Pub Date : 2019-11-01DOI: 10.1109/IICSPI48186.2019.9095897
Jing Li, Xuan Wu
Given an undirected graph, one start point and one end point belong to this graph, and nonnegative groups of weights for each edge, we consider the problem of finding a path that has lowest total cost with respect to cost weight and has constrained budget with respect to constrains weight [9]. Different from the traditional Lagrangean relaxation method, we proposed a new parameter space searching method for solving the multi-constrained shortest path problem (MCSP) in this paper. For this newly proposed method all the solutions found are in the original problem’s feasible region, there is no need to do the hard work to close the gap between the original problem and its Lagrangean relaxation. The proposed algorithm is very easy to parallelize, and can take full advantage of multi-core multi-thread processors to improve problem solving efficiency. For most optimization algorithms, properly selecting the super parameters is not an easy work. Through multi-rounds computer numerical simulation with different super parameters, we can see that our algorithm is robust to super parameters.
{"title":"Constrained Shortest Path by Parameter Searching","authors":"Jing Li, Xuan Wu","doi":"10.1109/IICSPI48186.2019.9095897","DOIUrl":"https://doi.org/10.1109/IICSPI48186.2019.9095897","url":null,"abstract":"Given an undirected graph, one start point and one end point belong to this graph, and nonnegative groups of weights for each edge, we consider the problem of finding a path that has lowest total cost with respect to cost weight and has constrained budget with respect to constrains weight [9]. Different from the traditional Lagrangean relaxation method, we proposed a new parameter space searching method for solving the multi-constrained shortest path problem (MCSP) in this paper. For this newly proposed method all the solutions found are in the original problem’s feasible region, there is no need to do the hard work to close the gap between the original problem and its Lagrangean relaxation. The proposed algorithm is very easy to parallelize, and can take full advantage of multi-core multi-thread processors to improve problem solving efficiency. For most optimization algorithms, properly selecting the super parameters is not an easy work. Through multi-rounds computer numerical simulation with different super parameters, we can see that our algorithm is robust to super parameters.","PeriodicalId":318693,"journal":{"name":"2019 2nd International Conference on Safety Produce Informatization (IICSPI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130668295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/IICSPI48186.2019.9095888
Xiao Liu, R. Xie, Guozhen Shi, Kaishi Guo
Cloud storage for massive small files has become the trend of data storage in network cloud environment. How to ensure small files meet user needs and secure storage is a major challenge in cloud storage research. Aiming at the above challenges, this paper improves the existing FastDFS system, divides the storage space into four levels, and stores different levels according to the user's account level, thus solving the problem of user demand. In order to improve the efficiency of file reading and writing, this paper puts forward the placement strategy of massive small files and the selection of small file retrieval algorithm. Through MD5 algorithm, a secondary index is established to make files easier to store. Theoretical analysis shows the security and performance of the system, which solves the problem of access security of massive small files in cloud storage, and effectively improves the efficiency of reading and writing under the premise of ensuring security.
{"title":"Research and improvement of cloud storage for massive small files","authors":"Xiao Liu, R. Xie, Guozhen Shi, Kaishi Guo","doi":"10.1109/IICSPI48186.2019.9095888","DOIUrl":"https://doi.org/10.1109/IICSPI48186.2019.9095888","url":null,"abstract":"Cloud storage for massive small files has become the trend of data storage in network cloud environment. How to ensure small files meet user needs and secure storage is a major challenge in cloud storage research. Aiming at the above challenges, this paper improves the existing FastDFS system, divides the storage space into four levels, and stores different levels according to the user's account level, thus solving the problem of user demand. In order to improve the efficiency of file reading and writing, this paper puts forward the placement strategy of massive small files and the selection of small file retrieval algorithm. Through MD5 algorithm, a secondary index is established to make files easier to store. Theoretical analysis shows the security and performance of the system, which solves the problem of access security of massive small files in cloud storage, and effectively improves the efficiency of reading and writing under the premise of ensuring security.","PeriodicalId":318693,"journal":{"name":"2019 2nd International Conference on Safety Produce Informatization (IICSPI)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132077256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/IICSPI48186.2019.9095944
Dexian Chang, Wanzhong Sun, Yingjie Yang
In order to improve the security of SDN, a proactive defense mechanism based on encrypted IP address transformation is proposed in this paper. The IP address protection method based on cryptographic transformation is designed to ensure the confusion of the source addresses of both senders and receivers. An effective key update method is designed to improve the randomness of the encryption transformation process. Based on the long prefix of IPv6, a new method of constructing IPv6 data packet with encrypted IPv4 address is proposed. Finally, P4 language is used to simulate the function of address protection and data forwarding in data layer. The evaluation results of the prototype system based on P4 language show that the proposed scheme can proactively defense the DoS attack, without significant performance degradation.
