Distribution network is an urban infrastructure, which is of great significance to the safety of urban power supply. Self-healing control is an effective means to solve the safe operation of distribution network and has become a hot research topic in the field of distribution. Combining DSSR and TSC theory with self-healing control system, this paper proposes a safe and efficient operation mode of distribution network based on security domain. The self-healing control system based on security domain is presented, the preventive control, predictive control and optimization control based on DSSR and TSC are proposed, and these functions are demonstrated by an example of a real distribution network. Self-healing control emphasizes initiative, and the safety domain theory gives the direction and measurement of load control. Preventive control or predictive control is adopted to ensure the operation of the power grid in the safety domain, so as to ensure the safety and reliability of power supply can be improved greatly.
{"title":"Research on Self-healing Control Function of Smart Distribution Network based on Security Domain","authors":"Jia-le Lu, Ruifeng Zhao, Hai-cheng Liu, Haobin Li, Jin Li, Kaiyan Pan, Hongrui Zhao","doi":"10.1145/3558819.3565465","DOIUrl":"https://doi.org/10.1145/3558819.3565465","url":null,"abstract":"Distribution network is an urban infrastructure, which is of great significance to the safety of urban power supply. Self-healing control is an effective means to solve the safe operation of distribution network and has become a hot research topic in the field of distribution. Combining DSSR and TSC theory with self-healing control system, this paper proposes a safe and efficient operation mode of distribution network based on security domain. The self-healing control system based on security domain is presented, the preventive control, predictive control and optimization control based on DSSR and TSC are proposed, and these functions are demonstrated by an example of a real distribution network. Self-healing control emphasizes initiative, and the safety domain theory gives the direction and measurement of load control. Preventive control or predictive control is adopted to ensure the operation of the power grid in the safety domain, so as to ensure the safety and reliability of power supply can be improved greatly.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122774007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Text classification is to organizing documents into predetermined categories, usually by machinery learn algorithms. It is a significant ways to organize and utilize the large amount of information that exists in unstructured text format. Text classification is an important module in text processing, and its applications are also very extensive, such as garbage filtering, news classification, part-of-speech tagging, and so on. With the continuous development of deep learning in recent years! Its applications are also very extensive, such as: garbage filtering, news classification, part-of-speech tagging, and so on. But the text also has its own characteristics. According to the characteristics of the text, the general process of text classification is: 1. Preprocessing; 2. Text representation and feature selection; 3. Construction of a classifier; 4. The task of text classification refers to classifying texts into only single or many types in TC system. Some researchers are beginning to apply deep neural networks to tasks such as the text classification we mentioned above. Although the research around the task has made great progress, the review of this task is very scarce, and there is a lack of a comprehensive review of the development of the task in recent years. Therefore, we present a survey of research in text classification to create taxonomies. Finally, it is by giving vital effects, the direction of future research, and those challenges that may counter in the research field.
{"title":"Deep Graph Neural Networks for Text Classification Task","authors":"Yunhao Si, Yong Zhou","doi":"10.1145/3558819.3565091","DOIUrl":"https://doi.org/10.1145/3558819.3565091","url":null,"abstract":"Text classification is to organizing documents into predetermined categories, usually by machinery learn algorithms. It is a significant ways to organize and utilize the large amount of information that exists in unstructured text format. Text classification is an important module in text processing, and its applications are also very extensive, such as garbage filtering, news classification, part-of-speech tagging, and so on. With the continuous development of deep learning in recent years! Its applications are also very extensive, such as: garbage filtering, news classification, part-of-speech tagging, and so on. But the text also has its own characteristics. According to the characteristics of the text, the general process of text classification is: 1. Preprocessing; 2. Text representation and feature selection; 3. Construction of a classifier; 4. The task of text classification refers to classifying texts into only single or many types in TC system. Some researchers are beginning to apply deep neural networks to tasks such as the text classification we mentioned above. Although the research around the task has made great progress, the review of this task is very scarce, and there is a lack of a comprehensive review of the development of the task in recent years. Therefore, we present a survey of research in text classification to create taxonomies. Finally, it is by giving vital effects, the direction of future research, and those challenges that may counter in the research field.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116541678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aiming at the problem of road crack detection, experiments based on CFD data set and Unet model were carried out. The overall structure of the network and the contribution of each module to the final detection effect of Unet model were analyzed. Some modules in Unet model were cut and replaced based on that, and CCUnet model was obtained. Final experiment results show that detection rate of CCUnet model is greatly improved under the condition that model accuracy is maintained basically, and that has practical application value.
