Pub Date : 2020-08-01DOI: 10.1109/ISCEIC51027.2020.00048
Tao Chuan, Bo Wu, Yao Lv, Zhenfei Qi, Wei Guo
For different security domains, generally low-level security domains (such as bank office networks) need to access high-level security domains (such as banking business systems). This problem can be achieved with the help of gatekeepers, but there are great security risks. High-level security domain networks are vulnerable to be attacked. So it needs a secure communication method to ensure the security of high-level security domains. This article proposes a restful information exchange system and method for different levels of secure networks, which can realize the data exchange of different levels of security networks and can protect high-level security networks. The secure data exchange method proposed in the article realizes data exchange between security domains with different security requirements and has broad application prospects. The combined security detection method adopted can maximize the protection of advanced security domains, and enable the enterprise entities to perform necessary information exchanges while ensuring network security. The resource white-list and token checking based on the restful architecture not only reduces network attacks, but also minimizes the pressure on advanced security domain servers. The web attack detection proposed in the scheme is put on the front-end to minimize the security pressure of the advanced security domain server.
{"title":"A Secure Real-time Communication Method Between Networks Based on Restful Interface","authors":"Tao Chuan, Bo Wu, Yao Lv, Zhenfei Qi, Wei Guo","doi":"10.1109/ISCEIC51027.2020.00048","DOIUrl":"https://doi.org/10.1109/ISCEIC51027.2020.00048","url":null,"abstract":"For different security domains, generally low-level security domains (such as bank office networks) need to access high-level security domains (such as banking business systems). This problem can be achieved with the help of gatekeepers, but there are great security risks. High-level security domain networks are vulnerable to be attacked. So it needs a secure communication method to ensure the security of high-level security domains. This article proposes a restful information exchange system and method for different levels of secure networks, which can realize the data exchange of different levels of security networks and can protect high-level security networks. The secure data exchange method proposed in the article realizes data exchange between security domains with different security requirements and has broad application prospects. The combined security detection method adopted can maximize the protection of advanced security domains, and enable the enterprise entities to perform necessary information exchanges while ensuring network security. The resource white-list and token checking based on the restful architecture not only reduces network attacks, but also minimizes the pressure on advanced security domain servers. The web attack detection proposed in the scheme is put on the front-end to minimize the security pressure of the advanced security domain server.","PeriodicalId":249521,"journal":{"name":"2020 International Symposium on Computer Engineering and Intelligent Communications (ISCEIC)","volume":"3 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127466810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-01DOI: 10.1109/ISCEIC51027.2020.00040
Haitao Chen, Youcheng Liang, Chunyu Hou
Optical transmission network (OTN) is a transmission network which realizes the transmission, multiplexing, routing and monitoring of service signals in the optical domain, and ensures its performance index and survivability. Packet enhanced optical transmission network (PeOTN), as a new generation of optical transmission network technology, takes on the efficient bandwidth of DWDM/OTN technology, saves optical fiber, and smoothly upgrades the network form. It also integrates the open network form of flexible service scheduling, reliable network management and flexible protection mechanism of SDH/MSTP technology. Based on the technical development of optical transmission network, this paper analyzes the new demand of transmission network in service carrying, discusses the related planning scheme and service application mode of packet enhanced optical transmission network equipment construction carrying network, and provides reference basis for the construction of transmission network in communication network.
{"title":"Analysis of network planning and business application based on PeOTN technology","authors":"Haitao Chen, Youcheng Liang, Chunyu Hou","doi":"10.1109/ISCEIC51027.2020.00040","DOIUrl":"https://doi.org/10.1109/ISCEIC51027.2020.00040","url":null,"abstract":"Optical transmission network (OTN) is a transmission network which realizes the transmission, multiplexing, routing and monitoring of service signals in the optical domain, and ensures its performance index and survivability. Packet enhanced optical transmission network (PeOTN), as a new generation of optical transmission network technology, takes on the efficient bandwidth of DWDM/OTN technology, saves optical fiber, and smoothly upgrades the network form. It also integrates the open network form of flexible service scheduling, reliable network management and flexible protection mechanism of SDH/MSTP technology. Based on the technical development of optical transmission network, this paper analyzes the new demand of transmission network in service carrying, discusses the related planning scheme and service application mode of packet enhanced optical transmission network equipment construction carrying network, and provides reference basis for the construction of transmission network in communication network.","PeriodicalId":249521,"journal":{"name":"2020 International Symposium on Computer Engineering and Intelligent Communications (ISCEIC)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125827207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-01DOI: 10.1109/ISCEIC51027.2020.00033
Jiping Li, Wanrong Gu, Kai Zhu
The problem of exchanging CAD models together with construction history is a crucial issue to realize a complete Product Lifecycle Management (PLM) strategy in current highly distributed product development environments. The more design data can be re-used effectively, the larger its positive impacts on the overall product lifecycle process. This paper will discuss some theoretic and practical issues that, at present, hinder the exchange of procedurally defined shape models between different CAD systems. Some approaches proposed in literatures are summarized and critically discussed.
