首页 > 最新文献

2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)最新文献

英文 中文
The Improved Algorithm Of Image Enhancement Based on Optical Fourier Transformation 基于光学傅里叶变换的图像增强改进算法
Yaoqun Huang, Qijing Zhang
Image enhancement is an important part of image information processing, image manipulation enhanced algorithm plays an important role in improving image quality, it involves all aspects of human life and social production. Because of the conditions of the scene, the visual effects and quality of images are often unable to meet the requirements, their quality is poor, this requires image enhancement technology to improve human visual effect, improve image quality. Compared with the deep learning method of big data, the traditional image manipulation enhanced algorithm does not need a larger number of learning samples, and has a small amount of calculation and fast processing speed, and is still the main way of image manipulation enhanced algorithm at present. This essay takes optical processing as a breakthrough point, the image manipulation enhanced algorithm is improved based on the principle of Abbe's image, and the High frequency image signal is enhanced by Unsharp Masking, the low frequency images are enhanced by Contrast Limited Adaptive Histogram Equalization. Finally, the high frequency and low frequency images are fused by weighted wavelet to achieve multi-dimensional enhancement of the image, obtain more detailed information of the image, and improve the image quality significantly.
图像增强是图像信息处理的重要组成部分,图像处理增强算法对提高图像质量起着重要作用,它涉及到人类生活和社会生产的各个方面。由于现场条件的限制,图像的视觉效果和质量往往不能满足要求,其质量较差,这就需要图像增强技术来改善人类的视觉效果,提高图像质量。与大数据的深度学习方法相比,传统的图像处理增强算法不需要更多的学习样本,计算量小,处理速度快,仍然是目前图像处理增强算法的主要方式。本文以光学处理为突破口,基于Abbe图像原理对图像处理增强算法进行改进,对高频图像信号采用非锐化掩模增强,对低频图像采用对比度有限的自适应直方图均衡化增强。最后,对高频和低频图像进行加权小波融合,实现图像的多维增强,获得更详细的图像信息,显著提高图像质量。
{"title":"The Improved Algorithm Of Image Enhancement Based on Optical Fourier Transformation","authors":"Yaoqun Huang, Qijing Zhang","doi":"10.1109/CCPQT56151.2022.00059","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00059","url":null,"abstract":"Image enhancement is an important part of image information processing, image manipulation enhanced algorithm plays an important role in improving image quality, it involves all aspects of human life and social production. Because of the conditions of the scene, the visual effects and quality of images are often unable to meet the requirements, their quality is poor, this requires image enhancement technology to improve human visual effect, improve image quality. Compared with the deep learning method of big data, the traditional image manipulation enhanced algorithm does not need a larger number of learning samples, and has a small amount of calculation and fast processing speed, and is still the main way of image manipulation enhanced algorithm at present. This essay takes optical processing as a breakthrough point, the image manipulation enhanced algorithm is improved based on the principle of Abbe's image, and the High frequency image signal is enhanced by Unsharp Masking, the low frequency images are enhanced by Contrast Limited Adaptive Histogram Equalization. Finally, the high frequency and low frequency images are fused by weighted wavelet to achieve multi-dimensional enhancement of the image, obtain more detailed information of the image, and improve the image quality significantly.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127883201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mask Recognition Based on Improved YOLOv5 Target Detection Algorithm 基于改进YOLOv5目标检测算法的掩码识别
He Wang, Haijun Li
Since the outbreak of the new crown epidemic, in order to curb the spread of the epidemic, the World Health Organization and others have carried out a series of work studies. At present, wearing a mask correctly when traveling in any public place is one of the effective means of protection. However, for example, in places with high traffic such as high-speed railway stations and airports, the efficiency of manual detection and supervision of mask wearing is low. Therefore, it is very necessary to use the automatic detection mask device to supervise the wearing of masks in real time. With the deepening of research on deep learning network models, in the real-time detection of masks Deep Learning-based network models, it is difficult to achieve satisfactory results in terms of precise and real-time in all performance. In order to improve the detection accuracy and other issues, based on the YOLOv5 object detecting algorithm, we first created a dataset MaskData for mask recognition by using the open source dataset downloaded from the Internet and adding various types of face mask datasets. Secondly, in the detection network, the DIOU_nms method is designed to be a replacement for the IOU in the NMS, and under the same parameters, the detection accuracy of occluded and overlapping targets is improved. Finally, replacing the GIOU loss function with the a-CIoU loss function can obtain higher-quality localized image regions faster and more accurately, generate bounding boxes and predict categories. The results of the experiment have demonstrated that the refined network can more accurately identify whether the face is wearing a mask, and to some extent, the detection accuracy was greatly improved. And using the designed GUI interface, the trained and improved YOLOv5 model can be directly called to perform real-time mask-wearing detection for videos and pictures.
