Teng Zhang, Jinpeng Wang, Bo Zhang, Qingxue Yao, Yufang Kang, Yuncui Zhang
{"title":"Research on Three-stage Hybrid Algorithm in Improving Photoelectric Conversion Efficiency","authors":"Teng Zhang, Jinpeng Wang, Bo Zhang, Qingxue Yao, Yufang Kang, Yuncui Zhang","doi":"10.1145/3603781.3603784","DOIUrl":"https://doi.org/10.1145/3603781.3603784","url":null,"abstract":"Solar power generation through photovoltaics represents an important source of solar power generation. The level of photoelectric conversion efficiency is crucial to assessing the performance of photovoltaic modules. A hot topic of research in the photovoltaic field has become how to improve its photoelectric conversion efficiency. It is possible to improve the photoelectric conversion efficiency in many ways, Tracking the maximum power point of the photovoltaic system is one method. This paper proposes a three-stage hybrid algorithm based on the constant voltage method, the conductance increment method and the particle swarm algorithm on the basis of the existing maximum power tracking algorithm, which can improve the accuracy and tracking speed of the maximum power point tracking, Achieve more efficient use of solar energy.","PeriodicalId":391180,"journal":{"name":"Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116533259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Malware Detection in Internet of Things Devices Based on Association Models","authors":"Ngo Quoc-Dung","doi":"10.1145/3603781.3603913","DOIUrl":"https://doi.org/10.1145/3603781.3603913","url":null,"abstract":"In recent years, attackers have shifted aggressively targeting Internet of Things devices. In this paper, we propose the association IoT malware detection model. Before being associated, the model goes through two processing phases, each having two types of static and dynamic features. The process consists of 3 main steps: (1) the files are extracted static feature (grayscale image) and dynamic feature (system call through V-Sandbox sandbox), (2) features are preprocessed and fed into the learning models; for the grayscale image feature, a convolutional neural network (CNN) is used; for the system call graph feature, traditional machine learning algorithms are used; (3) the results from the two learning models are combined by late fusion to decide the final prediction label for the input files. The performance of the proposed method was evaluated, and its detection accuracy was 99.14% better than in the static analysis and dynamic analysis, which had 99.06% and 98.08% detection accuracy, respectively.","PeriodicalId":391180,"journal":{"name":"Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124394522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chuhan Zhou, Y. Wang, Zuntian Chu, Ruichao Zhu, Gang Hu, Wenfei Wang
{"title":"Fuzzy Adaptive Fixed-Time Qantized Consensus Tracking Control of Power-Chained Nonlinear Multi-Agent Systems with Uncertainties","authors":"Chuhan Zhou, Y. Wang, Zuntian Chu, Ruichao Zhu, Gang Hu, Wenfei Wang","doi":"10.1145/3603781.3603930","DOIUrl":"https://doi.org/10.1145/3603781.3603930","url":null,"abstract":"In this paper, a singularity-dispelled fixed-time quantized fuzzy adaptive control algorithm is developed to solve the consensus tracking control problem for power-chained nonlinear multi-agent systems with uncertainties, which is intrinsically challenging due to the existence of uncertain terms and high-power (positive odd integers greater than one) terms. More precisely, a more general fixed-time stability criterion which is available for approximation based control is construct- ed. Combining the fuzzy logic systems with adding one power integrator technique, an adaptive approximation policy is introduced to handle the system uncertainties. Moreover, a novel switching singularity dispelled function is delicately devised to handle the singularity issue in fixed-time control design. As for the input quantization, a variable separable lemma is utilized to extract the quantized signals in a linear-like manner. Numerical and practical simulation example are provided to demonstrate the effectiveness of the designed control scheme.","PeriodicalId":391180,"journal":{"name":"Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124402269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rong Zhang, Changlong Wang, Siyun Bi, Qibin Fu, Xingyu Li, Tingting Gan
