At present, the role and influence of the power system on all walks of life in society is increasingly high, and the reliability of the power supply is particularly important, so to crack the problem of power outages caused by maintenance of the non-maintenance section and to achieve mutual supply of lines. In this paper, by establishing a distribution network based on the ring network structure, the use of the ring network cabinet equipment in the ring network operation mode load switch division and closure operation to achieve the purpose of transferring power supply. The use of network double CAN (controller area network) communication makes the same line non-stop without maintenance sections, ensuring the continuity of power supply, effectively improving power supply reliability and minimising the impact of power distribution equipment faults and maintenance outages. The traditional power change operation method is carried out by manual hand cranking of the load switch, with a high risk factor for the operation of powered rotating operations and great safety hazards for the operator, which has not fully adapted to the needs of modern grid construction and development. This paper deals with a ring switch tool that can automatically close and close load switches, which can effectively reduce labour intensity, protect personal safety and ensure safe and stable operation of the power grid.
{"title":"Research on Simulation Control and Implementation of Network-Based Dual CAN Communication for Ring Network Cabinet","authors":"Yuepei Zou, Xingsong Chen, Deyu Fu","doi":"10.1145/3585967.3585983","DOIUrl":"https://doi.org/10.1145/3585967.3585983","url":null,"abstract":"At present, the role and influence of the power system on all walks of life in society is increasingly high, and the reliability of the power supply is particularly important, so to crack the problem of power outages caused by maintenance of the non-maintenance section and to achieve mutual supply of lines. In this paper, by establishing a distribution network based on the ring network structure, the use of the ring network cabinet equipment in the ring network operation mode load switch division and closure operation to achieve the purpose of transferring power supply. The use of network double CAN (controller area network) communication makes the same line non-stop without maintenance sections, ensuring the continuity of power supply, effectively improving power supply reliability and minimising the impact of power distribution equipment faults and maintenance outages. The traditional power change operation method is carried out by manual hand cranking of the load switch, with a high risk factor for the operation of powered rotating operations and great safety hazards for the operator, which has not fully adapted to the needs of modern grid construction and development. This paper deals with a ring switch tool that can automatically close and close load switches, which can effectively reduce labour intensity, protect personal safety and ensure safe and stable operation of the power grid.","PeriodicalId":275067,"journal":{"name":"Proceedings of the 2023 10th International Conference on Wireless Communication and Sensor Networks","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133506613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The continuous development of modern technology has gradually changed the way computers transmit information. Network information is in a world of mobile information transmission. While large data brings convenience to human beings, it also faces greater security risks. Therefore, this paper proposed a computer network information security protection system based on the large data clustering algorithm, which can solve the complex cross-linking relationship effectively. The author also used simulation experiments to verify this algorithm. The results show that this method is consistent with the non-linear characteristics of computer network security, and can improve the security protection level of computer network information. The computer network information security protection system based on the large data clustering algorithm is an important development in the field of network security. Its ability to address the complex cross-linking relationships that exist within a network, and to effectively detect and prevent cyber attacks, makes it a valuable tool in improving the security of network information.
{"title":"Research on Computer Network Information Security Protection Based on the Clustering Algorithm for Large Data","authors":"Guanghua Zhang","doi":"10.1145/3585967.3585988","DOIUrl":"https://doi.org/10.1145/3585967.3585988","url":null,"abstract":"The continuous development of modern technology has gradually changed the way computers transmit information. Network information is in a world of mobile information transmission. While large data brings convenience to human beings, it also faces greater security risks. Therefore, this paper proposed a computer network information security protection system based on the large data clustering algorithm, which can solve the complex cross-linking relationship effectively. The author also used simulation experiments to verify this algorithm. The results show that this method is consistent with the non-linear characteristics of computer network security, and can improve the security protection level of computer network information. The computer network information security protection system based on the large data clustering algorithm is an important development in the field of network security. Its ability to address the complex cross-linking relationships that exist within a network, and to effectively detect and prevent cyber attacks, makes it a valuable tool in improving the security of network information.","PeriodicalId":275067,"journal":{"name":"Proceedings of the 2023 10th International Conference on Wireless Communication and Sensor Networks","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133432412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As an important innovation element in the new round of industrial revolution, big data plays an important role in the development of digital economy. As an important carrier of network digital platform economy, researchers have found that most of the real networks are neither traditional regular networks nor completely random networks, but complex networks with certain statistical rules. Complex network has the characteristics of small world and scale-free. Its network structure is complex, its scale is huge, and its individuals are independent and connected. At the same time, there are a large number of users in the network, carrying tens of thousands of information. The traditional network analysis method is not comprehensive, so it is difficult to grasp the whole picture of the network environment. Therefore, this paper introduces a method to solve the network data dilemma by improving the sampling estimation. The data information closely related to the research variables found in the network is introduced into the model-aided estimation method as auxiliary information, and the whole information is studied through the local information of the network. Facing the huge scale of network data, it is an important technology with high efficiency and low cost, which provides a way to quickly obtain data and analysis results.
