2020 IEEE 10th International Conference on Electronics Information and Emergency Communication (ICEIEC)最新文献

筛选
英文 中文
Research on Data Security Analysis and Label Recognition Technology Based on Big Data Business Scenario 基于大数据业务场景的数据安全分析与标签识别技术研究
Donglan Liu, Deqiu Kong, Xin Liu, Lei Ma, Yingxian Chang, Hao Zhang, Rui Wang, Hao Yu
{"title":"Research on Data Security Analysis and Label Recognition Technology Based on Big Data Business Scenario","authors":"Donglan Liu, Deqiu Kong, Xin Liu, Lei Ma, Yingxian Chang, Hao Zhang, Rui Wang, Hao Yu","doi":"10.1109/ICEIEC49280.2020.9152308","DOIUrl":"https://doi.org/10.1109/ICEIEC49280.2020.9152308","url":null,"abstract":"Data is the inevitable product of social high informatization, and its security risk is an indispensable part of information security. In the case of accelerating the construction of ubiquitous power Internet of things, this paper deeply studies the data security analysis and label recognition technology based on big data business scenarios. Based on the process of active and passive discovery, a complete catalog of data assets is established by means of database scanning, server scanning, terminal scanning, terminal monitoring, network monitoring and database access monitoring. The threat tree is used to model various threats to data security. On the basis of data asset cataloging and threat modeling, this paper studies the data security risk analysis and quantification method by comprehensively judging the threats faced by the business system, as well as the vulnerability and asset value of the system itself. Based on the heuristic integrated learning strategy of automatic semantic tagging for massive network resources, metadata is extracted through active and passive collection, and the semantic relationship between tags is extracted and processed by natural language processing and machine learning technology. Finally, automatic labels are generated through analysis capabilities such as business correlation analysis, organizational correlation analysis, data distribution analysis, data classification and grade.","PeriodicalId":352285,"journal":{"name":"2020 IEEE 10th International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130308742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Modified SLM Scheme for PAPR Reduction in OFDM Systems OFDM系统中减小PAPR的改进SLM方案
C. C. Hu, Lingyin Wang, Zhuang Zhou
{"title":"A Modified SLM Scheme for PAPR Reduction in OFDM Systems","authors":"C. C. Hu, Lingyin Wang, Zhuang Zhou","doi":"10.1109/ICEIEC49280.2020.9152350","DOIUrl":"https://doi.org/10.1109/ICEIEC49280.2020.9152350","url":null,"abstract":"Orthogonal frequency division multiplexing (OFDM) is considered as a reliable technique for wireless communications. However, OFDM signals have the high peak-to-average power ratio (PAPR), which causes the deteriorated system performance. Selected mapping (SLM) is regarded as one of the productive schemes for PAPR reduction in OFDM systems, but the high computational complexity limits its application. Thus, a modified SLM (M-SLM) scheme for improving PAPR problem in OFDM systems is proposed. It first uses two orthogonal phase factor sets to generate two groups of original OFDM candidate signals. Then, more candidate signals are obtained by employing the linear combinations of two groups of original candidate signals based on the linear property of IFFT. Simulation results show that the M-SLM scheme has the similar PAPR performance accompanied by the remarkable computational complexity reduction compared with original SLM and the existing GreenOFDM.","PeriodicalId":352285,"journal":{"name":"2020 IEEE 10th International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133956318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Adaptive Weighted Bagging Ensemble Learning Model for Zombie Enterprise Identification 僵尸企业识别的自适应加权Bagging集成学习模型
Xiaorui Dong, Hongke Duan, Tianshuo Wang, Qingqing Liu
{"title":"An Adaptive Weighted Bagging Ensemble Learning Model for Zombie Enterprise Identification","authors":"Xiaorui Dong, Hongke Duan, Tianshuo Wang, Qingqing Liu","doi":"10.1109/ICEIEC49280.2020.9152215","DOIUrl":"https://doi.org/10.1109/ICEIEC49280.2020.9152215","url":null,"abstract":"Zombie enterprise portrait and classification is one of the urgent problems in the current society, which has important practical significance and research value. This paper presents an adaptive weighted Bagging integrated learning method, which integrates 5 regular models and 8 pattern recognition models. The weight of the base classifier in integrated learning can be adjusted adaptively according to the training process to reduce the subjectivity and limitation of the regular model as much as possible. The accuracy, precision and recall rate of the model are all up to 1.0 in the experiment. At the same time, the strategy of data cleaning and missing item completion for problem domain is proposed. The research methods and results proposed in this paper have certain reference significance for the study of zombie enterprise portrait and classification and its related fields.","PeriodicalId":352285,"journal":{"name":"2020 IEEE 10th International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133307762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Pattern Synthesis of Antenna Arrays Using Dynamic Cooperative Grey Wolf Optimizer Algorithm 基于动态协同灰狼优化算法的天线阵方向图综合
