Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things最新文献

筛选
英文 中文
Research on Three-stage Hybrid Algorithm in Improving Photoelectric Conversion Efficiency 提高光电转换效率的三级混合算法研究
Teng Zhang, Jinpeng Wang, Bo Zhang, Qingxue Yao, Yufang Kang, Yuncui Zhang
{"title":"Research on Three-stage Hybrid Algorithm in Improving Photoelectric Conversion Efficiency","authors":"Teng Zhang, Jinpeng Wang, Bo Zhang, Qingxue Yao, Yufang Kang, Yuncui Zhang","doi":"10.1145/3603781.3603784","DOIUrl":"https://doi.org/10.1145/3603781.3603784","url":null,"abstract":"Solar power generation through photovoltaics represents an important source of solar power generation. The level of photoelectric conversion efficiency is crucial to assessing the performance of photovoltaic modules. A hot topic of research in the photovoltaic field has become how to improve its photoelectric conversion efficiency. It is possible to improve the photoelectric conversion efficiency in many ways, Tracking the maximum power point of the photovoltaic system is one method. This paper proposes a three-stage hybrid algorithm based on the constant voltage method, the conductance increment method and the particle swarm algorithm on the basis of the existing maximum power tracking algorithm, which can improve the accuracy and tracking speed of the maximum power point tracking, Achieve more efficient use of solar energy.","PeriodicalId":391180,"journal":{"name":"Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116533259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Malware Detection in Internet of Things Devices Based on Association Models 基于关联模型的物联网设备恶意软件检测
Ngo Quoc-Dung
{"title":"Malware Detection in Internet of Things Devices Based on Association Models","authors":"Ngo Quoc-Dung","doi":"10.1145/3603781.3603913","DOIUrl":"https://doi.org/10.1145/3603781.3603913","url":null,"abstract":"In recent years, attackers have shifted aggressively targeting Internet of Things devices. In this paper, we propose the association IoT malware detection model. Before being associated, the model goes through two processing phases, each having two types of static and dynamic features. The process consists of 3 main steps: (1) the files are extracted static feature (grayscale image) and dynamic feature (system call through V-Sandbox sandbox), (2) features are preprocessed and fed into the learning models; for the grayscale image feature, a convolutional neural network (CNN) is used; for the system call graph feature, traditional machine learning algorithms are used; (3) the results from the two learning models are combined by late fusion to decide the final prediction label for the input files. The performance of the proposed method was evaluated, and its detection accuracy was 99.14% better than in the static analysis and dynamic analysis, which had 99.06% and 98.08% detection accuracy, respectively.","PeriodicalId":391180,"journal":{"name":"Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124394522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fuzzy Adaptive Fixed-Time Qantized Consensus Tracking Control of Power-Chained Nonlinear Multi-Agent Systems with Uncertainties 不确定功率链非线性多智能体系统的模糊自适应定时定量一致性跟踪控制
Chuhan Zhou, Y. Wang, Zuntian Chu, Ruichao Zhu, Gang Hu, Wenfei Wang
{"title":"Fuzzy Adaptive Fixed-Time Qantized Consensus Tracking Control of Power-Chained Nonlinear Multi-Agent Systems with Uncertainties","authors":"Chuhan Zhou, Y. Wang, Zuntian Chu, Ruichao Zhu, Gang Hu, Wenfei Wang","doi":"10.1145/3603781.3603930","DOIUrl":"https://doi.org/10.1145/3603781.3603930","url":null,"abstract":"In this paper, a singularity-dispelled fixed-time quantized fuzzy adaptive control algorithm is developed to solve the consensus tracking control problem for power-chained nonlinear multi-agent systems with uncertainties, which is intrinsically challenging due to the existence of uncertain terms and high-power (positive odd integers greater than one) terms. More precisely, a more general fixed-time stability criterion which is available for approximation based control is construct- ed. Combining the fuzzy logic systems with adding one power integrator technique, an adaptive approximation policy is introduced to handle the system uncertainties. Moreover, a novel switching singularity dispelled function is delicately devised to handle the singularity issue in fixed-time control design. As for the input quantization, a variable separable lemma is utilized to extract the quantized signals in a linear-like manner. Numerical and practical simulation example are provided to demonstrate the effectiveness of the designed control scheme.","PeriodicalId":391180,"journal":{"name":"Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124402269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Knowledge Graph Construction from Tables in Chinese Electric Power PDF Documents 从中国电力PDF文档的表格构建知识图谱
Rong Zhang, Changlong Wang, Siyun Bi, Qibin Fu, Xingyu Li, Tingting Gan
