2023 IEEE International Conference on Integrated Circuits and Communication Systems (ICICACS)最新文献

筛选
英文 中文
Encrypted Cost Based Load Forecasting With Attack Regression Capacity for CPS Model Based Anomaly Detection in Smart Grid Security 基于CPS模型的智能电网安全异常检测中具有攻击回归能力的加密成本负荷预测
2023 IEEE International Conference on Integrated Circuits and Communication Systems (ICICACS) Pub Date : 2023-02-24 DOI: 10.1109/ICICACS57338.2023.10099664
Saket Mishra, Rahul Mishra
{"title":"Encrypted Cost Based Load Forecasting With Attack Regression Capacity for CPS Model Based Anomaly Detection in Smart Grid Security","authors":"Saket Mishra, Rahul Mishra","doi":"10.1109/ICICACS57338.2023.10099664","DOIUrl":"https://doi.org/10.1109/ICICACS57338.2023.10099664","url":null,"abstract":"Smart Grid is distributed through grid computing programs that focus on the efficient operation of power systems in applications to be used in conjunction with. Involvement in SGS techniques involves threats such as power outages, energy theft, customer privacy behavior, threats to operators' security, etc., therefore, requires serious criticism. Designed to prevent the collapse of potential threats or security issues in existing systems, smart grid systems Analytical security assessment is based on framework-matter. Based on the power overflow phase, the properties of the communication network, and the integration coincidence equation, the Markov decision process (MDP) is used to measure smart grid security. The safety code provided for example appears to be a novel solution to the simultaneous power emergency review and can be defended by taking corrective action to resolve the hole-size sound grid product critical level. The goal of the proposed task is to expand the wide area surveillance system (W AMS) to provide security hole size counterfeit science fiction, and we hope to be able to build a security indicator to suit the W AMS at the top of the case. W AMP AC makes full use of measurement design and models in the cyber-physics system, as well as descriptive case studies based on the detection and mitigation of anomalies in attack and implementation of flexibility algorithms.","PeriodicalId":274807,"journal":{"name":"2023 IEEE International Conference on Integrated Circuits and Communication Systems (ICICACS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130020437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed Intelligent Scheduling Algorithm for Wireless Communication Network Link Resources Based on Data Analysis 基于数据分析的无线通信网络链路资源分布式智能调度算法
2023 IEEE International Conference on Integrated Circuits and Communication Systems (ICICACS) Pub Date : 2023-02-24 DOI: 10.1109/ICICACS57338.2023.10099949
Yang Feng
{"title":"Distributed Intelligent Scheduling Algorithm for Wireless Communication Network Link Resources Based on Data Analysis","authors":"Yang Feng","doi":"10.1109/ICICACS57338.2023.10099949","DOIUrl":"https://doi.org/10.1109/ICICACS57338.2023.10099949","url":null,"abstract":"The construction of wireless network is the mainstream direction of future communication development, and link optimization provides a basis for information exchange between the next generation of intelligent mobile terminals and base stations. This paper studies the link scheduling problem based on data analysis. First, after deriving the traditional optimal power allocation strategy and improving the genetic algorithm to obtain a new model, this paper proposes an optimization scheme calculation that is suitable for resource sharing among nodes, and can also consider the impact of time utility and other factors on the global availability, network topology and quality of service to minimize the overhead, and applies it to the wireless communication network for example verification. The experimental results show that the distributed intelligent scheduling algorithm for wireless communication network link resources based on data analysis performs very well in terms of running time and system processing efficiency, which can reach more than 90% efficiency.","PeriodicalId":274807,"journal":{"name":"2023 IEEE International Conference on Integrated Circuits and Communication Systems (ICICACS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129710972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of K-means Algorithm in Kansei Engineering K-means算法在感性工程中的应用
2023 IEEE International Conference on Integrated Circuits and Communication Systems (ICICACS) Pub Date : 2023-02-24 DOI: 10.1109/ICICACS57338.2023.10100111
Y. Liu
