{"title":"Dynamic Flow Entry Timeouts Based Packet Nonuniform Sampling for Elephant Flow Detection","authors":"Ling Xia Liao, Xiaohang Ma, Zhi Li, Han-Chieh Chao","doi":"10.1109/ISCTIS51085.2021.00091","DOIUrl":"https://doi.org/10.1109/ISCTIS51085.2021.00091","url":null,"abstract":"This paper proposes a controller-based elephant detection approach based on packet statistics sampled by dynamic timeouts of flow entries. It avoids transporting statistics generated at switches to controllers by directly counting statistics using the packets forwarded to controllers for the installation and reactivation of entries. By initializing entries with hard timeout of 0.008s, and keeping doubling it whenever the entries timed out until flows are detected as elephants or out of life spans (the timeouts of flow entries of flows that have been detected as elephants are switched to idle timeout of 5s), the approach achieves a detection accuracy around 90% while reducing the bandwidth usage to less than 30% of the original over packet traces caught from the same network. By giving various initial timeout adjustment strategy to TCP and UDP flows, the approach can maintain the same high detection accuracy and low bandwidth usage over various networks.","PeriodicalId":403102,"journal":{"name":"2021 International Symposium on Computer Technology and Information Science (ISCTIS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133716270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chengguo Su, Jiarui Cui, Xiangquan Li, Qun Yan, Bin Cao, Ruoyu Huang, Hui Lu
{"title":"Research on Electrolytic Aluminum Pot Tending Machine Scheduling Based on Improved Greedy Algorithm","authors":"Chengguo Su, Jiarui Cui, Xiangquan Li, Qun Yan, Bin Cao, Ruoyu Huang, Hui Lu","doi":"10.1109/ISCTIS51085.2021.00069","DOIUrl":"https://doi.org/10.1109/ISCTIS51085.2021.00069","url":null,"abstract":"A scheduling method based on an improved greedy algorithm is proposed, and it aims to improve the working efficiency of the pot tending machine (PTM) in the aluminum electrolysis production process. First, the PTM temporary scheduling tasks are screened out by considering the constraints and the production process, in the situation of meet the actual production needs. Second, use the shortest time slice as the time benchmark for the greedy algorithm through analysis tasks. Third, an improved greedy algorithm- the depth-first search algorithm is combined with the greedy algorithm is proposed, it not only improves the efficiency of PTM allocation and scheduling, but also solves the problem of repeated search in the traditional algorithm. Finally, simulation verification the proposed scheduling algorithm.","PeriodicalId":403102,"journal":{"name":"2021 International Symposium on Computer Technology and Information Science (ISCTIS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131771216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
He Cheng, Chao Zhang, Tiefeng Liu, C. Xie, Zhjia Yang, Zhipeng Zhang
{"title":"A Charge Density Model of Silicon-nanowire GAA MOSFET Incoroperating the Source-drian Tunneling Effect for IC Design","authors":"He Cheng, Chao Zhang, Tiefeng Liu, C. Xie, Zhjia Yang, Zhipeng Zhang","doi":"10.1109/ISCTIS51085.2021.00078","DOIUrl":"https://doi.org/10.1109/ISCTIS51085.2021.00078","url":null,"abstract":"One numerical compact model for one-dimensional electron charge density of n-type silicon ballistic nanowire gate-all-around metal-oxide-semiconductor field-effect transistors with ultra-short channel incorporating the source-drain tunneling is proposed. When establishing the AC model in practical device applications, compact models describing transient analysis of the carrier behaviors in the device channel are needed. When focusing on the charge density of carriers within GAA MOSFET devices, carriers transporting along the channel direction induced by the source-drain tunneling effect should also be taken into account in the subthreshold region. In this study, transmission coefficients of the source-drain tunneling effect are evaluated through expressing energy level of the lowest subband with bringing in the exact boundary conditions and using the Wentzel-Kramers-Brillouin approximation. Then, the carrier density can be derived from the charge profile in the channel using quantum statistics theory. Finally, comparisons of the calculations of the carrier densities between the source-drain tunneling and the thermionic modes in ballistic transport are demonstrated.","PeriodicalId":403102,"journal":{"name":"2021 International Symposium on Computer Technology and Information Science (ISCTIS)","volume":"31 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131811018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Stored Grain Pests Monitoring System Based on Raspberry Pi","authors":"Tian–xing Xu, Huang Feng-ying","doi":"10.1109/ISCTIS51085.2021.00021","DOIUrl":"https://doi.org/10.1109/ISCTIS51085.2021.00021","url":null,"abstract":"In order to solve the problem of pests in stored grain and try to reduce the loss rate of grain storage, a stored grain pests monitoring system is proposed in this paper. This system is based on Raspberry Pi, can monitor the situation in the grain pile in real-time. It uses sensors to monitor the temperature, humidity, and oxygen concentration in the granary, use cameras to capture the pests in the grain pile, and take photo of the pests. Users can view sensors' data through Web or App and receive warning information from the system to achieve the purpose of real-time monitoring and warning. This design has good practical value and development prospect.","PeriodicalId":403102,"journal":{"name":"2021 International Symposium on Computer Technology and Information Science (ISCTIS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114554005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on the MAX038 Simulation Model for Electromagnetic Inspection","authors":"Guo Qing, Hongbo Zhang, Hongzhi Hu, Qin Chang","doi":"10.1109/ISCTIS51085.2021.00086","DOIUrl":"https://doi.org/10.1109/ISCTIS51085.2021.00086","url":null,"abstract":"The high-frequency signal generator MAX038 is particularly suitable for RF signal sources of electromagnetic nondestructive testing, but the lack of finite element simulation model impedes the application of MAX038 in physical field simulation analysis. In this paper, we study the internal structure and principle of MAX038, divide its equivalent circuit architecture into different function modules, and then create and package its simulation model with modularization method. Based on the MAX038 simulation model, the RF excitation