{"title":"Ontology-Based Domain Knowledge Construction for Location Based Social Network","authors":"Zhenzhu Fu, Yuanbang Li, Juanjuan Fu","doi":"10.1109/ISSSR56778.2022.00026","DOIUrl":"https://doi.org/10.1109/ISSSR56778.2022.00026","url":null,"abstract":"With the development of mobile applications and location technology, people can share their location and conduct various social activities by mobile phones, which promotes the formation of location-based social network(LBSN). Data from different sources with different formats are generated in LBSN. How to extract knowledge from these data and fuse them together is of great significance to analyze the characteristics of user in LBSN. In this paper, an ontology-based LBSN domain knowledge graph construction method is proposed. Firstly, the data model and ontology of the graph is defined, which includes 8 entities, 11 relations and their related attributes. Then, the construction process of the knowledge graph and the process to merge knowledge extracted from check-in data and the label data is defined. Finally, a case study is conducted to verify the effectiveness of the method. Result shows that the method can construct knowledge graph for LBSN and merge knowledge extracted from multi-source effectively, and the knowledge graph constructed can promote the storage of LBSN domain knowledge and user feature analysis.","PeriodicalId":396707,"journal":{"name":"2022 8th International Symposium on System Security, Safety, and Reliability (ISSSR)","volume":"16 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113989515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ISSSR 2022 Keynote Speech II: Human-Machine Cooperation in Junior Science Education: Development, Opportunities, and Challenges","authors":"Liang Luo","doi":"10.1109/isssr56778.2022.00044","DOIUrl":"https://doi.org/10.1109/isssr56778.2022.00044","url":null,"abstract":"","PeriodicalId":396707,"journal":{"name":"2022 8th International Symposium on System Security, Safety, and Reliability (ISSSR)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126641170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Air Defense Mission Planning of Ship Formation based on Event Network and Monte Carlo Simulation","authors":"Hongquan Shi, Xu Zhang, Ying-chun Chen","doi":"10.1109/ISSSR56778.2022.00016","DOIUrl":"https://doi.org/10.1109/ISSSR56778.2022.00016","url":null,"abstract":"Modern ship formation air defense requires rapid organization of combat resources in the environment of multi-directional high-speed invasion of enemy targets, making full use of interception windows to defense efficiently. Aiming at the characteristics of complex resource combinations and the high requirement of dynamic optimization in this process, to implement global optimization decisions for the overall situation and evolution prediction of air defense, an air defense mission planning method for fleet formation based on an event network model is studied. By defining the type of each element-event in the event graph, the causal relationship between events is determined, the local probability is determined, and the real transition probability between two events is dynamically adjusted. Aiming at the lowest expected cost target, an automatic generation algorithm of air defense mission scheme based on decision event priority allocation and Monte Carlo simulation is designed. The method verification was carried out through the case. The two preferred regulatory algorithms: genetic algorithm and simulation annealing were compared. The results showed that the model proposed can clearly express the battlefield situation, have a global optimization ability for multiple targets, and be interpretable.","PeriodicalId":396707,"journal":{"name":"2022 8th International Symposium on System Security, Safety, and Reliability (ISSSR)","volume":"174 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126942509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey on the Application of Cloud Models in the Reliability of Cloud Environments","authors":"Ruizhe Zhang, Peng Sun, Sikun Tian, Wenqi Liu","doi":"10.1109/ISSSR56778.2022.00037","DOIUrl":"https://doi.org/10.1109/ISSSR56778.2022.00037","url":null,"abstract":"In solving the ambiguous phenomena existing in life, qualitative concepts and quantitative values need to be converted to each other, so a qualitative-quantitative uncertainty model is needed. Cloud model is a kind of uncertainty model for qualitative-quantitative conversion proposed by academician Deyi Li. This paper firstly introduces the background and basic definition of cloud model, summarizes the progress of application of cloud model in controller, data mining, genetic algorithm and other fields, and proves that cloud model can play an important role in qualitative-quantitative conversion problems in different fields. Finally, the advantages and application methods of cloud models in the reliability of cloud environment are introduced.","PeriodicalId":396707,"journal":{"name":"2022 8th International Symposium on System Security, Safety, and Reliability (ISSSR)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121624073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Management System of Library based on Network Security","authors":"Yinggang Zhang, Li Liu, Xuefeng Yang, Yihao Li","doi":"10.1109/ISSSR56778.2022.00009","DOIUrl":"https://doi.org/10.1109/ISSSR56778.2022.00009","url":null,"abstract":"In the traditional library management mode, there are always many problems, such as students' difficulty in finding books, too tedious work of administrator, and low efficiency in management. The utilization of the computer focuses on the book management system can greatly alleviate these problems. However, as the influence of computer network continues to expand, its security problem has been paid more and more attention. Once the application of computer network technology encounters external intrusion or data interception, it will cause certain damage to the personal information security of enterprises or users. This design uses Java to develop a book management system based on network security. It analyzes the factors affecting computer network security, and gives the corresponding countermeasures. The system is designed for ordinary users to add books, query books, modify book information, borrow books and return books. The system interface is concise, and its anti-attack ability is strong. The operation is simple and easy to understand. The management is convenient. And the administrator and the ordinary user is easy to use.","PeriodicalId":396707,"journal":{"name":"2022 8th International Symposium on System Security, Safety, and Reliability (ISSSR)","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116520232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ISSSR 2022 Keynote Speech I: Autonomic Computing in Large-Scale Computing System","authors":"","doi":"10.1109/isssr56778.2022.00008","DOIUrl":"https://doi.org/10.1109/isssr56778.2022.00008","url":null,"abstract":"","PeriodicalId":396707,"journal":{"name":"2022 8th International Symposium on System Security, Safety, and Reliability (ISSSR)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130951274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ziyang Weng, Yidan Hu, Shuhao Wang, Wenhui Wang, Yuhao Liu
