首页 > 最新文献

Proceedings of 2020 the 10th International Workshop on Computer Science and Engineering最新文献

英文 中文
Identification and Analysis of Radio Monitoring Service Based on the Meet-in-the-Middle Strategy 基于中间相遇策略的无线电监测业务识别与分析
{"title":"Identification and Analysis of Radio Monitoring Service Based on the Meet-in-the-Middle Strategy","authors":"","doi":"10.18178/wcse.2020.06.023","DOIUrl":"https://doi.org/10.18178/wcse.2020.06.023","url":null,"abstract":"","PeriodicalId":292895,"journal":{"name":"Proceedings of 2020 the 10th International Workshop on Computer Science and Engineering","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115603944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Artificial Intelligent and Big Data Research Platform Based on Jupyter Notebook 基于Jupyter Notebook的人工智能大数据研究平台
{"title":"An Artificial Intelligent and Big Data Research Platform Based on Jupyter Notebook","authors":"","doi":"10.18178/wcse.2020.06.070","DOIUrl":"https://doi.org/10.18178/wcse.2020.06.070","url":null,"abstract":"","PeriodicalId":292895,"journal":{"name":"Proceedings of 2020 the 10th International Workshop on Computer Science and Engineering","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127504681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on Vehicle Detection Algorithm based on Haar-like and CNN 基于Haar-like和CNN的车辆检测算法研究
{"title":"Research on Vehicle Detection Algorithm based on Haar-like and CNN","authors":"","doi":"10.18178/wcse.2020.06.021","DOIUrl":"https://doi.org/10.18178/wcse.2020.06.021","url":null,"abstract":"","PeriodicalId":292895,"journal":{"name":"Proceedings of 2020 the 10th International Workshop on Computer Science and Engineering","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125433957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real-time Big Data Analytics for Feature Selection on Apache Spark 基于Apache Spark的实时大数据分析功能选择
{"title":"Real-time Big Data Analytics for Feature Selection on Apache Spark","authors":"","doi":"10.18178/wcse.2020.02.005","DOIUrl":"https://doi.org/10.18178/wcse.2020.02.005","url":null,"abstract":"","PeriodicalId":292895,"journal":{"name":"Proceedings of 2020 the 10th International Workshop on Computer Science and Engineering","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123423761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Security Analysis Method for Remote Tower Application at Feeder Airport 支线机场远程塔台应用的安全分析方法
Chenru Wu, Yufei Wang, Chongxuan Peng, Feiyu Wu, Ying Zhou, Zhiyuan Shen
: In recent years, the building of the conventional airport tower is usually difficult and costly because of the complicated terrain in remote areas. Moreover, at feeder airport is facing with the problem of controllers shortage. It leads that the remote tower technology has been rapidly developed. The remote tower uses a panoramic display instead of an external view to provide remote air traffic control services. It is necessary to evaluate the satisfaction of safety requirements before the remote tower is put into operation. In this paper, the overall framework of the remote tower is firstly constructed. Secondly, a series of hazard sources are identified and a risk analysis assessment method is proposed in which the risk possibility/severity matrix is carried out to get the outputs. Finally, the responding releasing method are proposed based on the results of the mentioned risk analysis. The results of this work provide a theoretical basis for the implementation of remote tower constrained with the regulation of CAAC.
近年来,由于偏远地区地形复杂,传统机场塔台的建设难度大,成本高。此外,支线机场也面临着管制员短缺的问题。这使得远程铁塔技术得到了迅速的发展。远程塔台使用全景显示器代替外部视图来提供远程空中交通管制服务。在远程塔投入运行前,有必要对安全要求的满足程度进行评估。本文首先构建了远塔的总体框架。其次,识别了一系列的危险源,提出了一种风险分析评价方法,通过风险可能性/严重程度矩阵得到输出;最后,根据上述风险分析的结果,提出了相应的释放方法。研究结果为实现受中国民航法规约束的远程铁塔提供了理论依据。
{"title":"A Security Analysis Method for Remote Tower Application at Feeder Airport","authors":"Chenru Wu, Yufei Wang, Chongxuan Peng, Feiyu Wu, Ying Zhou, Zhiyuan Shen","doi":"10.18178/wcse.2020.06.018","DOIUrl":"https://doi.org/10.18178/wcse.2020.06.018","url":null,"abstract":": In recent years, the building of the conventional airport tower is usually difficult and costly because of the complicated terrain in remote areas. Moreover, at feeder airport is facing with the problem of controllers shortage. It leads that the remote tower technology has been rapidly developed. The remote tower uses a panoramic display instead of an external view to provide remote air traffic control services. It is necessary to evaluate the satisfaction of safety requirements before the remote tower is put into operation. In this paper, the overall framework of the remote tower is firstly constructed. Secondly, a series of hazard sources are identified and a risk analysis assessment method is proposed in which the risk possibility/severity matrix is carried out to get the outputs. Finally, the responding releasing method are proposed based on the results of the mentioned risk analysis. The results of this work provide a theoretical basis for the implementation of remote tower constrained with the regulation of CAAC.","PeriodicalId":292895,"journal":{"name":"Proceedings of 2020 the 10th International Workshop on Computer Science and Engineering","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115707135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ship Detection Method in Complex Sea Background 复杂海洋背景下的船舶检测方法
