Pub Date : 2022-09-01DOI: 10.1109/ICNISC57059.2022.00049
Qiang Hao, Dongdong Xu, Zhun Zhang, Jiqing Wang, Tong Le, Jiawei Wang, Jinlei Zhang, Jiakang Liu, Jinhui Ma, Xiang Wang
With the development of embedded systems towards networking and intelligence, the security threats they face are becoming more difficult to prevent. Existing protection methods make it difficult to monitor jump instructions and their target addresses for tampering by attackers at the low hardware implementation overhead and performance overhead. In this paper, a hardware-assisted security monitoring module is designed to monitor the integrity of jump instructions and jump addresses when executing programs. The proposed method has been implemented on the Xilinx Kintex-7 FPGA platform. Experiments show that this method is able to effectively monitor tampering attacks on jump instructions as well as target addresses while the embedded system is executing programs.
{"title":"A Hardware-Assisted Security Monitoring Method for Jump Instruction and Jump Address in Embedded Systems","authors":"Qiang Hao, Dongdong Xu, Zhun Zhang, Jiqing Wang, Tong Le, Jiawei Wang, Jinlei Zhang, Jiakang Liu, Jinhui Ma, Xiang Wang","doi":"10.1109/ICNISC57059.2022.00049","DOIUrl":"https://doi.org/10.1109/ICNISC57059.2022.00049","url":null,"abstract":"With the development of embedded systems towards networking and intelligence, the security threats they face are becoming more difficult to prevent. Existing protection methods make it difficult to monitor jump instructions and their target addresses for tampering by attackers at the low hardware implementation overhead and performance overhead. In this paper, a hardware-assisted security monitoring module is designed to monitor the integrity of jump instructions and jump addresses when executing programs. The proposed method has been implemented on the Xilinx Kintex-7 FPGA platform. Experiments show that this method is able to effectively monitor tampering attacks on jump instructions as well as target addresses while the embedded system is executing programs.","PeriodicalId":286467,"journal":{"name":"2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125640618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-01DOI: 10.1109/ICNISC57059.2022.00162
Lin Liu, J. Yin
The aim of this paper is to study the use of computer graphics technology in the design of Chinese fonts. The two aspects of graphic software and Chinese font design and production, and graphic software and Chinese font multi-dimensional space design are explored to clarify that Chinese font design has moved from static to dynamic, which breaks through the limitations of two-dimensional static of font and realises the multi-dimensional space effect of font polymorphism. Combined with practical cases, we analyse graphic software and its use, 3D art font design methods, explore the use of gloss and material in font design, the combination of graphics and Chinese fonts to produce a sense of dimensionality, and the grid composition of font design with a sense of dimensionality. It is concluded that the multi-dimensional spatial expression of Chinese fonts is inseparable from light, rotation, kinetic, texture, virtual and other means. Clearly, computer graphics technology provides the conditions for the design and creation of Chinese fonts.
{"title":"Research on Computer Graphics Technology and Multi-dimensional Spatial Design of Chinese Fonts","authors":"Lin Liu, J. Yin","doi":"10.1109/ICNISC57059.2022.00162","DOIUrl":"https://doi.org/10.1109/ICNISC57059.2022.00162","url":null,"abstract":"The aim of this paper is to study the use of computer graphics technology in the design of Chinese fonts. The two aspects of graphic software and Chinese font design and production, and graphic software and Chinese font multi-dimensional space design are explored to clarify that Chinese font design has moved from static to dynamic, which breaks through the limitations of two-dimensional static of font and realises the multi-dimensional space effect of font polymorphism. Combined with practical cases, we analyse graphic software and its use, 3D art font design methods, explore the use of gloss and material in font design, the combination of graphics and Chinese fonts to produce a sense of dimensionality, and the grid composition of font design with a sense of dimensionality. It is concluded that the multi-dimensional spatial expression of Chinese fonts is inseparable from light, rotation, kinetic, texture, virtual and other means. Clearly, computer graphics technology provides the conditions for the design and creation of Chinese fonts.","PeriodicalId":286467,"journal":{"name":"2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126860811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-01DOI: 10.1109/ICNISC57059.2022.00026
Yang Liu, Lei Xu, Jialun Lin
Objective: With the era of Internet + continually evolving, in the network security system that stacks traditional equipment, the reason why it is unable to guard against the escalating security threats is that remedy measures are always taken after the event, and network security is immethodical. Methods: through the reconstruction of the network security system, a framework system consisting of six components, namely, the network security capability system, the planning methodology and tool system, the capability building model, the construction and implementation project library, the network security deployment reference architecture, and the network security operation reference architecture, is constructed, which is a process of “establish something new and in place of the old”. Results: a new generation of network security framework system based on endogenous security is formed, which made network security move from the traditional “dispersedly and partly putting out a fire inside the walls” to “deep integration and endogenous systematization”. Conclusion: It is important to establish ubiquitous network security immunity in the intelligent hospitals system, and truly realize endogenous network security.
