2021 2nd International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT)最新文献

筛选
英文 中文
Comparison between RSA and ECC RSA和ECC的比较
Mingxuan Ma
{"title":"Comparison between RSA and ECC","authors":"Mingxuan Ma","doi":"10.1109/AINIT54228.2021.00129","DOIUrl":"https://doi.org/10.1109/AINIT54228.2021.00129","url":null,"abstract":"Cryptography plays a significant role in the society with today’s advanced development of technology and the nature of it is data exchange. There are two important factors that should be considered in the progress: speed and security. Different algorithms are used to protect secure data between original sender and receiver by a system which uses public key and private key, and this is so-called as public key cryptosystem. In this paper, RSA algorithm and ECC algorithm are shown about their encryption and decryption and their advantages and disadvantages are compared. Elliptic curve cryptography has recently attracted much attention. The benefit of ECC compared to RSA is that it provides the same security but with smaller bit sizes, thus less processing overhead. The encryption and decryption algorithm which is utilized to encrypt and decrypt the video gives the video files more and more security and the most common one is elliptic curve algorithm, which are used to develop schemes such as key exchange and digital signature. However, since the mathematical background of ECC is not as easy as other cryptosystems, as in geometry, abstract algebraic, number theory, it is hard to choose a good curve. Therefore, finally, there are some suggestions to the drawbacks in RSA algorithm in its mechanism to help to reduce the attacks so that people won’t overwhelm reply to much on ECC. Suggestions are given according to the parameters involved in the algorithm and both RSA and ECC are preferred methods until the appearance of quantum computers.","PeriodicalId":326400,"journal":{"name":"2021 2nd International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122038869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of artificial intelligence in computer network technology in the era of big data 大数据时代人工智能在计算机网络技术中的应用
G. Liu, Huan Wan, L. Zhang
{"title":"Application of artificial intelligence in computer network technology in the era of big data","authors":"G. Liu, Huan Wan, L. Zhang","doi":"10.1109/AINIT54228.2021.00139","DOIUrl":"https://doi.org/10.1109/AINIT54228.2021.00139","url":null,"abstract":"Today, with the progress of computer network technology, the advantages of artificial intelligence gradually began to show and become a new product under the development of the current era. At present, the strength of artificial intelligence technology lies in its data analysis and processing ability, because with the continuous development and progress of the society, the difficulty of processing data and information is becoming more and more complex for many years, and the processing ability of computers has begun to show shortcomings. The use of artificial intelligence can solve this problem well, and it can also put forward solutions according to the corresponding data problems, to timely deal with all kinds of data information. This paper mainly analyzes the application of artificial intelligence in computer network in the era of big data, and discusses the application and significance of artificial intelligence in big data.","PeriodicalId":326400,"journal":{"name":"2021 2nd International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129628143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A-star algorithm for expanding the number of search directions in path planning 扩展路径规划中搜索方向数量的A-star算法
Zailong Zhang, Shanyu Wang, Jianwei Zhou
{"title":"A-star algorithm for expanding the number of search directions in path planning","authors":"Zailong Zhang, Shanyu Wang, Jianwei Zhou","doi":"10.1109/AINIT54228.2021.00049","DOIUrl":"https://doi.org/10.1109/AINIT54228.2021.00049","url":null,"abstract":"In order to solve the problem that the traditional A-star algorithm (square A-star algorithm has 8 search directions, regular hexagon A-star algorithm has 6 search directions) has many inflection points and long path, an improved A-star algorithm is proposed to expand the number of search directions. Firstly, the grid method is used to model the spatial environment that needs path planning. The improved A-star algorithm improves the search direction to 12 search directions. Because the improved A-star algorithm has more search directions and more choices than the traditional A-star algorithm, the total length of the planned path is significantly smaller than the traditional A-star algorithm, compared with the traditional square A-star algorithm and the traditional hexagon A-star algorithm, the total length of the path is reduced by 8.87% and 3.65% respectively. And because the search direction of the improved A-star algorithm is more, the planned path is smoother and the inflection points in the path are reduced.","PeriodicalId":326400,"journal":{"name":"2021 2nd International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129651981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Remote Cooperation System of Electric Power Communication Operation Inspection Based on AR Technology 基于AR技术的电力通信运行巡检远程协作系统
