{"title":"Optimal Load Scheduling Based on Mobile Edge Computing Technology in 5G Dense Networking","authors":"Luohui Xia, Dandan Guo, Yongjun Wang, Dandan Sun, Weijing Zhen, Congrui Jing","doi":"10.1109/ACCC58361.2022.00030","DOIUrl":"https://doi.org/10.1109/ACCC58361.2022.00030","url":null,"abstract":"Mobile Edge Computing (MEC) technology enables offloading of network tasks at the edge, combining edge IoT devices to provide proximity services for devices or terminals, solving the pressure and shortage of data storage, performance computing and decision analysis in the cloud platform. However, in the scenario of large-scale dense networking, the terminal deployment order is large and the tasks are large. Therefore, the system model based on mobile edge computing needs to be further optimized to meet the service requirements. In addition, the computing and storage resources of the edge computing nodes are limited, and there is a possibility of backlog of intensive task processing. Therefore, the mobile edge computing in the 5G intensive networking scenario still faces the task scheduling problem. Based on the above analysis, this paper proposes a task load balancing algorithm based on game theory. The algorithm can prove the upper limit of system cost by establishing a mathematical model for multi-terminal task processing and combining with the game mathematics theory to solve the optimal solution. he simulation results show that the algorithm proposed in this paper can reasonably utilize the edge resources and ensure the maximum benefit of the terminal equipment.","PeriodicalId":285531,"journal":{"name":"2022 3rd Asia Conference on Computers and Communications (ACCC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122351956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Integrated Neutrosophic SNA-MABAC Approach for Blockchain Applicability Evaluation in Sustainable Supply Chains","authors":"Pei-Hao Wang, Yan Lin, Zhiping Wang","doi":"10.1109/ACCC58361.2022.00019","DOIUrl":"https://doi.org/10.1109/ACCC58361.2022.00019","url":null,"abstract":"The outbreak of the novel coronavirus pneumonia and the turbulent international situation in recent years have seriously disrupted the normal operation of the entire supply chain (SC). As an emerging technology, blockchain is characterized by decentralization, reliability, transparency and traceability, which can be effectively applied to solve social, environmental and economic concerns and achieve sustainability of supply chain. However, whether blockchain is suitable for every function of a sustainable supply chain (SSC), or what function is best suited for the application of a set of blockchain criteria, can be viewed as a multi-criteria group decision-making (MCGDM) problem. This paper presents a combined MCGDM technique utilizing the social network analysis (SNA) and Multi-Attributive Border Approximation Area Comparison (MABAC), for selecting an appropriate function of SSCs to implement blockchain technology with Neutrosophic information. The framework gives quantitative consideration to the weight of relevant blockchain criteria and decision makers under high uncertainty. This study can also facilitate the effective allocation of resources and enhance the competitiveness of SSCs in the coordinated planning of various blockchain deployments.","PeriodicalId":285531,"journal":{"name":"2022 3rd Asia Conference on Computers and Communications (ACCC)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115672150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Weather China: A 5G RCS Solution for Meteorological Service","authors":"Hanhua Qu, Wei Tang, Yanpeng Li, Siyuan Sun, Shibo Tang, Xiaoran Zhao","doi":"10.1109/ACCC58361.2022.00021","DOIUrl":"https://doi.org/10.1109/ACCC58361.2022.00021","url":null,"abstract":"Traditional meteorological service was generally provided through the 2nd/3rd Generation (2G/3G) Short Message Service (SMS), websites and the 4th Generation (4G) mobile weather apps. However, with the growing demand for meteorological service and the rapid revolution of information technology, the deficiencies of previous service modes are inevitably emerged such as inflexible information, inconvenient interaction and over-reliance on apps. The 5th Generation (5G) Rich Communication Suite (RCS) is the next generation of SMS with the advantages of multimedia information and convenient interaction. And it is regarded as one of the crucial ways for urging social promotion and enhancing users' experience of the meteorological service field in the foreseeable future. This study focuses on a comprehensive solution named Weather China for meteorological service based on the 5G RCS information system, including the service scenarios, technical architecture and operational challenges. First, we put forward three typical scenarios and the RCS product forms for each scenario. Then design a meteorological service hierarchical structure with the 5G RCS, give the general workflow for the public by the 5G communication channel and develop a chatbot to achieve interactive intentions on specific scenarios based on natural language processing. In addition, to better investigate this solution, the typical cases of meteorological information query products are successfully developed. At last, the suggestions and upcoming challenges for further business operation are summarized. The solution discussed in this study provides a benchmark for meteorological service based on 5G RCS.","PeriodicalId":285531,"journal":{"name":"2022 3rd Asia Conference on Computers and Communications (ACCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130855662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Yu, Fucheng Yang, R. Han, H. Duan, Feifei Li, Peishun Liu
