首页 > 最新文献

2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET)最新文献

英文 中文
ORB-based Fingerprint Matching Algorithm for Mobile Devices 基于orb的移动设备指纹匹配算法
Yue Li, Guangshun Shi
With the popularity and continuous development of smartphones and other mobile devices, the area of the fingerprint sensors is continuously reduced, resulting in a continuous reduction in the size of the fingerprint. In the process of fingerprint registration, the complete fingerprint image is merged by acquiring a set of small fingerprint images. In the comparison process, the partial fingerprint image is compared to the full image. The traditional fingerprint matching method is mostly based on the minutiae and singular points. Since partial fingerprint contains limited minutiae and most of them do not include any singular points, we proposed a local fingerprint matching algorithm based on ORB feature, which has a good effect on partial fingerprint matching. Also shows the experimental results on two public data sets (FVC2004 and sd04) and a private database.
随着智能手机等移动设备的普及和不断发展,指纹传感器的面积不断缩小,导致指纹尺寸不断缩小。在指纹配准过程中,通过获取一组小的指纹图像来合并完整的指纹图像。在比较过程中,将部分指纹图像与完整指纹图像进行比较。传统的指纹匹配方法主要是基于细节点和奇异点。针对部分指纹包含的细节有限,且大部分指纹不包含任何奇异点的特点,提出了一种基于ORB特征的局部指纹匹配算法,该算法对部分指纹匹配有很好的效果。并给出了在两个公共数据集(FVC2004和sd04)和一个私有数据库上的实验结果。
{"title":"ORB-based Fingerprint Matching Algorithm for Mobile Devices","authors":"Yue Li, Guangshun Shi","doi":"10.1109/CCET48361.2019.8989155","DOIUrl":"https://doi.org/10.1109/CCET48361.2019.8989155","url":null,"abstract":"With the popularity and continuous development of smartphones and other mobile devices, the area of the fingerprint sensors is continuously reduced, resulting in a continuous reduction in the size of the fingerprint. In the process of fingerprint registration, the complete fingerprint image is merged by acquiring a set of small fingerprint images. In the comparison process, the partial fingerprint image is compared to the full image. The traditional fingerprint matching method is mostly based on the minutiae and singular points. Since partial fingerprint contains limited minutiae and most of them do not include any singular points, we proposed a local fingerprint matching algorithm based on ORB feature, which has a good effect on partial fingerprint matching. Also shows the experimental results on two public data sets (FVC2004 and sd04) and a private database.","PeriodicalId":231425,"journal":{"name":"2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"7 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113989764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Study on the Design and Presentation of Virtual Contents in AR Picture Books AR绘本中虚拟内容的设计与呈现研究
Dan Liu, Jin Wan Park
Today, augmented reality has been applied to a variety of areas, including AR picture books. The incorporation of AR into picture books brings readers a new way of reading picture books and is gaining its popularity among readers. However, as the most important feature of AR picture books, virtual contents have not been properly used, and there is severe chaos in terms of the presentation. The virtual contents and the narrative of picture books are disjointed, which affects the reading experience of the readers. In this paper, with the purpose of providing better reading experience of AR picture books to readers, the design form of virtual content in AR picture book is described, the features of reading reflected through the incorporation of the forms of virtual contents and narratives of picture books are pointed out, and the ways that virtual contents are integrated with narratives of picture books in terms of design and presentation are discussed.
