{"title":"Preliminary Study on the Design Principles of Civil Aircraft Production Flight Test Procedure","authors":"Zhixia Yin, Lafei Le, Dacheng Tian","doi":"10.1109/ISCSIC54682.2021.00015","DOIUrl":"https://doi.org/10.1109/ISCSIC54682.2021.00015","url":null,"abstract":"Analyzed the airworthiness conformity of civil aircraft production flight test (PFT), summarized the purpose of PFT, and clarified the categories of PFT contents on the basis of civil aviation regulations. Summarized the design principles of the civil aircraft PFT procedure (PFTP), put forward suggestions of marking and special items check by comparing two civil aircraft types PFTP of both domestic and foreign. Finally, gave the suggestions of PFT profiles and PFTP writing guides. It can improve the efficiency of PFTPS writing and the expandability between different aircraft types, then improve delivery efficiency.","PeriodicalId":431036,"journal":{"name":"2021 International Symposium on Computer Science and Intelligent Controls (ISCSIC)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127496259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Early Warning Model for Learning based on Bidirectional LSTM","authors":"Yufan Li, Huifu Zhang","doi":"10.1109/ISCSIC54682.2021.00051","DOIUrl":"https://doi.org/10.1109/ISCSIC54682.2021.00051","url":null,"abstract":"In this paper, we proposed a methodology and a model for identifying at-risk students. Our model is based on a deep bidirectional long short-term memory network(deep BiLSTM) and we applied it to the data from 2032 students. We carried out 2 experiments to predict students achievement at different steps of the semester, to test three data balancing techniques and to compare our model versus two classical classification algorithms. Results showed that our model was capable of identifying at-risk students at the middle of the semester and trustworthy to be an early warning model.","PeriodicalId":431036,"journal":{"name":"2021 International Symposium on Computer Science and Intelligent Controls (ISCSIC)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126197065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Khan, N. Shiwakoti, P. Stasinopoulos, M. Warren
{"title":"Security assessment in Vehicle-to-Everything communications with the integration of 5G and 6G networks","authors":"S. Khan, N. Shiwakoti, P. Stasinopoulos, M. Warren","doi":"10.1109/ISCSIC54682.2021.00037","DOIUrl":"https://doi.org/10.1109/ISCSIC54682.2021.00037","url":null,"abstract":"In Vehicle-to-Everything Communications (V2X-C), the integration of high throughput, reduced latency-5G and Artificial Intelligence (AI) enabled-6G would add new levels to smart mobility. However, it would introduce a multitude of new vulnerabilities in the form of cyber-attacks. Therefore, a robust V2X-C cyber-safe framework that considers cross-industry information-sharing mechanisms must be proactively developed and evaluated. This study aims to provide a comprehensive security assessment in V2X-C with the integration of 5G and 6G networks. The evolution of V2X-C is outlined and vehicular connectivity in a consolidated manner is demonstrated, visualising all communication interfaces. The Quality of Service (QoS) vs. security provisions for next-generation cars is illustrated. The security and privacy challenges that would be evident after the convergence of the 5G and 6G networks in V2X-C architecture is then described. Lastly, state-of-the-art V2X-C security enhancement mechanisms for a cyber-safe ITS operation is detailed. It is believed that the findings and discussions from this study could be used for decision-making and would stimulate a roadmap for a secure V2X-C architecture.","PeriodicalId":431036,"journal":{"name":"2021 International Symposium on Computer Science and Intelligent Controls (ISCSIC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122083770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"HCT: A Hybrid Algorithm for Influence Maximization Problem Based on Community Detection and TOPSIS","authors":"Yuening Liu, Q. Liqing, Chengai Sun","doi":"10.1109/ISCSIC54682.2021.00067","DOIUrl":"https://doi.org/10.1109/ISCSIC54682.2021.00067","url":null,"abstract":"The influence maximization problem is to find a subset of nodes in the social networks for the purpose of maximizing the number of nodes that the subset of nodes can influence. The influence maximization problem is an open issue in the analysis of the social networks. Many algorithms have been proposed to solve this problem. However, most existing algorithms usually do not have an acceptable accuracy or efficiency. Therefore, this paper proposes a new algorithm as a tradeoff between the accuracy and efficiency, called A Hybrid Algorithm Based on Community Detection and TOPSIS (HCT). The HCT algorithm proposes two new metrics based on the community detection to evaluate the influence of a node, called Direct Influence between Communities (BDS), Indirect Influence between Communities (BIDS), respectively. Moreover, The Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) is used to identify the most influential nodes. Furthermore, the entropy weight method is used to overcome the shortcoming of the TOPSIS method, which can also improve the accuracy of the proposed algorithm. The experimental results on six realworld networks show the proposed algorithm have a better accuracy and efficiency than the comparison algorithms.","PeriodicalId":431036,"journal":{"name":"2021 International Symposium on Computer Science and Intelligent Controls (ISCSIC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128573131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bo Zheng, Jie Shen, Liang He, Tao Hu, Tao Cao, Muzi Li