新冠疫情爆发以来,为遏制疫情蔓延,世界卫生组织等开展了一系列工作研究。目前,在任何公共场所旅行时正确佩戴口罩是有效的防护手段之一。但在高铁站、机场等人流量较大的场所,人工检测和口罩佩戴监管效率较低。因此,使用自动检测口罩装置对口罩佩戴情况进行实时监督是非常必要的。随着对深度学习网络模型研究的不断深入,在基于深度学习的网络模型的掩模实时检测中,很难在所有性能上达到精确和实时性的满意效果。为了提高检测精度等问题,在YOLOv5目标检测算法的基础上,我们首先利用从互联网上下载的开源数据集,加入各类人脸数据集,创建了一个用于人脸识别的数据集MaskData。其次,在检测网络中,设计DIOU_nms方法替代NMS中的IOU方法,在相同参数下,提高了对遮挡和重叠目标的检测精度。最后,将GIOU损失函数替换为a-CIoU损失函数,可以更快、更准确地获得高质量的局部图像区域,生成边界框并预测类别。实验结果表明,改进后的网络可以更准确地识别人脸是否戴口罩,在一定程度上大大提高了检测精度。通过设计的GUI界面,可以直接调用经过训练和改进的YOLOv5模型,对视频和图片进行实时戴面具检测。
{"title":"Mask Recognition Based on Improved YOLOv5 Target Detection Algorithm","authors":"He Wang, Haijun Li","doi":"10.1109/CCPQT56151.2022.00069","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00069","url":null,"abstract":"Since the outbreak of the new crown epidemic, in order to curb the spread of the epidemic, the World Health Organization and others have carried out a series of work studies. At present, wearing a mask correctly when traveling in any public place is one of the effective means of protection. However, for example, in places with high traffic such as high-speed railway stations and airports, the efficiency of manual detection and supervision of mask wearing is low. Therefore, it is very necessary to use the automatic detection mask device to supervise the wearing of masks in real time. With the deepening of research on deep learning network models, in the real-time detection of masks Deep Learning-based network models, it is difficult to achieve satisfactory results in terms of precise and real-time in all performance. In order to improve the detection accuracy and other issues, based on the YOLOv5 object detecting algorithm, we first created a dataset MaskData for mask recognition by using the open source dataset downloaded from the Internet and adding various types of face mask datasets. Secondly, in the detection network, the DIOU_nms method is designed to be a replacement for the IOU in the NMS, and under the same parameters, the detection accuracy of occluded and overlapping targets is improved. Finally, replacing the GIOU loss function with the a-CIoU loss function can obtain higher-quality localized image regions faster and more accurately, generate bounding boxes and predict categories. The results of the experiment have demonstrated that the refined network can more accurately identify whether the face is wearing a mask, and to some extent, the detection accuracy was greatly improved. And using the designed GUI interface, the trained and improved YOLOv5 model can be directly called to perform real-time mask-wearing detection for videos and pictures.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133171486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Hybrid Two-stage Scheduling Algorithm for Slide-Stainer 一种混合两阶段调度算法
Debin Yang, Bingxian Liu, Kehui Wang, Xingshang Wang, Kewei Chen, F. Dong
In order to shorten the staining process of pathological slides and provide reference for the optimized design of Slide-Stainer. A scheduling algorithm for Slide-Stainer is proposed, which can optimize staining process of slides perform various staining method. First, the scheduling problem of Slide-Stainer is described, constants and variables used in this paper are defined. Second, a mathematical model containing four formula sets was constructed to constrain variables. Third, a hybrid two-stage scheduling algorithm was constructed to get the feasible solution to the problem. The solution contains the execution sequence of pathological slides and the workflow of each slide. The algorithm was coded based on Python language, and Queue insertion operation was used in the first stage to obtain the optimal execution sequence of pathological slides. The second stage consists of time-basic program and time-tune program, which calculates the workflow of each slide based on the execution sequence obtained in the first stage and performs calibration. Fourth, the effectiveness of the proposed algorithm is verified by simulation of actual staining method data, and the results obtained meet the requirements. Finally, the shortcomings of the mathematical model and algorithm are summarized, and the future work direction is described.
