{"title":"Research on Data Security Analysis and Label Recognition Technology Based on Big Data Business Scenario","authors":"Donglan Liu, Deqiu Kong, Xin Liu, Lei Ma, Yingxian Chang, Hao Zhang, Rui Wang, Hao Yu","doi":"10.1109/ICEIEC49280.2020.9152308","DOIUrl":"https://doi.org/10.1109/ICEIEC49280.2020.9152308","url":null,"abstract":"Data is the inevitable product of social high informatization, and its security risk is an indispensable part of information security. In the case of accelerating the construction of ubiquitous power Internet of things, this paper deeply studies the data security analysis and label recognition technology based on big data business scenarios. Based on the process of active and passive discovery, a complete catalog of data assets is established by means of database scanning, server scanning, terminal scanning, terminal monitoring, network monitoring and database access monitoring. The threat tree is used to model various threats to data security. On the basis of data asset cataloging and threat modeling, this paper studies the data security risk analysis and quantification method by comprehensively judging the threats faced by the business system, as well as the vulnerability and asset value of the system itself. Based on the heuristic integrated learning strategy of automatic semantic tagging for massive network resources, metadata is extracted through active and passive collection, and the semantic relationship between tags is extracted and processed by natural language processing and machine learning technology. Finally, automatic labels are generated through analysis capabilities such as business correlation analysis, organizational correlation analysis, data distribution analysis, data classification and grade.","PeriodicalId":352285,"journal":{"name":"2020 IEEE 10th International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130308742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Modified SLM Scheme for PAPR Reduction in OFDM Systems","authors":"C. C. Hu, Lingyin Wang, Zhuang Zhou","doi":"10.1109/ICEIEC49280.2020.9152350","DOIUrl":"https://doi.org/10.1109/ICEIEC49280.2020.9152350","url":null,"abstract":"Orthogonal frequency division multiplexing (OFDM) is considered as a reliable technique for wireless communications. However, OFDM signals have the high peak-to-average power ratio (PAPR), which causes the deteriorated system performance. Selected mapping (SLM) is regarded as one of the productive schemes for PAPR reduction in OFDM systems, but the high computational complexity limits its application. Thus, a modified SLM (M-SLM) scheme for improving PAPR problem in OFDM systems is proposed. It first uses two orthogonal phase factor sets to generate two groups of original OFDM candidate signals. Then, more candidate signals are obtained by employing the linear combinations of two groups of original candidate signals based on the linear property of IFFT. Simulation results show that the M-SLM scheme has the similar PAPR performance accompanied by the remarkable computational complexity reduction compared with original SLM and the existing GreenOFDM.","PeriodicalId":352285,"journal":{"name":"2020 IEEE 10th International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133956318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiaorui Dong, Hongke Duan, Tianshuo Wang, Qingqing Liu
{"title":"An Adaptive Weighted Bagging Ensemble Learning Model for Zombie Enterprise Identification","authors":"Xiaorui Dong, Hongke Duan, Tianshuo Wang, Qingqing Liu","doi":"10.1109/ICEIEC49280.2020.9152215","DOIUrl":"https://doi.org/10.1109/ICEIEC49280.2020.9152215","url":null,"abstract":"Zombie enterprise portrait and classification is one of the urgent problems in the current society, which has important practical significance and research value. This paper presents an adaptive weighted Bagging integrated learning method, which integrates 5 regular models and 8 pattern recognition models. The weight of the base classifier in integrated learning can be adjusted adaptively according to the training process to reduce the subjectivity and limitation of the regular model as much as possible. The accuracy, precision and recall rate of the model are all up to 1.0 in the experiment. At the same time, the strategy of data cleaning and missing item completion for problem domain is proposed. The research methods and results proposed in this paper have certain reference significance for the study of zombie enterprise portrait and classification and its related fields.","PeriodicalId":352285,"journal":{"name":"2020 IEEE 10th International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133307762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pattern