{"title":"Green Procurement and Manufacturing, Innovation Orientation and Operational Performance: A Firm Level Panel Data Analysis","authors":"Lan Wang, Yuguang Guo, Xiangming Zeng","doi":"10.1109/ICCCS52626.2021.9449166","DOIUrl":"https://doi.org/10.1109/ICCCS52626.2021.9449166","url":null,"abstract":"Based on stakeholder theory and resource dependence theory, this paper constructs a conceptual model of green procurement and manufacturing, innovation orientation, and corporate operational performance. We introduce innovation orientation as a mediating mechanism to explore how green procurement and manufacturing affects operational performance. With a sample of 290 listed manufacturing enterprises in Shanghai and Shenzhen from 2016 to 2018, we employ content analysis to extract annual report information to measure variables, and test the model through regression analysis. The findings show that green procurement and manufacturing practice promotes the level of innovation orientation, and innovation orientation plays a partially mediating role in the relationship of green procurement practice and operational performance. This study provides empirical support for the relationship between company green behavior and operational performance, and also has important implications for the effective implementation of green procurement to enhance competitiveness of the company.","PeriodicalId":376290,"journal":{"name":"2021 IEEE 6th International Conference on Computer and Communication Systems (ICCCS)","volume":"05 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129415808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The CPDA Detector for the MIMO OCDM System","authors":"Yufang Yin","doi":"10.1109/ICCCS52626.2021.9449306","DOIUrl":"https://doi.org/10.1109/ICCCS52626.2021.9449306","url":null,"abstract":"We formulate the general transceiver model of the MIMO (multiple input multiple output) OCDM (orthogonal chirp division multiplexing) system and evaluate the equalizer performance in frequency selective channel. We propose to employ the CPDA (complex probabilistic data association) equalizing algorithm which outperforms the popular MMSE equalizer.","PeriodicalId":376290,"journal":{"name":"2021 IEEE 6th International Conference on Computer and Communication Systems (ICCCS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114347414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A FPGA Vein Imaging System Based on Matched Filter","authors":"Wenxin Xiang, Jiabing Sun, Deliang Li, Jiawei Liu, Guowei Zhou, Xiaoyu Cui","doi":"10.1109/ICCCS52626.2021.9449133","DOIUrl":"https://doi.org/10.1109/ICCCS52626.2021.9449133","url":null,"abstract":"Venipuncture is one of the most frequently used medical means. Fat thickness and skin color of different people may increase the difficulty for medical staff to judge the position and depth of vein. Therefore, this paper proposes a near-infrared vein imaging system, which is an auxiliary device for venipuncture. Through acquiring the near-infrared images of skin, it can show the subcutaneous venous vessels and assist medical staff to improve the success rate of venipuncture. We use FPGA chip, which has great parallel computing ability, and noncoaxial optical structure of multiplexing to design the vein imaging system. In addition, we design a matched filter vessel enhancement algorithm based on FPGA, it can accurately retain the vessel depth information. Comparison with other filters verifies the effectiveness of this proposed algorithm. Experiments show that this vascular enhancement device has better image quality on the premise of ensuring the real-time and effective performance.","PeriodicalId":376290,"journal":{"name":"2021 IEEE 6th International Conference on Computer and Communication Systems (ICCCS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114853631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved 5G-AKA Scheme Based on Identity Pool and Bloom Filter","authors":"Shiyang Dong, C. Wan","doi":"10.1109/ICCCS52626.2021.9449296","DOIUrl":"https://doi.org/10.1109/ICCCS52626.2021.9449296","url":null,"abstract":"5G-AKA is an identity authentication protocol for 5G network that ensures communication security, such as the network and subscribers. However, the existing standards simply associate 5G Globally Unique Temporary UE Identity (GUTI) with the Subscription Permanent Identifier (SUPI) in the Home Network (HN) as a temporary identity solution for 5G subscribers, UE cannot quickly change the 5G-GUTI according to its own needs. Moreover, the current Sequence Number (SQN) synchronization mechanism will cause low authentication efficiency in the specific situation. To address the above issues, we use Bloom filter to establish a many-to-one mapping relationship between the identity and the UE, so as to achieve rapid verification of the identifier. Based on this, a mechanism that allows the UE to change the temporary identity and a fast authentication mechanism under the condition of sequence out-of-synchronization are proposed. Security analysis and experimental results demonstrate that the proposed scheme is efficient, secure, and compatible with the existing system.","PeriodicalId":376290,"journal":{"name":"2021 IEEE 6th International Conference on Computer and Communication Systems (ICCCS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114879360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yuanfa Ji, Panlong Yin, Xiyan Sun, Qianzi Jia, Ning Guo, Sunyong Wu
