首页 > 最新文献

2020 5th International Conference on Computer and Communication Systems (ICCCS)最新文献

英文 中文
Automatic Setup Method for Anchor Coordinate in Asynchronous Localization System 异步定位系统中锚点坐标的自动设置方法
Pub Date : 2020-05-01 DOI: 10.1109/ICCCS49078.2020.9118486
Tan Wang, Hui Xiong, Hong Ding, Linhua Zheng
For variety of localization algorithms, there are usually two types of node: anchor and agent. The agent has unknown position and need to be located, while the anchor is used as reference point with perfect known location. However, determining anchor position is not an easy task in practically, and manually localizing anchors is boring with increasing of anchor’s number. Moreover, anchor position may be changed by some uncontrollable interference during the localization period, which leads to significant localization error. In this paper, we propose an automatic setup method for anchor relative coordinate under the assumption with anchor position unknown to address the above problem. We first estimate the anchor relative clock skew based on the blink model. Then, the time-of-flight (TOF) among anchors and positions of anchors are jointly determined by a compensated operation using clock skew estimation. Finally, time-difference-of-arrival (TDOA) method is applied to locate the agent. Practical experiment based on Decawave DWIOOO UWB system is carried out to verify the validity of the algorithms in this paper.
对于各种定位算法,通常有两种类型的节点:锚点和代理点。agent位置未知,需要定位,锚点作为参考点,位置已知。然而,在实际应用中,锚点位置的确定并不是一件容易的事情,而且随着锚点数量的增加,人工定位锚点会变得很无聊。此外,在定位过程中,锚点位置可能会受到一些不可控干扰而发生改变,从而导致定位误差较大。针对上述问题,本文提出了一种锚点位置未知假设下锚点相对坐标的自动设置方法。我们首先基于瞬变模型估计锚点相对时钟偏差。然后,通过时钟偏差估计的补偿运算,共同确定锚点之间的飞行时间和锚点的位置。最后,采用到达时间差(TDOA)方法对agent进行定位。基于Decawave DWIOOO超宽带系统进行了实际实验,验证了算法的有效性。
{"title":"Automatic Setup Method for Anchor Coordinate in Asynchronous Localization System","authors":"Tan Wang, Hui Xiong, Hong Ding, Linhua Zheng","doi":"10.1109/ICCCS49078.2020.9118486","DOIUrl":"https://doi.org/10.1109/ICCCS49078.2020.9118486","url":null,"abstract":"For variety of localization algorithms, there are usually two types of node: anchor and agent. The agent has unknown position and need to be located, while the anchor is used as reference point with perfect known location. However, determining anchor position is not an easy task in practically, and manually localizing anchors is boring with increasing of anchor’s number. Moreover, anchor position may be changed by some uncontrollable interference during the localization period, which leads to significant localization error. In this paper, we propose an automatic setup method for anchor relative coordinate under the assumption with anchor position unknown to address the above problem. We first estimate the anchor relative clock skew based on the blink model. Then, the time-of-flight (TOF) among anchors and positions of anchors are jointly determined by a compensated operation using clock skew estimation. Finally, time-difference-of-arrival (TDOA) method is applied to locate the agent. Practical experiment based on Decawave DWIOOO UWB system is carried out to verify the validity of the algorithms in this paper.","PeriodicalId":105556,"journal":{"name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116945766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Usage Intention of Internet of Vehicles Based on CAB Model: The Moderating Effect of Reference Groups 基于CAB模型的车联网使用意愿:参照组的调节作用
Pub Date : 2020-05-01 DOI: 10.1109/ICCCS49078.2020.9118548
Xiaoyu Huang, Weiyi Xie, Xiaomin Xu, Delphine Ya-chu Chan
Because of the emergence and applications of 5G technology, the internet of vehicles (IoV) has facilitated intelligent transportation and altered people’s means of movement, becoming a crucial force supporting the development of the automotive industry. However, some difficulties and challenges have been encountered during the IoV development process. Because of insufficient public awareness regarding IoV, user trust and intention to use the IoV are currently affected by individual perceptions and reference groups (RGs). Therefore, this study investigated consumers in China—the country with the largest number of cars worldwide—as research subjects and used a combination of online questionnaires and physical field observations to examine IoV-related perceived importance (PI), perceived attraction (PA), perceived cost (PC), perceived trust (PT), usage intention (UI), and RGs. A total of 576 questionnaires were returned, among which 410 valid questionnaires were obtained, posting a valid response rate of 71.78%. The results were as follows: (1) PI, PA, and PT all had significant positive effects on UI, whereas PC had a significant negative effect on UI; (2) PI and PA had significant positive effects on PT, whereas PC had a significant negative effect on PT; (3) PT had a partial mediating effect on the positive relationships between perceived importance of control and safety (PICS) and UI and between PA and UI as well as the negative relationship between PC and UI; on the relationship between perceived importance of social entertainment and UI, PT had a perfect mediating effect; (4) RGs had a significant negative moderating effect on the PICS–PT and PA–PT relationships, whereas they had a marginally significant positive moderating effect on the PC–UI relationship.
