Pub Date : 1900-01-01DOI: 10.18178/wcse.2020.06.023
{"title":"Identification and Analysis of Radio Monitoring Service Based on the Meet-in-the-Middle Strategy","authors":"","doi":"10.18178/wcse.2020.06.023","DOIUrl":"https://doi.org/10.18178/wcse.2020.06.023","url":null,"abstract":"","PeriodicalId":292895,"journal":{"name":"Proceedings of 2020 the 10th International Workshop on Computer Science and Engineering","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115603944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.18178/wcse.2020.06.070
{"title":"An Artificial Intelligent and Big Data Research Platform Based on Jupyter Notebook","authors":"","doi":"10.18178/wcse.2020.06.070","DOIUrl":"https://doi.org/10.18178/wcse.2020.06.070","url":null,"abstract":"","PeriodicalId":292895,"journal":{"name":"Proceedings of 2020 the 10th International Workshop on Computer Science and Engineering","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127504681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.18178/wcse.2020.06.021
{"title":"Research on Vehicle Detection Algorithm based on Haar-like and CNN","authors":"","doi":"10.18178/wcse.2020.06.021","DOIUrl":"https://doi.org/10.18178/wcse.2020.06.021","url":null,"abstract":"","PeriodicalId":292895,"journal":{"name":"Proceedings of 2020 the 10th International Workshop on Computer Science and Engineering","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125433957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.18178/wcse.2020.02.005
{"title":"Real-time Big Data Analytics for Feature Selection on Apache Spark","authors":"","doi":"10.18178/wcse.2020.02.005","DOIUrl":"https://doi.org/10.18178/wcse.2020.02.005","url":null,"abstract":"","PeriodicalId":292895,"journal":{"name":"Proceedings of 2020 the 10th International Workshop on Computer Science and Engineering","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123423761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
: In recent years, the building of the conventional airport tower is usually difficult and costly because of the complicated terrain in remote areas. Moreover, at feeder airport is facing with the problem of controllers shortage. It leads that the remote tower technology has been rapidly developed. The remote tower uses a panoramic display instead of an external view to provide remote air traffic control services. It is necessary to evaluate the satisfaction of safety requirements before the remote tower is put into operation. In this paper, the overall framework of the remote tower is firstly constructed. Secondly, a series of hazard sources are identified and a risk analysis assessment method is proposed in which the risk possibility/severity matrix is carried out to get the outputs. Finally, the responding releasing method are proposed based on the results of the mentioned risk analysis. The results of this work provide a theoretical basis for the implementation of remote tower constrained with the regulation of CAAC.
{"title":"A Security Analysis Method for Remote Tower Application at Feeder Airport","authors":"Chenru Wu, Yufei Wang, Chongxuan Peng, Feiyu Wu, Ying Zhou, Zhiyuan Shen","doi":"10.18178/wcse.2020.06.018","DOIUrl":"https://doi.org/10.18178/wcse.2020.06.018","url":null,"abstract":": In recent years, the building of the conventional airport tower is usually difficult and costly because of the complicated terrain in remote areas. Moreover, at feeder airport is facing with the problem of controllers shortage. It leads that the remote tower technology has been rapidly developed. The remote tower uses a panoramic display instead of an external view to provide remote air traffic control services. It is necessary to evaluate the satisfaction of safety requirements before the remote tower is put into operation. In this paper, the overall framework of the remote tower is firstly constructed. Secondly, a series of hazard sources are identified and a risk analysis assessment method is proposed in which the risk possibility/severity matrix is carried out to get the outputs. Finally, the responding releasing method are proposed based on the results of the mentioned risk analysis. The results of this work provide a theoretical basis for the implementation of remote tower constrained with the regulation of CAAC.","PeriodicalId":292895,"journal":{"name":"Proceedings of 2020 the 10th International Workshop on Computer Science and Engineering","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115707135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.18178/wcse.2020.06.033