Yan Liu, Yaming Zhang, S. Gao
{"title":"Pattern Synthesis of Antenna Arrays Using Dynamic Cooperative Grey Wolf Optimizer Algorithm","authors":"Yan Liu, Yaming Zhang, S. Gao","doi":"10.1109/ICEIEC49280.2020.9152282","DOIUrl":"https://doi.org/10.1109/ICEIEC49280.2020.9152282","url":null,"abstract":"In this paper, a novel method for pattern synthesis of antenna arrays based on dynamic cooperative gray wolf optimizer algorithm is proposed. By introducing the dynamic cooperative weight factor, positions of the three leader wolves are weighted, and then the positions of next generation are updated. The improved algorithm emphasizes the leading role of the leader wolf, but also does not neglect the cooperation between the leadership wolves. Global optimal and local optimal can be well balanced and converge to the optimal solution quickly and effectively. The proposed algorithm has been successfully used to reduce the sidelobe level and form deep null steerings at designated directions which meets the design requirements.","PeriodicalId":352285,"journal":{"name":"2020 IEEE 10th International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"532 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133355358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Analyzing and Improving the Network Flow Model in Hex Game System 十六进制博弈系统中网络流模型的分析与改进
Yuxing Wang, Wenjing Yue, Nianqin Fu, Yu Cao, Zhi Chen
{"title":"Analyzing and Improving the Network Flow Model in Hex Game System","authors":"Yuxing Wang, Wenjing Yue, Nianqin Fu, Yu Cao, Zhi Chen","doi":"10.1109/ICEIEC49280.2020.9152344","DOIUrl":"https://doi.org/10.1109/ICEIEC49280.2020.9152344","url":null,"abstract":"The key problem in determining Hex game ability is to design a satisfactory evaluation function. Since the network flow model can reflect the connectivity of the system, and Hex is a connectivity game, some previous researchers proposed the idea of applying the network flow model to Hex. However, in the actual game, it was found that the game ability was poor, and the satisfactory results were often not given. This paper, first of all, analyzes the shortcomings of the network flow model applied to Hex and summarizes three main reasons for its poor evaluation ability. In order to improve the game ability of the system, this paper proposes a multi-level priority queue evaluation model. The main idea is as follows: firstly, according to the status around the stones, the stones are divided into five kinds of priority and put into the corresponding priority queue. Then the stones of the same priority are sorted by the priority queue custom sorting function. Finally, the best decision is screened by the select function. The experimental and evaluation results show that the game ability of the multi-level priority queue model is significantly better than that of the network flow model. Besides, the new evaluation model provides a new idea for the design of the evaluation function of Hex.","PeriodicalId":352285,"journal":{"name":"2020 IEEE 10th International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"159 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113998745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT Based Optimal UAV Tracking Method Considering Noise and Cyber Attacks 考虑噪声和网络攻击的基于物联网的无人机最优跟踪方法
M. Rana, A. Abdelhadi
{"title":"IoT Based Optimal UAV Tracking Method Considering Noise and Cyber Attacks","authors":"M. Rana, A. Abdelhadi","doi":"10.1109/ICEIEC49280.2020.9152332","DOIUrl":"https://doi.org/10.1109/ICEIEC49280.2020.9152332","url":null,"abstract":"This paper proposes an optimal signal processing based UAV tracking algorithm considering noise and cyber attacks in sensory measurements. After representing the UAV dynamics into a state-space form, the UAV embedded IoT sensors and IoT gateways are used to obtain measurements at the control center. The prediction and correction based optimal Kalman filtering algorithm is proposed to know the UAV states such as velocity and pitch angle. Extensive numerical results show that the proposed algorithm can properly track the UAV states within 0.9-0.45 sec.","PeriodicalId":352285,"journal":{"name":"2020 IEEE 10th International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116031564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Graph Publishing with Local Differential Privacy for Hierarchical Social Networks 层次社会网络的局部差分隐私图发布
Jing-Yu Yang, Xuebin Ma, Xiangyu Bai, L. Cui
