On the basis of statistical learning theory and Bayesian network method, this paper combines Bayesian network algorithm with agricultural macroeconomic early warning research. In this way, an early warning model of agricultural economy based on Bayesian network is established. In this paper, the classification hyperplane and forecast warning range of economic early warning are obtained by compiling MATLAB software program and combining with the economic data of a large agricultural province. At the same time, we perform interpolation and extrapolation tests. The results show that the prediction reliability and fitting of the early warning model is effective and feasible with high accuracy.
{"title":"Computer System of Agricultural Economic Early Warning based on Bayesian Network Model","authors":"Lihong Zhao, Ying Pan, Wen-Oian Pan, Yuying Liu","doi":"10.1145/3558819.3565139","DOIUrl":"https://doi.org/10.1145/3558819.3565139","url":null,"abstract":"On the basis of statistical learning theory and Bayesian network method, this paper combines Bayesian network algorithm with agricultural macroeconomic early warning research. In this way, an early warning model of agricultural economy based on Bayesian network is established. In this paper, the classification hyperplane and forecast warning range of economic early warning are obtained by compiling MATLAB software program and combining with the economic data of a large agricultural province. At the same time, we perform interpolation and extrapolation tests. The results show that the prediction reliability and fitting of the early warning model is effective and feasible with high accuracy.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123865382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Based on the theoretical of power transformer noise calculation, using the Visual Basic program language as a tool, combined with the current power transformer product structure and the various vibration noise reduction measures, the power transformer vibration noise process has been developed. Through compared with the noise test data of the typical power transformer products, it proves the effectiveness and accuracy of the program. This is of great importance for the design and performance optimization of products and for environmental protection requirements to improve noise.
{"title":"The Development of Power Transformer Noise Computational Program","authors":"F. Han, Huan Wang, Yongteng Jing, Xiuping Wang","doi":"10.1145/3558819.3565084","DOIUrl":"https://doi.org/10.1145/3558819.3565084","url":null,"abstract":"Based on the theoretical of power transformer noise calculation, using the Visual Basic program language as a tool, combined with the current power transformer product structure and the various vibration noise reduction measures, the power transformer vibration noise process has been developed. Through compared with the noise test data of the typical power transformer products, it proves the effectiveness and accuracy of the program. This is of great importance for the design and performance optimization of products and for environmental protection requirements to improve noise.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121140377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Using visible light communication technology to transmit Ethernet signals can overcome the shortcomings of traditional wireless communication, such as low rate, limited spectrum resources and limited application scenarios. Aiming at the problem that traditional visible light communication system is difficult to realize high-speed Ethernet communication, a speech transmission scheme based on visible light is proposed. The structure of important electronic components and the design details of each circuit are described in detail, focusing on the connection mode, realization function and working principle of each circuit module. Finally, the whole system is tested, and the test methods and test results of all circuit modules are described. The experimental results show that the audio signal can be modulated to visible light by LED lamp and restored to audio signal by photodiode demodulation, so as to realize wireless transmission.
{"title":"Design and Implementation of Speech Transmission System based on Visible Light","authors":"Chao Li, Tingdong Ye","doi":"10.1145/3558819.3565144","DOIUrl":"https://doi.org/10.1145/3558819.3565144","url":null,"abstract":"Using visible light communication technology to transmit Ethernet signals can overcome the shortcomings of traditional wireless communication, such as low rate, limited spectrum resources and limited application scenarios. Aiming at the problem that traditional visible light communication system is difficult to realize high-speed Ethernet communication, a speech transmission scheme based on visible light is proposed. The structure of important electronic components and the design details of each circuit are described in detail, focusing on the connection mode, realization function and working principle of each circuit module. Finally, the whole system is tested, and the test methods and test results of all circuit modules are described. The experimental results show that the audio signal can be modulated to visible light by LED lamp and restored to audio signal by photodiode demodulation, so as to realize wireless transmission.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121739466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In view of the difficulties in monitoring the fall, breakage and deformation of power transmission and distribution line pole and tower under geological disasters, a line pole and tower monitoring system based on attitude sensor + LoRa communication is proposed; firstly, the measurement mechanism of spatial attitude sensor is analyzed in depth in this paper; on this basis, the hardware circuit of each component of the power transmission and distribution line pole and tower monitoring system is developed and designed to realize the real-time monitoring and analysis of pole and tower. Finally, in order to verify the reliability of the system, the functional test is carried out on the experimental platform built in this paper, and the results show that the system can meet the requirements of real-time monitoring of the operation status of line pole and tower, timely grasp the status of power transmission and distribution pole and tower in disasters, and provide technical support for disaster emergency disposal.