{"title":"A Method for Slope Detection of Planetary Surface in The Autonomous Obstacle Avoidance of Planetary Rover","authors":"Bo Zheng, Jie Shen, Liang He, Tao Hu, Tao Cao, Muzi Li","doi":"10.1109/ISCSIC54682.2021.00075","DOIUrl":"https://doi.org/10.1109/ISCSIC54682.2021.00075","url":null,"abstract":"Planetary rover is the most efficient way to explore planets. The exploration area of planetary rover is a complex and unfamiliar environment. Planetary rover needs to perceive surrounding terrain and obstacle information clearly so as to ensure that the planetary rover can effectively and accurately perform autonomous obstacle avoidance and path planning in the unfamiliar environment. There is a problem that the slope is misjudged as an obstacle in autonomous obstacle avoidance, which leads to wrong planning decision. Meanwhile the passable area is treated as restricted area. Therefore, it is necessary to detect and estimate slope and identify the slope passing ability of planetary rover. A method for slope detection of planetary surface in the autonomous obstacle avoidance of planetary rover is presented in this paper. The down-sampling of original point cloud is processed by voxel mesh filtering. Meanwhile the real time 3D point cloud of large-scale planetary surface is clipped and segmented. The ground and obstacle are separated by local ground plane fitting estimation. Then slopes are calculated and classified, through which the slope above the threshold is reserved as obstacle and the slope below the threshold is set as passable area. The method presented in this paper is able to detect and classify the slope accurately in real time, which is shown in the simulation results.","PeriodicalId":431036,"journal":{"name":"2021 International Symposium on Computer Science and Intelligent Controls (ISCSIC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122236081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research and Event Control on Risk Factors of Auto Insurance Claim","authors":"Ma Xin, Hang Li, Yingnan Liu","doi":"10.1109/ISCSIC54682.2021.00060","DOIUrl":"https://doi.org/10.1109/ISCSIC54682.2021.00060","url":null,"abstract":"With the formal implementation of the “Guiding Opinions on Implementing the Comprehensive Reform of Auto Insurance”, the average reduction in premiums paid by vehicles across the country is about 27%. Under the condition of stable compensation level, the decrease of earned premium leads to the increase of comprehensive compensation ratio, which leads to the further increase of comprehensive cost ratio of auto insurance business and the increasing difficulty of making profit of auto insurance business. Therefore, in order to reduce the overall cost rate, auto insurance companies need to strengthen the risk management and control of auto insurance claims expenditures, and reduce economic losses due to fraud cases or human causes. This article first uses the fusion of the AHP-DEMATEL method and the entropy method to study, analyze and evaluate the risk factors of auto insurance claims, and establish the linkage correspondence between risk factors and risk management; then based on the improved compound event processing model, The risk events that trigger risk factors are captured to achieve real-time management and control of risk events; finally, combined with the weight score of the risk factor, the risk score evaluation of the claim case and the risk control score of the auto insurance business under the action of the risk factor can be formed.","PeriodicalId":431036,"journal":{"name":"2021 International Symposium on Computer Science and Intelligent Controls (ISCSIC)","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124187641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Authentication as A Service Based on Shamir Secret Sharing","authors":"Andrea Bissoli, Fabrizio d'Amore","doi":"10.1109/ISCSIC54682.2021.00072","DOIUrl":"https://doi.org/10.1109/ISCSIC54682.2021.00072","url":null,"abstract":"We consider a solution for securing the classical password-based authentication scheme, because in many cases this type of authentication is given as a requirement. Our solution is based on the well-known $(k,n)$ threshold scheme of Shamir for sharing a secret, where in our case the secret is the password itself and $(k, n)$ threshold scheme means that $n$ password-derived secrets (shares) are created and $kleq n$ shares are necessary and sufficient for reconstructing the password, while $k-1$ are not sufficient. The scheme is information-theoretic secure. We improve the approach so that the password is one-time. Since each of the $n$ shares is stored on a different host (Shareholder), an attacker will need to compromise $k$ different Shareholders for obtaining an amount of data sufficient for reconstructing the secret. Furthermore, to be resistant to the compromising of the server (Dealer) coordinating the Shareholders, we define a variant of the classic Shamir, where the Shamir's abscissas are unknown to Dealer and Shareholders, making the reconstruction impossible even in the case of Dealer and Shareholders compromised. In addition, we apply the Pedersen method for allowing the verification of shares. For the described scenario we have designed two protocols allowing the communication between application, Dealer and Shareholders, so that the relevant players can participate in the phases of registration (users sign-up, to be carried out once), and of authentication (users login). We analyse several scenarios where Dealer and/or Shareholders are partially/totally compromised and confirm that none of them is enabling the attacker to break the authentication. Furthermore we focus on cases where one or more byzantine servers are presented, analysing the impact on the authentication and show the adopted mechanisms to be secure against these kinds of attacks. We have developed a prototype demonstrating that our method works correctly, effectively and efficiently. It provides a first feasibility study that will provide a base for structured and engineered cloud-based implementations aiming at providing what we call an authentication-as-a-service.","PeriodicalId":431036,"journal":{"name":"2021 International Symposium on Computer Science and Intelligent Controls (ISCSIC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129435149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mark Benedict D. Jarabese, Charlie S. Marzan, Jenelyn Q. Boado, Rushaine Rica Mae F. Lopez, Lady Grace B. Ofiana, Kenneth John P. Pilarca
