{"title":"Competition of Artificial Intelligence in Big Countries: the Mystery of Power and Security","authors":"Rong-hui Zhu, Ziwen Feng, Qi Chen","doi":"10.1109/ICNISC57059.2022.00051","DOIUrl":"https://doi.org/10.1109/ICNISC57059.2022.00051","url":null,"abstract":"Artificial intelligence is an important core technology leading a new round of scientific and technological revolution, which will inevitably bring profound changes to military operations, industrial upgrading and social governance modernization. Faced with the potential of this technology to reshape the international pattern, major countries in the world have successively raised the development of artificial intelligence to the national strategic level, which has led to a fierce competition in science and technology among big countries, among which the most noticeable one is the cold war of artificial intelligence launched by the United States against China. The existing research believes that the United States maintains global leadership and discourages China's technological catch-up drive the direction of American artificial intelligence policy towards China. Through the policy investigation of the last two American governments, it can be found that the American competition for artificial intelligence in China has a strong political color of power. The White House and the State Council are obsessed with stigmatizing the application of artificial intelligence in China, showing a long-term preference for institutional leadership and the right to make rules. However, the Ministry of National Defense, the Ministry of Finance and the Ministry of Commerce have decision-making contradictions and position exchanges in the specific implementation of maintaining American technological hegemony and supply chain stability. In advancing the iteration of military intelligence, the US military's empowerment of offensive weapons not only reduces the credibility of maintaining strategic stability signals, but also deepens the security dilemma between China and the United States. These findings are helpful to understand the complex signals released by the “security” of American artificial intelligence technology, and provide a possible perspective and direction for exploring global security governance in the intelligent age.","PeriodicalId":286467,"journal":{"name":"2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123126345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Safety-oriented Modeling Method of Complex System","authors":"Zeyong Jiang, Yalan Wang, Xiaohua Wen, Xiaohu Hou","doi":"10.1109/ICNISC57059.2022.00153","DOIUrl":"https://doi.org/10.1109/ICNISC57059.2022.00153","url":null,"abstract":"The relationship between components in modern complex systems is becoming more and more complex. The local disturbance in the system may cause global impact due to fault correlation. In view of this, the traditional safety model cannot be described comprehensively and objectively, and the model has some problems, such as inconsistency with the design model, poor objectivity, and difficulty in ensuring completeness. Based on the multi-view modeling framework of DoDAF, the Sys-DoD model focus on safety is established by using SysML. The model can describe the causal logic and propagation relationship between the components of complex system in the same and different hierarchies, and provide a complete and accurate model support for subsequent safety analysis and risk assessment.","PeriodicalId":286467,"journal":{"name":"2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"174 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121073505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Errui Zhou, Ming Yan, Luwei Liu, Gang Li, Mingan Guo, Shaohua Yang, Binkang Li
{"title":"Image Deblurring Based on Normalized-weighted Total Variation","authors":"Errui Zhou, Ming Yan, Luwei Liu, Gang Li, Mingan Guo, Shaohua Yang, Binkang Li","doi":"10.1109/ICNISC57059.2022.00071","DOIUrl":"https://doi.org/10.1109/ICNISC57059.2022.00071","url":null,"abstract":"Image deblurring is an important and challenging problem in imaging processing. It aims to restore clear images from degenerated ones caused by camera shake or target motion. The total variation (TV) regularization has been widely used in image deblurring, which needs to be carefully modified because of over-smoothing issue and solution bias caused by the homogeneous penalization. In this paper, a non-blind image deblurring method based on normalized-weighted TV (NWTV) is proposed. The method utilizes a weight vector to indicate the importance of image gradients, and the weight vector is normalized in a range between 0 and 1. The NWTV method can perform well in images with sparse or dense gradients. The performance of NWTV has been compared with several state-of-the-art image deblurring methods including MPTV, TV-ADMM, LO-IG and INSR. Experimental results demonstrate that the proposed method achieves comparative or better performance.","PeriodicalId":286467,"journal":{"name":"2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125160285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application Research of Cognitive Radio Technology Based on Satellite Communication System","authors":"Lili Zhao, Pengpeng Yu, Shuhua Zhou, Jinshi Yang, Qicai Dong, Jing Liu, Yan Zhao","doi":"10.1109/ICNISC57059.2022.00031","DOIUrl":"https://doi.org/10.1109/ICNISC57059.2022.00031","url":null,"abstract":"The article introduces in detail the characteristics of satellite communication technology, the application of cognitive radio technology, the technology model of system resource allocation, etc.; based on OFDMA multiple access mode; analyzes the application of cognitive radio technology in satellite communication systems; The satellite communication system model algorithm is designed.","PeriodicalId":286467,"journal":{"name":"2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"231 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126140113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Web Application Anomaly Intrusion Detection Model Based On Massive Logs","authors":"J. Gong","doi":"10.1109/ICNISC57059.2022.00010","DOIUrl":"https://doi.org/10.1109/ICNISC57059.2022.00010","url":null,"abstract":"Web log data in university application system is an important source of system operation and maintenance and security analysis. Based on MapReduce architecture, combined with the learning and detection model of attribute length, character distribution characteristics and attribute domain enumeration, this paper presents a massive data intrusion detection learning model and detection algorithm. The system operation results show that the platform can effectively find abnormal intrusion in the campus network, has high retrieval efficiency, and can effectively provide operation