{"title":"Research on Neural Network Algorithm for Road Crack Detection","authors":"Yuxiang Liu, Wei She, Shuai Tan","doi":"10.1145/3558819.3565220","DOIUrl":"https://doi.org/10.1145/3558819.3565220","url":null,"abstract":"Aiming at the problem of road crack detection, experiments based on CFD data set and Unet model were carried out. The overall structure of the network and the contribution of each module to the final detection effect of Unet model were analyzed. Some modules in Unet model were cut and replaced based on that, and CCUnet model was obtained. Final experiment results show that detection rate of CCUnet model is greatly improved under the condition that model accuracy is maintained basically, and that has practical application value.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130343454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In order to obtain ideal mass video advertisement retrieval results, a video advertisement classification system under the background of new media is proposed. According to the feedback of the basic layer, the logic analysis and processing layer segments the original video advertisement sequence, uses multi tributary network to encode the intermediate frame sequence, extracts the useful information in the video advertisement, introduce the spatial attention prediction model to each tributary of the multi tributary network, integrates the attention spectrum the feature spectrum extracted from each tributary network. The total connection layer obtains the classification score of video advertisement, and linearly superimposes it to obtain the type estimation result of the overall video advertisement, and feeds tack the result to the user. The results show that the system can achieve video advertising classification, classification accuracy is high, and the overall performance of the system is superior. CCS CONCEPTS • Information systems∼Information retrieval∼Users and interactive retrieval
{"title":"Design of Video Advertisement Classification System under the Background of New Media","authors":"Xiuping Han","doi":"10.1145/3558819.3558838","DOIUrl":"https://doi.org/10.1145/3558819.3558838","url":null,"abstract":"In order to obtain ideal mass video advertisement retrieval results, a video advertisement classification system under the background of new media is proposed. According to the feedback of the basic layer, the logic analysis and processing layer segments the original video advertisement sequence, uses multi tributary network to encode the intermediate frame sequence, extracts the useful information in the video advertisement, introduce the spatial attention prediction model to each tributary of the multi tributary network, integrates the attention spectrum the feature spectrum extracted from each tributary network. The total connection layer obtains the classification score of video advertisement, and linearly superimposes it to obtain the type estimation result of the overall video advertisement, and feeds tack the result to the user. The results show that the system can achieve video advertising classification, classification accuracy is high, and the overall performance of the system is superior. CCS CONCEPTS • Information systems∼Information retrieval∼Users and interactive retrieval","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134205259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the development of intelligent manufacturing in China, laser welding technology has entered the field of plastic welding from the initial welding in the metal field. At this stage, the domestic plastic welding technology is developing, and the requirements for the welding accuracy of the plastic shell of the reversing camera have also increased. Aiming at the problems of large inertia and hysteresis in the pressure part, this paper proposes an improved bat prediction algorithm to solve the pressure control accuracy. The optimal pressure control effect is obtained by introducing the improved bat algorithm combined with the MAC prediction algorithm to optimize the PID parameters. Combined with the experimental simulation results, it is shown that compared with the bat algorithm and the traditional PID algorithm, the improved bat prediction algorithm has better dynamic performance in pressure control, and the control pressure accuracy is high. At the same time, the disturbance test experiment is also added, and the algorithm shows strong robustness. The pressure part is better controlled, so that the welding accuracy of the reversing camera housing can be improved.
