Pub Date : 2019-08-01DOI: 10.1109/CCET48361.2019.8989411
Xiangdong You, Yiran Wang
This paper adopts the principle and operation methods of the automated testing tool Selenium and designs a web system which can automatically fill in the application website for studying abroad. This system adopts the B/S structure. When the Excel file which contains the personal information is Uploaded to this system, the back-end will convert the Excel file into JSON format data. Then, uses Selenium to login the university's application website, and uses the positioning methods of the webpage elements provided by Selenium to put the data from JSON into the Corresponding web form, thus automatically completes the application.
{"title":"Automatic Network Application System Based on Selenium","authors":"Xiangdong You, Yiran Wang","doi":"10.1109/CCET48361.2019.8989411","DOIUrl":"https://doi.org/10.1109/CCET48361.2019.8989411","url":null,"abstract":"This paper adopts the principle and operation methods of the automated testing tool Selenium and designs a web system which can automatically fill in the application website for studying abroad. This system adopts the B/S structure. When the Excel file which contains the personal information is Uploaded to this system, the back-end will convert the Excel file into JSON format data. Then, uses Selenium to login the university's application website, and uses the positioning methods of the webpage elements provided by Selenium to put the data from JSON into the Corresponding web form, thus automatically completes the application.","PeriodicalId":231425,"journal":{"name":"2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132516842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-01DOI: 10.1109/CCET48361.2019.8989356
Wenwen Sun, Yi Li, Shaopeng Guan
For controllers of Software Defined Network (SDN), Distributed Denial of Service (DDoS) attacks are still the simplest and most effective way to attack. Aiming at this problem, a real-time DDoS detection attack method for SDN controller is proposed. The method first uses the entropy to detect whether the flow is abnormal. After the abnormal warning is issued, the flow entry of the OpenFlow switch is obtained, and the DDoS attack feature in the SDN environment is analyzed to extract important features related to the attack. The BiLSTM-RNN neural network algorithm is used to train the data set, and the BiLSTM model is generated to classify the real-time traffic to realize the DDoS attack detection. Experiments show that, compared with other methods, this method can efficiently implement DDoS attack traffic detection and reduce controller overhead in SDN environment.
{"title":"An Improved Method of DDoS Attack Detection for Controller of SDN","authors":"Wenwen Sun, Yi Li, Shaopeng Guan","doi":"10.1109/CCET48361.2019.8989356","DOIUrl":"https://doi.org/10.1109/CCET48361.2019.8989356","url":null,"abstract":"For controllers of Software Defined Network (SDN), Distributed Denial of Service (DDoS) attacks are still the simplest and most effective way to attack. Aiming at this problem, a real-time DDoS detection attack method for SDN controller is proposed. The method first uses the entropy to detect whether the flow is abnormal. After the abnormal warning is issued, the flow entry of the OpenFlow switch is obtained, and the DDoS attack feature in the SDN environment is analyzed to extract important features related to the attack. The BiLSTM-RNN neural network algorithm is used to train the data set, and the BiLSTM model is generated to classify the real-time traffic to realize the DDoS attack detection. Experiments show that, compared with other methods, this method can efficiently implement DDoS attack traffic detection and reduce controller overhead in SDN environment.","PeriodicalId":231425,"journal":{"name":"2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"165 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133906311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-01DOI: 10.1109/CCET48361.2019.8989206
Honggui Deng, Wenhui Wang, Chen Zhao, Gang Liu, Songshan Ma, Gang Liu
In massive multiple-input multiple-output(MIMO) systems, pilot contamination limits the improvement of system capacity seriously. This problem is usually solved by pilot allocation and precoding in recent years. However, the two methods have higher computational complexity, and they don ’ t consider pilot power allocation. So a fixed power allocation scheme is proposed in this paper, which can relieve pilot contamination of edge terminals effectively with low computational complexity. The process of this scheme was divided into two steps: first, re-deduced the expression of signal-to-interference-to-noise ratio (SINR) of terminals in massive MIMO cells. Second, the power allocation coefficient was calculated by solving the formula of equal-ratio series, and it was used for pilot power allocation. Finally, simulation results show that the proposed algorithm has a good effect on improving system capacity of edge terminals with low computational complexity.
