首页 > 最新文献

2023 3rd International Conference on Consumer Electronics and Computer Engineering (ICCECE)最新文献

英文 中文
Scene Text Detection with Cascaded Multidimensional Attention 具有级联多维关注的场景文本检测
Pub Date : 2023-01-06 DOI: 10.1109/ICCECE58074.2023.10135187
Shan Dai
Over the past years, scene text detection based on a segmentation network has progressed substantially due to its pixel-level description, which is more suitable for detecting long text and curved text. However, limited by the scale robustness and feature representation ability, most existing segmentation-based scene text detectors may need help to handle more complex forms of text, which is common in the real world. In this paper, to tackle this problem, we propose a cascaded module, termed CMAModule, based on the attention mechanism to improve the feature representation capability of the model, which integrates a series of the basic module to augment the feature map. Our proposed CMANet, obtained higher recall and precision on two benchmarks.
近年来,基于分割网络的场景文本检测由于其像素级描述而取得了长足的进步,更适合于检测长文本和弯曲文本。然而,受规模鲁棒性和特征表示能力的限制,大多数现有的基于分割的场景文本检测器可能需要帮助来处理更复杂的文本形式,这在现实世界中很常见。为了解决这一问题,本文提出了一种基于注意机制的级联模块CMAModule,该模块集成了一系列基本模块来增强特征映射,以提高模型的特征表示能力。我们提出的CMANet在两个基准上获得了更高的查全率和查准率。
{"title":"Scene Text Detection with Cascaded Multidimensional Attention","authors":"Shan Dai","doi":"10.1109/ICCECE58074.2023.10135187","DOIUrl":"https://doi.org/10.1109/ICCECE58074.2023.10135187","url":null,"abstract":"Over the past years, scene text detection based on a segmentation network has progressed substantially due to its pixel-level description, which is more suitable for detecting long text and curved text. However, limited by the scale robustness and feature representation ability, most existing segmentation-based scene text detectors may need help to handle more complex forms of text, which is common in the real world. In this paper, to tackle this problem, we propose a cascaded module, termed CMAModule, based on the attention mechanism to improve the feature representation capability of the model, which integrates a series of the basic module to augment the feature map. Our proposed CMANet, obtained higher recall and precision on two benchmarks.","PeriodicalId":120030,"journal":{"name":"2023 3rd International Conference on Consumer Electronics and Computer Engineering (ICCECE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129228234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Verification of Acceptance Filter Module Design based on UVM 基于UVM的验收滤波模块设计验证
Pub Date : 2023-01-06 DOI: 10.1109/ICCECE58074.2023.10135249
Leimeng Shi, Xindong Huang, ShiKai Zuo, Hainan Liu
The increasing functional requirements of IC circuits make the verification stimulus complexity exponentially increasing, so the SystemVerilog language based UVM general verification methodology is gradually becoming the main verification method. The verification methodology based on SystemVerilog language UVM with verification methodology is used to design and verify the acceptance filtering module of CAN. The verification platform uses SystemVerilog to generate the UVM framework structure using Python automation scripts, combined with constrainable random testing techniques to write multiple test cases for functional points. The verification simulation results show that the verification coverage reaches 100%. In addition, the verification platform is easy to migrate, which can greatly improve the verification efficiency and shorten the verification time.
