Pub Date : 2022-08-01DOI: 10.1109/CCPQT56151.2022.00077
Wan-ming Liu
In the total reflection prism laser gyro, the frequency stabilization accuracy of the ring laser directly affects the working accuracy of the gyro. Based on the control system theory, the transfer function of the prismatic laser gyro frequency stabilization control system is established. The equivalent mathematical model of the ring laser in the frequency stabilization control system is established by the method of experimental test. Through theoretical analysis and MATLAB simulation, the performance of the frequency stabilization control system of the laser gyro can be accurately evaluated, which provides a theoretical basis for the system design and improves the performance of the frequency stabilization control system. improved the gyro performance and debugging efficiency.
{"title":"Simulation and Research of Laser Frequency Stabilization Control System Based on Matlab","authors":"Wan-ming Liu","doi":"10.1109/CCPQT56151.2022.00077","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00077","url":null,"abstract":"In the total reflection prism laser gyro, the frequency stabilization accuracy of the ring laser directly affects the working accuracy of the gyro. Based on the control system theory, the transfer function of the prismatic laser gyro frequency stabilization control system is established. The equivalent mathematical model of the ring laser in the frequency stabilization control system is established by the method of experimental test. Through theoretical analysis and MATLAB simulation, the performance of the frequency stabilization control system of the laser gyro can be accurately evaluated, which provides a theoretical basis for the system design and improves the performance of the frequency stabilization control system. improved the gyro performance and debugging efficiency.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128186250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-01DOI: 10.1109/CCPQT56151.2022.00055
Hanlin Yang, Tianyu Chen, Hang Zhang, Wei Wang
As the complexity and concealment of network attacks are increasing day by day, construction of a comprehensive and effective defense system calls for modeling and formal description of the scenes, techniques and processes of network attacks. Integrating MITRE ATT&CK and MAL (Meta Attack Language) can be a good orientation for current research on network attack description method. This paper proposes a formal description method for network attacks, in which the assets in an information system and the attackers' techniques summarized in the ATT&CK Matrix serve as the vocabulary and an extended MAL serves as the syntax. First, this method differentiates various instances of the same asset category and involves formal description of the attack scene, including the hosts, network environment and their configurations. Second, this method uses a more reasonable classification system for the assets of an information system and a more simplified set of MAL symbols. As is verified by our experiment, this method can generate a comprehensive and clear formal description for the attack scene, attack techniques and attack process of a network attack on a real-world information system, which brings the description level of this kind of integrated method from attacker strategies to network nodes, and can be a guide to defense construction for a real-world information system.
{"title":"An Integrated Formal Description Method for Network Attacks","authors":"Hanlin Yang, Tianyu Chen, Hang Zhang, Wei Wang","doi":"10.1109/CCPQT56151.2022.00055","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00055","url":null,"abstract":"As the complexity and concealment of network attacks are increasing day by day, construction of a comprehensive and effective defense system calls for modeling and formal description of the scenes, techniques and processes of network attacks. Integrating MITRE ATT&CK and MAL (Meta Attack Language) can be a good orientation for current research on network attack description method. This paper proposes a formal description method for network attacks, in which the assets in an information system and the attackers' techniques summarized in the ATT&CK Matrix serve as the vocabulary and an extended MAL serves as the syntax. First, this method differentiates various instances of the same asset category and involves formal description of the attack scene, including the hosts, network environment and their configurations. Second, this method uses a more reasonable classification system for the assets of an information system and a more simplified set of MAL symbols. As is verified by our experiment, this method can generate a comprehensive and clear formal description for the attack scene, attack techniques and attack process of a network attack on a real-world information system, which brings the description level of this kind of integrated method from attacker strategies to network nodes, and can be a guide to defense construction for a real-world information system.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114474161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-01DOI: 10.1109/CCPQT56151.2022.00028
Bowen Cheng, Shuai Jiang, Yalong Pang, Shenshen Luan, Jing Lu
Aiming at the poor robustness of the moving objects detection and tracking algorithm in the dynamic scenes, a new moving objects tracking algorithm in the dynamic scenes is proposed, which combines the optical flow method and Kalman predictor, can solve the occlusion problem in target tracking. The optical flow method solves the detection of the moving objects problem, and the Kalman predictor is used to complete the moving target prediction and association. The experimental results show that, the proposed algorithm can work well in the stationary scenes and the dynamic scenes, and the accuracy of detection of moving objects in dynamic scenes is more effective than the optical flow method only.