{"title":"High-precision Sub-pixel Object Tracking Algorithm","authors":"Yuanfa Ji, Panlong Yin, Xiyan Sun, Qianzi Jia, Ning Guo, Sunyong Wu","doi":"10.1109/ICCCS52626.2021.9449301","DOIUrl":"https://doi.org/10.1109/ICCCS52626.2021.9449301","url":null,"abstract":"Aiming at the problem that the positioning accuracy of the KCF tracking algorithm is difficult to reach the pixel level and cannot adapt to the target scale variation well, the correlation filter tracking algorithm based on the scale pyramid achieves higher tracking accuracy, but the tracking speed is greatly reduced. Introducing the logarithmic polar coordinate transformation of the image, an object tracking algorithm based on the logarithmic polar coordinate transformation is proposed. First, the target template is transformed into the logarithmic polar coordinate, and the scale variation of the target is converted into a displacement signal, then extract the HOG features before and after the target template transformation, and the filter model of displacement and scale is established. Finally, the displacement and scale factor of the object are tracked synchronously under the framework of correlation filtering, and the two are merged to obtain the target tracking frame. The experimental results show that: The average overlap precision of the algorithm in this paper is high, and the tracking effect is better (Experiment 1). The algorithm in this paper can track rigid objects stably and can adapt to scale variation accurately very well (Experiment 2). The overall accuracy and success rate are in the first place (Experiment 3). The algorithm in this paper can approximately achieve pixel-level positioning accuracy, and the tracking speed can reach twice the traditional algorithm (Experiment 4).","PeriodicalId":376290,"journal":{"name":"2021 IEEE 6th International Conference on Computer and Communication Systems (ICCCS)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116513462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Kalman Filter Based Precoding Approach for Inter-Beam Interference Cancellation in Maritime MTC Satellite","authors":"Mingkai Xu, Fenghui Zhang, Liqing Shan, M. Wang","doi":"10.1109/ICCCS52626.2021.9449206","DOIUrl":"https://doi.org/10.1109/ICCCS52626.2021.9449206","url":null,"abstract":"The Low Earth Orbit (LEO) satellite for the maritime Machine Type Communication (MTC) is usually equipped with a multi-beam antenna and uses full frequency multiplexing which can increase communication capacity. However, it brings serious inter-beam interference. In this regard, precoding technique is considered to eliminate inter-beam interference. However, conventional precoding algorithms represented by direct inversion bring higher complexity. To this end, we combine the system signal model with the Kalman filter equation and propose a precoding scheme without training sequence in the form of Kalman filter. This scheme can obtain an approximated matrix of the channel inverse matrix. Firstly, we define the channel matrix as the measurement parameter and the precoding matrix as the Kalman state. Then, the difference between the received signal and the transmitted signal is defined as the difference of the Kalman equation as a control factor combined with the Kalman gain. Finally, minimizing control factor through a finite number of iterations to generate the optimum precoding matrix. The numerical results show that the Kalman-based precoding algorithm is more suitable for MTC satellite inter-beam interference cancellation which can gain an improvement in Symbol Error Rate (SER) and system sum rate.","PeriodicalId":376290,"journal":{"name":"2021 IEEE 6th International Conference on Computer and Communication Systems (ICCCS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128639865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deep Reinforcement Learning for Dynamic Bandwidth Allocation in Multi-Beam Satellite Systems","authors":"Shijun Ma, Xin Hu, Xianglai Liao, Weidong Wang","doi":"10.1109/ICCCS52626.2021.9449160","DOIUrl":"https://doi.org/10.1109/ICCCS52626.2021.9449160","url":null,"abstract":"Future multi-beam satellite (MBS) network is an essential part of the air-space-ground integrated network, which is the future blueprint of 6G. As the MBS network scales up, how to allocation scarce bandwidth spectrum resources efficiently and dynamically while ensuring the Quality of Service (QoS) of the users has become a great challenge. In this paper, we designed a dynamic bandwidth allocation framework using Proximal Policy Optimization (DBA-PPO) to meet the time-varying traffic demand, maximize utilization and guarantee the QoS of the users in the MBS system. The experimental results show that the proposed bandwidth allocation algorithm can be flexible to achieve the desired effectiveness with low complexity and is more cost-effective for the large scale MBS communications scenario.","PeriodicalId":376290,"journal":{"name":"2021 IEEE 6th International Conference on Computer and Communication Systems (ICCCS)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129366761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smart Watermark to Defend against Deepfake Image Manipulation","authors":"Luochen Lv","doi":"10.1109/ICCCS52626.2021.9449287","DOIUrl":"https://doi.org/10.1109/ICCCS52626.2021.9449287","url":null,"abstract":"Deepfake