{"title":"Research on Library Information Security Based on the Innovation Assistant System of Wanfang (STADS)","authors":"D. Jiang, Sheng Ye, Xu Xia","doi":"10.1109/ICETCI53161.2021.9563575","DOIUrl":"https://doi.org/10.1109/ICETCI53161.2021.9563575","url":null,"abstract":"Object: Based on the paper output in library information security in China, to provide some enlightenment for the research and protection practice of library information security in the era of big data. Methods: The development of information security of digital libraries in China had been reviewed, and the journal papers on information security of domestic libraries had been retrieved and analyzed by the innovation assistant system of Wanfang (STADS) and vosviewer visual analysis tool. Result: 1191 research papers on library information security were obtained and statistically analyzed from the aspects of overall literature output, academic attention trend, journal paper output, active institutions and research hotspots. Conclusion: The main characteristics and laws of library information security research in China had been summarized. The output of library information security research papers had been generally stable, the degree of academic attention was weak, the overall quality of papers was good, and the research hotspots were prominent. The weak links and problems existed in the current research, and some suggestions to the research in this field in China had been put forward as follows: first improve the research of basic theory, and then strengthen the depth and breadth of technical research.","PeriodicalId":170858,"journal":{"name":"2021 IEEE International Conference on Electronic Technology, Communication and Information (ICETCI)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115385447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
X. Jiren, Liu Tongzan, Pei Kunpong, Wu Dongsheng, Z. Xiaolan
{"title":"Research on the Upgrading Method of Electronic Equipment","authors":"X. Jiren, Liu Tongzan, Pei Kunpong, Wu Dongsheng, Z. Xiaolan","doi":"10.1109/ICETCI53161.2021.9563543","DOIUrl":"https://doi.org/10.1109/ICETCI53161.2021.9563543","url":null,"abstract":"This paper introduces the method of electronic equipment upgrading in detail, including how to upgrade the emergency equipment or software maintenance, through a detailed analysis of the advantages and disadvantages of the existing electronic equipment, and finally gives the system of penis upgrading. And the method and specific process of software upgrading and transformation, for the upgrading and transformation of other electronic equipment, including software and hardware has a guiding significance.","PeriodicalId":170858,"journal":{"name":"2021 IEEE International Conference on Electronic Technology, Communication and Information (ICETCI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115596290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pose Rectifying System Based on Bottom-up PAF Key Point Estimation Method","authors":"T. Gao","doi":"10.1109/ICETCI53161.2021.9563452","DOIUrl":"https://doi.org/10.1109/ICETCI53161.2021.9563452","url":null,"abstract":"Nowadays, well-designed and matured recovery trainings are widely available and required for professional athletes who injure or overstretch their muscle during trainings or games, while there is still a lack of such essential recovery process for common people who as well may encounter injury during some physical activities like working out, running, and so on. This automatic system which detects a person's body pose during the recovery training makes training at home for common people possible. Since patients have to rest for a period of time due to the injury, they may result in having different levels of muscle atrophy. Recovery training should thus be conducted so that patients could train their muscle to perform basic functions and continue with physical activities. This project aims at monitoring and enhancing the accuracy of patients' body poses during their healing exercise. By using OpenPose, a person's key points can be detected and analyzed. After reducing some distracting information in the images, the body key points are put into a pre-trained SVM model, and these key points will be then sorted into two groups of either right or wrong body pose. With such method, it is practical for injured people to conduct more efficient and accurate recovery training for their injured muscles by themselves without having to afford a personal trainer or go to the hospital every day.","PeriodicalId":170858,"journal":{"name":"2021 IEEE International Conference on Electronic Technology, Communication and Information (ICETCI)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115144951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Haoyu Liu, Shiwen Zhang, Mengling Li, Voundi Koe Arthur Sandor, Wei Liang