{"title":"Knowledge Graph Construction from Tables in Chinese Electric Power PDF Documents","authors":"Rong Zhang, Changlong Wang, Siyun Bi, Qibin Fu, Xingyu Li, Tingting Gan","doi":"10.1145/3603781.3603873","DOIUrl":"https://doi.org/10.1145/3603781.3603873","url":null,"abstract":"The PDF documents of the electric power standard contain a large number of tables, and the main purpose of these table layouts application is to show people more intuitive information. However, the data in the tables is not easily processed by computers and the value of the data is difficult to be exploited. In this paper, an approach is proposed to convert tabular data into RDF knowledge graphs for the power standard PDF documents. Firstly, a variety of table processing techniques are used to extract tabular data from PDF. Then tabular data is normalized and transformed into RDF data. Finally, an electricity domain ontology is constructed and the tabular data is mapped to ontology classes through table interpretation. Extensive experiments are conducted to obtain a structured RDF dataset related to electricity standards, which provides the necessary data support for intelligent knowledge services in the electricity industry.","PeriodicalId":391180,"journal":{"name":"Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132294565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
YOLO-WS: A Novel Method for Webpage Segmentation 一种新的网页分割方法YOLO-WS
Liping Dai, Zunwang Ke, Wushour Silamu
{"title":"YOLO-WS: A Novel Method for Webpage Segmentation","authors":"Liping Dai, Zunwang Ke, Wushour Silamu","doi":"10.1145/3603781.3603862","DOIUrl":"https://doi.org/10.1145/3603781.3603862","url":null,"abstract":"To address the limitations of traditional heuristic and machine learning-based webpage segmentation algorithms in feature extraction performance and efficiency, we propose a webpage segmentation method based on deep learning object detection. Specifically, we propose a webpage segmentation method named YOLO-WS based on the YOLOv5 model. We optimized and improved the YOLOv5 model’s network structure, loss function, and post-processing for webpage segmentation tasks, and then use transfer learning to train YOLO-WS on the improved model. Experimental results show that YOLO-WS achieves good performance in web page segmentation tasks.","PeriodicalId":391180,"journal":{"name":"Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132476831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
QuickStorage: A Write-optimized Efficient Storage System for Trusted Execution Environments QuickStorage:为可信执行环境提供写优化的高效存储系统
Xinyuan Luo, Yiming Zhang
{"title":"QuickStorage: A Write-optimized Efficient Storage System for Trusted Execution Environments","authors":"Xinyuan Luo, Yiming Zhang","doi":"10.1145/3603781.3603806","DOIUrl":"https://doi.org/10.1145/3603781.3603806","url":null,"abstract":"With the increasing importance of privacy protection and the growing risks of cloud data leakage and tampering, application and data security have received extensive attention, which is even more necessary for sensitive applications such as identity authentication, multi-party data collaboration, and online financial service system. Trusted Execution Environments (TEEs) can ensure the security of the code and data running in it. Still, the security of the persistent data needs to be guaranteed by the software in the TEE. This paper presents QuickStorage, a storage system that enables sensitive applications running in TEEs to store data safely and efficiently transparently. QuickStorage draws on the idea of the log-structured storage system. Compared with the previous system, the I/O performance of QuickStorage has been dramatically improved through the new design. We implement QuickStorage on the Intel hardware platform and provide two compaction policies, the classic compaction policy and the leveled compaction policy, for log-structured merge-trees (LSMT) in the index area. We conducted intensive tests on systems using two compaction policies to demonstrate the different advantages of compaction policies. The results show that no matter which LSMT compaction policy is adopted by the storage system, write performance is an order of magnitude improvement compared with the previous storage system. Moreover, the overall read performance is also good. The two compaction policies have various advantages and disadvantages in reading and writing, allowing upper-layer applications to choose a more suitable one to meet their various application scenarios.","PeriodicalId":391180,"journal":{"name":"Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132812007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On-board Monocular Vision-based Ground Target Recognition and Localization System for a Flapping-wing Aerial Vehicle 基于单目视觉的扑翼飞行器地面目标识别与定位系统
Yuxuan Jin, Yixiang Ren, Tiantian Song, Zhiling Jiang, Guang-hua Song
{"title":"On-board Monocular Vision-based Ground Target Recognition and Localization System for a Flapping-wing Aerial Vehicle","authors":"Yuxuan Jin, Yixiang Ren, Tiantian Song, Zhiling Jiang, Guang-hua Song","doi":"10.1145/3603781.3603829","DOIUrl":"https://doi.org/10.1145/3603781.3603829","url":null,"abstract":"Flapping-wing aerial vehicle (FAV) is a novel type of aircraft that mimics the flight mode of birds and insects. Visual perception plays a crucial role in enabling FAVs to acquire ground information and achieve intelligent capabilities. However, most current FAV vision systems rely on ground processing systems for assistance, which limits their operational range due to communication constraints between the aircraft and the ground. Moreover, the use of vision systems for ground target localization on FAVs is still under-researched. In this work, we present a monocular vision-based on-board ground target recognition and localization system for a self-designed FAV, which can run in quasi-real time, and truly endows the FAV with ground autonomous visual perception capabilities. The system utilizes both the images from camera and attitude-position data of the aircraft, and resolves the issue of temporal mismatch between them. To validate feasibility and accuracy of the system, a series of real-world flight experiments are conducted, followed by a discussion of the errors observed.","PeriodicalId":391180,"journal":{"name":"Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132178577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Passenger Flow Prediction of Tianjin Metro Line 3 under Time Series Clustering 基于时间序列聚类的天津地铁3号线客流预测
