2020 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)最新文献

筛选
英文 中文
Research on Network Access Control in the Open Internet of Things Environment 开放物联网环境下的网络访问控制研究
2020 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS) Pub Date : 2020-12-11 DOI: 10.1109/TOCS50858.2020.9339621
Peng Zhai, Jingsha He, Nafei Zhu
{"title":"Research on Network Access Control in the Open Internet of Things Environment","authors":"Peng Zhai, Jingsha He, Nafei Zhu","doi":"10.1109/TOCS50858.2020.9339621","DOIUrl":"https://doi.org/10.1109/TOCS50858.2020.9339621","url":null,"abstract":"With the continuous deepening of social informatization, the Internet of Things (IoT) devices are used in large quantities. Traditional centralized access control cannot meet the network access control requirements of large-scale IoT environments. Access control is one of the importation technology of information security. This paper establishes the dynamic game access control model which encourages interactive entities to rationally choose strategies expected by the system driven by its own benefits through the designed mechanism. Taking benefits as the driven force, the mechanism rewards the honest nodes and punishes and restrains the non-honest nodes, and then reaches the general state of equalization between entities which meets the goal. Finally, experiments prove that this method is effective in the open Internet of Things, which can greatly enhance the security of data access between IoT sensors, and can effectively protect the privacy of network entity data.","PeriodicalId":373862,"journal":{"name":"2020 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129484818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Segmentation of intracerebral hemorrhage based on improved U-Net 基于改进U-Net的脑出血分割
2020 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS) Pub Date : 2020-12-11 DOI: 10.1109/TOCS50858.2020.9339707
Guogang Cao, Yijie Wang, Xinyu Zhu, Mengxue Li, Xiaoyan Wang, Ying Chen
{"title":"Segmentation of intracerebral hemorrhage based on improved U-Net","authors":"Guogang Cao, Yijie Wang, Xinyu Zhu, Mengxue Li, Xiaoyan Wang, Ying Chen","doi":"10.1109/TOCS50858.2020.9339707","DOIUrl":"https://doi.org/10.1109/TOCS50858.2020.9339707","url":null,"abstract":"Automatic medical image segmentation helps to diagnose and treat stroke timely. In this paper, it is proposing an improved U-Net neural network for the auxiliary diagnosis of intracerebral hemorrhage, which realizes the automatic segmentation of the hemorrhage on CT images. First, clustering the pixels of brain CT images into four categories: white matter, gray matter, cerebrospinal fluid, and hemorrhage by fuzzy C-means clustering method, then removing the skull by morphological image method, and finally proposing an improved U-Net neural network model to segment hemorrhage automatically. Experiments show that the dice similarity coefficient reaches 0.860 ± 0.031, which is better than the other methods. It dramatically improves the accuracy of segmentation for intracerebral hemorrhage.","PeriodicalId":373862,"journal":{"name":"2020 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129517316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Study on Software Defect Prediction Model Based on Improved BP Algorithm 基于改进BP算法的软件缺陷预测模型研究
2020 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS) Pub Date : 2020-12-11 DOI: 10.1109/TOCS50858.2020.9339718
Cundong Tang, Li Chen, Zhiping Wang, Y. Sima
{"title":"Study on Software Defect Prediction Model Based on Improved BP Algorithm","authors":"Cundong Tang, Li Chen, Zhiping Wang, Y. Sima","doi":"10.1109/TOCS50858.2020.9339718","DOIUrl":"https://doi.org/10.1109/TOCS50858.2020.9339718","url":null,"abstract":"Software defect is an important indicator to evaluate software product quality. To reduce the defects of software products and to improve the quality of software is always the goal of software development. This paper combines the simulated annealing (SA) algorithm and JCUDA technology to improve the BP algorithm, to build an improved software defect prediction model with higher prediction accuracy. The experimental results show that the software defect prediction model based on improved BP algorithm is able to accurately predict the software defects, which is better than the traditional BP algorithm.","PeriodicalId":373862,"journal":{"name":"2020 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129848693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Online Monitoring System of Cable Based on Microchip 51 基于单片机51的电缆在线监测系统
2020 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS) Pub Date : 2020-12-11 DOI: 10.1109/TOCS50858.2020.9339611
Y. Lv, Zheng Sui, Linjuan Li
{"title":"Online Monitoring System of Cable Based on Microchip 51","authors":"Y. Lv, Zheng Sui, Linjuan Li","doi":"10.1109/TOCS50858.2020.9339611","DOIUrl":"https://doi.org/10.1109/TOCS50858.2020.9339611","url":null,"abstract":"As an industry-specific dedicated communication network, electric power communication is gradually formed and developed with the development of power systems. It is mainly used to alleviate the lack of communication capabilities caused by the slow development of the public network and to fill the public network's inability to meet the special communications of some power departments. The contradiction of demand to ensure the normal and efficient operation of specialized electric power production. Nowadays, power communication security technology is becoming more and more important, and detecting the disconnection of communication cables is the main means to ensure smooth communication. This paper proposes a distributed monitoring system to detect the disconnection of communication cables. MSP430F149 and FPGA are used to form a high-speed variable sampling rate system to detect obstacles in communication cables. DTMF dial chip MT8888 and embedded modem chip MSM7512 are