由于5G技术的出现和应用,车联网推动了智能交通的发展,改变了人们的出行方式,成为支撑汽车产业发展的重要力量。然而,在车联网的发展过程中也遇到了一些困难和挑战。由于公众对车联网的认识不足,用户对车联网的信任和使用意愿目前受到个人认知和参考群体(RGs)的影响。因此,本研究以世界上拥有汽车最多的国家——中国的消费者为研究对象,采用在线问卷和实地观察相结合的方法,考察了与车联网相关的感知重要性(PI)、感知吸引力(PA)、感知成本(PC)、感知信任(PT)、使用意向(UI)和RGs。共发放问卷576份,回收有效问卷410份,有效回复率为71.78%。结果表明:(1)PI、PA和PT对用户界面均有显著的正向影响,PC对用户界面有显著的负向影响;(2) PI和PA对PT有显著的正向影响,PC对PT有显著的负向影响;(3) PT对控制与安全感知重要性(PICS)与UI、PA与UI之间的正相关关系和PC与UI之间的负相关关系具有部分中介作用;在社交娱乐感知重要性与UI之间的关系上,PT具有完美的中介作用;(4) RGs对PICS-PT和PA-PT关系具有显著的负向调节作用,而对PC-UI关系具有微显著的正向调节作用。
{"title":"Usage Intention of Internet of Vehicles Based on CAB Model: The Moderating Effect of Reference Groups","authors":"Xiaoyu Huang, Weiyi Xie, Xiaomin Xu, Delphine Ya-chu Chan","doi":"10.1109/ICCCS49078.2020.9118548","DOIUrl":"https://doi.org/10.1109/ICCCS49078.2020.9118548","url":null,"abstract":"Because of the emergence and applications of 5G technology, the internet of vehicles (IoV) has facilitated intelligent transportation and altered people’s means of movement, becoming a crucial force supporting the development of the automotive industry. However, some difficulties and challenges have been encountered during the IoV development process. Because of insufficient public awareness regarding IoV, user trust and intention to use the IoV are currently affected by individual perceptions and reference groups (RGs). Therefore, this study investigated consumers in China—the country with the largest number of cars worldwide—as research subjects and used a combination of online questionnaires and physical field observations to examine IoV-related perceived importance (PI), perceived attraction (PA), perceived cost (PC), perceived trust (PT), usage intention (UI), and RGs. A total of 576 questionnaires were returned, among which 410 valid questionnaires were obtained, posting a valid response rate of 71.78%. The results were as follows: (1) PI, PA, and PT all had significant positive effects on UI, whereas PC had a significant negative effect on UI; (2) PI and PA had significant positive effects on PT, whereas PC had a significant negative effect on PT; (3) PT had a partial mediating effect on the positive relationships between perceived importance of control and safety (PICS) and UI and between PA and UI as well as the negative relationship between PC and UI; on the relationship between perceived importance of social entertainment and UI, PT had a perfect mediating effect; (4) RGs had a significant negative moderating effect on the PICS–PT and PA–PT relationships, whereas they had a marginally significant positive moderating effect on the PC–UI relationship.","PeriodicalId":105556,"journal":{"name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114159862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Narrow Bandwidth PLL Based Multiplier Phase Detector for PSK Modulator 用于PSK调制器的窄带锁相环乘法器鉴相器
Pub Date : 2020-05-01 DOI: 10.1109/ICCCS49078.2020.9118523
L. Kirasamuthranon, P. Wardkein, J. Koseeyaporn
Among digital to analog modulation, phase shift keying is superior than amplitude shift keying and frequency shift keying. Especially, the quadrature phase shift keying is the most popular modulating technique. The reason is because this modulation is effective in bandwidth usage. However, the sudden change in amplitude during inversely phase changed, e.g. $pi/4Rightarrow-3pi/4$, requires more bandwidth for transmitting signal. Later, a QPSK modulator based phase locked loop (PLL) [6] is proposed which shows that its QPSK signal consumes less bandwidth compared to the conventional QPSK modulator [7], [8]. However, further study of [6] founds that redundant high frequency components exist in the output of phase detector (PD). In this paper, a new structure of PD of the PLL is proposed which is based on a multiplier circuit. The mathematical analysis of this circuit shows that there is only one high frequency component in the PD output. The simulation result also confirms well with the theoretical analysis which is found that the proposed PD can reduce roughly 29% of bandwidth usage compared to that of [6]. When this PLL based the proposed PD is applied for QPSK modulator, it results in less interference of the QPSK output than that of [6] and [7]. The obtained QPSK signal is superior in reducing the amount of interference to adjacent signals.
