首页 > 最新文献

2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)最新文献

英文 中文
Cloud Computing Resource Allocation Considering Link Switching and Computing Resource Borrowing 考虑链路交换和计算资源借用的云计算资源分配
Wei Zhi, Yaowen Ye, Qian Xu, Tigang Jiang
This paper investigates the resource sharing strategy used by different cloud computing tenants, which allows tenants to borrow computing resources from one another as well as exchange high and low-speed data transmission links. We provide a theoretical model of the strategy as well as a resource borrowing and recycling scheme, as well as simulation results. The results show that using this resource borrowing scheme can reduce the business's denial of service rate, queuing time, and overall service time, which is especially beneficial for high-load businesses. This article also found that under this strategy, as the service arrival rate increases, the average time that high- and low-traffic services are directly served by the cloud computing center is not monotonously increasing or monotonically increasing, but presents a concave curve or a convex curve, gradually approaching the state of not using resource borrowing, this is of guiding significance for analyzing the resource borrowing and optimal threshold design of actual cloud computing centers.
本文研究了不同云计算租户使用的资源共享策略,该策略允许租户相互借用计算资源,并交换高速和低速数据传输链路。本文给出了该策略的理论模型和资源借用与回收方案,并给出了仿真结果。结果表明,使用该资源借用方案可以减少企业的拒绝服务率、排队时间和整体服务时间,尤其对高负载企业有利。本文还发现,在该策略下,随着服务到达率的增加,云计算中心直接服务的高流量和低流量服务的平均时间不是单调增加或单调增加,而是呈现凹曲线或凸曲线,逐渐接近不使用资源借用的状态,这对于分析实际云计算中心的资源借用和最优阈值设计具有指导意义。
{"title":"Cloud Computing Resource Allocation Considering Link Switching and Computing Resource Borrowing","authors":"Wei Zhi, Yaowen Ye, Qian Xu, Tigang Jiang","doi":"10.1109/ICNISC57059.2022.00091","DOIUrl":"https://doi.org/10.1109/ICNISC57059.2022.00091","url":null,"abstract":"This paper investigates the resource sharing strategy used by different cloud computing tenants, which allows tenants to borrow computing resources from one another as well as exchange high and low-speed data transmission links. We provide a theoretical model of the strategy as well as a resource borrowing and recycling scheme, as well as simulation results. The results show that using this resource borrowing scheme can reduce the business's denial of service rate, queuing time, and overall service time, which is especially beneficial for high-load businesses. This article also found that under this strategy, as the service arrival rate increases, the average time that high- and low-traffic services are directly served by the cloud computing center is not monotonously increasing or monotonically increasing, but presents a concave curve or a convex curve, gradually approaching the state of not using resource borrowing, this is of guiding significance for analyzing the resource borrowing and optimal threshold design of actual cloud computing centers.","PeriodicalId":286467,"journal":{"name":"2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"151 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134048973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Center Participates in the Design of Typical Scenarios for Power Demand Response 数据中心参与电力需求响应典型场景设计
Q. Tan, Peng Wu, Wei Tang, Yu Zhang
Data centers have high energy consumption and large volume, and have great energy-saving potential. Through the transfer of data load among multiple data centers, the transfer of electric power between regional power grids can be realized. The latest progress of three typical application modes of current data center leasing and value-added services, edge content distribution and computing node joint deployment services, and edge-cloud computing collaborative services are analyzed. The feasibility and necessity of data center participating in demand-side resource scheduling are analyzed, and the preliminary work that needs to be completed in this stage to deeply excavate the adjustment potential of data center to participate in demand response is proposed.
