<p><p>This book gathers selected papers presented at the 3rd International Conference on Wireless Communications and Applications (ICWCA 2019), held at Hainan University, China. It covers up-to-date smart theories and approaches, as reflected in contemporary technical achievements in the area. The t
Advances in Wireless Communications and Applications: Wireless Technology: Intelligent Network Technologies, Smart Services and Applications, ... Innovation, Systems and Technologies, 307)
â Scribed by Lakhmi C. Jain (editor), Roumen Kountchev (editor), Kun Zhang (editor), Roumiana Kountcheva (editor)
- Publisher
- Springer
- Year
- 2022
- Tongue
- English
- Leaves
- 188
- Edition
- 1st ed. 2022
- Category
- Library
No coin nor oath required. For personal study only.
⌠Synopsis
This book features selected papers presented at the 5th International Conference on Wireless Communications and Applications (ICWCA 2021), held at Hainan University, China. The book will focus on the presentation of the newest trends and achievements in the development of intelligent algorithms and network technologies in smart communications, with application in underwater communications, IoT-based marine surface communications as well as state-of-the-art real-time precise location technologies, WiFi/Bluetooth locationing, array signal processing and many others.
⌠Table of Contents
Preface
Organization
Steering Committee
General Chairs
Members
Program Committee
Program Chairs
International Program Committee
Technical Program Committee
Contents
About the Editors
Equipment Terminals Optimization Control Method for Sensing Terminal of Power IoT Platform
1 Introduction
2 Related Work
3 Perception Terminal Multi-service Equipment Terminals Optimization Method
3.1 Multi-service Scheduling Optimization Architecture
3.2 End-Equipment Terminals Presets
3.3 Multi-service Equipment Terminals Optimization Methods
4 Experimental Simulation
4.1 Model Business Performance Evaluation
4.2 Business Scenario Validation
5 Conclusion
References
Comprehensive Evaluation of Intelligent Obstacle Avoidance Function by Changing Lanes of Vehicle Based on an Improved Evaluation Index System
1 Introduction
2 Comprehensive Evaluation
2.1 Improved Evaluation Index System
2.2 Fuzzy Comprehensive Evaluation Method Based on Combination Assignment
3 Example Analysis
3.1 Calculating Combination Weights
3.2 Fuzzy Comprehensive Evaluation
3.3 Analysis of Evaluation Results
4 Conclusion
References
An Evaluation Method of Wireless Communication Key Performance Through Receiving the Signal Transmitting by Itself
1 Introduction
2 Evaluation Plan Design
3 Clock Frequency Deviation Calibration Method
3.1 Dynamic Calibration Method of Clock Frequency Deviation Based on Real-Time Temperature
3.2 Clock Frequency Deviation Kalman Filter Dynamic Estimation Method Based on PPS Signal
4 Key Performance Indicator Calculation Method
5 Experimental Verification
6 Summarize
References
A Method for Optimizing Communication Network Topology Based on Genetic Algorithm
1 Introduction
2 Communication Network Reliability Optimization Model Based on Natural Connectivity
3 Communication Network Reliability Simulation and Optimization Method Based on Genetic Algorithm
3.1 Variable Coding
3.2 Selection Operation
3.3 Cross Operation
3.4 Mutation Operation
4 Algorithm Improvement and Model Constraint
4.1 Algorithm Improvement
4.2 Model Constraints
5 Simulation Experiment and Analysis
5.1 Experimental Simulation of Optimized Topology Structure
5.2 Network Topology Analysis
6 Conclusion
References
Network Security Risk Analysis of Ship Intelligent Navigation
1 Introduction
2 Background
3 Network Security Requirements
3.1 System Potential Threats
3.2 External Malicious Attack
4 Network Security Risk Analysis
4.1 Risk Analysis Model
4.2 Network Attack Analysis Based on Risk Analysis Model
5 Conclusion
References
A Security Reinforcement Model for Edge Computing Facilities in 5G Power Network
1 Introduction
2 Application of Security Reinforcement Technology in Edge Computing Facilities in 5G Power Network
2.1 Security Reinforcement Technology of Micro Application JS Code Based on Source Code Confusion
2.2 5G Independent Application Safety Reinforcement Technology
3 Security Reinforcement Model for Edge Computing Facilities
3.1 Security Architecture Design of Edge Computing Facilities
3.2 Research and Effect of so File Confusion in OLLVM
4 Conclusions
References
Research on Multi-dimensional Sensitivity Economic Evaluation Method of Digital Technology in Power Grid Enterprises
1 Introduction
2 Digital Technical and Economic Analysis Model for Power Business Demand
2.1 Multi Source Correlation Method for Digital Development of Power Enterprises
2.2 Technical and Economic Analysis Flow of Multi-source Correlation Between Power Business Demand Scenario and Digital Architecture
3 Technical and Economic Evaluation Method of Digital Benefits Based on Multi-dimensional Index Sensitivity Analysis
3.1 Multidimensional Index Sensitivity Analysis
3.2 Data Basis of Power Grid Digital Technical and Economic Evaluation Model
3.3 Technical and Economic Analysis Model of Multi-source Correlation Between Business Demand Scenario and Digital Architecture
3.4 Technical and Economic Evaluation Method of Digital Benefits Based on Multi-dimensional Index Sensitivity Analysis
4 Summary
References
Heterogeneous Data Fusion Method for Abnormal Network Traffic
1 Introduction
2 Related Research
3 HeteData Fusion Method
