Pub Date : 2020-08-01DOI: 10.1109/ISCEIC51027.2020.00047
Chunyan Yang, Dongmei Bin, Tong Yu, Ying Ling, Xin Li
As the current network environment becomes more and more complicated, various industries not only implement isolation between different networks to prevent the spread of risks and data leakage and other security precautions, but also put forward higher requirements for hardware consumption and ease of use. Requirements, especially in areas that require high network management. This paper focuses on the security and practicality of “multiple networks at one end”, first analyzes the problems faced by data isolation in data centers in various industries, then analyzes the deficiencies of traditional methods, and finally proposes a method that uses lightweight virtualization technology in One terminal system can access multiple networks and can isolate the application data of the corresponding network from each other. By comparing with the traditional method, it further proves the rationality of the method designed in this paper, which not only improves the user’s convenience, but also avoids the emergence of data security problems.
{"title":"A Terminal Data Isolation Method Oriented to “One end multi network” Environment","authors":"Chunyan Yang, Dongmei Bin, Tong Yu, Ying Ling, Xin Li","doi":"10.1109/ISCEIC51027.2020.00047","DOIUrl":"https://doi.org/10.1109/ISCEIC51027.2020.00047","url":null,"abstract":"As the current network environment becomes more and more complicated, various industries not only implement isolation between different networks to prevent the spread of risks and data leakage and other security precautions, but also put forward higher requirements for hardware consumption and ease of use. Requirements, especially in areas that require high network management. This paper focuses on the security and practicality of “multiple networks at one end”, first analyzes the problems faced by data isolation in data centers in various industries, then analyzes the deficiencies of traditional methods, and finally proposes a method that uses lightweight virtualization technology in One terminal system can access multiple networks and can isolate the application data of the corresponding network from each other. By comparing with the traditional method, it further proves the rationality of the method designed in this paper, which not only improves the user’s convenience, but also avoids the emergence of data security problems.","PeriodicalId":249521,"journal":{"name":"2020 International Symposium on Computer Engineering and Intelligent Communications (ISCEIC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117017476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-01DOI: 10.1109/ISCEIC51027.2020.00026
W. Jinyong, Tan Wenrong, Hou Shuaimin, Wang Yang, Zhang Hongna
This paper aims to obtain a model (method) for monitering the growth of corn automatically and accurately. The latest computer vision technology is applied to calculate the method of extracting the surface characteristic parameters. Binocular vision technology is used to calculate the 3D point cloud of maize image. Meanwhile, the 3D point noise reduction established by bilateral filtering is adopted to establish the 3D reconstruction model of maize. In the 3D model, the height and width of maize are calculated proportionally. The error rate of the proposed method is 0.52%. This work provides a reference for the growth monitoring and virtual growth of corn.
{"title":"Research on Quantification Method of Maize Leaf Phenotype Parameters Based on Machine Vision","authors":"W. Jinyong, Tan Wenrong, Hou Shuaimin, Wang Yang, Zhang Hongna","doi":"10.1109/ISCEIC51027.2020.00026","DOIUrl":"https://doi.org/10.1109/ISCEIC51027.2020.00026","url":null,"abstract":"This paper aims to obtain a model (method) for monitering the growth of corn automatically and accurately. The latest computer vision technology is applied to calculate the method of extracting the surface characteristic parameters. Binocular vision technology is used to calculate the 3D point cloud of maize image. Meanwhile, the 3D point noise reduction established by bilateral filtering is adopted to establish the 3D reconstruction model of maize. In the 3D model, the height and width of maize are calculated proportionally. The error rate of the proposed method is 0.52%. This work provides a reference for the growth monitoring and virtual growth of corn.","PeriodicalId":249521,"journal":{"name":"2020 International Symposium on Computer Engineering and Intelligent Communications (ISCEIC)","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117298125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-01DOI: 10.1109/isceic51027.2020.00052
Cheng Zhanxin, Zhai Yuting, Shao Xiaofang
Beidou satellite navigation system can provide positioning, navigation, timing and short message communication services for ship users. In this paper, according to the requirements of the maintenance and support of ship equipment in the open sea, based on the information transmission channel of Beidou navigation satellite system, the transmission data volume is compressed by using the method of equipment status and fault coding, the remote reproduction of ship equipment status and remote guidance of fault maintenance are realized, so that the equipment maintenance support field extends to the open sea, which has strong practicability.