{"title":"The Fixed Power Allocation Algorithm for Uplink Massive MIMO","authors":"Honggui Deng, Wenhui Wang, Chen Zhao, Gang Liu, Songshan Ma, Gang Liu","doi":"10.1109/CCET48361.2019.8989206","DOIUrl":"https://doi.org/10.1109/CCET48361.2019.8989206","url":null,"abstract":"In massive multiple-input multiple-output(MIMO) systems, pilot contamination limits the improvement of system capacity seriously. This problem is usually solved by pilot allocation and precoding in recent years. However, the two methods have higher computational complexity, and they don ’ t consider pilot power allocation. So a fixed power allocation scheme is proposed in this paper, which can relieve pilot contamination of edge terminals effectively with low computational complexity. The process of this scheme was divided into two steps: first, re-deduced the expression of signal-to-interference-to-noise ratio (SINR) of terminals in massive MIMO cells. Second, the power allocation coefficient was calculated by solving the formula of equal-ratio series, and it was used for pilot power allocation. Finally, simulation results show that the proposed algorithm has a good effect on improving system capacity of edge terminals with low computational complexity.","PeriodicalId":231425,"journal":{"name":"2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114503427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-01DOI: 10.1109/CCET48361.2019.8989321
Jianqiu Xu, Baoguo Li
As a new competitive technology, radar-embedded communication (REC) can achieve the covert communication while improving the spectrum utilization. The embedded communication waveform has always been the core of REC. Traditional waveform design methods use eigen-decomposition to construct REC waveforms after converting research targets. However, the constructed REC waveforms are not orthogonal, which would reduce the communication reliability. Besides, converting targets would affect the low probability of detection (LPD) performance of REC. To solve these problems, this paper proposes a new waveform design method based on singular value decomposition (SVD). We compare the proposed method with the traditional ones in terms of communication reliability, LPD performance and robustness. Analysis and simulation results show that the SVD waveform generated by the proposed method is better than the traditional REC waveforms. We also provide a method to measure the level of similarity between SVD waveform and radar waveform. Then we can adjust the similarity to control the trade-off between reliability and concealment.
{"title":"A New Radar-Embedded Communication Waveform Based on Singular Value Decomposition","authors":"Jianqiu Xu, Baoguo Li","doi":"10.1109/CCET48361.2019.8989321","DOIUrl":"https://doi.org/10.1109/CCET48361.2019.8989321","url":null,"abstract":"As a new competitive technology, radar-embedded communication (REC) can achieve the covert communication while improving the spectrum utilization. The embedded communication waveform has always been the core of REC. Traditional waveform design methods use eigen-decomposition to construct REC waveforms after converting research targets. However, the constructed REC waveforms are not orthogonal, which would reduce the communication reliability. Besides, converting targets would affect the low probability of detection (LPD) performance of REC. To solve these problems, this paper proposes a new waveform design method based on singular value decomposition (SVD). We compare the proposed method with the traditional ones in terms of communication reliability, LPD performance and robustness. Analysis and simulation results show that the SVD waveform generated by the proposed method is better than the traditional REC waveforms. We also provide a method to measure the level of similarity between SVD waveform and radar waveform. Then we can adjust the similarity to control the trade-off between reliability and concealment.","PeriodicalId":231425,"journal":{"name":"2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128678271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-01DOI: 10.1109/CCET48361.2019.8989247
Xu Shipu, Wang Yunsheng, Liu Yong, Zhao Jingyin, Zhang Chenxi
Agricultural Internet of Things (IoT) is the use of a variety of instruments and sensors to participate in a variety of agricultural automation control of things. The main content is the use of Internet of Things (IOT) related technologies to develop a set of real-time soil environment monitoring system for farmland, including the system's technical route, system design, development and implementation. Through the combination of WSN and 4G network, the automatic acquisition and storage of soil environmental information such as soil temperature and humidity, salinity, pH value and so on were realized in the process of system realization.