{"title":"Development and Application of Attitude Sensor-based Monitoring System for Power Transmission and Distribution Line Pole and Tower","authors":"Hongming Bai, Lei Gao, Zhenhua Yang","doi":"10.1145/3558819.3558828","DOIUrl":"https://doi.org/10.1145/3558819.3558828","url":null,"abstract":"In view of the difficulties in monitoring the fall, breakage and deformation of power transmission and distribution line pole and tower under geological disasters, a line pole and tower monitoring system based on attitude sensor + LoRa communication is proposed; firstly, the measurement mechanism of spatial attitude sensor is analyzed in depth in this paper; on this basis, the hardware circuit of each component of the power transmission and distribution line pole and tower monitoring system is developed and designed to realize the real-time monitoring and analysis of pole and tower. Finally, in order to verify the reliability of the system, the functional test is carried out on the experimental platform built in this paper, and the results show that the system can meet the requirements of real-time monitoring of the operation status of line pole and tower, timely grasp the status of power transmission and distribution pole and tower in disasters, and provide technical support for disaster emergency disposal.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"147 Pt 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126316409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the outbreak of many major default events in China's bond market, the problem of corporate bond default prediction has increasingly become the focus of academic and practical circles, and machine learning and deep learning algorithms have been widely used. By constructing a random forest-BP neural network model and a random forest model based on convolutional neural network, we make an empirical analysis of the financial data of listed companies whose bonds default or are due to be paid from 2014 to 2019, and compare the prediction results of the algorithms to test the effectiveness of the models. The empirical results show that the random forest model based on convolutional neural network is the best in the prediction of corporate credit default, and the combined model has better performance than the single model.
{"title":"Prediction of Enterprise Credit Bond Default based on Random Forest and Neural Network","authors":"Menghan Fu, Jie Su, Ling Zhou","doi":"10.1145/3558819.3565215","DOIUrl":"https://doi.org/10.1145/3558819.3565215","url":null,"abstract":"With the outbreak of many major default events in China's bond market, the problem of corporate bond default prediction has increasingly become the focus of academic and practical circles, and machine learning and deep learning algorithms have been widely used. By constructing a random forest-BP neural network model and a random forest model based on convolutional neural network, we make an empirical analysis of the financial data of listed companies whose bonds default or are due to be paid from 2014 to 2019, and compare the prediction results of the algorithms to test the effectiveness of the models. The empirical results show that the random forest model based on convolutional neural network is the best in the prediction of corporate credit default, and the combined model has better performance than the single model.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122240842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The planning of constructions around river basins is essential for economic development. The river's status needs to be monitored to order to avoid disasters like floods or water shortages. Appropriate prediction of the network can greatly help with this situation. River basin management can be started in advance with the utilization of the Diffusion-Limited Aggregation Model. In real-life situations, the growth of river basins will usually follow the Brownian Motion which is like a random walk process. A DLA model can use seed particles to indicate the network's origin and the Brownian Motion can be simulated using random walk code. The model progress will start from a seed particle with a specific position and the position will be entered manually using seed in random function. Then each child particle will start from this position and move randomly to stimulate river basin evolution.