{"title":"Remolding and Thinking of Network Security System in Intelligent Hospital","authors":"Yang Liu, Lei Xu, Jialun Lin","doi":"10.1109/ICNISC57059.2022.00026","DOIUrl":"https://doi.org/10.1109/ICNISC57059.2022.00026","url":null,"abstract":"Objective: With the era of Internet + continually evolving, in the network security system that stacks traditional equipment, the reason why it is unable to guard against the escalating security threats is that remedy measures are always taken after the event, and network security is immethodical. Methods: through the reconstruction of the network security system, a framework system consisting of six components, namely, the network security capability system, the planning methodology and tool system, the capability building model, the construction and implementation project library, the network security deployment reference architecture, and the network security operation reference architecture, is constructed, which is a process of “establish something new and in place of the old”. Results: a new generation of network security framework system based on endogenous security is formed, which made network security move from the traditional “dispersedly and partly putting out a fire inside the walls” to “deep integration and endogenous systematization”. Conclusion: It is important to establish ubiquitous network security immunity in the intelligent hospitals system, and truly realize endogenous network security.","PeriodicalId":286467,"journal":{"name":"2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126869358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-01DOI: 10.1109/ICNISC57059.2022.00185
Mingxun Hu, Zan Li, Xinyang Ye, Lei Shu
Due to the uneven terrain, different orientations and irregular topographical changes in mountain photovoltaic power generation projects, the selection of photovoltaic array layout area, the orientation and inclination of photovoltaic arrays, and the spacing of photovoltaic arrays determine the amount of light received and power generation efficiency of photovoltaic arrays during the design process. Therefore, it is necessary to determine the appropriate layout area, the orientation and inclination of the photovoltaic array, and the spacing between the photovoltaic arrays to ensure that there is no more serious shadow shading phenomenon and to obtain the maximum amount of solar radiation. In order to solve the problem of the arrangement of photovoltaic arrays in mountainous terrain, this paper proposes an automatic arrangement method of photovoltaic panels based on a 3D design environment. In the 3D design environment, the appropriate layout area is selected according to the requirements of the code. The layout of the photovoltaic array is carried out according to the site conditions. In addition, the 3D lighting technology is used to simulate the real sun illumination to check the shadow occlusion of the photovoltaic array, which greatly improves the design efficiency and quality on the basis of visualization.
