Pub Date : 2022-02-01DOI: 10.1109/ICTech55460.2022.00086
Zhiyun He, Zhenyu Yin, Anying Chai, Zhiying Bi
The technology of “intelligent manufacturing” has been developing rapidly in recent years. The intelligent production line, as the bearer of “intelligent manufacturing”, has promoted the intelligent development of the manufacturing field. However, in the process of intelligent production line operation and maintenance, the sensing data will change with the change of equipment status. Only by accurately identifying abnormal data and prioritizing its transmission to the monitoring equipment can we quickly sense the status of the equipment and make its maintenance plan. Aiming at the problems of high parameter sensitivity and influence by the shape of data samples when we use traditional clustering algorithms to identify abnormal data, this paper proposes a hierarchical clustering algorithm H-DBSCAN for anomaly detection on intelligent production lines. The algorithm is based on the KNN algorithm to obtain the optimal parameters to reduce the parameter sensitivity. And the multi-density clustering of data is accomplished by using multi-layer density for noise clustering with a reasonable fusion of small clusters of linked weights. The experimental results show that the H-DBSCAN algorithm can reduce the influence of input parameters and sample distribution on clustering results, maximize the accuracy of clustering, meet the needs of intelligent production lines for efficient detection of abnormal data, and achieve full automation of data analysis.
{"title":"Hierarchical Clustering Algorithm for Anomaly Detection on Intelligent Production Line","authors":"Zhiyun He, Zhenyu Yin, Anying Chai, Zhiying Bi","doi":"10.1109/ICTech55460.2022.00086","DOIUrl":"https://doi.org/10.1109/ICTech55460.2022.00086","url":null,"abstract":"The technology of “intelligent manufacturing” has been developing rapidly in recent years. The intelligent production line, as the bearer of “intelligent manufacturing”, has promoted the intelligent development of the manufacturing field. However, in the process of intelligent production line operation and maintenance, the sensing data will change with the change of equipment status. Only by accurately identifying abnormal data and prioritizing its transmission to the monitoring equipment can we quickly sense the status of the equipment and make its maintenance plan. Aiming at the problems of high parameter sensitivity and influence by the shape of data samples when we use traditional clustering algorithms to identify abnormal data, this paper proposes a hierarchical clustering algorithm H-DBSCAN for anomaly detection on intelligent production lines. The algorithm is based on the KNN algorithm to obtain the optimal parameters to reduce the parameter sensitivity. And the multi-density clustering of data is accomplished by using multi-layer density for noise clustering with a reasonable fusion of small clusters of linked weights. The experimental results show that the H-DBSCAN algorithm can reduce the influence of input parameters and sample distribution on clustering results, maximize the accuracy of clustering, meet the needs of intelligent production lines for efficient detection of abnormal data, and achieve full automation of data analysis.","PeriodicalId":290836,"journal":{"name":"2022 11th International Conference of Information and Communication Technology (ICTech))","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134606265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-01DOI: 10.1109/ICTech55460.2022.00031
Xinpeng Dong, Bihui Yu, Huajun Sun
To solve the problem of long execution time of SPARQL query statements in current large-scale RDF, this paper proposes a query statement optimization based on heuristic LKH algorithm, and optimizes query statements according to different shapes. Finally, experiments are carried out based on Apache Jena ARQ query engine. Comparative experimental results show that, This method has a good optimization effect on a wide range of query statements, and a good optimization effect on the query statements with a significant number of triplet patterns, and the optimization effect is stable.
