Pub Date : 2019-11-01DOI: 10.1109/IICSPI48186.2019.9095897
Jing Li, Xuan Wu
Given an undirected graph, one start point and one end point belong to this graph, and nonnegative groups of weights for each edge, we consider the problem of finding a path that has lowest total cost with respect to cost weight and has constrained budget with respect to constrains weight [9]. Different from the traditional Lagrangean relaxation method, we proposed a new parameter space searching method for solving the multi-constrained shortest path problem (MCSP) in this paper. For this newly proposed method all the solutions found are in the original problem’s feasible region, there is no need to do the hard work to close the gap between the original problem and its Lagrangean relaxation. The proposed algorithm is very easy to parallelize, and can take full advantage of multi-core multi-thread processors to improve problem solving efficiency. For most optimization algorithms, properly selecting the super parameters is not an easy work. Through multi-rounds computer numerical simulation with different super parameters, we can see that our algorithm is robust to super parameters.
{"title":"Constrained Shortest Path by Parameter Searching","authors":"Jing Li, Xuan Wu","doi":"10.1109/IICSPI48186.2019.9095897","DOIUrl":"https://doi.org/10.1109/IICSPI48186.2019.9095897","url":null,"abstract":"Given an undirected graph, one start point and one end point belong to this graph, and nonnegative groups of weights for each edge, we consider the problem of finding a path that has lowest total cost with respect to cost weight and has constrained budget with respect to constrains weight [9]. Different from the traditional Lagrangean relaxation method, we proposed a new parameter space searching method for solving the multi-constrained shortest path problem (MCSP) in this paper. For this newly proposed method all the solutions found are in the original problem’s feasible region, there is no need to do the hard work to close the gap between the original problem and its Lagrangean relaxation. The proposed algorithm is very easy to parallelize, and can take full advantage of multi-core multi-thread processors to improve problem solving efficiency. For most optimization algorithms, properly selecting the super parameters is not an easy work. Through multi-rounds computer numerical simulation with different super parameters, we can see that our algorithm is robust to super parameters.","PeriodicalId":318693,"journal":{"name":"2019 2nd International Conference on Safety Produce Informatization (IICSPI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130668295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/IICSPI48186.2019.9095888
Xiao Liu, R. Xie, Guozhen Shi, Kaishi Guo
Cloud storage for massive small files has become the trend of data storage in network cloud environment. How to ensure small files meet user needs and secure storage is a major challenge in cloud storage research. Aiming at the above challenges, this paper improves the existing FastDFS system, divides the storage space into four levels, and stores different levels according to the user's account level, thus solving the problem of user demand. In order to improve the efficiency of file reading and writing, this paper puts forward the placement strategy of massive small files and the selection of small file retrieval algorithm. Through MD5 algorithm, a secondary index is established to make files easier to store. Theoretical analysis shows the security and performance of the system, which solves the problem of access security of massive small files in cloud storage, and effectively improves the efficiency of reading and writing under the premise of ensuring security.
{"title":"Research and improvement of cloud storage for massive small files","authors":"Xiao Liu, R. Xie, Guozhen Shi, Kaishi Guo","doi":"10.1109/IICSPI48186.2019.9095888","DOIUrl":"https://doi.org/10.1109/IICSPI48186.2019.9095888","url":null,"abstract":"Cloud storage for massive small files has become the trend of data storage in network cloud environment. How to ensure small files meet user needs and secure storage is a major challenge in cloud storage research. Aiming at the above challenges, this paper improves the existing FastDFS system, divides the storage space into four levels, and stores different levels according to the user's account level, thus solving the problem of user demand. In order to improve the efficiency of file reading and writing, this paper puts forward the placement strategy of massive small files and the selection of small file retrieval algorithm. Through MD5 algorithm, a secondary index is established to make files easier to store. Theoretical analysis shows the security and performance of the system, which solves the problem of access security of massive small files in cloud storage, and effectively improves the efficiency of reading and writing under the premise of ensuring security.","PeriodicalId":318693,"journal":{"name":"2019 2nd International Conference on Safety Produce Informatization (IICSPI)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132077256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/IICSPI48186.2019.9095944
Dexian Chang, Wanzhong Sun, Yingjie Yang
In order to improve the security of SDN, a proactive defense mechanism based on encrypted IP address transformation is proposed in this paper. The IP address protection method based on cryptographic transformation is designed to ensure the confusion of the source addresses of both senders and receivers. An effective key update method is designed to improve the randomness of the encryption transformation process. Based on the long prefix of IPv6, a new method of constructing IPv6 data packet with encrypted IPv4 address is proposed. Finally, P4 language is used to simulate the function of address protection and data forwarding in data layer. The evaluation results of the prototype system based on P4 language show that the proposed scheme can proactively defense the DoS attack, without significant performance degradation.