{"title":"Ship Detection Method in Complex Sea Background","authors":"","doi":"10.18178/wcse.2020.06.033","DOIUrl":"https://doi.org/10.18178/wcse.2020.06.033","url":null,"abstract":"","PeriodicalId":292895,"journal":{"name":"Proceedings of 2020 the 10th International Workshop on Computer Science and Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122953529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hyperspectral Images Reconstruction based on the 3D Fast Super-Resolution Convolutional Neural Networks 基于三维快速超分辨率卷积神经网络的高光谱图像重建
{"title":"Hyperspectral Images Reconstruction based on the 3D Fast Super-Resolution Convolutional Neural Networks","authors":"","doi":"10.18178/wcse.2020.06.035","DOIUrl":"https://doi.org/10.18178/wcse.2020.06.035","url":null,"abstract":"","PeriodicalId":292895,"journal":{"name":"Proceedings of 2020 the 10th International Workshop on Computer Science and Engineering","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121197348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Matrix Factorization Technique with Word Embedding for Recommendation 基于词嵌入的矩阵分解推荐技术
{"title":"A Matrix Factorization Technique with Word Embedding for Recommendation","authors":"","doi":"10.18178/wcse.2020.06.041","DOIUrl":"https://doi.org/10.18178/wcse.2020.06.041","url":null,"abstract":"","PeriodicalId":292895,"journal":{"name":"Proceedings of 2020 the 10th International Workshop on Computer Science and Engineering","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116451732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Innovation Security of Beaufort Cipher by Stream Cipher Using Myanmar-Vigenere Table and Unicode Table 基于Myanmar-Vigenere表和Unicode表的流密码Beaufort密码的创新安全性
Htet Naing, Zin May Aye
Nowadays, securing information and message transformation are going with electronic way, the security becomes very important role on public network. Cryptography is readable message convert to unreadable message using encryption/decryption process. Encryption Process is sender and decryption process are receiver side. Commonly, information can be storing with international language such as English language. At the present time, everyone is trying to be more secure not only English but also own language such as Myanmar, Chinese, Tamil etc. Confidential data are transferred through with regional language by using with more innovative method. To secure such information, encryption/decryption plays an important role in information security. In cryptography, there are several cipher techniques such as, polyalphabetic cipher, Stream cipher, Block cipher etc. This section using Beaufort cipher is an example of substitution cipher, In this paper, we propose an advanced encryption algorithm that improves the security of Beaufort encryption by combining it with a modern encryption method such as Stream cipher for the Myanmar language, Stream cipher is considered relatively as an unbreakable method and uses a binary form ( instead of characters) where Plain text, encrypted text and key are bit string.
在信息安全与信息转换电子化的今天,安全在公共网络中扮演着非常重要的角色。密码学是使用加密/解密过程将可读消息转换为不可读消息。加密过程是发送方,解密过程是接收方。通常,信息可以用国际语言存储,如英语。目前,每个人都在努力更安全,不仅是英语,还有自己的语言,如缅甸语、汉语、泰米尔语等。采用更具创新性的方法,以地域语言传递机密数据。为了确保这些信息的安全,加密/解密在信息安全中起着重要的作用。在密码学中,有多种密码技术,如多字母密码、流密码、分组密码等。本文提出了一种先进的加密算法,将博福特加密与现代加密方法(如缅甸语的流密码)相结合,提高了博福特加密的安全性,流密码被认为是一种相对不可破解的方法,使用二进制形式(而不是字符),明文、加密文本和密钥都是位串。
{"title":"Innovation Security of Beaufort Cipher by Stream Cipher Using Myanmar-Vigenere Table and Unicode Table","authors":"Htet Naing, Zin May Aye","doi":"10.18178/wcse.2020.02.009","DOIUrl":"https://doi.org/10.18178/wcse.2020.02.009","url":null,"abstract":"Nowadays, securing information and message transformation are going with electronic way, the security becomes very important role on public network. Cryptography is readable message convert to unreadable message using encryption/decryption process. Encryption Process is sender and decryption process are receiver side. Commonly, information can be storing with international language such as English language. At the present time, everyone is trying to be more secure not only English but also own language such as Myanmar, Chinese, Tamil etc. Confidential data are transferred through with regional language by using with more innovative method. To secure such information, encryption/decryption plays an important role in information security. In cryptography, there are several cipher techniques such as, polyalphabetic cipher, Stream cipher, Block cipher etc. This section using Beaufort cipher is an example of substitution cipher, In this paper, we propose an advanced encryption algorithm that improves the security of Beaufort encryption by combining it with a modern encryption method such as Stream cipher for the Myanmar language, Stream cipher is considered relatively as an unbreakable method and uses a binary form ( instead of characters) where Plain text, encrypted text and key are bit string.","PeriodicalId":292895,"journal":{"name":"Proceedings of 2020 the 10th International Workshop on Computer Science and Engineering","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116129282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Service Management Strategy for CDN CDN业务管理策略
{"title":"Service Management Strategy for CDN","authors":"","doi":"10.18178/wcse.2020.02.029","DOIUrl":"https://doi.org/10.18178/wcse.2020.02.029","url":null,"abstract":"","PeriodicalId":292895,"journal":{"name":"Proceedings of 2020 the 10th International Workshop on Computer Science and Engineering","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125142846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of 2020 the 10th International Workshop on Computer Science and Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1