Pub Date : 2019-08-01DOI: 10.1109/ccet48361.2019.8988933
{"title":"CCET 2019 Copyright Page","authors":"","doi":"10.1109/ccet48361.2019.8988933","DOIUrl":"https://doi.org/10.1109/ccet48361.2019.8988933","url":null,"abstract":"","PeriodicalId":231425,"journal":{"name":"2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114900043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-01DOI: 10.1109/CCET48361.2019.8989186
Zhihui Liu, Zhiming Wang, Yuxiang Xing
The automatic recognition of wagon number plays an important role in the railway transportation system, but high-precision recognition is still challenging due to many disturbing factors, such as uneven illumination, complex background, image fouling and various type of wagon number. To reduce the complexity of the problem, we design a two-stage approach for wagon number recognition based on the state-of-the-art object detector YOLOv3. Firstly, the region of wagon number is detected by one detector and cropped according to the predicted bounding box, then the digits that make up the wagon number are detected and recognized in the cropped image by another detector. During the whole process, there is no need for image preprocessing and character segmentation, which reduce the accumulation of intermediate error and improve the speed of recognition. Experimental results show that the approach achieves a recognition rate of 96.08% and speed of 70ms per image on 1072 test images.
{"title":"Wagon Number Recognition Based on the YOLOv3 Detector","authors":"Zhihui Liu, Zhiming Wang, Yuxiang Xing","doi":"10.1109/CCET48361.2019.8989186","DOIUrl":"https://doi.org/10.1109/CCET48361.2019.8989186","url":null,"abstract":"The automatic recognition of wagon number plays an important role in the railway transportation system, but high-precision recognition is still challenging due to many disturbing factors, such as uneven illumination, complex background, image fouling and various type of wagon number. To reduce the complexity of the problem, we design a two-stage approach for wagon number recognition based on the state-of-the-art object detector YOLOv3. Firstly, the region of wagon number is detected by one detector and cropped according to the predicted bounding box, then the digits that make up the wagon number are detected and recognized in the cropped image by another detector. During the whole process, there is no need for image preprocessing and character segmentation, which reduce the accumulation of intermediate error and improve the speed of recognition. Experimental results show that the approach achieves a recognition rate of 96.08% and speed of 70ms per image on 1072 test images.","PeriodicalId":231425,"journal":{"name":"2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129581256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-01DOI: 10.1109/CCET48361.2019.8989400
Na Li, Wen Su, Y. Li, Hui Yu, Weizhi Xu, Baozhong Gao
Language is the main carrier of communication between cultures, but the translation between languages has become the biggest problem of people's communication. Machine translation is a process that uses computer to transform a natural language into another natural language. The automatic evaluation of machine translation is an important research content in machine translation technology. It can discover defects in translation system and promote its development. It has achieved rich fruits, and various evaluation methods emerge endlessly after several decades of development of the automatic evaluation method. In this paper, three kinds of representative evaluation methods are introduced and their respective advantages and disadvantages are analyzed. In addition, we describe the evaluation technique based on reference. It plays an important role in improving the performance of automatic evaluation methods although the coverage expansion of reference is not the main method. Finally, we summarize the development trends of automatic evaluation metric based on extended reference and related issues that need to be further addressed.