Synthesis of Antenna Arrays Using Dynamic Cooperative Grey Wolf Optimizer Algorithm","authors":"Yan Liu, Yaming Zhang, S. Gao","doi":"10.1109/ICEIEC49280.2020.9152282","DOIUrl":"https://doi.org/10.1109/ICEIEC49280.2020.9152282","url":null,"abstract":"In this paper, a novel method for pattern synthesis of antenna arrays based on dynamic cooperative gray wolf optimizer algorithm is proposed. By introducing the dynamic cooperative weight factor, positions of the three leader wolves are weighted, and then the positions of next generation are updated. The improved algorithm emphasizes the leading role of the leader wolf, but also does not neglect the cooperation between the leadership wolves. Global optimal and local optimal can be well balanced and converge to the optimal solution quickly and effectively. The proposed algorithm has been successfully used to reduce the sidelobe level and form deep null steerings at designated directions which meets the design requirements.","PeriodicalId":352285,"journal":{"name":"2020 IEEE 10th International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"532 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133355358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analyzing and Improving the Network Flow Model in Hex Game System","authors":"Yuxing Wang, Wenjing Yue, Nianqin Fu, Yu Cao, Zhi Chen","doi":"10.1109/ICEIEC49280.2020.9152344","DOIUrl":"https://doi.org/10.1109/ICEIEC49280.2020.9152344","url":null,"abstract":"The key problem in determining Hex game ability is to design a satisfactory evaluation function. Since the network flow model can reflect the connectivity of the system, and Hex is a connectivity game, some previous researchers proposed the idea of applying the network flow model to Hex. However, in the actual game, it was found that the game ability was poor, and the satisfactory results were often not given. This paper, first of all, analyzes the shortcomings of the network flow model applied to Hex and summarizes three main reasons for its poor evaluation ability. In order to improve the game ability of the system, this paper proposes a multi-level priority queue evaluation model. The main idea is as follows: firstly, according to the status around the stones, the stones are divided into five kinds of priority and put into the corresponding priority queue. Then the stones of the same priority are sorted by the priority queue custom sorting function. Finally, the best decision is screened by the select function. The experimental and evaluation results show that the game ability of the multi-level priority queue model is significantly better than that of the network flow model. Besides, the new evaluation model provides a new idea for the design of the evaluation function of Hex.","PeriodicalId":352285,"journal":{"name":"2020 IEEE 10th International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"159 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113998745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IoT Based Optimal UAV Tracking Method Considering Noise and Cyber Attacks","authors":"M. Rana, A. Abdelhadi","doi":"10.1109/ICEIEC49280.2020.9152332","DOIUrl":"https://doi.org/10.1109/ICEIEC49280.2020.9152332","url":null,"abstract":"This paper proposes an optimal signal processing based UAV tracking algorithm considering noise and cyber attacks in sensory measurements. After representing the UAV dynamics into a state-space form, the UAV embedded IoT sensors and IoT gateways are used to obtain measurements at the control center. The prediction and correction based optimal Kalman filtering algorithm is proposed to know the UAV states such as velocity and pitch angle. Extensive numerical results show that the proposed algorithm can properly track the UAV states within 0.9-0.45 sec.","PeriodicalId":352285,"journal":{"name":"2020 IEEE 10th International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116031564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Graph Publishing with Local Differential Privacy for Hierarchical Social Networks","authors":"Jing-Yu Yang, Xuebin Ma, Xiangyu Bai, L. Cui","doi":"10.1109/ICEIEC49280.2020.9152325","DOIUrl":"https://doi.org/10.1109/ICEIEC49280.2020.9152325","url":null,"abstract":"With the spread of social network services, social media applications have obtained a significant amount of personal data and relational information from their users. In the era of big data, data should to be shared to make maximum use of its potential value. Therefore, the problem of personal privacy protection has become increasingly important. At present, differential privacy is a strictly proven privacy protection model, which has garnered people’s attention and research