Zhao-Xia Wang
{"title":"Passenger Flow Prediction of Tianjin Metro Line 3 under Time Series Clustering","authors":"Zhao-Xia Wang","doi":"10.1145/3603781.3603842","DOIUrl":"https://doi.org/10.1145/3603781.3603842","url":null,"abstract":"Taking Tianjin Metro Line 3 as an example, this study mainly explored the influence of forecasting methods on the accuracy of short-term passenger flow forecasting for rail transit. Based on the station's inbound and outbound passenger flow attributes, the time sequence clustering method was applied to classify urban rail transit stations into four categories, and extreme gradient boosting (XG Boost), back propagation (BP) and autoregressive moving average (ARMA) models were used to predict the short-term passenger flow of each type of stations, and the results were compared. The results show that the methods with the highest accuracy in predicting the passenger flow of the four types of stations are XG Boost, ARMA, ARMA and BP, and XG Boost shows a greater advantage in prediction time.","PeriodicalId":391180,"journal":{"name":"Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things","volume":"15 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114051778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Join active and passive beamforming optimization for double-RIS aided CR networks 双ris辅助CR网络的主动式和被动式波束形成优化
Yuhui Luo, Wen Chen
{"title":"Join active and passive beamforming optimization for double-RIS aided CR networks","authors":"Yuhui Luo, Wen Chen","doi":"10.1145/3603781.3603805","DOIUrl":"https://doi.org/10.1145/3603781.3603805","url":null,"abstract":"Intelligent Reflector Surface (IRS), also known as Reconfigurable Intelligent Surface (RIS), is a promising method to improve the energy efficiency of wireless communication system by intelligently reconfiguring the channel environment in recent years. Cognitive radio (CR) is an effective solution to improve the spectrum efficiency of wireless communication, which allows secondary users (SU) to share the spectrum with primary users (PU). In this paper, double-RIS are introduced into the downlink multi-input single-output (MISO) CR system to assist communication. Our design goal is to maximize the sum of the achievable rates of SU and PUs by jointly optimizing the beamforming of cognitive base station and main base station and the reflection coefficients of the double-RIS under the constraints of base station transmission power and interference threshold. In order to achieve this goal, we use semi-positive definite relaxation method (SDR) and alternate optimization method to get the optimal solutions of beamforming vector and reflection coefficient. The simulation results show that in the double-RIS aided CR networks, the proposed scheme can significantly improve the reachable rate of all users.","PeriodicalId":391180,"journal":{"name":"Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things","volume":"176 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121216391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ConTra: A Covert Timing Channel Detection Approach for Little Covert Information in a Network 一种用于网络中少量隐蔽信息的隐蔽定时通道检测方法
Zhiqiang Li, Yonghong Chen, Zhan Teng, Xuwen Huang
{"title":"ConTra: A Covert Timing Channel Detection Approach for Little Covert Information in a Network","authors":"Zhiqiang Li, Yonghong Chen, Zhan Teng, Xuwen Huang","doi":"10.1145/3603781.3603888","DOIUrl":"https://doi.org/10.1145/3603781.3603888","url":null,"abstract":"A covert timing channel is a technical means that enables information hiding and covert communication. Due to the fact that covert timing channels can elude detection by security defence measures, they offer a substantial security risk to the information of Internet users when they are exploited for illicit reasons. The attacker sends at a low rate to ensure the stealthiness of the covert timing channel communication process, making the number of inter-arrival time encoded as covert information much less than the normal number of inter-arrival time, resulting in the low detection accuracy of existing detection methods. In this paper, we propose a covert timing channel detection method based on one-dimensional convolution and self-attention mechanism. The method begins with local feature extraction of the input inter-arrival time sequence by a one-dimensional convolutional layer, then characterizes the correlation between each inter-arrival time by a self-attention mechanism in the encoder, and finally through the full connection layer to produce the type output. In this study, experimental results on a public dataset and 16 self-built datasets demonstrate that the detection method delivers optimal detection results and efficient detection of covert information in low-volume communications.","PeriodicalId":391180,"journal":{"name":"Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128612224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信