{"title":"Research on laser welding pressure control system based on MAC-IBA","authors":"Keliang Zhou, Qing Qin, Doudou Lu","doi":"10.1145/3558819.3565153","DOIUrl":"https://doi.org/10.1145/3558819.3565153","url":null,"abstract":"With the development of intelligent manufacturing in China, laser welding technology has entered the field of plastic welding from the initial welding in the metal field. At this stage, the domestic plastic welding technology is developing, and the requirements for the welding accuracy of the plastic shell of the reversing camera have also increased. Aiming at the problems of large inertia and hysteresis in the pressure part, this paper proposes an improved bat prediction algorithm to solve the pressure control accuracy. The optimal pressure control effect is obtained by introducing the improved bat algorithm combined with the MAC prediction algorithm to optimize the PID parameters. Combined with the experimental simulation results, it is shown that compared with the bat algorithm and the traditional PID algorithm, the improved bat prediction algorithm has better dynamic performance in pressure control, and the control pressure accuracy is high. At the same time, the disturbance test experiment is also added, and the algorithm shows strong robustness. The pressure part is better controlled, so that the welding accuracy of the reversing camera housing can be improved.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132759581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
5G message access platform mainly uses SIP technology. In actual production, Single SIP services cannot meet the requirements of hundreds of millions of users. Therefore, SIP services must provide load balancing capabilities. Adding a load balancer in front of multiple SIP service entry proxies is a common approach, but traffic balancing within a service is also an issue that needs to be addressed. Considering the business requirements and the internal structure of the system, this paper designs a high-availability solution, including the selection of load balancing at the entrance and the load distribution method within the network element. This paper first analyzes the characteristics of the current popular load balancer and then adjusts and selects the most suitable one for professional configuration according to business requirements. In addition, to meet SIP protocol requirements, specific load distribution methods are configured between NE. Finally, experiments verify that service traffic can be evenly distributed to different NE.
{"title":"5G message access platform based on load balancing","authors":"Ying Tong, Xiangli Jia, Baolin Liang, Jianqiang Feng","doi":"10.1145/3558819.3565135","DOIUrl":"https://doi.org/10.1145/3558819.3565135","url":null,"abstract":"5G message access platform mainly uses SIP technology. In actual production, Single SIP services cannot meet the requirements of hundreds of millions of users. Therefore, SIP services must provide load balancing capabilities. Adding a load balancer in front of multiple SIP service entry proxies is a common approach, but traffic balancing within a service is also an issue that needs to be addressed. Considering the business requirements and the internal structure of the system, this paper designs a high-availability solution, including the selection of load balancing at the entrance and the load distribution method within the network element. This paper first analyzes the characteristics of the current popular load balancer and then adjusts and selects the most suitable one for professional configuration according to business requirements. In addition, to meet SIP protocol requirements, specific load distribution methods are configured between NE. Finally, experiments verify that service traffic can be evenly distributed to different NE.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132996479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the rapid development of mobile Internet technology and the gradual expansion of the public's consumption and aesthetic demand for new wooden playthings, the offline sales channels of wooden playthings manufacturers have been difficult to meet the users' demand, and with the rapid development of Internet information technology and e-commerce, human beings have gradually stepped into the era of information overload. The system can use the user's collaborative filtering recommendation algorithm to recommend the highest similarity of the user's goods to the user, effectively solving the user's difficulty in finding quality goods resources from many goods information, improving the user's shopping experience, expanding the sales channels of enterprises, while the scheme designed in this paper lays the theoretical foundation for the development of other personalized recommendation systems The solution designed in this paper also lays the theoretical foundation for the development of other personalized recommendation systems.
