Junliang Cai, Dawei Li, Ye Ji, Yujia Zhang, Fan Yang, Xiao Chang
{"title":"Mass telemetry cluster storage and autonomous health assessment system of spacecraft control system in orbit","authors":"Junliang Cai, Dawei Li, Ye Ji, Yujia Zhang, Fan Yang, Xiao Chang","doi":"10.1117/12.2670663","DOIUrl":"https://doi.org/10.1117/12.2670663","url":null,"abstract":"During the operation of spacecraft control system in orbit, a large amount of telemetry data will be generated. These data can characterize the operation performance of spacecraft control system and have high analytical value, which can identify the health status and operation performance of spacecraft from the telemetry in orbit. This paper presents a cluster storage system and an autonomous health assessment system. Simulation analysis and practical application show that the system supports the efficient storage of more than 800 spacecraft telemetry data, realizes the data elimination of 99.3% accuracy, realizes the fault self-diagnosis of 98.7% accuracy, can complete a comprehensive health assessment of the spacecraft in 3.5 seconds, and automatically generates the evaluation report.","PeriodicalId":143377,"journal":{"name":"International Conference on Green Communication, Network, and Internet of Things","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126732622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic monitoring method of mutation event network public opinion based on topic crawler","authors":"Qianqian Li, Jing Li, Zhihang Wang, Wenjie Fan","doi":"10.1117/12.2667861","DOIUrl":"https://doi.org/10.1117/12.2667861","url":null,"abstract":"With the rapid development of Internet and the increasing amount of information, it is necessary to use big data technology to solve the bottleneck of processing speed and storage of traditional public opinion monitoring in the era of big data. In this paper, Hadoop open source platform is used to build a big data foundation, realize distributed storage of data, use MapReduce and Spark to realize distributed computing and processing of data, and process the collected data in text. The algorithm model is used to classify and cluster the text information to complete the analysis of text emotional tendency, topic discovery and tracking, and innovatively grasp the public opinion information status of network emergencies. The experimental results from the acquisition rate and average correlation test prove that the algorithm in this paper has higher calculation accuracy. It can provide real-time and effective public opinion analysis service.","PeriodicalId":143377,"journal":{"name":"International Conference on Green Communication, Network, and Internet of Things","volume":"93 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122087519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Communication protocol conversion terminal and conversion method for the low voltage power line carrier network","authors":"Qiaoqiao Wang, Chen Xiu, J. Wu, Guangming Wan","doi":"10.1117/12.2670287","DOIUrl":"https://doi.org/10.1117/12.2670287","url":null,"abstract":"At present, the communication protocol conversion terminals and conversion methods used by power companies in the networking process of low-voltage power line carriers have some problems, such as packet loss and long delay in uploading and sending messages, which will seriously affect the communication quality of low-voltage power line carriers and the operation safety of the whole distribution network. Based on this, in order to improve the communication quality of low-voltage power line carrier network, a research on communication protocol conversion terminal and conversion method suitable for low-voltage power line carrier network is proposed. First, optimize the communication protocol conversion terminal, and improve its physical interface and software module. Then, the delay of protocol conversion process is controlled, and the flow of wireless communication protocol conversion by carrier protocol is set to realize high-quality communication protocol conversion. Finally, the experimental link is constructed to prove the advanced nature of the research terminal and the proposed method. The experimental results show that this terminal and protocol conversion method can further reduce the packet loss rate, shorten the transmission delay, and improve the communication quality of the low-voltage power line carrier network.","PeriodicalId":143377,"journal":{"name":"International Conference on Green Communication, Network, and Internet of Things","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126456235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparison of current blockchain privacy protection technologies and prospects for future trends","authors":"Zheng Lai","doi":"10.1117/12.2667239","DOIUrl":"https://doi.org/10.1117/12.2667239","url":null,"abstract":"A decentralized, unchanging, and verifiable public ledger that can track the exchange of digital assets is provided by the blockchain. After Bitcoin brought out the blockchain, the blockchain is used in new fields such as smart cities