{"title":"Research on Array Layout Method of Photovoltaic Panel in Mountain Photovoltaic Power Generation Project Based on BIM","authors":"Mingxun Hu, Zan Li, Xinyang Ye, Lei Shu","doi":"10.1109/ICNISC57059.2022.00185","DOIUrl":"https://doi.org/10.1109/ICNISC57059.2022.00185","url":null,"abstract":"Due to the uneven terrain, different orientations and irregular topographical changes in mountain photovoltaic power generation projects, the selection of photovoltaic array layout area, the orientation and inclination of photovoltaic arrays, and the spacing of photovoltaic arrays determine the amount of light received and power generation efficiency of photovoltaic arrays during the design process. Therefore, it is necessary to determine the appropriate layout area, the orientation and inclination of the photovoltaic array, and the spacing between the photovoltaic arrays to ensure that there is no more serious shadow shading phenomenon and to obtain the maximum amount of solar radiation. In order to solve the problem of the arrangement of photovoltaic arrays in mountainous terrain, this paper proposes an automatic arrangement method of photovoltaic panels based on a 3D design environment. In the 3D design environment, the appropriate layout area is selected according to the requirements of the code. The layout of the photovoltaic array is carried out according to the site conditions. In addition, the 3D lighting technology is used to simulate the real sun illumination to check the shadow occlusion of the photovoltaic array, which greatly improves the design efficiency and quality on the basis of visualization.","PeriodicalId":286467,"journal":{"name":"2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126986845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-01DOI: 10.1109/ICNISC57059.2022.00128
Wengang Chen, Juan Li, Meitong Chen, Qizheng Li
The virtual simulation laboratory is a process of transforming the one-dimensional text on the original textbook, to the two-dimensional picture projected by PPT, into a lifelike three-dimensional image. Through the multimedia platform, the knowledge and models learned by the students are displayed in front of the students, so that the experiencers can feel a near-real experience on this virtual simulation platform, which can greatly deepen our imagination and understanding of things, let the experience learning is fun. According to the existing situation of experimental teaching in local colleges and universities, this study proposes the establishment of an automobile engine simulation laboratory. On the basis of analyzing the technical implementation status of automobile engine virtual laboratory at home and abroad, comparing the system composition of the traditional laboratory system, synthesizing the current needs, researching and exploring relevant solutions, and finally deciding to conduct a simulation laboratory exploration of the engine, explaining the composition of the virtual laboratory, and understand the utilization and management of laboratories. The basic operations of the virtual laboratory are studied based on real objects and actual operations, and the application of the virtual laboratory is discussed with the engine crankshaft as the research object.
{"title":"Research on the Construction of Virtual Simulation Laboratory for Vehicle Professional Courses from an International Perspective","authors":"Wengang Chen, Juan Li, Meitong Chen, Qizheng Li","doi":"10.1109/ICNISC57059.2022.00128","DOIUrl":"https://doi.org/10.1109/ICNISC57059.2022.00128","url":null,"abstract":"The virtual simulation laboratory is a process of transforming the one-dimensional text on the original textbook, to the two-dimensional picture projected by PPT, into a lifelike three-dimensional image. Through the multimedia platform, the knowledge and models learned by the students are displayed in front of the students, so that the experiencers can feel a near-real experience on this virtual simulation platform, which can greatly deepen our imagination and understanding of things, let the experience learning is fun. According to the existing situation of experimental teaching in local colleges and universities, this study proposes the establishment of an automobile engine simulation laboratory. On the basis of analyzing the technical implementation status of automobile engine virtual laboratory at home and abroad, comparing the system composition of the traditional laboratory system, synthesizing the current needs, researching and exploring relevant solutions, and finally deciding to conduct a simulation laboratory exploration of the engine, explaining the composition of the virtual laboratory, and understand the utilization and management of laboratories. The basic operations of the virtual laboratory are studied based on real objects and actual operations, and the application of the virtual laboratory is discussed with the engine crankshaft as the research object.","PeriodicalId":286467,"journal":{"name":"2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125004664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-01DOI: 10.1109/ICNISC57059.2022.00062
Xin He, Yingying He, Xueying Wang, Shaowei Zhang, Xun Sun
Text detection refers to detecting, for a given image, the coordinates of the text regions within it, and text recognition refers to identifying specific characters from the detected text boxes and optimizing the recognition results. In this paper, a text detection and recognition method based on PSENet and CRNN is designed for book name recognition in conjunction with the application scenario of automatic book return in self-service libraries. The PSENet text detection algorithm is used to obtain the text box of the book cover, and the CRNN+CTC text recognition algorithm is used to perform text recognition on the name of the book cover, achieving a better recognition effect.