{"title":"Research and design of a new personalized recommendation system for wooden artifacts based on collaborative filtering","authors":"B. Li","doi":"10.1145/3558819.3565105","DOIUrl":"https://doi.org/10.1145/3558819.3565105","url":null,"abstract":"With the rapid development of mobile Internet technology and the gradual expansion of the public's consumption and aesthetic demand for new wooden playthings, the offline sales channels of wooden playthings manufacturers have been difficult to meet the users' demand, and with the rapid development of Internet information technology and e-commerce, human beings have gradually stepped into the era of information overload. The system can use the user's collaborative filtering recommendation algorithm to recommend the highest similarity of the user's goods to the user, effectively solving the user's difficulty in finding quality goods resources from many goods information, improving the user's shopping experience, expanding the sales channels of enterprises, while the scheme designed in this paper lays the theoretical foundation for the development of other personalized recommendation systems The solution designed in this paper also lays the theoretical foundation for the development of other personalized recommendation systems.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131007621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In case of emergency, the evacuation of tourists must be improved, and the design of cruise ship should be more efficient in spatial layout, which needs to be designed on the spatial topology model and the emergency evacuation model of tourists. In this paper, FDS _ EVAC software is used to build the emergency evacuation decision-making path planning model of the cruise terminal, and then the data analysis of other factors in the algorithm model is carried out. The built-in plug-in Python is used for data analysis. The code involved in the cruise terminal automatically plans the optimal path through multiple logic 1,2,3... N, select the most appropriate and optimal path according to the actual situation of the cruise terminal, such as path N. The algorithm model adopted this time is C language, using C language to realize the whole process of the algorithm code. This paper studies the emergency evacuation decision-making path planning of cruise terminal based on ant colony algorithm, and explains the relevant content and working principle of emergency evacuation decision-making path planning of cruise terminal. The test results show that the ant colony algorithm-based emergency evacuation decision-making path planning of cruise terminals has a more efficient performance in emergency evacuation decision-making path planning of cruise terminals.
{"title":"Cruise Terminal Emergency Evacuation Decision Path Planning on Account of Ant Colony Algorithm","authors":"Di Cui","doi":"10.1145/3558819.3563736","DOIUrl":"https://doi.org/10.1145/3558819.3563736","url":null,"abstract":"In case of emergency, the evacuation of tourists must be improved, and the design of cruise ship should be more efficient in spatial layout, which needs to be designed on the spatial topology model and the emergency evacuation model of tourists. In this paper, FDS _ EVAC software is used to build the emergency evacuation decision-making path planning model of the cruise terminal, and then the data analysis of other factors in the algorithm model is carried out. The built-in plug-in Python is used for data analysis. The code involved in the cruise terminal automatically plans the optimal path through multiple logic 1,2,3... N, select the most appropriate and optimal path according to the actual situation of the cruise terminal, such as path N. The algorithm model adopted this time is C language, using C language to realize the whole process of the algorithm code. This paper studies the emergency evacuation decision-making path planning of cruise terminal based on ant colony algorithm, and explains the relevant content and working principle of emergency evacuation decision-making path planning of cruise terminal. The test results show that the ant colony algorithm-based emergency evacuation decision-making path planning of cruise terminals has a more efficient performance in emergency evacuation decision-making path planning of cruise terminals.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131204347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zookeeper atomic broadcast (Zab) is a atomic broadcast protocol specially designed for the distributed coordination service Zookeeper to support rout recovery. It is widely used in such scenarios as cluster management, load balancing and data publish and subscription. It is the core algorithm for ensuring Zookeeper data consistency. In this article, we design a Model-Based runtime Tracechecking system based on formal specification language TLA+ and its model checking tool TLC and use it to perform online verification against the behaviors of distributed Zookeeper cluster according to trace, which aims to monitor and check whether the actual execution of Zookeeper cluster complies with the Zab protocol specification. Firstly, stubs are added to relevant Zookeeper code modules which are synchronized with the implementation of Zab protocol state transitions to guarantee specific trace info generation and output to the target log file. Secondly, a formal model is built with TLA+ which can analyzes and specifies the state sequences info of Zookeeper cluster provided by trace, and the correctness and safety properties for this specification are also defined according to Zab protocol. A series of operators were also developed for TLC to load the trace info in history with different formats from the log files for model checking. The final experiment shows that this checking system can provide light-weighted and feasible formal method for verifying actual execution behaviors of distributed systems.