{"title":"Research on Machine Translation Automatic Evaluation Based on Extended Reference","authors":"Na Li, Wen Su, Y. Li, Hui Yu, Weizhi Xu, Baozhong Gao","doi":"10.1109/CCET48361.2019.8989400","DOIUrl":"https://doi.org/10.1109/CCET48361.2019.8989400","url":null,"abstract":"Language is the main carrier of communication between cultures, but the translation between languages has become the biggest problem of people's communication. Machine translation is a process that uses computer to transform a natural language into another natural language. The automatic evaluation of machine translation is an important research content in machine translation technology. It can discover defects in translation system and promote its development. It has achieved rich fruits, and various evaluation methods emerge endlessly after several decades of development of the automatic evaluation method. In this paper, three kinds of representative evaluation methods are introduced and their respective advantages and disadvantages are analyzed. In addition, we describe the evaluation technique based on reference. It plays an important role in improving the performance of automatic evaluation methods although the coverage expansion of reference is not the main method. Finally, we summarize the development trends of automatic evaluation metric based on extended reference and related issues that need to be further addressed.","PeriodicalId":231425,"journal":{"name":"2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128208732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-01DOI: 10.1109/CCET48361.2019.8989320
Yi Li, Wenwen Sun, Shaopeng Guan
For large-scale SDN networks, the deployment and application requirements of multiple controllers are urgent. A multi-controller deployment method based on firefly algorithm is proposed, which is optimized with the goal of average control delay and controller load difference. This method can minimize the average control delay by continuously optimizing during iterations and limit controller load utilization. An improved firefly algorithm is proposed that improves the global search ability in the early stage of the algorithm and the convergence speed in the later stage. This method can guarantee multi-controller deployment scheme with minimum delay and load balancing in SDN network.
{"title":"A Firefly Inspired Controller Placement Algorithm in Software Defined Network","authors":"Yi Li, Wenwen Sun, Shaopeng Guan","doi":"10.1109/CCET48361.2019.8989320","DOIUrl":"https://doi.org/10.1109/CCET48361.2019.8989320","url":null,"abstract":"For large-scale SDN networks, the deployment and application requirements of multiple controllers are urgent. A multi-controller deployment method based on firefly algorithm is proposed, which is optimized with the goal of average control delay and controller load difference. This method can minimize the average control delay by continuously optimizing during iterations and limit controller load utilization. An improved firefly algorithm is proposed that improves the global search ability in the early stage of the algorithm and the convergence speed in the later stage. This method can guarantee multi-controller deployment scheme with minimum delay and load balancing in SDN network.","PeriodicalId":231425,"journal":{"name":"2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117233183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-01DOI: 10.1109/CCET48361.2019.8989111
Linna Zhou, Yang Cao
Information hiding that different from encryption algorithm which needs to be encrypted and decrypted by complex mathematical models hides secret information in ordinary cover image and transmits it in open transmission channel in a way that is imperceptible to human eyes. LSB (least significant bit) algorithm is commonly used for information hiding, but it does not have good anti-detection ability. In this paper, a steganography combination of PVD (pixel value difference) with MP (matrix pattern) based on the difference of pixel texture is proposed, where the former is classified two portions and then the binary message is embedded in the edge portion of the blue layer of the image without original image in extracting, the latter algorithm generates matrix patterns representing 95 characters in the green layer of the cover image, and then revises the gray value of the pixels in the blue layer of the cover image. The 4th- 6th bits of the blue layer are used for MP algorithm, and the rest are used for PVD algorithm. The result had been proved that it has diverse embedded message forms, better detection resistance and high security capacity.
信息隐藏不同于加密算法需要通过复杂的数学模型进行加解密,它将秘密信息隐藏在普通的封面图像中,并以人眼难以察觉的方式在开放的传输通道中传输。LSB (least significant bit)算法是一种常用的信息隐藏算法,但其抗检测能力不强。本文提出了一种基于像素纹理差异的PVD (pixel value difference)和MP (matrix pattern)组合隐写算法,其中PVD (pixel value difference)和MP (matrix pattern)将前者分为两部分,然后将二值信息嵌入到未提取原始图像的蓝色层图像的边缘部分,后者算法在封面图像的绿色层生成代表95个字符的矩阵模式。然后修改封面图像蓝色层像素的灰度值。蓝色层的第4 ~ 6位用于MP算法,其余的用于PVD算法。实验结果表明,该系统具有丰富的嵌入式报文形式、较好的抗检测能力和较高的安全性能。