随着IC电路功能要求的不断提高,验证刺激的复杂度呈指数级增长,因此基于SystemVerilog语言的UVM通用验证方法正逐渐成为主要的验证方法。采用基于SystemVerilog语言UVM的验证方法,结合验证方法对CAN的验收过滤模块进行设计和验证。验证平台使用SystemVerilog生成UVM框架结构,使用Python自动化脚本,结合约束随机测试技术,为功能点编写多个测试用例。验证仿真结果表明,验证覆盖率达到100%。此外,验证平台易于迁移,可以大大提高验证效率,缩短验证时间。
{"title":"Verification of Acceptance Filter Module Design based on UVM","authors":"Leimeng Shi, Xindong Huang, ShiKai Zuo, Hainan Liu","doi":"10.1109/ICCECE58074.2023.10135249","DOIUrl":"https://doi.org/10.1109/ICCECE58074.2023.10135249","url":null,"abstract":"The increasing functional requirements of IC circuits make the verification stimulus complexity exponentially increasing, so the SystemVerilog language based UVM general verification methodology is gradually becoming the main verification method. The verification methodology based on SystemVerilog language UVM with verification methodology is used to design and verify the acceptance filtering module of CAN. The verification platform uses SystemVerilog to generate the UVM framework structure using Python automation scripts, combined with constrainable random testing techniques to write multiple test cases for functional points. The verification simulation results show that the verification coverage reaches 100%. In addition, the verification platform is easy to migrate, which can greatly improve the verification efficiency and shorten the verification time.","PeriodicalId":120030,"journal":{"name":"2023 3rd International Conference on Consumer Electronics and Computer Engineering (ICCECE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130676930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on the Virtual Private Network Security of 5G Smart Nuclear Power Plants 5G智能核电站虚拟专网安全研究
Pub Date : 2023-01-06 DOI: 10.1109/ICCECE58074.2023.10135311
Qiaoman Duan, Du Pan, Haopeng Zhang, Yinwei Wu, Xiangchen Ma, Songtao Gao
The deep integration of 5G network technology and nuclear power plants can effectively improve the digital and intelligent level of nuclear power plants, providing strong support for building a clean, low-carbon, safe and efficient nuclear power system. While 5G enables smart nuclear power plant, it also brings new network security requirements. Based on the security requirements of 5G smart nuclear power business, this paper analyzes 5G end-to-end(E2E) virtual private network slicing technology and proposes a network security scheme for 5G smart nuclear power plants with virtual private network.
5G网络技术与核电站的深度融合,可以有效提高核电站的数字化和智能化水平,为建设清洁低碳、安全高效的核电系统提供有力支撑。5G在实现智能核电站的同时,也带来了新的网络安全要求。基于5G智能核电业务的安全需求,分析了5G端到端(E2E)虚拟专网切片技术,提出了一种基于虚拟专网的5G智能核电站网络安全方案。
{"title":"Research on the Virtual Private Network Security of 5G Smart Nuclear Power Plants","authors":"Qiaoman Duan, Du Pan, Haopeng Zhang, Yinwei Wu, Xiangchen Ma, Songtao Gao","doi":"10.1109/ICCECE58074.2023.10135311","DOIUrl":"https://doi.org/10.1109/ICCECE58074.2023.10135311","url":null,"abstract":"The deep integration of 5G network technology and nuclear power plants can effectively improve the digital and intelligent level of nuclear power plants, providing strong support for building a clean, low-carbon, safe and efficient nuclear power system. While 5G enables smart nuclear power plant, it also brings new network security requirements. Based on the security requirements of 5G smart nuclear power business, this paper analyzes 5G end-to-end(E2E) virtual private network slicing technology and proposes a network security scheme for 5G smart nuclear power plants with virtual private network.","PeriodicalId":120030,"journal":{"name":"2023 3rd International Conference on Consumer Electronics and Computer Engineering (ICCECE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116266945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Transformer: Image Classification Based on Constitutional Neural Networks 变压器:基于构造神经网络的图像分类
Pub Date : 2023-01-06 DOI: 10.1109/ICCECE58074.2023.10135505
Yangrui Cheng, Fuqiang Xie, Yongzhou Li, G. Zhao
To solve the problem of excessive calculation caused by inputting images with a large size when using ViT network structure to implement image classification tasks, this paper proposes a ViT network model based on a convolutional neural network (CNN). Its network structure first uses CNN to extract a low-resolution feature map and then uses ViT structure to process the low-resolution feature map. At this time, the computational pressure is greatly relieved. In this paper, the author uses VGG16 as the Backbone and ViT network structure to build the VGG16-TE network and implements an image classification task on the ImageNet-1k dataset. Compared with the VGG16 model, the accuracy of Top1 and Top5 image classification is improved by 2.5 points and 1.7 points respectively. Besides, this paper builds a ResNet34-TE network with ResNet34 as the Backbone and ViT network and implements an image classification task on the ImageNet-1k dataset. Compared with the ResNet34 model, the accuracy of Top1 and Top5 image classification is improved by 2.1 points and 1.2 points respectively. VGG16-TE and ResNet34-TE parameters decrease by 68M and 61.5M compared with that of the ViT-Base model.
