{"title":"Computer Assisted Consumer Behavior Modeling through Big Data and Internet Technology","authors":"Shunfeng Guan, Chen Zhao","doi":"10.1109/TOCS53301.2021.9689041","DOIUrl":"https://doi.org/10.1109/TOCS53301.2021.9689041","url":null,"abstract":"With the internet technology upgrades and the coverage of the network increases, artworks consumption on the internet has become a common activity. On the big data era, the research of consumer behavior in artworks is of great significance to the sound development of art in the market online. Therefore, this paper uses the method of combining theoretical analysis and empirical research, based on the Kotler’s study of consumption behavior, discusses the characteristics of consumer behavior in artworks under the situation of big data.","PeriodicalId":360004,"journal":{"name":"2021 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117109958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Node Anomaly Detection Method in Smart Grid by Beta Distribution Theory","authors":"Wang Wenlong, Liang Jianquan","doi":"10.1109/TOCS53301.2021.9688614","DOIUrl":"https://doi.org/10.1109/TOCS53301.2021.9688614","url":null,"abstract":"As the extensive use of the wireless sensor networks in Advanced Metering Infrastructure (AMI) of Smart Grid, the network security of AMI becomes more important. Thus, an optimization of trust management mechanism of Beta distribution theory is put forward in this article. First of all, a self-adaption method of trust features sampling is proposed, that adjusts acquisition frequency according to fluctuation of trust attribute collected, which makes the consumption of network resource minimum under the precondition of ensuring accuracy of trust value; Then, the collected trust attribute is judged based on the Mahalanobis distance; Finally, calculate the nodes’ trust value by the optimization of the Beta distribution theory. As the simulation shows, the trust management scheme proposed is suited to WSNs in AMI, and able to reflect the trust value of nodes in a variety of circumstances change better.","PeriodicalId":360004,"journal":{"name":"2021 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121052675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Implementation of Financial System of Supply Chain Based on Blockchain","authors":"R. Wang","doi":"10.1109/TOCS53301.2021.9688704","DOIUrl":"https://doi.org/10.1109/TOCS53301.2021.9688704","url":null,"abstract":"The rapid development of the information age has greatly changed people’s lives, greatly changed people’s lifestyles, and effectively promoted the improvement of people’s quality of life and the convenience of people’s life and work. The financing of small and medium-sized enterprises has been significantly improved by the continuous development of supply chain finance, and as an important supplement to the traditional financial industry, supply chain finance has also played a very positive role in the healthy development of the industry. Supply chain finance provides an opportunity for small and medium-sized enterprises to raise funds, but the maximization of each participant’s own interests in business operation makes the supply chain financing service stagnate. By analyzing the development status of supply chain finance and “blockchain+supply chain finance” system, this paper optimizes the design of supply chain finance system based on blockchain technology, so as to make full use of the characteristics of blockchain technology, ensure the authenticity and sharing of transactions and data, expand the service targets of supply chain finance and achieve full coverage of supply chain.","PeriodicalId":360004,"journal":{"name":"2021 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124709273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure Data Sharing Algorithm for Privacy Protection of Industrial Internet","authors":"Jingyuan Li, Dong-Hua Yang, Ke Zhang","doi":"10.1109/TOCS53301.2021.9688774","DOIUrl":"https://doi.org/10.1109/TOCS53301.2021.9688774","url":null,"abstract":"With the integration of artificial intelligence, 5g and cloud computing technologies, the development direction of industrial Internet tends to be more intelligent and digital. The privacy protection and security sharing methods of equipment production data are very important. In the face of a large number of sensitive industrial control data uploaded to the cloud, there are great security risks using the traditional plaintext or symmetric encryption transmission methods. This paper proposes a privacy protection and safe and efficient data sharing algorithm for the industrial Internet. The fog computing layer is introduced between the sensing layer and the cloud of the industrial Internet to perform some intensive computing, such as aggregation and processing of collected data Re-encryption and decryption, mutual authentication and trust relationship are established between the sensing layer devices. Only the devices in the authorization list can access the shared data, which achieve confidentiality and security of end-to-end data sharing. The fog computing layer uploads the data to the cloud after storing and computing, reduces the computing and communication overhead, and reduces the trust and dependence on the cloud platform. The algorithm can solve the semi trusted problem of cloud centralized database and realize the secure sharing of data. The experimental results show that the algorithm has less communication and computing overhead, can effectively reduce the transmission delay and improve the efficiency.","PeriodicalId":360004,"journal":{"name":"2021 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125366805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kai Wang, Yiqing Zhao, Qiliang Qian, Zhijun Zhao, Ruonan Wang
{"title":"5G+AR Substation Operation and Maintenance Technology","authors":"Kai Wang, Yiqing Zhao, Qiliang Qian, Zhijun Zhao, Ruonan Wang","doi":"10.1109/TOCS53301.2021.9688627","DOIUrl":"https://doi.org/10.1109/TOCS53301.2021.9688627","url":null,"abstract":"In order to continuously meet the ever-increasing demand for electricity, the construction of power grids is developing rapidly, and the operation mode is becoming more and more complicated. This research mainly discusses the application of 5G+AR substation operation and maintenance technology. This research deploys wireless heterogeneous networking based on the 5G communication system architecture to achieve effective use of resources. In view of the long delays that may occur in the three-dimensional registration process of augmented reality technology and the prone to error registration results, as well as the safety and real-time requirements of substation operations, a three-dimensional registration method based on ORB-Tanimoto is proposed, which uses ORB identification and The three-dimensional registration method of matching features, and then combine it with the Tanimoto similarity algorithm to further improve the matching accuracy. The density of emergency defects dropped from 2.38 orders/month to 1.82 orders/month, a drop of 23.53%. This research will improve the safety of substation operations.","PeriodicalId":360004,"journal":{"name":"2021 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114929016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wu Qian, Cai Chenglin, Zhang Zhiqiang, Duan Changfeng, Jia Wei, Li Wei