数据中心能耗高、体积大,节能潜力巨大。通过多个数据中心之间的数据负荷传递,可以实现区域电网之间的电力传输。分析了当前数据中心租赁及增值服务、边缘内容分发及计算节点联合部署服务、边缘云计算协同服务三种典型应用模式的最新进展。分析了数据中心参与需求侧资源调度的可行性和必要性,提出了为深度挖掘数据中心参与需求响应的调整潜力,在此阶段需要完成的前期工作。
{"title":"Data Center Participates in the Design of Typical Scenarios for Power Demand Response","authors":"Q. Tan, Peng Wu, Wei Tang, Yu Zhang","doi":"10.1109/icnisc57059.2022.00148","DOIUrl":"https://doi.org/10.1109/icnisc57059.2022.00148","url":null,"abstract":"Data centers have high energy consumption and large volume, and have great energy-saving potential. Through the transfer of data load among multiple data centers, the transfer of electric power between regional power grids can be realized. The latest progress of three typical application modes of current data center leasing and value-added services, edge content distribution and computing node joint deployment services, and edge-cloud computing collaborative services are analyzed. The feasibility and necessity of data center participating in demand-side resource scheduling are analyzed, and the preliminary work that needs to be completed in this stage to deeply excavate the adjustment potential of data center to participate in demand response is proposed.","PeriodicalId":286467,"journal":{"name":"2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133945773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Artificial Bee Colony-Aided UAV Deployment and Relay Communications for Geological Disasters 地质灾害人工蜂群辅助无人机部署与中继通信
Yingjie Tan
Geological disasters cause great threat to people's life and property. Therefore, it is necessary to take close supervise and monitoring to geological disasters to take timely measures. To address this, communication needs to be established between the emergency operation center and the monitoring equipment. Traditional communication mode obviously cannot accomplish this task which is complex and dangerous. Hence, unmanned aerial vehicle (UAV) becomes an ideal choice given its high maneuverability and strong scalability. Considering the factors of cost and security, how to deploy UAVs is a key factor. In this paper, first of all, an optimization model for both minimizing cost and maximizing security is formulated. Moreover, a K-means and depth first search aided-artificial bee colony algorithm (KDFS-ABC) is proposed. Finally, extensive simulation results demonstrate that our proposed model outperforms the sate-of-the-art works in terms of computational complexity and the cost of UAV systems.
地质灾害给人们的生命财产造成了巨大的威胁。因此,有必要对地质灾害进行严密的监督监测,及时采取措施。为了解决这个问题,需要在应急指挥中心和监控设备之间建立通信。传统的通信方式显然无法完成这一复杂而危险的任务。因此,无人机以其高机动性和强大的可扩展性成为理想的选择。考虑到成本和安全因素,如何部署无人机是一个关键因素。本文首先建立了成本最小化和安全性最大化的优化模型。提出了一种k均值深度优先搜索辅助人工蜂群算法(KDFS-ABC)。最后,广泛的仿真结果表明,我们提出的模型在无人机系统的计算复杂性和成本方面优于最先进的作品。
{"title":"Artificial Bee Colony-Aided UAV Deployment and Relay Communications for Geological Disasters","authors":"Yingjie Tan","doi":"10.1109/ICNISC57059.2022.00029","DOIUrl":"https://doi.org/10.1109/ICNISC57059.2022.00029","url":null,"abstract":"Geological disasters cause great threat to people's life and property. Therefore, it is necessary to take close supervise and monitoring to geological disasters to take timely measures. To address this, communication needs to be established between the emergency operation center and the monitoring equipment. Traditional communication mode obviously cannot accomplish this task which is complex and dangerous. Hence, unmanned aerial vehicle (UAV) becomes an ideal choice given its high maneuverability and strong scalability. Considering the factors of cost and security, how to deploy UAVs is a key factor. In this paper, first of all, an optimization model for both minimizing cost and maximizing security is formulated. Moreover, a K-means and depth first search aided-artificial bee colony algorithm (KDFS-ABC) is proposed. Finally, extensive simulation results demonstrate that our proposed model outperforms the sate-of-the-art works in terms of computational complexity and the cost of UAV systems.","PeriodicalId":286467,"journal":{"name":"2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132937933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluating Steel Quality via the Feature Engineering Method 用特征工程方法评价钢材质量
Jie Lin, Li Wan, Shaohong Fang, Hao Chen
Steel's performance is usually tested by a set of evaluation index system and the testing result is issued in formal reports. The reports are difficult to satisfy the steel quality analysis for long-term evaluation from different dimension. To evaluate the strength quality of steel, based on feature engineering method, we identify the data attributes and clean the raw data from steel strength test report first, and then construct the dynamic features of its mean, variance, and coefficient of variation using time window method for different dimension. Finally, integrate the multi-feature evaluation result. Experimental results show that the data definition is no redundancy and by time window dynamic feature the quality evaluation become more flexible for material control and achieve better result effectively.