and maintenance efficiency and abnormal troubleshooting speed.","PeriodicalId":286467,"journal":{"name":"2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123574287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application Research of Automatic Acupoint Finding Based on Binocular Vision Positioning and Skeleton Recognition","authors":"Zheng Fu, Qishun Wei, Jun Liu, Weijian Zhang","doi":"10.1109/ICNISC57059.2022.00121","DOIUrl":"https://doi.org/10.1109/ICNISC57059.2022.00121","url":null,"abstract":"Inaccurate acupoint determination is one of the problems in moxibustion treatment of traditional Chinese medicine. Based on traditional Chinese medicine theory and computer stereo vision technology, we developed an intelligent treatment algorithm. Combined with attitude recognition framework, the algorithm completes automatic hole finding. Experimental results show that the algorithm performs well. Rotate the mannequin so that it is at a different angle from the camera field of view. The difference of measurement and location all met the clinical requirements.","PeriodicalId":286467,"journal":{"name":"2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"445 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122806873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Method for Supplementing the Knowledge Graph of Power User Service","authors":"Gaofeng Xu, Zhizheng Zhang","doi":"10.1109/ICNISC57059.2022.00160","DOIUrl":"https://doi.org/10.1109/ICNISC57059.2022.00160","url":null,"abstract":"In order to reduce the workload of manual supplementation of the knowledge graph of power user service and improve the efficiency of supplementation, a method that can assist manual supplementation of the knowledge graph of power user service is designed. This paper firstly introduces the structure of the knowledge graph of power user service and the design scheme of the graph supplementing method based on human-computer interaction, and defines the questions that need add into graph and the process that how to supplement the knowledge graph. Then, the key technology in the graph supplementing method—user questions matching, is introduced. A deep learning-based user questions matching method is proposed and an algorithm suitable for questions matching in the power user service is selected through experimental comparison. Finally, analysis and summary are carried out.","PeriodicalId":286467,"journal":{"name":"2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129717315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lingchao Gao, Zhixian Pi, Jiakai Wang, Jiasong Sun
{"title":"Smart Grid Data Traceability System based on Blockchain Technologies","authors":"Lingchao Gao, Zhixian Pi, Jiakai Wang, Jiasong Sun","doi":"10.1109/ICNISC57059.2022.00145","DOIUrl":"https://doi.org/10.1109/ICNISC57059.2022.00145","url":null,"abstract":"The development of smart grid systems is based on the concept of integrating intelligence into all grid components for management, which contains a large amount of heterogeneous data such as various assets and equipment. Big data analytics is considered a practical technology to provide smart grid data management solutions. In order to overcome the problems of artificially introduced label confusion and storage duplication in smart grid data, this paper proposes a smart grid data traceability system based on the principle of blockchain. The experimental results of data traceability based on blockchain technology in the smart grid data traceability system show that by using blockchain technology-based data traceability in the smart grid procurement data platform, the data traceability capability of the smart grid data traceability system is improved. In addition, the tests conducted in the edge computing device scenario also obtained good usability and feasibility.","PeriodicalId":286467,"journal":{"name":"2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125620656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Keyword Selection and Usage in Scientific Papers","authors":"Yuqing Li, Yu-hong Cao","doi":"10.1109/ICNISC57059.2022.00040","DOIUrl":"https://doi.org/10.1109/ICNISC57059.2022.00040","url":null,"abstract":"With the rapid development of the Internet, search engines have become the main way for researchers to obtain academic literature. In order to keep up with the research hotspots in a certain field, and to make our papers easier to be located, downloaded, read and cited by academic peers, it is particularly important to select reasonable keywords for the papers. This paper firstly clarifies the concept of keywords. Next, the basic principles of keyword selection are expounded. It is necessary to maintain the inheritance and also take into account the innovation. The keywords of the paper should include thematic keywords, process keywords and conclusive keywords as much as possible. According to the basic principles of keyword selection, 12 rules that should be followed and avoided in keyword selection are summarized. On this basis, the paper analyzes and discusses how to choose reasonable keywords. Finally, the keywords of research papers in the field of computer science are analyzed using traditional word frequency statistics and semi-supervised learning methods. Based on the analysis results, the usage of paper keywords in the prediction of scientific research hotspots is discussed.","PeriodicalId":286467,"journal":{"name":"2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"265 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132069606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Indicators Selection of SDON Bearing Performance of Power Communication Service Based on Improved TOPSIS","authors":"Jianliang Zhang, Yi An, Lixia Zhang, Xiaorui Hu","doi":"10.1109/ICNISC57059.2022.00168","DOIUrl":"https://doi.org/10.1109/ICNISC57059.2022.00168","url":null,"abstract":"At present, SDON technology drives the integration of power communication and SDON technology with its advantages of openness and software. The existing index system cannot reflect the characteristics of SDON architecture and the impact of service bearing performance in power communication network. In this paper, a new index system is constructed based on technical characteristics of SDON, the performance requirements and influence factors of power communication services. And an OWA-E-TOPSIS multi-attribute decision method is proposed for indicator screening. Through the consistency analysis with the existing methods, the feasibility of the indicator system is verified. The results can provide a basis for new technology application and new business bearing in power communication network.","PeriodicalId":286467,"journal":{"name":"2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133710390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}