为缩短病理载玻片的染色过程,为载玻片染色机的优化设计提供参考。提出了一种调度算法,可以优化不同染色方法的载玻片的染色过程。首先,描述了Slide-Stainer调度问题,定义了本文所用的常量和变量。其次,构建了包含4个公式集的数学模型来约束变量。第三,构造了一种混合两阶段调度算法,得到了问题的可行解。该方案包含病理切片的执行顺序和每张切片的工作流程。算法基于Python语言进行编码,第一阶段采用队列插入操作,获得病理切片的最佳执行顺序。第二阶段由时基程序和时调程序组成,根据第一阶段得到的执行顺序计算每张幻灯片的工作流程并进行校准。第四,通过对实际染色方法数据的仿真验证了所提算法的有效性,得到的结果满足要求。最后总结了数学模型和算法存在的不足,并对今后的工作方向进行了描述。
{"title":"A Hybrid Two-stage Scheduling Algorithm for Slide-Stainer","authors":"Debin Yang, Bingxian Liu, Kehui Wang, Xingshang Wang, Kewei Chen, F. Dong","doi":"10.1109/CCPQT56151.2022.00057","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00057","url":null,"abstract":"In order to shorten the staining process of pathological slides and provide reference for the optimized design of Slide-Stainer. A scheduling algorithm for Slide-Stainer is proposed, which can optimize staining process of slides perform various staining method. First, the scheduling problem of Slide-Stainer is described, constants and variables used in this paper are defined. Second, a mathematical model containing four formula sets was constructed to constrain variables. Third, a hybrid two-stage scheduling algorithm was constructed to get the feasible solution to the problem. The solution contains the execution sequence of pathological slides and the workflow of each slide. The algorithm was coded based on Python language, and Queue insertion operation was used in the first stage to obtain the optimal execution sequence of pathological slides. The second stage consists of time-basic program and time-tune program, which calculates the workflow of each slide based on the execution sequence obtained in the first stage and performs calibration. Fourth, the effectiveness of the proposed algorithm is verified by simulation of actual staining method data, and the results obtained meet the requirements. Finally, the shortcomings of the mathematical model and algorithm are summarized, and the future work direction is described.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117288876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MEC Communication Resource Allocation Optimization Algorithm Based on NOMA 基于NOMA的MEC通信资源分配优化算法
Juan Fang, Zhenzhen Liu, Shuopeng Li, Siqi Chen, Huijing Yang
To solve the problem of communication delay and resource shortage when multiple users offload tasks at the same time in mobile edge computing (MEC), the deep reinforcement learning algorithm based on non-orthogonal multiple access (NOMA) technology was proposed to optimize users' communication resource allocation. Firstly, the taboo tag deep Q-network algorithm was used to train the relationship between users and subchannels at the users grouping stage, then the deep deterministic policy gradient algorithm was used to allocate users transmission power who sharing subchannel. The simulation results display that the proposed algorithm perform more stable than other reinforcement learning and traditional algorithm, moreover, the system sum rate have been significantly improved when multiple edge users offload tasks.