钢材的性能通常通过一套评价指标体系进行测试,测试结果以正式报告的形式发布。报告难以满足从不同维度对钢材质量进行长期评价的分析。为了评价钢材的强度质量,基于特征工程方法,首先对钢材强度试验报告中的原始数据进行属性识别和清理,然后利用时间窗方法对不同维度构建其均值、方差和变异系数的动态特征。最后,对多特征评价结果进行整合。实验结果表明,数据定义无冗余,利用时间窗的动态特性使质量评价更加灵活,便于材料控制,有效地取得了较好的评价效果。
{"title":"Evaluating Steel Quality via the Feature Engineering Method","authors":"Jie Lin, Li Wan, Shaohong Fang, Hao Chen","doi":"10.1109/ICNISC57059.2022.00123","DOIUrl":"https://doi.org/10.1109/ICNISC57059.2022.00123","url":null,"abstract":"Steel's performance is usually tested by a set of evaluation index system and the testing result is issued in formal reports. The reports are difficult to satisfy the steel quality analysis for long-term evaluation from different dimension. To evaluate the strength quality of steel, based on feature engineering method, we identify the data attributes and clean the raw data from steel strength test report first, and then construct the dynamic features of its mean, variance, and coefficient of variation using time window method for different dimension. Finally, integrate the multi-feature evaluation result. Experimental results show that the data definition is no redundancy and by time window dynamic feature the quality evaluation become more flexible for material control and achieve better result effectively.","PeriodicalId":286467,"journal":{"name":"2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133484634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intrusion Detection Based on Data Privacy in Cloud-Edge Collaborative Computing Using Federated Learning 基于联邦学习的云边缘协同计算中数据隐私的入侵检测
Xiao Zhang, Youhuai Wang, Yong Cai, Yuxiong He, Xiaoming Chen, Shi Jin
The Internet of Things has been integrated into every aspect of our modern life, intelligent IoT services and applications are booming, and massive amounts of data are generated every day, many of which contain private information. However, due to limited resources and limited computing power, IoT networks are vulnerable to various types of attacks. Therefore, it is crucial to protect the IoT network from adversarial attacks. In today's technology, applying deep learning to classify traffic is a very effective method. It also brings a problem. In a general cloud server architecture, training data needs to be transmitted to the cloud for processing and model training. The massive data transmission overhead will bring delays in transmission and response, as well as privacy leakage issues. Federated learning (FL) based on cloud-edge collaborative networks has received considerable attention, an emerging framework for training deep learning models from decentralized data. The system sends deep learning algorithms to all edges (data sources) at the same time, trains partial models at each edge, and aggregates these partial models into a learned overall model. User information is not uploaded to the cloud during the entire process. This paper adopts the federated learning framework to detect and classify network traffic attacks, and effectively protect user privacy data.
