Proceedings of the 2019 8th International Conference on Networks, Communication and Computing最新文献

筛选
英文 中文
A 3D Model Authentication Scheme Based on Secret Sharing in Cloud Environment 云环境下基于秘密共享的三维模型认证方案
Jianwei Zhang, Zuodong Wu, Hui Liang, Wenqian Wang
{"title":"A 3D Model Authentication Scheme Based on Secret Sharing in Cloud Environment","authors":"Jianwei Zhang, Zuodong Wu, Hui Liang, Wenqian Wang","doi":"10.1145/3375998.3376011","DOIUrl":"https://doi.org/10.1145/3375998.3376011","url":null,"abstract":"Aiming at the problem that the data of the 3D model is lost or unavailable in the cloud storage of multiple nodes, the node data is easily destroyed and the data integrity cannot be guaranteed, a 3D model authentication scheme based on secret sharing in the cloud environment is proposed. Firstly, the original STL secret file of 3D model was selected from the standard image library, and Lagrange interpolation polynomial was used to construct the secret polynomial to generate secret fragments of 3D model files, which were distributed and stored in multiple secret participants. Secondly, the source file and secret sharing sub-fragment are used as the original structural carrier, and the SM3 hash algorithm of Chinese commercial password is used to generate the digital digest of the source file and each secret fragment, and the digital digest generated by each secret fragment is distributed upload to the cloud. Finally, Shamir's (k, n) threshold secret sharing algorithm is used to detect the change of 3D model information and to protect the integrity of the encrypted 3d model data, the consistency of the digital digests of the encrypted 3D model before and after encryption is verified. Experimental analysis shows that the invisibility, robustness and analyzability of the dense 3D model have been improved, effectively preventing fraud in the secret sharing process, and providing a reliable technical means for protecting 3d model in cloud environment.","PeriodicalId":395773,"journal":{"name":"Proceedings of the 2019 8th International Conference on Networks, Communication and Computing","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126102791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimizing Task Execution for Mobile Edge Computing 移动边缘计算任务执行优化
Muhammad Fayyaz, Bin Cao, Waleed Almughalles, Yun Li, Liaqat Ali
{"title":"Optimizing Task Execution for Mobile Edge Computing","authors":"Muhammad Fayyaz, Bin Cao, Waleed Almughalles, Yun Li, Liaqat Ali","doi":"10.1145/3375998.3376034","DOIUrl":"https://doi.org/10.1145/3375998.3376034","url":null,"abstract":"Computation-intensive applications can be enabled by mobile edge computing (MEC) in 5G networks because MEC carries cloud computing almost near to smart devices. In this paper, we study a multi-user MEC system, where several smart devices (SDs) can fulfill computation offloading over wireless channels to a MEC server. we study the minimization of a total sum cost which is energy consumption and time delay for all the smart devices (where smart devices can choose one out of three scenarios to execute the task, i.e., full local computing scenario, full offloading execution scenario, and partial offloading execution scenario) as our objective function optimization. We mutually optimize task partition, offloading decision and computation resource sharing to reduce the total cost of the MEC system. We used an extensive search method and Lagrange method to solve these problems. Statistical results prove the effectiveness of our proposed scheme.","PeriodicalId":395773,"journal":{"name":"Proceedings of the 2019 8th International Conference on Networks, Communication and Computing","volume":"224 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114422503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Wireless Sensor Network Clustering Algorithm for Smart Grid Service Demand 面向智能电网服务需求的无线传感器网络聚类算法
Ping Qian, Yang Song-wei, Zhang Yong, Jintao Hai, L. Zhiyuan
{"title":"A Wireless Sensor Network Clustering Algorithm for Smart Grid Service Demand","authors":"Ping Qian, Yang Song-wei, Zhang Yong, Jintao Hai, L. Zhiyuan","doi":"10.1145/3375998.3376036","DOIUrl":"https://doi.org/10.1145/3375998.3376036","url":null,"abstract":"Smart grid has great application prospects in the power industry. How to extend network life has become a research hotspot in recent years. This paper improves the wireless sensor network LEACH algorithm by analyzing the business requirements of the Smart grid. First, the remaining energy and node density are taken into account in the cluster head election, to ensure the rationality of the cluster head selection. Then, a non-uniform clustering mechanism is adopted to construct the cluster radius of different sizes when clustering. The multi-hop mode is used to transmit data to the base station, and the distance between the cluster head nodes and the remaining energy are used as the selection basis of the next-hop relay node to achieve the purpose of equalizing the energy load. Simulation results show that compared with LEACH and LEACH-DC algorithms, the proposed algorithm can effectively balance node energy consumption and extend network life cycle.","PeriodicalId":395773,"journal":{"name":"Proceedings of the 2019 8th International Conference on Networks, Communication and Computing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121316147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LifeTag
