{"title":"Security Analysis and Improvement of Identity-based Key Management Scheme for Airborne Ad Hoc Networks","authors":"H. ShiWei, Tan Yubo, Liu Shaojun, Tian Balin","doi":"10.1109/TOCS50858.2020.9339697","DOIUrl":"https://doi.org/10.1109/TOCS50858.2020.9339697","url":null,"abstract":"An identity-based distributed key management scheme for airborne ad hoc networks is analyzed. It is demonstrated that in the generation phase of user private key, the user identity certificate is transmitted in the public channel, so that the attacker can use the intercepted identity certificate to fake the legitimate node and cheat the distributed key generation center to generate private key for it. Then, an improved authentication scheme is proposed. It constructs the signature of timestamp using the private key of the user node as authentication proof, so that the attacker can't forge the authentication information. It is showed that the improved scheme can effectively resist the forgery attack, and further reduce the computing cost of user nodes while realizing all the functions of the original scheme.","PeriodicalId":373862,"journal":{"name":"2020 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130412232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Predicting the transient NOx emissions of the diesel vehicle based on LSTM neural networks","authors":"Yanyan Wang, Yang Yu, Jiaqiang Li","doi":"10.1109/TOCS50858.2020.9339757","DOIUrl":"https://doi.org/10.1109/TOCS50858.2020.9339757","url":null,"abstract":"Nitrogen oxide (NOx) emissions play an important role in the study of diesel engine pollutant emissions. This study introduces the long short-term memory (LSTM) neural network to estimate the transient NOx emissions of diesel vehicles. The LSTM deep neural network is used to build the prediction model to ensure the stability as well as the accuracy of the model. The results show that the model has better predictive performance and stability than the two commonly used benchmark models, and the following conclusions are drawn: (1) LSTM has better learning and prediction ability for transient changes in NOx emissions. Compared to prediction with random forest (RF) and support vector regression (SVR), the mean absolute deviation and root mean square error of LSTM are reduced by about 23.6% and 8.3% at least, which also indicated that the input parameters selection method was effective. (2) LSTM is a general estimation approach for time series data, which can reduce the suppression effect of transient data changes on model prediction, and has high prediction accuracy, and can be employed for real road NOx emission analysis.","PeriodicalId":373862,"journal":{"name":"2020 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)","volume":"275 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124217129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Auxiliary System of Big Data Abnormality in Station Area Line Loss under Smart Grid","authors":"A. Hongyu, Zheng Jianfeng","doi":"10.1109/TOCS50858.2020.9339625","DOIUrl":"https://doi.org/10.1109/TOCS50858.2020.9339625","url":null,"abstract":"The thesis takes the station parameters in the three systems of utilization, simultaneous line loss, and theoretical line loss as the analysis object and develops an auxiliary analysis and management system for abnormal line loss in the station area. The system starts to treat the line loss problem in the station area. Use data clustering to analyze the statistical line loss in the regular, economic, and high-loss intervals in the three sets of system parameters, form typical parameters as the results of big data analysis and apply them to the three systems. Data governance and line loss governance make decisions.","PeriodicalId":373862,"journal":{"name":"2020 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121135158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Maker Space Policy Expression Based on Co-Word Analysis","authors":"Wu Chen, Tiannan Yang, Liyan Lai","doi":"10.1109/TOCS50858.2020.9339626","DOIUrl":"https://doi.org/10.1109/TOCS50858.2020.9339626","url":null,"abstract":"By analyzing the text of maker space policy, it is helpful to understand the logic of policy expression and evolution. The co-word analysis method, ROSTCM6.0 and Netdraw systems are used to compare and analyze 81 policy texts with Beijing, Hubei, Sichuan and Jilin as typical representatives. The study found that different regional policy texts have basically the same policy value orientation in terms of service awareness, platform construction, fiscal and taxation policies, etc., while the differentiation level is manifested in incorporating regional resource endowment into the expression of policy texts, thus highlighting advantages and forming social influence. The research conclusion provides empirical evidence for further improving maker space policy.","PeriodicalId":373862,"journal":{"name":"2020 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124852994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Simulation of Proton Exchange Membrane Fuel Cell System Based on Fuzzy Logic","authors":"Zhiwei Huang, Junbo Zhou, Yuanshuai Cui","doi":"10.1109/TOCS50858.2020.9339730","DOIUrl":"https://doi.org/10.1109/TOCS50858.2020.9339730","url":null,"abstract":"Proton exchange membrane fuel cell (PEMFC) is a new type of fuel cell developed after alkaline fuel cell, phosphoric acid fuel cell, molten carbonate fuel cell and solid oxide fuel cell. In this paper, the dynamic parameter model of PEMFC electric reactor is established based on the experience of proton exchange membrane fuel cells. On the basis of this parameter model, the intelligent method is used to identify the system, and the identification model of voltage and temperature is established. Finally, based on fuzzy logic, the operating performance of the battery system was simulated, a comprehensive PEMFC simulation model was established, a PEMFC voltage identification model was established, and a PEMFC temperature identification model was established by using fuzzy logic network, so as to reduce the fluctuation range as much as possible to reach the research purpose.","PeriodicalId":373862,"journal":{"name":"2020 