{"title":"Combined Algorithm of Steganography with Matrix Pattern and Pixel Value Difference","authors":"Linna Zhou, Yang Cao","doi":"10.1109/CCET48361.2019.8989111","DOIUrl":"https://doi.org/10.1109/CCET48361.2019.8989111","url":null,"abstract":"Information hiding that different from encryption algorithm which needs to be encrypted and decrypted by complex mathematical models hides secret information in ordinary cover image and transmits it in open transmission channel in a way that is imperceptible to human eyes. LSB (least significant bit) algorithm is commonly used for information hiding, but it does not have good anti-detection ability. In this paper, a steganography combination of PVD (pixel value difference) with MP (matrix pattern) based on the difference of pixel texture is proposed, where the former is classified two portions and then the binary message is embedded in the edge portion of the blue layer of the image without original image in extracting, the latter algorithm generates matrix patterns representing 95 characters in the green layer of the cover image, and then revises the gray value of the pixels in the blue layer of the cover image. The 4th- 6th bits of the blue layer are used for MP algorithm, and the rest are used for PVD algorithm. The result had been proved that it has diverse embedded message forms, better detection resistance and high security capacity.","PeriodicalId":231425,"journal":{"name":"2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131506311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-01DOI: 10.1109/CCET48361.2019.8988962
Liu Baozhong, L. Jianbin
With the increasing amount of program source code data in the development of the open source community, there are reusable program patterns in the vast amount of code data. The existing program pattern mainly relies on manual extraction and there are problems such as high labor cost and a small number of acquired modes. This paper proposes a program code mining method for this problem. Automated mining of program pattern by this method saves labor costs and time costs and can more accurately mine more program patterns. In the mining process, the pre-processing is performed to convert the code data into a digital sequence and then the SPADE algorithm is used for automatic mining to obtain a reusable program pattern. After comparison with PrefixSpan and GSP mining algorithms, the results show that the method is effective.
{"title":"Research on Program Code Mining Method","authors":"Liu Baozhong, L. Jianbin","doi":"10.1109/CCET48361.2019.8988962","DOIUrl":"https://doi.org/10.1109/CCET48361.2019.8988962","url":null,"abstract":"With the increasing amount of program source code data in the development of the open source community, there are reusable program patterns in the vast amount of code data. The existing program pattern mainly relies on manual extraction and there are problems such as high labor cost and a small number of acquired modes. This paper proposes a program code mining method for this problem. Automated mining of program pattern by this method saves labor costs and time costs and can more accurately mine more program patterns. In the mining process, the pre-processing is performed to convert the code data into a digital sequence and then the SPADE algorithm is used for automatic mining to obtain a reusable program pattern. After comparison with PrefixSpan and GSP mining algorithms, the results show that the method is effective.","PeriodicalId":231425,"journal":{"name":"2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133195556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-01DOI: 10.1109/CCET48361.2019.8989334
Qing-quan Tan, Zihong Zhao, Jingyi Yu, Qun Liu
After the earthquake, the rapid assessment of earthquake disaster losses is the primary task, which can provide decision-making basis for emergency rescue operations. Considering the advantages of Geographic Information System (GIS) technology, GIS is widely used in the rapid assessment of earthquake disaster losses. This paper presents a rapid assessment technique for earthquake disaster losses based on GIS, and provides the overall architecture design of the system. The key technologies of the whole chain of the system are realized, including automatic trigger calculation, disaster loss assessment based on spatial analysis, auxiliary decision support technology, visual expression of disaster loss, and so on. The GIS-based rapid assessment system for earthquake disasters has been deployed and applied in actual earthquake emergency work, providing a guarantee for improving earthquake emergency response capability and reducing earthquake disaster losses.
