{"title":"Trajectory Prediction Based on Roadside Millimeter Wave Radar and Video Fusion","authors":"Y. Chang, Haiyang Yu","doi":"10.1109/AINIT54228.2021.00063","DOIUrl":"https://doi.org/10.1109/AINIT54228.2021.00063","url":null,"abstract":"In recent years, with the development of intelligent transportation system, roadside service is more and more widely used in urban road transportation system. Based on the roadside millimeter wave radar and camera, this paper obtains the motion trajectory data of vehicles close to the intersection, filters and processes the radar data, detects and tracks the video data, and then carries out data fusion to obtain more accurate trajectory data. Compared with a single sensor, the accuracy and stability of fused data are improved. In addition, the LSTM neural network is used to predict the vehicle trajectory and obtain the location information of the target vehicle passing through the intersection, so as to improve the traffic condition of the intersection.","PeriodicalId":326400,"journal":{"name":"2021 2nd International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127700136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Building A Zero-trust Security Protection System in The Environment of The Power Internet of Things","authors":"Rong Zeng, Nige Li, Xiaoming Zhou, Yuanyuan Ma","doi":"10.1109/AINIT54228.2021.00114","DOIUrl":"https://doi.org/10.1109/AINIT54228.2021.00114","url":null,"abstract":"With the construction of power information network, the power grid has built a security protection system based on boundary protection. However, with the continuous advancement of the construction of the power Internet of Things, a large number of power Internet of Things terminals need to connect to the power information network through the public network, which have an impact on the existing security protection system of the power grid. This article analyzes the characteristics of the border protection model commonly used in network security protection. Aiming at the lack of security protection capabilities of this model, a zero-trust security architecture-based power Internet of Things network security protection model is proposed. Finally, this article analyzes and studies the application of zero trust in the power Internet of Things.","PeriodicalId":326400,"journal":{"name":"2021 2nd International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129436489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic identification of key nodes in digital microwave communication link based on network topology","authors":"Kaibo Hu, Lifeng Yu, Linbo Xu, Na Cui","doi":"10.1109/AINIT54228.2021.00094","DOIUrl":"https://doi.org/10.1109/AINIT54228.2021.00094","url":null,"abstract":"In order to solve the problems of the traditional microwave communication node identification methods, such as the large difference between the number of identification and the actual situation, and the low accuracy of identification, the dynamic identification of key nodes of digital microwave communication link based on network topology is studied. The data labels of key nodes are set by supervised machine learning, and the synchronous signals of four key nodes close to the digital microwave emitter are selected to prevent the collected signals from excessive noise. Fuzzy clustering is used to process the collected recognition samples, and then the neural network model is trained to identify the key nodes. In order to prevent over fitting during training, L4 regularization method is used to add dropout to the hidden node neurons in each network topology. Then, the identification neural network model of network topology is used to train and dynamically identify different key nodes of the link to realize the dynamic identification of key nodes of digital microwave communication link. The experimental results show that the recognition accuracy of key nodes is 95%, and the recognition performance of key nodes is improved.","PeriodicalId":326400,"journal":{"name":"2021 2nd International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130578008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of Computer Network Security Technology in Electronic Commerce","authors":"Junhong Lian","doi":"10.1109/AINIT54228.2021.00140","DOIUrl":"https://doi.org/10.1109/AINIT54228.2021.00140","url":null,"abstract":"With the rapid development of network and electronic information technology, e-commerce has obtained pretty economic achievements providing great convenience for people. In order to solve the hidden danger and negative influence of computer network security problems on e-commerce, this paper first studies the relationship between e-commerce and computer network security technology, and then analyzes the some specific network security problems existing in current e-commerce. Computer network security can be guaranteed by using some network security technology including mechanism application, digital encryption, digital signature, firewall technology, illegal intrusion detection, etc, so as to make e-commerce transactions more secure and smooth.","PeriodicalId":326400,"journal":{"name":"2021 2nd International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131861681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chao Xu, Yiqing Cheng, Weihua Cheng, Shen Ji, Wei Li