在数模调制中,相移键控优于移幅键控和移频键控。其中,正交相移键控是最常用的调制技术。原因是这种调制在带宽使用方面是有效的。然而,在反相位变化过程中,振幅的突然变化,例如$pi/4Rightarrow-3pi/4$,需要更多的带宽来传输信号。后来,提出了一种基于QPSK调制器的锁相环(PLL)[6],与传统的QPSK调制器[7],[8]相比,其QPSK信号消耗的带宽更小。然而,进一步研究[6]发现,在鉴相器(PD)的输出中存在冗余的高频成分。本文提出了一种基于乘法器电路的锁相环PD的新结构。该电路的数学分析表明,在PD输出中只有一个高频分量。仿真结果与理论分析结果相吻合,发现所提出的PD可以减少约29% of bandwidth usage compared to that of [6]. When this PLL based the proposed PD is applied for QPSK modulator, it results in less interference of the QPSK output than that of [6] and [7]. The obtained QPSK signal is superior in reducing the amount of interference to adjacent signals.
{"title":"Narrow Bandwidth PLL Based Multiplier Phase Detector for PSK Modulator","authors":"L. Kirasamuthranon, P. Wardkein, J. Koseeyaporn","doi":"10.1109/ICCCS49078.2020.9118523","DOIUrl":"https://doi.org/10.1109/ICCCS49078.2020.9118523","url":null,"abstract":"Among digital to analog modulation, phase shift keying is superior than amplitude shift keying and frequency shift keying. Especially, the quadrature phase shift keying is the most popular modulating technique. The reason is because this modulation is effective in bandwidth usage. However, the sudden change in amplitude during inversely phase changed, e.g. $pi/4Rightarrow-3pi/4$, requires more bandwidth for transmitting signal. Later, a QPSK modulator based phase locked loop (PLL) [6] is proposed which shows that its QPSK signal consumes less bandwidth compared to the conventional QPSK modulator [7], [8]. However, further study of [6] founds that redundant high frequency components exist in the output of phase detector (PD). In this paper, a new structure of PD of the PLL is proposed which is based on a multiplier circuit. The mathematical analysis of this circuit shows that there is only one high frequency component in the PD output. The simulation result also confirms well with the theoretical analysis which is found that the proposed PD can reduce roughly 29% of bandwidth usage compared to that of [6]. When this PLL based the proposed PD is applied for QPSK modulator, it results in less interference of the QPSK output than that of [6] and [7]. The obtained QPSK signal is superior in reducing the amount of interference to adjacent signals.","PeriodicalId":105556,"journal":{"name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114384406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Dynamic Time Warping Distance Measure as Q U BO Formulation 基于qubo公式的动态时间翘曲距离测度
Pub Date : 2020-05-01 DOI: 10.1109/ICCCS49078.2020.9118469
Sebastian Feld, Christoph Roch, Thomas Gabor, Xiao-Ting Michelle To, Claudia Linnhoff-Popien
Dynamic Time Warping (DTW) is a representative of a distance measure that is able to calculate the distance between two time series. It is often used for the recognition of handwriting or spoken language. The metaheuristic Quantum Annealing (QA) can be used to solve combinatorial optimization problems. Similar to Simulated Annealing it seeks to find a global minimum of a target function. In order to use specialized QA hardware, the problem to be optimized needs to be translated into a Quadratic Unconstrained Binary Optimization (QUBO) problem. With this paper we investigate whether it is possible to transfer the DTW distance measure into a QUBO formulation. The motivation behind is the hope on an accelerated execution once the QA hardware scales up and the aspiration of gaining benefits due to quantum effects that are not given in the classical calculation. In principle, we find that it is possible to transform DTW into a QUBO formulation suitable for executing on QA hardware. Also, the algorithm returns not only the minimum total distance between two sequences, but also the corresponding warping path. However, there are several difficulties that make a manual intervention necessary.