{"title":"Application of K-means Algorithm in Kansei Engineering","authors":"Y. Liu","doi":"10.1109/ICICACS57338.2023.10100111","DOIUrl":"https://doi.org/10.1109/ICICACS57338.2023.10100111","url":null,"abstract":"Only on the premise of meeting the use function, and at the same time meeting the emotional needs of consumers, so that consumers can get spiritual satisfaction and enjoyment, can there be a guarantee for long-term development. Perceptual engineering is the main method to study the perceptual expression of product modeling in recent years. It combines perceptual factors with engineering design, and emphasizes the design of products based on human perceptual analysis. Through this method, the most appropriate emotional factors can be selected for design in the development of new products, so that consumers' emotional needs for products can be maximized. Perceptual engineering is a branch of engineering that studies the analysis and optimization of mechanical systems. The main goal of perceptual engineering is to obtain the optimal design of a given system in terms of cost, reliability, performance or any other relevant parameters. In this article, we will discuss how to use k-means algorithm to find the best solution to design machines using perceptual engineering method. The concept behind this method is very simple: we do not need to solve the problem manually, but use computer algorithms to solve the problem automatically without knowing all the details of the problem in advance.","PeriodicalId":274807,"journal":{"name":"2023 IEEE International Conference on Integrated Circuits and Communication Systems (ICICACS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130092391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Construction of Financial Earnings Forecasting Model of Listed Companies based on Modified Genetic Algorithm 基于改进遗传算法的上市公司财务盈余预测模型构建
2023 IEEE International Conference on Integrated Circuits and Communication Systems (ICICACS) Pub Date : 2023-02-24 DOI: 10.1109/ICICACS57338.2023.10099577
Feiren Wen
{"title":"Construction of Financial Earnings Forecasting Model of Listed Companies based on Modified Genetic Algorithm","authors":"Feiren Wen","doi":"10.1109/ICICACS57338.2023.10099577","DOIUrl":"https://doi.org/10.1109/ICICACS57338.2023.10099577","url":null,"abstract":"When making the next development plan, the listed company needs to know the financial surplus of the current quarter, so as to judge whether the financial condition can support the next plan or adjust the next plan according to the specific situation. Therefore, in order to forecast accurately, this paper will build financial earnings forecast model based on modified genetic algorithm. In the analysis process, the basic concepts and advantages and characteristics of modified genetic algorithm are introduced first, and then the financial earnings forecast model of listed companies is modeled. It is confirmed that the financial earnings prediction model of listed companies under modified genetic algorithm gives more accurate results.","PeriodicalId":274807,"journal":{"name":"2023 IEEE International Conference on Integrated Circuits and Communication Systems (ICICACS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123751053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Data Communication Using Padding Key Encryption Cryptography Algorithm 使用填充密钥加密的安全数据通信加密算法
2023 IEEE International Conference on Integrated Circuits and Communication Systems (ICICACS) Pub Date : 2023-02-24 DOI: 10.1109/ICICACS57338.2023.10099570
Aman Mittal, Frederick Sidney
{"title":"Secure Data Communication Using Padding Key Encryption Cryptography Algorithm","authors":"Aman Mittal, Frederick Sidney","doi":"10.1109/ICICACS57338.2023.10099570","DOIUrl":"https://doi.org/10.1109/ICICACS57338.2023.10099570","url":null,"abstract":"Nowadays, in communications, the main criteria to ensure that the information and communication in the network. The normal two users' communication exchanges confidential data and files via the network. Secure data communication is the most important and crucial problem by message transmission networks. To resolve this problem, cryptography uses mathematical encryption and decryption data on adaptation by converting a data from key into an unreadable format. Cryptography provides a method for performing the transmission of confidential or secure communication. The proposed Padding Key Encryption (PKE) algorithm is used to encrypt the data; it generates the secret key in an unreadable format. The receiver decrypts the data using the private key in a readable format. In the proposed PKE algorithm, the sender sends data into plain text to cipher-text using a secret key to the authorized person; the unauthorized person cannot access the data through the Internet; only an authorized person can view the data the private key. The proposed simulation results provide high security to communicate the receiver for confidential data or files compared with other previous methods.","PeriodicalId":274807,"journal":{"name":"2023 IEEE International Conference on Integrated Circuits and Communication Systems (ICICACS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121289434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent Detection Method of Computer Network Intrusion based on Big Data Clustering Algorithm 基于大数据聚类算法的计算机网络入侵智能检测方法
2023 IEEE International Conference on Integrated Circuits and Communication Systems (ICICACS) Pub Date : 2023-02-24 DOI: 10.1109/ICICACS57338.2023.10099701
