Proceedings of the 2018 International Conference on Computer Science, Electronics and Communication Engineering (CSECE 2018)
Session: Communication Technology and Network Security
27 articles
Proceedings Article
A New Method for Sorting Radar Signal Based on Entropy Features
Jun Han, Xiaofei Lu, Minghao He, Xiaojie Tang
In order to figure out shortcomings of the existing method, such as the accuracy is not high and the method is sensitive to noise, we firstly Obtain the Wigner distribution space and bispectrum space for the received radar signal, then divide the space into subspace. Under the subspace distribution probability,...
Proceedings Article
A Spectrum Analysis Algorithm Based on GPU
Kunyuan Xu, Yanhua Jin, Fangyuan Zhao, Haoran Ma
Considering the requirement of spectrum analysis, the parallel spectrum analysis algorithm is designed for a software radio platform built on the spectrum analyzer, where CPU is the controller and GPU is the baseband processor. The software platform is combined with the GPU processor, making it possible...
Proceedings Article
Research on Access Control Model Based on User Trust Degree and Resource Life Cycle under Mobile Environment
Xiaoyan Zhang, Kai Kang
Traditional role-based access control models cannot meet the changing requirements of the roles and users under the mobile Internet environment due to their static attributes. To address such issue, this paper proposes an access control model, which is based on the user trust degree and the resource...
Proceedings Article
A Probe into the Key Parameter Monitor of V2G System on Electric Vehicle Based on Wireless Power Transmission Technology
Wangcheng Zhu, Zhenchao Xie, Xinshu Wan
As it is both significant and practical to study how the bidirectional wireless power transmission system can be applied to the monitor control of electric vehicle under V2G environment, this paper analyzes how the bidirectional wireless power transmission system works, based on which, probes into the...
Proceedings Article
An Air Bearing Facility for Antenna Pointing Mechanism
Guoyong Yang, Hongguang Wang, Lie Ling, Feng Gao
An air bearing facility is built to test the antenna pointing mechanism of track and data relay satellite. A hierarchical and simultaneous gravity unloading method is proposed to unload the gravity on the ground. The air bearing facility is a two layers structure. Planar air bearings and air spindle...
Proceedings Article
Research on Multi-Hop Routing Protocol of Wireless Sensor Networks Based on Gradients
Chenglong Hu, Yongzhen Li
The purposes of this paper are to lower the energy consumption in the wireless sensor network and to prolong network life cycle. Based on the maximum power a node can transmit, a multi-hop routing algorithm is proposed in this paper on the basis of gradients. We conducted a simulative experiment on the...
Proceedings Article
Observation-based Clock Synchronization in Wireless Sensor Networks
Ayako Arao, Hiroaki Higaki
In wireless sensor networks, each wireless sensor node records events occurred in its observation area with their observation time. Each wireless sensor node possesses its own local clock whose drift and offset are generally different from the others. By using observation records of the commonly observed...
Proceedings Article
Properties of a Self - gain Optical Fiber Differential Pressure Sensor Based on Damping Piston
Hao Hu, Liqiong Zhong
In this paper, the performance of a self-gain optical fiber differential pressure sensor based on damping piston is studied. Firstly, proposes the structure of mechanical packaging sensor probe based on the damping piston, and designs the sensor system; then, it carries out the theoretical research on...
Proceedings Article
Identifying Route Preferences over Origin-Destination Using Cellular Network Data
Zhichao Guo, Tongyu Zhu
Current research on studying people's routing behavior focus on how to provide the minimum cost routes while ignore users' preference. Therefore, to analyze user's routing preference, identifying routes they actually choose is a crucial task. Cellular network data contains sufficient spatio-temporal...
Proceedings Article
Two New Closed Form Approximate Maximum Likelihood Location Methods Based on Time Difference of Arrival Measurements
Wanchun Li, Qiu Tang, Yingxiang Li, Guobin Qian
In this paper, we propose two new closed form approximate maximum likelihood location methods via time difference of arrival (TDOA) measurements to determine the location of a target. For both two methods, an initial estimation is acquired by least square method in the first step. Then, supposing that...
Proceedings Article
A Dynamic Symmetric Fully Homomorphic Encryption Mechanism for Privacy Protection of Cooperative Precision Positioning Cloud Service
Dibin Shan, Xuehui Du, Wenjuan Wang, Nan Wang
With the increasingly serious threat of privacy protect, the collaborative precision positioning cloud service urgently needs to be carried out homomorphic encryption protection for sensitive data. But the existing asymmetrical approaches are inefficient and are not practical for applications, while...
Proceedings Article
Research on Temperature Control System Based on WeChat Remote Operation
Xuchen Guan, Yingqing Guo, Xinghuai Huang
In this paper, a temperature control system using WeChat remote operation is designed, including a design of the connection method, circuit and improved PID control algorithm. Besides, the STM32f103 control board with ENC28J60 Ethernet transceiver chip, WeChat server, connection and data exchange mode...
Proceedings Article
Anti-sunlight Jamming Technology of Laser Fuze
Xiangjin Zhang, Ruoyu Wu, Chengfang Shen, Wei Dai
Environmental elements, especially sunny weather, can easily interfere with the operation of a pulsed laser fuze. The solar radiation entering the detection system causes the fuze to produce a "false alarm." Consequently, the bomb may not work accurately. On the basis of the traditional theory of spectral...