如今,增强现实技术已被应用于各种领域,包括增强现实绘本。在绘本中加入AR技术,给读者带来了一种全新的绘本阅读方式,受到了广大读者的欢迎。然而,作为AR绘本最重要的特点,虚拟内容并没有得到很好的利用,在呈现上存在着严重的混乱。绘本的虚拟内容与叙事脱节,影响了读者的阅读体验。为了给读者提供更好的AR绘本阅读体验,本文描述了AR绘本中虚拟内容的设计形式,指出了虚拟内容与绘本叙事形式相结合所体现的阅读特征,并探讨了虚拟内容与绘本叙事在设计和呈现上的融合方式。
{"title":"A Study on the Design and Presentation of Virtual Contents in AR Picture Books","authors":"Dan Liu, Jin Wan Park","doi":"10.1109/CCET48361.2019.8989329","DOIUrl":"https://doi.org/10.1109/CCET48361.2019.8989329","url":null,"abstract":"Today, augmented reality has been applied to a variety of areas, including AR picture books. The incorporation of AR into picture books brings readers a new way of reading picture books and is gaining its popularity among readers. However, as the most important feature of AR picture books, virtual contents have not been properly used, and there is severe chaos in terms of the presentation. The virtual contents and the narrative of picture books are disjointed, which affects the reading experience of the readers. In this paper, with the purpose of providing better reading experience of AR picture books to readers, the design form of virtual content in AR picture book is described, the features of reading reflected through the incorporation of the forms of virtual contents and narratives of picture books are pointed out, and the ways that virtual contents are integrated with narratives of picture books in terms of design and presentation are discussed.","PeriodicalId":231425,"journal":{"name":"2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132045814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Novel Network-Accessible and Localizable Power Monitor 一种新型的网络可访问和可定位的电源监视器
Tinghui Lu, Jinhui Yin, Qiyou Lv, Yiliang Wu, Xuliang Luo, Zhifeng Lin
Dynamic tracking and nondestructive status monitoring of costly asset still are issues in traditional manual asset management, and there is no feasible solution to solve. In this paper, a novel network-accessible and localizable power monitor is designed to solve these issues. Firstly, the hardware framework design of monitor is discussed. Secondly, micro-control unit, power supply voltage regulator circuit, power metering module, WiFi module and LoRa module are addressed in detail. Finally, according to whether the asset equipment is connected to alternating current or not, software flow is divided into two algorithms to realize the dynamic tracking and status monitoring.
昂贵资产的动态跟踪和无损状态监测仍然是传统手工资产管理中存在的问题,目前尚无可行的解决方案。为了解决这些问题,本文设计了一种新型的网络可访问、可定位的电力监测仪。首先,讨论了监控系统的硬件框架设计。其次,对微控制单元、电源稳压电路、电量计量模块、WiFi模块和LoRa模块进行了详细的论述。最后,根据资产设备是否接入交流电,将软件流程分为两种算法,实现动态跟踪和状态监控。
{"title":"A Novel Network-Accessible and Localizable Power Monitor","authors":"Tinghui Lu, Jinhui Yin, Qiyou Lv, Yiliang Wu, Xuliang Luo, Zhifeng Lin","doi":"10.1109/CCET48361.2019.8988955","DOIUrl":"https://doi.org/10.1109/CCET48361.2019.8988955","url":null,"abstract":"Dynamic tracking and nondestructive status monitoring of costly asset still are issues in traditional manual asset management, and there is no feasible solution to solve. In this paper, a novel network-accessible and localizable power monitor is designed to solve these issues. Firstly, the hardware framework design of monitor is discussed. Secondly, micro-control unit, power supply voltage regulator circuit, power metering module, WiFi module and LoRa module are addressed in detail. Finally, according to whether the asset equipment is connected to alternating current or not, software flow is divided into two algorithms to realize the dynamic tracking and status monitoring.","PeriodicalId":231425,"journal":{"name":"2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134096012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research on Indoor Positioning on Inertial Navigation 基于惯性导航的室内定位研究
Changliu Niu, Hui Chang
At present, positioning is widely used in daily life. Outdoor positioning has been developed very mature and can meet the needs of users. However, indoor positioning cannot be realized because the signal cannot reach the satellite positioning mode. Therefore, this paper proposes to combine the inertial positioning method with the common mobile device "mobile phone" in life, and to improve the three parts of the traditional pedestrian dead reckoning algorithm (PDR) , such as step frequency detection, step length measurement and direction detection, in view of the disadvantages such as low positioning accuracy and large error when using the PDR algorithm of pedestrian track calculation. On the basis of the traditional PDR algorithm, in view of the inaccuracy of the zero detection method to judge the step frequency data, the paper proposes to use the combination of kalman filter algorithm and dynamic threshold value to judge the number of steps. For step size measurement, based on the traditional empirical method, users' walking state can be distinguished and step size value can be determined dynamically. Finally, the method of region division is used to solve the problem of particle penetrating the wall, and the track error is adjusted to make the track more accurate. Experimental results show that the algorithm eliminates the positioning inaccuracy caused by excessive error, enhances the positioning stability and accuracy, and the route track is smoother, and the positioning accuracy reaches about 1 meter.