{"title":"Security Protection Scheme of Embedded System Running Environment based on TCM","authors":"Chao Xu, Yiqing Cheng, Weihua Cheng, Shen Ji, Wei Li","doi":"10.1109/AINIT54228.2021.00128","DOIUrl":"https://doi.org/10.1109/AINIT54228.2021.00128","url":null,"abstract":"Mobile embedded terminals widely applied in individual lives, but its security threats become more and more serious. Malicious attacker can steal sensitive information such as user’s phonebook, credit card information by instrumenting malicious programs, or compromising vulnerable software. Against these problems, this paper proposes a scheme for trusted protection system on the embedded platform. The system uses SM algorithms and hardware security chip as the root of trust to establish security mechanisms, including trusted boot of system image, trusted monitoring of the system running environment, disk partition encryption and verification, etc. These security mechanisms provide comprehensive protection to embedded system boot, runtime and long-term storage devices. This paper introduces the architecture and principles of the system software, design system security functions and implement prototype system for protection of embedded OS. The experiments results indicates the promotion of embedded system security and the performance test shows that encryption performance can meet the practical application.","PeriodicalId":326400,"journal":{"name":"2021 2nd International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT)","volume":"35 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131891361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Security Management and Control of Power Grid Digital Twin Based on Edge Computing","authors":"Yue Sun, Xiaotian Xu, Ren Qiang, Qinglin Yuan","doi":"10.1109/AINIT54228.2021.00122","DOIUrl":"https://doi.org/10.1109/AINIT54228.2021.00122","url":null,"abstract":"Edge computing and digital twin technology are two new digital technologies that are developing rapidly. Edge computing has become more and more widely used in various scenarios and smart terminal devices, adding more and more edge computing business sinking demands, making the distance between computing and users and data smaller and smaller, and digital twin technology provides a method of model interpretation for complex physical entities, provides new ideas for physical information fusion, and makes it applicable to various scenarios of physical entities and the virtualization model can achieve deep coupling. Nowadays, society’s demand for power grids is getting higher and higher. Therefore, the security protection of power grids is an important issue worthy of in-depth consideration. After the introduction of edge computing and digital twins and technologies, the relative vulnerability of power grids has been further characterized. By analyzing the security risks and characteristics of edge computing, and based on the edge computing security protection architecture, a power grid digital twin security control model including the application layer, function layer, model layer, data layer, and physical layer is constructed, so as to ensure that all aspects of the power grid are controlled. Layers of protection of structures and units ensure that the power grid can still ensure efficient and safe operation in an environment blessed by new technologies.","PeriodicalId":326400,"journal":{"name":"2021 2nd International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130081102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiaoan Bao, Yifei Hu, Ziqun Bao, Hangyue Chen, Na Zhang, Weiran Lu
{"title":"Nginx-Based Combined Dynamic and Static Load Balancing Algorithm Research","authors":"Xiaoan Bao, Yifei Hu, Ziqun Bao, Hangyue Chen, Na Zhang, Weiran Lu","doi":"10.1109/AINIT54228.2021.00034","DOIUrl":"https://doi.org/10.1109/AINIT54228.2021.00034","url":null,"abstract":"To solve the problem that traditional Web cluster load balancing algorithm processes low efficiency under low network load and uneven load distribution under high load, based on the analysis of several common load balancing algorithm and combined with their advantages and disadvantages, a new load balancing algorithm which combines dynamic and static status was presented. In this algorithm, the threshold calculated by simulated annealing algorithm was used as interval partition. In the meanwhile, a static weighted polling algorithm under the base of the weight of each load index such as the performance of CPU, Memory, Disk IO and network bandwidth and a dynamic weight adjusted algorithm which collected real-time load information according to feedback from each server node were accepted. And through the comparative experiments of several algorithms, it is verified that the new algorithm proposed in this paper processes more reasonable