{"title":"A SDN Proactive Defense Mechanism Based on IP Transformation","authors":"Dexian Chang, Wanzhong Sun, Yingjie Yang","doi":"10.1109/IICSPI48186.2019.9095944","DOIUrl":"https://doi.org/10.1109/IICSPI48186.2019.9095944","url":null,"abstract":"In order to improve the security of SDN, a proactive defense mechanism based on encrypted IP address transformation is proposed in this paper. The IP address protection method based on cryptographic transformation is designed to ensure the confusion of the source addresses of both senders and receivers. An effective key update method is designed to improve the randomness of the encryption transformation process. Based on the long prefix of IPv6, a new method of constructing IPv6 data packet with encrypted IPv4 address is proposed. Finally, P4 language is used to simulate the function of address protection and data forwarding in data layer. The evaluation results of the prototype system based on P4 language show that the proposed scheme can proactively defense the DoS attack, without significant performance degradation.","PeriodicalId":318693,"journal":{"name":"2019 2nd International Conference on Safety Produce Informatization (IICSPI)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123131159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/IICSPI48186.2019.9095914
Quan Yu, Weina Yang
With the expansion of the scale of universities, the consumption of experimental consumables has also increased correspondingly. The existing general experimental management system cannot meet the needs of individuation, networking and intelligence. Using the advantages of Django technology and QR code technology, and Django MVC open source framework, the special lightweight material WEB system for low-value consumables information management system was designed to realize the network of online and offline inventory information synchronization network and resource sharing. The hierarchical structure is divided by MVC architecture, and the problem of code bloat in system development with the increase of code volume is solved, so as to enhance the high cohesion of the system and reduce the coupling. After being run and tested, the system runs stably and reliably, which improves the management efficiency of low value consumables, reduces the waste of consumables, and the management of the economic value of consumables is fulfilled.
{"title":"The Analysis and Design of System of Experimental Consumables Based on Django and QR code","authors":"Quan Yu, Weina Yang","doi":"10.1109/IICSPI48186.2019.9095914","DOIUrl":"https://doi.org/10.1109/IICSPI48186.2019.9095914","url":null,"abstract":"With the expansion of the scale of universities, the consumption of experimental consumables has also increased correspondingly. The existing general experimental management system cannot meet the needs of individuation, networking and intelligence. Using the advantages of Django technology and QR code technology, and Django MVC open source framework, the special lightweight material WEB system for low-value consumables information management system was designed to realize the network of online and offline inventory information synchronization network and resource sharing. The hierarchical structure is divided by MVC architecture, and the problem of code bloat in system development with the increase of code volume is solved, so as to enhance the high cohesion of the system and reduce the coupling. After being run and tested, the system runs stably and reliably, which improves the management efficiency of low value consumables, reduces the waste of consumables, and the management of the economic value of consumables is fulfilled.","PeriodicalId":318693,"journal":{"name":"2019 2nd International Conference on Safety Produce Informatization (IICSPI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113965770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/IICSPI48186.2019.9095946
Xiqiang Jin, Xiaolong Chen, C. Dong
In the application field of A/D converters(ADCs), dithering technique is a common method to improve the performance of ADC data acquisition. However, the effect of the dithering signal amplitude is still unclear. To solve this problem, a simulation and experiment strategy is developed and applied in this paper. In the plan approach, a dithering signal with variable bandwidth amplitude is designed firstly. Then, according to a planed schedule, the signal is introduced to a normal ADC system. Finally, effect of the dithering signal amplitude is reflected via the resulting variation law of Spurious-noise Free Dynamic Range (SFDR). Simulink simulation based on MATLAB is carried out with adjusting the amplitude of the PN sequence dithering signal. Semi-physical simulation based on Visual Studio and a data acquisition card is executed by setting the amplitude of dithering signal. The mapping analysis shows that the SFDR parameter value and the dithering signal amplitude are in accordance with positive skewness. This work provides reference information about the dithering signal amplitude and will facilitate the ADC design process somewhat.