动态时间翘曲(DTW)是一种能够计算两个时间序列之间距离的距离度量方法的代表。它通常用于识别笔迹或口语。元启发式量子退火(QA)可以用于解决组合优化问题。与模拟退火类似,它寻求找到目标函数的全局最小值。为了使用专用的QA硬件,需要将待优化的问题转化为二次型无约束二进制优化(QUBO)问题。本文探讨了是否有可能将DTW距离度量转换为QUBO公式。背后的动机是,一旦QA硬件扩展,希望能够加速执行,并希望获得经典计算中未给出的量子效应带来的好处。原则上,我们发现可以将DTW转换为适合在QA硬件上执行的QUBO公式。此外,该算法不仅返回两个序列之间的最小总距离,还返回相应的翘曲路径。然而,有几个困难使得人工干预成为必要。
{"title":"The Dynamic Time Warping Distance Measure as Q U BO Formulation","authors":"Sebastian Feld, Christoph Roch, Thomas Gabor, Xiao-Ting Michelle To, Claudia Linnhoff-Popien","doi":"10.1109/ICCCS49078.2020.9118469","DOIUrl":"https://doi.org/10.1109/ICCCS49078.2020.9118469","url":null,"abstract":"Dynamic Time Warping (DTW) is a representative of a distance measure that is able to calculate the distance between two time series. It is often used for the recognition of handwriting or spoken language. The metaheuristic Quantum Annealing (QA) can be used to solve combinatorial optimization problems. Similar to Simulated Annealing it seeks to find a global minimum of a target function. In order to use specialized QA hardware, the problem to be optimized needs to be translated into a Quadratic Unconstrained Binary Optimization (QUBO) problem. With this paper we investigate whether it is possible to transfer the DTW distance measure into a QUBO formulation. The motivation behind is the hope on an accelerated execution once the QA hardware scales up and the aspiration of gaining benefits due to quantum effects that are not given in the classical calculation. In principle, we find that it is possible to transform DTW into a QUBO formulation suitable for executing on QA hardware. Also, the algorithm returns not only the minimum total distance between two sequences, but also the corresponding warping path. However, there are several difficulties that make a manual intervention necessary.","PeriodicalId":105556,"journal":{"name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121690928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Application of Convolution Neural Network Based on Transfer Learning in Sandstorm Prediction in Inner Mongolia 基于迁移学习的卷积神经网络在内蒙古沙尘暴预报中的应用
Pub Date : 2020-05-01 DOI: 10.1109/ICCCS49078.2020.9118553
Qing-dao-er-ji Ren, Ying Qiu, Tiancheng Li
There are six deserts and sandy lands in the central and western part of Inner Mongolia, which is one of the main sources of sandstorms in China. In most areas, the surface is dry, the precipitation is low and the wind is strong in winter and spring. The analysis and study of sandstorms in this area is of great significance to the study and prediction of sandstorms in China. Based on the comprehensive analysis of the research status of sandstorms at home and abroad, the application of convolution neural network to classify satellite cloud images and establish prediction models of sandstorms are relatively few. The convolution neural network algorithm based on transfer learning is used to classify infrared satellite cloud images to establish Sand-dust Storm Prediction model, and the prediction accuracy of sand-dust storm prediction model established under different learning strategies is compared in the paper. The results show that the model training speed is fast and the accuracy and generalization ability of the model are improved by using the parameter migration initialization network in transfer learning. The Sand-dust Storm Prediction Model Based on the convolution neural network algorithm of transfer learning has a higher accuracy in predicting the occurrence of sand-dust storm and the change of learning strategies has an important influence on the prediction accuracy of sandstorm prediction model.