为了解决在使用ViT网络结构实现图像分类任务时因输入大尺寸图像而导致的计算量过大的问题,本文提出了一种基于卷积神经网络(CNN)的ViT网络模型。其网络结构首先使用CNN提取低分辨率特征图,然后使用ViT结构对低分辨率特征图进行处理。此时,计算压力大大减轻。本文以VGG16为骨干和ViT网络结构,构建VGG16- te网络,并在ImageNet-1k数据集上实现图像分类任务。与VGG16模型相比,Top1和Top5的图像分类精度分别提高了2.5分和1.7分。此外,本文构建了以ResNet34为骨干网络和ViT网络的ResNet34- te网络,并在ImageNet-1k数据集上实现了图像分类任务。与ResNet34模型相比,Top1和Top5图像分类的准确率分别提高了2.1和1.2分。VGG16-TE和ResNet34-TE参数较viti - base模型分别减小68M和61.5M。
{"title":"Transformer: Image Classification Based on Constitutional Neural Networks","authors":"Yangrui Cheng, Fuqiang Xie, Yongzhou Li, G. Zhao","doi":"10.1109/ICCECE58074.2023.10135505","DOIUrl":"https://doi.org/10.1109/ICCECE58074.2023.10135505","url":null,"abstract":"To solve the problem of excessive calculation caused by inputting images with a large size when using ViT network structure to implement image classification tasks, this paper proposes a ViT network model based on a convolutional neural network (CNN). Its network structure first uses CNN to extract a low-resolution feature map and then uses ViT structure to process the low-resolution feature map. At this time, the computational pressure is greatly relieved. In this paper, the author uses VGG16 as the Backbone and ViT network structure to build the VGG16-TE network and implements an image classification task on the ImageNet-1k dataset. Compared with the VGG16 model, the accuracy of Top1 and Top5 image classification is improved by 2.5 points and 1.7 points respectively. Besides, this paper builds a ResNet34-TE network with ResNet34 as the Backbone and ViT network and implements an image classification task on the ImageNet-1k dataset. Compared with the ResNet34 model, the accuracy of Top1 and Top5 image classification is improved by 2.1 points and 1.2 points respectively. VGG16-TE and ResNet34-TE parameters decrease by 68M and 61.5M compared with that of the ViT-Base model.","PeriodicalId":120030,"journal":{"name":"2023 3rd International Conference on Consumer Electronics and Computer Engineering (ICCECE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125982119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Improved Multiscale Convolutional Neural Network with Large Kernel for Bearing Fault Diagnosis 一种改进的大核多尺度卷积神经网络用于轴承故障诊断
Pub Date : 2023-01-06 DOI: 10.1109/ICCECE58074.2023.10135441
Fang Li, Liping Wang, Decheng Wang, Jun Wu, Hongjun Zhao, Ying Wang
We propose an improved end-to-end Multiscale Convolutional Neural Network with Large Kernel (LKMCNN) for bearing fault diagnosis in this paper. The LKMCNN is an end-to-end network, which can automatically extract features from the original vibration signal and accurately diagnose bearing fault without any manual feature selection operations. The LKMCNN can extract features at a wide-scale by using a large convolution kernel, which can effectively prevent information loss and improve the robustness of the model. Benefit from the adaptively features extraction of short-term, medium-term, and long-term periods by three parallel convolution operation with different kernel size, the adaptability and robustness of the model are improved. Compared with three excellent baseline models, the LKMCNN achieves state-of-the-art performance in bearing fault diagnosis by experiments using Paderborn bearing fault dataset.
