{"title":"A Lightweight Dual Authentication Protocol for the Internet of Vehicles","authors":"Jichang Chen, Zhixiang Lu, Xueping Zhu","doi":"10.1109/ICISCAE51034.2020.9236913","DOIUrl":"https://doi.org/10.1109/ICISCAE51034.2020.9236913","url":null,"abstract":"With the development of 5G communication technology, the status of the Internet of Vehicles in people's lives is greatly improved in the general trend of intelligent transportation. The combination of vehicles and Radio Frequency Identification (RFID) makes the application prospects of vehicle networking gradually expand. However, the wireless network of the Internet of Vehicles is open and mobile, so it can be easily stolen or tampered with by attackers. Moreover, it will cause serious traffic security problems and even threat people's lives. In this paper, we propose a lightweight authentication protocol for the Internet of Vehicles based on a mobile RFID system and give corresponding security requirements for modeling potential attacks. The protocol is based on the three-party mutual authentication, and uses bit-operated left-cycle shift operations and hetero-oriented operations to generate encrypted data. The simultaneous inclusion of triparty shared key information and random numbers makes the protocol resistant to counterfeit attacks, violent attacks, replay attacks and desynchronization attacks. Finally, a simulation analysis of the security protocol using the ProVerif tool shows that the protocol secures is not accessible to attackers during the data transfer, and achieve the three-party authentication between sensor nodes (SN), vehicle nodes (Veh) and backend servers.","PeriodicalId":355473,"journal":{"name":"2020 IEEE 3rd International Conference on Information Systems and Computer Aided Education (ICISCAE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128400177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Multi-layer Protocol Feature Clustering Based on KMeans","authors":"Zhiguo Liu, Xiaobo Ren, Jiangmei Zhang","doi":"10.1109/ICISCAE51034.2020.9236825","DOIUrl":"https://doi.org/10.1109/ICISCAE51034.2020.9236825","url":null,"abstract":"In view of the current data link layer wireless protocol identification methods, the differences in the internal protocol format of the data frame are ignored, and the data frame is treated as single-layer protocol data to process, which cannot achieve an in-depth analysis of the unknown protocol. It is proposed to use known protocols to supplement unknown protocol information, and to use the association rules between multi-type frames and characteristic fields of multi-layer protocols to classify characteristic fields of multi-layer protocols. This method uses KMeans clustering, uses the trial-and-error process and error square sum parameters to determine the optimal cluster K, uses known protocol information to optimize the cluster center point, and uses the contour coefficient to evaluate the clustering results. It can realize the effective classification of protocol characteristics, and it is of great significance to analyze the unknown protocols in depth.","PeriodicalId":355473,"journal":{"name":"2020 IEEE 3rd International Conference on Information Systems and Computer Aided Education (ICISCAE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114882589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on the Integration of High and Low Voltage Power Distribution Cabinet and Fault Monitoring Device Based on PLC and Inverter","authors":"Zhou Lianyang","doi":"10.1109/ICISCAE51034.2020.9236791","DOIUrl":"https://doi.org/10.1109/ICISCAE51034.2020.9236791","url":null,"abstract":"With the rapid economic growth and the continuous increase in power load, users have increasingly demanded power quality, and the importance of fault-free monitoring of distribution networks has also increased. This article introduces the hardware of the control system. According to the actual speed range and load of the original DC speed control system, the appropriate frequency conversion asynchronous motor, frequency converter and encoder for measuring the speed are selected. In this paper, the overall design of the online monitoring system for the integrated equipment of high and low voltage distribution cabinets is carried out. The online monitoring system of the fault monitoring device is composed of intelligent capacitors, power information collection terminals and the host station of the host computer. The power information collection terminal collects the working condition and alarm information of each capacitor through the RS485 communication line, and then uploads it to the host station of the upper computer through GPRS. The staff can monitor the reactive power compensation device in real time on the main station operation page. By analyzing the influence of the control parameters and load size of the rectifier and inverter sides of the system on the fault diagnosis effect and the simulation results of the fault diagnosis on both sides, a robust fault characteristic index is proposed for reliable and rapid diagnosis.","PeriodicalId":355473,"journal":{"name":"2020 IEEE 3rd International Conference on Information Systems and Computer Aided Education (ICISCAE)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121695034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Track Tracking of Double Joint Robot Based on Sliding Mode