内蒙古中西部有6个沙漠和沙地,是中国沙尘暴的主要来源地之一。大部分地区地表干燥,降水少,冬春两季风大。对该地区沙尘暴的分析和研究对中国沙尘暴的研究和预报具有重要意义。综合分析国内外沙尘暴研究现状,应用卷积神经网络对卫星云图进行分类并建立沙尘暴预测模型的研究相对较少。利用基于迁移学习的卷积神经网络算法对红外卫星云图进行分类,建立沙尘暴预测模型,并对不同学习策略下建立的沙尘暴预测模型的预测精度进行了比较。结果表明,在迁移学习中使用参数迁移初始化网络,可以提高模型训练速度,提高模型的准确率和泛化能力。基于迁移学习卷积神经网络算法的沙尘暴预测模型对沙尘暴的发生有较高的预测精度,学习策略的变化对沙尘暴预测模型的预测精度有重要影响。
{"title":"Application of Convolution Neural Network Based on Transfer Learning in Sandstorm Prediction in Inner Mongolia","authors":"Qing-dao-er-ji Ren, Ying Qiu, Tiancheng Li","doi":"10.1109/ICCCS49078.2020.9118553","DOIUrl":"https://doi.org/10.1109/ICCCS49078.2020.9118553","url":null,"abstract":"There are six deserts and sandy lands in the central and western part of Inner Mongolia, which is one of the main sources of sandstorms in China. In most areas, the surface is dry, the precipitation is low and the wind is strong in winter and spring. The analysis and study of sandstorms in this area is of great significance to the study and prediction of sandstorms in China. Based on the comprehensive analysis of the research status of sandstorms at home and abroad, the application of convolution neural network to classify satellite cloud images and establish prediction models of sandstorms are relatively few. The convolution neural network algorithm based on transfer learning is used to classify infrared satellite cloud images to establish Sand-dust Storm Prediction model, and the prediction accuracy of sand-dust storm prediction model established under different learning strategies is compared in the paper. The results show that the model training speed is fast and the accuracy and generalization ability of the model are improved by using the parameter migration initialization network in transfer learning. The Sand-dust Storm Prediction Model Based on the convolution neural network algorithm of transfer learning has a higher accuracy in predicting the occurrence of sand-dust storm and the change of learning strategies has an important influence on the prediction accuracy of sandstorm prediction model.","PeriodicalId":105556,"journal":{"name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121510794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Batch Target Recognition Count under Complex Conditions Based on Att-Unet 基于at - unet的复杂条件下批量目标识别计数
Pub Date : 2020-05-01 DOI: 10.1109/ICCCS49078.2020.9118519
PengPeng Jiang, Kun Zhang, Peijian Zhang, Ping Lu
As we all know, the large number of counts is a challenging and time consuming task subject because of oversized number and complex conditions. However, the development of deep learning makes deep learning models very competitive in image segmentation. In this paper, we take cigarette filter rods as the research object. we first evaluate the standard Unet for the filter rod target recognition to separate target and background. Secondly, we use the focal loss function instead of the traditional cross-entropy function to solve the problem of imbalance between target and background area. Thirdly, we add a self-attention module in the traditional Unet convolutional layer to enhance the convolution effect. Fourth, we propose structural element detection criteria and round tangency matching strategy based on HMM (Hidden Markov Model) for the geometric relationship of filter rod position, which further improves the accuracy of the algorithm. We used Qu's [1], Mask-R-CNN [2], FCN [3], Deep-lab-V1 [4] and this paper’s algorithm to test the performance of 30000 images from the industrial site. The performance of this paper’s algorithm is completely better than the performance of the above algorithm.
众所周知,由于数量庞大,条件复杂,大量计数是一项具有挑战性和耗时的任务。然而,深度学习的发展使得深度学习模型在图像分割方面具有很强的竞争力。本文以卷烟滤嘴棒为研究对象。我们首先评估了标准Unet用于滤波棒目标识别以分离目标和背景。其次,我们用焦点损失函数代替传统的交叉熵函数来解决目标和背景区域不平衡的问题。第三,在传统的Unet卷积层中加入自关注模块,增强卷积效果。第四,针对滤波棒位置的几何关系,提出了基于隐马尔可夫模型(HMM)的结构元素检测准则和圆切线匹配策略,进一步提高了算法的精度。我们使用Qu的[1]、Mask-R-CNN[2]、FCN[3]、Deep-lab-V1[4]和本文的算法对来自工业现场的30000张图像进行了性能测试。本文算法的性能完全优于上述算法的性能。
{"title":"Batch Target Recognition Count under Complex Conditions Based on Att-Unet","authors":"PengPeng Jiang, Kun Zhang, Peijian Zhang, Ping Lu","doi":"10.1109/ICCCS49078.2020.9118519","DOIUrl":"https://doi.org/10.1109/ICCCS49078.2020.9118519","url":null,"abstract":"As we all know, the large number of counts is a challenging and time consuming task subject because of oversized number and complex conditions. However, the development of deep learning makes deep learning models very competitive in image segmentation. In this paper, we take cigarette filter rods as the research object. we first evaluate the standard Unet for the filter rod target recognition to separate target and background. Secondly, we use the focal loss function instead of the traditional cross-entropy function to solve the problem of imbalance between target and background area. Thirdly, we add a self-attention module in the traditional Unet convolutional layer to enhance the convolution effect. Fourth, we propose structural element detection criteria and round tangency matching strategy based on HMM (Hidden Markov Model) for the geometric relationship of filter rod position, which further improves the accuracy of the algorithm. We used Qu's [1], Mask-R-CNN [2], FCN [3], Deep-lab-V1 [4] and this paper’s algorithm to test the performance of 30000 images from the industrial site. The performance of this paper’s algorithm is completely better than the performance of the above algorithm.","PeriodicalId":105556,"journal":{"name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124803905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Collaborative Generations Of Sm9 Private Key And Digital Signature Using Homomorphic Encryption 使用同态加密的Sm9私钥和数字签名的协作代
