Proceedings of the 2018 International Conference on Computer Science, Electronics and Communication Engineering (CSECE 2018)

Session: Communication Technology and Network Security

27 articles
Proceedings Article

A New Method for Sorting Radar Signal Based on Entropy Features

Jun Han, Xiaofei Lu, Minghao He, Xiaojie Tang
In order to figure out shortcomings of the existing method, such as the accuracy is not high and the method is sensitive to noise, we firstly Obtain the Wigner distribution space and bispectrum space for the received radar signal, then divide the space into subspace. Under the subspace distribution probability,...
Proceedings Article

A Spectrum Analysis Algorithm Based on GPU

Kunyuan Xu, Yanhua Jin, Fangyuan Zhao, Haoran Ma
Considering the requirement of spectrum analysis, the parallel spectrum analysis algorithm is designed for a software radio platform built on the spectrum analyzer, where CPU is the controller and GPU is the baseband processor. The software platform is combined with the GPU processor, making it possible...
Proceedings Article

Research on Access Control Model Based on User Trust Degree and Resource Life Cycle under Mobile Environment

Xiaoyan Zhang, Kai Kang
Traditional role-based access control models cannot meet the changing requirements of the roles and users under the mobile Internet environment due to their static attributes. To address such issue, this paper proposes an access control model, which is based on the user trust degree and the resource...
Proceedings Article

A Probe into the Key Parameter Monitor of V2G System on Electric Vehicle Based on Wireless Power Transmission Technology

Wangcheng Zhu, Zhenchao Xie, Xinshu Wan
As it is both significant and practical to study how the bidirectional wireless power transmission system can be applied to the monitor control of electric vehicle under V2G environment, this paper analyzes how the bidirectional wireless power transmission system works, based on which, probes into the...
Proceedings Article

An Air Bearing Facility for Antenna Pointing Mechanism

Guoyong Yang, Hongguang Wang, Lie Ling, Feng Gao
An air bearing facility is built to test the antenna pointing mechanism of track and data relay satellite. A hierarchical and simultaneous gravity unloading method is proposed to unload the gravity on the ground. The air bearing facility is a two layers structure. Planar air bearings and air spindle...
Proceedings Article

Research on Multi-Hop Routing Protocol of Wireless Sensor Networks Based on Gradients

Chenglong Hu, Yongzhen Li
The purposes of this paper are to lower the energy consumption in the wireless sensor network and to prolong network life cycle. Based on the maximum power a node can transmit, a multi-hop routing algorithm is proposed in this paper on the basis of gradients. We conducted a simulative experiment on the...
Proceedings Article

Observation-based Clock Synchronization in Wireless Sensor Networks

Ayako Arao, Hiroaki Higaki
In wireless sensor networks, each wireless sensor node records events occurred in its observation area with their observation time. Each wireless sensor node possesses its own local clock whose drift and offset are generally different from the others. By using observation records of the commonly observed...
Proceedings Article

Properties of a Self - gain Optical Fiber Differential Pressure Sensor Based on Damping Piston

Hao Hu, Liqiong Zhong
In this paper, the performance of a self-gain optical fiber differential pressure sensor based on damping piston is studied. Firstly, proposes the structure of mechanical packaging sensor probe based on the damping piston, and designs the sensor system; then, it carries out the theoretical research on...
Proceedings Article

Identifying Route Preferences over Origin-Destination Using Cellular Network Data

Zhichao Guo, Tongyu Zhu
Current research on studying people's routing behavior focus on how to provide the minimum cost routes while ignore users' preference. Therefore, to analyze user's routing preference, identifying routes they actually choose is a crucial task. Cellular network data contains sufficient spatio-temporal...
Proceedings Article

Two New Closed Form Approximate Maximum Likelihood Location Methods Based on Time Difference of Arrival Measurements

Wanchun Li, Qiu Tang, Yingxiang Li, Guobin Qian
In this paper, we propose two new closed form approximate maximum likelihood location methods via time difference of arrival (TDOA) measurements to determine the location of a target. For both two methods, an initial estimation is acquired by least square method in the first step. Then, supposing that...
Proceedings Article

A Dynamic Symmetric Fully Homomorphic Encryption Mechanism for Privacy Protection of Cooperative Precision Positioning Cloud Service

Dibin Shan, Xuehui Du, Wenjuan Wang, Nan Wang
With the increasingly serious threat of privacy protect, the collaborative precision positioning cloud service urgently needs to be carried out homomorphic encryption protection for sensitive data. But the existing asymmetrical approaches are inefficient and are not practical for applications, while...
Proceedings Article

Research on Temperature Control System Based on WeChat Remote Operation

Xuchen Guan, Yingqing Guo, Xinghuai Huang
In this paper, a temperature control system using WeChat remote operation is designed, including a design of the connection method, circuit and improved PID control algorithm. Besides, the STM32f103 control board with ENC28J60 Ethernet transceiver chip, WeChat server, connection and data exchange mode...
Proceedings Article

Anti-sunlight Jamming Technology of Laser Fuze

Xiangjin Zhang, Ruoyu Wu, Chengfang Shen, Wei Dai
Environmental elements, especially sunny weather, can easily interfere with the operation of a pulsed laser fuze. The solar radiation entering the detection system causes the fuze to produce a "false alarm." Consequently, the bomb may not work accurately. On the basis of the traditional theory of spectral...
Proceedings Article