{"title":"An Effective Location Privacy-Preserving K-anonymity Scheme in Location Based Services","authors":"Haoyu Liu, Shiwen Zhang, Mengling Li, Voundi Koe Arthur Sandor, Wei Liang","doi":"10.1109/ICETCI53161.2021.9563598","DOIUrl":"https://doi.org/10.1109/ICETCI53161.2021.9563598","url":null,"abstract":"With the development of global positioning systems, communication technologies, the Internet and mobile terminals, location-based services (LBS) have become increasingly widely used. LBS brings great convenience to people's daily life and social activities. At the same time, people pay more attention to the problem of sensitive information leakage when using LBS. Users need to provide their accurate location information when sending queries to the LBS server. User location privacy is extremely vulnerable to serious threats during the exchange of services, and these location-related queries may cause serious privacy issues. In this paper, considering that the opponent may use auxiliary information such as data analysis and crawlers to determine the approximate location, we propose an effective location privacy-preserving k-anonymity scheme (PPKS) to generate virtual locations based on the probability density function in mathematical statistics to realize the k-anonymity of users with privacy zone awareness in LBS. We first determine the origin of the region and then calculate the probability density function of the X-axis and the Y-axis. Subsequently, the k-1 positions are distributed to the X-axis and Y-axis in proportion, respectively. Finally, according to the proportions, the k-1 virtual positions are generated. The results of security analysis and experimental evaluation show that the solution can significantly improve the level of privacy and anonymity.","PeriodicalId":170858,"journal":{"name":"2021 IEEE International Conference on Electronic Technology, Communication and Information (ICETCI)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114657688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Stock Pricing Analysis between Bidders and Sellers Based on Stackelberg Game Theory","authors":"Yi Su","doi":"10.1109/ICETCI53161.2021.9563518","DOIUrl":"https://doi.org/10.1109/ICETCI53161.2021.9563518","url":null,"abstract":"With the development of institutional investors, the game between institutional investors and individual investors has become an important factor affecting the stock price. Exploring the buying and selling decisions made by different investors in a certain stock market can help to predict stock price. In this paper, we use the bidder to represent institutional investor and the sellers to represent individual investors. We propose a Stackelberg game model which achieves the optimal income utility of both parties. We also explore the equilibrium point and conditions for the establishment of equilibrium. Finally, we tested the feasibility of the Mechanism through simulation.","PeriodicalId":170858,"journal":{"name":"2021 IEEE International Conference on Electronic Technology, Communication and Information (ICETCI)","volume":"8 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126081834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"C-V2X Greedy Cooperative Caching and Response Algorithm","authors":"Tianwu Lin, Zhiwei Qiu, Zhexin Xu","doi":"10.1109/ICETCI53161.2021.9563520","DOIUrl":"https://doi.org/10.1109/ICETCI53161.2021.9563520","url":null,"abstract":"Greedy Cooperative Caching and Response Algorithm (GCCR) is proposed to relieve the communication load of base station as edge Caching source in C-V2X and improve the efficiency of data transmission. Under the constraint of node topological relationship, the greedy flooding cache node allocation order is adopted to increase the complementary cooperation of cache files of neighboring nodes. The result is not only to enrich cache content and increase request response rates, but also to increase service coverage for highly popular files, thereby reducing transmission delays and duplicate response rates.","PeriodicalId":170858,"journal":{"name":"2021 IEEE International Conference on Electronic Technology, Communication and Information (ICETCI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125870281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Load Balancing Algorithm Based on End-to-end Rerouting","authors":"Jin Guo, M. Liang, Zhiyu Liu","doi":"10.1109/ICETCI53161.2021.9563561","DOIUrl":"https://doi.org/10.1109/ICETCI53161.2021.9563561","url":null,"abstract":"With the quick growth of new Internet applications, the network load is increasing rapidly which may cause network congestion and has a certain impact on the transmission performance and user experience. There are two ways to solve this problem: increasing network bandwidth and balancing network load to increase network utilization. This paper mainly discusses the latter. As we all know, the shortest path algorithm is common for network routing, but it cannot balance the load between the network links, causing the load on some links heavy, we call the link with the heaviest load as the peak link. This paper proposes a new Load Balancing algorithm based on End-to-end Rerouting (LBER). First, the peak link is obtained according to the load status of the network links. Then, the load of the peak link is