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127503897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Facial Expression Recognition Based on Convolutional Neural Networks and Edge Computing","authors":"Gezheng Xu, Haoran Yin, Junhui Yang","doi":"10.1109/TOCS50858.2020.9339739","DOIUrl":"https://doi.org/10.1109/TOCS50858.2020.9339739","url":null,"abstract":"With edge devices playing an increasingly important role in our daily lives, edge computing and human-computer interaction, especially facial expression recognition, become research central issues in academia and industry. However, surprisingly, utilizing edge computing and neural networks for facial expression recognition has been neglected for many years, very few research can be found. To be focusing on such topics. In this paper, we improve Visual Geometry Group 19 with the idea of residual learning. To be specific, for each block of Visual Geometry Group 19, we add its input to its output. The result of the addition will be the input of the next block. Then, we minimize the size of our model by pruning and post-training quantization to achieve a higher efficiency and maintain the model's accuracy at the same time when deploying it on edge devices. The experiment result shows that our model has a 98.99% accuracy on the CK+ dataset. Besides, when deploying on edge devices, its inference time is less than many other popular neural networks that are designed for deploying on edge-devices.","PeriodicalId":373862,"journal":{"name":"2020 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131308596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Predicting Video Website DAU by Random Forest Algorithm","authors":"Jianhua Dai, Xiao Guo, Libo Jin","doi":"10.1109/TOCS50858.2020.9339622","DOIUrl":"https://doi.org/10.1109/TOCS50858.2020.9339622","url":null,"abstract":"With the rise of major video websites, the scale of video website users is expanding. Users are the core of all video websites, so it is of great significance to study video website DAU to evaluate and guide its operation. Based on the data of a video website DAU and platform layout from January 2017 to December 2018, this article analyzes the influencing factors of the video website DAU, selects 10 influencing factors from broadcasting arrangement, content level, content mode, and winter and summer vacations, constructs a Random Forest model, makes regression prediction on the daily average DAU of the video website and calculates the importance of 10 variables. The results show that the most important predictor of DAU is the self-produced drama, followed by the number of variety shows S-level, variety shows A-level and TV series. Video websites can use the method to predict DAU, and improve their operation from the above predictors.","PeriodicalId":373862,"journal":{"name":"2020 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134337939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"5G Remote I/O System Design and Implement in Industry","authors":"Ziwei Jia, W. Xia, Dongdong Li, Weimin Zhang","doi":"10.1109/TOCS50858.2020.9339619","DOIUrl":"https://doi.org/10.1109/TOCS50858.2020.9339619","url":null,"abstract":"5G has gone to everyone with the characteristic of Ultra-Reliable Low Latency Communication (uRLLC) and Enhance Mobile Broadband (eMBB), which can meet increasing industrial data transmission requirements. In this paper, a wireless I/O (Input or Output) System is designed to transmit I/O signal with OPC Unified Architecture (OPC UA) protocol in 5G Local Area Network (LAN). The system includes remote modules, which connect to sensors and actuators for data acquisition and output, a cloud server, which is used for Dynamic Domain Name Resolution (DDNS), and controllers that process the data and monitor remotely. Besides, the implemented system includes Raspberry Pi 4th, which is used as the remote module, and a DDNS server, which runs in the cloud. Finally, two scenarios are presented to transmit the sensors data with this system.","PeriodicalId":373862,"journal":{"name":"2020 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130593918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shiwei Huo, Shengming Guo, Balin Tian, Shaojun Liu
{"title":"Identity-based Handover Authentication Scheme without Pairing or Wireless Networks","authors":"Shiwei Huo, Shengming Guo, Balin Tian, Shaojun Liu","doi":"10.1109/TOCS50858.2020.9339743","DOIUrl":"https://doi.org/10.1109/TOCS50858.2020.9339743","url":null,"abstract":"Handover authentication scheme for mobile network enables mobile nodes to roam safely on different access points. Recently, a handover authentication protocol called pairhand and its improved scheme have been proposed, which are superior to all other schemes in security and efficiency. However, both schemes are based on bilinear pairings, which is a complex operation. In this paper, a novel pair-less handover authentication protocol is proposed. It eliminates the pairing operations, and further reduces the computation cost on mobile user without losing any security features.","PeriodicalId":373862,"journal":{"name":"2020 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130866552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jida Peng, Bo Zhou, Yujie Liu, Fuyuan Zhao, Yeran Jin
{"title":"Design of A Miniature 50Ω-Printed Bowtie Planar Ultra- Wideband Antenna","authors":"Jida Peng, Bo Zhou, Yujie Liu, Fuyuan Zhao, Yeran Jin","doi":"10.1109/TOCS50858.2020.9339708","DOIUrl":"https://doi.org/10.1109/TOCS50858.2020.9339708","url":null,"abstract":"A bowtie antenna for ultra-wideband (UWB) wireless transceivers is designed and fabricated, with a 50-Ω impedance-matching layer to connect SMA interface. The antenna based on FR4 printed circuit board (PCB), employs radial planar monopole architecture, and is made of copper, with butterfly appearance and a small size of 3-cm length and 2.2-cm width. Experimental results show that the presented antenna achieves the return loss lower than −15 dB, the gain up to 2.8 dB, and the impedance of 46.46 ~ 52.83 Ω, within the desired frequency band of 3.7 ~ 4.3 GHz.","PeriodicalId":373862,"journal":{"name":"2020 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126613313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}