Fangjian Shang, Xin Li, Di Zhai, Yang Lu, Donglei Zhang, Yuwen Qian
{"title":"On the Distributed Jamming System of Covert Timing Channels in 5G Networks","authors":"Fangjian Shang, Xin Li, Di Zhai, Yang Lu, Donglei Zhang, Yuwen Qian","doi":"10.1109/ICAICA50127.2020.9182534","DOIUrl":"https://doi.org/10.1109/ICAICA50127.2020.9182534","url":null,"abstract":"To build the fifth generation (5G) mobile network, the sharing structure in the 5G network adopted in industries has gained great research interesting. However, in this structure data are shared among diversity networks, which introduces the threaten of network security, such as covert timing channels. To eliminate the covert timing channel, we propose to inject noise into the covert timing channel. By analyzing the modulation method of covert timing channels, we design the jamming strategy on the covert channel. According to the strategy, the interference algorithm of the covert timing channel is designed. Since the interference algorithm depends heavily on the memory, we construct a distributing jammer. Experiments results show that these covert time channel can be blocked under the distributing jammer.","PeriodicalId":113564,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115511580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fault diagnosis and analysis of water temperature sensor","authors":"Shengbo Zhou, Bingxian Li, Bin Wang","doi":"10.1109/ICAICA50127.2020.9181868","DOIUrl":"https://doi.org/10.1109/ICAICA50127.2020.9181868","url":null,"abstract":"Water temperature sensor was researched in the paper. Type of water temperature sensor was first introduced. Then, the working principle of water temperature sensor was explained comprehensively and the waveforms of two typical water temperature sensors are analyzed. At last, a logical flow chart of maintenance was put forward. It concluded that the logical flow chart in this paper can be also applied to the other sensors of engine.","PeriodicalId":113564,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123181805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lin Zhou, Zhiwen Liu, Yanchao Ji, Daoyuan Ma, Jianze Wang, Lingda Li
{"title":"A Improved Parameter Design Method of LCL APF Interface Filter","authors":"Lin Zhou, Zhiwen Liu, Yanchao Ji, Daoyuan Ma, Jianze Wang, Lingda Li","doi":"10.1109/ICAICA50127.2020.9182457","DOIUrl":"https://doi.org/10.1109/ICAICA50127.2020.9182457","url":null,"abstract":"LCL filters are widely used in public interfaces of active power filters (APF) and power grids due to their strong harmonic attenuation capabilities and the miniaturization of passive components. In order to make the LCL interface filter have low damping loss and high harmonic filtering effect, this paper chooses an improved LCL passive interface filter commonly used in APF for parameter design. Theoretical analysis and simulation comparison of performance comparison with conventional LCL-type passive interface filters are performed. The experimental results prove the feasibility and superiority of this parameter design method.","PeriodicalId":113564,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA)","volume":"479 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124955114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of Temperature Remote Monitoring System Based on STM32","authors":"Zhiyuan Zhang, Y. Jin","doi":"10.1109/ICAICA50127.2020.9182397","DOIUrl":"https://doi.org/10.1109/ICAICA50127.2020.9182397","url":null,"abstract":"This paper introduces the design and implementation of a remote temperature data monitoring system based on STM32. The system uses PT100 and STM32F103VET6 main control boards to collect the measured ambient temperature. Zigbee will pass the tested data through the RS232 interface, and deliver the data to the gateway based on the MODBUS communication protocol. The gateway will upload the data to the server through the MQTT communication protocol, and the server will receive the data for caching, storage and analysis, and display it through the web page. At the same time, in order to deal with the problem of network failure, the InfluxDB standby database is deployed in the middle of the gateway.","PeriodicalId":113564,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114918373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Resolve out of Vocabulary with Long Short-Term Memory Networks for Morphology","authors":"Yun Tang, Chuanxiang Tang, Caixin Zhu","doi":"10.1109/ICAICA50127.2020.9182586","DOIUrl":"https://doi.org/10.1109/ICAICA50127.2020.9182586","url":null,"abstract":"Out of vocabulary (OOV), which is a word that does not exist in a predefined vocabulary. How to deal with OOV is an important research topic in the field of natural language processing. The existence of OOV directly affects the performance of many NLP systems. For example, in some common scenarios such as machine translation, sentiment analysis, and intelligent question answering, the existence of OOV can greatly affect the key performance of the system. In recent years, with the advent of the word vector algorithm word2vec based on the principle of word morphology, the word embedding path of the NLP system has improved significantly. We combine LSTM with NLM, taking the morphemes of words as the basic processing unit, while taking into account the global context information. The results obtained are better than the existing OOV processing strategies, and the performance of commonly used NLP systems is generally improved. Finally, it is experimentally proved that our model is generally better than the existing models in the problem of unregistered word processing.","PeriodicalId":113564,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116043154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mining Technological Innovation Talents Based on Patent Index using t-SNE Algorithms*: Take the Field of Intelligent Robot as an Example","authors":"Ning Zhao, Guohui Yang, Yang Cao","doi":"10.1109/ICAICA50127.2020.9182541","DOIUrl":"https://doi.org/10.1109/ICAICA50127.2020.9182541","url":null,"abstract":"The purpose of this paper is to effectively evaluate the innovation ability and classification of technical talents in the intelligent robot field, and to be able to carry out adaptive learning and mining technical innovation talents according to the real-time change data corresponding to different indicators. Taking inventor's patent information retrieved and cleaned from DI database as research object, it constructs the evaluation index system of technological innovation talents. It reduces the dimension of the index and cluster automatically, shows the visual effect, and mines the similar technical innovation talents through t-SNE algorithm. For a large