3.1 Bad Data Detection of Power System Based on State Estimation
3.2 SmaGrid AbnFlow and Credibility Calculation Method
3.3 EstCredibility Measurement Method
4 Conclusion
References
Contactless Access Control System Based on Voiceprint Recognition
1 Introduction
2 System Design Scheme
3 Module Analysis
3.1 Voiceprint Registration Module
3.2 Voiceprint Verification Module
3.3 Model Operation Module
3.4 Hardware Implementation Module
4 Test Results
4.1 Test Environment
4.2 Test Contents
4.3 The Analyses of Test Result
5 Conclusion
References
Establishment of Vulnerability Sample Database in Network Attack Environment
1 Introduction
2 Related Research
3 Vulnerability Sample Database Construction
3.1 Ideas for Constructing Vulnerability Sample Database
3.2 Structural Modeling of Vulnerable Code
4 Conclusion
References
An Essential Vigilance Analysis on Security of Web Applications
1 Introduction
2 Security Threats Reviews
3 Evaluation and Critical Reviews
4 Conclusion
References
A Retrospective Sustainable Glimpse to Improve Project Management via ICT
1 Introduction
2 Critical Analysis and Future Perspectives
3 Discussion and Conclusion
References
Research on the Construction of University Data Platform Based on Hybrid Architecture
1 Introduction
2 General Thought
3 Architecture Design
4 Data Processing Flow
5 Data Platform Implementation
6 Conclusion
References
Pingan Campus Intelligent Security Monitoring System Design
1 Introduction
2 System Design Objectives
3 Detailed System Design
3.1 Front-End Monitoring Design
3.2 Transport Network Design
3.3 Design of Monitoring Room
3.4 Design of Monitoring Center
3.5 Alarm System Design
4 Conclusion
References
An Intelligent Patrol System Based on Edge Data Center Station
1 Introduction
2 System Architecture and Characteristics
2.1 Overall Structure
2.2 Data Architecture
2.3 Disposition Process
3 Edge Data Center Station
3.1 Platform Software
3.2 Platform Software Communication Protocol Stack
4 System Functions
4.1 Comprehensive Monitoring
4.2 Intelligent Patrol
4.3 Device Alarm Linkage
4.4 State Tracking
4.5 Operation Control
5 Conclusion
References
Alternative BIM Format for Facilitating Substation 3D Design
1 Introduction
2 Challenges of Applying IFC for Production System of Smart Substation
3 Format of Grid Information Modeling
4 Conversion from GIM to IFC
5 Conclusions
References
Research on Digital Twin Modeling for Virtual Power Plant
1 Introduction
1.1 Research Background
1.2 Purpose and Significance
1.3 Research Level at Home and Abroad
2 Key Technology Research
2.1 Business Needs Analysis
2.2 Access Layer Architecture
2.3 Cloud-Side Collaborative Digital Twin Model
3 Conclusion
References
Research on Construction Scheme of Coastal Water Transportation and Communication Network Based on 5G Technology
1 Introduction
2 System Architecture
2.1 Wireless Access Layer
2.2 Access Layer
2.3 Switching Layer
2.4 Business Application Layer
3 System Composition
3.1 Core Network Subsystem
3.2 Transmission Subsystem
3.3 Base Station Subsystem
3.4 User Terminal Subsystem
4 Construction Scheme
4.1 Public-Private Combination Scheme (Scheme I)
4.2 Self-building Private Network Scheme (Scheme II)
5 Comparison and Analysis
5.1 Convenience
5.2 Technical Characteristics
5.3 Investment Scale
5.4 Operation and Maintenance
5.5 Resource Control
References
AÂ CNN-Based Information Network Attack Detection Algorithm
1 Introduction
2 Related Research
3 Vulnerability Detection Model Based on CNN Method
3.1 Analysis of Similarity of Graph Isomorphism Based on MLP
3.2 Code Flow Graph Analysis Based on Convolutional Neural Network
3.3 Function-Level Code Text Analysis Based on Deep Recursive Network
3.4 Vulnerability Detection and Verification
4 Conclusion
References
Information Extraction for Knowledge Graph of ISO 19650 Standards
1 Introduction
2 Preprocessing of the ISO 19650 Documents
3 Evaluation of Syntactical Relationships
4 Inference for Semantic Relationship
5 Case of Knowledge Inference
6 Conclusions
References
Author Index
đ SIMILAR VOLUMES
This book features selected papers presented at the 5th International Conference on Wireless Communications and Applications (ICWCA 2021), held at Hainan University, China. The book will focus on the presentation of the newest trends and achievements in the development of intelligent algorithms and
<span>This book gathers selected papers presented at the 4th International Conference on Wireless Communications and Applications (ICWCA 2020), held at Hainan University, China. The second volume will involve research works aimed at the contemporary applications: emerging wireless/mobile application
<span>This book features selected papers presented at the 5th International Conference on Wireless Communications and Applications (ICWCA 2021), held at Hainan University, China. The book will focus on the presentation of the newest trends and achievements in the development of intelligent algorithm
<span>This book features selected papers presented at the 5th International Conference on Wireless Communications and Applications (ICWCA 2021), held at Hainan University, China. The book will focus on the presentation of the newest trends and achievements in the development of intelligent algorithm
<span>This book features selected papers presented at the 5th International Conference on Wireless Communications and Applications (ICWCA 2021), held at Hainan University, China. The book will focus on the presentation of the newest trends and achievements in the development of intelligent algorithm