{"title":"Procedural Representation Based Cross-CAD data Exchange","authors":"Jiping Li, Wanrong Gu, Kai Zhu","doi":"10.1109/ISCEIC51027.2020.00033","DOIUrl":"https://doi.org/10.1109/ISCEIC51027.2020.00033","url":null,"abstract":"The problem of exchanging CAD models together with construction history is a crucial issue to realize a complete Product Lifecycle Management (PLM) strategy in current highly distributed product development environments. The more design data can be re-used effectively, the larger its positive impacts on the overall product lifecycle process. This paper will discuss some theoretic and practical issues that, at present, hinder the exchange of procedurally defined shape models between different CAD systems. Some approaches proposed in literatures are summarized and critically discussed.","PeriodicalId":249521,"journal":{"name":"2020 International Symposium on Computer Engineering and Intelligent Communications (ISCEIC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126105547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-01DOI: 10.1109/ISCEIC51027.2020.00034
Faming Chen, Gao Wang, Ning Liu, Z. Zhong
Most of the factories still employ traditional equipment without interfaces of status parameters transmission and standard communication protocol. The inspection of traditional equipment has become a difficult and key point in the development of manufacture. The present study aimed to count printing, inspect status and identify types of traditional printing devices. A smart sensor-based system is proposed in this work. Variational mode decomposition (VMD) is utilized to extract feature values, and back-propagation neural network (BPNN) models are built for type identification and status inspection of the printing devices. Experiment results show that: the accuracy of print counting, status inspection and type identification of printing devices were 100%, 86.6% and 93.3% respectively. The methodologies and system proposed in the present study can be adapted to other industrial equipment identification and inspection, which can significantly facilitate the development of industrial technologies.
{"title":"Print Counting, Status Inspection and Type Identification of Printing Devices based on Smart Sensor","authors":"Faming Chen, Gao Wang, Ning Liu, Z. Zhong","doi":"10.1109/ISCEIC51027.2020.00034","DOIUrl":"https://doi.org/10.1109/ISCEIC51027.2020.00034","url":null,"abstract":"Most of the factories still employ traditional equipment without interfaces of status parameters transmission and standard communication protocol. The inspection of traditional equipment has become a difficult and key point in the development of manufacture. The present study aimed to count printing, inspect status and identify types of traditional printing devices. A smart sensor-based system is proposed in this work. Variational mode decomposition (VMD) is utilized to extract feature values, and back-propagation neural network (BPNN) models are built for type identification and status inspection of the printing devices. Experiment results show that: the accuracy of print counting, status inspection and type identification of printing devices were 100%, 86.6% and 93.3% respectively. The methodologies and system proposed in the present study can be adapted to other industrial equipment identification and inspection, which can significantly facilitate the development of industrial technologies.","PeriodicalId":249521,"journal":{"name":"2020 International Symposium on Computer Engineering and Intelligent Communications (ISCEIC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116028926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-01DOI: 10.1109/ISCEIC51027.2020.00039
Xu Yuhua, Sun Wei, Lee WanLung
In this paper, we propose a new digital multimedia steganography scheme based on complex number base. Based on this idea, all kinds of digital information can be represented by 0–1 sequences, so there may be some relationship between the two sequences. In order to find this relationship, we focus on the coding of complex number and study the mapping function between points on the complex plane. The general process of our method can be summarized as follows: mapping the secret and public binary sequence into points on the complex plane, constructing a spline curve that goes through all secret and public points, and then, hiding the point differences in another public spline curve image for future secret message recovery. The experiment result shows the proposed method has relative stability and can accurately recover the secret information.
