Shaoxian Xia, Z. Wang, Zhanbin Hou, Hongshu Ye, Binbin Xue, Shouzhi Wang, X. Zhang, Kewen Yang
{"title":"Design of Quantum Key Fusion Model for Power Multi-terminal","authors":"Shaoxian Xia, Z. Wang, Zhanbin Hou, Hongshu Ye, Binbin Xue, Shouzhi Wang, X. Zhang, Kewen Yang","doi":"10.1109/ICISCAE51034.2020.9236849","DOIUrl":"https://doi.org/10.1109/ICISCAE51034.2020.9236849","url":null,"abstract":"With the construction of State Grid informatization, professional data such as operation inspection, marketing, and regulation have gradually shifted from offline to online. In recent years, cyberspace security incidents have occurred frequently, and national and group cybersecurity threats have emerged. As the next-generation communication system, quantum security has to satisfy the security requirements. Also, it is especially important to build the fusion application of energy network quantum private communication technology and conventional network, and to form a safe and reliable quantum-level communication technology solution suitable for the power grid. In this paper, from the perspective of the multi-terminal quantum key application, combined with a mature electricity consumption information collection system, a handheld meter reading solution based on quantum private communication technology is proposed to effectively integrate the two and achieve technological upgrading. First, from the technical theory and application fields, the current situation of quantum private communication technology and its feasibility of combining with classical facilities are introduced and analyzed. Then, the hardware security module and handheld meter reading terminal equipment are taken as typical examples to design and realize quantum key shared storage, business security process application model; finally, based on the overall environment of quantum key distribution, the architecture design of multi-terminal quantum key application verification is implemented to verify the quantum key business application process.","PeriodicalId":355473,"journal":{"name":"2020 IEEE 3rd International Conference on Information Systems and Computer Aided Education (ICISCAE)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128506288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Dual-Slope Based Electrocardiogram Peak Detection Method for Wearable Devices","authors":"Haoran Li","doi":"10.1109/ICISCAE51034.2020.9236911","DOIUrl":"https://doi.org/10.1109/ICISCAE51034.2020.9236911","url":null,"abstract":"This paper presents a new electrocardiogram (ECG) peak detection method based on Dual-Slope processing with low computational complexity, suitable for wearable devices. The method calculates the slopes on both sides of a data point, and only peak points can have a large response to this processing. The sliding window integral and low pass filter method are used to make the signal smoother and more suitable for peak detection. Two adaptive thresholds are used to justify the peak point. The algorithm, evaluated by using data in MIT/BIH Database, achieves a detection rate of 99.49%, a sensitivity of 99.74%.","PeriodicalId":355473,"journal":{"name":"2020 IEEE 3rd International Conference on Information Systems and Computer Aided Education (ICISCAE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127008374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Random Error Prediction of Laser Gyroscope Based on GM(1,1) Model","authors":"Xiang Li, Lixin Wang, Zhiqiang Duan","doi":"10.1109/ICISCAE51034.2020.9236886","DOIUrl":"https://doi.org/10.1109/ICISCAE51034.2020.9236886","url":null,"abstract":"Allan variance analysis method can make static analysis, identifying static laser gyroscope random error and random error as the working environment, operation process changes, human disturbance and other factors, but it can't give dynamic characterization of random error coefficient under the static under laser gyroscope random error compensation to provide accurate basis, based on the segmented dynamic. Allan variance method is proposed to identify random error term, based on the gray GM (1, 1) prediction model using prior Allan variance analysis to identify dynamic parameters to predict subsequent coefficient of random error of laser gyro random error compensation, the test results show that the prediction model is effective and the prediction variance ratio is small, so it can predict and compensate the random error coefficient of the laser gyroscope in the same working environment.","PeriodicalId":355473,"journal":{"name":"2020 IEEE 3rd International Conference on Information Systems and Computer Aided Education (ICISCAE)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131970501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Programming Method of a Robot to Cut Automotive Upholsteries","authors":"Tao Zhang","doi":"10.1109/ICISCAE51034.2020.9236832","DOIUrl":"https://doi.org/10.1109/ICISCAE51034.2020.9236832","url":null,"abstract":"To