{"title":"Research on the Detection and Tracking of Moving Objects in Dynamic Scenes","authors":"Bowen Cheng, Shuai Jiang, Yalong Pang, Shenshen Luan, Jing Lu","doi":"10.1109/CCPQT56151.2022.00028","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00028","url":null,"abstract":"Aiming at the poor robustness of the moving objects detection and tracking algorithm in the dynamic scenes, a new moving objects tracking algorithm in the dynamic scenes is proposed, which combines the optical flow method and Kalman predictor, can solve the occlusion problem in target tracking. The optical flow method solves the detection of the moving objects problem, and the Kalman predictor is used to complete the moving target prediction and association. The experimental results show that, the proposed algorithm can work well in the stationary scenes and the dynamic scenes, and the accuracy of detection of moving objects in dynamic scenes is more effective than the optical flow method only.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129232987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the deployment of large-scale intelligent terminals in 5G Smart Grid, more communication and computing resources will be sunk to the network edge to meet the ultra-reliable and low-latency requirements of communication networks. However, for the inevitable co-channel interference between adjacent cells, traditional solutions may lead to lower spectrum efficiency or poor signal quality of edge-users. In our work, intelligent reflecting surface (IRS) is used to solve the problem of co-channel interference caused by frequency reuse and improve the transmission capacity of the system. In addition, for the secure transmission issues of massive amount of information in Smart Grid, a low-cost and low-complexity physical layer security transmission scheme is proposed in our work to realize secure transmission. Our work aims at maximizing the system sum-rate by optimizing the transmit beamforming vector at the macro base station (MBS) and multiple micro base stations (mBSs), and the reflection beamforming vector at the IRS with the guarantee of secure communications. Subsequently, the optimization problem is transformed into a convex form, and a non-alternating optimization algorithm based on variable decoupling is designed to obtain high-quality suboptimal solutions. The simulation results show the effectiveness and advantages of the proposed scheme.
{"title":"Physical Layer Security of IRS-Assisted Multi-Layer Heterogeneous Networks in Smart Grid","authors":"Yuchen Guo, Geng Liu, J. Ren, Ying Liu, Liang Yao, Yu Cao, Jian Chen, Yuchen Zhou","doi":"10.1109/CCPQT56151.2022.00029","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00029","url":null,"abstract":"With the deployment of large-scale intelligent terminals in 5G Smart Grid, more communication and computing resources will be sunk to the network edge to meet the ultra-reliable and low-latency requirements of communication networks. However, for the inevitable co-channel interference between adjacent cells, traditional solutions may lead to lower spectrum efficiency or poor signal quality of edge-users. In our work, intelligent reflecting surface (IRS) is used to solve the problem of co-channel interference caused by frequency reuse and improve the transmission capacity of the system. In addition, for the secure transmission issues of massive amount of information in Smart Grid, a low-cost and low-complexity physical layer security transmission scheme is proposed in our work to realize secure transmission. Our work aims at maximizing the system sum-rate by optimizing the transmit beamforming vector at the macro base station (MBS) and multiple micro base stations (mBSs), and the reflection beamforming vector at the IRS with the guarantee of secure communications. Subsequently, the optimization problem is transformed into a convex form, and a non-alternating optimization algorithm based on variable decoupling is designed to obtain high-quality suboptimal solutions. The simulation results show the effectiveness and advantages of the proposed scheme.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127667491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-01DOI: 10.1109/CCPQT56151.2022.00015
Jinyan Xu, Tingxu Lyu
The performance improvement for real-time segmentation networks is generally to accelerate the segmentation speed of the model at the cost of computational cost, ignoring the problem of semantic inconsistency of neighborhood features, which causes the accuracy of segmented images to decrease. Therefore, it is crucial to take into account the segmentation efficiency while ensuring the accuracy of model segmentation. In this paper, a lightweight model based on Multi-level Feature Fusion Semantic Segmentation Network (MLFFNet) is proposed, and the network as a whole adopts a two-branch structure to differentiate different types of features. The model obtained 81.4 FPS forward inference speed and 71.3% segmentation accuracy on the Cityscapes dataset, which is capable of real-time semantic segmentation tasks and proposes a new idea for the semantic segmentation problem in a complex context.