{"title":"Improved SEIR Model Based on Recovery Rate Optimization to Predict COVID-19","authors":"S. Yu, Fucheng Yang, R. Han, H. Duan, Feifei Li, Peishun Liu","doi":"10.1109/ACCC58361.2022.00012","DOIUrl":"https://doi.org/10.1109/ACCC58361.2022.00012","url":null,"abstract":"When using the traditional SEIR infectious disease model to predict the trend of novel coronavirus pneumonia epidemic, numerous initial parameters need to be tuned, and the parameters cannot change over time during the prediction process, which reduces the accuracy of the model. Firstly, thesis used a logistic model to preprocess the SEIR model parameters and proposed a SEIR model based on time series recovery rate optimization with a new parameter of effective immunity rate. Secondly, the model was trained with epidemic data from domestic and foreign provinces and cities, and the usability of the model was demonstrated experimentally, and the mean absolute percentage error (MAPE) and goodness of fit (R2) were used to compare with other models, which proved the superiority of the model prediction and indicated further research directions.","PeriodicalId":285531,"journal":{"name":"2022 3rd Asia Conference on Computers and Communications (ACCC)","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122567511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Test Task Management Scheduling of Integrated Test Platform Based on Improved Genetic Algorithm","authors":"Dandan Guo, Luohui Xia, Yongjun Wang, Lili Liang, Cuiya Qin, Tongle Fan","doi":"10.1109/ACCC58361.2022.00011","DOIUrl":"https://doi.org/10.1109/ACCC58361.2022.00011","url":null,"abstract":"As the application range of iot terminal becomes wider and wider, people put forward higher requirements on the performance of iot device, which leads to a huge increase in the testing tasks of iot terminal device. In order to solve the problems of complex system structure, resource waste and low detection efficiency of the current detection equipment, this paper proposes a test task scheduling strategy based on improved genetic algorithm. By updating fitness function, the test task order is optimized and the test resources of the integrated test platform are rationally utilized. Based on the simulation results, the improved algorithm proposed in this paper can effectively improve the task test efficiency and maximize the test benefits.","PeriodicalId":285531,"journal":{"name":"2022 3rd Asia Conference on Computers and Communications (ACCC)","volume":"15 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125114639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Quantitative Evaluation Method for Cryptography Applications in Industrial Control Systems","authors":"Dinghua Zhang, Quan Pan, Yang Li","doi":"10.1109/ACCC58361.2022.00007","DOIUrl":"https://doi.org/10.1109/ACCC58361.2022.00007","url":null,"abstract":"The deep integration of cryptography with industrial control protocols is a technical difficulty. Both the industry and academia are carrying out in-depth application research on industrial control system cryptography application. Security assessment is one of the important tasks for industrial control cryptography applications. This paper presented a quantitative evaluation method for industrial control cryptography applications. Using this method, targeting at the general security framework presented in NIST SP 800–82, we analyzed the cryptography applications at network and communication level, and at application data security level respectively. It shows that technological breakthroughs at these two levels can improve the overall quantitative analysis results of the industrial control system by about 10%. Based on the quantitative analysis results, this paper puts forward relevant suggestions on the cryptography application of industrial control system, which has reference significance for the research and development of industrial control system cryptography technology.","PeriodicalId":285531,"journal":{"name":"2022 3rd Asia Conference on Computers and Communications (ACCC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129303333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Segundo Moisés Toapanta T, Eriannys Zharayth Gómez Díaz, Carmita Ines Suarez, Angel Ernesto Huerta Vélez, Carmen Suárez, Marcelo Zambrano Vizuete
{"title":"Analysis to Mitigate Risks in Information Security for Management in Higher Education Institutions","authors":"Segundo Moisés Toapanta T, Eriannys Zharayth Gómez Díaz, Carmita Ines Suarez, Angel Ernesto Huerta Vélez, Carmen Suárez, Marcelo Zambrano Vizuete","doi":"10.1109/ACCC58361.2022.00022","DOIUrl":"https://doi.org/10.1109/ACCC58361.2022.00022","url":null,"abstract":"The problems of security in educational institutions in the world and especially in Ecuador are evident for its management. The objective is to carry out an analysis to determine how to mitigate the risks in information security for management in higher education institutions. It was used the deductive method and exploratory research were used for the analysis of information. Turned out a relevant contribution in information security from several