{"title":"Design and Implementation of SPARQL Engine Based on Heuristic Algorithm","authors":"Xinpeng Dong, Bihui Yu, Huajun Sun","doi":"10.1109/ICTech55460.2022.00031","DOIUrl":"https://doi.org/10.1109/ICTech55460.2022.00031","url":null,"abstract":"To solve the problem of long execution time of SPARQL query statements in current large-scale RDF, this paper proposes a query statement optimization based on heuristic LKH algorithm, and optimizes query statements according to different shapes. Finally, experiments are carried out based on Apache Jena ARQ query engine. Comparative experimental results show that, This method has a good optimization effect on a wide range of query statements, and a good optimization effect on the query statements with a significant number of triplet patterns, and the optimization effect is stable.","PeriodicalId":290836,"journal":{"name":"2022 11th International Conference of Information and Communication Technology (ICTech))","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114380217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-01DOI: 10.1109/ICTech55460.2022.00028
Xuefan Li, R. Tang, Wei Song
Network intrusion detection technology plays an important role in maintaining network security, the main work is to continuously detect the current network status, through the detection of abnormal behavior in the network state, timely warning to alert network managers. The timeliness and accuracy of the intrusion detection system(IDS) is critical to the availability and reliability of the current network. In response to the problems of high false alarm rate, low detection efficiency and limited functions commonly found in IDS, this paper first investigates the application of deep learning techniques to the field of network intrusion detection. With the ability of deep learning algorithms to automatically extract features from intrusion data and avoid the work of manually screening features, an intrusion detection method based on improved convolution neural networks is then proposed. The method is improved by introducing Inception module for optimal intrusion feature extraction based on the traditional convolution neural network. The inception module employs a parallel convolution structure with different filters, using convolution kernels of different sizes on each convolution line for multiple layer-by-layer operations and The various features of network intrusions in the data set are identified and clustered by means of stacking.
{"title":"Intrusion Detection System Using Improved Convolution Neural Network","authors":"Xuefan Li, R. Tang, Wei Song","doi":"10.1109/ICTech55460.2022.00028","DOIUrl":"https://doi.org/10.1109/ICTech55460.2022.00028","url":null,"abstract":"Network intrusion detection technology plays an important role in maintaining network security, the main work is to continuously detect the current network status, through the detection of abnormal behavior in the network state, timely warning to alert network managers. The timeliness and accuracy of the intrusion detection system(IDS) is critical to the availability and reliability of the current network. In response to the problems of high false alarm rate, low detection efficiency and limited functions commonly found in IDS, this paper first investigates the application of deep learning techniques to the field of network intrusion detection. With the ability of deep learning algorithms to automatically extract features from intrusion data and avoid the work of manually screening features, an intrusion detection method based on improved convolution neural networks is then proposed. The method is improved by introducing Inception module for optimal intrusion feature extraction based on the traditional convolution neural network. The inception module employs a parallel convolution structure with different filters, using convolution kernels of different sizes on each convolution line for multiple layer-by-layer operations and The various features of network intrusions in the data set are identified and clustered by means of stacking.","PeriodicalId":290836,"journal":{"name":"2022 11th International Conference of Information and Communication Technology (ICTech))","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116060600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-01DOI: 10.1109/ICTech55460.2022.00019
Lianpo Li, Wenjiang Wu, Yifan Hu
In order to improve the efficiency of flexible job workshop scheduling and production with the goal of maximum completion time, this paper analyzes the encoding and decoding methods of genetic algorithm, the method of population initialization, and sets the corresponding genetic operator parameters. Use prohibited search algorithm which rely on the initial solution to eliminate repetitive work and jump out of the local optimal solution. Firstly, the initial population uses genetic algorithm to search in the global solution space quickly and parallelly. After the iteration ends, prohibited conditions are set in the local region to search again. The hybrid genetic prohibited search algorithm is used to test benchmark sample data, and the results show that the algorithm can reduce the shop completion time within the specified number of iterations, which verifies the feasibility of the algorithm.