{"title":"Research on Rapid Assessment Technology of Earthquake Disaster Loss Based on GIS","authors":"Qing-quan Tan, Zihong Zhao, Jingyi Yu, Qun Liu","doi":"10.1109/CCET48361.2019.8989334","DOIUrl":"https://doi.org/10.1109/CCET48361.2019.8989334","url":null,"abstract":"After the earthquake, the rapid assessment of earthquake disaster losses is the primary task, which can provide decision-making basis for emergency rescue operations. Considering the advantages of Geographic Information System (GIS) technology, GIS is widely used in the rapid assessment of earthquake disaster losses. This paper presents a rapid assessment technique for earthquake disaster losses based on GIS, and provides the overall architecture design of the system. The key technologies of the whole chain of the system are realized, including automatic trigger calculation, disaster loss assessment based on spatial analysis, auxiliary decision support technology, visual expression of disaster loss, and so on. The GIS-based rapid assessment system for earthquake disasters has been deployed and applied in actual earthquake emergency work, providing a guarantee for improving earthquake emergency response capability and reducing earthquake disaster losses.","PeriodicalId":231425,"journal":{"name":"2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132082756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-01DOI: 10.1109/CCET48361.2019.8989215
Hongwei Yang, Dian-fu Ma
CPU is the core of modern computer system and the foundation of operating system and upper software. Memory management unit (MMU) and cache (Cache) are widely used in modern microprocessor design. They have been improving CPU performance while increasing the difficulties of CPU design and verification. As the structure of today’s CPU is more and more complex, conventional design and verification methods such as testing and simulating can’t guarantee the correctness of CPU structure designs. In this paper, we present an axiomatic system which could be used to formally describe the CPU structure with MMU and Cache. And we propose a formal method to formally verify an instruction path with MMU and Cache based on this axiom system. Meanwhile we develop an automated verification tool and completed formal verification of 86 MIPS instructions efficiently with the tool.
{"title":"Formal Design and Verification of Memory Management Unit Microprocessor","authors":"Hongwei Yang, Dian-fu Ma","doi":"10.1109/CCET48361.2019.8989215","DOIUrl":"https://doi.org/10.1109/CCET48361.2019.8989215","url":null,"abstract":"CPU is the core of modern computer system and the foundation of operating system and upper software. Memory management unit (MMU) and cache (Cache) are widely used in modern microprocessor design. They have been improving CPU performance while increasing the difficulties of CPU design and verification. As the structure of today’s CPU is more and more complex, conventional design and verification methods such as testing and simulating can’t guarantee the correctness of CPU structure designs. In this paper, we present an axiomatic system which could be used to formally describe the CPU structure with MMU and Cache. And we propose a formal method to formally verify an instruction path with MMU and Cache based on this axiom system. Meanwhile we develop an automated verification tool and completed formal verification of 86 MIPS instructions efficiently with the tool.","PeriodicalId":231425,"journal":{"name":"2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132126723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-01DOI: 10.1109/CCET48361.2019.8989374
Shaojuan Xu, Haixia Yu, Yuxin Yang, Qing-quan Tan
In order to solve the problems of laboratory warehouse management, an embedded handheld terminal based on Internet of Things (IoT) technology is designed and implemented. The terminal hardware is based on Samsung S5PV210 embedded processor, which is mainly composed of barcode, Radio Frequency Identification Technology (RFID) and touch screen modules. The terminal software is developed based on embedded Linux operating system and the management platform is developed based on C/S architecture by QT. The system is easy to operate with friendly interface, easy to carry, and hence provides an efficient and standardized approach for warehouse goods management.
{"title":"A Portable Warehouse Management Terminal Based on Internet of Things","authors":"Shaojuan Xu, Haixia Yu, Yuxin Yang, Qing-quan Tan","doi":"10.1109/CCET48361.2019.8989374","DOIUrl":"https://doi.org/10.1109/CCET48361.2019.8989374","url":null,"abstract":"In order to solve the problems of laboratory warehouse management, an embedded handheld terminal based on Internet of Things (IoT) technology is designed and implemented. The terminal hardware is based on Samsung S5PV210 embedded processor, which is mainly composed of barcode, Radio Frequency Identification Technology (RFID) and touch screen modules. The terminal software is developed based on embedded Linux operating system and the management platform is developed based on C/S architecture by QT. The system is easy to operate with friendly interface, easy to carry, and hence provides an efficient and standardized approach for warehouse goods management.","PeriodicalId":231425,"journal":{"name":"2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114302078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-01DOI: 10.1109/ccet48361.2019.8989364
{"title":"CCET 2019 Preface","authors":"","doi":"10.1109/ccet48361.2019.8989364","DOIUrl":"https://doi.org/10.1109/ccet48361.2019.8989364","url":null,"abstract":"","PeriodicalId":231425,"journal":{"name":"2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121143681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}