Pub Date : 2020-12-11DOI: 10.1109/TOCS50858.2020.9339714
Huanjuan Wang, X. Yu, Jiaqi Peng, Lei Zhang, Tianxing Xu
Basing on traceability and tamper-resistant of blockchain, as well as unique identification of Internet of things, construct new pattern of power material information blockchain uploading scheme, building a waste material processing system based on blockchain technology can effectively manage the whole process of power materials, and carry out reliable traceability for material related information and the whole process, so as to achieve transparent and intelligent material procurement and whole process management.
{"title":"Design of Power Material Management System Basing on Internet of Things Identification and Blockchain","authors":"Huanjuan Wang, X. Yu, Jiaqi Peng, Lei Zhang, Tianxing Xu","doi":"10.1109/TOCS50858.2020.9339714","DOIUrl":"https://doi.org/10.1109/TOCS50858.2020.9339714","url":null,"abstract":"Basing on traceability and tamper-resistant of blockchain, as well as unique identification of Internet of things, construct new pattern of power material information blockchain uploading scheme, building a waste material processing system based on blockchain technology can effectively manage the whole process of power materials, and carry out reliable traceability for material related information and the whole process, so as to achieve transparent and intelligent material procurement and whole process management.","PeriodicalId":373862,"journal":{"name":"2020 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116853641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-11DOI: 10.1109/TOCS50858.2020.9339614
Pan Hui
This paper constructs the index system and risk assessment model of information security risk in smart cities. According to the principles of integrity, pertinence, operability and completeness of index selection, and according to the key factors specified in the information security risk assessment standard, 20 risk factors are selected as evaluation indicators from five levels: smart city infrastructure, data service, information content, information management and public literacy, forming the final evaluation index system. By analyzing the requirements of smart city information security risk assessment, the common risk assessment methods are compared, and finally the decision tree algorithm is selected to build the information security risk assessment model of smart city.
{"title":"Construction of Information Security Risk Assessment Model in Smart City","authors":"Pan Hui","doi":"10.1109/TOCS50858.2020.9339614","DOIUrl":"https://doi.org/10.1109/TOCS50858.2020.9339614","url":null,"abstract":"This paper constructs the index system and risk assessment model of information security risk in smart cities. According to the principles of integrity, pertinence, operability and completeness of index selection, and according to the key factors specified in the information security risk assessment standard, 20 risk factors are selected as evaluation indicators from five levels: smart city infrastructure, data service, information content, information management and public literacy, forming the final evaluation index system. By analyzing the requirements of smart city information security risk assessment, the common risk assessment methods are compared, and finally the decision tree algorithm is selected to build the information security risk assessment model of smart city.","PeriodicalId":373862,"journal":{"name":"2020 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115115185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-11DOI: 10.1109/TOCS50858.2020.9339687
Wei Zhao, Xiaoming Jiang, Jingchun Wang
Because the part of rules matching takes up a relatively high proportion in the current intrusion detection model and the rules adjustment can also influence the data accuracy, this paper proposes an anomalous detection model based on the active rules. Aiming at the problem of low rules adjustment efficiency in the current model, this paper designs the structure of active rules and a dynamic adjustment approach of active rules based on two-steps. This paper selects rules matching approach to update the matching process dynamically on the basis of activeness, and thus reducing the time complexity of intrusion detection system and false alarm rate. The experimental results indicate that the anomalous detection model relying on active rules proposed here can further improve the efficiency of rules matching and reduce the false alarm rate, performing a stronger practicability.
{"title":"Cloud Data Center Intrusion Detection Model Based on Active Rules","authors":"Wei Zhao, Xiaoming Jiang, Jingchun Wang","doi":"10.1109/TOCS50858.2020.9339687","DOIUrl":"https://doi.org/10.1109/TOCS50858.2020.9339687","url":null,"abstract":"Because the part of rules matching takes up a relatively high proportion in the current intrusion detection model and the rules adjustment can also influence the data accuracy, this paper proposes an anomalous detection model based on the active rules. Aiming at the problem of low rules adjustment efficiency in the current model, this paper designs the structure of active rules and a dynamic adjustment approach of active rules based on two-steps. This paper selects rules matching approach to update the matching process dynamically on the basis of activeness, and thus reducing the time complexity of intrusion detection system and false alarm rate. The experimental results indicate that the anomalous detection model relying on active rules proposed here can further improve the efficiency of rules matching and reduce the false alarm rate, performing a stronger practicability.","PeriodicalId":373862,"journal":{"name":"2020 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124911105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-11DOI: 10.1109/TOCS50858.2020.9339717
Ting Guo, Li Xu, Huanqi Ye, Shaojun An
The far-flung ocean has abundant resource and the exploitation area of ocean oil and gas is developing from offshore to deep-water and ultra-deep-water following the increase demand for oil and gas resource. Therefore, one of the floating structures for deep-water exploitation is Semi-submersible. The compute of mooring lines' coupled dynamic analysis by using the 3-D potential theory, API of wind and JONSWAP of wave. The result indicate that the skewness coefficient and standard deviation of the mooring lines are symmetric in the N direction, so the tension on the mooring lines are relatively small, and the amplitude of the semi-submersible platform with multi-point mooring is relatively small, too.