{"title":"Research on Maintenance and Support Technology for Offshore Based on Beidou Satellite Navigation System","authors":"Cheng Zhanxin, Zhai Yuting, Shao Xiaofang","doi":"10.1109/isceic51027.2020.00052","DOIUrl":"https://doi.org/10.1109/isceic51027.2020.00052","url":null,"abstract":"Beidou satellite navigation system can provide positioning, navigation, timing and short message communication services for ship users. In this paper, according to the requirements of the maintenance and support of ship equipment in the open sea, based on the information transmission channel of Beidou navigation satellite system, the transmission data volume is compressed by using the method of equipment status and fault coding, the remote reproduction of ship equipment status and remote guidance of fault maintenance are realized, so that the equipment maintenance support field extends to the open sea, which has strong practicability.","PeriodicalId":249521,"journal":{"name":"2020 International Symposium on Computer Engineering and Intelligent Communications (ISCEIC)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127673401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-01DOI: 10.1109/ISCEIC51027.2020.00028
Taizhi Lv, Chuanhao Wen, Jun Zhang, Yong Chen
Convolutional neural network (CNN) have been widely used in face recognition. The illumination and the size of the data set affect the accuracy of face recognition based on CNN. In order to improve the accuracy of face recognition based on CNN, an improved face recognition algorithm based on CNN with extend local binary pattern (ELBP) and deep convolutional generative adversarial network (DCGAN) is proposed. ELBP uses a circular operator which can be of any size, and the coverage area can be adjusted arbitrarily. It has gray and rotation invariance, and has good robustness to illumination. In real scenes, it is more difficult to obtain face photos of a person with different lighting and different scenes. In order to solve face recognition in the case of small data sets, this paper uses DCGAN to generate new face pictures based on the original pictures. By expanding the data set, the accuracy of face recognition is improved. Experiments have proved that the proposed method in this paper has higher accuracy in face recognition than traditional methods.
{"title":"A face recognition algorithm based on CNN with ELBP and DCGAN","authors":"Taizhi Lv, Chuanhao Wen, Jun Zhang, Yong Chen","doi":"10.1109/ISCEIC51027.2020.00028","DOIUrl":"https://doi.org/10.1109/ISCEIC51027.2020.00028","url":null,"abstract":"Convolutional neural network (CNN) have been widely used in face recognition. The illumination and the size of the data set affect the accuracy of face recognition based on CNN. In order to improve the accuracy of face recognition based on CNN, an improved face recognition algorithm based on CNN with extend local binary pattern (ELBP) and deep convolutional generative adversarial network (DCGAN) is proposed. ELBP uses a circular operator which can be of any size, and the coverage area can be adjusted arbitrarily. It has gray and rotation invariance, and has good robustness to illumination. In real scenes, it is more difficult to obtain face photos of a person with different lighting and different scenes. In order to solve face recognition in the case of small data sets, this paper uses DCGAN to generate new face pictures based on the original pictures. By expanding the data set, the accuracy of face recognition is improved. Experiments have proved that the proposed method in this paper has higher accuracy in face recognition than traditional methods.","PeriodicalId":249521,"journal":{"name":"2020 International Symposium on Computer Engineering and Intelligent Communications (ISCEIC)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127715456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-01DOI: 10.1109/isceic51027.2020.00015
Yu-xin Zhang, Xinghua Liu, Wen-Jin Wang, Yijiao Liu
The effectiveness of China’s stock market is low, and the degree of information disclosure is worse than that of capital markets in developed countries. In particular, GEM stocks are slow to reflect basic supply and demand factors, and investor sentiment will have an impact on GEM stock prices. This paper selects the historical posting data of “GEM Finger Bar” of Eastmoney website. Firstly, Bayesian model algorithm is used to classify the sentiment of text comments, and investor sentiment proxy variables are constructed. Then, through correlation analysis and Granger causality test, the relationship between investor sentiment and the GEM stock price in China is empirically studied. The results show that there is a strong correlation between GEM stock prices and investor sentiment.