load balancing, which has more advantages in the average response time and the actual number of concurrent. All in all, it meets the design requirements.","PeriodicalId":326400,"journal":{"name":"2021 2nd International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133132936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on the design of public space based on the digital-driven Nishan Luyuan New Village","authors":"Hongmei Li, Xiangtian Ma, Jialei Li, Shulong Wang","doi":"10.1109/AINIT54228.2021.00021","DOIUrl":"https://doi.org/10.1109/AINIT54228.2021.00021","url":null,"abstract":"The Fifth Plenary Session of the 19th Central Committee in 2020 proposed to give priority to the development of agriculture and rural areas, and to promote the revitalization of the countryside comprehensively. It insists on making the solution of the \"three rural issues\" the top priority of the whole Party and taking the road of socialist rural revitalization with Chinese characteristics. Under the background of the current national policy support, the contemporary countryside is facing opportunities and challenges of development. This paper analyzes the application of Confucian culture in the public space of Nishan Luyuan New Village in the new era by means of multiple digital means, and intends to study the development of public cultural space in the contemporary countryside and seek the current situation of the application of rural culture in the public space in the new era, so as to better contribute to the development of China’s countryside.","PeriodicalId":326400,"journal":{"name":"2021 2nd International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133535181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on the Application and Optimization of Open Source Hardware and Programming in Education of Digital Media Art Design","authors":"Yuan-Ting Chen, Lingyun Zhou","doi":"10.1109/AINIT54228.2021.00112","DOIUrl":"https://doi.org/10.1109/AINIT54228.2021.00112","url":null,"abstract":"In the wake of the convergence of transformation and technology in education of digital media art design, opensource hardware and programming coursesare receiving ever increasing attention from design majors and universities both at home and abroad. In this paper, the situation that various types of colleges related to design carry out teaching was analyzed, and then, the teaching design process of \"open source hardware and programming\" of digital media art was discussed, and the specific methods to optimize the teaching were summarized. In addition, the application types of open source hardware and programming in digital media art creation were explained on the basis of the previous creations by students, and the implementation situation of courses was summarized. In terms of teaching, it is concluded in this paper that: a) it is of necessity to set up majors and curriculum frameworks for the teaching of open source hardware and programming module suitable for professional digital media art design; b) the teaching methods and design that integrate art and technology should be carried outin accordance with the artistic background and professional quality of students; and c) the factor of creator is the core of interactive technology design, and the design element is the way in which a complex system interacts with the human, that is, human behavior.","PeriodicalId":326400,"journal":{"name":"2021 2nd International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122176987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Makespan-optimized Task-Level Scheduling Strategy for Cloud Workflow Systems","authors":"Rui Zhang, Wenyu Shi","doi":"10.1109/AINIT54228.2021.00145","DOIUrl":"https://doi.org/10.1109/AINIT54228.2021.00145","url":null,"abstract":"Cloud-based workflow systems is a platform which can be embedded in a cloud computing infrastructure. Virtual machine has the ability to run multi-tasks simultaneously and time-sharing characteristic, but cannot take advantage of VM’s benefit, therefore, the makespan of scheduling strategy in datacenter cannot be reduced availably. In this paper, we bring up a new makespan model which take advantage of VM’s time-shared characteristic to schedule cloud workflow in task-layer. Furthermore, a novel Ant Colony Optimization (ACO) scheduling strategy is designed to obtain the optimal makespan. This scheduling strategy is implemented in Swinburne Decentralized Workflow for Cloud. The results suggest that by exploiting a time-sharing characteristic of VM, our scheduling strategy offers a significant improvement over the existing approaches including the makespan optimization by scheduling strategy within a datacenter, ACO scheduling strategy can converge fast with different task sets. The makespan is smaller than its counterpart without time-sharing of VMs.","PeriodicalId":326400,"journal":{"name":"2021 2nd International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT)","volume":"187 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121206213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}