{"title":"Comparison between RSA and ECC","authors":"Mingxuan Ma","doi":"10.1109/AINIT54228.2021.00129","DOIUrl":"https://doi.org/10.1109/AINIT54228.2021.00129","url":null,"abstract":"Cryptography plays a significant role in the society with today’s advanced development of technology and the nature of it is data exchange. There are two important factors that should be considered in the progress: speed and security. Different algorithms are used to protect secure data between original sender and receiver by a system which uses public key and private key, and this is so-called as public key cryptosystem. In this paper, RSA algorithm and ECC algorithm are shown about their encryption and decryption and their advantages and disadvantages are compared. Elliptic curve cryptography has recently attracted much attention. The benefit of ECC compared to RSA is that it provides the same security but with smaller bit sizes, thus less processing overhead. The encryption and decryption algorithm which is utilized to encrypt and decrypt the video gives the video files more and more security and the most common one is elliptic curve algorithm, which are used to develop schemes such as key exchange and digital signature. However, since the mathematical background of ECC is not as easy as other cryptosystems, as in geometry, abstract algebraic, number theory, it is hard to choose a good curve. Therefore, finally, there are some suggestions to the drawbacks in RSA algorithm in its mechanism to help to reduce the attacks so that people won’t overwhelm reply to much on ECC. Suggestions are given according to the parameters involved in the algorithm and both RSA and ECC are preferred methods until the appearance of quantum computers.","PeriodicalId":326400,"journal":{"name":"2021 2nd International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122038869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of artificial intelligence in computer network technology in the era of big data","authors":"G. Liu, Huan Wan, L. Zhang","doi":"10.1109/AINIT54228.2021.00139","DOIUrl":"https://doi.org/10.1109/AINIT54228.2021.00139","url":null,"abstract":"Today, with the progress of computer network technology, the advantages of artificial intelligence gradually began to show and become a new product under the development of the current era. At present, the strength of artificial intelligence technology lies in its data analysis and processing ability, because with the continuous development and progress of the society, the difficulty of processing data and information is becoming more and more complex for many years, and the processing ability of computers has begun to show shortcomings. The use of artificial intelligence can solve this problem well, and it can also put forward solutions according to the corresponding data problems, to timely deal with all kinds of data information. This paper mainly analyzes the application of artificial intelligence in computer network in the era of big data, and discusses the application and significance of artificial intelligence in big data.","PeriodicalId":326400,"journal":{"name":"2021 2nd International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129628143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A-star algorithm for expanding the number of search directions in path planning","authors":"Zailong Zhang, Shanyu Wang, Jianwei Zhou","doi":"10.1109/AINIT54228.2021.00049","DOIUrl":"https://doi.org/10.1109/AINIT54228.2021.00049","url":null,"abstract":"In order to solve the problem that the traditional A-star algorithm (square A-star algorithm has 8 search directions, regular hexagon A-star algorithm has 6 search directions) has many inflection points and long path, an improved A-star algorithm is proposed to expand the number of search directions. Firstly, the grid method is used to model the spatial environment that needs path planning. The improved A-star algorithm improves the search direction to 12 search directions. Because the improved A-star algorithm has more search directions and more choices than the traditional A-star algorithm, the total length of the planned path is significantly smaller than the traditional A-star algorithm, compared with the traditional square A-star algorithm and the traditional hexagon A-star algorithm, the total length of the path is reduced by 8.87% and 3.65% respectively. And because the search direction of the improved A-star algorithm is more, the planned path is smoother and the inflection points in the path are reduced.","PeriodicalId":326400,"journal":{"name":"2021 2nd International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129651981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zniping Wei, Danjing Wei, Dennis Xu, Xuecneng Liang, Yinyun Le, Zniyou Luo
{"title":"Remote Cooperation System of Electric Power Communication Operation Inspection Based on AR Technology","authors":"Zniping Wei, Danjing Wei, Dennis Xu, Xuecneng Liang, Yinyun Le, Zniyou Luo","doi":"10.1109/AINIT54228.2021.00053","DOIUrl":"https://doi.org/10.1109/AINIT54228.2021.00053","url":null,"abstract":"In order to solve the problem of poor effect of power communication operation inspection in the process of power equipment engineering technical service project management, AR technology is applied to the design process of power communication operation inspection remote cooperation system. This paper optimizes the system hardware structure and improves the system equipment configuration, thereby improving the system information processing performance. And combined with AR technology to further collect power communication information, improve system software functions, and simplify the remote cooperation process of power communication operation inspection. Finally, the experiment shows that the power communication operation inspection remote cooperation system based on AR technology has high practicability in the process of practical application and fully meets the research requirements.","PeriodicalId":326400,"journal":{"name":"2021 2nd International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129961547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Technical framework and model of artificial intelligence for boosting the revitalization of rural education","authors":"Changxiang Jiang","doi":"10.1109/AINIT54228.2021.00031","DOIUrl":"https://doi.org/10.1109/AINIT54228.2021.00031","url":null,"abstract":"This paper mainly explores the transformation of Al technology model and framework to promote the revitalization of rural education. Give full play to the application of data model establishment, data information analysis and data management in education based on artificial intelligence, and promote the transformation of the structure of rural education system. Artificial intelligence technology for education designed professional curriculum evaluation system, and used the hierarchical analysis method to establish the importance of index scale table, make the education system can be compatible with various computer algorithms, using comprehensive analysis method selection evaluation index, through the application of artificial intelligence, can greatly help rural education to further improve teaching