{"title":"A SDN Proactive Defense Mechanism Based on IP Transformation","authors":"Dexian Chang, Wanzhong Sun, Yingjie Yang","doi":"10.1109/IICSPI48186.2019.9095944","DOIUrl":"https://doi.org/10.1109/IICSPI48186.2019.9095944","url":null,"abstract":"In order to improve the security of SDN, a proactive defense mechanism based on encrypted IP address transformation is proposed in this paper. The IP address protection method based on cryptographic transformation is designed to ensure the confusion of the source addresses of both senders and receivers. An effective key update method is designed to improve the randomness of the encryption transformation process. Based on the long prefix of IPv6, a new method of constructing IPv6 data packet with encrypted IPv4 address is proposed. Finally, P4 language is used to simulate the function of address protection and data forwarding in data layer. The evaluation results of the prototype system based on P4 language show that the proposed scheme can proactively defense the DoS attack, without significant performance degradation.","PeriodicalId":318693,"journal":{"name":"2019 2nd International Conference on Safety Produce Informatization (IICSPI)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123131159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/IICSPI48186.2019.9095914
Quan Yu, Weina Yang
With the expansion of the scale of universities, the consumption of experimental consumables has also increased correspondingly. The existing general experimental management system cannot meet the needs of individuation, networking and intelligence. Using the advantages of Django technology and QR code technology, and Django MVC open source framework, the special lightweight material WEB system for low-value consumables information management system was designed to realize the network of online and offline inventory information synchronization network and resource sharing. The hierarchical structure is divided by MVC architecture, and the problem of code bloat in system development with the increase of code volume is solved, so as to enhance the high cohesion of the system and reduce the coupling. After being run and tested, the system runs stably and reliably, which improves the management efficiency of low value consumables, reduces the waste of consumables, and the management of the economic value of consumables is fulfilled.
{"title":"The Analysis and Design of System of Experimental Consumables Based on Django and QR code","authors":"Quan Yu, Weina Yang","doi":"10.1109/IICSPI48186.2019.9095914","DOIUrl":"https://doi.org/10.1109/IICSPI48186.2019.9095914","url":null,"abstract":"With the expansion of the scale of universities, the consumption of experimental consumables has also increased correspondingly. The existing general experimental management system cannot meet the needs of individuation, networking and intelligence. Using the advantages of Django technology and QR code technology, and Django MVC open source framework, the special lightweight material WEB system for low-value consumables information management system was designed to realize the network of online and offline inventory information synchronization network and resource sharing. The hierarchical structure is divided by MVC architecture, and the problem of code bloat in system development with the increase of code volume is solved, so as to enhance the high cohesion of the system and reduce the coupling. After being run and tested, the system runs stably and reliably, which improves the management efficiency of low value consumables, reduces the waste of consumables, and the management of the economic value of consumables is fulfilled.","PeriodicalId":318693,"journal":{"name":"2019 2nd International Conference on Safety Produce Informatization (IICSPI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113965770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/IICSPI48186.2019.9095946
Xiqiang Jin, Xiaolong Chen, C. Dong
In the application field of A/D converters(ADCs), dithering technique is a common method to improve the performance of ADC data acquisition. However, the effect of the dithering signal amplitude is still unclear. To solve this problem, a simulation and experiment strategy is developed and applied in this paper. In the plan approach, a dithering signal with variable bandwidth amplitude is designed firstly. Then, according to a planed schedule, the signal is introduced to a normal ADC system. Finally, effect of the dithering signal amplitude is reflected via the resulting variation law of Spurious-noise Free Dynamic Range (SFDR). Simulink simulation based on MATLAB is carried out with adjusting the amplitude of the PN sequence dithering signal. Semi-physical simulation based on Visual Studio and a data acquisition card is executed by setting the amplitude of dithering signal. The mapping analysis shows that the SFDR parameter value and the dithering signal amplitude are in accordance with positive skewness. This work provides reference information about the dithering signal amplitude and will facilitate the ADC design process somewhat.