提出了一种改进的端到端大核多尺度卷积神经网络(LKMCNN)用于轴承故障诊断。LKMCNN是一种端到端网络,可以自动从原始振动信号中提取特征,无需任何手动特征选择操作即可准确诊断轴承故障。LKMCNN通过使用大卷积核在大范围内提取特征,可以有效地防止信息丢失,提高模型的鲁棒性。利用三种不同核大小的并行卷积运算自适应提取短期、中期和长期特征,提高了模型的适应性和鲁棒性。通过对帕德伯恩轴承故障数据集的实验,与三种优秀的基线模型进行比较,LKMCNN在轴承故障诊断方面取得了较好的效果。
{"title":"An Improved Multiscale Convolutional Neural Network with Large Kernel for Bearing Fault Diagnosis","authors":"Fang Li, Liping Wang, Decheng Wang, Jun Wu, Hongjun Zhao, Ying Wang","doi":"10.1109/ICCECE58074.2023.10135441","DOIUrl":"https://doi.org/10.1109/ICCECE58074.2023.10135441","url":null,"abstract":"We propose an improved end-to-end Multiscale Convolutional Neural Network with Large Kernel (LKMCNN) for bearing fault diagnosis in this paper. The LKMCNN is an end-to-end network, which can automatically extract features from the original vibration signal and accurately diagnose bearing fault without any manual feature selection operations. The LKMCNN can extract features at a wide-scale by using a large convolution kernel, which can effectively prevent information loss and improve the robustness of the model. Benefit from the adaptively features extraction of short-term, medium-term, and long-term periods by three parallel convolution operation with different kernel size, the adaptability and robustness of the model are improved. Compared with three excellent baseline models, the LKMCNN achieves state-of-the-art performance in bearing fault diagnosis by experiments using Paderborn bearing fault dataset.","PeriodicalId":120030,"journal":{"name":"2023 3rd International Conference on Consumer Electronics and Computer Engineering (ICCECE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115809344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on network intrusion response method based on Bayesian attack graph 基于贝叶斯攻击图的网络入侵响应方法研究
Pub Date : 2023-01-06 DOI: 10.1109/ICCECE58074.2023.10135239
Fangfang Dang, Xun Zhao, Lijing Yan, Kehe Wu, Shuai Li
With the rapid development of computer networks, people's use of the Internet has become more and more common, and network security issues are becoming increasingly serious. Compared with intrusion detection, the development of intrusion response is slightly lagging behind. There are many devices for intrusion detection, alarm information is difficult to analyze and there are false alarms and isolated alarms, and many detection strategies require manual operation, which greatly increases the time cost and labor cost of intrusion response. In this paper, we propose an intrusion response method based on Bayesian attack graph, which effectively uses the alarm information and adopts the attack behavior prediction algorithm of Bayesian attack graph to block the attack path of network attacks for the uncertainty of attack events and enhance system security.
随着计算机网络的飞速发展,人们对互联网的使用越来越普遍,网络安全问题也日益严重。与入侵检测技术相比,入侵响应技术的发展略显滞后。入侵检测设备多,告警信息分析困难,存在虚警和孤立告警,许多检测策略需要人工操作,这大大增加了入侵响应的时间成本和人工成本。本文提出了一种基于贝叶斯攻击图的入侵响应方法,该方法有效利用告警信息,采用贝叶斯攻击图的攻击行为预测算法,针对攻击事件的不确定性,阻断网络攻击的攻击路径,增强系统安全性。
{"title":"Research on network intrusion response method based on Bayesian attack graph","authors":"Fangfang Dang, Xun Zhao, Lijing Yan, Kehe Wu, Shuai Li","doi":"10.1109/ICCECE58074.2023.10135239","DOIUrl":"https://doi.org/10.1109/ICCECE58074.2023.10135239","url":null,"abstract":"With the rapid development of computer networks, people's use of the Internet has become more and more common, and network security issues are becoming increasingly serious. Compared with intrusion detection, the development of intrusion response is slightly lagging behind. There are many devices for intrusion detection, alarm information is difficult to analyze and there are false alarms and isolated alarms, and many detection strategies require manual operation, which greatly increases the time cost and labor cost of intrusion response. In this paper, we propose an intrusion response method based on Bayesian attack graph, which effectively uses the alarm information and adopts the attack behavior prediction algorithm of Bayesian attack graph to block the attack path of network attacks for the uncertainty of attack events and enhance system security.","PeriodicalId":120030,"journal":{"name":"2023 3rd International Conference on Consumer Electronics and Computer Engineering (ICCECE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132313765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint Optimization of Task Offloading and Resource Allocation in Mobile Edge Computing System 移动边缘计算系统中任务卸载与资源分配的联合优化