{"title":"Kinematic to kinematic positioning method based on sliding-window epoch-difference","authors":"Wu Qian, Cai Chenglin, Zhang Zhiqiang, Duan Changfeng, Jia Wei, Li Wei","doi":"10.1109/TOCS53301.2021.9688586","DOIUrl":"https://doi.org/10.1109/TOCS53301.2021.9688586","url":null,"abstract":"At present dynamic to dynamic positioning is widely used, such as the formation of UAV, navigation of the ship, etc. Differential positioning can effectively improve the positioning accuracy, but there is no base station laid in many positioning scenes. It is necessary to solve the problem that there is no base station in some scenes to improve the precision of dynamic positioning by using difference. In this paper, the method of sliding-window epoch-difference is used to improve the positioning accuracy of the static receiver, then the static receiver acting as a temporary base station. Using the temporary base station to differential positioning, the accuracy of dynamic positioning will be improved validly. To prove this method is feasible, static and dynamic experiments using GNSS data were carried out. The results show that the use of the sliding-window epoch-difference can effectively improve the positioning precision of the static receiver, build a temporary base station for differential positioning, dynamic receiver positioning accuracy is improved, and tracking trajectory is smoother.","PeriodicalId":360004,"journal":{"name":"2021 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)","volume":"515 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115346383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Realization of Distributed Control System of Intelligent Music Fountain","authors":"Ling Xie, Zhaofeng Guo, Hongying Liu, Jun Zhu","doi":"10.1109/TOCS53301.2021.9688714","DOIUrl":"https://doi.org/10.1109/TOCS53301.2021.9688714","url":null,"abstract":"As an important landscape in cities and scenic spots, music fountains are becoming more and more popular and concerned by people. In light of the problems of the traditional fountain manifested by un-centralized operation and management, non-uniformed communication protocol, long period of project implementation and lack of intelligent assistance means, this paper proposes a new and reliable intelligent music fountain distributed control system. This paper elaborates the system composition, working principle, and special software of the music fountain, and explains the hardware structure and software architecture of the entire system. It also emphatically explains the key technologies such as centralized motor compilation and communication protocol, music feature extraction and intelligent assistance arrangement, and comprehensive preview of particle effects. The system introduced in this paper has good real-time performance and high degree of program integration, and it is easy to be expanded. The system has been actually deployed and used in many projects and achieved good economic and social benefits which demonstrated its good promotion value.","PeriodicalId":360004,"journal":{"name":"2021 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116749690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Service Monitoring System of Intelligent Connected Vehicle Based on Cloud Platform","authors":"Yanguang Wang, Yuan Zhao","doi":"10.1109/TOCS53301.2021.9688681","DOIUrl":"https://doi.org/10.1109/TOCS53301.2021.9688681","url":null,"abstract":"This article uses cloud computing technology and service-oriented software architecture ideas, considering service differentiation, security mechanisms, etc., to complete the architecture design, functional structure design, and software design of the cloud computing-based car networking information service platform. The system can integrate the existing body control unit, realize the full sharing of vehicle dynamic information, and the application scheme is simple and flexible. At the same time, the system solves the problem of automobile big data transmission.","PeriodicalId":360004,"journal":{"name":"2021 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117099700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Placement of Digital Shortwave Service Quality Test Receiver and Measurement Extrapolation Method","authors":"Zhou Jian, L. Shanshan","doi":"10.1109/TOCS53301.2021.9688880","DOIUrl":"https://doi.org/10.1109/TOCS53301.2021.9688880","url":null,"abstract":"Digital shortwave wireless broadcasting networks such as Digital Radio Mondiale(DRM) can improve the quality of services provided to consumers and listeners through Quality of Service (QoS) detection systems. It is necessary to distribute the test receivers within the broadcast coverage area. The main issue discussed in this article is the number and distribution of test receivers and the measurement method.","PeriodicalId":360004,"journal":{"name":"2021 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128532225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Calculation and Analysis of Ship Dock Block Layout and Key Points of Inspection based on Computer Simulation","authors":"L. Han, Guoliang Sun, Hongwen Zuo","doi":"10.1109/TOCS53301.2021.9688737","DOIUrl":"https://doi.org/10.1109/TOCS53301.2021.9688737","url":null,"abstract":"Ship docking maintenance is an important link to ensure the integrity of underwater equipment. Full consideration should be given to the layout of dock block before docking, which is related to the structural safety and overall stability of the ship. Accuracy of dock block layout is an important guarantee for docking and working safety of a ship. According to the type, the dock blocks can be divided into single dock, double dock and triple dock. Dock block type selection and lay out position shall be in accordance with ship line. The dock block layout scheme can be firstly calculated by computer technology for the weight distribution of the structure of the whole ship. Then the finite element analysis is carried out and the layout scheme is proposed based on the previous experience. The key parts and specific parts are mainly calculated and analyzed, and the locating datum, spacing, dock line and dock type are detailed analyzed to continuously optimize the dock block layout scheme. Combined with the practical experience of engineering, this paper describes the key inspection items of ship dock block layout, including dock block layout drawing, dock block layout and sitting block. The suitable layouts of various types of dock blocks are calculated and analyzed, and the calculation results and key points of inspection are analyzed in detail. This is of guiding significance to the work of shipping in and out of the dock.","PeriodicalId":360004,"journal":{"name":"2021 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128759990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}