{"title":"Research on Sampling Estimation Method for Complex Networks-Oriented","authors":"Shih-Chiang Wu","doi":"10.1145/3585967.3585993","DOIUrl":"https://doi.org/10.1145/3585967.3585993","url":null,"abstract":"As an important innovation element in the new round of industrial revolution, big data plays an important role in the development of digital economy. As an important carrier of network digital platform economy, researchers have found that most of the real networks are neither traditional regular networks nor completely random networks, but complex networks with certain statistical rules. Complex network has the characteristics of small world and scale-free. Its network structure is complex, its scale is huge, and its individuals are independent and connected. At the same time, there are a large number of users in the network, carrying tens of thousands of information. The traditional network analysis method is not comprehensive, so it is difficult to grasp the whole picture of the network environment. Therefore, this paper introduces a method to solve the network data dilemma by improving the sampling estimation. The data information closely related to the research variables found in the network is introduced into the model-aided estimation method as auxiliary information, and the whole information is studied through the local information of the network. Facing the huge scale of network data, it is an important technology with high efficiency and low cost, which provides a way to quickly obtain data and analysis results.","PeriodicalId":275067,"journal":{"name":"Proceedings of the 2023 10th International Conference on Wireless Communication and Sensor Networks","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115654274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Digital twins (DTs) in industrial cyber-physical systems (ICPSs) are an essential concept for Industry 4.0. In recent years, DT architectures and frameworks for industry have been the focus of several research initiatives regarding analytics, predictive maintenance, virtual evaluation & verification, and fault detection & diagnosis. However, the resource constraint and battery-driven devices in an ICPS environment are facing challenges such as short life spans due to high energy consumption, lower availability of the services, and low security capabilities. To meet these challenges, this paper identifies some critical properties for DTs, including energy efficiency, high availability & state persistence, remote & contention control, and security. To provide services in ICPSs, we define the concept of a DT as a proxy (DTaaP) and a four-layer architectural model for the DTaaP that enables meeting the identified properties. We present a generic proof of concept (PoC) implementation by using Eclipse Ditto, which is an open-source digital twin framework. We evaluate our artifact against the listed properties through an experimental scenario. We show that the DTaaP improves energy efficiency, that the DT can serve as an anchor point for security, and that the DTaaP provides availability and persistence for duty cycling devices. We also identify some limitations of Eclipse Ditto for PoC DTaaP implementation, which can be a focus for future research.
{"title":"Digital Twin as a Proxy for Industrial Cyber-Physical Systems","authors":"Abdullah Aziz, O. Schelén, Ulf Bodin","doi":"10.1145/3585967.3585982","DOIUrl":"https://doi.org/10.1145/3585967.3585982","url":null,"abstract":"Digital twins (DTs) in industrial cyber-physical systems (ICPSs) are an essential concept for Industry 4.0. In recent years, DT architectures and frameworks for industry have been the focus of several research initiatives regarding analytics, predictive maintenance, virtual evaluation & verification, and fault detection & diagnosis. However, the resource constraint and battery-driven devices in an ICPS environment are facing challenges such as short life spans due to high energy consumption, lower availability of the services, and low security capabilities. To meet these challenges, this paper identifies some critical properties for DTs, including energy efficiency, high availability & state persistence, remote & contention control, and security. To provide services in ICPSs, we define the concept of a DT as a proxy (DTaaP) and a four-layer architectural model for the DTaaP that enables meeting the identified properties. We present a generic proof of concept (PoC) implementation by using Eclipse Ditto, which is an open-source digital twin framework. We evaluate our artifact against the listed properties through an experimental scenario. We show that the DTaaP improves energy efficiency, that the DT can serve as an anchor point for security, and that the DTaaP provides availability and persistence for duty cycling devices. We also identify some limitations of Eclipse Ditto for PoC DTaaP implementation, which can be a focus for future research.","PeriodicalId":275067,"journal":{"name":"Proceedings of the 2023 10th International Conference on Wireless Communication and Sensor Networks","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116451262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
While people's living standards and science and technology continue to develop, electronic information technology and the Internet of Things are also developing accordingly. The Internet of Things technology relies on the application of electronic information technology to realize its functions and provide more convenient and comfortable services for society and public life. Based on electronic IoT sensing technology, this paper selects software such as Load Runner 10.0 as a research tool, simulates the network software applications of 60 clients through four computers at the same time, and tests its related operating status. It was found that users can log in normally and use most of the operations in the system to complete the established business processes. But at the same time, this research is also continuing to explore software development issues in the process of complex business operations. On the basis of single-source superimposed development, the increase of nodes is handled well, aiming at integrating electronic IoT sensing technology. The research in this paper will promote the further development of IoT technology, electronic information technology and electronic information management system.