Pub Date : 2023-01-06 DOI: 10.1109/ICCECE58074.2023.10135422
Ju Huang, Yongwen Du, Yijia Zheng, Xiquan Zhang
Traditional cloud computing usually does not meet the user needs for latency-sensitive applications, while mobile edge computing (MEC) reduces the pressure on the core network by sinking the computing power of the central cloud to the edge server close to the userTask offloading and resource allocation issues in MEC systems for multi-user, multi-servers. This article first uses the Lyapunov optimization technique to reconstruct the stochastic optimization problem.then uses the genetic algorithm to formulate the unloading decision, and finally uses the binary search method and the Lagrangian multiplier method to obtain the optimal solution of power allocation and computational resource allocation respectively. Through experimental simulation, the scheme adopted in this paper can reduce the cost and improve the system performance while keeping the system stable.
传统的云计算通常不能满足用户对延迟敏感应用的需求,而移动边缘计算(MEC)通过将中心云的计算能力下沉到靠近用户的边缘服务器上,减轻了对核心网络的压力,解决了MEC系统中多用户、多服务器的任务卸载和资源分配问题。本文首先利用李雅普诺夫优化技术重构随机优化问题。然后使用遗传算法制定卸载决策,最后使用二分搜索法和拉格朗日乘子法分别获得功率分配和计算资源分配的最优解。通过实验仿真,本文所采用的方案在保持系统稳定的同时,降低了成本,提高了系统性能。
{"title":"Joint Optimization of Task Offloading and Resource Allocation in Mobile Edge Computing System","authors":"Ju Huang, Yongwen Du, Yijia Zheng, Xiquan Zhang","doi":"10.1109/ICCECE58074.2023.10135422","DOIUrl":"https://doi.org/10.1109/ICCECE58074.2023.10135422","url":null,"abstract":"Traditional cloud computing usually does not meet the user needs for latency-sensitive applications, while mobile edge computing (MEC) reduces the pressure on the core network by sinking the computing power of the central cloud to the edge server close to the userTask offloading and resource allocation issues in MEC systems for multi-user, multi-servers. This article first uses the Lyapunov optimization technique to reconstruct the stochastic optimization problem.then uses the genetic algorithm to formulate the unloading decision, and finally uses the binary search method and the Lagrangian multiplier method to obtain the optimal solution of power allocation and computational resource allocation respectively. Through experimental simulation, the scheme adopted in this paper can reduce the cost and improve the system performance while keeping the system stable.","PeriodicalId":120030,"journal":{"name":"2023 3rd International Conference on Consumer Electronics and Computer Engineering (ICCECE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132400565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Byzantine fault-tolerant consensus algorithm based on MuSig 一种基于MuSig的拜占庭容错共识算法
Pub Date : 2023-01-06 DOI: 10.1109/ICCECE58074.2023.10135286
Pengliu Tan, Wenhao Zeng, Zhihui Tao, Runshu Wang
In view of the disadvantages of PBFT consensus algorithm such as large traffic and complicated view change, a Byzantine fault-tolerant consensus algorithm based on MuSig, namely MSBFT consensus algorithm, is proposed. The algorithm adopts multi-signature MuSig and pipeline idea, and optimizes the consensus process, view change protocol and checkpoint protocol. The communication complexity of the consensus process, view change protocol, and check point protocol in MSBFT is reduced from O(n2), O(n3), and O(n2) in PBFT to O(n) respectively. Experimental results show that compared with ABFT, PBFT and SBFT, the consensus efficiency and throughput of MSBFT algorithm are greatly improved.
