{"title":"Research on the damage class prediction method in typhoon disaster for power system","authors":"Shiyang Tang, Xiyuan Xu, Yang Yang, Zhen Yu, Zhuguang Liu, Cheng Guan","doi":"10.1109/ICISCAE51034.2020.9236927","DOIUrl":"https://doi.org/10.1109/ICISCAE51034.2020.9236927","url":null,"abstract":"Power system is one of the most fundamental infrastructure systems for human society. The stability of power system greatly affects the economy and security of the city. Therefore, recovering the power system in cities after a severe disaster is the high priority work in a disaster emergency process. Among several kinds of huge disasters, typhoon is a highly valuable research target. Different from the earthquake or tsunami, typhoons often last several days before landing after their generation, so there is much more time for people to prepare and cope with the damage to power system. In this paper, a damage class prediction method for determining the command institution is researched. Based on the actual power system damage data in China from 2004 to 2019, this research proposed the prediction method with machine learning algorithm. The result shows SVM model can reach 77.4 % accuracy in this task, and it is accurate enough to support the emergency decision.","PeriodicalId":355473,"journal":{"name":"2020 IEEE 3rd International Conference on Information Systems and Computer Aided Education (ICISCAE)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130172500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application Performance Experiment of Three-dimensional Anthropometric Virtual Fitting System","authors":"Jianwei Wang, Qingfen Ma","doi":"10.1109/ICISCAE51034.2020.9236878","DOIUrl":"https://doi.org/10.1109/ICISCAE51034.2020.9236878","url":null,"abstract":"With the development of science and technology, three-dimensional anthropometric virtual fitting system appears rapidly and continues to advance. There are many kinds of system, and existing technology level is uneven, so the present situation of practical application needs to be analyzed by experiments. In order to detect the performance of this system, such as measuring speed, measuring accuracy and appearance effect, etc. Based on experiments, this research selected representative physical equipment, and simulated noninterference, light interference, dress interference and other real interference factors to detect the system performance. It is found that under the condition of dress interference, the system had a greater impact on the measurement accuracy. And under the condition of light interference, it had a greater impact on the appearance effect. According to the experimental findings, the body scanning and virtual simulation performance of virtual fitting system can be improved in many ways.","PeriodicalId":355473,"journal":{"name":"2020 IEEE 3rd International Conference on Information Systems and Computer Aided Education (ICISCAE)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133559937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Implementation of an Over Temperature Protection Circuit","authors":"Yonggang Wang, Zhimei Zhou, Yong Wan","doi":"10.1109/ICISCAE51034.2020.9236894","DOIUrl":"https://doi.org/10.1109/ICISCAE51034.2020.9236894","url":null,"abstract":"Based on the theory of thermal characteristic of diode and use reference voltage compare with diode temperature to realize a thermal shutdown circuit within thermal hysteresis. Bandgap circuit was used to provide reference voltage. Detailed theory derivation and design method were gave by this paper, the corresponding solution of the difficult part was also gave. By the comparison of simulation and test result we can know that this kind of thermal shutdown circuit can realize accurate thermal shutdown and hysteresis.","PeriodicalId":355473,"journal":{"name":"2020 IEEE 3rd International Conference on Information Systems and Computer Aided Education (ICISCAE)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133469301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Image Encryption Algorithm Based on Logistic Chaotic Scrambling System","authors":"J. Qu","doi":"10.1109/ICISCAE51034.2020.9236847","DOIUrl":"https://doi.org/10.1109/ICISCAE51034.2020.9236847","url":null,"abstract":"In order to ensure the confidentiality of image in transmission, a two-dimensional Logistic chaotic system with wide key space is constructed, which integrates with the random scrambling encryption algorithm, and scrambles the original image by optimizing the discrete chaotic sequence to form the encrypted image. The simulation results show that the algorithm is easy to implement, highly efficient, sensitive to the initial condition disturbance of the system, and it has large key space, good security and