cut automotive upholsteries by using a robot, it is needed to compose a user program which is required to teach the robot in order to complete the task. For the purpose of studying the programming method, the water-cutting KUKA robot to cut automotive upholsteries used in Brilliance Jinbei is used as the research object. This paper probes into the problems and influencing factors to be considered in the overall design of program structure and the programming of main program and sub-program, and a good deal of work need to be carried out and solved on the spot according to objective conditions after the completion of main program and sub-program, which is program debugging. The research conclusion on robot programming method is of great significance to an enterprise's process optimization and trial-manufacture of new products.","PeriodicalId":355473,"journal":{"name":"2020 IEEE 3rd International Conference on Information Systems and Computer Aided Education (ICISCAE)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133411086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Isolated Word Recognition Algorithm Based on Machine Learning","authors":"Boyu Li, Yijie Wang, Yuang Niu, Cihan Miao","doi":"10.1109/ICISCAE51034.2020.9236812","DOIUrl":"https://doi.org/10.1109/ICISCAE51034.2020.9236812","url":null,"abstract":"Natural language communication between humans and machines is a popular direction of artificial intelligence. As a technology for realizing direct dialogue between humans and machines, speech recognition technology can convert human speech signals into language information, providing technical support for human-machine language communication. In this paper, we conduct a speech recognition study. First, we collect more than 1,000 pieces of speech data, preprocess the speech data, extract three different characteristics of speech such as LPC, LPCC, and MFCC, and divide the speech data into a training set and a test set. Two naive Bayesian and KNN classifiers are used for classification, and the classification accuracy is obtained. This paper mainly studies the accuracy of isolated word recognition in three different features and two different classification algorithms.","PeriodicalId":355473,"journal":{"name":"2020 IEEE 3rd International Conference on Information Systems and Computer Aided Education (ICISCAE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122214198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Determination Research for the Direction of Equipment Maintainability Improvement Based on Parameter Sensitivity Analysis","authors":"Lei Guo","doi":"10.1109/ICISCAE51034.2020.9236899","DOIUrl":"https://doi.org/10.1109/ICISCAE51034.2020.9236899","url":null,"abstract":"The article embarks from the maintainability qualitative index parameters, based on the theory of Support Vector Machine Regression(SVR). The prediction model is established, with the normalized system maintainability qualitative index parameters and general evaluation respectively as the input and output of the model. It uses the Sensitivity Analysis of the impact of qualitative index parameters on the overall value, to determine the direction of the current equipment maintainability improvement. This method can provide the basis for the determination of maintainability improvement target.","PeriodicalId":355473,"journal":{"name":"2020 IEEE 3rd International Conference on Information Systems and Computer Aided Education (ICISCAE)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120900122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhining Lv, Yu Du, Zhonghang Li, Wei Liu, Bing Qi, Shan He, Wei Wang, Jingbin Liu
{"title":"Research on Trusted Terminal System Based on Trust Chain","authors":"Zhining Lv, Yu Du, Zhonghang Li, Wei Liu, Bing Qi, Shan He, Wei Wang, Jingbin Liu","doi":"10.1109/ICISCAE51034.2020.9236914","DOIUrl":"https://doi.org/10.1109/ICISCAE51034.2020.9236914","url":null,"abstract":"This paper presents a system in the trusted platform called Trusted Terminal System (TTS). Based on Trusted Cryptography Module (TCM), TTS establishes an comprehensive protection system of the terminal host via several key technologies such as trusted boot, kernel measurement and integrity report. Also, TTS sends the integrity status of terminal to the Trusted Terminal Attestation Server (TTAS) by remote attestation technology for the purpose of ensuring the terminal within a trusted environment. The paper illustrates the fundamental of the TTS, and also the key technologies and implementation method based on it. Finally, the paper describes the construction technology of TTS based on the TCM and analyzes its performance.","PeriodicalId":355473,"journal":{"name":"2020 IEEE 3rd International Conference on Information Systems and Computer Aided Education (ICISCAE)","volume":"8 3-4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120906970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research and Design of