{"title":"Effect Analysis of the Broadband Dithering Signal Amplitude on Acquisition Performance of A/D converters","authors":"Xiqiang Jin, Xiaolong Chen, C. Dong","doi":"10.1109/IICSPI48186.2019.9095946","DOIUrl":"https://doi.org/10.1109/IICSPI48186.2019.9095946","url":null,"abstract":"In the application field of A/D converters(ADCs), dithering technique is a common method to improve the performance of ADC data acquisition. However, the effect of the dithering signal amplitude is still unclear. To solve this problem, a simulation and experiment strategy is developed and applied in this paper. In the plan approach, a dithering signal with variable bandwidth amplitude is designed firstly. Then, according to a planed schedule, the signal is introduced to a normal ADC system. Finally, effect of the dithering signal amplitude is reflected via the resulting variation law of Spurious-noise Free Dynamic Range (SFDR). Simulink simulation based on MATLAB is carried out with adjusting the amplitude of the PN sequence dithering signal. Semi-physical simulation based on Visual Studio and a data acquisition card is executed by setting the amplitude of dithering signal. The mapping analysis shows that the SFDR parameter value and the dithering signal amplitude are in accordance with positive skewness. This work provides reference information about the dithering signal amplitude and will facilitate the ADC design process somewhat.","PeriodicalId":318693,"journal":{"name":"2019 2nd International Conference on Safety Produce Informatization (IICSPI)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125291866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/iicspi48186.2019.9095969
{"title":"IICSPI 2019 Author Index","authors":"","doi":"10.1109/iicspi48186.2019.9095969","DOIUrl":"https://doi.org/10.1109/iicspi48186.2019.9095969","url":null,"abstract":"","PeriodicalId":318693,"journal":{"name":"2019 2nd International Conference on Safety Produce Informatization (IICSPI)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133513895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/IICSPI48186.2019.9095906
Yuhong Wu, Xiangdong Hu
In the industrial Internet, the network is the foundation, the platform is the core, and security is the guarantee. In recent years, the industrial Internet has seen a series of major security incidents. Security issues are mainly manifested in three aspects: First, the threat of cyber attacks penetrates into the field of industrial Internet. Second, the new security threat brought by the application of the new technology itself. Third, the current capabilities of the industry Internet are weak. This paper analyzes the main security issues facing the present industrial Internet. A variety of solutions focusing on how to apply block chain technology to address each kind of security problems with the industrial Internet have been proposed, providing a new approach to security issues concering the future industrial Internet.
{"title":"Many Measures to Solve Industrial Internet Security Problems","authors":"Yuhong Wu, Xiangdong Hu","doi":"10.1109/IICSPI48186.2019.9095906","DOIUrl":"https://doi.org/10.1109/IICSPI48186.2019.9095906","url":null,"abstract":"In the industrial Internet, the network is the foundation, the platform is the core, and security is the guarantee. In recent years, the industrial Internet has seen a series of major security incidents. Security issues are mainly manifested in three aspects: First, the threat of cyber attacks penetrates into the field of industrial Internet. Second, the new security threat brought by the application of the new technology itself. Third, the current capabilities of the industry Internet are weak. This paper analyzes the main security issues facing the present industrial Internet. A variety of solutions focusing on how to apply block chain technology to address each kind of security problems with the industrial Internet have been proposed, providing a new approach to security issues concering the future industrial Internet.","PeriodicalId":318693,"journal":{"name":"2019 2nd International Conference on Safety Produce Informatization (IICSPI)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133633104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/IICSPI48186.2019.9095879
Wanchao Zhang, Changxi Chen
For a long time, China’s dairy genetics and breeding enterprises have problems such as irregular production management, disordered production data records, and incomplete data. These problems have hindered the rapid and healthy development of dairy cattle breeding and breeding. In order to enable enterprises to achieve standardization, data and transparency in the production process, help scientific research departments and government agencies to master the details of dairy farming and breeding, provide decision-making basis for the development of dairy enterprises in the region, and develop dairy genetics and breeding management information. system. The system includes basic data management, production data management, pedigree data management, data query and statistics. The input and use of the system will assist the enterprise personnel to breed dairy cow breeds with stable genetic quality, strong adaptability and long service life, so as to improve the level of enterprise information management and promote the sustainable, coordinated and healthy development of dairy enterprises in the region.