{"title":"Research on Flexible Job Scheduling Based on Genetic Prohibited Search Algorithm","authors":"Lianpo Li, Wenjiang Wu, Yifan Hu","doi":"10.1109/ICTech55460.2022.00019","DOIUrl":"https://doi.org/10.1109/ICTech55460.2022.00019","url":null,"abstract":"In order to improve the efficiency of flexible job workshop scheduling and production with the goal of maximum completion time, this paper analyzes the encoding and decoding methods of genetic algorithm, the method of population initialization, and sets the corresponding genetic operator parameters. Use prohibited search algorithm which rely on the initial solution to eliminate repetitive work and jump out of the local optimal solution. Firstly, the initial population uses genetic algorithm to search in the global solution space quickly and parallelly. After the iteration ends, prohibited conditions are set in the local region to search again. The hybrid genetic prohibited search algorithm is used to test benchmark sample data, and the results show that the algorithm can reduce the shop completion time within the specified number of iterations, which verifies the feasibility of the algorithm.","PeriodicalId":290836,"journal":{"name":"2022 11th International Conference of Information and Communication Technology (ICTech))","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116711370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-01DOI: 10.1109/ICTech55460.2022.00106
Haihao Zhang, Yihuan Su, Hongsheng Liu, Longtao Wang
Wechat applets can be “within reach” and “go after use”. People don't need to worry about the storage capacity caused by installing too many mobile applications. Therefore, wechat applets can be everywhere and available at any time. In the process of college life, students' demand for books changes greatly. From freshman to senior, students accumulate a lot of teaching materials. Some graduates even accumulate hundreds of books when they graduate, but they can't deal with them and can only be discarded. At present, there is no suitable sharing platform or channel in colleges and universities to deal with these books, As a result, many valuable books are discarded as garbage, and the waste is very serious. In addition, the books purchased on the e-commerce platform are often of mixed quality and high price, which makes it very inconvenient for college students to use teaching materials and difficult to meet the diversified needs of college students.
{"title":"Design and Implementation of Shared Book System Based on Wechat Applet","authors":"Haihao Zhang, Yihuan Su, Hongsheng Liu, Longtao Wang","doi":"10.1109/ICTech55460.2022.00106","DOIUrl":"https://doi.org/10.1109/ICTech55460.2022.00106","url":null,"abstract":"Wechat applets can be “within reach” and “go after use”. People don't need to worry about the storage capacity caused by installing too many mobile applications. Therefore, wechat applets can be everywhere and available at any time. In the process of college life, students' demand for books changes greatly. From freshman to senior, students accumulate a lot of teaching materials. Some graduates even accumulate hundreds of books when they graduate, but they can't deal with them and can only be discarded. At present, there is no suitable sharing platform or channel in colleges and universities to deal with these books, As a result, many valuable books are discarded as garbage, and the waste is very serious. In addition, the books purchased on the e-commerce platform are often of mixed quality and high price, which makes it very inconvenient for college students to use teaching materials and difficult to meet the diversified needs of college students.","PeriodicalId":290836,"journal":{"name":"2022 11th International Conference of Information and Communication Technology (ICTech))","volume":"603 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134483570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-01DOI: 10.1109/ICTech55460.2022.00012
Guangyi Wang, Lu Li, JingJuan Fan, Songyun Shi, Yi Xu, Yuan Wang
Nowadays, the number of visually impaired people is increasing day by day. On average, one in every 100 people is blind. At the same time, due to the imperfect establishment of social barrier-free facilities, it is very difficult for the blind travelling, which seriously affects the degree of social participation of the blind. This paper introduces a blind guide method based on the Internet of Things and collaborative perception. Coordinate through the long-distance of digital map (eg. Google Maps) and the local navigation mode of the blind guide device to realize an active guide system for the blind. This method can effectively assist the blind to cope with the complex traffic environment and thus perceive the world.
{"title":"Active Guide System for The Blind Based on The Internet of Things and Collaborative Perception","authors":"Guangyi Wang, Lu Li, JingJuan Fan, Songyun Shi, Yi Xu, Yuan Wang","doi":"10.1109/ICTech55460.2022.00012","DOIUrl":"https://doi.org/10.1109/ICTech55460.2022.00012","url":null,"abstract":"Nowadays, the number of visually impaired people is increasing day by day. On average, one in every 100 people is blind. At the same time, due to the imperfect establishment of social barrier-free facilities, it is very difficult for the blind travelling, which seriously affects the degree of social participation of the blind. This paper introduces a blind guide method based on the Internet of Things and collaborative perception. Coordinate through the long-distance of digital map (eg. Google Maps) and the local navigation mode of the blind guide device to realize an active guide system for the blind. This method can effectively assist the blind to cope with the complex traffic environment and thus perceive the world.","PeriodicalId":290836,"journal":{"name":"2022 11th International Conference of Information and Communication Technology (ICTech))","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132812412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-01DOI: 10.1109/ICTech55460.2022.00112
Jian Sun, Jiajin Bao, Liping Bu
In the past decades, the speed development of the Web and a large amount of data published through the Web have made it the largest public data source in the world. The network has become a carrier of massive information. How to efficiently classify text for the acquired massive information is a hot issue of current research. The traditional machine learning algorithms for text classification have many disadvantages such as inconspicuous text features, long training period and loss of word order. This article puts forward a BERT model based method for technology information text auto-Categoriz to improve the accuracy text classification of science and technology information. The results suggest that the using method has significantly improved accuracy, recall and fl_score, and has a good Chinese text classification effect.