{"title":"Sign to Speech Convolutional Neural Network-Based Filipino Sign Language Hand Gesture Recognition System","authors":"Mark Benedict D. Jarabese, Charlie S. Marzan, Jenelyn Q. Boado, Rushaine Rica Mae F. Lopez, Lady Grace B. Ofiana, Kenneth John P. Pilarca","doi":"10.1109/ISCSIC54682.2021.00036","DOIUrl":"https://doi.org/10.1109/ISCSIC54682.2021.00036","url":null,"abstract":"Sign Language Recognition is a breakthrough for helping deaf-mute people and has been studied for many years. Unfortunately, every research has its own limitation and are still unable to be used commercially. In this study, we developed a real-time Filipino sign language hand gesture recognition system based on Convolutional Neural Network. A manually gathered dataset consists of 237 video clips with 20 different gestures. This dataset underwent data cleaning and augmentation using image pre-processing techniques. The Inflated 3D convolutional neural network was used to train the Filipino sign language recognition model. The experiments considered retraining the pretrained model with top layers and all layers. As a result, the model retrained with all layers using imbalanced dataset was shown to be more effective and achieving accuracy up to 95% over the model retrained with top layers to classify different signs or hand gestures. Using the Rapid Application Development model, the Filipino sign language recognition application was developed and assessed its usability by the target users. With different parameters used in the evaluation, the application found to be effective and efficient.","PeriodicalId":431036,"journal":{"name":"2021 International Symposium on Computer Science and Intelligent Controls (ISCSIC)","volume":"435 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132493827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Marta Plaza-Hernández, Inés Sittón-Candanedo, R. Alonso, Luis C. Martínez-de Iturrate, Javier Prieto, K. Kravari, T. Kosmanis, George Katranas, Miguel P. Silva, J. Corchado
{"title":"Edge Computing and Internet of Things Based Platform to Improve the Quality of Life of the Silver Economy on Leisure Cruise Ships","authors":"Marta Plaza-Hernández, Inés Sittón-Candanedo, R. Alonso, Luis C. Martínez-de Iturrate, Javier Prieto, K. Kravari, T. Kosmanis, George Katranas, Miguel P. Silva, J. Corchado","doi":"10.1109/ISCSIC54682.2021.00038","DOIUrl":"https://doi.org/10.1109/ISCSIC54682.2021.00038","url":null,"abstract":"Today, the Internet of Things, Big Data and Machine Learning are a regular part of people's daily lives, especially for the elderly or the so-called Silver Economy. There are more and more applications in which collecting and storing information about users (and their context) to produce classifications and predictions allows the optimisation of the services offered, improving the life quality of the citizens. In this sense, leisure cruises represent environments where it is necessary to provide quality services for a reasonable price. This requires understandings the behaviour of users both locally (i.e. each cruise) and globally (i.e. all cruises). In this respect, IoT, Big Data and Machine Learning are presented as ideal technologies for prediction-making and the improvement of the quality of services. However, on ships at sea the transfer rate of the Internet connection is limited. In this sense, Edge Computing allows taking part in the application computing to the Edge of the network, closer to the IoT layer. Data can be filtered and pre-processed in the Edge before it is transmitted to the Cloud, reducing its volume and the associated costs of its computing and storage in the Cloud. Machine Learning algorithms can also be applied to recognise patterns and anomalies on the Edge itself, even if the connectivity with the Cloud is lost. In this paper, we propose the design of a platform which aims to improve the quality of life of the elderly on leisure cruises.","PeriodicalId":431036,"journal":{"name":"2021 International Symposium on Computer Science and Intelligent Controls (ISCSIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132085053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Itxaro Errandonea, Jon Goya, Unai Alvarado, Sergio Beltrán, S. Arrizabalaga
{"title":"IoT Approach for Intelligent Data Acquisition for Enabling Digital Twins in the Railway Sector","authors":"Itxaro Errandonea, Jon Goya, Unai Alvarado, Sergio Beltrán, S. Arrizabalaga","doi":"10.1109/ISCSIC54682.2021.00039","DOIUrl":"https://doi.org/10.1109/ISCSIC54682.2021.00039","url":null,"abstract":"The concept of Digital Twin (DT) is an emerging technology in several industries. Applications such as predictive maintenance make technologies such as IoT (Internet of Things) essential. The main objective of this paper is to present a new approach based on IoT technology for intelligent data acquisition for the generation of a DT in the railway industry. This approach is proposed to support the SIA European H2020 project, which aims to provide an on-board system for maintenance prediction in passenger trains. For instance, a detailed description of the system requirements, communication technologies and functionalities adopted by the presented proposal is made. In addition, the conclusions and future work on the project are identified.","PeriodicalId":431036,"journal":{"name":"2021 International Symposium on Computer Science and Intelligent Controls (ISCSIC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125540364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}