{"title":"Mountain Top Algorithm: Complex Historical-Geographic Network Data Analysis based on Structure, Dynamics, and Function","authors":"Ziyang Weng, Yidan Hu, Shuhao Wang, Wenhui Wang, Yuhao Liu","doi":"10.1109/ISSSR56778.2022.00012","DOIUrl":"https://doi.org/10.1109/ISSSR56778.2022.00012","url":null,"abstract":"This paper constructs a social knowledge/genetic algorithm model based on a mathematical approach that always relates the behavior time, behavior distance, and geo-data acquisition quality of all mobility patterns to the overall geographic knowledge evolution process. In order to address the existence of multiple interactions in complex data systems in the social computing domain, such as transportation networks (mountain, geography, and accessibility) under different geo-constraints, including interaction and survival needs in socio-ecological networks, including agro-genetic, demographic, and economic interaction networks, we realize how to find the peaks in the data network, i.e., the few “nuclei” with high connectivity, in the data organization process. The model can be used to identify the nuclei of high connectivity in the data network, and the key role of the nuclei in the effective derivation of social computing, and to algorithmically describe the above behavior. The model can be used both to discover the causes of in situ behavior at the macro level and to provide new solutions for modeling coupled object-event-process data in complex social computing.","PeriodicalId":396707,"journal":{"name":"2022 8th International Symposium on System Security, Safety, and Reliability (ISSSR)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114676479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real-Time Scheduling Algorithm for Mixed-Criticality Systems on Multi-Core Processor Platforms","authors":"Mengmeng Li, Bitao Hu, Kun Xiao, N. Yang","doi":"10.1109/ISSSR56778.2022.00014","DOIUrl":"https://doi.org/10.1109/ISSSR56778.2022.00014","url":null,"abstract":"It is becoming a trend for embedded systems to integrate tasks with different critical levels that were originally deployed in several independent processors into one hardware platforms with multi-core processor. This requires that the operating system can correctly schedule tasks with different critical levels on the multi-core processor, but the traditional real-time operating system can't meet this requirement well. In this paper, we design and implement a real-time scheduler for mixed-criticality systems, which can be used in the microkernel operating system for multi-core processor platforms. In our system, time sensitivity and critical level are decoupled based on task partition policy, time slice misappropriation and temporal isolation mechanism. We also carried out testing and analysis work on the evaluation board for Allwinner T3, and experimental results proves that the function of our scheduling algorithm is correct and the performance is good.","PeriodicalId":396707,"journal":{"name":"2022 8th International Symposium on System Security, Safety, and Reliability (ISSSR)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133265104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data-Driven Quality Monitoring Model for Multi Variety and Small Batch Production Process in Cigarette Spinning","authors":"Yuehua Wu, Xiaoshan Si, Wentao Li","doi":"10.1109/ISSSR56778.2022.00022","DOIUrl":"https://doi.org/10.1109/ISSSR56778.2022.00022","url":null,"abstract":"Since the application of statistical process control (SPC) in production support, the manufacturing field has saved a lot of costs. In recent years, the combination of SPC with multivariate statistics and machine learning has been applied to the detection and diagnosis of industrial process operation and production results. It is one of the most popular fields in the research and practice of statistics. In multivariable quality control (MQC), the use of multivariate statistics for anomaly detection has been deeply studied. The general method is to use the principal component analysis model. Most MQC literatures mainly focus on the monitoring of quality variables and the detection of quality problems. However, conventional MQC methods are difficult to determine the process variables that lead to quality problems. For the multi-variable, non-linear and large delay characteristics of cigarette silk production data, the final product quality control is a very challenging task. This paper proposes a data-driven modeling method for the real-time final product quality prediction model in the multi-variety and small batch process operation.","PeriodicalId":396707,"journal":{"name":"2022 8th International Symposium on System Security, Safety, and Reliability (ISSSR)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125804655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Voice Expression System of Visual Environment for a Guide Dog Robot","authors":"Reiya Ichikawa, Bin Zhang, Hun-ok Lim","doi":"10.1109/ISSSR56778.2022.00041","DOIUrl":"https://doi.org/10.1109/ISSSR56778.2022.00041","url":null,"abstract":"In this paper, a voice expression system of visual environment for a guide dog robot is proposed. This system enables the robot to recognize objects and scenes in front of the robot by CNN (Convolutional Neural Network) and generate captions of the scenes by LSTM (Long-Short-Term Memory) network. Then the robot expresses the recognized visual scene by voice, which is generated by speech synthesis. The guide dog robot can guide the visually impaired person safely to the desired destination, as well as entertain the user by expressing various visual information through voice. The system is composed of object recognition, scene caption, and speech synthesis. The effectiveness of this system is confirmed through experiments conducted with our guide dog robot.","PeriodicalId":396707,"journal":{"name":"2022 8th International Symposium on System Security, Safety, and Reliability (ISSSR)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122629903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}