and e-health, and plays a very important role. Although the decentralization of the blockchain makes the construction of digital currency possible, its open and transparent design also risks leaking user privacy. In order to fulfill the security needs of blockchain applications for privacy related information, the relevant researchers have recently done research on blockchain privacy protection challenges and posted corresponding protection technologies, a few of which have been also successfully implemented in several prevailing blockchain applications. In view of the blockchain privacy protection technology issues, this paper investigates the latest progress of blockchain privacy protection technology, conducts a comparative analysis, and summarizes at the end, so as to make an outlook on future trends.","PeriodicalId":143377,"journal":{"name":"International Conference on Green Communication, Network, and Internet of Things","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132883023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Meta-heuristic-based multipath joint routing and scheduling of time-triggered traffic for time-sensitive networking in IIoT","authors":"Chen Chen, Zhong Li","doi":"10.1117/12.2667698","DOIUrl":"https://doi.org/10.1117/12.2667698","url":null,"abstract":"Time-sensitive networking (TSN) meets the needs of industrial internet of things (IIoT). It solves the challenges of deterministic transmission and reliable communication of time sensitive data streams. Traffic scheduling is the core mechanism of time-sensitive networks. Many excellent researches have explored and optimized the method of scheduling time-triggered streams in TSN. However, the existing time-triggered streams scheduling in TSN mostly separates routing and scheduling, which limits the scalability of scheduling. Many researches are based on fixed routing to schedule streams. Due to the interaction between scheduling and routing, the quality of fixed route solution is inferior to that of joint routing and scheduling. In this paper, we propose a meta-heuristic based multipath joint routing and scheduling method for time-triggered traffic in TSN, named MMRS. We set path selection as a variable and consider multipath routing for fault tolerance. At the same time, we establish the integer linear programming formulation and use meta-heuristic to obtain high-quality solutions. The evaluations show that compared with other excellent routing and scheduling methods, the runtime of 60 streams of MMRS method is reduced by 65.6%, and the schedulability is improved by 21% on average. The experiments verify that our proposed scheduling method can obtain high-quality solutions in an acceptable solution time.","PeriodicalId":143377,"journal":{"name":"International Conference on Green Communication, Network, and Internet of Things","volume":"224 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132651729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Encryption methods on major telecommunication applications and thoughts","authors":"Z. Liu","doi":"10.1117/12.2668018","DOIUrl":"https://doi.org/10.1117/12.2668018","url":null,"abstract":"Ever since the invention and massive implementation of telecommunication invited themselves during wartime, it is crucial to keep the message as secret as possible from adversaries. Back in time, the leak of messages meant thousands of potential casualties whereas now enormous costs on fortune and confidential secrets. In this paper, we will dive into the comparison of modern communication apps such as WhatsApp, Messengers, and WeChat with their encryption methods including AES encryption and RSA encryption. Then, we build a front-to-end message app using the RSA encryption method and an easy version of a random number generator to increase the security level. We will discuss the utility of the three apps and their complexity in terms of the input, algorithm, and pros and cons of the features they provide objectively to the average consumer, regardless of occupation or special personalized need. In addition, throughout the studies of the three apps and their flow of design on how to keep the consumers safe during their sharing of messages, we will discover a trend of evolution in how the society treats the idea of information security and what improvements can be done from time to time.","PeriodicalId":143377,"journal":{"name":"International Conference on Green Communication, Network, and Internet of Things","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127430408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integrated method for node centrality evaluation in green networks","authors":"Bin Chen, Yingming Wang","doi":"10.1117/12.2667237","DOIUrl":"https://doi.org/10.1117/12.2667237","url":null,"abstract":"For green networks, node centrality can be evaluated statically according to certain network topology characteristic. Meanwhile, it can also be evaluated dynamically according to certain network dynamic process. In order to improve the effect of node centrality evaluation, the topology characteristic can be