{"title":"Study on coupled dynamic analysis of Semi-Submersible's mooring system in South China Sea","authors":"Ting Guo, Li Xu, Huanqi Ye, Shaojun An","doi":"10.1109/TOCS50858.2020.9339717","DOIUrl":"https://doi.org/10.1109/TOCS50858.2020.9339717","url":null,"abstract":"The far-flung ocean has abundant resource and the exploitation area of ocean oil and gas is developing from offshore to deep-water and ultra-deep-water following the increase demand for oil and gas resource. Therefore, one of the floating structures for deep-water exploitation is Semi-submersible. The compute of mooring lines' coupled dynamic analysis by using the 3-D potential theory, API of wind and JONSWAP of wave. The result indicate that the skewness coefficient and standard deviation of the mooring lines are symmetric in the N direction, so the tension on the mooring lines are relatively small, and the amplitude of the semi-submersible platform with multi-point mooring is relatively small, too.","PeriodicalId":373862,"journal":{"name":"2020 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129803953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper summarizes the status and results of current research on cloud computing resource scheduling optimization problems. At the virtual resource layer, it focuses on analyzes and discussion pertaining to quality of service and efficiency-aware resource scheduling strategies, node task load balance and resource utilization-aware resource scheduling strategies, and multi-objective optimization resource scheduling strategies. At the physical resource layer, the paper focuses on data center load balance-aware resource scheduling strategies, energy consumption and cost-aware resource scheduling strategies, resource scheduling strategies with containers as virtual units, and reinforcement learning resource scheduling strategy. Finally, on the basis of the reviewed literature results, this paper proposes future research directions for cloud computing resource management and scheduling.
{"title":"Virtualized Resource Scheduling in Cloud Computing Environments: An Review","authors":"Jianpeng Lin, Delong Cui, Zhiping Peng, Qirui Li, Jieguang He, Mian Guo","doi":"10.1109/TOCS50858.2020.9339736","DOIUrl":"https://doi.org/10.1109/TOCS50858.2020.9339736","url":null,"abstract":"This paper summarizes the status and results of current research on cloud computing resource scheduling optimization problems. At the virtual resource layer, it focuses on analyzes and discussion pertaining to quality of service and efficiency-aware resource scheduling strategies, node task load balance and resource utilization-aware resource scheduling strategies, and multi-objective optimization resource scheduling strategies. At the physical resource layer, the paper focuses on data center load balance-aware resource scheduling strategies, energy consumption and cost-aware resource scheduling strategies, resource scheduling strategies with containers as virtual units, and reinforcement learning resource scheduling strategy. Finally, on the basis of the reviewed literature results, this paper proposes future research directions for cloud computing resource management and scheduling.","PeriodicalId":373862,"journal":{"name":"2020 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)","volume":"360 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124533492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-11DOI: 10.1109/TOCS50858.2020.9339688
Qing Zhao, N. Li, Li Fang
Multi-site protein subcellular localization prediction has close relationship with protein function, metabolic and transduction between signals. It can play an important role in speculating the biological function of protein, clearing the gene function and clarifying the internal mechanism of diseases. As some proteins located in two or more subcellulars at the same time, it is necessary for us to do the research on multi-site protein subcellular localization prediction. This paper reviewed the problem from the following four aspects, dataset construction, protein features extraction, predicting algorithm and algorithm evaluation.