decreased by additional cost to punish it, that all the paths through the peak link are rerouted from end to end. The ultimate goal is to minimize the peak link load. Simulation experiments show that this algorithm can effectively reduce the peak traffic of the network compared with the existing shortest path algorithm by an average of 29.29%, which means the network bandwidth utilization is improved notably.","PeriodicalId":170858,"journal":{"name":"2021 IEEE International Conference on Electronic Technology, Communication and Information (ICETCI)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127496718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic Recognition of Pointer Meter Reading Based on Yolov4 and Improved U-net Algorithm","authors":"Jishen Peng, Mingyang Xu, Yunfeng Yan","doi":"10.1109/ICETCI53161.2021.9563496","DOIUrl":"https://doi.org/10.1109/ICETCI53161.2021.9563496","url":null,"abstract":"Pointer meters are widely used in life and industrial production due to their simple structure, good reliability, high-cost performance, and intuitive and convenient reading. With the improvement of artificial intelligence and automation level, the application of drones in substation inspections has become more and more extensive, which has brought convenience to image collection, but the problem of the accuracy of reading recognition of pointer meters has not been well resolved. Using the current mainstream algorithms, due to the complexity of the surrounding environment, dust pollution, and other factors, the obtained image contains a lot of noise, which affects the accuracy of reading recognition. In this paper, YOLOV4 is used to detect the position of the dial in the images and classify the meters; then combined with the characteristics of the meter image, the improved U-Net image segmentation technology to effectively extract the pointers in the area, accurately identify the meter readings, and use the collected power equipment sample training data set to test the algorithm. The improved U-Net improves the learning ability of the shallow information of the image, reduces the loss of edge features, and improves the segmentation effect of the target.","PeriodicalId":170858,"journal":{"name":"2021 IEEE International Conference on Electronic Technology, Communication and Information (ICETCI)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126586534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Application of Graphical Shunting Based on C/S Architecture in Factory and Mining Enterprises","authors":"Ting-yu Gao, Baodi Xiao, Lili Yue, K. Rao","doi":"10.1109/ICETCI53161.2021.9563526","DOIUrl":"https://doi.org/10.1109/ICETCI53161.2021.9563526","url":null,"abstract":"In factories and mines station, shunting have the primary task of transportation, large and frequent shunting operation has brought serious problems to management; its timeliness and larger traffic requirements of its information integration, operational efficiency, The accuracy is higher. The current information management system is mainly based on reports and printing freight information files. Its information integration is low, and the operation of preparing a locomotive coupler plan is too cumbersome. The author proposes to adopt a graphical shunting based on C/S architecture. Module, automatic preparation of hook plan and locomotive operation diagram, better realization of human-computer interaction and system response.","PeriodicalId":170858,"journal":{"name":"2021 IEEE International Conference on Electronic Technology, Communication and Information (ICETCI)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121545131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Computer Artificial Intelligence Technology in Improving the Quality of Environmental Design","authors":"Zeng Yuan, Liang Ding, Shi Yi","doi":"10.1109/ICETCI53161.2021.9563400","DOIUrl":"https://doi.org/10.1109/ICETCI53161.2021.9563400","url":null,"abstract":"The rapid development of modern information technology has made virtual reality technology gradually. The ability of virtual reality technology to deconstruct space data and visual imaging capabilities has improved the prospects of computer artificial intelligence virtual reality technology in indoor space design. This paper uses virtual reality technology in the indoor space of the Internet of Things smart home to study the application of virtual reality technology in the performance of indoor space design, through the deconstruction of virtual reality technology in indoor space and the improvement measures in virtual reality in environmental art design Research and explore the new ideas and new methods that virtual reality technology brings to many aspects of indoor space, and clarify the development prospects of virtual reality technology in environmental art design","PeriodicalId":170858,"journal":{"name":"2021 IEEE International Conference on Electronic Technology, Communication and Information (ICETCI)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131419726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}