针对移动边缘计算(MEC)中多个用户同时卸载任务时的通信延迟和资源短缺问题,提出了基于非正交多址(NOMA)技术的深度强化学习算法,优化用户的通信资源分配。首先,在用户分组阶段采用禁忌标签深度Q-network算法训练用户与子信道之间的关系,然后采用深度确定性策略梯度算法分配共享子信道的用户传输功率。仿真结果表明,该算法比其他强化学习算法和传统算法性能更稳定,且在多边缘用户卸载任务时,系统和速率显著提高。
{"title":"MEC Communication Resource Allocation Optimization Algorithm Based on NOMA","authors":"Juan Fang, Zhenzhen Liu, Shuopeng Li, Siqi Chen, Huijing Yang","doi":"10.1109/CCPQT56151.2022.00046","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00046","url":null,"abstract":"To solve the problem of communication delay and resource shortage when multiple users offload tasks at the same time in mobile edge computing (MEC), the deep reinforcement learning algorithm based on non-orthogonal multiple access (NOMA) technology was proposed to optimize users' communication resource allocation. Firstly, the taboo tag deep Q-network algorithm was used to train the relationship between users and subchannels at the users grouping stage, then the deep deterministic policy gradient algorithm was used to allocate users transmission power who sharing subchannel. The simulation results display that the proposed algorithm perform more stable than other reinforcement learning and traditional algorithm, moreover, the system sum rate have been significantly improved when multiple edge users offload tasks.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125629798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
3D Flow Visualization via Background Oriented Schlieren Tomography 基于背景定向纹影断层成像的三维流场可视化
Zhihao Li, Xinying Chen, Biao Zhang, Jiatao Meng, Yang Shen, Hang Su, Chuanlong Xu
Background oriented schlieren tomography (BOST) is an effective reconstruction technique of unsteady 3D refractive index field. In this paper, the equivalent optical system model of lens is used to replace the pinhole model and simulate the imaging process of background oriented schlieren accurately. Based on the optical flow equation reconstruction model, the reconstruction process of turbulent flame are simulated. The effects of different reconstruction methods on the reconstruction results are discussed. Finally, the feasibility of the reconstruction method is verified by experiments.
背景取向纹影层析成像(BOST)是一种有效的非定常三维折射率场重建技术。本文采用透镜等效光学系统模型代替针孔模型,准确模拟了背景取向纹影的成像过程。基于光流方程重建模型,模拟了湍流火焰的重建过程。讨论了不同重建方法对重建结果的影响。最后,通过实验验证了重构方法的可行性。
{"title":"3D Flow Visualization via Background Oriented Schlieren Tomography","authors":"Zhihao Li, Xinying Chen, Biao Zhang, Jiatao Meng, Yang Shen, Hang Su, Chuanlong Xu","doi":"10.1109/CCPQT56151.2022.00020","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00020","url":null,"abstract":"Background oriented schlieren tomography (BOST) is an effective reconstruction technique of unsteady 3D refractive index field. In this paper, the equivalent optical system model of lens is used to replace the pinhole model and simulate the imaging process of background oriented schlieren accurately. Based on the optical flow equation reconstruction model, the reconstruction process of turbulent flame are simulated. The effects of different reconstruction methods on the reconstruction results are discussed. Finally, the feasibility of the reconstruction method is verified by experiments.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126073598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Poisoning Attack against Online Regression Learning with Maximum Loss for Edge Intelligence 边缘智能最大损失在线回归学习的中毒攻击
Yanxu Zhu, Hong Wen, Peng Zhang, Wen Han, Fan Sun, Jia Jia
Recent trends in the convergence of edge computing and artificial intelligence (AI) have led to a new paradigm of “edge intelligence”, which are more vulnerable to attack such as data and model poisoning and evasion of attacks. This paper proposes a white-box poisoning attack against online regression model for edge intelligence environment, which aim to prepare the protection methods in the future. Firstly, the new method selects data points from original stream with maximum loss by two selection strategies; Secondly, it pollutes these points with gradient ascent strategy. At last, it injects polluted points into original stream being sent to target model to complete the attack process. We extensively evaluate our proposed attack on open dataset, the results of which demonstrate the effectiveness of the novel attack method and the real implications of poisoning attack in a case study electric energy prediction application.