signal generator is designed and fabricated by using MSP430 processor, and an optimized detection algorithm is proposed to verify the simulation model. The test results of the MAX038 model and RF signal generator show that the MAX038 model proposed in this paper matches the real chip performance, it can also meet the requirements of simulation analysis for the parameter coupling relationship between electromagnetic field and defects.","PeriodicalId":403102,"journal":{"name":"2021 International Symposium on Computer Technology and Information Science (ISCTIS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121587524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"[Copyright notice]","authors":"","doi":"10.1109/isctis51085.2021.00003","DOIUrl":"https://doi.org/10.1109/isctis51085.2021.00003","url":null,"abstract":"","PeriodicalId":403102,"journal":{"name":"2021 International Symposium on Computer Technology and Information Science (ISCTIS)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122497563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ballistic Target Signal Separation Based on Fast Independent Component Analysis Algorithm","authors":"Yuxi Li, Peng Li","doi":"10.1109/ISCTIS51085.2021.00072","DOIUrl":"https://doi.org/10.1109/ISCTIS51085.2021.00072","url":null,"abstract":"In the process of modern anti-missile warfare, accurate identification of ballistic targets is crucial, and achieving the separation of target micro-Doppler curves is a key step for accurate identification. Aiming at this problem, this paper proposes a Fast-ICA algorithm to separate the micro-Doppler curves of the scattering points. According to the results of the simulation experiment, the signal is separated well, which verifies the effectiveness of the proposed algorithm.","PeriodicalId":403102,"journal":{"name":"2021 International Symposium on Computer Technology and Information Science (ISCTIS)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125554046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Vulnerability Detection Algorithm of Lightweight Linux Internet of Things Application with Symbolic Execution Method","authors":"Hongrui Li, Li-li Zhou, Ming-ming Xing, H. Taha","doi":"10.1109/ISCTIS51085.2021.00013","DOIUrl":"https://doi.org/10.1109/ISCTIS51085.2021.00013","url":null,"abstract":"The security of Internet of Things (IoT) devices has become a matter of great concern in recent years. The existence of security holes in the executable programs in the IoT devices has resulted in difficult to estimate security risks. For a long time, vulnerability detection is mainly completed by manual debugging and analysis, and the detection efficiency is low and the accuracy is difficult to guarantee. In this paper, the mainstream automated vulnerability analysis methods in recent years are studied, and a vulnerability detection algorithm based on symbol execution is presented. The detection algorithm is suitable for lightweight applications in small and medium-sized IoT devices. It realizes three functions: buffer overflow vulnerability detection, encryption reliability detection and protection state detection. The robustness of the detection algorithm was tested in the experiment, and the detection of overflow vulnerability program was completed within 2.75 seconds, and the detection of encryption reliability was completed within 1.79 seconds. Repeating the test with multiple sets of data showed a small difference of less than 6.4 milliseconds. The results show that the symbol execution detection algorithm presented in this paper has high detection efficiency and more robust accuracy and robustness.","PeriodicalId":403102,"journal":{"name":"2021 International Symposium on Computer Technology and Information Science (ISCTIS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116839639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fruit ripeness detection based on miniature spectral sensor","authors":"Yvhan Jiao, Qi Zhang, Xinyao Luo, Zhaohua Liang","doi":"10.1109/ISCTIS51085.2021.00027","DOIUrl":"https://doi.org/10.1109/ISCTIS51085.2021.00027","url":null,"abstract":"Due to the problems of short shelf life and poor taste of immature fruits, a reasonable judgment of fruit maturity in the process of fruit picking and transportation can not only promote the development of China's fruit industry, but also is very important for China's fruit export trade. This device is a miniature spectrometer designed with C12666MA as the spectral sensor. It can collect and process the spectral signal of fruit surface pigment, communicate with Android smart phone through ESP32, draw on the smart phone APP and analyze the spectral data, so as to achieve the purpose of detecting fruit maturity. In the process of the experiment, the spectral signal of chlorophyll in the epidermis of different fruit varieties was detected. The detector could meet the measurement requirements and realize nondestructive testing. It also has the advantages of easy to carry, low cost and high precision.","PeriodicalId":403102,"journal":{"name":"2021 International Symposium on Computer Technology and Information Science (ISCTIS)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115230400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"General Model-Agnostic Transfer Learning for Natural Degradation Image Enhancement","authors":"Xiangyu Yin, Jun Ma","doi":"10.1109/ISCTIS51085.2021.00059","DOIUrl":"https://doi.org/10.1109/ISCTIS51085.2021.00059","url":null,"abstract":"In order to obtain high-quality images in natural conditions, natural degradation image enhancement has been a research hotspot in recent years. In this paper, we present a transfer learning approach for multiple types of natural degradation image enhancement. We propose to create a common source domain for various natural degradations and perform the transfer learning for every specific natural degradation individually. By reusing the general enhancement model, we can circumvent the scarcity of training dataset and the computation-intensive training process for deep learning methods. In the experiment, we transfer the general model to three target tasks: raining image enhancement, snowing image enhancement and underwater image enhancement. With the finetuning of only 5 epochs, the enhancement models have been able to outperform several state-of-the-art methods that designed for specific task.","PeriodicalId":403102,"journal":{"name":"2021 International Symposium on Computer Technology and Information Science (ISCTIS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129645253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}