针对PBFT共识算法流量大、视图变换复杂等缺点,提出了一种基于MuSig的拜占庭容错共识算法,即MSBFT共识算法。该算法采用多签名MuSig和流水线思想,对共识过程、视图变更协议和检查点协议进行了优化。将MSBFT中的共识过程、视图变更协议和检查点协议的通信复杂度分别从PBFT中的0 (n2)、0 (n3)和0 (n2)降低到O(n)。实验结果表明,与ABFT、PBFT和SBFT相比,MSBFT算法的一致性效率和吞吐量都有很大提高。
{"title":"An Byzantine fault-tolerant consensus algorithm based on MuSig","authors":"Pengliu Tan, Wenhao Zeng, Zhihui Tao, Runshu Wang","doi":"10.1109/ICCECE58074.2023.10135286","DOIUrl":"https://doi.org/10.1109/ICCECE58074.2023.10135286","url":null,"abstract":"In view of the disadvantages of PBFT consensus algorithm such as large traffic and complicated view change, a Byzantine fault-tolerant consensus algorithm based on MuSig, namely MSBFT consensus algorithm, is proposed. The algorithm adopts multi-signature MuSig and pipeline idea, and optimizes the consensus process, view change protocol and checkpoint protocol. The communication complexity of the consensus process, view change protocol, and check point protocol in MSBFT is reduced from O(n2), O(n3), and O(n2) in PBFT to O(n) respectively. Experimental results show that compared with ABFT, PBFT and SBFT, the consensus efficiency and throughput of MSBFT algorithm are greatly improved.","PeriodicalId":120030,"journal":{"name":"2023 3rd International Conference on Consumer Electronics and Computer Engineering (ICCECE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123989399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research of Intrusion Detection Based on Neural Network Optimized by Sparrow Search Algorithm 基于麻雀搜索算法优化的神经网络入侵检测研究
Pub Date : 2023-01-06 DOI: 10.1109/ICCECE58074.2023.10135379
Yue Li, Yunfa Huang, Peiting Xu, Zengjin Liu
In recent years, due to the impact of the COVID-19, most people work from home and study online, resulting in a surge in internet traffic. At the same time, cyber attacks are occurring more frequently. As the second firewall of the system, intrusion detection system can help users discover security threats in time and take corresponding measures through network data monitoring and various alarm mechanisms. To improve the intrusion detection system, a proposal has been made to optimize back propagation neural network using the sparrow search algorithm. This model uses Min-Max scaling and Borderline SMOTE oversampling algorithm to preprocess data, and uses tent map to initialize the population of sparrow search algorithm. Finally, compared with other traditional machine learning models, we choose recall as the core indicator, precision as the secondary indicator, and f1_score as the auxiliary indicator. Experimental results indicate that our model exhibits an improved recall and f1_score, indicating that our model exhibits superior performance in intrusion detection.
近年来,受新冠肺炎疫情影响,大多数人在家办公、在线学习,互联网流量激增。与此同时,网络攻击也越来越频繁。入侵检测系统作为系统的第二道防火墙,通过网络数据监控和各种报警机制,帮助用户及时发现安全威胁并采取相应的措施。为了改进入侵检测系统,提出了一种利用麻雀搜索算法对反向传播神经网络进行优化的方法。该模型采用Min-Max缩放和Borderline SMOTE过采样算法对数据进行预处理,并采用帐篷图初始化麻雀种群搜索算法。最后,与其他传统机器学习模型相比,我们选择召回率作为核心指标,精度作为次要指标,f1_score作为辅助指标。实验结果表明,该模型具有较好的召回率和f1_score,表明该模型在入侵检测中具有较好的性能。
{"title":"Research of Intrusion Detection Based on Neural Network Optimized by Sparrow Search Algorithm","authors":"Yue Li, Yunfa Huang, Peiting Xu, Zengjin Liu","doi":"10.1109/ICCECE58074.2023.10135379","DOIUrl":"https://doi.org/10.1109/ICCECE58074.2023.10135379","url":null,"abstract":"In recent years, due to the impact of the COVID-19, most people work from home and study online, resulting in a surge in internet traffic. At the same time, cyber attacks are occurring more frequently. As the second firewall of the system, intrusion detection system can help users discover security threats in time and take corresponding measures through network data monitoring and various alarm mechanisms. To improve the intrusion detection system, a proposal has been made to optimize back propagation neural network using the sparrow search algorithm. This model uses Min-Max scaling and Borderline SMOTE oversampling