{"title":"Interior Fusion Localization Method Based on Random Forest","authors":"Yiwen Qin, Zhihong Feng, Nan Su, Ding Ma","doi":"10.1109/ICMTMA50254.2020.00088","DOIUrl":"https://doi.org/10.1109/ICMTMA50254.2020.00088","url":null,"abstract":"This paper introduces a high performance indoor location method based on random forest. Firstly, the access point with poor signal strength and unstable signal is deleted through the signal strength of the access point. Then the information gain method is used to select the access points with better positioning effect from the remaining access points to form the access points set and establish the location fingerprint database. Then, all positions in the location scene are grouped by clustering algorithm, and then a random forest model is built for each position. The location process USES the random forest model to determine the user location. The experimental results show that by constructing a high precision and high stability stochastic forest model, this paper can effectively solve the problem of limited positioning accuracy, unstable positioning effect and easy to fall into overfitting of the single-decision tree model, and improve the positioning stability and positioning accuracy. The average error of the indoor positioning method mentioned in this paper is at least 1.3718m, and the variance of the positioning result is calculated on this basis, which is 0.0173 in this paper.","PeriodicalId":333866,"journal":{"name":"2020 12th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115113237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pan Ruixuan, Niu Chao, Yang Yingjie, Leng Qiang, Li Bowen
{"title":"Research on the Network Access Authentication Technology of Sdn Based on 802.1X","authors":"Pan Ruixuan, Niu Chao, Yang Yingjie, Leng Qiang, Li Bowen","doi":"10.1109/ICMTMA50254.2020.00171","DOIUrl":"https://doi.org/10.1109/ICMTMA50254.2020.00171","url":null,"abstract":"Software Defined Network (SDN) is a new type of network architecture at present. While it is developing rapidly, it also brings many security issues. Network access authentication is one of the most important problems in the construction of network defense system. Aimed at the problem, this paper constructs an authentication framework for SDN based on 802.1X, and designs a two-level network access model which users are related to devices. Finally, the effectiveness of the authentication method and model is verified by simulation experiments.","PeriodicalId":333866,"journal":{"name":"2020 12th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120943403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of a Universal Marine Energy Remote Monitoring System","authors":"X. Wei, Yifang Wang, Wanqiang Zhu, Jianmei Chen, Yongjun Dong, Jingfu Guo","doi":"10.1109/ICMTMA50254.2020.00070","DOIUrl":"https://doi.org/10.1109/ICMTMA50254.2020.00070","url":null,"abstract":"With the concept of \"everything can be interconnected\", the Internet of Things technology has entered all areas of people's life and work. Monitoring of marine energy generation has always been a more difficult problem for people. Compared with the traditional monitoring methods, The particularity of the equipment working environment, this paper proposes a universal ocean energy monitoring system that uses NBIOT technology with LWM2M protocol to connect to the open IoT platform ONENET, and transmits the power and flow rate data collected at the front end to the ONENET cloud platform. An application interface corresponding to the data flow is established on the ONENET cloud platform. The PC and mobile phone are used to monitor the ocean energy power generation data through the platform application interface, and the platform issues an alarm signal when the data is abnormal. All the collected power data and alarm signals can be historically queried on the ONENET platform, and all data can be exported through the platform for staff to study.","PeriodicalId":333866,"journal":{"name":"2020 12th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123439434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data Encryption Method of Ssl Digital Authentication Signature System Based on Privacy Protection","authors":"Yu Dun-Yi","doi":"10.1109/ICMTMA50254.2020.00016","DOIUrl":"https://doi.org/10.1109/ICMTMA50254.2020.00016","url":null,"abstract":"The data encryption design of SSL digital authentication signature system is designed to improve the confidentiality of SSL digital authentication signature system. In order to solve the problem of low cyclic shift key coding and decoding rate and strong sensitivity, a data encryption technology of SSL digital authentication signature system based on privacy protection is proposed. Firstly, the floating-point data of SSL digital authentication signature system are arithmetic encoded, and the random linear encryption key of SSL digital authentication signature system is designed by using Logistics chaotic linear mapping. Then the piecewise sample regression test method is used to design the data coding and decoding of SSL digital authentication signature system, and the data encryption and privacy protection technology of SSL digital authentication signature system is optimized. Finally, the encryption performance is tested by data simulation analysis. The results show that the encryption reliability of SSL digital authentication signature system is better, the risk of deciphering is reduced, and the secure transmission performance of data is improved.","PeriodicalId":333866,"journal":{"name":"2020 12th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125527828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of Cloud Platform in the Teaching of \"Fruit Tree Production Technology\"","authors":"Xiaoyun Wu, Zhaoquan Gao, Jianjun Cheng","doi":"10.1109/ICMTMA50254.2020.00185","DOIUrl":"https://doi.org/10.1109/ICMTMA50254.2020.00185","url":null,"abstract":"The course of \"fruit tree production technology\" is a core professional course for horticultural technology majors. Based on the growth cycle of fruit trees, using information-based teaching as a means, the cloud class is employed to build a mobile phone-based teaching resource library. Various cloud platform methods are used to fully stimulate students' enthusiasm for learning. Prior to the training of \"Grafting Technology\", self-learning was carried out through the cloud class course resource library to enable students to understand the types of grafting and operation techniques. During the lesson, teachers use digital physical projectors to demonstrate the operation of three types of grafting. Students in the exercises can gradually master the main points of grafting operation by watching the grafting animation and videos in the cloud platform resource library. After class, students are required to browse the actual grafting cases and academic papers at professional websites such as the Smart Orchard Cloud Platform to keep them abreast of the latest developments and academic achievements in grafting.","PeriodicalId":333866,"journal":{"name":"2020 12th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115445729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Qiao Hong, Tian Zheng, Li Wenli, Tian Jianwei, Zhu Hongyu