最近边缘计算与人工智能(AI)的融合趋势导致了一种新的“边缘智能”范式,这种智能更容易受到数据和模型中毒以及逃避攻击等攻击。针对边缘智能环境,提出了一种针对在线回归模型的白盒投毒攻击,为未来的防护方法做准备。首先,采用两种选择策略从原始流中选择损失最大的数据点;其次,梯度上升策略污染了这些点。最后,在原始流中注入被污染的点,发送给目标模型,完成攻击过程。我们广泛评估了我们在开放数据集上提出的攻击,结果证明了新攻击方法的有效性以及中毒攻击在电力预测应用案例研究中的实际意义。
{"title":"Poisoning Attack against Online Regression Learning with Maximum Loss for Edge Intelligence","authors":"Yanxu Zhu, Hong Wen, Peng Zhang, Wen Han, Fan Sun, Jia Jia","doi":"10.1109/CCPQT56151.2022.00037","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00037","url":null,"abstract":"Recent trends in the convergence of edge computing and artificial intelligence (AI) have led to a new paradigm of “edge intelligence”, which are more vulnerable to attack such as data and model poisoning and evasion of attacks. This paper proposes a white-box poisoning attack against online regression model for edge intelligence environment, which aim to prepare the protection methods in the future. Firstly, the new method selects data points from original stream with maximum loss by two selection strategies; Secondly, it pollutes these points with gradient ascent strategy. At last, it injects polluted points into original stream being sent to target model to complete the attack process. We extensively evaluate our proposed attack on open dataset, the results of which demonstrate the effectiveness of the novel attack method and the real implications of poisoning attack in a case study electric energy prediction application.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126545512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Improvement of Time Synchronization Protocol in Telemetry Network System (TmNS) 遥测网络系统(TmNS)时间同步协议改进研究
Changquan Qiu, Yanrong Yuan, Jinghua Sun, Zhichao Xue, Jinghui Lan
The standard Telemetry Network System(TmNS) has been officially incorporated into the IRIG 106–17 standard developed by the Range Instrument Group IRIG, a subsidiary of the RCC, in 2017 and has been gradually improved. TmNS brings new capabilities to the traditional telemetry system and represents the development direction of the next generation telemetry system. Time synchronization is the key technology of TmNS, which is the basis of wireless network connection between multiple test objects and multiple ground stations. In order to adapt to the situation of high packet loss rate of wireless link and high requirement of time synchronization accuracy, an improved time synchronization protocol algorithm is proposed and evaluated by simulation.
遥测网络系统(TmNS)标准已于2017年正式纳入RCC下属的Range Instrument Group IRIG制定的IRIG 106-17标准,并逐步完善。TmNS为传统遥测系统带来了新的功能,代表了下一代遥测系统的发展方向。时间同步是TmNS的关键技术,是实现多个测试对象与多个地面站之间无线网络连接的基础。为了适应无线链路丢包率高、对时间同步精度要求高的情况,提出了一种改进的时间同步协议算法,并进行了仿真评估。
{"title":"Research on Improvement of Time Synchronization Protocol in Telemetry Network System (TmNS)","authors":"Changquan Qiu, Yanrong Yuan, Jinghua Sun, Zhichao Xue, Jinghui Lan","doi":"10.1109/CCPQT56151.2022.00023","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00023","url":null,"abstract":"The standard Telemetry Network System(TmNS) has been officially incorporated into the IRIG 106–17 standard developed by the Range Instrument Group IRIG, a subsidiary of the RCC, in 2017 and has been gradually improved. TmNS brings new capabilities to the traditional telemetry system and represents the development direction of the next generation telemetry system. Time synchronization is the key technology of TmNS, which is the basis of wireless network connection between multiple test objects and multiple ground stations. In order to adapt to the situation of high packet loss rate of wireless link and high requirement of time synchronization accuracy, an improved time synchronization protocol algorithm is proposed and evaluated by simulation.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128307241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Microgrid Scheduling Optimization under False Data Injection Attack 虚假数据注入攻击下的微电网调度优化
Wen Han, Hong Wen, Peiyao Wang, Yanxu Zhu
False data injection attacks (FDIAs) pose a great threat to the data security of microgrid. The day-ahead scheduling strategy of microgrid is in turn mainly based on microgrid operation data. Under FDIAs, it is important for the efficiency and economic cost of microgrid scheduling to properly repair the attacked data and optimize the scheduling using predictive data from deep learning. In this work, we model the economic cost of microgrid scheduling, use deep learning prediction algorithm to predict data based on historical values of microgrid operation, and repair the attacked data by the predicted data, and combine the optimization algorithm to optimize microgrid day-ahead power scheduling to make scheduling more economical and efficient. By this way, the malicious action was corrected and system recover as normal performance to avoid the economical lost that FDIAs aimed to attrite.