Pub Date : 2020-05-01 DOI: 10.1109/ICCCS49078.2020.9118464
Yihong Long, Feng Xiong
SM9 is a class of identity based cryptography (IBC) schemes released by the State Cryptography Administration of China. With SM9, a user’s private key is generated by a central system called private key generator (PKG) using a master key. To prevent the disastrous damage caused by the master key leakage and to meet the corporate customers’ requirement of involving in the key generation process, two collaborative SM9 private key generation schemes are proposed, in which a user’s SM9 private key is collaboratively generated by two separate PKGs sharing the master key. The two PKGs are deployed in an SM9 private key service provider’s site or one of the PKGs is deployed in the private key service provider’s site while the other is deployed in a corporate customer’s site. To alleviate the possible loss caused by the leakage of a user’s private key in the end device that has no dedicated cryptographic hardware, an SM9 signature collaborative generation scheme is proposed, in which the secret of a user’s SM9 private key is shared between the user’s end device and a dedicated cryptographic device, and the devices collaborate to generate the signature to a message with their respective secret shares when signing a message with the SM9 private key is required. The approach for the proposed schemes is secret sharing and homomorphic encryption. The proposed schemes effectively address the private key leakage issues mentioned above.
SM9是中国国家密码管理局发布的一类基于身份的密码体制(IBC)。在SM9中,用户的私钥是由称为私钥生成器(PKG)的中央系统使用主密钥生成的。为了防止主密钥泄露造成的灾难性破坏,同时满足企业客户参与密钥生成过程的要求,提出了两种协同SM9私钥生成方案,其中用户的SM9私钥由共享主密钥的两个独立pkg协同生成。这两个pkg部署在SM9私钥服务提供者的站点中,或者其中一个pkg部署在私钥服务提供者的站点中,而另一个部署在企业客户的站点中。减轻可能的泄漏造成的损失最终用户的私钥没有专用的加密硬件设备,SM9签名协作一代方案,提出了用户的秘密的SM9私钥之间共享用户的终端设备和专用的加密设备,和设备协作生成签名与各自的秘密消息股与SM9私钥签署消息时是必需的。提出的方案采用秘密共享和同态加密的方法。建议的方案有效地解决了上述私钥泄露问题。
{"title":"Collaborative Generations Of Sm9 Private Key And Digital Signature Using Homomorphic Encryption","authors":"Yihong Long, Feng Xiong","doi":"10.1109/ICCCS49078.2020.9118464","DOIUrl":"https://doi.org/10.1109/ICCCS49078.2020.9118464","url":null,"abstract":"SM9 is a class of identity based cryptography (IBC) schemes released by the State Cryptography Administration of China. With SM9, a user’s private key is generated by a central system called private key generator (PKG) using a master key. To prevent the disastrous damage caused by the master key leakage and to meet the corporate customers’ requirement of involving in the key generation process, two collaborative SM9 private key generation schemes are proposed, in which a user’s SM9 private key is collaboratively generated by two separate PKGs sharing the master key. The two PKGs are deployed in an SM9 private key service provider’s site or one of the PKGs is deployed in the private key service provider’s site while the other is deployed in a corporate customer’s site. To alleviate the possible loss caused by the leakage of a user’s private key in the end device that has no dedicated cryptographic hardware, an SM9 signature collaborative generation scheme is proposed, in which the secret of a user’s SM9 private key is shared between the user’s end device and a dedicated cryptographic device, and the devices collaborate to generate the signature to a message with their respective secret shares when signing a message with the SM9 private key is required. The approach for the proposed schemes is secret sharing and homomorphic encryption. The proposed schemes effectively address the private key leakage issues mentioned above.","PeriodicalId":105556,"journal":{"name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131592474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identification of Multiple-Antenna Emitters Using Power Amplifier Nonlinearity 利用功率放大器非线性辨识多天线发射体
Pub Date : 2020-05-01 DOI: 10.1109/ICCCS49078.2020.9118489
Jun Lu, Xiaowei Qin, Xiaodong Xu, Yingke Lei
Power amplifier (PA) nonlinearity typically plays a crucial role in the application of specific emitter identification (SEI), due to its uniqueness at the radio frequency (RF) frontend for particular emitter. For a multiple-antenna emitter with multiple PAs inside, this paper first presents a PA parameter estimator based on a two-stage linear least square (LLS) method in the MIMO multipath communication scenario. Treated as the RF fingerprint, the extracted nonlinear coefficients are then used to classify the individual multipleantenna emitters based on the minimum error probability (MEP) criterion. In addition, we analyze the impacts of mismatch of PA model and rank-deficient condition of the LLS problem in depth. Finally, the proposed approach is validated to be effective through extensive numerical simulations.