integrated into the dynamic process model of complex networks. Cascading failure model is commonly taken as the dynamic process model of complex networks. To accurately measure the result of cascading failure, a new index is proposed. Based on this index, node centrality can be effectively evaluated. A case demonstrates the superiority and reasonability of this method and this index.","PeriodicalId":143377,"journal":{"name":"International Conference on Green Communication, Network, and Internet of Things","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122125187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of analog signal processing module for VCU of pure electric vehicle based on ISO 26262","authors":"M. Kuang, Lixin Yang, Yanjin Lv, A. Cheng","doi":"10.1117/12.2670634","DOIUrl":"https://doi.org/10.1117/12.2670634","url":null,"abstract":"Aiming the potential hazards and risks brought by the analog signal processing module of the vehicle controller, an analog signal processing module based on ISO26262 standard is designed to enhance the safety and reliability of the vehicle controller. Based on the relevant technical design methods in the functional safety standards, this paper performs a hazard and risk assessment on the unexpected acceleration or deceleration of the vehicle caused by the failure of the analog signal processing module, determines that it should achieve the functional safety level ASIL D and functional safety requirements, and then adopted the dual-core principle for redundancy design of the analog signal processing module. The fault injection is carried to simulate the vehicle controller analog signal processing fault. The test and verification results show that the vehicle controller analog signal processing module designed in this paper meets the ASIL D safety level, and the three types of fault injection pass rate are above 99%. It improves the safety and reliability of the vehicle controller.","PeriodicalId":143377,"journal":{"name":"International Conference on Green Communication, Network, and Internet of Things","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124095229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on denoising method of CO sensor data in coal mine goaf","authors":"Zhen Xing","doi":"10.1117/12.2667752","DOIUrl":"https://doi.org/10.1117/12.2667752","url":null,"abstract":"The basic knowledge and theory of wavelet analysis are introduced. The definitions and properties of continuous wavelet transform and discrete wavelet transform are expounded. The Sym8 wavelet used in this paper is briefly explained. Then, the wavelet analysis is applied to the pretreatment of CO concentration time series signal in the return corner of the safety monitoring system. Combining with the characteristics of CO concentration time series signal in the return corner, the wavelet threshold denoising method is used to denoise the CO concentration time series signal, and the appropriate threshold function is selected. Number, wavelet basis function and decomposition level can effectively remove the interference of noise signal.","PeriodicalId":143377,"journal":{"name":"International Conference on Green Communication, Network, and Internet of Things","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128739600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Junqing Chen, Ying Yang, Renzhe Zhu, Tianlei Zhu, Zheng Tao
{"title":"The performance and error analysis of LSTM model combined with various GARCH models in stock forecasting","authors":"Junqing Chen, Ying Yang, Renzhe Zhu, Tianlei Zhu, Zheng Tao","doi":"10.1117/12.2670293","DOIUrl":"https://doi.org/10.1117/12.2670293","url":null,"abstract":"Volatility is a measure of the asset return rate's estimated level of uncertainty and may be used to assess the riskiness of financial assets. We use the market capitalization of 200 stocks representing Korea as the primary analytical aim and evaluate the accuracy between them by analyzing the impacts of different hybrid models' hybrid neural networks, which are based on the returns of the KOSPI 200 stock index. By measuring the effectiveness of these models using four dissimilarity measures, we contrasted the performance of hybrid models that combine a single neural network and a single GARCH type model with that of hybrid neural networks that combine multiple GARCH models (MAE, MSE, HMAE, and HMSE). They are applied to anticipate the KOSPI 200 index data's actual volatility. Among these, hybrid neural networks that integrate more than one GARCH-type model have much better forecasting performance than neural network models that mix two or more or more GARCH-type models. GW-LSTM makes the least accurate forecast. We note that the hybrid model combining the three GARCH models shows a minor increase in predicting ability based on merging two and three models.","PeriodicalId":143377,"journal":{"name":"International Conference on Green Communication, Network, and Internet of Things","volume":"12586 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129097679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}