Proceedings Article
Elevation Angle Estimation by Time Reversal Method in Homogeneous Shallow Sea Environment
Haixia Jing, Haiyan Wang, Zhengguo Liu, Xiaohong Shen, Tianyi Jia
This article discusses the problem of active detection and estimation for the elevation angle of a target in a homogeneous shallow sea environment, where a method using active detection on virtual time reversal (ADVTR) is proposed to solve the estimator performance decline problem caused by multipath...
Proceedings Article
An Improved TLD Tracking Algorithm for Fast-moving Object
Shijie Zhou, Yuanxi Peng, Kecheng Gong, Leizhi Shu
Traditional object tracking is easily affected by deformation, scale changes, illumination changes, partial occlusions and so on. TLD(Tracking-Learning-Detection) is a classic effective algorithm in long-term tracking which can solve these problems well. Meanwhile, the real-time performance of the system...
Proceedings Article
Multiple Centroid-Based Multi-Object Tracking by Decision Making
Hao Zhou, Jian He, Zhangqin Huang
Multiple object tracking(MOT) has many applications in different life scenes, such as autonomous driving and traffic management. A novel approach to object predictive tracking, which is based on the Multiple centroid, is proposed in this paper to overcome the problems of occlusion, scale changes and...
Proceedings Article
Characterizing the Impact of DDoS Attack on Inter-domain Routing System: A Case Study of the Dyn Cyberattack
Yujing Liu, Zhilin Wang, Nan Li
The inter-domain routing protocol BGP is sensitive to severe network congestion. In order to study the reliability of BGP under stress, we take the Dyn cyberattack on October 21st, 2016 as a study case to characterize the impact of DDoS attack on inter-domain routing system. We propose several metrics...
Proceedings Article
IoT Node Trust Authorization Model
Ruizhong Du, Chong Liu, Fanming Liu
Aiming at the characteristics of strong heterogeneity and limited computing ability of IoT nodes, this dissertation proposes a Trust Authorization Model based on detection feedback in IoT, combined with the current trust model of IoT and implement storage and other tasks by calculating and storing the...
Proceedings Article
A Network System Security Assessment Method Based on Penetration Testing
Yue Li, Xiaolin Zhao, Chonghan Zeng, Yu Fu, Ning Wang
As the development of the information technology, people show strong interest to the emergence of all sorts of convenient and new technologies. However, there will be vulnerability in these technologies and bad attackers may be attack it to break it down. So, if we want to protect a system in detail,...
Proceedings Article
A Novel Weak Deduction Password Strength Meter of Chinese Websites
Yu Wu
With the increasing situation of passwords datasets disclosure, the security of user's account faces rising risks under various kinds of password attack. To protect the security of user authentication system, password strength meter (PSM), which is used to measure user's password strength is widely accepted...
Proceedings Article
A Novel Video Encryption Method Based on Faster R-CNN
Lijuan Duan, Dongkui Zhang, Fan Xu, Guoqin Cui
In order to improve the generalization perfor-mance of video encryption and reduce the amount of data in vid-eo en-cryption, this paper proposes a video encryption on regions of interest (ROI) method based on Faster R-CNN by combining machine learning with information security. The method trains a Faster...
Proceedings Article
Common-Key Cryptosystem with Mixture of Fake Plaintexts
Masayoshi Hayashi, Hiroaki Higaki
One of the fundamental methods for eavesdroppers to achieve a plaintext from a cryptogram is the brute force attack where possible candidates of decryption keys are exhaustively applied to the decryption algorithm. Here the only reason why the eavesdroppers believe to find the common-key and to achieve...
Proceedings Article
Modeling Confrontations in Complex Networks Based on Game Theory
Yapeng Li, Jun Wu
To fully understand the structure robustness of complex networks where confrontations of attackers and defenders happen, we build a game model which is a zero-sum game in simultaneous form. We assume that the attack and defense are only against the top-n vital nodes and evaluate the payoffs using the...
Proceedings Article
Complex Project Schedule Risk Simulation Based on Multi-agent
Haolin Wen, Tao Hu, Gongda Yan
In order to solve the problems of complex projects schedule risk assessment, a project schedule risk assessment model based on the multi-agent was established by the Anylogic software in this paper. In this model, a "process" agent, a "process flow", a "risk factor" and a "control" agent were designed...
Proceedings Article
Research on Risk of Online Supply Chain Finance
Daozhi Zhao, Di Wang, Baosen Wang
In recent years, with the deeply combine of "Internet + finance", traditional supply chain finance has also accelerated the pace of online operation, and its risks have gradually been exposed. Therefore, it is necessary to study the risk of the online supply chain finance in order to clarify its characteristics,...
Proceedings Article
Supply Chain Financial Ecology Model Design and Risk Management Research
Baosen Wang, Wenjiao Lan, Chunming Fan
Supply chain finance is an emerging model, which treats the core enterprises in the supply chain and the upstream and downstream SMEs as a whole. The commercial banks provide financial services to the entire supply chain. According to the natural ecosystem structure model, this paper summarized the composition...
Proceedings Article
The Effect of Behavior Conformity on Prisoner's Dilemma Game
Zidong Chai, Yanbo Zhang, Xinyu Zhang, Xiaobo Liu
Explaining the evolution of cooperative behavior is one of the most important and interesting problems in a myriad of disciplines. Game players on complex networks usually change their strategies by copying special rules. In this research, we combine the prisoner's dilemma game player's behavior conformity...