功率放大器(PA)非线性在特定发射体识别(SEI)的应用中起着至关重要的作用,因为它在射频(RF)前端具有唯一性。针对MIMO多径通信场景下具有多个PA的多天线发射器,首先提出了一种基于两级线性最小二乘(LLS)方法的PA参数估计方法。将提取的非线性系数作为射频指纹,然后根据最小误差概率(MEP)准则对单个多天线发射器进行分类。此外,我们还深入分析了PA模型失配和LLS问题的秩亏条件的影响。最后,通过大量的数值模拟验证了该方法的有效性。
{"title":"Identification of Multiple-Antenna Emitters Using Power Amplifier Nonlinearity","authors":"Jun Lu, Xiaowei Qin, Xiaodong Xu, Yingke Lei","doi":"10.1109/ICCCS49078.2020.9118489","DOIUrl":"https://doi.org/10.1109/ICCCS49078.2020.9118489","url":null,"abstract":"Power amplifier (PA) nonlinearity typically plays a crucial role in the application of specific emitter identification (SEI), due to its uniqueness at the radio frequency (RF) frontend for particular emitter. For a multiple-antenna emitter with multiple PAs inside, this paper first presents a PA parameter estimator based on a two-stage linear least square (LLS) method in the MIMO multipath communication scenario. Treated as the RF fingerprint, the extracted nonlinear coefficients are then used to classify the individual multipleantenna emitters based on the minimum error probability (MEP) criterion. In addition, we analyze the impacts of mismatch of PA model and rank-deficient condition of the LLS problem in depth. Finally, the proposed approach is validated to be effective through extensive numerical simulations.","PeriodicalId":105556,"journal":{"name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125506415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Codec Implementation of QC-LDPC Code in CCSDS Near-Earth Standard CCSDS近地标准中QC-LDPC码的编解码器实现
Pub Date : 2020-05-01 DOI: 10.1109/ICCCS49078.2020.9118542
Juhua Wang, Suchun Yuan, Yuan Zhou, Guohua Zhang
Recently, type-II quasi-cyclic (QC) low-density parity-check (LDPC) codes have attracted increasing attention due to their compact structures and promising decoding performance. In this paper, the type-II QC-LDPC code standardized for use in near-earth application is implemented by FPGA. On the basis of analysis for the generator matrix and parity-check matrix of the code, the codec for the type-II LDPC code is designed. By using an XC4VLX200-FPGA, the maximum clock frequency of the encoder is 287MHz at the cost of 810 slices and 15 Blockrams, while the maximum clock frequency of the decoder is 244 MHz at the cost of 10481 slices and 74 Blockrams. The testing result for the codec performance shows that such a code can completely satisfy the requirement for on-board channel coding application. The codec developed in this paper has been successfully employed in many remote-sensing satellite missions in China.