{"title":"Text Classification Algorithm Based on TF-IDF and BERT","authors":"Jian Sun, Jiajin Bao, Liping Bu","doi":"10.1109/ICTech55460.2022.00112","DOIUrl":"https://doi.org/10.1109/ICTech55460.2022.00112","url":null,"abstract":"In the past decades, the speed development of the Web and a large amount of data published through the Web have made it the largest public data source in the world. The network has become a carrier of massive information. How to efficiently classify text for the acquired massive information is a hot issue of current research. The traditional machine learning algorithms for text classification have many disadvantages such as inconspicuous text features, long training period and loss of word order. This article puts forward a BERT model based method for technology information text auto-Categoriz to improve the accuracy text classification of science and technology information. The results suggest that the using method has significantly improved accuracy, recall and fl_score, and has a good Chinese text classification effect.","PeriodicalId":290836,"journal":{"name":"2022 11th International Conference of Information and Communication Technology (ICTech))","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130530515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-01DOI: 10.1109/ICTech55460.2022.00075
Shuya Peng, R. Cheng, Ziheng Dai
C4 olefins are widely used. Ethanol is a clean energy for the preparation of C4 olefins. It is of great practical significance to study the preparation of C4 olefins by ethanol. However, different regulation conditions have different ethanol conversion and C4 olefin selectivity in the current C4 olefin preparation process, which affects the industrial production efficiency. In this paper, the effects of different initial conditions and temperatures on the preparation of C4 olefins from ethanol were studied by means of least square fitting and Spearman correlation coefficient. For the relationship between ethanol conversion[1], C4 olefin selectivity and temperature, firstly, taking temperature as independent variable and ethanol conversion and C4 olefin selectivity as dependent variable, the equation is obtained by least square fitting, and then combined with the Spearman correlation coefficient of temperature, conversion and selectivity, it is found that the conversion and selectivity increase with the increase of temperature. It was found that the yield of C4 olefins decreased with the increase of reaction time. Then, the effects of combination and temperature on ethanol conversion and C4 olefin selectivity were analyzed by combining random forest regression algorithm and Spearman correlation coefficient. It was found that temperature had an important effect on the conversion of ethanol and the selectivity of C4 olefins[2]; Through the latter, the direction of influence is judged. It is found that the increase of temperature promotes the reaction, and the increase of ethanol concentration will affect the ethanol conversion and C4 olefin selectivity, but the loading mode has no effect on both.