Jiyin Zhou
{"title":"Intelligent Detection Method of Computer Network Intrusion based on Big Data Clustering Algorithm","authors":"Jiyin Zhou","doi":"10.1109/ICICACS57338.2023.10099701","DOIUrl":"https://doi.org/10.1109/ICICACS57338.2023.10099701","url":null,"abstract":"N etwork technology is rapidly developing and the Internet has penetrated into every step of people's daily production life. As the importance of the Internet continues to strengthen, security issues are becoming increasingly acute. And the network security problem in the context of big data (BD) presents the characteristics of new mode, large scale and high concealment. Therefore, the research of IDM based on BD features has received wide attention in the field of network security and is applied in various fields. In this paper, we propose an intelligent detection method for computer network intrusion based on BD clustering algorithm for the lack of relevance, timeliness and targeting of current computer network intrusion event detection technology. Firstly, the network intrusion events are classified, and the contents contained in the target files are obtained by clustering algorithm clustering, then the files are clustered and analyzed using neural network, and the intrusion events are classified according to the classification results after clustering. The ID results implemented based on the clustering algorithm can be compared and analyzed with traditional methods. Firstly, the data is pre-processed in the data mining module and then the data set is constructed for clustering training; then the data is clustered after training set by cross-validating and calculating the classification results. After training to get the sample set again to cluster the data training set samples using Number Stata 2 training set data using randomly generated sample dataset; finally get the model dataset using the algorithm proposed in this paper to classify the target documents. In the experiment detection results show that: the intrusion strategy obtained after clustering analysis is significantly more accurate compared with the ID results; detection accuracy can reach 93.3%; has the advantages of good detection effect and detection speed.","PeriodicalId":274807,"journal":{"name":"2023 IEEE International Conference on Integrated Circuits and Communication Systems (ICICACS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116311950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advantages of 5G Slicing Technology in the Internet of Things 5G切片技术在物联网中的优势
2023 IEEE International Conference on Integrated Circuits and Communication Systems (ICICACS) Pub Date : 2023-02-24 DOI: 10.1109/ICICACS57338.2023.10099520
B. Jin, Fei Long, Fan Xia, Shi Chen, Huan Xu, Wei-Dong Zhan, Weidong Feng, Rui Zhang
{"title":"Advantages of 5G Slicing Technology in the Internet of Things","authors":"B. Jin, Fei Long, Fan Xia, Shi Chen, Huan Xu, Wei-Dong Zhan, Weidong Feng, Rui Zhang","doi":"10.1109/ICICACS57338.2023.10099520","DOIUrl":"https://doi.org/10.1109/ICICACS57338.2023.10099520","url":null,"abstract":"The application scenarios of 5G will broaden from mobile Internet to the Internet of Things (IoT), industrial Internet and many other fields. Its high speed, low latency, high reliability and wide coverage will greatly promote the flourishing of smart city systems, telemedicine systems, artificial intelligence technologies and IoT technologies. The objective of this paper is to investigate the advantages of 5G slicing technology for IoT applications. In order to meet the demand for high speed for 4K HD video transmission and the demand for low latency and high reliability for remote surgery, a network slicing system architecture for mobile medical scenarios is designed with reference to the idea of end-to-end network slicing, using the NC separation feature of SDN technology and the network function virtualization of VNF technology, and then the overall system architecture and the specific implementation process of end-to-end network slicing are elaborated. The overall system architecture and the specific implementation flow of end-to-end network slicing are then elaborated, and finally, through simulation, the proposed end-to-end network slicing system solution is concluded to be efficient and feasible.","PeriodicalId":274807,"journal":{"name":"2023 IEEE International Conference on Integrated Circuits and Communication Systems (ICICACS)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127145843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
MATLAB's Automobile Power Performance and Intelligent Chromatography of Battery Capacity Decay 汽车功率性能与电池容量衰减的MATLAB智能色谱
2023 IEEE International Conference on Integrated Circuits and Communication Systems (ICICACS) Pub Date : 2023-02-24 DOI: 10.1109/ICICACS57338.2023.10099843
Chunmei Chen