目前,定位在日常生活中应用广泛。户外定位已经发展得非常成熟,能够满足用户的需求。但由于信号无法到达卫星定位模式,无法实现室内定位。因此,本文提出将惯性定位方法与生活中常见的移动设备“手机”相结合,针对传统行人航位推算算法(PDR)在行人轨迹计算中使用PDR算法定位精度低、误差大等缺点,对其步进频率检测、步长测量和方向检测三个部分进行改进。在传统PDR算法的基础上,针对零检测方法判断阶跃频率数据的不准确性,本文提出采用卡尔曼滤波算法与动态阈值相结合的方法来判断阶跃数。对于步长测量,基于传统的经验方法,可以区分用户的行走状态,动态确定步长值。最后,采用区域划分的方法解决了粒子穿壁问题,并对跟踪误差进行了调整,使跟踪更加准确。实验结果表明,该算法消除了误差过大造成的定位不准确,增强了定位稳定性和精度,路线轨迹更加平滑,定位精度达到1米左右。
{"title":"Research on Indoor Positioning on Inertial Navigation","authors":"Changliu Niu, Hui Chang","doi":"10.1109/CCET48361.2019.8989354","DOIUrl":"https://doi.org/10.1109/CCET48361.2019.8989354","url":null,"abstract":"At present, positioning is widely used in daily life. Outdoor positioning has been developed very mature and can meet the needs of users. However, indoor positioning cannot be realized because the signal cannot reach the satellite positioning mode. Therefore, this paper proposes to combine the inertial positioning method with the common mobile device \"mobile phone\" in life, and to improve the three parts of the traditional pedestrian dead reckoning algorithm (PDR) , such as step frequency detection, step length measurement and direction detection, in view of the disadvantages such as low positioning accuracy and large error when using the PDR algorithm of pedestrian track calculation. On the basis of the traditional PDR algorithm, in view of the inaccuracy of the zero detection method to judge the step frequency data, the paper proposes to use the combination of kalman filter algorithm and dynamic threshold value to judge the number of steps. For step size measurement, based on the traditional empirical method, users' walking state can be distinguished and step size value can be determined dynamically. Finally, the method of region division is used to solve the problem of particle penetrating the wall, and the track error is adjusted to make the track more accurate. Experimental results show that the algorithm eliminates the positioning inaccuracy caused by excessive error, enhances the positioning stability and accuracy, and the route track is smoother, and the positioning accuracy reaches about 1 meter.","PeriodicalId":231425,"journal":{"name":"2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114467856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Development of Basic Concept and Algorithm for Myanmar Population Dataset Management System 缅甸人口数据集管理系统基本概念与算法的发展
Kyaw Zaw Ye, Z. Htet, Toe Wai Htun, Moe Kyaw Thu, Htay Hlaing Soe, Hein Khant Aung, Pyae Sone Ko Ko
Studied and analysed the problems of data evaluation and development of data science. Developed basic concept and algorithm for dataset management system. Realized and implemented web application for myanmar population dataset management system. In this paper we implemented, coded and tested on real data and during the implementing and testing phase related to basic concept of data science.
研究和分析了数据评估和数据科学发展的问题。提出了数据集管理系统的基本概念和算法。缅甸人口数据管理系统web应用程序的实现。在本文中,我们对实际数据进行了实现、编码和测试,并在实现和测试阶段涉及到数据科学的基本概念。
{"title":"Development of Basic Concept and Algorithm for Myanmar Population Dataset Management System","authors":"Kyaw Zaw Ye, Z. Htet, Toe Wai Htun, Moe Kyaw Thu, Htay Hlaing Soe, Hein Khant Aung, Pyae Sone Ko Ko","doi":"10.1109/CCET48361.2019.8988996","DOIUrl":"https://doi.org/10.1109/CCET48361.2019.8988996","url":null,"abstract":"Studied and analysed the problems of data evaluation and development of data science. Developed basic concept and algorithm for dataset management system. Realized and implemented web application for myanmar population dataset management system. In this paper we implemented, coded and tested on real data and during the implementing and testing phase related to basic concept of data science.","PeriodicalId":231425,"journal":{"name":"2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127719835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Approach for RAID Scaling Based on STAR-Code 一种基于STAR-Code的RAID扩展方法
Xuejun Zhong, Zhu Yuan, Yu Hu, Ping Xie
Today, the information data of the world presents explosive growth and the existing storage systems can no longer adapt the requirements of storing massive data. Disk array is composed of a large number of independent disks, which are combined into a huge disk group and provide more I/O parallelism. Therefore, we often adopt the way, adding new disks to disk array for resolving the insufficient storage capacity, which is also called as RAID scaling. Since RAID was proposed, different levels of RAID storage systems have been put forward for different data storage requirements. Compared with other RAID storage systems, RAID storage system based on STAR-Code has better data fault tolerance and higher data recovery ability, which can tolerate three disks fault simultaneously. In this paper, we put forward RS3 approach based on STAR-Code for RAID scaling. Compared with Round-Robin and Semi-RR approach, this approach reduces the data migration by 64.3%~89.5% and decreases the migration time by 66.1%~90.8%.