{"title":"A Text Detection and Recognition Method Based on PSENet and CRNN","authors":"Xin He, Yingying He, Xueying Wang, Shaowei Zhang, Xun Sun","doi":"10.1109/ICNISC57059.2022.00062","DOIUrl":"https://doi.org/10.1109/ICNISC57059.2022.00062","url":null,"abstract":"Text detection refers to detecting, for a given image, the coordinates of the text regions within it, and text recognition refers to identifying specific characters from the detected text boxes and optimizing the recognition results. In this paper, a text detection and recognition method based on PSENet and CRNN is designed for book name recognition in conjunction with the application scenario of automatic book return in self-service libraries. The PSENet text detection algorithm is used to obtain the text box of the book cover, and the CRNN+CTC text recognition algorithm is used to perform text recognition on the name of the book cover, achieving a better recognition effect.","PeriodicalId":286467,"journal":{"name":"2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122106339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-01DOI: 10.1109/ICNISC57059.2022.00176
Yunqi Chen, Jin Xu
Coal is the most important basic energy supporting the development of the national economy, safe production and effective supervision and management are of great significance. Currently, the coal mine safety monitoring system can be monitored locally, but it cannot help the supervision department to realize the remote supervision and centralized supervision. Establishing a corresponding coal mine safety monitoring network system has become a urgent need of coal mine safety supervision. In the paper, we first study the service-oriented architecture(SOA), and describes the windows communication foundation(WCF) technology, the technology is a main way to achieve SOA architecture. Then combined with WCF technology, the function and logic structure of coal mine safety monitoring network system are designed. Finally, the network system of mine monitoring system based on SOA was realized in the background of a mine monitoring system networking project of a company.
{"title":"Design and Implementation of Coal Mine Monitoring Networking System Based on Service-Oriented Architecture","authors":"Yunqi Chen, Jin Xu","doi":"10.1109/ICNISC57059.2022.00176","DOIUrl":"https://doi.org/10.1109/ICNISC57059.2022.00176","url":null,"abstract":"Coal is the most important basic energy supporting the development of the national economy, safe production and effective supervision and management are of great significance. Currently, the coal mine safety monitoring system can be monitored locally, but it cannot help the supervision department to realize the remote supervision and centralized supervision. Establishing a corresponding coal mine safety monitoring network system has become a urgent need of coal mine safety supervision. In the paper, we first study the service-oriented architecture(SOA), and describes the windows communication foundation(WCF) technology, the technology is a main way to achieve SOA architecture. Then combined with WCF technology, the function and logic structure of coal mine safety monitoring network system are designed. Finally, the network system of mine monitoring system based on SOA was realized in the background of a mine monitoring system networking project of a company.","PeriodicalId":286467,"journal":{"name":"2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"238 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124620834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-01DOI: 10.1109/ICNISC57059.2022.00078
Bo Wu, Fangrong Zhou, Hui Zhang, Meilin Zhe, G. Wen, Hao Pan, Zhicai Lan, Yao Zhao
Quality monitoring of grid construction process based on satellite remote sensing method can standardize the quality behavior of all parties involved in the engineering construction and related institutions and evaluate the environmental and safety impacts of the grid engineering. Thus, a Siamese-Neural-Network-based approach using 3-channel remote sensing images was proposed to quickly monitor grid construction changes. This approach can localize the changed buildings with the help of previous and post remote sensing images of the interesting regions, classify the changes into increased buildings and decreased buildings, and output the masks reaching pixel-level positioning accuracy. The proposed method was tested and compared with other methods based on 2-channel. It has higher accuracy and better robustness and is suitable for the above-mentioned scenes of changes in grid construction. Through experimental research, it is proved that the use of multi-temporal high-resolution remote sensing data and deep learning methods can not only monitor the overall construction status and progress of the project in a timely manner, realize the monitoring of large-scale passages or site clearance, but also monitor the construction scope in a timely and effective manner. The dynamic changes of the ecological environment and the review and evaluation of the construction workload.