{"title":"Diffusion-Limited Aggregation Model on River Network Prediction Random Walk Simulation","authors":"Baizhou Han","doi":"10.1145/3558819.3565094","DOIUrl":"https://doi.org/10.1145/3558819.3565094","url":null,"abstract":"The planning of constructions around river basins is essential for economic development. The river's status needs to be monitored to order to avoid disasters like floods or water shortages. Appropriate prediction of the network can greatly help with this situation. River basin management can be started in advance with the utilization of the Diffusion-Limited Aggregation Model. In real-life situations, the growth of river basins will usually follow the Brownian Motion which is like a random walk process. A DLA model can use seed particles to indicate the network's origin and the Brownian Motion can be simulated using random walk code. The model progress will start from a seed particle with a specific position and the position will be entered manually using seed in random function. Then each child particle will start from this position and move randomly to stimulate river basin evolution.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127939594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper firstly introduces the automatic processing equipment and control system of distribution cables based on PLC control. The system is mainly composed of wire pulling mechanism, wire cutting mechanism, wire stripping mechanism and terminal automatic crimping mechanism. The PLC controller of the system collects each sensor signal. The controller performs sequential control on each mechanism. The wire pulling mechanism is driven by a high-torque servo motor. The wire is measured by adding an incremental encoder to measure the wire pulling distance. The single-chip microcomputer uses PID and PD algorithms to process the data and then outputs pulses to control the rotation of the stepper motor. The motor adjusts the thickness distribution of the insulating sheath by adjusting the position of the die sleeve. The system adopts hydraulic disconnection mechanism to improve disconnection efficiency. The integrated device adopts the automatic peeling method of rotary cutting, which completely solves the problem that the insulating skin cannot fall off by itself during the operation. The system finally realizes the automatic processing of distribution cables and meets the needs of industrial production.
{"title":"Research and Application of Intelligent Integrated Equipment for Cable Processing in Distribution Network Engineering","authors":"Yun Zhao, Weiwei Ma","doi":"10.1145/3558819.3558841","DOIUrl":"https://doi.org/10.1145/3558819.3558841","url":null,"abstract":"This paper firstly introduces the automatic processing equipment and control system of distribution cables based on PLC control. The system is mainly composed of wire pulling mechanism, wire cutting mechanism, wire stripping mechanism and terminal automatic crimping mechanism. The PLC controller of the system collects each sensor signal. The controller performs sequential control on each mechanism. The wire pulling mechanism is driven by a high-torque servo motor. The wire is measured by adding an incremental encoder to measure the wire pulling distance. The single-chip microcomputer uses PID and PD algorithms to process the data and then outputs pulses to control the rotation of the stepper motor. The motor adjusts the thickness distribution of the insulating sheath by adjusting the position of the die sleeve. The system adopts hydraulic disconnection mechanism to improve disconnection efficiency. The integrated device adopts the automatic peeling method of rotary cutting, which completely solves the problem that the insulating skin cannot fall off by itself during the operation. The system finally realizes the automatic processing of distribution cables and meets the needs of industrial production.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121778454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In Wireless Sensor Network (WSN), the life expectancy relies upon the energy utilization of the sensor hub; decreasing the energy utilization of every individual hub expands the lifetime of the network. Clustering is a successful procedure to decrease the energy utilization. Low Energy Adaptive Clustering Hierarchy (LEACH) convention is the principal various leveled group based routing convention effectively utilized in the WSN. In this paper, a new overview of progressive routing conventions which depend on LEACH convention is assessed utilizing cryptographic calculation. In particular, the network lifetime and energy utilization for every convention is shown and an examination of these conventions as far as advantages, disadvantages, correspondence example and energy productivity is made to distinguish the exploration issues to be settled, and a thought for the future proposed routing calculations of wireless networks in light of LEACH it is introduced to defeat calculation.