{"title":"Study on Ethanol Coupling Reaction Based on Regression Algorithm and Spearman Rank Correlation Coefficient","authors":"Shuya Peng, R. Cheng, Ziheng Dai","doi":"10.1109/ICTech55460.2022.00075","DOIUrl":"https://doi.org/10.1109/ICTech55460.2022.00075","url":null,"abstract":"C4 olefins are widely used. Ethanol is a clean energy for the preparation of C4 olefins. It is of great practical significance to study the preparation of C4 olefins by ethanol. However, different regulation conditions have different ethanol conversion and C4 olefin selectivity in the current C4 olefin preparation process, which affects the industrial production efficiency. In this paper, the effects of different initial conditions and temperatures on the preparation of C4 olefins from ethanol were studied by means of least square fitting and Spearman correlation coefficient. For the relationship between ethanol conversion[1], C4 olefin selectivity and temperature, firstly, taking temperature as independent variable and ethanol conversion and C4 olefin selectivity as dependent variable, the equation is obtained by least square fitting, and then combined with the Spearman correlation coefficient of temperature, conversion and selectivity, it is found that the conversion and selectivity increase with the increase of temperature. It was found that the yield of C4 olefins decreased with the increase of reaction time. Then, the effects of combination and temperature on ethanol conversion and C4 olefin selectivity were analyzed by combining random forest regression algorithm and Spearman correlation coefficient. It was found that temperature had an important effect on the conversion of ethanol and the selectivity of C4 olefins[2]; Through the latter, the direction of influence is judged. It is found that the increase of temperature promotes the reaction, and the increase of ethanol concentration will affect the ethanol conversion and C4 olefin selectivity, but the loading mode has no effect on both.","PeriodicalId":290836,"journal":{"name":"2022 11th International Conference of Information and Communication Technology (ICTech))","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125659401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-01DOI: 10.1109/ICTech55460.2022.00021
Daiwen Wu
In this paper., a mature three-tier architecture based on B/S mode is adopted., and the Web technologies of jqgrid., layui., jQuery., PHP and MySQL is used to design and realize the professional titles evaluation system., which realizes the function modules of scientific research achievements management., teaching achievements management., Professional titles evaluation management and peer review. Under the current background of “breaking five principles”., the peer review module designed by the system can help colleges and universities evaluate teachers' scientific research and teaching achievements objectively and fairly., and colleges and universities can refer to the results of peer review in the promotion of teachers' professional titles. This system has been put into use in some colleges and universities., and has certain application innovation and promotion value.
{"title":"Professional Titles Evaluation System Based on PHP and MySQL","authors":"Daiwen Wu","doi":"10.1109/ICTech55460.2022.00021","DOIUrl":"https://doi.org/10.1109/ICTech55460.2022.00021","url":null,"abstract":"In this paper., a mature three-tier architecture based on B/S mode is adopted., and the Web technologies of jqgrid., layui., jQuery., PHP and MySQL is used to design and realize the professional titles evaluation system., which realizes the function modules of scientific research achievements management., teaching achievements management., Professional titles evaluation management and peer review. Under the current background of “breaking five principles”., the peer review module designed by the system can help colleges and universities evaluate teachers' scientific research and teaching achievements objectively and fairly., and colleges and universities can refer to the results of peer review in the promotion of teachers' professional titles. This system has been put into use in some colleges and universities., and has certain application innovation and promotion value.","PeriodicalId":290836,"journal":{"name":"2022 11th International Conference of Information and Communication Technology (ICTech))","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126195620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-01DOI: 10.1109/ICTech55460.2022.00018
Jinshan Feng, Pin Wang
According to actual needs and real-time embedded Ethernet communication, put forward a kind of by transplantation Lwip protocol stack to achieve Ethernet communication, the method of hierarchical structure clear and easy to maintain, using DMA interrupt request, realizes the Ethernet data transmission, and on this basis to optimize network communication and by adding a core layer within the Lwip priority waiting queue, The original equal data processing has been changed to give priority to processing the data in the waiting queue, and then to processing the ordinary data, so that the data processing is more flexible. The experimental test runs stably and reliably, which not only meets the security standards of the system, but also meets the requirements of embedded real-time communication.
{"title":"Implementation and Real-Time Optimization of Lwip Stack Based on AM3354 UCOS-II","authors":"Jinshan Feng, Pin Wang","doi":"10.1109/ICTech55460.2022.00018","DOIUrl":"https://doi.org/10.1109/ICTech55460.2022.00018","url":null,"abstract":"According to actual needs and real-time embedded Ethernet communication, put forward a kind of by transplantation Lwip protocol stack to achieve Ethernet communication, the method of hierarchical structure clear and easy to maintain, using DMA interrupt request, realizes the Ethernet data transmission, and on this basis to optimize network communication and by adding a core layer within the Lwip priority waiting queue, The original equal data processing has been changed to give priority to processing the data in the waiting queue, and then to processing the ordinary data, so that the data processing is more flexible. The experimental test runs stably and reliably, which not only meets the security standards of the system, but also meets the requirements of embedded real-time communication.","PeriodicalId":290836,"journal":{"name":"2022 11th International Conference of Information and Communication Technology (ICTech))","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130073759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}