{"title":"Ship Detection Method in Complex Sea Background","authors":"","doi":"10.18178/wcse.2020.06.033","DOIUrl":"https://doi.org/10.18178/wcse.2020.06.033","url":null,"abstract":"","PeriodicalId":292895,"journal":{"name":"Proceedings of 2020 the 10th International Workshop on Computer Science and Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122953529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.18178/wcse.2020.06.035
{"title":"Hyperspectral Images Reconstruction based on the 3D Fast Super-Resolution Convolutional Neural Networks","authors":"","doi":"10.18178/wcse.2020.06.035","DOIUrl":"https://doi.org/10.18178/wcse.2020.06.035","url":null,"abstract":"","PeriodicalId":292895,"journal":{"name":"Proceedings of 2020 the 10th International Workshop on Computer Science and Engineering","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121197348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.18178/wcse.2020.06.041
{"title":"A Matrix Factorization Technique with Word Embedding for Recommendation","authors":"","doi":"10.18178/wcse.2020.06.041","DOIUrl":"https://doi.org/10.18178/wcse.2020.06.041","url":null,"abstract":"","PeriodicalId":292895,"journal":{"name":"Proceedings of 2020 the 10th International Workshop on Computer Science and Engineering","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116451732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.18178/wcse.2020.02.009
Htet Naing, Zin May Aye
Nowadays, securing information and message transformation are going with electronic way, the security becomes very important role on public network. Cryptography is readable message convert to unreadable message using encryption/decryption process. Encryption Process is sender and decryption process are receiver side. Commonly, information can be storing with international language such as English language. At the present time, everyone is trying to be more secure not only English but also own language such as Myanmar, Chinese, Tamil etc. Confidential data are transferred through with regional language by using with more innovative method. To secure such information, encryption/decryption plays an important role in information security. In cryptography, there are several cipher techniques such as, polyalphabetic cipher, Stream cipher, Block cipher etc. This section using Beaufort cipher is an example of substitution cipher, In this paper, we propose an advanced encryption algorithm that improves the security of Beaufort encryption by combining it with a modern encryption method such as Stream cipher for the Myanmar language, Stream cipher is considered relatively as an unbreakable method and uses a binary form ( instead of characters) where Plain text, encrypted text and key are bit string.
{"title":"Innovation Security of Beaufort Cipher by Stream Cipher Using Myanmar-Vigenere Table and Unicode Table","authors":"Htet Naing, Zin May Aye","doi":"10.18178/wcse.2020.02.009","DOIUrl":"https://doi.org/10.18178/wcse.2020.02.009","url":null,"abstract":"Nowadays, securing information and message transformation are going with electronic way, the security becomes very important role on public network. Cryptography is readable message convert to unreadable message using encryption/decryption process. Encryption Process is sender and decryption process are receiver side. Commonly, information can be storing with international language such as English language. At the present time, everyone is trying to be more secure not only English but also own language such as Myanmar, Chinese, Tamil etc. Confidential data are transferred through with regional language by using with more innovative method. To secure such information, encryption/decryption plays an important role in information security. In cryptography, there are several cipher techniques such as, polyalphabetic cipher, Stream cipher, Block cipher etc. This section using Beaufort cipher is an example of substitution cipher, In this paper, we propose an advanced encryption algorithm that improves the security of Beaufort encryption by combining it with a modern encryption method such as Stream cipher for the Myanmar language, Stream cipher is considered relatively as an unbreakable method and uses a binary form ( instead of characters) where Plain text, encrypted text and key are bit string.","PeriodicalId":292895,"journal":{"name":"Proceedings of 2020 the 10th International Workshop on Computer Science and Engineering","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116129282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.18178/wcse.2020.02.029
{"title":"Service Management Strategy for CDN","authors":"","doi":"10.18178/wcse.2020.02.029","DOIUrl":"https://doi.org/10.18178/wcse.2020.02.029","url":null,"abstract":"","PeriodicalId":292895,"journal":{"name":"Proceedings of 2020 the 10th International Workshop on Computer Science and Engineering","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125142846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}