Four-Axis CNC System Based on Differential Interpolation Principle","authors":"Wang Zhenghao, Liu Yang, Zhao Qingzhi, W. Jiaqi","doi":"10.1109/ICISCAE51034.2020.9236922","DOIUrl":"https://doi.org/10.1109/ICISCAE51034.2020.9236922","url":null,"abstract":"With the development of science and technology, economical CNC machine tools have also developed rapidly. Due to the advantages of low price and open source, it is widely used by small and medium-sized enterprises. However, there are shortcomings of insufficient interpolation when processing high precision workpieces. Therefore, this paper develops a four-axis CNC system based on the principle of differential interpolation, according to the characteristics of PC and Arduino MCU, determines the upper and lower machine control scheme of “PC + Arduino MCU” and builds a four-axis CNC engraving machine experimental platform. On this platform, interpolation of conic curve and rotary surface is completed. Experiments show that the four-axis CNC system designed in this paper meets the initial design requirements and lays a good foundation for the development of high-end multi-axis CNC systems.","PeriodicalId":355473,"journal":{"name":"2020 IEEE 3rd International Conference on Information Systems and Computer Aided Education (ICISCAE)","volume":"797 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116139044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Text Detection and Recognition Based on OCR Recognition Technology","authors":"Yuming He","doi":"10.1109/ICISCAE51034.2020.9236870","DOIUrl":"https://doi.org/10.1109/ICISCAE51034.2020.9236870","url":null,"abstract":"Optical character recognition (OCR) is an important branch in the field of machine vision. It involves pattern recognition, image processing, digital signal processing, artificial intelligence and other disciplines. It is a comprehensive. It has important use value and theoretical significance in high-tech fields such as word information processing, office automation, machine translation and real-time monitoring system. In the 21st century, with the popularity of smart phones with high-definition cameras, OCR has a new pursuit in its development: more and more people pick up their mobile phones to photograph the things and scenes they see and obtain the text information in the pictures. Therefore, the recognition of characters in natural scenes has become a brand-new topic. In the past, text detection and text recognition algorithms were basically based on artificially designed features and traditional image processing methods. These features and algorithms were difficult to design and needed a lot of professional knowledge and experience support, so the accuracy was not high and they were not generalized. In recent years, with the rapid development of deep learning technology, breakthroughs have been made in the fields of computer vision such as image classification, object detection and semantic segmentation. Deep learning algorithm is a data-driven algorithm. The algorithm based on deep learning can automatically discover and learn the hidden feature rules in a large number of data through iterative training, without too much human intervention, so it has better generalization than traditional image processing related algorithms.","PeriodicalId":355473,"journal":{"name":"2020 IEEE 3rd International Conference on Information Systems and Computer Aided Education (ICISCAE)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124902446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Step-Speed Detection Device and Prediction Algorithm of VR Motion Platform","authors":"Zhenqian Shen, Ying‐Ming Liu","doi":"10.1109/ICISCAE51034.2020.9236859","DOIUrl":"https://doi.org/10.1109/ICISCAE51034.2020.9236859","url":null,"abstract":"In order to solve the problem of dizziness caused by the inconsistency between visual and somatosensory movements of people in a virtual reality system, a set of stride detection device composed of $mathbf{2}times mathbf{11}$ array of foot pressure sensors was designed. The piezoresistive characteristics and rebound time of the foot pressure sensor were studied. A footstep pressure signal detection circuit is designed, then the footstep pressure signal through the MCU is collected, and calculated the pace. At the same time, the ARIMA model is used to predict speed changes. The experimental results show that the piezoresistive characteristics of the foot pressure sensor meet the requirements of foot detection, and the rebound time is less than 170 ms; the pace detection device detects the step detection accuracy and prediction accuracy are both greater than 95%, which meets the design requirements of VR motion platforms.","PeriodicalId":355473,"journal":{"name":"2020 IEEE 3rd International Conference on Information Systems and Computer Aided Education (ICISCAE)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125795429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}