{"title":"Design and implementation of dairy cow genetic breeding system based on ASP.NET","authors":"Wanchao Zhang, Changxi Chen","doi":"10.1109/IICSPI48186.2019.9095879","DOIUrl":"https://doi.org/10.1109/IICSPI48186.2019.9095879","url":null,"abstract":"For a long time, China’s dairy genetics and breeding enterprises have problems such as irregular production management, disordered production data records, and incomplete data. These problems have hindered the rapid and healthy development of dairy cattle breeding and breeding. In order to enable enterprises to achieve standardization, data and transparency in the production process, help scientific research departments and government agencies to master the details of dairy farming and breeding, provide decision-making basis for the development of dairy enterprises in the region, and develop dairy genetics and breeding management information. system. The system includes basic data management, production data management, pedigree data management, data query and statistics. The input and use of the system will assist the enterprise personnel to breed dairy cow breeds with stable genetic quality, strong adaptability and long service life, so as to improve the level of enterprise information management and promote the sustainable, coordinated and healthy development of dairy enterprises in the region.","PeriodicalId":318693,"journal":{"name":"2019 2nd International Conference on Safety Produce Informatization (IICSPI)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134404930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/IICSPI48186.2019.9096030
Tianci Li, Zhongzhen Yan, Xiaoming Li
In order to solve the problem of scheduling, a scheduling algorithm based on improved ant colony algorithm is proposed in this paper. In order to take into account the rules of scheduling and the requirements of the personnel, the scheduling problem is reduced to a complete matching problem with a weighted bigraph, and an improved ant colony algorithm is searched under the constraint conditions. The results show that the improved ant colony algorithm can better meet the scheduling requirements and improve the scheduling efficiency.
{"title":"Design of Scheduling System Based on Improved Ant Colony Algorithm","authors":"Tianci Li, Zhongzhen Yan, Xiaoming Li","doi":"10.1109/IICSPI48186.2019.9096030","DOIUrl":"https://doi.org/10.1109/IICSPI48186.2019.9096030","url":null,"abstract":"In order to solve the problem of scheduling, a scheduling algorithm based on improved ant colony algorithm is proposed in this paper. In order to take into account the rules of scheduling and the requirements of the personnel, the scheduling problem is reduced to a complete matching problem with a weighted bigraph, and an improved ant colony algorithm is searched under the constraint conditions. The results show that the improved ant colony algorithm can better meet the scheduling requirements and improve the scheduling efficiency.","PeriodicalId":318693,"journal":{"name":"2019 2nd International Conference on Safety Produce Informatization (IICSPI)","volume":"32 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116273129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the expansion of enrollment in various colleges and secondary schools, the expansion of classrooms, classroom lighting needs are also increasing, and classroom lighting management is not in place, often causing a huge waste of electrical energy. In this project, a multi-function energy saving monitoring device based on data fusion is proposed. [1], infrared thermal release sensor, the Beiyesi [2] algorithm. It is used for the function realization of target detection, identification, etc..At the same time, the video image collected by the camera is grayed, binary, and median filtering. Pattern recognition of the signals collected by the sensors in the classroom, through fuzzy control [3]. The method of processing the signal. In order to achieve the classroom sub-area detection, control the corresponding area of the light switch, the maximum energy conservation purposes.
{"title":"Energy Conservation Monitoring Device Based on Multidimensional Data Fusion","authors":"Peng Pan, Junhui Lai, Xinyu Chen, Tongtong Wang, Desheng Cui, Hebin Du","doi":"10.1109/IICSPI48186.2019.9096040","DOIUrl":"https://doi.org/10.1109/IICSPI48186.2019.9096040","url":null,"abstract":"With the expansion of enrollment in various colleges and secondary schools, the expansion of classrooms, classroom lighting needs are also increasing, and classroom lighting management is not in place, often causing a huge waste of electrical energy. In this project, a multi-function energy saving monitoring device based on data fusion is proposed. [1], infrared thermal release sensor, the Beiyesi [2] algorithm. It is used for the function realization of target detection, identification, etc..At the same time, the video image collected by the camera is grayed, binary, and median filtering. Pattern recognition of the signals collected by the sensors in the classroom, through fuzzy control [3]. The method of processing the signal. In order to achieve the classroom sub-area detection, control the corresponding area of the light switch, the maximum energy conservation purposes.","PeriodicalId":318693,"journal":{"name":"2019 2nd International Conference on Safety Produce Informatization (IICSPI)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123056068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}