物联网已经融入我们现代生活的方方面面,智能物联网服务和应用蓬勃发展,每天都会产生大量数据,其中许多数据包含私人信息。然而,由于有限的资源和有限的计算能力,物联网网络容易受到各种攻击。因此,保护物联网网络免受对抗性攻击至关重要。在当今的技术中,应用深度学习对流量进行分类是一种非常有效的方法。这也带来了一个问题。在一般的云服务器架构中,训练数据需要传输到云端进行处理和模型训练。庞大的数据传输开销会带来传输和响应的延迟,以及隐私泄露问题。基于云边缘协作网络的联邦学习(FL)是一种新兴的从分散数据中训练深度学习模型的框架,受到了广泛的关注。系统将深度学习算法同时发送到所有边缘(数据源),在每个边缘训练部分模型,并将这些部分模型聚合成一个学习的整体模型。在整个过程中,用户信息不会上传到云端。本文采用联邦学习框架对网络流量攻击进行检测和分类,有效保护用户隐私数据。
{"title":"Intrusion Detection Based on Data Privacy in Cloud-Edge Collaborative Computing Using Federated Learning","authors":"Xiao Zhang, Youhuai Wang, Yong Cai, Yuxiong He, Xiaoming Chen, Shi Jin","doi":"10.1109/ICNISC57059.2022.00093","DOIUrl":"https://doi.org/10.1109/ICNISC57059.2022.00093","url":null,"abstract":"The Internet of Things has been integrated into every aspect of our modern life, intelligent IoT services and applications are booming, and massive amounts of data are generated every day, many of which contain private information. However, due to limited resources and limited computing power, IoT networks are vulnerable to various types of attacks. Therefore, it is crucial to protect the IoT network from adversarial attacks. In today's technology, applying deep learning to classify traffic is a very effective method. It also brings a problem. In a general cloud server architecture, training data needs to be transmitted to the cloud for processing and model training. The massive data transmission overhead will bring delays in transmission and response, as well as privacy leakage issues. Federated learning (FL) based on cloud-edge collaborative networks has received considerable attention, an emerging framework for training deep learning models from decentralized data. The system sends deep learning algorithms to all edges (data sources) at the same time, trains partial models at each edge, and aggregates these partial models into a learned overall model. User information is not uploaded to the cloud during the entire process. This paper adopts the federated learning framework to detect and classify network traffic attacks, and effectively protect user privacy data.","PeriodicalId":286467,"journal":{"name":"2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124948377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Practice and Exploration of Conducting Continuous Auditing in the Context of Big Data 大数据背景下持续审计的实践与探索
Yuan Kong, Lunbo Zou, Ling Zhu
In the context of big data, both the thinking and the methodology of auditing are undergoing huge changes. The auditing technology of big data provides new ideas and methods for modern auditing work, and makes it move toward a more predictable, intelligent and timely direction, free from traditional methods of data processing. On the other hand, the constant use and development of continuous auditing technology has adapted to the need for constant innovation in audit thinking in the context of big data. Conducting continuous auditing in the context of big data not only poses challenges to auditing, but also promotes changes in audit management and technology, and lays a solid foundation for conducting intelligent auditing in the future.
在大数据背景下,审计的思维和方法都在发生着巨大的变化。大数据审计技术为现代审计工作提供了新的思路和方法,使其摆脱传统的数据处理方式,朝着更加可预测、智能化、及时性的方向发展。另一方面,持续审计技术的不断使用和发展,也适应了大数据背景下审计思维不断创新的需要。大数据背景下的持续审计不仅对审计提出了挑战,也推动了审计管理和审计技术的变革,为未来的智能审计奠定了坚实的基础。
{"title":"Practice and Exploration of Conducting Continuous Auditing in the Context of Big Data","authors":"Yuan Kong, Lunbo Zou, Ling Zhu","doi":"10.1109/ICNISC57059.2022.00085","DOIUrl":"https://doi.org/10.1109/ICNISC57059.2022.00085","url":null,"abstract":"In the context of big data, both the thinking and the methodology of auditing are undergoing huge changes. The auditing technology of big data provides new ideas and methods for modern auditing work, and makes it move toward a more predictable, intelligent and timely direction, free from traditional methods of data processing. On the other hand, the constant use and development of continuous auditing technology has adapted to the need for constant innovation in audit thinking in the context of big data. Conducting continuous auditing in the context of big data not only poses challenges to auditing, but also promotes changes in audit management and technology, and lays a solid foundation for conducting intelligent auditing in the future.","PeriodicalId":286467,"journal":{"name":"2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"7 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126005034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Prototype System for Electromagnetic Spectrum Management and Control Based on GIS 基于GIS的电磁频谱管理与控制原型系统研究