Jie Wen, Dan Zhou, Haoran Feng, Yongcai Wang, Xiongfei Geng, Hengzhe Ma, Zongwei Yang
{"title":"LifeTag","authors":"Jie Wen, Dan Zhou, Haoran Feng, Yongcai Wang, Xiongfei Geng, Hengzhe Ma, Zongwei Yang","doi":"10.1145/3375998.3376043","DOIUrl":"https://doi.org/10.1145/3375998.3376043","url":null,"abstract":"For lifesaving in shipwreck accidents, a wearable device, called LifeTag is designed for marine travellers. The LifeTag integrates localization, communication and life-sign detection modules, which will be triggered on automatically when falling into water and broadcasts the location and life status of the drowning people, so that rescuing ships within 10 nautical miles can receive the signal. This will speed up the drowning people searching and rescue process to improve the lifesaving probability. This paper focuses on the design of data processing technique to accurately detect the life status of drowning people. Real experiments are conducted which show that the inertial sensor data can be processed by machine learning method to efficiently detect the drowning people's life sign. But a challenge problem is that LifeTag requires a very efficient implementation of the classifier, which needs to be embedded into the resource limited firmware of the LifeTag device. To accomplish this, we investigate key feature selection and seek for the efficient and effective classifier design. A simplified online classifier is therefore investigated. Finally, we implement the optimized classifier into the firm ware. Practical experiments verify nearly 100% prediction accuracy of the proposed solutions.","PeriodicalId":395773,"journal":{"name":"Proceedings of the 2019 8th International Conference on Networks, Communication and Computing","volume":"303 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121699337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy Management Strategy of FCHEV Based on ECMS Method 基于ECMS方法的混合动力汽车能量管理策略
Yongfei Liu, Longlong Zhu, Fazhan Tao, Zhumu Fu
{"title":"Energy Management Strategy of FCHEV Based on ECMS Method","authors":"Yongfei Liu, Longlong Zhu, Fazhan Tao, Zhumu Fu","doi":"10.1145/3375998.3376019","DOIUrl":"https://doi.org/10.1145/3375998.3376019","url":null,"abstract":"Considering power allocation problem of fuel cell hybrid electric vehicle(FCHEV), in order to reduce hydrogen energy consumption and prolong battery life, an energy management strategy based on equivalent hydrogen consumption minimization strategy is proposed in this paper. According to the state of charge (SOC) of battery and supercapacitor, the variable equivalent factor of SOC consistency is designed. The optimal output power of fuel cell is obtained by using Equivalent Consumption Minimization Strategy (ECMS). According to the characteristics of high power density of supercapacitor, the output power of battery is smoothed, achieve the power distribution between battery and supercapacitor. Finally, based on ADVISOR and Simulink simulation, compared with RULE, the proposed strategy reduces hydrogen consumption by 0.87%, improves fuel economy and prolongs battery life.","PeriodicalId":395773,"journal":{"name":"Proceedings of the 2019 8th International Conference on Networks, Communication and Computing","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124908473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Handoff Rate Analysis of Aircraft in the Aeronautical Network 航空网络中飞机切换率分析
Qilu Sun, Dongli Wang, Yequn Wang, Mei Gao, Genlai Zhao
{"title":"Handoff Rate Analysis of Aircraft in the Aeronautical Network","authors":"Qilu Sun, Dongli Wang, Yequn Wang, Mei Gao, Genlai Zhao","doi":"10.1145/3375998.3376020","DOIUrl":"https://doi.org/10.1145/3375998.3376020","url":null,"abstract":"To ensure the seamless connection from aircraft to aeronautical networks, there must be connection handovers between different ground stations (GSs) or networks considering the high-speed mobility and multi-link characteristics of aircraft. Because the handoff rate analysis of the existing aeronautical network is usually only applicable to a specific single network and lacks the consideration of aircraft's three-dimensional (3D) mobility, we introduce the maneuvering Euler angle to simulate the motion characteristics of aircraft by combining the 3D Gauss-Markov mobility model, then, we utilize the Matern hard-core point process (MHCPP) to simulate the layout of GSs in the aeronautical network, and derive the closed expression of the aircraft's overall handoff rate. Finally, we analyze the influences of the layout of GSs and aircraft's average speed, pitch angle, and yaw angel on the handoff rates by simulations.","PeriodicalId":395773,"journal":{"name":"Proceedings of the 2019 8th International Conference on Networks, Communication and Computing","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125274607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Multiple Feature Fusion Based Image Retrieval Algorithm 基于多特征融合的图像检索算法
Xu Han, Yuhua Li, Qian Zheng, Y. Huang, Zhifeng Zhang, Zhiqiang He