algorithm to preprocess data, and uses tent map to initialize the population of sparrow search algorithm. Finally, compared with other traditional machine learning models, we choose recall as the core indicator, precision as the secondary indicator, and f1_score as the auxiliary indicator. Experimental results indicate that our model exhibits an improved recall and f1_score, indicating that our model exhibits superior performance in intrusion detection.","PeriodicalId":120030,"journal":{"name":"2023 3rd International Conference on Consumer Electronics and Computer Engineering (ICCECE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114739653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An image reconstruction algorithm based on semi-gradient edge-oriented interpolation 一种基于半梯度边缘插值的图像重建算法
Pub Date : 2023-01-06 DOI: 10.1109/ICCECE58074.2023.10135537
N. Zhou, Shaozhong Lv, Lijie Zhang
Aiming at the pseudo-color and edge jaggedness problems in the reconstruction of Bayer color filtered array images by traditional demosaicing algorithm, an image reconstruction algorithm based on semi-gradient edge-oriented interpolation is proposed. The algorithm uses the first-order differentiation of the green component, the second-order differentiation of the blue component and the red component to calculate the horizontal gradient and vertical gradient of the green channel, and recovers the green component along the direction with smaller gradient; it uses the semi-gradient as the weight parameter of the interpolation operation, and uses the recovered green component as the correction quantity in the interpolation operation to recover the red component and the blue component. The experimental results show that the algorithm improves at least 1.19db over the traditional bilinear interpolation algorithm and edge-oriented interpolation algorithm, and can improve the pseudo color effect and edge jagged effect of the reconstructed image more effectively.
针对传统去马赛克算法重建拜耳彩色滤波阵列图像时存在的伪色和边缘锯齿问题,提出了一种基于半梯度边缘插值的图像重建算法。该算法利用绿色分量的一阶微分、蓝色分量和红色分量的二阶微分计算绿色通道的水平梯度和垂直梯度,并沿梯度较小的方向恢复绿色分量;它使用半梯度作为插值操作的权值参数,并使用恢复的绿色分量作为插值操作中的校正量来恢复红色分量和蓝色分量。实验结果表明,该算法比传统的双线性插值算法和边缘定向插值算法提高了至少1.19db,能够更有效地改善重建图像的伪彩色效果和边缘锯齿效果。
{"title":"An image reconstruction algorithm based on semi-gradient edge-oriented interpolation","authors":"N. Zhou, Shaozhong Lv, Lijie Zhang","doi":"10.1109/ICCECE58074.2023.10135537","DOIUrl":"https://doi.org/10.1109/ICCECE58074.2023.10135537","url":null,"abstract":"Aiming at the pseudo-color and edge jaggedness problems in the reconstruction of Bayer color filtered array images by traditional demosaicing algorithm, an image reconstruction algorithm based on semi-gradient edge-oriented interpolation is proposed. The algorithm uses the first-order differentiation of the green component, the second-order differentiation of the blue component and the red component to calculate the horizontal gradient and vertical gradient of the green channel, and recovers the green component along the direction with smaller gradient; it uses the semi-gradient as the weight parameter of the interpolation operation, and uses the recovered green component as the correction quantity in the interpolation operation to recover the red component and the blue component. The experimental results show that the algorithm improves at least 1.19db over the traditional bilinear interpolation algorithm and edge-oriented interpolation algorithm, and can improve the pseudo color effect and edge jagged effect of the reconstructed image more effectively.","PeriodicalId":120030,"journal":{"name":"2023 3rd International Conference on Consumer Electronics and Computer Engineering (ICCECE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115033422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2023 3rd International Conference on Consumer Electronics and Computer Engineering (ICCECE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1