{"title":"A Sensitive Information Detection Method Based on Network Traffic Restore","authors":"Qiao Hong, Tian Zheng, Li Wenli, Tian Jianwei, Zhu Hongyu","doi":"10.1109/ICMTMA50254.2020.00181","DOIUrl":"https://doi.org/10.1109/ICMTMA50254.2020.00181","url":null,"abstract":"With increasing importance of protecting sensitive data, it is necessary to monitoring the transmission of sensitive data. Most recent methods detect the network packet based on the analyzing IP, port, size characteristics and payload of the network traffic packets, which can not be used for detecting sensitive document transmitted via network. Hence, this paper propose asensitive information detection method based on network traffic restore solution to fix the problem. This method firstly use TCP reassembling to restore documents from network traffic, and then use TF-IDF model to judge the similarity with those documents marked with sensitive flag, which is very simple and efficient","PeriodicalId":333866,"journal":{"name":"2020 12th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122766366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Feature Image Generation Based on Adversarial Generation Network","authors":"Mengxin Gong, Yijun Wang","doi":"10.1109/ICMTMA50254.2020.00109","DOIUrl":"https://doi.org/10.1109/ICMTMA50254.2020.00109","url":null,"abstract":"Generative antagonistic network (GAN) was proposed in 2014 to assist in generating realistic visual images, which has become one of the most popular research objects in deep learning in recent years. In the field of image generation, GAN is more effective than the traditional method, but it is difficult to train, unstable network and difficult to convergence. In this paper, GAN is applied in the field of feature image generation, and a new framework is proposed based on the C-SEGAN. By adding additional condition features to generator and discriminator, the similarity of distributed error is learned, and the discriminator is self-encoder, the mean square error loss is added to discriminator, and the generated model generates the specified sample. The model can generate the specified clear image according to the feature conditions. The experimental results show that the method can achieve faster convergence rate and generate better quality and diversity images with a simpler network than other supervised class generation models.","PeriodicalId":333866,"journal":{"name":"2020 12th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117100492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiao-ke Zhu, Shengbao Yang, Renyang Liu, Siyu Xiong, Li Shen, Jing He
{"title":"Supervised Abnormal Signal Identification Method","authors":"Xiao-ke Zhu, Shengbao Yang, Renyang Liu, Siyu Xiong, Li Shen, Jing He","doi":"10.1109/ICMTMA50254.2020.00145","DOIUrl":"https://doi.org/10.1109/ICMTMA50254.2020.00145","url":null,"abstract":"Identifying radio anomalies is one of the main purposes of radio monitoring. The current radio anomaly signal identification is mainly finished manually by the Radio monitor, using professional radio knowledge and their work experience. However, because the anomaly signal is hidden in the \"massive\" data, accompanied by a large amount of noise, and also data imbalance, the anomaly signal is difficult to find. In this paper, we combine the data unevenness processing method SMOTE and the support vector machine (SVM), gradient lifting tree (GDBT), and other classification algorithms to identification the anomaly signal during radio monitoring. Experimental results show that our method can improve the efficiency of existing radio anomaly signal recognization. Moreover, our experiments also show that data imbalance processing plays a key role in anomaly signal recognition.","PeriodicalId":333866,"journal":{"name":"2020 12th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128358960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Risk Management of E-Commerce Security in Cloud Computing Environment","authors":"Yan Li, Junfeng Li","doi":"10.1109/ICMTMA50254.2020.00172","DOIUrl":"https://doi.org/10.1109/ICMTMA50254.2020.00172","url":null,"abstract":"The emergence of cloud computing technology has changed the traditional business economic model and provided convenience for the application of e-commerce in the financial field. This paper uses cloud computing as the entry point to analyze the security of e-commerce in a cloud computing environment in detail. It also proposes relevant solutions to how e-commerce can ensure the security of its own data in the context of cloud computing. At the same time, it also pays attention to reducing the user's perception of information security risks from the user's perspective, and improving the user's trust, satisfaction and loyalty to the information system.","PeriodicalId":333866,"journal":{"name":"2020 12th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128960592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Implementation of Digital Switching Chip Based on FPGA","authors":"Liu Chen, Li Guomin","doi":"10.1109/ICMTMA50254.2020.00051","DOIUrl":"https://doi.org/10.1109/ICMTMA50254.2020.00051","url":null,"abstract":"Digital switching chips play a key role in program-controlled digital switches. In order to overcome the changes in the requirements of program-controlled digital switches, when the original digital proprietary chips no longer meet the requirements, this paper studies the role and composition of digital switching chips, and proposes a method of using FPGA technology to design digital switching chips. The general-purpose chip is used to replace the proprietary digital exchange chip, the general-purpose FPGA chip is used to replace the dedicated digital exchange chip, and the software design is used to replace the hardware design. The experimental results show that the designed digital switching chip can meet the needs of program-controlled digital switches and adapt to the changes in the technical indicators of program-controlled digital switches.","PeriodicalId":333866,"journal":{"name":"2020 12th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129128609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}