researchers from Ecuador, China, South Korea, Japan, the Republic of Latvia, Newark, Delaware, Islamic, among others, a context diagram of all the relevant actors and forms and trends for the evaluation of an indicator to mitigate the risks of information in a higher education institution. It was concluded that the relevant contributions of the countries, the context diagram, forms and trends obtained as results in this research should be applied in a higher education institution to mitigate the risks of information.","PeriodicalId":285531,"journal":{"name":"2022 3rd Asia Conference on Computers and Communications (ACCC)","volume":"22 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129122243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on the Application of Blockchain Smart Contract in Software Supply Chain Management","authors":"Shuaijianni Xu, Yaodong You, Yuanying Xiao","doi":"10.1109/ACCC58361.2022.00020","DOIUrl":"https://doi.org/10.1109/ACCC58361.2022.00020","url":null,"abstract":"With the development of the information technology industry and the expansion of software development requirements, the scale and complexity of software are increasing, which makes the software development process turn into a software supply chain with superior or subordinate relationships. However, due to the inherent fragility of the software supply chain and the uneven quality of third-party open-source software, accidents occur frequently, and the security of the software supply chain has received extensive attention. We first figure out the security risks faced by the software supply chain and then innovatively proposes a software supply chain management system based on blockchain. To the best of our knowledge, this is the first blockchain-based software supply chain management system. The transfer processes of all third-party components or software products in the system are permanently recorded in the distributed ledger through smart contracts, which become the basis when handling and tracking software supply chain security incidents.","PeriodicalId":285531,"journal":{"name":"2022 3rd Asia Conference on Computers and Communications (ACCC)","volume":"215 S681","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113972458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AYAT: A Lightweight and Efficient Code Clone Detection Technique","authors":"Yasir Giani, Luo Ping, Syed Asad Shah","doi":"10.1109/ACCC58361.2022.00015","DOIUrl":"https://doi.org/10.1109/ACCC58361.2022.00015","url":null,"abstract":"Code clones make software maintenance more challenging. Detecting bugs in large systems may significantly increase maintenance costs. Despite the fact that several techniques for clone identification have been proposed over the years, the accuracy and scalability of clone detection techniques remain hot research areas. Previously, Akram et al. proposed the DroidCC hybrid technique, where tokens were encoded into MD5 hash values by encoding them into 128-bit fingerprints, and clones were identified by matching identical hash values. Encoding tokens into MD5 hash values take more time due to the large fingerprint size of MD5 hash values. Due to the enormous chunk size, DroidCC cannot achieve higher accuracy. To overcome the weakness of the DroidCC technique, We proposed a novel AYAT a lightweight hybrid technique to detect clones at the fragment level. To speed up the detection process, we converted tokens into 32-bit polynomial values, and we set the chunk size to 5 lines per chunk to improve accuracy. We tested our technique on 10,968 java projects against 4.98 million lines of code. In comparison to the well-known DroidCC technique, it is significantly faster and more efficient. Our examination demonstrates that precision is significantly improved despite sacrificing scalability. AYAT code cloning detection technique has outscored DroidCC in every aspect.","PeriodicalId":285531,"journal":{"name":"2022 3rd Asia Conference on Computers and Communications (ACCC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129534792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of AI-Based TCM Prescription Analysis Applet","authors":"Tingting Huang, Xue-Fei Wang, Chen Yuan, Fei Wang, Xinyue Wang, Zhen-Liang Huang, Jian-Hua Li, Zezhi Shao","doi":"10.1109/ACCC58361.2022.00009","DOIUrl":"https://doi.org/10.1109/ACCC58361.2022.00009","url":null,"abstract":"The micro program “TCM prescription data collection” was developed by using Wechat developer tools, MYSQL database, Spring Boot and other technologies to realize the collection, processing and analysis of patients' vital signs information, clinical examination and TCM prescription data. The intelligent information annotation, extraction and structured data storage of user interface text data are realized by NLP technology. The similarity analysis and visualization of classical prescriptions for cardiovascular and cerebrovascular diseases were mainly realized. Through the calculation of word frequency, it explores the relationship between each keyword, and deeply excavates the relationship between source data and diseases, which lays a foundation for the research on the law of prescription and medication of traditional Chinese medicine.","PeriodicalId":285531,"journal":{"name":"2022 3rd Asia Conference on Computers and Communications (ACCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122333994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}