Elevation Angle Estimation by Time Reversal Method in Homogeneous Shallow Sea Environment

Haixia Jing, Haiyan Wang, Zhengguo Liu, Xiaohong Shen, Tianyi Jia
This article discusses the problem of active detection and estimation for the elevation angle of a target in a homogeneous shallow sea environment, where a method using active detection on virtual time reversal (ADVTR) is proposed to solve the estimator performance decline problem caused by multipath...
Proceedings Article

An Improved TLD Tracking Algorithm for Fast-moving Object

Shijie Zhou, Yuanxi Peng, Kecheng Gong, Leizhi Shu
Traditional object tracking is easily affected by deformation, scale changes, illumination changes, partial occlusions and so on. TLD(Tracking-Learning-Detection) is a classic effective algorithm in long-term tracking which can solve these problems well. Meanwhile, the real-time performance of the system...
Proceedings Article

Multiple Centroid-Based Multi-Object Tracking by Decision Making

Hao Zhou, Jian He, Zhangqin Huang
Multiple object tracking(MOT) has many applications in different life scenes, such as autonomous driving and traffic management. A novel approach to object predictive tracking, which is based on the Multiple centroid, is proposed in this paper to overcome the problems of occlusion, scale changes and...
Proceedings Article

Characterizing the Impact of DDoS Attack on Inter-domain Routing System: A Case Study of the Dyn Cyberattack

Yujing Liu, Zhilin Wang, Nan Li
The inter-domain routing protocol BGP is sensitive to severe network congestion. In order to study the reliability of BGP under stress, we take the Dyn cyberattack on October 21st, 2016 as a study case to characterize the impact of DDoS attack on inter-domain routing system. We propose several metrics...
Proceedings Article

IoT Node Trust Authorization Model

Ruizhong Du, Chong Liu, Fanming Liu
Aiming at the characteristics of strong heterogeneity and limited computing ability of IoT nodes, this dissertation proposes a Trust Authorization Model based on detection feedback in IoT, combined with the current trust model of IoT and implement storage and other tasks by calculating and storing the...
Proceedings Article

A Network System Security Assessment Method Based on Penetration Testing

Yue Li, Xiaolin Zhao, Chonghan Zeng, Yu Fu, Ning Wang
As the development of the information technology, people show strong interest to the emergence of all sorts of convenient and new technologies. However, there will be vulnerability in these technologies and bad attackers may be attack it to break it down. So, if we want to protect a system in detail,...
Proceedings Article

A Novel Weak Deduction Password Strength Meter of Chinese Websites

Yu Wu
With the increasing situation of passwords datasets disclosure, the security of user's account faces rising risks under various kinds of password attack. To protect the security of user authentication system, password strength meter (PSM), which is used to measure user's password strength is widely accepted...
Proceedings Article

A Novel Video Encryption Method Based on Faster R-CNN

Lijuan Duan, Dongkui Zhang, Fan Xu, Guoqin Cui
In order to improve the generalization perfor-mance of video encryption and reduce the amount of data in vid-eo en-cryption, this paper proposes a video encryption on regions of interest (ROI) method based on Faster R-CNN by combining machine learning with information security. The method trains a Faster...
Proceedings Article

Common-Key Cryptosystem with Mixture of Fake Plaintexts

Masayoshi Hayashi, Hiroaki Higaki
One of the fundamental methods for eavesdroppers to achieve a plaintext from a cryptogram is the brute force attack where possible candidates of decryption keys are exhaustively applied to the decryption algorithm. Here the only reason why the eavesdroppers believe to find the common-key and to achieve...
Proceedings Article

Modeling Confrontations in Complex Networks Based on Game Theory

Yapeng Li, Jun Wu
To fully understand the structure robustness of complex networks where confrontations of attackers and defenders happen, we build a game model which is a zero-sum game in simultaneous form. We assume that the attack and defense are only against the top-n vital nodes and evaluate the payoffs using the...
Proceedings Article

Complex Project Schedule Risk Simulation Based on Multi-agent

Haolin Wen, Tao Hu, Gongda Yan
In order to solve the problems of complex projects schedule risk assessment, a project schedule risk assessment model based on the multi-agent was established by the Anylogic software in this paper. In this model, a "process" agent, a "process flow", a "risk factor" and a "control" agent were designed...
Proceedings Article

Research on Risk of Online Supply Chain Finance

Daozhi Zhao, Di Wang, Baosen Wang
In recent years, with the deeply combine of "Internet + finance", traditional supply chain finance has also accelerated the pace of online operation, and its risks have gradually been exposed. Therefore, it is necessary to study the risk of the online supply chain finance in order to clarify its characteristics,...
Proceedings Article

Supply Chain Financial Ecology Model Design and Risk Management Research

Baosen Wang, Wenjiao Lan, Chunming Fan
Supply chain finance is an emerging model, which treats the core enterprises in the supply chain and the upstream and downstream SMEs as a whole. The commercial banks provide financial services to the entire supply chain. According to the natural ecosystem structure model, this paper summarized the composition...
Proceedings Article

The Effect of Behavior Conformity on Prisoner's Dilemma Game

Zidong Chai, Yanbo Zhang, Xinyu Zhang, Xiaobo Liu
Explaining the evolution of cooperative behavior is one of the most important and interesting problems in a myriad of disciplines. Game players on complex networks usually change their strategies by copying special rules. In this research, we combine the prisoner's dilemma game player's behavior conformity...