Control","authors":"C. Jun, Wang Lin","doi":"10.1109/ICISCAE51034.2020.9236895","DOIUrl":"https://doi.org/10.1109/ICISCAE51034.2020.9236895","url":null,"abstract":"Robots play an important role in industry and service industry. The research contents of robotics include robot system design, mathematical modeling, actuator and robot force / position control. One index of robot system performance is trajectory tracking ability. In this paper, a two joint robot model is created, and a sliding mode controller is designed to track each joint. The sliding mode control based on the stability of input and output is derived, and the trajectory tracking sliding mode controller is designed by combining the mathematical model and dynamic characteristics of the robot system. Finally, the effectiveness of the sliding mode controller to the trajectory tracking control is verified by the simulation experiment, which can reduce the external interference to the system.","PeriodicalId":355473,"journal":{"name":"2020 IEEE 3rd International Conference on Information Systems and Computer Aided Education (ICISCAE)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121718284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fan Bailin, Ren Haixiao, Deng Zhangshen, Chen Jianhua
{"title":"Intelligent Vehicle Path Planning Based on Hybrid Algorithm","authors":"Fan Bailin, Ren Haixiao, Deng Zhangshen, Chen Jianhua","doi":"10.1109/ICISCAE51034.2020.9236842","DOIUrl":"https://doi.org/10.1109/ICISCAE51034.2020.9236842","url":null,"abstract":"Aiming at the path planning problem of smart cars in complex environments, a hybrid algorithm was proposed for path planning. In the hybrid algorithm, the A * algorithm was combined with the artificial potential field method. The hybrid algorithm fully absorbed the advantages of the two algorithms and made up for the shortcomings of their respective algorithms. The existing problems of traditional A * algorithm and artificial potential field method were improved respectively. Then, the two improved algorithms were merged. And the shortest path was obtained by using A * algorithm. The improved artificial potential field method could effectively avoid various obstacles on the road. The hybrid algorithm appearing above made up for the shortcomings that the A * algorithm couldn't be applied to dynamic environments, and the artificial potential field method couldn't plan the shortest path. The effectiveness of the improved algorithm and hybrid algorithm was verified by MATLAB software.","PeriodicalId":355473,"journal":{"name":"2020 IEEE 3rd International Conference on Information Systems and Computer Aided Education (ICISCAE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131266798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Application of Computer Vision Assist Technology in High-precision UAV Navigation and Positioning","authors":"Yu Cao, Hongyu Liang, Yujie Fang, Wenliang Peng","doi":"10.1109/ICISCAE51034.2020.9236821","DOIUrl":"https://doi.org/10.1109/ICISCAE51034.2020.9236821","url":null,"abstract":"Traditional UAV human-computer interaction requires specialized equipment and professional training. Convenient and novel interaction methods are often more popular. Using ordinary cameras, the UAV gesture control system based on computer vision and deep learning is studied. Under this background, the paper proposes a new method for the navigation information extraction of UAV autonomous landing terminal based on monocular vision / INS integrated navigation; it only needs to detect two feature points on the runway and then combine the attitude of the inertial navigation system Angle information, you can directly calculate the position vector of the aircraft relative to the airport; because the straight line has obvious observability, for the feature points that are difficult to extract, you can detect the two runway edge lines and a landing threshold line, and then take the intersection of the threshold line and the edge of the runway is used as the feature point; the algorithm is deduced in detail based on the geometric principle of imaging. Finally, the landing experiment shows that the extraction and conversion of the method is feasible.","PeriodicalId":355473,"journal":{"name":"2020 IEEE 3rd International Conference on Information Systems and Computer Aided Education (ICISCAE)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130634304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Computer Aided Fracture Diagnosis Based on Integrated Learning","authors":"Feng Yang, Bo Ding","doi":"10.1109/ICISCAE51034.2020.9236917","DOIUrl":"https://doi.org/10.1109/ICISCAE51034.2020.9236917","url":null,"abstract":"Fracture refers to the complete or partial rupture of bone structure, which requires accurate diagnosis by orthopedic surgeons and treatment methods. Therefore, it is of great significance to study automatic fracture detection. In this paper, in order to solve the problem of low accuracy of fracture image determination caused by incomplete feature extraction of traditional features, a deep learning method is used to build a convolutional neural network model framework, and a fracture image detection method based on deep features and integrated learning is proposed. Using data enhancement to preprocess the MURA image data set, when extracting image features, Alexnet is used as a feature extractor to