image manipulation has become a serious security threat to the social network. Currently, there are limited studies on protective methods that are against Deepfake image manipulation. To tackle this problem, we here propose an adversary attack based smart watermark model, which adds unperceptive watermarks to images so that the images become adversary examples to Deepfake models. When the Deepfake manipulates these watermarked images, the manipulated images become blur. The manipulation thus can be easily recognized by human and machines. Our experiments have shown that our model outperforms the SOTA and can be used to effectively prevent Deepfake manipulation.","PeriodicalId":376290,"journal":{"name":"2021 IEEE 6th International Conference on Computer and Communication Systems (ICCCS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123518082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dong Wu, Liu Xu, Tang Wei, Zhou Qian, Cai Cheng, Guoyi Zhang, Hailong Zhu
{"title":"Research of Multi-dimensional Improved Canny Algorithm in 5G Smart Grid Image Intelligent Recognition and Monitoring Application","authors":"Dong Wu, Liu Xu, Tang Wei, Zhou Qian, Cai Cheng, Guoyi Zhang, Hailong Zhu","doi":"10.1109/ICCCS52626.2021.9449174","DOIUrl":"https://doi.org/10.1109/ICCCS52626.2021.9449174","url":null,"abstract":"Based on the 5G application and practice of Guizhou power grid, aiming at the massive data information collected by 5G network, how to identify the key information efficiently and quickly based on the image intelligent recognition algorithm and realize the alarm return is the core of this paper. In view of the above image edge detection problems, this paper proposes an improved multi-dimensional Canny algorithm. In each stage, wavelet threshold denoising, improved 4-direction Sobel template, angle interpolation, fusion Otsu algorithm, genetic algorithm and double low threshold algorithm, and secondary morphological processing are used. By building a simulation platform, it is verified that the multi-dimensional improved algorithm based on Canny not only inherits the advantages of the original algorithm, but also has better performance in the aspects of algorithm efficiency, mean square error, peak signal-to-noise ratio and structural similarity compared with the traditional Canny algorithm.","PeriodicalId":376290,"journal":{"name":"2021 IEEE 6th International Conference on Computer and Communication Systems (ICCCS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121955781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"COVID-19 Pandemic Prevention Mobile Application for on Campus Classroom","authors":"Pikulkaew Tangtisanon","doi":"10.1109/ICCCS52626.2021.9449201","DOIUrl":"https://doi.org/10.1109/ICCCS52626.2021.9449201","url":null,"abstract":"COVID-19 pandemic is a novel coronavirus that has not been found in humans before. This virus can be transmitted to other humans primarily through respiratory secretions when an infected person coughs or talks. To avoid human to human transmission of this pandemic, the government extend the state of emergency policies which cause vital damage for many business sections worldwide including educational institution. Many schools decide to let the students learn at home. However, in practical courses such as a chemical workshop, students must come to the laboratory room to perform experiments which may increase the risk of infection. In order to prevent the spread of COVID-19 between students and staff, anybody entering the school must conduct a risk assessment, measure a body temperature and wear a face mask at all times. Many COVID-19 contact tracing platforms allow users to assess infection risk and notify if they have been exposed to infected persons. Unfortunately, they cannot be used effectively with the on-campus education system. The proposed mobile application was developed to handle the needs of the onsite education system during the ongoing COVID-19 situation in schools. The application contains three main functions which are a COVID-19 self-assessment, a roll-call, and a social distancing function. This paper focused on the roll-call function using face recognition and Global Positioning System (GPS). In a normal situation, the student just opens an application, shows his or her face to a smartphone camera then the application will detect a face part and easily recognize the student's identification. However, in the new normal situation where everyone must wear a mask, it will be a very difficult task to perform face recognition since almost half of the face is hidden. The convolutional neural network (CNN) was applied to train a CNN model using a dataset of 18 peoples with non face mask wearing and face mask wearing. The face mask wearing consisted of three different face mask types: Disposable surgical mask (DS), N95 face respirators (N95) and general 3D mask (3D). After that, the model was exported to the proposed mobile application. Experimental results on a realworld dataset show that the proposed model can be used with a high accuracy rate in non face mask samples. In face mask samples, the 3D mask has the highest accuracy rate.","PeriodicalId":376290,"journal":{"name":"2021 IEEE 6th International Conference on Computer and Communication Systems (ICCCS)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125527849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}