{"title":"Verifying Zookeeper based on Model-Based runtime Trace-Checking using TLA+","authors":"Zhi Niu, Luming Dong, Yong Zhu, Li Chen","doi":"10.1145/3558819.3558822","DOIUrl":"https://doi.org/10.1145/3558819.3558822","url":null,"abstract":"Zookeeper atomic broadcast (Zab) is a atomic broadcast protocol specially designed for the distributed coordination service Zookeeper to support rout recovery. It is widely used in such scenarios as cluster management, load balancing and data publish and subscription. It is the core algorithm for ensuring Zookeeper data consistency. In this article, we design a Model-Based runtime Tracechecking system based on formal specification language TLA+ and its model checking tool TLC and use it to perform online verification against the behaviors of distributed Zookeeper cluster according to trace, which aims to monitor and check whether the actual execution of Zookeeper cluster complies with the Zab protocol specification. Firstly, stubs are added to relevant Zookeeper code modules which are synchronized with the implementation of Zab protocol state transitions to guarantee specific trace info generation and output to the target log file. Secondly, a formal model is built with TLA+ which can analyzes and specifies the state sequences info of Zookeeper cluster provided by trace, and the correctness and safety properties for this specification are also defined according to Zab protocol. A series of operators were also developed for TLC to load the trace info in history with different formats from the log files for model checking. The final experiment shows that this checking system can provide light-weighted and feasible formal method for verifying actual execution behaviors of distributed systems.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132001700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Smart container transportation has gradually become the development trend of modern container transportation. A variety of wireless communication technologies have be used in smart containers, and wireless Ad Hoc network technology is widely recognized as future mainstream technology for data transmission of smart container. Aiming at the shortcomings of the existing AD HOC network protocol, this paper will design a new E-ZBR routing protocol algorithm based on the original ZBR routing protocol to improve the energy saving and stability of communication. Then the simulation experiment is carried out by QualNet software, and the two algorithms are compared and analyzed from many aspects. The simulation results show that the efficiency of the E-ZBR routing protocol is significantly higher than the traditional ZBR. As the number of nodes increases, the advantages of this algorithm in energy saving will be more obvious. The research results have been applied to practice and proved to have high application value. CCS CONCEPTS •Networks• Network algorithms• Data path algorithms
{"title":"Research on Protocol Optimization of Wireless Ad Hoc Network for Smart Container","authors":"Shibo Xu, Jing Wang, Shuhui Zhang","doi":"10.1145/3558819.3558832","DOIUrl":"https://doi.org/10.1145/3558819.3558832","url":null,"abstract":"Smart container transportation has gradually become the development trend of modern container transportation. A variety of wireless communication technologies have be used in smart containers, and wireless Ad Hoc network technology is widely recognized as future mainstream technology for data transmission of smart container. Aiming at the shortcomings of the existing AD HOC network protocol, this paper will design a new E-ZBR routing protocol algorithm based on the original ZBR routing protocol to improve the energy saving and stability of communication. Then the simulation experiment is carried out by QualNet software, and the two algorithms are compared and analyzed from many aspects. The simulation results show that the efficiency of the E-ZBR routing protocol is significantly higher than the traditional ZBR. As the number of nodes increases, the advantages of this algorithm in energy saving will be more obvious. The research results have been applied to practice and proved to have high application value. CCS CONCEPTS •Networks• Network algorithms• Data path algorithms","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132494536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}