近年来,一类准循环(QC)低密度校验码(LDPC)以其紧凑的结构和良好的译码性能受到越来越多的关注。本文采用FPGA实现了近地应用标准的ii型QC-LDPC码。在分析码的产生矩阵和奇偶校验矩阵的基础上,设计了ⅱ型LDPC码的编解码器。采用XC4VLX200-FPGA,编码器的最大时钟频率为287MHz,成本为810片和15块,解码器的最大时钟频率为244mhz,成本为10481片和74块。对编解码器性能的测试结果表明,该编码完全可以满足星载信道编码应用的要求。本文所开发的编解码器已成功应用于中国的多个遥感卫星任务中。
{"title":"Codec Implementation of QC-LDPC Code in CCSDS Near-Earth Standard","authors":"Juhua Wang, Suchun Yuan, Yuan Zhou, Guohua Zhang","doi":"10.1109/ICCCS49078.2020.9118542","DOIUrl":"https://doi.org/10.1109/ICCCS49078.2020.9118542","url":null,"abstract":"Recently, type-II quasi-cyclic (QC) low-density parity-check (LDPC) codes have attracted increasing attention due to their compact structures and promising decoding performance. In this paper, the type-II QC-LDPC code standardized for use in near-earth application is implemented by FPGA. On the basis of analysis for the generator matrix and parity-check matrix of the code, the codec for the type-II LDPC code is designed. By using an XC4VLX200-FPGA, the maximum clock frequency of the encoder is 287MHz at the cost of 810 slices and 15 Blockrams, while the maximum clock frequency of the decoder is 244 MHz at the cost of 10481 slices and 74 Blockrams. The testing result for the codec performance shows that such a code can completely satisfy the requirement for on-board channel coding application. The codec developed in this paper has been successfully employed in many remote-sensing satellite missions in China.","PeriodicalId":105556,"journal":{"name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130606287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Enhanced Down/Up-Sampling-Based Video Coding Using the Residual Compensation 基于残差补偿的增强下/上采样视频编码
Pub Date : 2020-05-01 DOI: 10.1109/ICCCS49078.2020.9118561
Hangpu Cao, Xiaowen Liu, Yida Wang, Yuting Li, Weimin Lei
Down/up-sampling-based video coding is an effective strategy to cope with limited bandwidth for transmission. In recent years, CNN-based super-resolution methods have also been integrated into the above coding strategy. However, it raises a problem of how to balance the calculation and reconstruction quality. In order to alleviate this problem, we propose an enhanced down/up-sampling-based video coding scheme, in which residual data is used to compensate the unrecovered details of the reconstructed video. We first down-sample the video prior to encoding at the encoder and then obtain the residual data by subtracting the super-resolution reconstructed video frame from the original video frame. The residual data is encoded and transmitted together with the low-resolution video sequence. The decoder first reconstructs the encoded low-resolution video with CNN-based super resolution method, and then uses residual data to compensate the missing details of the reconstructed video. To further enhance the perceived quality, we use a quality enhancement network to enhance the quality-compensated video. The experimental results show that the proposed scheme achieves superior quality improvement compared with HEVC anchor and the general down/up-sampling schemes.
基于上下采样的视频编码是解决传输带宽有限问题的有效策略。近年来,基于cnn的超分辨率方法也被整合到上述编码策略中。然而,如何平衡计算质量和重建质量是一个问题。为了缓解这一问题,我们提出了一种增强的基于下/上采样的视频编码方案,该方案利用残差数据来补偿重构视频中未恢复的细节。我们在编码器编码之前先对视频进行下采样,然后通过从原始视频帧中减去超分辨率重构视频帧来获得残差数据。剩余数据被编码并与低分辨率视频序列一起传输。解码器首先利用基于cnn的超分辨率方法对编码后的低分辨率视频进行重构,然后利用残差数据对重构后的视频进行细节补偿。为了进一步提高感知质量,我们使用质量增强网络对质量补偿视频进行增强。实验结果表明,与HEVC锚点和一般的上下采样方案相比,该方案取得了较好的质量提升。
{"title":"Enhanced Down/Up-Sampling-Based Video Coding Using the Residual Compensation","authors":"Hangpu Cao, Xiaowen Liu, Yida Wang, Yuting Li, Weimin Lei","doi":"10.1109/ICCCS49078.2020.9118561","DOIUrl":"https://doi.org/10.1109/ICCCS49078.2020.9118561","url":null,"abstract":"Down/up-sampling-based video coding is an effective strategy to cope with limited bandwidth for transmission. In recent years, CNN-based super-resolution methods have also been integrated into the above coding strategy. However, it raises a problem of how to balance the calculation and reconstruction quality. In order to alleviate this problem, we propose an enhanced down/up-sampling-based video coding scheme, in which residual data is used to compensate the unrecovered details of the reconstructed video. We first down-sample the video prior to encoding at the encoder and then obtain the residual data by subtracting the super-resolution reconstructed video frame from the original video frame. The residual data is encoded and transmitted together with the low-resolution video sequence. The decoder first reconstructs the encoded low-resolution video with CNN-based super resolution method, and then uses residual data to compensate the missing details of the reconstructed video. To further enhance the perceived quality, we use a quality enhancement network to enhance the quality-compensated video. The experimental results show that the proposed scheme achieves superior quality improvement compared with HEVC anchor and the general down/up-sampling schemes.","PeriodicalId":105556,"journal":{"name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116533917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2020 5th International Conference on Computer and Communication Systems (ICCCS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1