{"title":"A New Digital Multimedia Steganography Scheme Based on Complex Number Base","authors":"Xu Yuhua, Sun Wei, Lee WanLung","doi":"10.1109/ISCEIC51027.2020.00039","DOIUrl":"https://doi.org/10.1109/ISCEIC51027.2020.00039","url":null,"abstract":"In this paper, we propose a new digital multimedia steganography scheme based on complex number base. Based on this idea, all kinds of digital information can be represented by 0–1 sequences, so there may be some relationship between the two sequences. In order to find this relationship, we focus on the coding of complex number and study the mapping function between points on the complex plane. The general process of our method can be summarized as follows: mapping the secret and public binary sequence into points on the complex plane, constructing a spline curve that goes through all secret and public points, and then, hiding the point differences in another public spline curve image for future secret message recovery. The experiment result shows the proposed method has relative stability and can accurately recover the secret information.","PeriodicalId":249521,"journal":{"name":"2020 International Symposium on Computer Engineering and Intelligent Communications (ISCEIC)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126841855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-01DOI: 10.1109/ISCEIC51027.2020.00043
Long Shi, Bocai Xie, Shulin Tan, Zhixin Wang
Aiming at the function and environmental requirements of monitoring railway trackside signal equipment, a general monitoring unit providing rich data acquisition interface, powerful digital processing ability and reliable communication transmission function is designed, which is available for monitoring most of railway trackside equipment. Based on the unit, a device to monitor the trackside equipment of track circuit system, which possesses the largest number, the widest distribution and the most complex application environment, is realized in this paper.
{"title":"Design of a Monitoring Unit for Railway Trackside Signal Equipment","authors":"Long Shi, Bocai Xie, Shulin Tan, Zhixin Wang","doi":"10.1109/ISCEIC51027.2020.00043","DOIUrl":"https://doi.org/10.1109/ISCEIC51027.2020.00043","url":null,"abstract":"Aiming at the function and environmental requirements of monitoring railway trackside signal equipment, a general monitoring unit providing rich data acquisition interface, powerful digital processing ability and reliable communication transmission function is designed, which is available for monitoring most of railway trackside equipment. Based on the unit, a device to monitor the trackside equipment of track circuit system, which possesses the largest number, the widest distribution and the most complex application environment, is realized in this paper.","PeriodicalId":249521,"journal":{"name":"2020 International Symposium on Computer Engineering and Intelligent Communications (ISCEIC)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129281908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-01DOI: 10.1109/ISCEIC51027.2020.00050
Xie Ziyue, Chen Ya
With the continuous deepening of the concept of intelligent service, the insecurity factor of library users’ privacy data those are leaked is increasing. Under the background of the fusion of technology application and concept innovation, establishing a set of user privacy protection mechanism to balance the use of library data and the protection of user privacy in order to facilitate the construction of library service. Implementing the design of user privacy protection mechanism from three levels of macro background, core elements and service supervision by reviewing the existing literature resources, introducing data life cycle model, and setting up the model of potential threats constitution for library user privacy. Under the scope of intelligent service, the library realizes the balance of rights and responsibilities between data mining and privacy protection and the organic integration of policy ideas and technology applications.
{"title":"The Research on User Privacy Protection of library Intelligent Service","authors":"Xie Ziyue, Chen Ya","doi":"10.1109/ISCEIC51027.2020.00050","DOIUrl":"https://doi.org/10.1109/ISCEIC51027.2020.00050","url":null,"abstract":"With the continuous deepening of the concept of intelligent service, the insecurity factor of library users’ privacy data those are leaked is increasing. Under the background of the fusion of technology application and concept innovation, establishing a set of user privacy protection mechanism to balance the use of library data and the protection of user privacy in order to facilitate the construction of library service. Implementing the design of user privacy protection mechanism from three levels of macro background, core elements and service supervision by reviewing the existing literature resources, introducing data life cycle model, and setting up the model of potential threats constitution for library user privacy. Under the scope of intelligent service, the library realizes the balance of rights and responsibilities between data mining and privacy protection and the organic integration of policy ideas and technology applications.","PeriodicalId":249521,"journal":{"name":"2020 International Symposium on Computer Engineering and Intelligent Communications (ISCEIC)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124346357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-01DOI: 10.1109/ISCEIC51027.2020.00035
Ju-Hwan Yu
Water is a precious and limited resource for human, which signifies the importance for researches on effective water usage. In particular, researches on irrigated agriculture are vital as it is one of the major water-consuming sectors in the world. Nevertheless, traditional irrigation has several shortcomings in terms of water usage efficiency, namely the undistributed watering amount across fields which causes significant waste of water resources. In this paper, a novel approach toward improving the efficiency of single tube irrigation is introduced, particularly how it can be adaptively applied to different shaped fields to best utilize the water resource while increasing its water coverage. An irrigation prototype was built through an inventive combination of PID controller and raindrop sensors. Experiments have shown that this system will be significantly useful in areas where water is scarce, as it is 12% more efficient than the conventional approach.