{"title":"Change Detection of Grid Construction Based on Satellite Remote Sensing Images and Siamese Neural Network","authors":"Bo Wu, Fangrong Zhou, Hui Zhang, Meilin Zhe, G. Wen, Hao Pan, Zhicai Lan, Yao Zhao","doi":"10.1109/ICNISC57059.2022.00078","DOIUrl":"https://doi.org/10.1109/ICNISC57059.2022.00078","url":null,"abstract":"Quality monitoring of grid construction process based on satellite remote sensing method can standardize the quality behavior of all parties involved in the engineering construction and related institutions and evaluate the environmental and safety impacts of the grid engineering. Thus, a Siamese-Neural-Network-based approach using 3-channel remote sensing images was proposed to quickly monitor grid construction changes. This approach can localize the changed buildings with the help of previous and post remote sensing images of the interesting regions, classify the changes into increased buildings and decreased buildings, and output the masks reaching pixel-level positioning accuracy. The proposed method was tested and compared with other methods based on 2-channel. It has higher accuracy and better robustness and is suitable for the above-mentioned scenes of changes in grid construction. Through experimental research, it is proved that the use of multi-temporal high-resolution remote sensing data and deep learning methods can not only monitor the overall construction status and progress of the project in a timely manner, realize the monitoring of large-scale passages or site clearance, but also monitor the construction scope in a timely and effective manner. The dynamic changes of the ecological environment and the review and evaluation of the construction workload.","PeriodicalId":286467,"journal":{"name":"2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116560885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-01DOI: 10.1109/ICNISC57059.2022.00083
Yinghui Wu, Ranran Guo
As the information technology has developed and popularized significantly, the era of big data has come quietly. Accompanying it is the unstoppable innovation of tourism marketing model, which is a completely new development trend. Currently, the needs of tourists are characterized by personalization and diversification, and tourism marketing innovation has attracted the extreme attention of the tourism industry, which is one of the trends in the development of the tourism industry. Accordingly, this paper summarizes the development status of tourism marketing in the era of big data in the context of the era of big data, analyzes the challenges that tourism marketing model innovation in the era of big data urgently needs to deal with, and finally provides some feasible suggestions for realizing the innovation of tourism marketing model in the era of big data.
{"title":"Research on the Innovation of Tourism Marketing Mode under the Background of Big Data Era","authors":"Yinghui Wu, Ranran Guo","doi":"10.1109/ICNISC57059.2022.00083","DOIUrl":"https://doi.org/10.1109/ICNISC57059.2022.00083","url":null,"abstract":"As the information technology has developed and popularized significantly, the era of big data has come quietly. Accompanying it is the unstoppable innovation of tourism marketing model, which is a completely new development trend. Currently, the needs of tourists are characterized by personalization and diversification, and tourism marketing innovation has attracted the extreme attention of the tourism industry, which is one of the trends in the development of the tourism industry. Accordingly, this paper summarizes the development status of tourism marketing in the era of big data in the context of the era of big data, analyzes the challenges that tourism marketing model innovation in the era of big data urgently needs to deal with, and finally provides some feasible suggestions for realizing the innovation of tourism marketing model in the era of big data.","PeriodicalId":286467,"journal":{"name":"2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"149 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130816750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-01DOI: 10.1109/ICNISC57059.2022.00011
Duo Peng, Chengqun Niu
In light of high power consumption, lofty communication cost, low data accuracy and other problems with existing radiosondes, a high-altitude data acquisition system was designed based on the WSM technology. For circuit design, the system utilized the STM32 chips as the control core and a low power sensor module to fulfill environmental data acquisition and geological location monitoring; the LoRa technology was employed to transmit data to the upper monitoring layer, whereby the upper computer administrator performed online monitoring of high-altitude meteorological data. For software design, the TDMA slot allocation protocol was improved to increase data transmission reliability and a dynamically weighted average fusion algorithm was applied to conduct a fusion experiment on data. The connectivity, reliability and operability of the system were validated in the experiment, which is of a positive significance for space weather data acquisition in China.
{"title":"Design of a Radiosonde Based on the WSN Technology","authors":"Duo Peng, Chengqun Niu","doi":"10.1109/ICNISC57059.2022.00011","DOIUrl":"https://doi.org/10.1109/ICNISC57059.2022.00011","url":null,"abstract":"In light of high power consumption, lofty communication cost, low data accuracy and other problems with existing radiosondes, a high-altitude data acquisition system was designed based on the WSM technology. For circuit design, the system utilized the STM32 chips as the control core and a low power sensor module to fulfill environmental data acquisition and geological location monitoring; the LoRa technology was employed to transmit data to the upper monitoring layer, whereby the upper computer administrator performed online monitoring of high-altitude meteorological data. For software design, the TDMA slot allocation protocol was improved to increase data transmission reliability and a dynamically weighted average fusion algorithm was applied to conduct a fusion experiment on data. The connectivity, reliability and operability of the system were validated in the experiment, which is of a positive significance for space weather data acquisition in China.","PeriodicalId":286467,"journal":{"name":"2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131141181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}