{"title":"Graph Publishing with Local Differential Privacy for Hierarchical Social Networks","authors":"Jing-Yu Yang, Xuebin Ma, Xiangyu Bai, L. Cui","doi":"10.1109/ICEIEC49280.2020.9152325","DOIUrl":"https://doi.org/10.1109/ICEIEC49280.2020.9152325","url":null,"abstract":"With the spread of social network services, social media applications have obtained a significant amount of personal data and relational information from their users. In the era of big data, data should to be shared to make maximum use of its potential value. Therefore, the problem of personal privacy protection has become increasingly important. At present, differential privacy is a strictly proven privacy protection model, which has garnered people’s attention and research in many fields. However, the existing social network differential privacy publishing technology mainly focuses on the centralized model, that is, the data collector is assumed to be credible. The hierarchical random graph model, which satisfies differential privacy to the local model, was applied in our study. We improved efficiency and accuracy using the Monte Carlo Markov chain. The experiment showed that the local differential privacy had better utility than the centralized differential privacy under the same differential privacy conditions.","PeriodicalId":352285,"journal":{"name":"2020 IEEE 10th International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133838158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Research on Network Public Opinion Analysis and Monitor Method Based on Big Data Technology 基于大数据技术的网络舆情分析与监测方法研究
Donglan Liu, Hao Zhang, Hao Yu, Xiaohong Zhao, Wenting Wang, Xin Liu, Lei Ma
{"title":"Research on Network Public Opinion Analysis and Monitor Method Based on Big Data Technology","authors":"Donglan Liu, Hao Zhang, Hao Yu, Xiaohong Zhao, Wenting Wang, Xin Liu, Lei Ma","doi":"10.1109/ICEIEC49280.2020.9152232","DOIUrl":"https://doi.org/10.1109/ICEIEC49280.2020.9152232","url":null,"abstract":"At present, the use of public opinion analysis method to explore the feelings of users in comments has become one of the hot research topics, and has been applied in many business and public management fields, such as movie box office, stock trend prediction, public opinion monitoring in power sector, etc. Data mining and analysis based on big data technology is increasingly demanding, and the logical relationship of data processing is increasingly complex. How to analyze and mine network public opinion information in heterogeneous data environment has become a big challenge in data management, application and value mining. This paper summarizes and compares several mainstream public opinion analysis methods and their applications, including unsupervised public opinion analysis method and supervised public opinion analysis method, and introduces the application scenarios related to public opinion analysis. A network public opinion analysis system model based on big data technology is designed to provide important data support for network public opinion monitoring.","PeriodicalId":352285,"journal":{"name":"2020 IEEE 10th International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133352225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
IEEE 802.11ah: Future Research Challenges and Opportunities IEEE 802.11ah:未来研究的挑战和机遇
Tengku Ahmad Riza, D. Gunawan
{"title":"IEEE 802.11ah: Future Research Challenges and Opportunities","authors":"Tengku Ahmad Riza, D. Gunawan","doi":"10.1109/ICEIEC49280.2020.9152300","DOIUrl":"https://doi.org/10.1109/ICEIEC49280.2020.9152300","url":null,"abstract":"Wi-Fi (wireless fidelity) IEEE 802.11 network is growing rapidly, but still has much weakness in coverage area, power consumption, and traffic. However, to overcome this weakness can use the IEEE 802.11ah standard, which has advantages to overcome area coverage, power consumption, and traffic. This paper comprehensively explains the development of the IEEE 802.11ah network and provides opportunities and challenges for the development of IEEE 802.11ah in the future. We are currently researching the IEEE 802.11ah challenge with the novelty of combining game theory with the winning game strategy to optimize the IEEE 802.11ah QoS network. (Abstract)","PeriodicalId":352285,"journal":{"name":"2020 IEEE 10th International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125092848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
IEEE 802.11ah Network Challenges Supports Covid-19 Prevention Team IEEE 802.11ah网络挑战支持Covid-19预防团队
Tengku Ahmad Riza, D. Gunawan
{"title":"IEEE 802.11ah Network Challenges Supports Covid-19 Prevention Team","authors":"Tengku Ahmad Riza, D. Gunawan","doi":"10.1109/ICEIEC49280.2020.9152346","DOIUrl":"https://doi.org/10.1109/ICEIEC49280.2020.9152346","url":null,"abstract":"The IEEE 802.11 Wi-Fi network (wireless fidelity) currently continues to grow with a variety of different functions and capabilities, but has their respective weaknesses, especially to support emergency communication. However, these problems can be resolved by the IEEE 802.11ah standard which has the advantage of coverage area, power consumption, and traffic. In this paper, IEEE 802.11ah Network Challenges Supports Covid-19 Prevention Team with an explanation of IEEE 802.11ah concepts and technology compared to other IEEE 802.11 technologies, based on existing research IEEE 802.11ah can be implemented in monitoring covid-19 sufferers in realtime and from any location. Finally, the IEEE 802.11ah Implementation Model Plans 1 and 2 that have been designed in this paper are implemented.","PeriodicalId":352285,"journal":{"name":"2020 IEEE 10th International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126176773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信