当今世界的信息数据呈爆炸式增长,现有的存储系统已经不能适应海量数据的存储需求。磁盘阵列由大量独立的磁盘组成,这些磁盘组合成一个巨大的磁盘组,提供更多的I/O并行性。因此,我们经常采用在磁盘阵列中增加新磁盘的方式来解决存储容量不足的问题,这种方式也称为RAID扩容。自RAID提出以来,针对不同的数据存储需求,提出了不同级别的RAID存储系统。与其他RAID存储系统相比,基于STAR-Code的RAID存储系统具有更好的数据容错能力和更高的数据恢复能力,可同时容错3块硬盘。本文提出了基于STAR-Code的RS3方法用于RAID扩展。与Round-Robin和Semi-RR方法相比,该方法的数据迁移率降低了64.3%~89.5%,迁移时间降低了66.1%~90.8%。
{"title":"An Approach for RAID Scaling Based on STAR-Code","authors":"Xuejun Zhong, Zhu Yuan, Yu Hu, Ping Xie","doi":"10.1109/CCET48361.2019.8989091","DOIUrl":"https://doi.org/10.1109/CCET48361.2019.8989091","url":null,"abstract":"Today, the information data of the world presents explosive growth and the existing storage systems can no longer adapt the requirements of storing massive data. Disk array is composed of a large number of independent disks, which are combined into a huge disk group and provide more I/O parallelism. Therefore, we often adopt the way, adding new disks to disk array for resolving the insufficient storage capacity, which is also called as RAID scaling. Since RAID was proposed, different levels of RAID storage systems have been put forward for different data storage requirements. Compared with other RAID storage systems, RAID storage system based on STAR-Code has better data fault tolerance and higher data recovery ability, which can tolerate three disks fault simultaneously. In this paper, we put forward RS3 approach based on STAR-Code for RAID scaling. Compared with Round-Robin and Semi-RR approach, this approach reduces the data migration by 64.3%~89.5% and decreases the migration time by 66.1%~90.8%.","PeriodicalId":231425,"journal":{"name":"2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127568262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Seatbelt Recognition Method Based on Convolutional Attention Mechanism 基于卷积注意机制的安全带识别方法
Guangxi Chen, Fangfang Lv, Yijun Zhan, Yong Huang
In order to solve the problem of low accuracy of the driver's seat-belt identification and neglecting co-pilot, a method of driver's seat-belt identification based on deep convolutional channel modeling is improved. Firstly, the characteristic parameters of redundant channels are reduced by means of deep convolutional feature channel compression. Then, the feature weight of the deep convolutional channel is re-calibrated to improve the attention weight of the feature of the safety belt and suppress the expression of the interference feature. Finally, the central loss function is used to assist feature training of the model, so as to reduce the difference of feature distribution within the class and make the learned features easier to be classified and recognized. The experimental results show that, compared with other algorithms, the improved deep convolution driver seat belt identification model in this paper improves the recognition accuracy, recall rate, and F value by 6.9%, 4.32 and 5.5% respectively, and greatly improves the accuracy and practicability.
