{"title":"Research on Construction Method of Power Grid Topology Integration Based on IEC 61970 CIM","authors":"Jiran Zhu, Peng Liu, Guoqing Wang, Yiming Lu, Di Zhang, Xianguo Kang, Liming Wang, Sumei Guo","doi":"10.1145/3411016.3411159","DOIUrl":"https://doi.org/10.1145/3411016.3411159","url":null,"abstract":"It introduces configuration and implementation method of integrated technology between transmission network model and distribution network model for Chinese power grid based on IEC 61970 series standards in this paper. It contains the transmission network model of CIM/E format is extracted from the business system in security zone of production & control, the distribution network model of CIM/XML format is extracted from the business system in security zone of management & information. It gives a method to translate the model format from CIM/E to CIM/XML, and then finish the technology verification. It achieves integrated and completed grid model from high voltage to low voltage at last. All of the above, it provides a technology program to get completed map of power grid.","PeriodicalId":251897,"journal":{"name":"Proceedings of the 2nd International Conference on Industrial Control Network And System Engineering Research","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128448919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Implementation of Grain Traceability Code Coding Scheme","authors":"Miaolei Deng, Pan Feng","doi":"10.1145/3411016.3411018","DOIUrl":"https://doi.org/10.1145/3411016.3411018","url":null,"abstract":"Aiming at the problem of low traceability accuracy in the existing grain traceability system due to the bulk of the grain, combined with the GTIN coding standard in the GS1 system, a stage traceability code is set for each link of the grain supply chain to achieve positioning to specific links. Aiming at the problems of long length, low security, and confusing expression and format after encryption of existing traceability code, based on the designed stage traceability code, combined with the improved PRESENT encryption algorithm and format-preserving algorithm to encrypt, We obtained a sixteen-digit final traceability code and tested the coding scheme proposed in this paper, The test results show that the proposed scheme is effective and valuable.","PeriodicalId":251897,"journal":{"name":"Proceedings of the 2nd International Conference on Industrial Control Network And System Engineering Research","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115588014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Staging Blockchain Technology In The Customer's Journey Through Service Design: A Bike-sharing Case Study To Improve Quality And Trust Perception","authors":"Evelyn Durugy, Oussama Darouichi, E. Fragnière","doi":"10.1145/3411016.3411161","DOIUrl":"https://doi.org/10.1145/3411016.3411161","url":null,"abstract":"Thanks to the growing trend of the sharing economy and the increased need for innovative mobility solutions, the bike sharing sector has gained considerable importance. However, the privacy of the participants is at risk as their user and travel profiles are not only collected and used by bike sharing service providers. In addition, for the bike share provider, problems have arisen due to increased vandalism and theft of the vehicles on offer. Therefore, this experimental study shows why Blockchain could solve this problem by eliminating dependency on third parties and allowing an economical and user-friendly mode of transport between participants directly. As part of this research, we have \"staged\" the blockchain through service design in the context of bike sharing. Blockchain will only demonstrate its value when integrated into real service experiences. Our main conclusion is that \"blockchain staging\" is more important than the technological dimension of smart contracts.","PeriodicalId":251897,"journal":{"name":"Proceedings of the 2nd International Conference on Industrial Control Network And System Engineering Research","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125494732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Metric Learning with Neural Network for Modbus/TCP Anomaly Detection","authors":"Haicheng Qu, Jianzhong Zhou, Jitao Qin","doi":"10.1145/3411016.3411160","DOIUrl":"https://doi.org/10.1145/3411016.3411160","url":null,"abstract":"In cyber security field, anomaly detection is triggered when detected network data traffic behaves obviously differently from normal data traffic. Traditional approaches typically create or define the normal pattern for the data and compare the normal pattern with the detected object. When a significantly different object appears, it is regarded as abnormal data. This paper proposes a novel neural network structure for anomaly detection, called a metric learning network, which aims to directly learn the differences between abnormal and normal data rather than set up a normal pattern. The network comprises an auto-encoder, which is used to encode the abnormal and normal data, and a metric learning component, which is designed to understand the difference between abnormal and normal data via a comparison approach. A deviation score is produced by the metric learning component to recognize the detected object. Research based on the Modbus/Transmission Control Protocol (TCP) network demonstrates that this approach can not only learn the difference between normal data and outliers, but is suitable for anomaly detection tasks. Our method has greater overall detection rates than a baseline model.","PeriodicalId":251897,"journal":{"name":"Proceedings of the 2nd International Conference on Industrial Control Network And System Engineering Research","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130491836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Relativity-Driven Optimization for Test Schedule of Spaceflight Products at Launch Site","authors":"Litian Xiao, Nan Xiao, Mengyuan Li, Shanshan Xie","doi":"10.1145/3411016.3411158","DOIUrl":"https://doi.org/10.1145/3411016.3411158","url":null,"abstract":"The test preparation of flight products determines the length of the entire cycle from flight products entering the launch site to launch. The improvement of test efficiency is beneficial to the launch efficiency of the launch site. According to the test scheduling plan of flight products at the launch site, we propose test scheduling model based on related data-driven optimization and superimpose test elements on the test network schedule diagram. By means of the correlation between test item input, excitation and output response, the optimization strategy of test process was proposed to decompose and shorten the critical path on test network schedule. The strategy shortens the test cycle of flight products. Through practice, integration testing and good results have been obtained.","PeriodicalId":251897,"journal":{"name":"Proceedings of the 2nd International Conference on Industrial Control Network And System Engineering Research","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114047917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Focal