{"title":"A Study of Relationship between Investor Sentiment and Stock Price : Realization of Investor Sentiment Classification Based on Bayesian Model","authors":"Yu-xin Zhang, Xinghua Liu, Wen-Jin Wang, Yijiao Liu","doi":"10.1109/isceic51027.2020.00015","DOIUrl":"https://doi.org/10.1109/isceic51027.2020.00015","url":null,"abstract":"The effectiveness of China’s stock market is low, and the degree of information disclosure is worse than that of capital markets in developed countries. In particular, GEM stocks are slow to reflect basic supply and demand factors, and investor sentiment will have an impact on GEM stock prices. This paper selects the historical posting data of “GEM Finger Bar” of Eastmoney website. Firstly, Bayesian model algorithm is used to classify the sentiment of text comments, and investor sentiment proxy variables are constructed. Then, through correlation analysis and Granger causality test, the relationship between investor sentiment and the GEM stock price in China is empirically studied. The results show that there is a strong correlation between GEM stock prices and investor sentiment.","PeriodicalId":249521,"journal":{"name":"2020 International Symposium on Computer Engineering and Intelligent Communications (ISCEIC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130211844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-01DOI: 10.1109/isceic51027.2020.00003
{"title":"[Copyright notice]","authors":"","doi":"10.1109/isceic51027.2020.00003","DOIUrl":"https://doi.org/10.1109/isceic51027.2020.00003","url":null,"abstract":"","PeriodicalId":249521,"journal":{"name":"2020 International Symposium on Computer Engineering and Intelligent Communications (ISCEIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130404367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-01DOI: 10.1109/ISCEIC51027.2020.00046
Zhenfei Qi, Yi Wu, Feilu Hang, Linjiang Xie, Yue He
With the rapid development of Internet, Web Service technology is gradually applied to many areas of life. The security problems occurred in practical applications of Web Service has received more and more attention from the public. Aiming at the security problems existing in the application process of Web Service, a secure real-time internal and external network data exchange method based on Web Service protocol is proposed in this paper, it is agreed that the external network only allows data exchange with the internal network through the Web Service interface, that is, the internal network starts the Web Service service, the external network accesses the service, and then obtains the internal network data or informs the internal network for business processing. Web attack detection is put to the front end to ensure maximum security of Web Service system, which can meet the requirements of more secure and robust web applications while guaranteeing the business security of visitors.
{"title":"A Secure Real-time Internal and External Network Data Exchange Method Based on Web Service Protocol","authors":"Zhenfei Qi, Yi Wu, Feilu Hang, Linjiang Xie, Yue He","doi":"10.1109/ISCEIC51027.2020.00046","DOIUrl":"https://doi.org/10.1109/ISCEIC51027.2020.00046","url":null,"abstract":"With the rapid development of Internet, Web Service technology is gradually applied to many areas of life. The security problems occurred in practical applications of Web Service has received more and more attention from the public. Aiming at the security problems existing in the application process of Web Service, a secure real-time internal and external network data exchange method based on Web Service protocol is proposed in this paper, it is agreed that the external network only allows data exchange with the internal network through the Web Service interface, that is, the internal network starts the Web Service service, the external network accesses the service, and then obtains the internal network data or informs the internal network for business processing. Web attack detection is put to the front end to ensure maximum security of Web Service system, which can meet the requirements of more secure and robust web applications while guaranteeing the business security of visitors.","PeriodicalId":249521,"journal":{"name":"2020 International Symposium on Computer Engineering and Intelligent Communications (ISCEIC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116792470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-01DOI: 10.1109/isceic51027.2020.00017
L. Chen, Junqing Shi, Denghui Wu, Leilei Huang, Kao Zhang
DiDi has changed the traditional taxi mode and formed a modern travel mode led by users in the era of mobile Internet. By studying the spatial and temporal distribution of DiDi vehicles, it can not only reflect the rules and patterns of work, life and travel of urban residents, but also reflect the dynamic and “heat” of urban space in different periods. Based on the GPS data of DiDi travel vehicles in Chengdu, combined with big data mining and visualization technology, this paper studies the distribution of residents’ travel, analyzes the characteristics of residents’ travel, and grasps the rules of residents’ travel.