used to realize remote alarm and data exchange functions. The whole system is easy to control, flexible, and expandable. The experimental results show that this article has solved the problem of online monitoring of communication cables. The sustained and rapid growth of China's economy has provided a huge market space for the development of communication cable security technology. The strong temptation of the Chinese market has made the world focus on the Chinese market. The huge production capacity formed by China's cable security technology let the world admire. With the continuous expansion of China's power industry, data communication industry, urban rail transit industry, automobile industry, shipbuilding and other industries, the demand for wires and cables will also grow rapidly. In the future, there is still huge development potential for wire and cable protection.","PeriodicalId":373862,"journal":{"name":"2020 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)","volume":"02 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129883263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Application of Virtual Firewall in Computer Network Security 虚拟防火墙在计算机网络安全中的应用
2020 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS) Pub Date : 2020-12-11 DOI: 10.1109/TOCS50858.2020.9339693
Fei Xia, Jian Hu
{"title":"Application of Virtual Firewall in Computer Network Security","authors":"Fei Xia, Jian Hu","doi":"10.1109/TOCS50858.2020.9339693","DOIUrl":"https://doi.org/10.1109/TOCS50858.2020.9339693","url":null,"abstract":"In order to achieve the purpose of integrating VFW flexibly and improving its efficiency, application of virtual firewall (VFW) in computer network security has been explored. OpenStack-based cloud platform VFW system is analyzed with functional requirements and non-functional requirements, and the functional modules of the VFW are divided. Then, the design of VFW system architecture, application layer and functional modules is carried out. Based on the development of OpenStack cloud platform, the realization process of each functional module is elaborated, and finally, a novel queuing model is used to test the efficiency of the VFW system and the test results are analyzed. The theoretical packet loss rate of VFW system is higher than that of simulation experiment, and the error is larger when the number of VFW deployment is small. The average error between the theoretical and simulation results is 6%, and the final error after adjusting the algorithm is 4%. The optimal deployment scheme obtained by simulation experiment is highly consistent with the theoretical results. The model can successfully simulate the deployment of VFW and quickly get the optimal deployment scheme.","PeriodicalId":373862,"journal":{"name":"2020 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127379204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Informatization Planning and Control Design of Power Grid Enterprises Based on Enterprise Architecture 基于企业架构的电网企业信息化规划与控制设计研究
2020 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS) Pub Date : 2020-12-11 DOI: 10.1109/TOCS50858.2020.9339754
Han Xuemin, Zheng Gaofeng, Qin Dandan, Chen Qingping, Liu Pengxi, Xu Zhong-ping
{"title":"Research on Informatization Planning and Control Design of Power Grid Enterprises Based on Enterprise Architecture","authors":"Han Xuemin, Zheng Gaofeng, Qin Dandan, Chen Qingping, Liu Pengxi, Xu Zhong-ping","doi":"10.1109/TOCS50858.2020.9339754","DOIUrl":"https://doi.org/10.1109/TOCS50858.2020.9339754","url":null,"abstract":"Enterprise Architecture is the core link that connects corporate strategy and specific solutions. It comprehensively interprets corporate strategy and business needs to form the status, needs and blueprints of enterprise informatization construction. It also adopts quantitative and controllable management methods to ensure the realization of future development goals. Since the rapid development of science and technology, information technology has already been integrated into every aspect of our lives. Informationization has become one of the important characteristics of modern society. The degree of enterprise informationization is gradually deepening. Following the information architecture of State Grid Corporation, using TOGAF method combined with Anhui Electric Power Company's business goals and strategies to do research and diagnose the current situation of Anhui Electric Power Company's business architecture, data architecture, application architecture, and technical architecture. In addition to strictly complying with the unified promotion system of the State Grid Corporation structure, carry out the informatization architecture differentiated design of the independent construction system; propose the direction for future informatization architecture improvement; initially decompose the company's strategic goals into specific information construction; clarify the blueprint of the architectural goals and future evolution routes; implement and control them in stages to ensure the realization of company's strategic goals.","PeriodicalId":373862,"journal":{"name":"2020 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125591218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Digital alarm system for dormitory in post-epidemic era 后疫情时代宿舍数字报警系统
2020 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS) Pub Date : 2020-12-11 DOI: 10.1109/TOCS50858.2020.9339764
Lijuan Shi, Qing Li, Kui Zhang, Shengqiang Qian