Deqiang Kong, Baoping Yang, Fen Li
Controlling electromagnetic space has become an important support for the fight for comprehensive control over the battlefield. How to effectively use limited electromagnetic spectrum resources has become a major problem that restricts future operations. The GIS-based electromagnetic spectrum management and control prototype system can provide commanders with spectrum planning and frequency assignment suggestions, and give full play to the combat effectiveness of frequency equipment. First introduced the basic structure of the prototype system and the overview of the command and equipment side; then designed the system composition and the command side workflow of the prototype system; finally, in order to demonstrate the effectiveness of the prototype system, use the border conflict as the background to distinguish the pre-war spectrum The electromagnetic spectrum is managed and controlled in three situations: assignment, suffering from ground-based fixed interference and suffering from space-based mobile interference. Through teaching and training practice, it is helpful to effectively use electromagnetic spectrum resources and avoid intentional interference, and has certain promotion and application value
控制电磁空间已成为战场综合控制作战的重要支撑。如何有效利用有限的电磁频谱资源,已成为制约未来作战的重大问题。基于gis的电磁频谱管理与控制原型系统可以为指挥员提供频谱规划和频率分配建议,充分发挥频率设备的作战效能。首先介绍了原型系统的基本结构和指挥与装备侧概述;然后设计了原型系统的系统组成和命令端工作流程;最后,为了验证原型系统的有效性,以边界冲突为背景对战前频谱进行区分,在分配、受到地面固定干扰和受到天基移动干扰三种情况下对电磁频谱进行管理和控制。通过教学和培训实践,有助于有效利用电磁频谱资源,避免故意干扰,具有一定的推广应用价值
{"title":"Research on Prototype System for Electromagnetic Spectrum Management and Control Based on GIS","authors":"Deqiang Kong, Baoping Yang, Fen Li","doi":"10.1109/ICNISC57059.2022.00156","DOIUrl":"https://doi.org/10.1109/ICNISC57059.2022.00156","url":null,"abstract":"Controlling electromagnetic space has become an important support for the fight for comprehensive control over the battlefield. How to effectively use limited electromagnetic spectrum resources has become a major problem that restricts future operations. The GIS-based electromagnetic spectrum management and control prototype system can provide commanders with spectrum planning and frequency assignment suggestions, and give full play to the combat effectiveness of frequency equipment. First introduced the basic structure of the prototype system and the overview of the command and equipment side; then designed the system composition and the command side workflow of the prototype system; finally, in order to demonstrate the effectiveness of the prototype system, use the border conflict as the background to distinguish the pre-war spectrum The electromagnetic spectrum is managed and controlled in three situations: assignment, suffering from ground-based fixed interference and suffering from space-based mobile interference. Through teaching and training practice, it is helpful to effectively use electromagnetic spectrum resources and avoid intentional interference, and has certain promotion and application value","PeriodicalId":286467,"journal":{"name":"2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127695253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed Music Comments Mining System Based on BGLL Algorithm 基于BGLL算法的分布式音乐评论挖掘系统
Y. Peng, Chengzhang Qu
This paper aims to establish a distributed music comments mining system based on BGLL algorithm. With the massive music resource and users of NetEase Cloud Music, our system employs big data technology and machine learning technology to analyze data from the perspective of comments, discover users' attitudes towards the song or the music. The whole system is built based on the Hadoop ecosystem, and it includes four main modules: data acquisition, data storage, data analysis, and data visualization. A python based web crawler is used for data acquisition on NetEase Cloud Music resource, then the distributed HDFS system is built for data processing and analyzing. A refined mining algorithm based on BGLL is implemented for topic mining procedure. At last, a word cloud map is generated based on javaweb technology. Experiments show that our system can perfome well on the comment topic mining application, due to the distributed architecture, our system has a potential capability on dealing with large scale of data.