{"title":"Prediction of Multi-site Protein Subcellular Localization","authors":"Qing Zhao, N. Li, Li Fang","doi":"10.1109/TOCS50858.2020.9339688","DOIUrl":"https://doi.org/10.1109/TOCS50858.2020.9339688","url":null,"abstract":"Multi-site protein subcellular localization prediction has close relationship with protein function, metabolic and transduction between signals. It can play an important role in speculating the biological function of protein, clearing the gene function and clarifying the internal mechanism of diseases. As some proteins located in two or more subcellulars at the same time, it is necessary for us to do the research on multi-site protein subcellular localization prediction. This paper reviewed the problem from the following four aspects, dataset construction, protein features extraction, predicting algorithm and algorithm evaluation.","PeriodicalId":373862,"journal":{"name":"2020 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126850259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-11DOI: 10.1109/TOCS50858.2020.9339741
Liwei Huang, Yulin Chen, Hui Huang
This paper studys ASK, FSK and PSK, which are different digital modulation methods of communication system. The experiments are done under two different conditions. In the situation of no noise, the simulation results of simulink show that after modulation and demodulation, the demodulated signal is roughly the same as the original signal. In the sitution of noise, filter is needed to reconstruct the signal.
{"title":"Research of Digital Communication System","authors":"Liwei Huang, Yulin Chen, Hui Huang","doi":"10.1109/TOCS50858.2020.9339741","DOIUrl":"https://doi.org/10.1109/TOCS50858.2020.9339741","url":null,"abstract":"This paper studys ASK, FSK and PSK, which are different digital modulation methods of communication system. The experiments are done under two different conditions. In the situation of no noise, the simulation results of simulink show that after modulation and demodulation, the demodulated signal is roughly the same as the original signal. In the sitution of noise, filter is needed to reconstruct the signal.","PeriodicalId":373862,"journal":{"name":"2020 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131516123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-11DOI: 10.1109/TOCS50858.2020.9339612
Yanjie Gong, Zhen Wang, Dantao Han
Through the different nodes in the address space of OPC UA Server, different OPC UA Clients can get a data set full of information, which includes variables, objects, methods, events and types. Customized data types can also be defined in the set. OPC UA Clients need to access the relevant type definition first, which describes the information structure and the encoding rules of the nodes they want to access. So, it's important to define a vendor specific type for a resource-constrained device server, and try to simplify the Complex data model. This article describes the basic structure of the standard OPC UA Address Space, which nodes are mandatory and which are optional in the UA Server. It proposes the principal of building a vendor UA Server, and introduce the open source tool UA-Model Compiler, which can help vendor to customize the minimal namespace0 contained in the UA Server.
通过OPC UA Server地址空间中的不同节点,不同的OPC UA client可以得到一个包含变量、对象、方法、事件、类型等信息的数据集。还可以在集合中定义自定义数据类型。OPC UA客户端需要首先访问相关的类型定义,它描述了他们想要访问的节点的信息结构和编码规则。因此,为资源受限的设备服务器定义特定于供应商的类型并尝试简化Complex数据模型非常重要。本文描述了标准OPC UA地址空间的基本结构,在UA服务器中哪些节点是强制性的,哪些节点是可选的。提出了构建供应商UA服务器的原则,并介绍了开源工具UA模型编译器,该工具可以帮助供应商定制UA服务器中包含的最小命名空间。
{"title":"OPC UA Information Modeling Method and Xml Definition","authors":"Yanjie Gong, Zhen Wang, Dantao Han","doi":"10.1109/TOCS50858.2020.9339612","DOIUrl":"https://doi.org/10.1109/TOCS50858.2020.9339612","url":null,"abstract":"Through the different nodes in the address space of OPC UA Server, different OPC UA Clients can get a data set full of information, which includes variables, objects, methods, events and types. Customized data types can also be defined in the set. OPC UA Clients need to access the relevant type definition first, which describes the information structure and the encoding rules of the nodes they want to access. So, it's important to define a vendor specific type for a resource-constrained device server, and try to simplify the Complex data model. This article describes the basic structure of the standard OPC UA Address Space, which nodes are mandatory and which are optional in the UA Server. It proposes the principal of building a vendor UA Server, and introduce the open source tool UA-Model Compiler, which can help vendor to customize the minimal namespace0 contained in the UA Server.","PeriodicalId":373862,"journal":{"name":"2020 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131628568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-11DOI: 10.1109/TOCS50858.2020.9339750
Qinglong Ma
using binocular distance measurement technology to obtain the distance between the dangerous object and the transmission line, which provides powerful data information for the judgment of the risk degree of external damage and the assessment of the probability of the line suffering from external damage, so as to ensure the safety of the line. In order to solve the problem of large epipolar error caused by serious image distortion under wide-angle lens, local two-dimensional line matching scanning technology, which based on the object position information obtained by target detection, reduced the influence of epipolar error and increase the robustness of matching. At the same time, the dense calculation of global image distance is degraded to the local dense calculation of target, which improves the real-time performance of binocular ranging algorithm in high-resolution monitoring image. Finally, the image segmentation technology is used to improve the mismatching problem at the depth discontinuity to further improve the accuracy of binocular ranging.