{"title":"Digital alarm system for dormitory in post-epidemic era","authors":"Lijuan Shi, Qing Li, Kui Zhang, Shengqiang Qian","doi":"10.1109/TOCS50858.2020.9339764","DOIUrl":"https://doi.org/10.1109/TOCS50858.2020.9339764","url":null,"abstract":"Colleges and universities are person-intensive places, and it is difficult for them to prevent and control the epidemic after students return to school. In the post-epidemic era, college students face many difficulties in health and safety. In view of the poor fire-fighting facilities, difficult evacuation and difficult temperature monitoring in and out of dormitories, this paper developed a digital alarm system in the post-epidemic era with college dormitory as the carrier. The system was divided into two parts: the master controller and the monitoring nodes. The monitoring nodes were installed in each dormitory room. The data was collected by temperature sensor and smoke sensor, and the data was transmitted to the upper computer by wireless module. According to the functional requirements of the digital alarm system, the upper computer interface had designed two modules: temperature anomaly alarm and fire alarm. The upper computer could display the data monitoring situation of each dormitory and realized digital alarm according to the data analysis results.","PeriodicalId":373862,"journal":{"name":"2020 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123363100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Giant Chaotic Network Based on Hyperchaotic Parallel Series Network 基于超混沌并行串联网络的巨混沌网络
2020 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS) Pub Date : 2020-12-11 DOI: 10.1109/TOCS50858.2020.9339703
S. Yan, Haijun Wang
{"title":"A Giant Chaotic Network Based on Hyperchaotic Parallel Series Network","authors":"S. Yan, Haijun Wang","doi":"10.1109/TOCS50858.2020.9339703","DOIUrl":"https://doi.org/10.1109/TOCS50858.2020.9339703","url":null,"abstract":"We present a giant chaotic network having the characteristics of a giant nonlinear chaotic dynamic system. Based on two space coupling Lorentz systems with different parameters, a hyper-chaotic energy source is used to drive each chaotic system in two-way. Which results in a parallel series network with two ways. Each node in two-way of network is a highly nonlinear dynamic system and has the chaotic characteristics, where each node of network is a chaotic system. Then, we define such network as a giant chaotic network or a giant nonlinear chaotic dynamic system. We find many hyper-chaotic states and their hyper-chaotic regions via a Lyapunov exponents diagram. We also give a bifurcation diagram to illustrate roughly dynamic behavior of the two coupling Lorentz system from a stable state to a single-periodic state, a multi-periodic state, a chaotic state and a hyper-chaotic state by shifting some parameter. And we discuss all kinds of state synchronization difference via the maximal LES. The network can be found to obtain a hyper-chaotic synchronization and all kinds of state synchronizations in all nodes in two-way. Our research result is of great significance to the research of artificial network, complex system and artificial intelligence.","PeriodicalId":373862,"journal":{"name":"2020 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121623172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Low Complexity Multi-Mode Radio Vortex Receiver for OFDM-OAM Networks 一种用于OFDM-OAM网络的低复杂度多模无线电涡流接收机
2020 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS) Pub Date : 2020-12-11 DOI: 10.1109/TOCS50858.2020.9339762
Ongoiba Ousmane, Tao Hu, Yang Wang, Miming Zhou
{"title":"A Low Complexity Multi-Mode Radio Vortex Receiver for OFDM-OAM Networks","authors":"Ongoiba Ousmane, Tao Hu, Yang Wang, Miming Zhou","doi":"10.1109/TOCS50858.2020.9339762","DOIUrl":"https://doi.org/10.1109/TOCS50858.2020.9339762","url":null,"abstract":"Using the array signal reception theory, we analyzed the mathematical model of the proposed time-modulated rectangle array (TMRA). For practical applications, the uniform circular arrays (UCAs) used in orbital angular momentum (OAM) based multiple-input-multiple-output (MIMO) systems are replaced by the general uniform rectangle arrays (URAs). The employment of radio frequency (RF) switches at the bandlimited receiver significantly reduce the hardware overhead and avoid the unlimited spectrum expansion caused by switches. The detailed derivation of an example of 4 × 4 TMRA time-modulated sequence (TMS) is given in this letter. Our numerical results demonstrate that the TMRA receiver obtains better reception gain, bandwidth, and sidelobe control than a single UCA based OAM receiver.","PeriodicalId":373862,"journal":{"name":"2020 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116673432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Effective Method Using Wavelet Transform for Haze and Noisy Image 小波变换在雾霾和噪声图像处理中的应用
2020 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS) Pub Date : 2020-12-11 DOI: 10.1109/TOCS50858.2020.9339695
Zeli Wang, Xiaoting Liu, Xiaomei Zhang
{"title":"A Effective Method Using Wavelet Transform for Haze and Noisy Image","authors":"Zeli Wang, Xiaoting Liu, Xiaomei Zhang","doi":"10.1109/TOCS50858.2020.9339695","DOIUrl":"https://doi.org/10.1109/TOCS50858.2020.9339695","url":null,"abstract":"In order to enhance the visualization of low-quality images and adapt to the practical work of public security picture detection and visual detection in haze weather, we integrate the currently widely applicable processing methods and adopt a new processing method. This method uses the quad-tree method to solve the problem of the selection defect of the priori atmospheric light value of the dark channel. Aiming at the interference effect between the wavelet frequency division reconstruction coefficients, the adaptive correlation method under the gradient is applied. For noise that gains along with wavelet coefficients, we gives a noise reduction method by compromises the threshold. The experimental results show that the hierarchical contrast of the image is fine, the color fidelity is fine, and the indicators are generally better than other algorithms.","PeriodicalId":373862,"journal":{"name":"2020 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121463063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信