{"title":"A Multiple Feature Fusion Based Image Retrieval Algorithm","authors":"Xu Han, Yuhua Li, Qian Zheng, Y. Huang, Zhifeng Zhang, Zhiqiang He","doi":"10.1145/3375998.3376015","DOIUrl":"https://doi.org/10.1145/3375998.3376015","url":null,"abstract":"With the rapid development of information technology, how to quickly retrieve the target image from massive image data has become a research hotspot in the field of image processing. In this paper, we propose an image retrieval algorithm based on multiple feature fusion. Our idea is to improve existing image retrieval algorithms that are only done with a single feature extraction. First, we combine the global features and local features of the image by setting different weights, and then further retrieve based on the adaptive coefficients of the fusion features. Experimental results show that our retrieval speed and accuracy of the algorithm is better than single feature extraction, which improves the query efficiency. It has a good P-R curve and has good application value in the field of image retrieval.","PeriodicalId":395773,"journal":{"name":"Proceedings of the 2019 8th International Conference on Networks, Communication and Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131572856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Indoor Robot Path Planning Based on an Improved Probabilistic Road Map Method 基于改进概率路线图法的室内机器人路径规划
Jinfeng Lv, Jianwei Ma, Xiaojing Li
{"title":"Indoor Robot Path Planning Based on an Improved Probabilistic Road Map Method","authors":"Jinfeng Lv, Jianwei Ma, Xiaojing Li","doi":"10.1145/3375998.3376010","DOIUrl":"https://doi.org/10.1145/3375998.3376010","url":null,"abstract":"Aiming at indoor robot path planning, an improved probabilistic road map method is proposed to decide feasible routes for robots. Firstly, the proposed method sets nodes around the obstacles on the map randomly. By connecting starting point, nodes, and ending point, multi alternative practical routes which are not in collision with obstacles can be acquired. Secondly, this paper tries to optimize a route by eliminating unnecessary nodes and repositioning the nodes between starting point and ending point. Finally, the route with the shortest distance and the minimum number of inflection points is chosen as the best route. Experimental results show that, compared with other path planning methods, the improved probabilistic road map method can generate high quality routes rapidly and stably.","PeriodicalId":395773,"journal":{"name":"Proceedings of the 2019 8th International Conference on Networks, Communication and Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115303802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Improved Protocol Based on Directed Diffusion Routing Protocol with Network Coding 基于网络编码的有向扩散路由协议的改进协议
Weixin Huang, Linghua Zhang
{"title":"An Improved Protocol Based on Directed Diffusion Routing Protocol with Network Coding","authors":"Weixin Huang, Linghua Zhang","doi":"10.1145/3375998.3376030","DOIUrl":"https://doi.org/10.1145/3375998.3376030","url":null,"abstract":"The emergence of network coding technology is not too early. This technology emerged in the information field in recent years. It is a data storage technology that combines routing and coding to improve transmission efficiency by additionally encoding data at intermediate nodes[1]. This kind of new technology is able to enhance data throughput, cut down node energy consumption, and achieve energy balance by utilizing the inherent spatial diversity and data redundancy features of WSN. Routing protocol is an important technology in the design of wireless sensor networks. Aiming at the traditional directed diffusion routing protocol (DD), this paper analyzes the problem that the original protocol costs too much in energy and time, and proposes an efficient and energy-saving improved directed diffusion routing protocol NC-DD (Network Coding-DD). This protocol solves the problem of excessive energy consumption when the node works caused by a improper forwarding strategy in the original protocol. Experiments show that the NC-DD protocol model can effectively enhance data throughput and cut down time and energy overhead","PeriodicalId":395773,"journal":{"name":"Proceedings of the 2019 8th International Conference on Networks, Communication and Computing","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117108444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Network Alarm Analysis Based on Data Mining and LSTM 基于数据挖掘和LSTM的网络告警分析
Bin Lu
{"title":"Network Alarm Analysis Based on Data Mining and LSTM","authors":"Bin Lu","doi":"10.1145/3375998.3376023","DOIUrl":"https://doi.org/10.1145/3375998.3376023","url":null,"abstract":"Network alarms are becoming more and more complex, and the scale is increasing sharply. When the root alarm is generated by the devices, a lot of redundant alarms are often triggered. The traditional processing mode is difficult to find the root alarm and filter out the redundant alarm. We provide a new analysis method based on data mining and long short-term memory(LSTM) to find the root alarm and to filter out the redundant alarm.","PeriodicalId":395773,"journal":{"name":"Proceedings of the 2019 8th International Conference on Networks, Communication and Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130359839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信