Loss Improves the Model Performance on Multi-Label Image Classifications with Imbalanced Data","authors":"Jianxiang Dong","doi":"10.1145/3411016.3411020","DOIUrl":"https://doi.org/10.1145/3411016.3411020","url":null,"abstract":"Dealing with imbalanced data has always been a great challenge in statistical learning. In classification problems, instances for different classes are unequal in an imbalanced dataset. Therefore, traditional machine learning classification algorithms are usually sensitive to this imbalance both in the training and inference processes. In this paper, by addressing the class imbalance on the basis of Focal Loss, we introduce an approach to improve the performance of convolutional neural networks (CNNs) on the multi-label image classification with an extremely imbalanced dataset. As focal loss puts more focus on hard and misclassified examples when comparing with classic cross-entropy loss, our results demonstrate that such loss function indeed achieves a significant improvement of CNN models (ResNet-50, ResNet-101, and SE-ResNeXt-101) regarding the mean F2 scores on the test set.","PeriodicalId":251897,"journal":{"name":"Proceedings of the 2nd International Conference on Industrial Control Network And System Engineering Research","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126868149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A color image edge detection method based on entropy operator","authors":"Wang Na","doi":"10.1145/3411016.3411022","DOIUrl":"https://doi.org/10.1145/3411016.3411022","url":null,"abstract":"On the basis of making full use of the rich color information of color images, an edge detection method based on entropy operator in 1αβ space is proposed. In the color image space of 1αβ with the least correlation, the two-threshold method based on Shiozaki entropy operator is adopted to extract the edge of color image, which can effectively detect the edge of the region with little change in brightness, chroma or the region with dark light, and obtain rich edge information.","PeriodicalId":251897,"journal":{"name":"Proceedings of the 2nd International Conference on Industrial Control Network And System Engineering Research","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115858899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Naixi Liu, Jingcai Liu, Linming Gong, Xingxing Jia, Daoshun Wang
{"title":"Convolutional Network for Image Steganography With Redundant Embedding","authors":"Naixi Liu, Jingcai Liu, Linming Gong, Xingxing Jia, Daoshun Wang","doi":"10.1145/3411016.3411026","DOIUrl":"https://doi.org/10.1145/3411016.3411026","url":null,"abstract":"Image steganography is one of the secure methods of information communication. Based on deep learning, the steganography models have obtained better performance than those based on handcraft features, but they can not ensure absolute correctness when extracting bit message. To improve extracting accuracy, we propose a new redundant embedding method. Also, to improve robustness and security against steganalysis, we introduce generative adversarial training into our model. From the experimental results, our proposed methods reduce the extracting inaccuracy significantly while maintaining the capability of resisting steganalysis attack. What's more, our proposed methods can be easily generalized to cover images with different size and embedding capacity of different bit message length. Therefore, the proposed model can have a wider application in real use.","PeriodicalId":251897,"journal":{"name":"Proceedings of the 2nd International Conference on Industrial Control Network And System Engineering Research","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127034074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on network test technology of localized operating system","authors":"Yingbei Niu","doi":"10.1145/3411016.3411024","DOIUrl":"https://doi.org/10.1145/3411016.3411024","url":null,"abstract":"According to the characteristics of the localized operating system, the network system division is analyzed and the network protocol test method is proposed. Two methods are used to verify its function and performance, i.e. to check the test data of communication transmission rate through the TCP mode and UDP mode in hub and direct connection environment, and to check the test data of communication transmission rate between different system on the same machine. The dynamic test covers throughput test, packet loss rate test and delay test. The experimental results show that these two methods can ensure the correctness of the network test function and performance of the localized operating system, and meet the relevant network speed test requirements.","PeriodicalId":251897,"journal":{"name":"Proceedings of the 2nd International Conference on Industrial Control Network And System Engineering Research","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125691126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Performance Analysis of Container Cluster Networking Alternatives","authors":"Gulsum Atici, Pinar Sarisaray Boluk","doi":"10.1145/3411016.3411019","DOIUrl":"https://doi.org/10.1145/3411016.3411019","url":null,"abstract":"The use of containers in the informatics industry is increasing rapidly day by day. Although containers have many advantages, such as flexibility, readiness, easy configurability, scalability and low resource consumption, previous researches showed that there are momentous decrements in network performance in containerized cluster environments. Yielded packet sizes and data transfer methods play important roles in the network performance for the networking solutions used in container clusters. As different applications apply different packet sizes and transfer methods, it is of the essence to find and use the best performing networking solution according to application needs. Hence, it is quite important to identify the most convenient container networking solution, especially in production environments. This research analyzed the throughput and latency at varying message sizes on bulk and HTTP-like data transfer methods for container cluster networking solutions, which are Libnetwork, Flannel, Calico, Weave and Open Virtual Networking for Open vSwitch. Furthermore, it compared the performance of cluster networking solutions with a native host. As a result of the experiments, Open Virtual Networking for Open vSwitch and Calico were found to be the most adequate solutions for production environments with the highest throughput and minimum latency values depending on selected message sizes and transfer methods. In addition, a bare-metal host generally outperforms all the container networking solutions except HTTP-like transfer throughput results at a large message size. Hence, this study also demonstrates the offloading impact in container networking solutions.","PeriodicalId":251897,"journal":{"name":"Proceedings of the 2nd International Conference on Industrial Control Network And System Engineering Research","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122213755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}