{"title":"MATLAB's Automobile Power Performance and Intelligent Chromatography of Battery Capacity Decay","authors":"Chunmei Chen","doi":"10.1109/ICICACS57338.2023.10099843","DOIUrl":"https://doi.org/10.1109/ICICACS57338.2023.10099843","url":null,"abstract":"The dynamic performance of a vehicle is one of the most important indicators to evaluate the driving state of the vehicle. For cars, the power performance and battery capacity of the car are directly related to the use rate and evaluation of the car owners. Therefore, in order to improve the effective service life of vehicles, reduce environmental pollution and reduce economic costs, it is necessary to analyze the vehicle power performance and battery. In this paper, the experimental method and comparison method are mainly used, and different algorithms are used to study the vehicle power performance and battery capacity attenuation. The experimental results show that the error of AHP in vehicle battery capacity identification and dynamic performance detection is less than 2%, so the overall design of this paper meets the expected design requirements.","PeriodicalId":274807,"journal":{"name":"2023 IEEE International Conference on Integrated Circuits and Communication Systems (ICICACS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130817105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Machine Learning-Enhanced Method for Quantifying and Recycling Construction and Demolition Waste in India 基于机器学习的印度建筑和拆除垃圾量化和回收方法
2023 IEEE International Conference on Integrated Circuits and Communication Systems (ICICACS) Pub Date : 2023-02-24 DOI: 10.1109/ICICACS57338.2023.10099602
Ramnarayan, Pragya Malla
{"title":"A Machine Learning-Enhanced Method for Quantifying and Recycling Construction and Demolition Waste in India","authors":"Ramnarayan, Pragya Malla","doi":"10.1109/ICICACS57338.2023.10099602","DOIUrl":"https://doi.org/10.1109/ICICACS57338.2023.10099602","url":null,"abstract":"Construction and Demolition Waste in construction industries generate 10 to 12 million tons of waste per year. Not even 50% of the waste generated by major construction materials such as cement, bricks, wires, stones, wood, plastic, and steel pipes is recycled. And 70% of Indian construction industry is not aware of recycling technologies. The solid waste extracted from municipal waste is used in industries and the resulting sludge is eventually dumped on urban land. A large amount of sludge is emitted as a result of coal and ash used in the use of nuclear reactors, iron and metal industries, which produce large amounts of waste. In this paper, a machine learning-enhanced method for quantifying and recycling construction and demolition waste. Various industrial wastes such as wastes from non-ferrous industries, sugar manufacturing, paper manufacturing, and fertilizer industries also generate solid waste. The local administration is not responsible for the management of solid waste from industries. The respective factories themselves manage them and take the necessary prior permission.","PeriodicalId":274807,"journal":{"name":"2023 IEEE International Conference on Integrated Circuits and Communication Systems (ICICACS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116611013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Network Security Approach based on Machine Learning 基于机器学习的网络安全方法
2023 IEEE International Conference on Integrated Circuits and Communication Systems (ICICACS) Pub Date : 2023-02-24 DOI: 10.1109/ICICACS57338.2023.10100204
Kai Yun, Yang Jin, Qiang Huang, Qingpeng Wang
{"title":"A Network Security Approach based on Machine Learning","authors":"Kai Yun, Yang Jin, Qiang Huang, Qingpeng Wang","doi":"10.1109/ICICACS57338.2023.10100204","DOIUrl":"https://doi.org/10.1109/ICICACS57338.2023.10100204","url":null,"abstract":"Network security is the main content of network management, but in the process of network security management, it is vulnerable to hacker intrusion and communication interference, which reduces the level of network security, and causes the loss of crucial communication data and the wrong results of security assessment. Based on this, this paper proposes a machine learning method to machine study network communication data, enhance network communication data, and shorten network communication time. The network communication data is then analyzed by messages. Finally, the machine learning method is used to judge the security of communication data and output the final security assessment results. The results show that the machine learning method can accurately carry out network security analysis, reduce the interference of hackers and communications, and the security level is greater than 9 to 5%, which is better than the online security monitoring method. Therefore, the machine learning method can meet network security requirements and is suitable for network management.","PeriodicalId":274807,"journal":{"name":"2023 IEEE International Conference on Integrated Circuits and Communication Systems (ICICACS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132352701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信