针对驾驶员安全带识别精度低、忽略副驾驶的问题,改进了一种基于深度卷积信道建模的驾驶员安全带识别方法。首先,采用深度卷积特征信道压缩的方法减少冗余信道的特征参数;然后,重新校准深度卷积通道的特征权重,提高安全带特征的关注权重,抑制干扰特征的表达;最后,利用中心损失函数辅助模型的特征训练,减少类内特征分布的差异,使学习到的特征更容易被分类和识别。实验结果表明,与其他算法相比,本文改进的深度卷积驾驶员安全带识别模型的识别准确率、召回率和F值分别提高了6.9%、4.32%和5.5%,大大提高了准确性和实用性。
{"title":"Seatbelt Recognition Method Based on Convolutional Attention Mechanism","authors":"Guangxi Chen, Fangfang Lv, Yijun Zhan, Yong Huang","doi":"10.1109/CCET48361.2019.8989308","DOIUrl":"https://doi.org/10.1109/CCET48361.2019.8989308","url":null,"abstract":"In order to solve the problem of low accuracy of the driver's seat-belt identification and neglecting co-pilot, a method of driver's seat-belt identification based on deep convolutional channel modeling is improved. Firstly, the characteristic parameters of redundant channels are reduced by means of deep convolutional feature channel compression. Then, the feature weight of the deep convolutional channel is re-calibrated to improve the attention weight of the feature of the safety belt and suppress the expression of the interference feature. Finally, the central loss function is used to assist feature training of the model, so as to reduce the difference of feature distribution within the class and make the learned features easier to be classified and recognized. The experimental results show that, compared with other algorithms, the improved deep convolution driver seat belt identification model in this paper improves the recognition accuracy, recall rate, and F value by 6.9%, 4.32 and 5.5% respectively, and greatly improves the accuracy and practicability.","PeriodicalId":231425,"journal":{"name":"2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131033093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Hardware-Trojans Detection Approach Based on eXtreme Gradient Boosting 一种基于极限梯度增强的硬件木马检测方法
Jinghui Chen, Chen Dong, Fan Zhang, Guorong He
As the core component of the electronic devices, the integrated circuit (IC) must be taken seriously with its security. The pre-silicon detection methods do not require gold chips, are not affected by process noise and are suitable for the safe detection of a very large scale integration (VLSI). Therefore, more and more researchers are paying attention to the pre-silicon detection method. In this paper, we propose a machine-learning-based hardware-Trojans detection method in gate-level. First, by the analysis of the Trojan circuits, we put forward new Trojan-net features. After that, we use the scoring mechanism of the eXtreme Gradient Boosting (XGBoost) to set up a new effective feature set of 49 out of 56 features. Finally, the hardware-Trojan classifier was trained based on the effective feature set. The experimental results show that the proposed method can obtain the average Recall of 89.84%, the average F-measure of 87.75% and the average Accuracy of 99.83%. Furthermore, through the comparison experiments, it is proved that the features proposed in this paper can further improve the performance of detection.
集成电路作为电子设备的核心部件,其安全性必须受到高度重视。预硅检测方法不需要金芯片,不受工艺噪声的影响,适用于超大规模集成电路(VLSI)的安全检测。因此,预硅检测方法受到越来越多研究者的关注。在本文中,我们提出了一种基于机器学习的门级硬件木马检测方法。首先,通过对木马电路的分析,提出了木马网络的新特征。之后,我们使用极限梯度提升(XGBoost)的评分机制,从56个特征中建立了49个新的有效特征集。最后,根据有效特征集训练硬件木马分类器。实验结果表明,该方法的平均查全率为89.84%,平均f值为87.75%,平均准确率为99.83%。此外,通过对比实验,证明本文提出的特征可以进一步提高检测性能。
{"title":"A Hardware-Trojans Detection Approach Based on eXtreme Gradient Boosting","authors":"Jinghui Chen, Chen Dong, Fan Zhang, Guorong He","doi":"10.1109/CCET48361.2019.8988946","DOIUrl":"https://doi.org/10.1109/CCET48361.2019.8988946","url":null,"abstract":"As the core component of the electronic devices, the integrated circuit (IC) must be taken seriously with its security. The pre-silicon detection methods do not require gold chips, are not affected by process noise and are suitable for the safe detection of a very large scale integration (VLSI). Therefore, more and more researchers are paying attention to the pre-silicon detection method. In this paper, we propose a machine-learning-based hardware-Trojans detection method in gate-level. First, by the analysis of the Trojan circuits, we put forward new Trojan-net features. After that, we use the scoring mechanism of the eXtreme Gradient Boosting (XGBoost) to set up a new effective feature set of 49 out of 56 features. Finally, the hardware-Trojan classifier was trained based on the effective feature set. The experimental results show that the proposed method can obtain the average Recall of 89.84%, the average F-measure of 87.75% and the average Accuracy of 99.83%. Furthermore, through the comparison experiments, it is proved that the features proposed in this paper can further improve the performance of detection.","PeriodicalId":231425,"journal":{"name":"2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130303215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