本文旨在建立一个基于BGLL算法的分布式音乐评论挖掘系统。我们的系统借助网易云音乐庞大的音乐资源和用户,采用大数据技术和机器学习技术,从评论的角度分析数据,发现用户对歌曲或音乐的态度。整个系统基于Hadoop生态系统构建,包括数据采集、数据存储、数据分析、数据可视化四个主要模块。利用基于python的网络爬虫对网易云音乐资源进行数据采集,构建分布式HDFS系统对数据进行处理和分析。在主题挖掘过程中,实现了一种基于BGLL的改进挖掘算法。最后,基于javaweb技术生成了一个词云图。实验表明,我们的系统在评论主题挖掘应用中表现良好,由于分布式架构,我们的系统具有处理大规模数据的潜在能力。
{"title":"Distributed Music Comments Mining System Based on BGLL Algorithm","authors":"Y. Peng, Chengzhang Qu","doi":"10.1109/ICNISC57059.2022.00058","DOIUrl":"https://doi.org/10.1109/ICNISC57059.2022.00058","url":null,"abstract":"This paper aims to establish a distributed music comments mining system based on BGLL algorithm. With the massive music resource and users of NetEase Cloud Music, our system employs big data technology and machine learning technology to analyze data from the perspective of comments, discover users' attitudes towards the song or the music. The whole system is built based on the Hadoop ecosystem, and it includes four main modules: data acquisition, data storage, data analysis, and data visualization. A python based web crawler is used for data acquisition on NetEase Cloud Music resource, then the distributed HDFS system is built for data processing and analyzing. A refined mining algorithm based on BGLL is implemented for topic mining procedure. At last, a word cloud map is generated based on javaweb technology. Experiments show that our system can perfome well on the comment topic mining application, due to the distributed architecture, our system has a potential capability on dealing with large scale of data.","PeriodicalId":286467,"journal":{"name":"2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121069107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of Video Codec Platform Based on PowerPC+WW602 Architecture 基于PowerPC+WW602架构的视频编解码平台设计
Yulin Zhou
In order to meet the needs of dual-channel high-resolution video encoding and decoding, as well as the need for long-term capture and recording of operating terminal screen information in important control scenarios such as shipborne, vehicle-mounted, and airborne, it is convenient for post-event technical analysis, service quality assessment, and exercises. Deduction and determination of responsibility for operation accidents. The hardware architecture of PowerPC+WW602 is researched, and a platform that supports dual-channel high-definition video encoding and decoding is designed and implemented. The compression algorithm of H.264 encoding standard is used to realize the encoding and decoding of video data, and advanced and mature technology is used to follow the generalization. The video codec platform design based on PowerPC+WW602 architecture can support single-channel or dual-channel video input of high-definition and standard-definition, and realize the codec transmission of two channels of video information. The delay of video capture and display is within 30ms, the picture is clear, and the video capture process is not lost.
为满足双通道高分辨率视频编解码需求,以及船载、车载、机载等重要控制场景下操作终端屏幕信息的长期采集和记录需求,便于事后技术分析、服务质量评估和演练。生产事故责任的推演和确定。研究了PowerPC+WW602的硬件架构,设计并实现了一个支持双通道高清视频编解码的平台。采用H.264编码标准的压缩算法实现视频数据的编解码,并采用先进成熟的技术进行推广。基于PowerPC+WW602架构的视频编解码平台设计,可以支持高清和标清的单路或双路视频输入,实现两路视频信息的编解码传输。视频采集和显示延时在30ms以内,画面清晰,视频采集过程不丢失。
{"title":"Design of Video Codec Platform Based on PowerPC+WW602 Architecture","authors":"Yulin Zhou","doi":"10.1109/ICNISC57059.2022.00013","DOIUrl":"https://doi.org/10.1109/ICNISC57059.2022.00013","url":null,"abstract":"In order to meet the needs of dual-channel high-resolution video encoding and decoding, as well as the need for long-term capture and recording of operating terminal screen information in important control scenarios such as shipborne, vehicle-mounted, and airborne, it is convenient for post-event technical analysis, service quality assessment, and exercises. Deduction and determination of responsibility for operation accidents. The hardware architecture of PowerPC+WW602 is researched, and a platform that supports dual-channel high-definition video encoding and decoding is designed and implemented. The compression algorithm of H.264 encoding standard is used to realize the encoding and decoding of video data, and advanced and mature technology is used to follow the generalization. The video codec platform design based on PowerPC+WW602 architecture can support single-channel or dual-channel video input of high-definition and standard-definition, and realize the codec transmission of two channels of video information. The delay of video capture and display is within 30ms, the picture is clear, and the video capture process is not lost.","PeriodicalId":286467,"journal":{"name":"2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114262536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Load Aggregation Commercial Electricity Prediction Method Supporting User Privacy Protection 一种支持用户隐私保护的负荷聚合商业电力预测方法