strong anti-attack ability.","PeriodicalId":355473,"journal":{"name":"2020 IEEE 3rd International Conference on Information Systems and Computer Aided Education (ICISCAE)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127660624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of Data Acquisition Platform for Industrial Internet of Things","authors":"Hongyan Zhang, Lin Wang","doi":"10.1109/ICISCAE51034.2020.9236827","DOIUrl":"https://doi.org/10.1109/ICISCAE51034.2020.9236827","url":null,"abstract":"Industrial Internet of Things platform is to create a service system based on a large number of data collection and analysis to support the extensive connection, flexible supply and efficient configuration of manufacturing resources based on the needs of manufacturing industry digitization, networking and intelligence. Based on the analysis of industrial Internet of things platform and SCADA, this paper designs the data acquisition platform of industrial Internet of things. The overall structure of the platform includes the infrastructure, the corresponding communication mode and the necessary software. The hardware part includes sensors, gateway modules, etc.; according to the communication protocol, data interconnection is realized; the software part mainly uses VS2017 and SQL Server to realize real-time data display, historical data curve, over limit alarm and other functions, and the data is visualized by using JavaScript language through Echarts.","PeriodicalId":355473,"journal":{"name":"2020 IEEE 3rd International Conference on Information Systems and Computer Aided Education (ICISCAE)","volume":"336 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124308652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Unveiling SSL/TLS MITM Hosts in the Wild","authors":"Zhuguo Li, G. Xiong, Li Guo","doi":"10.1109/ICISCAE51034.2020.9236866","DOIUrl":"https://doi.org/10.1109/ICISCAE51034.2020.9236866","url":null,"abstract":"The SSL man-in-the-middle (MITM) attack uses forged X.509 certificates to impersonate each endpoint and intercept encrypted connections between clients and servers. Prior researches have revealed the prevalence of MITM attacks from SSL proxies, firewall, anti-virus, adware and malware. In this work, we design and implement a novel method to discovery suspicious SSL MITM hosts in the wild. Our results show that hosts using untrusted certificates are vulnerable to MITM attacks. We find 322,831 forged certificates, most of which are generated by TLS proxies and corporate firewalls such as Lancom System, Fortinet, Technicolor, Ubiquiti, and so on. The main reason of these forged certificates disclosed in public maybe origin from default configurations. At the end, we clarify the limitations of our method and give suggestions to defend against SSL MITM attacks.","PeriodicalId":355473,"journal":{"name":"2020 IEEE 3rd International Conference on Information Systems and Computer Aided Education (ICISCAE)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123590678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Auto Malicious Websites Classification Based on Naive Bayes Classifier","authors":"Shuai Wang, Yashi Wang, Minhan Tang","doi":"10.1109/ICISCAE51034.2020.9236912","DOIUrl":"https://doi.org/10.1109/ICISCAE51034.2020.9236912","url":null,"abstract":"In recent years, the spread of malicious websites has had an increasingly serious impact on people's lives. To solve this problem, in this paper, we mainly focus on achieving the factor analysis of the website category and accurate identification of unknown information, so as to classify the benign and others, which help users avoid the risk of malicious websites. In the procedure, Naïve Bayes and other effective methods are used to calculate probability to test and train the model of website classification. Our result shows the response of benign and other tests well compares to others, suggesting that the Naïve Bayes method is more suitable to solve the differentiation of good websites, which accuracy can be reached to 90 percent. Besides, the training model of that classification is more accurate in that datasheet. Furthermore, if the data is more abundant and the technical bottleneck can be solved, the realization of highest accuracy of website classification using Naïve Bayes is possible.","PeriodicalId":355473,"journal":{"name":"2020 IEEE 3rd International Conference on Information Systems and Computer Aided Education (ICISCAE)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125033453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hanbing Qu, Pu Zhao, Bo Wang, Yujian Jia, Yuying Zhang, Yong Wang, Xiaowei Wang