CCET 2019 Cover Page CCET 2019封面
{"title":"CCET 2019 Cover Page","authors":"","doi":"10.1109/ccet48361.2019.8989010","DOIUrl":"https://doi.org/10.1109/ccet48361.2019.8989010","url":null,"abstract":"","PeriodicalId":231425,"journal":{"name":"2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128451429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Implementation of AES-CMAC Authenticated Encryption Algorithm on FPGA AES-CMAC认证加密算法在FPGA上的实现
Syed Jahanzeb Hussain Pirzada, A. Murtaza, M. N. Hasan, Tongge Xu, Jianwei Liu
The advancements in communication technology have evolved the algorithms used for communication security. Recently, the Authenticated Encryption (AE) algorithms are employed for providing security services for data communication. The Advanced Encryption Standard in Counter mode (AES-CTR) with Cipher-block Chaining Message authentication code (AES-CCM) algorithm is used for providing the data security for various applications. But the AES-CCM algorithm provides limited throughput for data communication. Therefore, in this work, new architecture is proposed for increase in throughput for provision of data security for communication application. The proposed algorithm uses the AES-CTR algorithm with the Cipher-based Message Authentication Code (CMAC) algorithm for providing AE. The proposed AE algorithm is implemented on FPGA and it’s compared with the FPGA implementation of AES-CCM algorithm. The comparison results of the proposed algorithm and the AES-CCM algorithm shows that the proposed algorithm provides improvement in the consumption of the area, processing time, and throughput. The implementation of proposed AES-CMAC AE algorithm on FPGA provides a throughput of 4.30 Gbps.
随着通信技术的进步,用于通信安全的算法也在不断发展。近年来,为了为数据通信提供安全服务,采用了AE (Authenticated Encryption)算法。采用计数器模式高级加密标准AES-CTR (Advanced Encryption Standard in Counter)和密文块链消息认证码AES-CCM算法,为各种应用提供数据安全保障。但是AES-CCM算法对数据通信的吞吐能力有限。因此,本文提出了一种新的架构,以提高吞吐量,为通信应用提供数据安全。该算法采用AES-CTR算法和基于密码的消息认证码(CMAC)算法提供AE。提出的声发射算法在FPGA上实现,并与AES-CCM算法的FPGA实现进行了比较。将该算法与AES-CCM算法进行比较,结果表明该算法在面积消耗、处理时间和吞吐量方面都有改善。提出的AES-CMAC AE算法在FPGA上的实现提供了4.30 Gbps的吞吐量。
{"title":"The Implementation of AES-CMAC Authenticated Encryption Algorithm on FPGA","authors":"Syed Jahanzeb Hussain Pirzada, A. Murtaza, M. N. Hasan, Tongge Xu, Jianwei Liu","doi":"10.1109/CCET48361.2019.8989202","DOIUrl":"https://doi.org/10.1109/CCET48361.2019.8989202","url":null,"abstract":"The advancements in communication technology have evolved the algorithms used for communication security. Recently, the Authenticated Encryption (AE) algorithms are employed for providing security services for data communication. The Advanced Encryption Standard in Counter mode (AES-CTR) with Cipher-block Chaining Message authentication code (AES-CCM) algorithm is used for providing the data security for various applications. But the AES-CCM algorithm provides limited throughput for data communication. Therefore, in this work, new architecture is proposed for increase in throughput for provision of data security for communication application. The proposed algorithm uses the AES-CTR algorithm with the Cipher-based Message Authentication Code (CMAC) algorithm for providing AE. The proposed AE algorithm is implemented on FPGA and it’s compared with the FPGA implementation of AES-CCM algorithm. The comparison results of the proposed algorithm and the AES-CCM algorithm shows that the proposed algorithm provides improvement in the consumption of the area, processing time, and throughput. The implementation of proposed AES-CMAC AE algorithm on FPGA provides a throughput of 4.30 Gbps.","PeriodicalId":231425,"journal":{"name":"2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115892296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1