obtain sufficiently effective image features, and when training the classifier, the idea of integrated learning in machine learning is adopted. Train the classifiers after feature extraction, and give them different weight values according to the contribution of each classifier, to achieve better performance than a single classifier, and improve the accuracy of image classification. The experimental results of this method on the MURA data set show its good classification performance.","PeriodicalId":355473,"journal":{"name":"2020 IEEE 3rd International Conference on Information Systems and Computer Aided Education (ICISCAE)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130660274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Implementation of Prototype System based on Countermeasures","authors":"Fangyun Li, Zheng Zhang, Jiang Wang, Yufeng Zhao","doi":"10.1109/ICISCAE51034.2020.9236813","DOIUrl":"https://doi.org/10.1109/ICISCAE51034.2020.9236813","url":null,"abstract":"Traditional security systems can defend against various network attacks through firewall, intrusion detection and other technologies, but it cannot pose a threat to attackers. Aiming at the problem, the paper proposes a new security system, which can sense attack and source information by MTD (moving the target defense) technology, and use the counter technology to strike the attacker in reverse, resulting in the attacker's failure. The experimental results show that the prototype system can effectively cause the attacker to cut off the network or crash by using special countermeasures.","PeriodicalId":355473,"journal":{"name":"2020 IEEE 3rd International Conference on Information Systems and Computer Aided Education (ICISCAE)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128078967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Microservice Application Testing System","authors":"Hongwei Li, Junsheng Wang, Hua Dai, Bang Lv","doi":"10.1109/ICISCAE51034.2020.9236829","DOIUrl":"https://doi.org/10.1109/ICISCAE51034.2020.9236829","url":null,"abstract":"In response to the development plan of national informatization construction, The State Grid Corporation of China attaches great importance to the development of information technology and pioneers the successful application of a new information technology generation in the power grid business. The development of the core components of “State Grid Cloud” and site deployment are also the company's focus. Microservices, as a key technology for deployment in the cloud, because of its independent development, independent deployment, independent release, decentralized management, and support for high concurrency and feature to support the rich technology stack, have been applied to cloud service construction by The State Grid. However, in the process of wide application of microservice applications, the entire microservice system hasn't been perfected, and the research of the corresponding test scheme is still in its infancy. This paper compares the difference between microservice and traditional service, and puts forward a set of microservice application testing system based on the current microservice development and software testing technology. This testing system divides the microservice test into six stages, unifies the test tools of each stage and explains the test methods. In addition, it also explains the automation strategy of the microservice test. It is of great significance to perfect the microservice testing system of The State Grid Corporation.","PeriodicalId":355473,"journal":{"name":"2020 IEEE 3rd International Conference on Information Systems and Computer Aided Education (ICISCAE)","volume":"354 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126687828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Boundary Extraction and Hole Restoration Method of Point Cloud Data of 3D Laser Scanner for Mine","authors":"Chen Kai, Zhan Kai, Zhang Da, Zhang Chi","doi":"10.1109/ICISCAE51034.2020.9236856","DOIUrl":"https://doi.org/10.1109/ICISCAE51034.2020.9236856","url":null,"abstract":"The 3d laser scanner for mine can obtain 3d point cloud data of many areas, such as cavity, ore pass and so on, which provides the data basis for the digital mine. However, the point cloud data often exist holes and other problems, which lead to the unreality of the 3d model. In order to solve this problem, this paper proposes a method to extract boundary of point cloud data and repair the hole of point cloud data. The point cloud boundary is extracted by fitting the least square plane of point cloud data, computing the plane normal vector, and analyzing the point cloud characteristics. Then the hole is repaired according to the formation principle of point cloud and combining with the extracted point cloud boundary. In order to verify the hole boundary extraction and restoration method of point cloud data proposed in this paper, the point cloud data of cavity obtained in the mine are used for experiment. The experimental results show that this method can quickly extract the cavity point cloud boundary and repair obvious holes, achieving the expected effect.","PeriodicalId":355473,"journal":{"name":"2020 IEEE 3rd International Conference on Information Systems and Computer Aided Education (ICISCAE)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126754270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}