{"title":"Knowledge Graph Construction from Tables in Chinese Electric Power PDF Documents","authors":"Rong Zhang, Changlong Wang, Siyun Bi, Qibin Fu, Xingyu Li, Tingting Gan","doi":"10.1145/3603781.3603873","DOIUrl":"https://doi.org/10.1145/3603781.3603873","url":null,"abstract":"The PDF documents of the electric power standard contain a large number of tables, and the main purpose of these table layouts application is to show people more intuitive information. However, the data in the tables is not easily processed by computers and the value of the data is difficult to be exploited. In this paper, an approach is proposed to convert tabular data into RDF knowledge graphs for the power standard PDF documents. Firstly, a variety of table processing techniques are used to extract tabular data from PDF. Then tabular data is normalized and transformed into RDF data. Finally, an electricity domain ontology is constructed and the tabular data is mapped to ontology classes through table interpretation. Extensive experiments are conducted to obtain a structured RDF dataset related to electricity standards, which provides the necessary data support for intelligent knowledge services in the electricity industry.","PeriodicalId":391180,"journal":{"name":"Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132294565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"YOLO-WS: A Novel Method for Webpage Segmentation","authors":"Liping Dai, Zunwang Ke, Wushour Silamu","doi":"10.1145/3603781.3603862","DOIUrl":"https://doi.org/10.1145/3603781.3603862","url":null,"abstract":"To address the limitations of traditional heuristic and machine learning-based webpage segmentation algorithms in feature extraction performance and efficiency, we propose a webpage segmentation method based on deep learning object detection. Specifically, we propose a webpage segmentation method named YOLO-WS based on the YOLOv5 model. We optimized and improved the YOLOv5 model’s network structure, loss function, and post-processing for webpage segmentation tasks, and then use transfer learning to train YOLO-WS on the improved model. Experimental results show that YOLO-WS achieves good performance in web page segmentation tasks.","PeriodicalId":391180,"journal":{"name":"Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132476831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"QuickStorage: A Write-optimized Efficient Storage System for Trusted Execution Environments","authors":"Xinyuan Luo, Yiming Zhang","doi":"10.1145/3603781.3603806","DOIUrl":"https://doi.org/10.1145/3603781.3603806","url":null,"abstract":"With the increasing importance of privacy protection and the growing risks of cloud data leakage and tampering, application and data security have received extensive attention, which is even more necessary for sensitive applications such as identity authentication, multi-party data collaboration, and online financial service system. Trusted Execution Environments (TEEs) can ensure the security of the code and data running in it. Still, the security of the persistent data needs to be guaranteed by the software in the TEE. This paper presents QuickStorage, a storage system that enables sensitive applications running in TEEs to store data safely and efficiently transparently. QuickStorage draws on the idea of the log-structured storage system. Compared with the previous system, the I/O performance of QuickStorage has been dramatically improved through the new design. We implement QuickStorage on the Intel hardware platform and provide two compaction policies, the classic compaction policy and the leveled compaction policy, for log-structured merge-trees (LSMT) in the index area. We conducted intensive tests on systems using two compaction policies to demonstrate the different advantages of compaction policies. The results show that no matter which LSMT compaction policy is adopted by the storage system, write performance is an order of magnitude improvement compared with the previous storage system. Moreover, the overall read performance is also good. The two compaction policies have various advantages and disadvantages in reading and writing, allowing upper-layer applications to choose a more suitable one to meet their various application scenarios.","PeriodicalId":391180,"journal":{"name":"Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132812007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yuxuan Jin, Yixiang Ren, Tiantian Song, Zhiling Jiang, Guang-hua Song
{"title":"On-board Monocular Vision-based Ground Target Recognition and Localization System for a Flapping-wing Aerial Vehicle","authors":"Yuxuan Jin, Yixiang Ren, Tiantian Song, Zhiling Jiang, Guang-hua Song","doi":"10.1145/3603781.3603829","DOIUrl":"https://doi.org/10.1145/3603781.3603829","url":null,"abstract":"Flapping-wing aerial vehicle (FAV) is a novel type of aircraft that mimics the flight mode of birds and insects. Visual perception plays a crucial role in enabling FAVs to acquire ground information and achieve intelligent capabilities. However, most current FAV vision systems rely on ground processing systems for assistance, which limits their operational range due to communication constraints between the aircraft and the ground. Moreover, the use of vision systems for ground target localization on FAVs is still under-researched. In this work, we present a monocular vision-based on-board ground target recognition and localization system for a self-designed FAV, which can run in quasi-real time, and truly endows the FAV with ground autonomous visual perception capabilities. The system utilizes both the images from camera and