informatization.","PeriodicalId":326400,"journal":{"name":"2021 2nd International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130085090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Finding key nodes on terrorist networks through k-shell based on structural hole","authors":"Zhichao Liang, Boan Tong, Hui Liu, Bao Jin","doi":"10.1109/AINIT54228.2021.00015","DOIUrl":"https://doi.org/10.1109/AINIT54228.2021.00015","url":null,"abstract":"Terrorist attacks do great harm to the economic and social development. Structural perspective provides an explanatory framework for the activities of terrorist organizations which are social network structure. Network centrality are used to to identify key nodes in terrorist organizations. Existing researches often neglect the optimization of centrality indicators by structural holes. By considering structural holes that local factors impact on the overall network. We propose an k-shell based on structural hole method to find key nodes. We conducted experiments on three open source data sets of terrorist organization networks. Compare with the traditional centrality index to prove the effectiveness and accuracy of the algorithm proposed in this paper. The results show that, with the proximity of the center algorithm of the center compared to the number of dielectric, eigenvector centrality, hollow structure and algorithms k-shell value algorithm, the better the improvement in recognition accuracy and discrimination results. The algorithm can be used to identify key nodes in terrorist organizations and provide feasible methods for analyzing and combating terrorist organizations.","PeriodicalId":326400,"journal":{"name":"2021 2nd International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132417728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Method to Estimate Position Relationship between Pedestrian and Crosswalk Based on YOLCAT++","authors":"Xuebin Zhang","doi":"10.1109/AINIT54228.2021.00016","DOIUrl":"https://doi.org/10.1109/AINIT54228.2021.00016","url":null,"abstract":"Pedestrian is one of the most important participants in city transportation, at the same time, because of the property of pedestrian, they are the most vulnerable groups in the transportation. Therefore, the regulation for transportation participants should not ignore pedestrian. Recently, with the development of technology, traffic management becomes more and more intelligent. Video surveillance auxiliary equipments are used as a kind of assistive equipment on more and more streets. With the development of neural network, it is used more and more to deal with image classification and recognition problems. There are many excellent algorithms such as RCNN, YOLO, etc., which have been applied in real life to improve efficiency. The application of neural network on video surveillance can significantly improve pedestrian and small motor vehicle traffic violation inspection efficiency. This paper describes a method of using YOCALT++ model to identify pedestrians and zebra crossings and estimate the positional relationship between them.","PeriodicalId":326400,"journal":{"name":"2021 2nd International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT)","volume":"258 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133007017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Solving the Three-Body Problem Using Numerical Simulations and Neural Networks","authors":"Lan Mi","doi":"10.1109/AINIT54228.2021.00073","DOIUrl":"https://doi.org/10.1109/AINIT54228.2021.00073","url":null,"abstract":"The general solution of the three-body problem under gravitational force remains unsolved due to its chaotic nature (highly sensitive to initial conditions, a small change in one state can result in a significant difference in a later state). This paper will review some of the current mathematical simulations of the three-body problem, such as Brutus, clean numerical simulation, and the Hermite integration scheme, as well as the proposed neural networks, including deep neural network, Hamiltonian neural network and reservoir computing methods that can be trained using trajectories generated by numerical integrators to simulate the three-body problem in less time.","PeriodicalId":326400,"journal":{"name":"2021 2nd International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130929044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on learning effect analysis model of micro course in power enterprises based on clustering algorithm","authors":"Zihang Jia","doi":"10.1109/AINIT54228.2021.00067","DOIUrl":"https://doi.org/10.1109/AINIT54228.2021.00067","url":null,"abstract":"As the core of enterprise operation and development, employees’ technical ability, work level and comprehensive quality will directly determine the development of the enterprise. How to strengthen the staff training of power enterprises and continuously improve the comprehensive ability of employees is a difficult problem faced by power enterprises. With the characteristics of \"short\" and \"accurate\", micro course has become a new form of enterprise training. According to the micro course training of employees in power enterprises, the subject uses cluster analysis algorithm to analyze and extract its learning effect, and obtains the decision-making basis conducive to enterprise managers’ decision-making, with good effect.","PeriodicalId":326400,"journal":{"name":"2021 2nd International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121308909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new coded communication modulation scheme in very low frequency communication","authors":"Peipei Cao, Kaijie Zhou","doi":"10.1109/AINIT54228.2021.00103","DOIUrl":"https://doi.org/10.1109/AINIT54228.2021.00103","url":null,"abstract":"Very low frequency (VLF) radio waves have very effective long-distance propagation characteristics. Therefore, they have a wide application prospect in underwater and underground communication. To effectively suppress the interference of channel noise and improve the performance of the VLF communication system, a low-density parity check (LDPC) coded orthogonal frequency division multiplexing-minimum frequency shift keying (OFDM-MSK) communication scheme is designed according to the characteristics of the VLF channel. Considering that the harmonic interference in the VLF channel can be regarded as frequency selective fading, the OFDM technology is applied to the VLF channel. In addition, the performance of VLF communication system is mainly affected by strong impulse atmospheric noise, which can be successfully simulated by symmetrical alpha stable (SαS) distribution. To reduce the impact of SαS noise on the OFDM system and data loss in frequency selective fading channel, LDPC channel coding technology is proposed. Finally, the robustness of the LDPC coded OFDM-MSK scheme is tested and evaluated from the perspective of the bit error rate (BER). The results show that the LDPC coded OFDM-MSK communication scheme has better performance than the independent OFDM-MSK communication scheme.","PeriodicalId":326400,"journal":{"name":"2021 2nd International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126411346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}