Zniping Wei, Danjing Wei, Dennis Xu, Xuecneng Liang, Yinyun Le, Zniyou Luo
{"title":"Remote Cooperation System of Electric Power Communication Operation Inspection Based on AR Technology","authors":"Zniping Wei, Danjing Wei, Dennis Xu, Xuecneng Liang, Yinyun Le, Zniyou Luo","doi":"10.1109/AINIT54228.2021.00053","DOIUrl":"https://doi.org/10.1109/AINIT54228.2021.00053","url":null,"abstract":"In order to solve the problem of poor effect of power communication operation inspection in the process of power equipment engineering technical service project management, AR technology is applied to the design process of power communication operation inspection remote cooperation system. This paper optimizes the system hardware structure and improves the system equipment configuration, thereby improving the system information processing performance. And combined with AR technology to further collect power communication information, improve system software functions, and simplify the remote cooperation process of power communication operation inspection. Finally, the experiment shows that the power communication operation inspection remote cooperation system based on AR technology has high practicability in the process of practical application and fully meets the research requirements.","PeriodicalId":326400,"journal":{"name":"2021 2nd International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129961547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Technical framework and model of artificial intelligence for boosting the revitalization of rural education 助力乡村教育振兴的人工智能技术框架与模式
Changxiang Jiang
{"title":"Technical framework and model of artificial intelligence for boosting the revitalization of rural education","authors":"Changxiang Jiang","doi":"10.1109/AINIT54228.2021.00031","DOIUrl":"https://doi.org/10.1109/AINIT54228.2021.00031","url":null,"abstract":"This paper mainly explores the transformation of Al technology model and framework to promote the revitalization of rural education. Give full play to the application of data model establishment, data information analysis and data management in education based on artificial intelligence, and promote the transformation of the structure of rural education system. Artificial intelligence technology for education designed professional curriculum evaluation system, and used the hierarchical analysis method to establish the importance of index scale table, make the education system can be compatible with various computer algorithms, using comprehensive analysis method selection evaluation index, through the application of artificial intelligence, can greatly help rural education to further improve teaching informatization.","PeriodicalId":326400,"journal":{"name":"2021 2nd International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130085090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Finding key nodes on terrorist networks through k-shell based on structural hole 基于结构孔的k-shell在恐怖分子网络中寻找关键节点
Zhichao Liang, Boan Tong, Hui Liu, Bao Jin
{"title":"Finding key nodes on terrorist networks through k-shell based on structural hole","authors":"Zhichao Liang, Boan Tong, Hui Liu, Bao Jin","doi":"10.1109/AINIT54228.2021.00015","DOIUrl":"https://doi.org/10.1109/AINIT54228.2021.00015","url":null,"abstract":"Terrorist attacks do great harm to the economic and social development. Structural perspective provides an explanatory framework for the activities of terrorist organizations which are social network structure. Network centrality are used to to identify key nodes in terrorist organizations. Existing researches often neglect the optimization of centrality indicators by structural holes. By considering structural holes that local factors impact on the overall network. We propose an k-shell based on structural hole method to find key nodes. We conducted experiments on three open source data sets of terrorist organization networks. Compare with the traditional centrality index to prove the effectiveness and accuracy of the algorithm proposed in this paper. The results show that, with the proximity of the center algorithm of the center compared to the number of dielectric, eigenvector centrality, hollow structure and algorithms k-shell value algorithm, the better the improvement in recognition accuracy and discrimination results. The algorithm can be used to identify key nodes in terrorist organizations and provide feasible methods for analyzing and combating terrorist organizations.","PeriodicalId":326400,"journal":{"name":"2021 2nd International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132417728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Method to Estimate Position Relationship between Pedestrian and Crosswalk Based on YOLCAT++ 基于yolcat++的行人与人行横道位置关系估计方法
Xuebin Zhang