{"title":"The research on binocular ranging technology for transmission lines based on two - dimensional line matching","authors":"Qinglong Ma","doi":"10.1109/TOCS50858.2020.9339750","DOIUrl":"https://doi.org/10.1109/TOCS50858.2020.9339750","url":null,"abstract":"using binocular distance measurement technology to obtain the distance between the dangerous object and the transmission line, which provides powerful data information for the judgment of the risk degree of external damage and the assessment of the probability of the line suffering from external damage, so as to ensure the safety of the line. In order to solve the problem of large epipolar error caused by serious image distortion under wide-angle lens, local two-dimensional line matching scanning technology, which based on the object position information obtained by target detection, reduced the influence of epipolar error and increase the robustness of matching. At the same time, the dense calculation of global image distance is degraded to the local dense calculation of target, which improves the real-time performance of binocular ranging algorithm in high-resolution monitoring image. Finally, the image segmentation technology is used to improve the mismatching problem at the depth discontinuity to further improve the accuracy of binocular ranging.","PeriodicalId":373862,"journal":{"name":"2020 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130755978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-11DOI: 10.1109/TOCS50858.2020.9339738
Juan Wang
With the development of optical fiber technology, the application of dynamic grating has been widely concerned, such as optical fiber sensor, tunable narrow-band filter, fiber amplifier and so on. The erbium-doped fiber is selected as the dynamic grating, and one end of the erbium-doped fiber is connected. The forward wave is reflected by the Fiber Bragg Grating (FBG) to form a backward wave propagating backward. If the reflectivity of the Bragg grating is very close to 1, the standing wave field formed by the forward wave and the backward wave is perfect standing wave. The transmittance is calculated by the transmission matrix, and the grating parameters are converted into the control parameters in the writing process by the program-aided design, so as to guide the writing of the fiber grating. An important property of Fabry-Perot cavity is that its output spectrum can be dynamically modulated by adjusting parameters. Due to the adjustable parameters of the erbium-doped dynamic grating, compared with Fabry-Perot cavity composed of two identical fiber gratings, the parameters can be flexibly adjusted, and the fiber Bragg gratings at both ends of Fabry-Perot cavity can be fully symmetrical, which theoretically guarantees the optical performance 100% lossless transmission is conducive to the mode selection of Fabry-Perot cavity. The optical fiber Fabry-Perot cavity can be applied to the optical signal processing of optical fiber communication or the field of optical fiber sensing.
{"title":"Research on Dynamic Grating Cascaded Fiber Bragg Grating Fabry-Perot Cavity","authors":"Juan Wang","doi":"10.1109/TOCS50858.2020.9339738","DOIUrl":"https://doi.org/10.1109/TOCS50858.2020.9339738","url":null,"abstract":"With the development of optical fiber technology, the application of dynamic grating has been widely concerned, such as optical fiber sensor, tunable narrow-band filter, fiber amplifier and so on. The erbium-doped fiber is selected as the dynamic grating, and one end of the erbium-doped fiber is connected. The forward wave is reflected by the Fiber Bragg Grating (FBG) to form a backward wave propagating backward. If the reflectivity of the Bragg grating is very close to 1, the standing wave field formed by the forward wave and the backward wave is perfect standing wave. The transmittance is calculated by the transmission matrix, and the grating parameters are converted into the control parameters in the writing process by the program-aided design, so as to guide the writing of the fiber grating. An important property of Fabry-Perot cavity is that its output spectrum can be dynamically modulated by adjusting parameters. Due to the adjustable parameters of the erbium-doped dynamic grating, compared with Fabry-Perot cavity composed of two identical fiber gratings, the parameters can be flexibly adjusted, and the fiber Bragg gratings at both ends of Fabry-Perot cavity can be fully symmetrical, which theoretically guarantees the optical performance 100% lossless transmission is conducive to the mode selection of Fabry-Perot cavity. The optical fiber Fabry-Perot cavity can be applied to the optical signal processing of optical fiber communication or the field of optical fiber sensing.","PeriodicalId":373862,"journal":{"name":"2020 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133982712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}