in many fields. However, the existing social network differential privacy publishing technology mainly focuses on the centralized model, that is, the data collector is assumed to be credible. The hierarchical random graph model, which satisfies differential privacy to the local model, was applied in our study. We improved efficiency and accuracy using the Monte Carlo Markov chain. The experiment showed that the local differential privacy had better utility than the centralized differential privacy under the same differential privacy conditions.","PeriodicalId":352285,"journal":{"name":"2020 IEEE 10th International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133838158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Donglan Liu, Hao Zhang, Hao Yu, Xiaohong Zhao, Wenting Wang, Xin Liu, Lei Ma
{"title":"Research on Network Public Opinion Analysis and Monitor Method Based on Big Data Technology","authors":"Donglan Liu, Hao Zhang, Hao Yu, Xiaohong Zhao, Wenting Wang, Xin Liu, Lei Ma","doi":"10.1109/ICEIEC49280.2020.9152232","DOIUrl":"https://doi.org/10.1109/ICEIEC49280.2020.9152232","url":null,"abstract":"At present, the use of public opinion analysis method to explore the feelings of users in comments has become one of the hot research topics, and has been applied in many business and public management fields, such as movie box office, stock trend prediction, public opinion monitoring in power sector, etc. Data mining and analysis based on big data technology is increasingly demanding, and the logical relationship of data processing is increasingly complex. How to analyze and mine network public opinion information in heterogeneous data environment has become a big challenge in data management, application and value mining. This paper summarizes and compares several mainstream public opinion analysis methods and their applications, including unsupervised public opinion analysis method and supervised public opinion analysis method, and introduces the application scenarios related to public opinion analysis. A network public opinion analysis system model based on big data technology is designed to provide important data support for network public opinion monitoring.","PeriodicalId":352285,"journal":{"name":"2020 IEEE 10th International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133352225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IEEE 802.11ah: Future Research Challenges and Opportunities","authors":"Tengku Ahmad Riza, D. Gunawan","doi":"10.1109/ICEIEC49280.2020.9152300","DOIUrl":"https://doi.org/10.1109/ICEIEC49280.2020.9152300","url":null,"abstract":"Wi-Fi (wireless fidelity) IEEE 802.11 network is growing rapidly, but still has much weakness in coverage area, power consumption, and traffic. However, to overcome this weakness can use the IEEE 802.11ah standard, which has advantages to overcome area coverage, power consumption, and traffic. This paper comprehensively explains the development of the IEEE 802.11ah network and provides opportunities and challenges for the development of IEEE 802.11ah in the future. We are currently researching the IEEE 802.11ah challenge with the novelty of combining game theory with the winning game strategy to optimize the IEEE 802.11ah QoS network. (Abstract)","PeriodicalId":352285,"journal":{"name":"2020 IEEE 10th International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125092848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IEEE 802.11ah Network Challenges Supports Covid-19 Prevention Team","authors":"Tengku Ahmad Riza, D. Gunawan","doi":"10.1109/ICEIEC49280.2020.9152346","DOIUrl":"https://doi.org/10.1109/ICEIEC49280.2020.9152346","url":null,"abstract":"The IEEE 802.11 Wi-Fi network (wireless fidelity) currently continues to grow with a variety of different functions and capabilities, but has their respective weaknesses, especially to support emergency communication. However, these problems can be resolved by the IEEE 802.11ah standard which has the advantage of coverage area, power consumption, and traffic. In this paper, IEEE 802.11ah Network Challenges Supports Covid-19 Prevention Team with an explanation of IEEE 802.11ah concepts and technology compared to other IEEE 802.11 technologies, based on existing research IEEE 802.11ah can be implemented in monitoring covid-19 sufferers in realtime and from any location. Finally, the IEEE 802.11ah Implementation Model Plans 1 and 2 that have been designed in this paper are implemented.","PeriodicalId":352285,"journal":{"name":"2020 IEEE 10th International Conference on Electronics Information and Emergency Communication (ICEIEC)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126176773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}