{"title":"Design and Research on the Farmland Soil Environmental Monitoring System Based on Agricultural Network","authors":"Xu Shipu, Wang Yunsheng, Liu Yong, Zhao Jingyin, Zhang Chenxi","doi":"10.1109/CCET48361.2019.8989247","DOIUrl":"https://doi.org/10.1109/CCET48361.2019.8989247","url":null,"abstract":"Agricultural Internet of Things (IoT) is the use of a variety of instruments and sensors to participate in a variety of agricultural automation control of things. The main content is the use of Internet of Things (IOT) related technologies to develop a set of real-time soil environment monitoring system for farmland, including the system's technical route, system design, development and implementation. Through the combination of WSN and 4G network, the automatic acquisition and storage of soil environmental information such as soil temperature and humidity, salinity, pH value and so on were realized in the process of system realization.","PeriodicalId":231425,"journal":{"name":"2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130577626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-01DOI: 10.1109/CCET48361.2019.8989231
Zhao-qi Wu, Jin Wei
A key aspect of the mimetic defense system is the scheduling of heterogeneous executions to ensure that the system is dynamic. The existing scheduling strategy only performs random scheduling to satisfy heterogeneity and service quality. Combined with the historical information of the arbiter in the mimicry defense system, this paper proposed a random seed scheduling algorithm based on historical confidence for maximum heterogeneity and quality of service. First, the seed performer is randomly selected in the historical confidence executor that satisfies the threshold, and then the scheduling scheme is determined according to the maximum heterogeneity type and the quality of service indicator. The simulation results showed that the scheduling period of the algorithm is lower than the random scheduling algorithm. However, the scheduling effect is higher than the random scheduling algorithm, which achieved a good dynamic balance between dynamics, security, and quality of service.
{"title":"Heterogeneous Executors Scheduling Algorithm for Mimic Defense Systems","authors":"Zhao-qi Wu, Jin Wei","doi":"10.1109/CCET48361.2019.8989231","DOIUrl":"https://doi.org/10.1109/CCET48361.2019.8989231","url":null,"abstract":"A key aspect of the mimetic defense system is the scheduling of heterogeneous executions to ensure that the system is dynamic. The existing scheduling strategy only performs random scheduling to satisfy heterogeneity and service quality. Combined with the historical information of the arbiter in the mimicry defense system, this paper proposed a random seed scheduling algorithm based on historical confidence for maximum heterogeneity and quality of service. First, the seed performer is randomly selected in the historical confidence executor that satisfies the threshold, and then the scheduling scheme is determined according to the maximum heterogeneity type and the quality of service indicator. The simulation results showed that the scheduling period of the algorithm is lower than the random scheduling algorithm. However, the scheduling effect is higher than the random scheduling algorithm, which achieved a good dynamic balance between dynamics, security, and quality of service.","PeriodicalId":231425,"journal":{"name":"2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126434475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-28DOI: 10.1109/CCET48361.2019.8989370
Yuanjun Ding, Li Yang, Wen Shi, Xuliang Duan
The rapid development of the Internet provides a shortcut for the dissemination of digital content. A large amount of text, images, audio, and content are digitally placed on the Internet, how to optimize the traditional copyright transaction and rights protection methods to better protect the rights of content creators has become an urgent problem to be studied and solved. Blockchain as an emerging encryption technology in recent years.It has seen a new opportunity for the protection of digital rights. This study combines blockchain technology and digital copyright registration technology to design a complete copyright registration protection application system. Highlights the copyrighted data storage and the security and trustworthiness of blockchain technology. At the software level, the data is absolutely credible and has broad application prospects in the future.
{"title":"The Digital Copyright Management System Based on Blockchain","authors":"Yuanjun Ding, Li Yang, Wen Shi, Xuliang Duan","doi":"10.1109/CCET48361.2019.8989370","DOIUrl":"https://doi.org/10.1109/CCET48361.2019.8989370","url":null,"abstract":"The rapid development of the Internet provides a shortcut for the dissemination of digital content. A large amount of text, images, audio, and content are digitally placed on the Internet, how to optimize the traditional copyright transaction and rights protection methods to better protect the rights of content creators has become an urgent problem to be studied and solved. Blockchain as an emerging encryption technology in recent years.It has seen a new opportunity for the protection of digital rights. This study combines blockchain technology and digital copyright registration technology to design a complete copyright registration protection application system. Highlights the copyrighted data storage and the security and trustworthiness of blockchain technology. At the software level, the data is absolutely credible and has broad application prospects in the future.","PeriodicalId":231425,"journal":{"name":"2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122999163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}