Proceedings of the 7th International Conference on Cyber Security and Information Engineering最新文献

筛选
英文 中文
Research on Self-healing Control Function of Smart Distribution Network based on Security Domain 基于安全域的智能配电网自愈控制功能研究
Jia-le Lu, Ruifeng Zhao, Hai-cheng Liu, Haobin Li, Jin Li, Kaiyan Pan, Hongrui Zhao
{"title":"Research on Self-healing Control Function of Smart Distribution Network based on Security Domain","authors":"Jia-le Lu, Ruifeng Zhao, Hai-cheng Liu, Haobin Li, Jin Li, Kaiyan Pan, Hongrui Zhao","doi":"10.1145/3558819.3565465","DOIUrl":"https://doi.org/10.1145/3558819.3565465","url":null,"abstract":"Distribution network is an urban infrastructure, which is of great significance to the safety of urban power supply. Self-healing control is an effective means to solve the safe operation of distribution network and has become a hot research topic in the field of distribution. Combining DSSR and TSC theory with self-healing control system, this paper proposes a safe and efficient operation mode of distribution network based on security domain. The self-healing control system based on security domain is presented, the preventive control, predictive control and optimization control based on DSSR and TSC are proposed, and these functions are demonstrated by an example of a real distribution network. Self-healing control emphasizes initiative, and the safety domain theory gives the direction and measurement of load control. Preventive control or predictive control is adopted to ensure the operation of the power grid in the safety domain, so as to ensure the safety and reliability of power supply can be improved greatly.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122774007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Graph Neural Networks for Text Classification Task 用于文本分类任务的深度图神经网络
Yunhao Si, Yong Zhou
{"title":"Deep Graph Neural Networks for Text Classification Task","authors":"Yunhao Si, Yong Zhou","doi":"10.1145/3558819.3565091","DOIUrl":"https://doi.org/10.1145/3558819.3565091","url":null,"abstract":"Text classification is to organizing documents into predetermined categories, usually by machinery learn algorithms. It is a significant ways to organize and utilize the large amount of information that exists in unstructured text format. Text classification is an important module in text processing, and its applications are also very extensive, such as garbage filtering, news classification, part-of-speech tagging, and so on. With the continuous development of deep learning in recent years! Its applications are also very extensive, such as: garbage filtering, news classification, part-of-speech tagging, and so on. But the text also has its own characteristics. According to the characteristics of the text, the general process of text classification is: 1. Preprocessing; 2. Text representation and feature selection; 3. Construction of a classifier; 4. The task of text classification refers to classifying texts into only single or many types in TC system. Some researchers are beginning to apply deep neural networks to tasks such as the text classification we mentioned above. Although the research around the task has made great progress, the review of this task is very scarce, and there is a lack of a comprehensive review of the development of the task in recent years. Therefore, we present a survey of research in text classification to create taxonomies. Finally, it is by giving vital effects, the direction of future research, and those challenges that may counter in the research field.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116541678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Neural Network Algorithm for Road Crack Detection 道路裂纹检测的神经网络算法研究
Yuxiang Liu, Wei She, Shuai Tan
{"title":"Research on Neural Network Algorithm for Road Crack Detection","authors":"Yuxiang Liu, Wei She, Shuai Tan","doi":"10.1145/3558819.3565220","DOIUrl":"https://doi.org/10.1145/3558819.3565220","url":null,"abstract":"Aiming at the problem of road crack detection, experiments based on CFD data set and Unet model were carried out. The overall structure of the network and the contribution of each module to the final detection effect of Unet model were analyzed. Some modules in Unet model were cut and replaced based on that, and CCUnet model was obtained. Final experiment results show that detection rate of CCUnet model is greatly improved under the condition that model accuracy is maintained basically, and that has practical application value.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130343454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of Video Advertisement Classification System under the Background of New Media 新媒体背景下视频广告分类系统设计
Xiuping Han