Hao Wu, Yiyun Wang, Weijian Wu, Ying Chen, Aoying Chen
With the development of the power industry, the number of two-way interactive power consumption units continues to increase, and the burden of power distribution on the grid continues to increase. The load aggregator is located between the power grid and the power consumption unit, and represents a certain range of users to request power from the power grid, and then performs power distribution and real-time scheduling to users, reducing the burden on the power grid. To better respond to the demand of electricity consumers, machine learning is used in electricity forecasting. However, the training data comes from power users, which will involve privacy protection issues. To this end, this paper proposes a load aggregator power prediction method that supports user privacy protection. This method can take into account the influence of user-related fixed factors and time-related variable factors on power consumption. The load aggregator is the aggregator. There is no need for power users to share their own data, and the necessary model parameters are passed to the load aggregator only when needed, and it can still be carried out for some participants without labels. Finally, the proposed method is evaluated through experiments, and the results show that the method in this paper can effectively protect user privacy, and has a considerable accuracy compared with the existing machine learning methods that do not protect privacy.
随着电力工业的发展,双向交互用电机组数量不断增加,电网配电负担不断加重。负荷聚合器位于电网和用电单元之间,代表一定范围的用户向电网请求用电,然后对用户进行配电和实时调度,减轻电网负担。为了更好地响应电力消费者的需求,机器学习被用于电力预测。然而,训练数据来自高级用户,这将涉及隐私保护问题。为此,本文提出了一种支持用户隐私保护的负载聚合器功率预测方法。该方法可以兼顾与用户相关的固定因素和与时间相关的可变因素对功耗的影响。负载聚合器就是聚合器。高级用户不需要共享自己的数据,只在需要时才将必要的模型参数传递给负载聚合器,对于一些没有标签的参与者仍然可以执行。最后,通过实验对所提出的方法进行了评估,结果表明本文方法能够有效地保护用户隐私,与现有不保护隐私的机器学习方法相比,具有相当的准确性。
{"title":"A Load Aggregation Commercial Electricity Prediction Method Supporting User Privacy Protection","authors":"Hao Wu, Yiyun Wang, Weijian Wu, Ying Chen, Aoying Chen","doi":"10.1109/ICNISC57059.2022.00107","DOIUrl":"https://doi.org/10.1109/ICNISC57059.2022.00107","url":null,"abstract":"With the development of the power industry, the number of two-way interactive power consumption units continues to increase, and the burden of power distribution on the grid continues to increase. The load aggregator is located between the power grid and the power consumption unit, and represents a certain range of users to request power from the power grid, and then performs power distribution and real-time scheduling to users, reducing the burden on the power grid. To better respond to the demand of electricity consumers, machine learning is used in electricity forecasting. However, the training data comes from power users, which will involve privacy protection issues. To this end, this paper proposes a load aggregator power prediction method that supports user privacy protection. This method can take into account the influence of user-related fixed factors and time-related variable factors on power consumption. The load aggregator is the aggregator. There is no need for power users to share their own data, and the necessary model parameters are passed to the load aggregator only when needed, and it can still be carried out for some participants without labels. Finally, the proposed method is evaluated through experiments, and the results show that the method in this paper can effectively protect user privacy, and has a considerable accuracy compared with the existing machine learning methods that do not protect privacy.","PeriodicalId":286467,"journal":{"name":"2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123109283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1