{"title":"Effect Analysis of the Broadband Dithering Signal Amplitude on Acquisition Performance of A/D converters","authors":"Xiqiang Jin, Xiaolong Chen, C. Dong","doi":"10.1109/IICSPI48186.2019.9095946","DOIUrl":"https://doi.org/10.1109/IICSPI48186.2019.9095946","url":null,"abstract":"In the application field of A/D converters(ADCs), dithering technique is a common method to improve the performance of ADC data acquisition. However, the effect of the dithering signal amplitude is still unclear. To solve this problem, a simulation and experiment strategy is developed and applied in this paper. In the plan approach, a dithering signal with variable bandwidth amplitude is designed firstly. Then, according to a planed schedule, the signal is introduced to a normal ADC system. Finally, effect of the dithering signal amplitude is reflected via the resulting variation law of Spurious-noise Free Dynamic Range (SFDR). Simulink simulation based on MATLAB is carried out with adjusting the amplitude of the PN sequence dithering signal. Semi-physical simulation based on Visual Studio and a data acquisition card is executed by setting the amplitude of dithering signal. The mapping analysis shows that the SFDR parameter value and the dithering signal amplitude are in accordance with positive skewness. This work provides reference information about the dithering signal amplitude and will facilitate the ADC design process somewhat.","PeriodicalId":318693,"journal":{"name":"2019 2nd International Conference on Safety Produce Informatization (IICSPI)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125291866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/iicspi48186.2019.9095969
{"title":"IICSPI 2019 Author Index","authors":"","doi":"10.1109/iicspi48186.2019.9095969","DOIUrl":"https://doi.org/10.1109/iicspi48186.2019.9095969","url":null,"abstract":"","PeriodicalId":318693,"journal":{"name":"2019 2nd International Conference on Safety Produce Informatization (IICSPI)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133513895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/IICSPI48186.2019.9095906
Yuhong Wu, Xiangdong Hu
In the industrial Internet, the network is the foundation, the platform is the core, and security is the guarantee. In recent years, the industrial Internet has seen a series of major security incidents. Security issues are mainly manifested in three aspects: First, the threat of cyber attacks penetrates into the field of industrial Internet. Second, the new security threat brought by the application of the new technology itself. Third, the current capabilities of the industry Internet are weak. This paper analyzes the main security issues facing the present industrial Internet. A variety of solutions focusing on how to apply block chain technology to address each kind of security problems with the industrial Internet have been proposed, providing a new approach to security issues concering the future industrial Internet.
{"title":"Many Measures to Solve Industrial Internet Security Problems","authors":"Yuhong Wu, Xiangdong Hu","doi":"10.1109/IICSPI48186.2019.9095906","DOIUrl":"https://doi.org/10.1109/IICSPI48186.2019.9095906","url":null,"abstract":"In the industrial Internet, the network is the foundation, the platform is the core, and security is the guarantee. In recent years, the industrial Internet has seen a series of major security incidents. Security issues are mainly manifested in three aspects: First, the threat of cyber attacks penetrates into the field of industrial Internet. Second, the new security threat brought by the application of the new technology itself. Third, the current capabilities of the industry Internet are weak. This paper analyzes the main security issues facing the present industrial Internet. A variety of solutions focusing on how to apply block chain technology to address each kind of security problems with the industrial Internet have been proposed, providing a new approach to security issues concering the future industrial Internet.","PeriodicalId":318693,"journal":{"name":"2019 2nd International Conference on Safety Produce Informatization (IICSPI)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133633104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/IICSPI48186.2019.9095879
Wanchao Zhang, Changxi Chen
For a long time, China’s dairy genetics and breeding enterprises have problems such as irregular production management, disordered production data records, and incomplete data. These problems have hindered the rapid and healthy development of dairy cattle breeding and breeding. In order to enable enterprises to achieve standardization, data and transparency in the production process, help scientific research departments and government agencies to master the details of dairy farming and breeding, provide decision-making basis for the development of dairy enterprises in the region, and develop dairy genetics and breeding management information. system. The system includes basic data management, production data management, pedigree data management, data query and statistics. The input and use of the system will assist the enterprise personnel to breed dairy cow breeds with stable genetic quality, strong adaptability and long service life, so as to improve the level of enterprise information management and promote the sustainable, coordinated and healthy development of dairy enterprises in the region.