{"title":"Design of Video Advertisement Classification System under the Background of New Media","authors":"Xiuping Han","doi":"10.1145/3558819.3558838","DOIUrl":"https://doi.org/10.1145/3558819.3558838","url":null,"abstract":"In order to obtain ideal mass video advertisement retrieval results, a video advertisement classification system under the background of new media is proposed. According to the feedback of the basic layer, the logic analysis and processing layer segments the original video advertisement sequence, uses multi tributary network to encode the intermediate frame sequence, extracts the useful information in the video advertisement, introduce the spatial attention prediction model to each tributary of the multi tributary network, integrates the attention spectrum the feature spectrum extracted from each tributary network. The total connection layer obtains the classification score of video advertisement, and linearly superimposes it to obtain the type estimation result of the overall video advertisement, and feeds tack the result to the user. The results show that the system can achieve video advertising classification, classification accuracy is high, and the overall performance of the system is superior. CCS CONCEPTS • Information systems∼Information retrieval∼Users and interactive retrieval","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134205259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on laser welding pressure control system based on MAC-IBA 基于MAC-IBA的激光焊接压力控制系统研究
Keliang Zhou, Qing Qin, Doudou Lu
{"title":"Research on laser welding pressure control system based on MAC-IBA","authors":"Keliang Zhou, Qing Qin, Doudou Lu","doi":"10.1145/3558819.3565153","DOIUrl":"https://doi.org/10.1145/3558819.3565153","url":null,"abstract":"With the development of intelligent manufacturing in China, laser welding technology has entered the field of plastic welding from the initial welding in the metal field. At this stage, the domestic plastic welding technology is developing, and the requirements for the welding accuracy of the plastic shell of the reversing camera have also increased. Aiming at the problems of large inertia and hysteresis in the pressure part, this paper proposes an improved bat prediction algorithm to solve the pressure control accuracy. The optimal pressure control effect is obtained by introducing the improved bat algorithm combined with the MAC prediction algorithm to optimize the PID parameters. Combined with the experimental simulation results, it is shown that compared with the bat algorithm and the traditional PID algorithm, the improved bat prediction algorithm has better dynamic performance in pressure control, and the control pressure accuracy is high. At the same time, the disturbance test experiment is also added, and the algorithm shows strong robustness. The pressure part is better controlled, so that the welding accuracy of the reversing camera housing can be improved.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132759581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
5G message access platform based on load balancing 基于负载均衡的5G报文接入平台
Ying Tong, Xiangli Jia, Baolin Liang, Jianqiang Feng
{"title":"5G message access platform based on load balancing","authors":"Ying Tong, Xiangli Jia, Baolin Liang, Jianqiang Feng","doi":"10.1145/3558819.3565135","DOIUrl":"https://doi.org/10.1145/3558819.3565135","url":null,"abstract":"5G message access platform mainly uses SIP technology. In actual production, Single SIP services cannot meet the requirements of hundreds of millions of users. Therefore, SIP services must provide load balancing capabilities. Adding a load balancer in front of multiple SIP service entry proxies is a common approach, but traffic balancing within a service is also an issue that needs to be addressed. Considering the business requirements and the internal structure of the system, this paper designs a high-availability solution, including the selection of load balancing at the entrance and the load distribution method within the network element. This paper first analyzes the characteristics of the current popular load balancer and then adjusts and selects the most suitable one for professional configuration according to business requirements. In addition, to meet SIP protocol requirements, specific load distribution methods are configured between NE. Finally, experiments verify that service traffic can be evenly distributed to different NE.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132996479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research and design of a new personalized recommendation system for wooden artifacts based on collaborative filtering 基于协同过滤的木质文物个性化推荐系统的研究与设计
B. Li
{"title":"Research and design of a new personalized recommendation system for wooden artifacts based on collaborative filtering","authors":"B. Li","doi":"10.1145/3558819.3565105","DOIUrl":"https://doi.org/10.1145/3558819.3565105","url":null,"abstract":"With the rapid development of mobile Internet technology and the gradual expansion of the public's consumption and aesthetic demand for new wooden playthings, the offline sales channels of wooden playthings manufacturers have been difficult to meet the users' demand, and with the rapid development of Internet information technology and e-commerce, human beings have gradually stepped into the era of information overload. The system can use the user's collaborative filtering recommendation algorithm to recommend the highest similarity of the user's goods to the user, effectively solving the user's difficulty in finding quality goods resources from many goods information, improving the user's shopping experience, expanding the sales channels of enterprises, while the scheme designed in this paper lays the theoretical foundation for the development of other personalized recommendation systems The solution designed in this paper also lays the theoretical foundation for the development of other personalized recommendation systems.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131007621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cruise Terminal Emergency Evacuation Decision Path Planning on Account of Ant Colony Algorithm 基于蚁群算法的邮轮码头应急疏散决策路径规划