attitude-position data of the aircraft, and resolves the issue of temporal mismatch between them. To validate feasibility and accuracy of the system, a series of real-world flight experiments are conducted, followed by a discussion of the errors observed.","PeriodicalId":391180,"journal":{"name":"Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132178577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Passenger Flow Prediction of Tianjin Metro Line 3 under Time Series Clustering","authors":"Zhao-Xia Wang","doi":"10.1145/3603781.3603842","DOIUrl":"https://doi.org/10.1145/3603781.3603842","url":null,"abstract":"Taking Tianjin Metro Line 3 as an example, this study mainly explored the influence of forecasting methods on the accuracy of short-term passenger flow forecasting for rail transit. Based on the station's inbound and outbound passenger flow attributes, the time sequence clustering method was applied to classify urban rail transit stations into four categories, and extreme gradient boosting (XG Boost), back propagation (BP) and autoregressive moving average (ARMA) models were used to predict the short-term passenger flow of each type of stations, and the results were compared. The results show that the methods with the highest accuracy in predicting the passenger flow of the four types of stations are XG Boost, ARMA, ARMA and BP, and XG Boost shows a greater advantage in prediction time.","PeriodicalId":391180,"journal":{"name":"Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things","volume":"15 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114051778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Join active and passive beamforming optimization for double-RIS aided CR networks","authors":"Yuhui Luo, Wen Chen","doi":"10.1145/3603781.3603805","DOIUrl":"https://doi.org/10.1145/3603781.3603805","url":null,"abstract":"Intelligent Reflector Surface (IRS), also known as Reconfigurable Intelligent Surface (RIS), is a promising method to improve the energy efficiency of wireless communication system by intelligently reconfiguring the channel environment in recent years. Cognitive radio (CR) is an effective solution to improve the spectrum efficiency of wireless communication, which allows secondary users (SU) to share the spectrum with primary users (PU). In this paper, double-RIS are introduced into the downlink multi-input single-output (MISO) CR system to assist communication. Our design goal is to maximize the sum of the achievable rates of SU and PUs by jointly optimizing the beamforming of cognitive base station and main base station and the reflection coefficients of the double-RIS under the constraints of base station transmission power and interference threshold. In order to achieve this goal, we use semi-positive definite relaxation method (SDR) and alternate optimization method to get the optimal solutions of beamforming vector and reflection coefficient. The simulation results show that in the double-RIS aided CR networks, the proposed scheme can significantly improve the reachable rate of all users.","PeriodicalId":391180,"journal":{"name":"Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things","volume":"176 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121216391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ConTra: A Covert Timing Channel Detection Approach for Little Covert Information in a Network","authors":"Zhiqiang Li, Yonghong Chen, Zhan Teng, Xuwen Huang","doi":"10.1145/3603781.3603888","DOIUrl":"https://doi.org/10.1145/3603781.3603888","url":null,"abstract":"A covert timing channel is a technical means that enables information hiding and covert communication. Due to the fact that covert timing channels can elude detection by security defence measures, they offer a substantial security risk to the information of Internet users when they are exploited for illicit reasons. The attacker sends at a low rate to ensure the stealthiness of the covert timing channel communication process, making the number of inter-arrival time encoded as covert information much less than the normal number of inter-arrival time, resulting in the low detection accuracy of existing detection methods. In this paper, we propose a covert timing channel detection method based on one-dimensional convolution and self-attention mechanism. The method begins with local feature extraction of the input inter-arrival time sequence by a one-dimensional convolutional layer, then characterizes the correlation between each inter-arrival time by a self-attention mechanism in the encoder, and finally through the full connection layer to produce the type output. In this study, experimental results on a public dataset and 16 self-built datasets demonstrate that the detection method delivers optimal detection results and efficient detection of covert information in low-volume communications.","PeriodicalId":391180,"journal":{"name":"Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128612224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}