{"title":"A Method to Estimate Position Relationship between Pedestrian and Crosswalk Based on YOLCAT++","authors":"Xuebin Zhang","doi":"10.1109/AINIT54228.2021.00016","DOIUrl":"https://doi.org/10.1109/AINIT54228.2021.00016","url":null,"abstract":"Pedestrian is one of the most important participants in city transportation, at the same time, because of the property of pedestrian, they are the most vulnerable groups in the transportation. Therefore, the regulation for transportation participants should not ignore pedestrian. Recently, with the development of technology, traffic management becomes more and more intelligent. Video surveillance auxiliary equipments are used as a kind of assistive equipment on more and more streets. With the development of neural network, it is used more and more to deal with image classification and recognition problems. There are many excellent algorithms such as RCNN, YOLO, etc., which have been applied in real life to improve efficiency. The application of neural network on video surveillance can significantly improve pedestrian and small motor vehicle traffic violation inspection efficiency. This paper describes a method of using YOCALT++ model to identify pedestrians and zebra crossings and estimate the positional relationship between them.","PeriodicalId":326400,"journal":{"name":"2021 2nd International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT)","volume":"258 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133007017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Solving the Three-Body Problem Using Numerical Simulations and Neural Networks 用数值模拟和神经网络求解三体问题
Lan Mi
{"title":"Solving the Three-Body Problem Using Numerical Simulations and Neural Networks","authors":"Lan Mi","doi":"10.1109/AINIT54228.2021.00073","DOIUrl":"https://doi.org/10.1109/AINIT54228.2021.00073","url":null,"abstract":"The general solution of the three-body problem under gravitational force remains unsolved due to its chaotic nature (highly sensitive to initial conditions, a small change in one state can result in a significant difference in a later state). This paper will review some of the current mathematical simulations of the three-body problem, such as Brutus, clean numerical simulation, and the Hermite integration scheme, as well as the proposed neural networks, including deep neural network, Hamiltonian neural network and reservoir computing methods that can be trained using trajectories generated by numerical integrators to simulate the three-body problem in less time.","PeriodicalId":326400,"journal":{"name":"2021 2nd International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130929044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on learning effect analysis model of micro course in power enterprises based on clustering algorithm 基于聚类算法的电力企业微课程学习效果分析模型研究
Zihang Jia
{"title":"Research on learning effect analysis model of micro course in power enterprises based on clustering algorithm","authors":"Zihang Jia","doi":"10.1109/AINIT54228.2021.00067","DOIUrl":"https://doi.org/10.1109/AINIT54228.2021.00067","url":null,"abstract":"As the core of enterprise operation and development, employees’ technical ability, work level and comprehensive quality will directly determine the development of the enterprise. How to strengthen the staff training of power enterprises and continuously improve the comprehensive ability of employees is a difficult problem faced by power enterprises. With the characteristics of \"short\" and \"accurate\", micro course has become a new form of enterprise training. According to the micro course training of employees in power enterprises, the subject uses cluster analysis algorithm to analyze and extract its learning effect, and obtains the decision-making basis conducive to enterprise managers’ decision-making, with good effect.","PeriodicalId":326400,"journal":{"name":"2021 2nd International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121308909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new coded communication modulation scheme in very low frequency communication 一种用于甚低频通信的新型编码通信调制方案
Peipei Cao, Kaijie Zhou
{"title":"A new coded communication modulation scheme in very low frequency communication","authors":"Peipei Cao, Kaijie Zhou","doi":"10.1109/AINIT54228.2021.00103","DOIUrl":"https://doi.org/10.1109/AINIT54228.2021.00103","url":null,"abstract":"Very low frequency (VLF) radio waves have very effective long-distance propagation characteristics. Therefore, they have a wide application prospect in underwater and underground communication. To effectively suppress the interference of channel noise and improve the performance of the VLF communication system, a low-density parity check (LDPC) coded orthogonal frequency division multiplexing-minimum frequency shift keying (OFDM-MSK) communication scheme is designed according to the characteristics of the VLF channel. Considering that the harmonic interference in the VLF channel can be regarded as frequency selective fading, the OFDM technology is applied to the VLF channel. In addition, the performance of VLF communication system is mainly affected by strong impulse atmospheric noise, which can be successfully simulated by symmetrical alpha stable (SαS) distribution. To reduce the impact of SαS noise on the OFDM system and data loss in frequency selective fading channel, LDPC channel coding technology is proposed. Finally, the robustness of the LDPC coded OFDM-MSK scheme is tested and evaluated from the perspective of the bit error rate (BER). The results show that the LDPC coded OFDM-MSK communication scheme has better performance than the independent OFDM-MSK communication scheme.","PeriodicalId":326400,"journal":{"name":"2021 2nd International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126411346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信