{"title":"Performance Analysis of LEACH and LEACH-CC Protocol with Cryptographic Algorithms in Wireless Sensor Networks","authors":"Yizhuo Lu, Mengfei Lu, Lin Lu, Xinxin Jiang","doi":"10.1145/3558819.3565103","DOIUrl":"https://doi.org/10.1145/3558819.3565103","url":null,"abstract":"In Wireless Sensor Network (WSN), the life expectancy relies upon the energy utilization of the sensor hub; decreasing the energy utilization of every individual hub expands the lifetime of the network. Clustering is a successful procedure to decrease the energy utilization. Low Energy Adaptive Clustering Hierarchy (LEACH) convention is the principal various leveled group based routing convention effectively utilized in the WSN. In this paper, a new overview of progressive routing conventions which depend on LEACH convention is assessed utilizing cryptographic calculation. In particular, the network lifetime and energy utilization for every convention is shown and an examination of these conventions as far as advantages, disadvantages, correspondence example and energy productivity is made to distinguish the exploration issues to be settled, and a thought for the future proposed routing calculations of wireless networks in light of LEACH it is introduced to defeat calculation.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132246404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shaogang Liu, Jiang Chen, Guihua Hong, Lizhu Cao, Ming Wu
With the advent of the Internet of Things era, China's various industries have undergone earth-shaking changes, especially the drone information industry, which has been rapidly developed under the impetus of the Internet of Things era, However, with the continuous development of network technology, the network structure has become more and more complex, and the types of network attacks have varied, Unmanned aerial vehicle systems have appeared security risks in the application of network platform information, These hidden dangers have caused the progress and development of the drone information industry with great negative impact, In this regard, this article will conduct research on the content of UAV system security risks and security protection, which can provide a basis for the effective assessment of UAV system network security risks, and provide references for UAV system security and data security hidden danger solutions and thereby reducing the security risks and losses of the drone information industry.
{"title":"Research on Safety Risks and Safety Protection of UAV System","authors":"Shaogang Liu, Jiang Chen, Guihua Hong, Lizhu Cao, Ming Wu","doi":"10.1145/3558819.3565182","DOIUrl":"https://doi.org/10.1145/3558819.3565182","url":null,"abstract":"With the advent of the Internet of Things era, China's various industries have undergone earth-shaking changes, especially the drone information industry, which has been rapidly developed under the impetus of the Internet of Things era, However, with the continuous development of network technology, the network structure has become more and more complex, and the types of network attacks have varied, Unmanned aerial vehicle systems have appeared security risks in the application of network platform information, These hidden dangers have caused the progress and development of the drone information industry with great negative impact, In this regard, this article will conduct research on the content of UAV system security risks and security protection, which can provide a basis for the effective assessment of UAV system network security risks, and provide references for UAV system security and data security hidden danger solutions and thereby reducing the security risks and losses of the drone information industry.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130431638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Being one of the major points of research focus since the end of the twentieth century, quantum computation technologies have experienced significant improvements and is under the progress of forming an inter-connected commercial quantum network in recent years. Communication through quantum mechanisms proved to be considerably more efficient and secure than classical communication protocols. Basic quantum communication networks have the primary composition of quantum processing nodes and channels where the interaction between the nodes is satisfied by the entanglement phenomenon. Quantum networking technology is under rapid development currently and is anticipated to receive milestone achievements shortly.
{"title":"Introduction and Discussion on Quantum Communication and Quantum Network","authors":"Shengyi Dai, Yuhao Fu, Mujin Guo","doi":"10.1145/3558819.3565196","DOIUrl":"https://doi.org/10.1145/3558819.3565196","url":null,"abstract":"Being one of the major points of research focus since the end of the twentieth century, quantum computation technologies have experienced significant improvements and is under the progress of forming an inter-connected commercial quantum network in recent years. Communication through quantum mechanisms proved to be considerably more efficient and secure than classical communication protocols. Basic quantum communication networks have the primary composition of quantum processing nodes and channels where the interaction between the nodes is satisfied by the entanglement phenomenon. Quantum networking technology is under rapid development currently and is anticipated to receive milestone achievements shortly.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131838220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}