number of patent information data, machine learning algorithm improves the traditional recognition method. According to inventor similarity, automatic classification is realized. Combined with DWPI manual code mining, the corresponding innovators and members of the technical team in the intelligent robot technology field were found. According to the results of visual dimensional reduction, the specific inventors can be traced. Machine learning algorithm t-SNE can reduce dimension and analysis clustering. It breaks the limitations of artificial statistics, deals with the larger order of magnitude data, and analyzes data timely, accurate and intuitive.","PeriodicalId":113564,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122300122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on the Key Technologies of Big Data Based High-speed Railway Permanent Way Data Asset Collection Platform","authors":"Zhibo Cheng, Yanhua Wu, Taifeng Li, Zhengyang Zhao","doi":"10.1109/ICAICA50127.2020.9182429","DOIUrl":"https://doi.org/10.1109/ICAICA50127.2020.9182429","url":null,"abstract":"It is of great significance to manage high-speed railway permanent way equipment data efficiently for the improvement of operational safety. This paper, by investigating the management status of high-speed railway permanent way equipment data, conducts a demand analysis on exploring big data applications of permanent way and proposes an overall framework for a High-speed Railway Permanent Way Data Asset Collection Platform based on the Railway Data Service Platform. After sorting out and designing the main functions of the platform from a technical and business perspective, this paper also researches some key technologies of the platform including data cleaning and management, full-text retrieval, and cold/warm/hot data storage strategies. Finally, this paper takes one of the highspeed railway permanent way subjects as an example, building a prototype system of the High-speed Railway Permanent Way Data Asset Collection Platform and verifies the feasibility of the overall framework and key technologies. Based on the proposed platform, performing typical permanent way equipment analysis and big data applications can provide data and decision-making support for reasonable guidance towards permanent way equipment maintenance and management.","PeriodicalId":113564,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116626855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Portable Multi-Bar Code Recognizer Based on Digital Image Processing Technology","authors":"Huang Huilin, Liu Tinghui","doi":"10.1109/ICAICA50127.2020.9182615","DOIUrl":"https://doi.org/10.1109/ICAICA50127.2020.9182615","url":null,"abstract":"At present, in the logistics industry, the increasing number and speed of collecting product identifications in batches is an important link to improve the production efficiency of enterprises. Based on this, this paper uses multi-computers and high-definition cameras to use digital image processing technology to achieve multiple barcode collection, identification and storage. First of all, an overview of digital image processing technology is introduced, and its main features and advantages are introduced. Then the development process and current status of barcode recognition are analyzed. Finally, a multi-barcode identifier is designed and implemented. It mainly explains its camera selection, image pre-processing, multiple image stitching, single barcode segmentation, multiple barcode positioning, and motion scanning stitching. The instrument can be easily carried and used.","PeriodicalId":113564,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128212123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zuquan Peng, Huazhu Song, Xiaohan Zheng, Luotianhao Yi
{"title":"Construction of hierarchical knowledge graph based on deep learning","authors":"Zuquan Peng, Huazhu Song, Xiaohan Zheng, Luotianhao Yi","doi":"10.1109/ICAICA50127.2020.9181920","DOIUrl":"https://doi.org/10.1109/ICAICA50127.2020.9181920","url":null,"abstract":"With the continuous deepening of knowledge graph research, more and more knowledge is softened together, and the knowledge in professional fields is also emerging. Although people can quickly identify the knowledge they need based on their needs, machines cannot. There are many problems in the organization and application of traditional graphs, such as the inaccuracy of knowledge representation, which makes it difficult to obtain. The lack of clear knowledge layers causes a lot of irrelevant knowledge to appear after the query. The chaotic structure of knowledge in the graph causes query time-consuming. Therefore, considering the different layers of knowledge representation and the knowledge used to solve complex engineering problems, we propose to divide knowledge into three layers - basic knowledge, deep knowledge, and application knowledge and an agent-based hierarchical knowledge graph construction framework and methodology. The deep learning model method is used in the classification agent to realize the automatic division of knowledge type, pass the classification results to the corresponding knowledge agent. This knowledge agent is able to construct the hierarchical knowledge graph by the same layer knowledge or cross-layer knowledge. This method of constructing the hierarchical knowledge graph has practical significance in the application of the knowledge graph, which makes the knowledge graph have a wider application and practical value.","PeriodicalId":113564,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129038841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xinlin Liu, Jianhua Huang, Weifeng Luo, Qingming Chen, Peishan Ye, Dingbo Wang
{"title":"Research on Attack Mechanism using Attack Surface","authors":"Xinlin Liu, Jianhua Huang, Weifeng Luo, Qingming Chen, Peishan Ye, Dingbo Wang","doi":"10.1109/ICAICA50127.2020.9182583","DOIUrl":"https://doi.org/10.1109/ICAICA50127.2020.9182583","url":null,"abstract":"A approach to research on the attack mechanism designs through attack surface technology due to the complexity of the attack mechanism. The attack mechanism of a mimic architecture is analyzed in a relative way using attack surface metrics to indicate whether mimic architectures are safer than non-mimic architectures. The definition of the architectures attack surface in terms of the mimic brackets along three abstract dimensions referenced the system attack surface. The larger the attack surface, the more likely the architecture will be attacked.","PeriodicalId":113564,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA)","volume":"84 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124531162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}