{"title":"Development and Design of Electronic Information Management System Based on Internet of Things Technology","authors":"Lin Li, Guojun Wu","doi":"10.1145/3585967.3585976","DOIUrl":"https://doi.org/10.1145/3585967.3585976","url":null,"abstract":"While people's living standards and science and technology continue to develop, electronic information technology and the Internet of Things are also developing accordingly. The Internet of Things technology relies on the application of electronic information technology to realize its functions and provide more convenient and comfortable services for society and public life. Based on electronic IoT sensing technology, this paper selects software such as Load Runner 10.0 as a research tool, simulates the network software applications of 60 clients through four computers at the same time, and tests its related operating status. It was found that users can log in normally and use most of the operations in the system to complete the established business processes. But at the same time, this research is also continuing to explore software development issues in the process of complex business operations. On the basis of single-source superimposed development, the increase of nodes is handled well, aiming at integrating electronic IoT sensing technology. The research in this paper will promote the further development of IoT technology, electronic information technology and electronic information management system.","PeriodicalId":275067,"journal":{"name":"Proceedings of the 2023 10th International Conference on Wireless Communication and Sensor Networks","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125470430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract: Aiming at overcoming the instability of the chain structure of the supply chain, the lack of flexibility and adaptability of the supply chain caused by the "core enterprises" in the chain, and such deficiency as easy occurrence of broken chain, etc., this Paper introduces the concept of Supply and Demand Network with multifunction and opening characteristics for enterprises (SDN). This Paper carries out the study on SDN cooperation subnet, build a model to depict the emergence of the SDN cooperation subnet from the perspective of the hierarchy. Based on the Kruskal algorithm and the Dijkstra algorithm respectively, studies on the optimization of all enterprises and individual enterprise are given, and the numerical examples are also presented. The model has a practical significance for guiding the enterprises in SDN cooperation subnet to carry out the cooperation target selection and global strategy optimization.
{"title":"The Study on Emergence and Optimization of SDN Cooperation Subnet","authors":"Leilei Jiang, Rong Xu, Ke Dong","doi":"10.1145/3585967.3585989","DOIUrl":"https://doi.org/10.1145/3585967.3585989","url":null,"abstract":"Abstract: Aiming at overcoming the instability of the chain structure of the supply chain, the lack of flexibility and adaptability of the supply chain caused by the \"core enterprises\" in the chain, and such deficiency as easy occurrence of broken chain, etc., this Paper introduces the concept of Supply and Demand Network with multifunction and opening characteristics for enterprises (SDN). This Paper carries out the study on SDN cooperation subnet, build a model to depict the emergence of the SDN cooperation subnet from the perspective of the hierarchy. Based on the Kruskal algorithm and the Dijkstra algorithm respectively, studies on the optimization of all enterprises and individual enterprise are given, and the numerical examples are also presented. The model has a practical significance for guiding the enterprises in SDN cooperation subnet to carry out the cooperation target selection and global strategy optimization.","PeriodicalId":275067,"journal":{"name":"Proceedings of the 2023 10th International Conference on Wireless Communication and Sensor Networks","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126597832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proceedings of the 2023 10th International Conference on Wireless Communication and Sensor Networks","authors":"","doi":"10.1145/3585967","DOIUrl":"https://doi.org/10.1145/3585967","url":null,"abstract":"","PeriodicalId":275067,"journal":{"name":"Proceedings of the 2023 10th International Conference on Wireless Communication and Sensor Networks","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133415254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}