively.[1] In order to solve the problem of combat software quickly and effectively, this paper improves the problem management method of combat software and puts forward an improved method of problem management, which can effectively solve the problem of combat software.","PeriodicalId":396707,"journal":{"name":"2022 8th International Symposium on System Security, Safety, and Reliability (ISSSR)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127459623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xianteng Gu, Yong Xiao, Zhongyuan Hua, Huan Jin, Bangchao Wang
{"title":"A Novel Approach for Constructing Intangible Cultural Heritage Knowledge Graphs","authors":"Xianteng Gu, Yong Xiao, Zhongyuan Hua, Huan Jin, Bangchao Wang","doi":"10.1109/ISSSR56778.2022.00025","DOIUrl":"https://doi.org/10.1109/ISSSR56778.2022.00025","url":null,"abstract":"The existing intangible cultural heritage knowledge exists in different data formats such as structured, semi-structured and unstructured. It is stored in a variety of ways and cannot be used effectively. How to reasonably store intangible cultural heritage knowledge, improve the singleness of knowledge form, better retrieve knowledge and provide relevant services have become the main problems. In order to alleviate these problems, this paper constructs the intangible cultural heritage knowledge graph (KG), which provides a set of KG construction paradigm for the intangible cultural heritage field. The intangible cultural heritage knowledge is crawled by the crawler, stored in the graph database, and the intelligent question answering (IQA) system is realized by using the matching algorithm. The intangible cultural heritage KG spectrum is successfully constructed. The results show that the method proposed in this paper is effective and has certain scalability and popularization.","PeriodicalId":396707,"journal":{"name":"2022 8th International Symposium on System Security, Safety, and Reliability (ISSSR)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128719244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Graph Convolutional Network with Two Types of Weight Mechanisms for Aspect-Based Sentiment Analysis","authors":"Zhiming Xiao, Liansong Zong, Minchao Ban, F. Zhao","doi":"10.1109/ISSSR56778.2022.00038","DOIUrl":"https://doi.org/10.1109/ISSSR56778.2022.00038","url":null,"abstract":"In this paper, we propose an approach to leverage inter aspects relation and Rely Graph Convolutional Networks (RelyGCN) for aspect sentiment analysis. More specifically, an ordinary dependency graph is first constructed for each sentence over the dependency tree. Then we extract aspects by L-Layer GCNs and construct their relation. Finally, we will predict the sentiment polarity (negative, neutral and positive) of the sentence S towards the aspect A by the feature fusing layer and the output layer.","PeriodicalId":396707,"journal":{"name":"2022 8th International Symposium on System Security, Safety, and Reliability (ISSSR)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130813133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Message from the Symposium Chairs: ISSSR 2022","authors":"","doi":"10.1109/isssr56778.2022.00005","DOIUrl":"https://doi.org/10.1109/isssr56778.2022.00005","url":null,"abstract":"","PeriodicalId":396707,"journal":{"name":"2022 8th International Symposium on System Security, Safety, and Reliability (ISSSR)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127844105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multitype2pajek: An Improved Tool for Typical Relational Data Pre-Processing","authors":"Yang Deng, Hongyan Wan, Huan Jin, Xinyi Lan","doi":"10.1109/ISSSR56778.2022.00018","DOIUrl":"https://doi.org/10.1109/ISSSR56778.2022.00018","url":null,"abstract":"Before applying social network analysis tools, data needs to be pre-processed. However, current mainstream data pre-processing tools suffer from file type restrictions, messy formatting, functional flaws and system incompatibility. To alleviate these problems, this paper improves on existing tools by providing a pre-processing tool called Multitype2pajek, with new file formats, multi-layer network layout features, etc. The tool has been validated in case studies. The results show that the tool is effective in alleviating the above problems and has a certain degree of generalizability.","PeriodicalId":396707,"journal":{"name":"2022 8th International Symposium on System Security, Safety, and Reliability (ISSSR)","volume":" 26","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114051633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}