{"title":"A Novel Approach to Single Tube Irrigation System with Adaptive Water Control","authors":"Ju-Hwan Yu","doi":"10.1109/ISCEIC51027.2020.00035","DOIUrl":"https://doi.org/10.1109/ISCEIC51027.2020.00035","url":null,"abstract":"Water is a precious and limited resource for human, which signifies the importance for researches on effective water usage. In particular, researches on irrigated agriculture are vital as it is one of the major water-consuming sectors in the world. Nevertheless, traditional irrigation has several shortcomings in terms of water usage efficiency, namely the undistributed watering amount across fields which causes significant waste of water resources. In this paper, a novel approach toward improving the efficiency of single tube irrigation is introduced, particularly how it can be adaptively applied to different shaped fields to best utilize the water resource while increasing its water coverage. An irrigation prototype was built through an inventive combination of PID controller and raindrop sensors. Experiments have shown that this system will be significantly useful in areas where water is scarce, as it is 12% more efficient than the conventional approach.","PeriodicalId":249521,"journal":{"name":"2020 International Symposium on Computer Engineering and Intelligent Communications (ISCEIC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132012481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-01DOI: 10.1109/ISCEIC51027.2020.00011
M. Suleman, Xiaojian Zhong, Yuxia Sun
As the most popular and the most widely used mobile operating system, Android OS is open source with rich features. Many developers customize it to fulfill their needs or what the end users demand. The advantages of custom ROMs are analyzed systematically in this paper. The customized ROMs are experimentally demonstrated to be better than the stock ROMs in terms of performance, storage, user interface etc.
{"title":"Empirical Research And Auxiliary Tool For Custom Android ROMs","authors":"M. Suleman, Xiaojian Zhong, Yuxia Sun","doi":"10.1109/ISCEIC51027.2020.00011","DOIUrl":"https://doi.org/10.1109/ISCEIC51027.2020.00011","url":null,"abstract":"As the most popular and the most widely used mobile operating system, Android OS is open source with rich features. Many developers customize it to fulfill their needs or what the end users demand. The advantages of custom ROMs are analyzed systematically in this paper. The customized ROMs are experimentally demonstrated to be better than the stock ROMs in terms of performance, storage, user interface etc.","PeriodicalId":249521,"journal":{"name":"2020 International Symposium on Computer Engineering and Intelligent Communications (ISCEIC)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124001446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-01DOI: 10.1109/ISCEIC51027.2020.00008
Yin-qing Fang, Jian-bin Liao, Lian-you Lai
In Shamir’s (k,n) secret sharing scheme, the distributor splits a secret into n shares(shadows), and sends the shares to n participants. Each participant has a different share. In the phase of secret reconstruction, only K or more participants with their shares can reconstruct the secret together, less than K participants can’t reconstruct the secret, and know nothing about the secret. Shamir’s scheme is unconditionally secure in theory. However, this scheme can’t prevent adversaries from cheating. In asynchronous communication, a dishonest participant or a foreign adversary sends a fake share to the honest participants after he gets the shares from other participants and will reconstruct the secret alone while the other honest participants cannot reconstruct the secret. This scheme does not verify the share and identify the participants. In this paper, an efficient share verification method based on Merkel tree will be discussed, in which the root and authentication paths of a Merkel tree are used to verify shares between the participants, so that they can reconstruct secrets correctly after verifying and eliminating the fake shares. This method does not need complex algorithms and estimating the number of cheaters in advance, and will not increase the size of each share.
{"title":"Verifiable Secret Sharing Scheme Using Merkle Tree","authors":"Yin-qing Fang, Jian-bin Liao, Lian-you Lai","doi":"10.1109/ISCEIC51027.2020.00008","DOIUrl":"https://doi.org/10.1109/ISCEIC51027.2020.00008","url":null,"abstract":"In Shamir’s (k,n) secret sharing scheme, the distributor splits a secret into n shares(shadows), and sends the shares to n participants. Each participant has a different share. In the phase of secret reconstruction, only K or more participants with their shares can reconstruct the secret together, less than K participants can’t reconstruct the secret, and know nothing about the secret. Shamir’s scheme is unconditionally secure in theory. However, this scheme can’t prevent adversaries from cheating. In asynchronous communication, a dishonest participant or a foreign adversary sends a fake share to the honest participants after he gets the shares from other participants and will reconstruct the secret alone while the other honest participants cannot reconstruct the secret. This scheme does not verify the share and identify the participants. In this paper, an efficient share verification method based on Merkel tree will be discussed, in which the root and authentication paths of a Merkel tree are used to verify shares between the participants, so that they can reconstruct secrets correctly after verifying and eliminating the fake shares. This method does not need complex algorithms and estimating the number of cheaters in advance, and will not increase the size of each share.","PeriodicalId":249521,"journal":{"name":"2020 International Symposium on Computer Engineering and Intelligent Communications (ISCEIC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127522509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}