虚假数据注入攻击(FDIAs)对微电网的数据安全构成了巨大威胁。而微网日前调度策略主要基于微网运行数据。在fdi下,利用深度学习的预测数据对受攻击数据进行适当修复和优化调度,对于微网调度的效率和经济成本至关重要。本文对微网调度的经济成本进行建模,利用深度学习预测算法基于微网运行历史值对数据进行预测,并利用预测数据修复被攻击的数据,结合优化算法对微网日前电力调度进行优化,使调度更加经济高效。通过这种方式,恶意行为被纠正,系统恢复正常性能,避免了fdi旨在消耗的经济损失。
{"title":"Microgrid Scheduling Optimization under False Data Injection Attack","authors":"Wen Han, Hong Wen, Peiyao Wang, Yanxu Zhu","doi":"10.1109/CCPQT56151.2022.00033","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00033","url":null,"abstract":"False data injection attacks (FDIAs) pose a great threat to the data security of microgrid. The day-ahead scheduling strategy of microgrid is in turn mainly based on microgrid operation data. Under FDIAs, it is important for the efficiency and economic cost of microgrid scheduling to properly repair the attacked data and optimize the scheduling using predictive data from deep learning. In this work, we model the economic cost of microgrid scheduling, use deep learning prediction algorithm to predict data based on historical values of microgrid operation, and repair the attacked data by the predicted data, and combine the optimization algorithm to optimize microgrid day-ahead power scheduling to make scheduling more economical and efficient. By this way, the malicious action was corrected and system recover as normal performance to avoid the economical lost that FDIAs aimed to attrite.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133955847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Management Specification for Big Data Sharing in Smart Mine 智能矿山大数据共享管理规范
Haitao Wang, Lina Tan, Yang Zhang, Qiwen Gong, Shan Zhang, Yanan Ren, Tao He
With the rapid advancement of the informatization process of the coal industry, applications based on the Internet of Things and intelligent processing technologies for smart mines have sprung up. The sharing and aggregation of various colliery automation system data is the core foundation for the realization of intelligent mine applications. The resolution of integrity and real-time issues in data sharing determines the availability of upper-level intelligent applications. This paper proposes a set of smart mine specifications. It regulates coal mine data sharing behavior from three perspectives: data collection, data transmission, and data storage. The data source specification specifies the protocol for data collection and transmission. The evaluation indicators and governance methods are described in the data quality specification. It sets data reliability sharing standards based on the characteristics of each business system. The labels defined in the data storage specification model realize the efficient management of data indexing which can be used by professional and non-professional users in the coal industry. We constructed an experimental system based on real measured data from a certain colliery. The system can collect, manage and store the data from various automation systems following the specifications.