{"title":"Single-End Transient Current Based Protection Method for VSC-HVDC Cable","authors":"Hanbing Qu, Pu Zhao, Bo Wang, Yujian Jia, Yuying Zhang, Yong Wang, Xiaowei Wang","doi":"10.1109/ICISCAE51034.2020.9236816","DOIUrl":"https://doi.org/10.1109/ICISCAE51034.2020.9236816","url":null,"abstract":"Based on the boundary characteristic and frequency characteristic of cable, a protection method for VSC-HVDC cable is proposed in this paper, which only uses the single-end transient current signal. First, the frequency components of the currents at the DC-side and AC-side of the DC boundary are extracted by means of S transform, and the magnitude of the high frequency components of DC-side current is employed to detect the fault. Then, the ratio of the magnitude of the high frequency components of the DC- and AC-side currents is calculated to identify the internal fault from the close-up external fault. Finally, the ratio of the high and low frequency components of the DC-side current is calculated to identify the internal fault from the opposite external fault. This protection method is verified on basis of a two-terminal VSC-HVDC model with EMTDC/PSCAD. Various types of faults are simulated, and the simulation results show that this method can identify the internal faults under different conditions rapidly, while can ignore the external faults reliably.","PeriodicalId":355473,"journal":{"name":"2020 IEEE 3rd International Conference on Information Systems and Computer Aided Education (ICISCAE)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129513632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhenghua Zhang, Chongxin Fang, Jiafeng Zhang, Jin Qian, Q. Su
{"title":"Traffic Guidance Based on LSTM Neural Network and Dual Tracking Dijkstra Algorithm","authors":"Zhenghua Zhang, Chongxin Fang, Jiafeng Zhang, Jin Qian, Q. Su","doi":"10.1109/ICISCAE51034.2020.9236823","DOIUrl":"https://doi.org/10.1109/ICISCAE51034.2020.9236823","url":null,"abstract":"Based on the historical big data intelligent transportation system, the traffic map model is constructed according to the characteristics of the city. With the help of the LSTM (Long Short-Term Memory) neural network prediction function, the city environmental data and traffic data are fused and preprocessed. Through the optimization and function expansion of the shortest path double-tracking Dijkstra algorithm, a route guidance scheme to avoid traffic congestion and severe environmental pollution is provided. The system can be applied to actual road regulation and optimal path selection. Not only can solve the city's vehicle congestion, but also alleviate the problem of air pollution.","PeriodicalId":355473,"journal":{"name":"2020 IEEE 3rd International Conference on Information Systems and Computer Aided Education (ICISCAE)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127350398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"GDGCA: A Gene Driven Cache Scheduling Algorithm in Information-Centric Network","authors":"Xiaoyong Lin, Zetian Zhang, Mingyu Chen, Yanru Sun, Yun Li, Mingjie Liu, Yiwei Wang, Mingtao Liu","doi":"10.1109/ICISCAE51034.2020.9236906","DOIUrl":"https://doi.org/10.1109/ICISCAE51034.2020.9236906","url":null,"abstract":"The disadvantages and inextensibility of the traditional network require more novel thoughts for the future network architecture, as for ICN (Information-Centric Network), is an information centered and self-caching network, ICN is deeply rooted in the 5G era, of which concept is user-centered and content-centered. Although the ICN enables cache replacement of content, an information distribution scheduling algorithm is still needed to allocate resources properly due to its limited cache capacity. This paper starts with data popularity, information epilepsy and other data related attributes in the ICN environment. Then it analyzes the factors affecting the cache, proposes the concept and calculation method of Gene value. Since the ICN is still in a theoretical state, this paper describes an ICN scenario that is close to the reality and processes a greedy caching algorithm named GDGCA (Gene Driven Greedy Caching Algorithm). The GDGCA tries to design an optimal simulation model, which based on the thoughts of throughput balance and satisfaction degree (SSD), then compares with the regular distributed scheduling algorithm in related research fields, such as the QoE indexes and satisfaction degree under different Poisson data volumes and cycles, the final simulation results prove that GDGCA has better performance in cache scheduling of ICN edge router, especially with the aid of Information Gene value.","PeriodicalId":355473,"journal":{"name":"2020 IEEE 3rd International Conference on Information Systems and Computer Aided Education (ICISCAE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127507069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}