Di Cui
{"title":"Cruise Terminal Emergency Evacuation Decision Path Planning on Account of Ant Colony Algorithm","authors":"Di Cui","doi":"10.1145/3558819.3563736","DOIUrl":"https://doi.org/10.1145/3558819.3563736","url":null,"abstract":"In case of emergency, the evacuation of tourists must be improved, and the design of cruise ship should be more efficient in spatial layout, which needs to be designed on the spatial topology model and the emergency evacuation model of tourists. In this paper, FDS _ EVAC software is used to build the emergency evacuation decision-making path planning model of the cruise terminal, and then the data analysis of other factors in the algorithm model is carried out. The built-in plug-in Python is used for data analysis. The code involved in the cruise terminal automatically plans the optimal path through multiple logic 1,2,3... N, select the most appropriate and optimal path according to the actual situation of the cruise terminal, such as path N. The algorithm model adopted this time is C language, using C language to realize the whole process of the algorithm code. This paper studies the emergency evacuation decision-making path planning of cruise terminal based on ant colony algorithm, and explains the relevant content and working principle of emergency evacuation decision-making path planning of cruise terminal. The test results show that the ant colony algorithm-based emergency evacuation decision-making path planning of cruise terminals has a more efficient performance in emergency evacuation decision-making path planning of cruise terminals.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131204347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Verifying Zookeeper based on Model-Based runtime Trace-Checking using TLA+ 使用TLA+验证基于模型的运行时跟踪检查的Zookeeper
Zhi Niu, Luming Dong, Yong Zhu, Li Chen
{"title":"Verifying Zookeeper based on Model-Based runtime Trace-Checking using TLA+","authors":"Zhi Niu, Luming Dong, Yong Zhu, Li Chen","doi":"10.1145/3558819.3558822","DOIUrl":"https://doi.org/10.1145/3558819.3558822","url":null,"abstract":"Zookeeper atomic broadcast (Zab) is a atomic broadcast protocol specially designed for the distributed coordination service Zookeeper to support rout recovery. It is widely used in such scenarios as cluster management, load balancing and data publish and subscription. It is the core algorithm for ensuring Zookeeper data consistency. In this article, we design a Model-Based runtime Tracechecking system based on formal specification language TLA+ and its model checking tool TLC and use it to perform online verification against the behaviors of distributed Zookeeper cluster according to trace, which aims to monitor and check whether the actual execution of Zookeeper cluster complies with the Zab protocol specification. Firstly, stubs are added to relevant Zookeeper code modules which are synchronized with the implementation of Zab protocol state transitions to guarantee specific trace info generation and output to the target log file. Secondly, a formal model is built with TLA+ which can analyzes and specifies the state sequences info of Zookeeper cluster provided by trace, and the correctness and safety properties for this specification are also defined according to Zab protocol. A series of operators were also developed for TLC to load the trace info in history with different formats from the log files for model checking. The final experiment shows that this checking system can provide light-weighted and feasible formal method for verifying actual execution behaviors of distributed systems.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132001700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Protocol Optimization of Wireless Ad Hoc Network for Smart Container 智能容器无线自组网协议优化研究
Shibo Xu, Jing Wang, Shuhui Zhang
{"title":"Research on Protocol Optimization of Wireless Ad Hoc Network for Smart Container","authors":"Shibo Xu, Jing Wang, Shuhui Zhang","doi":"10.1145/3558819.3558832","DOIUrl":"https://doi.org/10.1145/3558819.3558832","url":null,"abstract":"Smart container transportation has gradually become the development trend of modern container transportation. A variety of wireless communication technologies have be used in smart containers, and wireless Ad Hoc network technology is widely recognized as future mainstream technology for data transmission of smart container. Aiming at the shortcomings of the existing AD HOC network protocol, this paper will design a new E-ZBR routing protocol algorithm based on the original ZBR routing protocol to improve the energy saving and stability of communication. Then the simulation experiment is carried out by QualNet software, and the two algorithms are compared and analyzed from many aspects. The simulation results show that the efficiency of the E-ZBR routing protocol is significantly higher than the traditional ZBR. As the number of nodes increases, the advantages of this algorithm in energy saving will be more obvious. The research results have been applied to practice and proved to have high application value. CCS CONCEPTS •Networks• Network algorithms• Data path algorithms","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132494536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信