{"title":"Analysis of urban travel characteristics based on floating vehicle data","authors":"L. Chen, Junqing Shi, Denghui Wu, Leilei Huang, Kao Zhang","doi":"10.1109/isceic51027.2020.00017","DOIUrl":"https://doi.org/10.1109/isceic51027.2020.00017","url":null,"abstract":"DiDi has changed the traditional taxi mode and formed a modern travel mode led by users in the era of mobile Internet. By studying the spatial and temporal distribution of DiDi vehicles, it can not only reflect the rules and patterns of work, life and travel of urban residents, but also reflect the dynamic and “heat” of urban space in different periods. Based on the GPS data of DiDi travel vehicles in Chengdu, combined with big data mining and visualization technology, this paper studies the distribution of residents’ travel, analyzes the characteristics of residents’ travel, and grasps the rules of residents’ travel.","PeriodicalId":249521,"journal":{"name":"2020 International Symposium on Computer Engineering and Intelligent Communications (ISCEIC)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126309391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-01DOI: 10.1109/ISCEIC51027.2020.00030
Jiongzhi Liu, Shengbing Xu, Wei Cai, Yinyun Lin
To address the problem that Maximum Entropy Clustering Algorithm(MEC) is sensitive to the initial clustering centers, we propose a hybrid approach for Maximum Entropy Clustering using Salp Swarm Algorithm (MEC-SSA). First, there are m data samples that are randomly selected as salp populations to get the optimal initial cluster centers. Secondly, the optimal initial clustering centers of MEC are obtained by SSA using DB index as its fitness function. Finally, we can get the better cluster centers by MEC approach. MEC-SSA can alleviate the sensitivity of MEC for initial clustering centers. Further experiments conducted in UCI data show that SSA helps to improve the performance of MEC.
{"title":"A hybrid approach for Maximum Entropy clustering using Salp Swarm Algorithm","authors":"Jiongzhi Liu, Shengbing Xu, Wei Cai, Yinyun Lin","doi":"10.1109/ISCEIC51027.2020.00030","DOIUrl":"https://doi.org/10.1109/ISCEIC51027.2020.00030","url":null,"abstract":"To address the problem that Maximum Entropy Clustering Algorithm(MEC) is sensitive to the initial clustering centers, we propose a hybrid approach for Maximum Entropy Clustering using Salp Swarm Algorithm (MEC-SSA). First, there are m data samples that are randomly selected as salp populations to get the optimal initial cluster centers. Secondly, the optimal initial clustering centers of MEC are obtained by SSA using DB index as its fitness function. Finally, we can get the better cluster centers by MEC approach. MEC-SSA can alleviate the sensitivity of MEC for initial clustering centers. Further experiments conducted in UCI data show that SSA helps to improve the performance of MEC.","PeriodicalId":249521,"journal":{"name":"2020 International Symposium on Computer Engineering and Intelligent Communications (ISCEIC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125516108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-01DOI: 10.1109/ISCEIC51027.2020.00053
Jie Yan, Xiaofeng Xu, Chengmin Wang
Motivated by the application of high-density data storage technologies, symbol-pair read channels are proposed in which every two consecutive symbols are read together. A lot of work has been done on this coding model. Bounds of codes play an important role in coding theory, which act as criterions to measure the optimality of a code. Several bounds have been developed for symbol-pair codes, among of which the Singleton type bound is most popular one. In this paper, we continue the research of bounds and establish the Elias type upper bound for binary symbol-pair codes.
{"title":"The Elias Type Upper Bound of Codes over Symbol-pair Read Channels","authors":"Jie Yan, Xiaofeng Xu, Chengmin Wang","doi":"10.1109/ISCEIC51027.2020.00053","DOIUrl":"https://doi.org/10.1109/ISCEIC51027.2020.00053","url":null,"abstract":"Motivated by the application of high-density data storage technologies, symbol-pair read channels are proposed in which every two consecutive symbols are read together. A lot of work has been done on this coding model. Bounds of codes play an important role in coding theory, which act as criterions to measure the optimality of a code. Several bounds have been developed for symbol-pair codes, among of which the Singleton type bound is most popular one. In this paper, we continue the research of bounds and establish the Elias type upper bound for binary symbol-pair codes.","PeriodicalId":249521,"journal":{"name":"2020 International Symposium on Computer Engineering and Intelligent Communications (ISCEIC)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129340747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}