{"title":"Design and implementation of dairy cow genetic breeding system based on ASP.NET","authors":"Wanchao Zhang, Changxi Chen","doi":"10.1109/IICSPI48186.2019.9095879","DOIUrl":"https://doi.org/10.1109/IICSPI48186.2019.9095879","url":null,"abstract":"For a long time, China’s dairy genetics and breeding enterprises have problems such as irregular production management, disordered production data records, and incomplete data. These problems have hindered the rapid and healthy development of dairy cattle breeding and breeding. In order to enable enterprises to achieve standardization, data and transparency in the production process, help scientific research departments and government agencies to master the details of dairy farming and breeding, provide decision-making basis for the development of dairy enterprises in the region, and develop dairy genetics and breeding management information. system. The system includes basic data management, production data management, pedigree data management, data query and statistics. The input and use of the system will assist the enterprise personnel to breed dairy cow breeds with stable genetic quality, strong adaptability and long service life, so as to improve the level of enterprise information management and promote the sustainable, coordinated and healthy development of dairy enterprises in the region.","PeriodicalId":318693,"journal":{"name":"2019 2nd International Conference on Safety Produce Informatization (IICSPI)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134404930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/IICSPI48186.2019.9095967
Jianye Wang, Chengshuo Deng, Shibo Zhang, Xiaoshuai Guo, Guoan Yang
With the severe piping vibration caused by the gas pulsation of the reciprocating compressor, installing the orifice plate near the large container of the pipe system is an effective and simple solution for decreasing the gas pulsation in the field. In this paper, the fluid dynamics analysis proves that the improved orifice tube structure can better decrease the gas pulsation, and it is effective to reduce the piping vibration of a reciprocating compressor unit which is caused by the gas pulsation. The gas pulsation amplitude in the compressor pipeline system is decreased fundamentally by using the orifice tube, and the unit is in good running condition after the transformation, which effectively guarantees the long-term stable operation of the unit.
{"title":"Research on Vibration Control in a Reciprocating Compressor Piping System Using an Orifice Tube Structure","authors":"Jianye Wang, Chengshuo Deng, Shibo Zhang, Xiaoshuai Guo, Guoan Yang","doi":"10.1109/IICSPI48186.2019.9095967","DOIUrl":"https://doi.org/10.1109/IICSPI48186.2019.9095967","url":null,"abstract":"With the severe piping vibration caused by the gas pulsation of the reciprocating compressor, installing the orifice plate near the large container of the pipe system is an effective and simple solution for decreasing the gas pulsation in the field. In this paper, the fluid dynamics analysis proves that the improved orifice tube structure can better decrease the gas pulsation, and it is effective to reduce the piping vibration of a reciprocating compressor unit which is caused by the gas pulsation. The gas pulsation amplitude in the compressor pipeline system is decreased fundamentally by using the orifice tube, and the unit is in good running condition after the transformation, which effectively guarantees the long-term stable operation of the unit.","PeriodicalId":318693,"journal":{"name":"2019 2nd International Conference on Safety Produce Informatization (IICSPI)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134245367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/IICSPI48186.2019.9096005
Yanfen Gan, Jixiang Yang
Nowadays, as rapid development of image processing technique, it is necessary to authenticate whether an image is an artificial image or not. Copy-move forgery is the frequently-used image manipulation means. In this paper, Polar Sine Transform (PST) and Locality Sensitive Hashing (LSH) are combined to detect copy-move forgery image. First, the detected image is divided into lots of overlapping blocks. And then, PST is applied to extract feature from each block. Subsequently, LSH is applied to classify these block features, and we search the similar features in same class as candidate block feature pairs. Finally, the post-processing operation using Euclidean distance is presented to filter out the weak block feature pairs. A series of experiments show that the proposed method has robustness to rotation and JPEG compression and is superior to the state-of-the-art methods.
{"title":"An Effective Scheme for Copy-move Forgery Detection Using Polar Sine Transform","authors":"Yanfen Gan, Jixiang Yang","doi":"10.1109/IICSPI48186.2019.9096005","DOIUrl":"https://doi.org/10.1109/IICSPI48186.2019.9096005","url":null,"abstract":"Nowadays, as rapid development of image processing technique, it is necessary to authenticate whether an image is an artificial image or not. Copy-move forgery is the frequently-used image manipulation means. In this paper, Polar Sine Transform (PST) and Locality Sensitive Hashing (LSH) are combined to detect copy-move forgery image. First, the detected image is divided into lots of overlapping blocks. And then, PST is applied to extract feature from each block. Subsequently, LSH is applied to classify these block features, and we search the similar features in same class as candidate block feature pairs. Finally, the post-processing operation using Euclidean distance is presented to filter out the weak block feature pairs. A series of experiments show that the proposed method has robustness to rotation and JPEG compression and is superior to the state-of-the-art methods.","PeriodicalId":318693,"journal":{"name":"2019 2nd International Conference on Safety Produce Informatization (IICSPI)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116553178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}