随着煤炭行业信息化进程的快速推进,基于物联网的智能矿山应用和智能处理技术如雨后春笋般涌现。煤矿自动化系统各种数据的共享与聚合是实现智能矿山应用的核心基础。数据共享中完整性和实时性问题的解决决定了上层智能应用的可用性。本文提出了一套智能矿山规范。它从数据采集、数据传输和数据存储三个方面规范煤矿数据共享行为。数据源规范指定用于数据收集和传输的协议。在数据质量规范中描述了评估指标和治理方法。它根据各个业务系统的特点,制定数据可靠性共享标准。数据存储规范模型中定义的标签实现了数据标引的高效管理,可供煤炭行业的专业和非专业用户使用。以某煤矿的实测数据为基础,构建了实验系统。该系统可以按照规范收集、管理和存储来自各种自动化系统的数据。
{"title":"A Management Specification for Big Data Sharing in Smart Mine","authors":"Haitao Wang, Lina Tan, Yang Zhang, Qiwen Gong, Shan Zhang, Yanan Ren, Tao He","doi":"10.1109/CCPQT56151.2022.00060","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00060","url":null,"abstract":"With the rapid advancement of the informatization process of the coal industry, applications based on the Internet of Things and intelligent processing technologies for smart mines have sprung up. The sharing and aggregation of various colliery automation system data is the core foundation for the realization of intelligent mine applications. The resolution of integrity and real-time issues in data sharing determines the availability of upper-level intelligent applications. This paper proposes a set of smart mine specifications. It regulates coal mine data sharing behavior from three perspectives: data collection, data transmission, and data storage. The data source specification specifies the protocol for data collection and transmission. The evaluation indicators and governance methods are described in the data quality specification. It sets data reliability sharing standards based on the characteristics of each business system. The labels defined in the data storage specification model realize the efficient management of data indexing which can be used by professional and non-professional users in the coal industry. We constructed an experimental system based on real measured data from a certain colliery. The system can collect, manage and store the data from various automation systems following the specifications.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128564025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on Detection Technology of Bio-electronic Nose Based on SAW Devices 基于SAW器件的生物电子鼻检测技术研究
Yuxia Yang, C. Meng, Chunsheng Zhang, Tu Ya
Odor detection plays an irreplaceable role in food safety, environmental monitoring, medical treatment and disease diagnosis. The traditional artificial electronic nose can be used to some extent, but its performance is far inferior to the biological olfactory field in many aspects, for instance, detection range, response rate, specificity, etc. Three kinds of waves propagate on surface acoustic wave (SAW) device. They are longitudinal wave, Rayleigh waves and leaky Rayleigh wave. We also pay attention the SAW in a SAW device in with ethanol, Cp-Lip1 odorant binding protein and 5 odorant molecules are used as liquid media. Then, we compare between the theoretical and experimental velocities to verify the effectiveness of the SAW device. The results of surface acoustic wave propagation velocity of odorant binding proteins and odorant molecules show that some odorant molecules can be recognized by surface acoustic wave devices using odorant binding proteins.
气味检测在食品安全、环境监测、医疗、疾病诊断等方面发挥着不可替代的作用。传统的人工电子鼻在一定程度上是可以使用的,但在检测范围、反应速度、特异性等方面,其性能远不如生物嗅觉领域。三种波在表面声波(SAW)装置上传播。它们是纵波、瑞雷波和漏瑞雷波。以乙醇、Cp-Lip1气味结合蛋白和5种气味分子为液体介质,对声呐装置中的声呐进行了研究。然后,我们将理论速度和实验速度进行了比较,以验证声表面波器件的有效性。气味结合蛋白和气味分子的表面声波传播速度结果表明,利用气味结合蛋白的表面声波装置可以识别某些气味分子。
{"title":"Research on Detection Technology of Bio-electronic Nose Based on SAW Devices","authors":"Yuxia Yang, C. Meng, Chunsheng Zhang, Tu Ya","doi":"10.1109/CCPQT56151.2022.00063","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00063","url":null,"abstract":"Odor detection plays an irreplaceable role in food safety, environmental monitoring, medical treatment and disease diagnosis. The traditional artificial electronic nose can be used to some extent, but its performance is far inferior to the biological olfactory field in many aspects, for instance, detection range, response rate, specificity, etc. Three kinds of waves propagate on surface acoustic wave (SAW) device. They are longitudinal wave, Rayleigh waves and leaky Rayleigh wave. We also pay attention the SAW in a SAW device in with ethanol, Cp-Lip1 odorant binding protein and 5 odorant molecules are used as liquid media. Then, we compare between the theoretical and experimental velocities to verify the effectiveness of the SAW device. The results of surface acoustic wave propagation velocity of odorant binding proteins and odorant molecules show that some odorant molecules can be recognized by surface acoustic wave devices using odorant binding proteins.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132836092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1