{"title":"A Real-time Semantic Segmentation Method Based on Multi-level Feature Fusion","authors":"Jinyan Xu, Tingxu Lyu","doi":"10.1109/CCPQT56151.2022.00015","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00015","url":null,"abstract":"The performance improvement for real-time segmentation networks is generally to accelerate the segmentation speed of the model at the cost of computational cost, ignoring the problem of semantic inconsistency of neighborhood features, which causes the accuracy of segmented images to decrease. Therefore, it is crucial to take into account the segmentation efficiency while ensuring the accuracy of model segmentation. In this paper, a lightweight model based on Multi-level Feature Fusion Semantic Segmentation Network (MLFFNet) is proposed, and the network as a whole adopts a two-branch structure to differentiate different types of features. The model obtained 81.4 FPS forward inference speed and 71.3% segmentation accuracy on the Cityscapes dataset, which is capable of real-time semantic segmentation tasks and proposes a new idea for the semantic segmentation problem in a complex context.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133102817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-01DOI: 10.1109/CCPQT56151.2022.00050
Ruijie Ou, Daniel Ayepah-Mensah, Guisong Liu
Network slicing divides wireless networks into multiple logical networks to support different applications with different performance requirements. In recent times, centralized slice controllers based on Deep Learning have been utilized to gain insight from base stations to facilitate the dynamic network slicing process. However, centralized controllers suffer from high data communication overhead due to a large amount of user data, and most network slices are unwilling to share private network dataAs a means of achieving scalable and privacy for network slices, we propose a multi-access edge-based federated learning approach for network slicing through which distributed base stations can dynamically allocate resources across multiple slices without having to share any personal or network data with a central orchestrator. The experimental results show that the proposed dynamic network slicing algorithm can dynamically allocate resources for multiple slices and satisfy the corresponding quality of service requirements.
{"title":"MEC-enabled Federated Learning for Network Slicing","authors":"Ruijie Ou, Daniel Ayepah-Mensah, Guisong Liu","doi":"10.1109/CCPQT56151.2022.00050","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00050","url":null,"abstract":"Network slicing divides wireless networks into multiple logical networks to support different applications with different performance requirements. In recent times, centralized slice controllers based on Deep Learning have been utilized to gain insight from base stations to facilitate the dynamic network slicing process. However, centralized controllers suffer from high data communication overhead due to a large amount of user data, and most network slices are unwilling to share private network dataAs a means of achieving scalable and privacy for network slices, we propose a multi-access edge-based federated learning approach for network slicing through which distributed base stations can dynamically allocate resources across multiple slices without having to share any personal or network data with a central orchestrator. The experimental results show that the proposed dynamic network slicing algorithm can dynamically allocate resources for multiple slices and satisfy the corresponding quality of service requirements.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134619432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-01DOI: 10.1109/CCPQT56151.2022.00007
Jie Tang, H. Wen, Zeguang Li, Ruifei Wang
Recently, there is a growing interest in employing reconfigurable intelligent surface (RIS) to assist physical layer key generation in wireless networks. However, current works only studied the RIS-aided key generation schemes in SISO (single-input-single-output) communications, which have relatively low key generation rate (KGR). Therefore, here, in order to fill this gap, we propose the new and really novel RIS-aided MIMO (multiple-input-multiple-output) key generation scheme. By fully exploring the reflection signals from the RIS to the legitimate communication partners as the introduced, controllable and artificial randomness, combined with the spatial degree-of-freedom of RIS and MIMO incident and reflected signals, the KGR performance can be significantly improved. The information theoretical security is fully investigated, and the upper bound value of KGR is derived to comprehensively evaluate the system performance. The simulations fully validate the effectiveness and robustness of the proposed new and really novel, and interesting scheme.
{"title":"Reconfigurable Intelligent Surface Speeds up MIMO Secret Key Generation","authors":"Jie Tang, H. Wen, Zeguang Li, Ruifei Wang","doi":"10.1109/CCPQT56151.2022.00007","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00007","url":null,"abstract":"Recently, there is a growing interest in employing reconfigurable intelligent surface (RIS) to assist physical layer key generation in wireless networks. However, current works only studied the RIS-aided key generation schemes in SISO (single-input-single-output) communications, which have relatively low key generation rate (KGR). Therefore, here, in order to fill this gap, we propose the new and really novel RIS-aided MIMO (multiple-input-multiple-output) key generation scheme. By fully exploring the reflection signals from the RIS to the legitimate communication partners as the introduced, controllable and artificial randomness, combined with the spatial degree-of-freedom of RIS and MIMO incident and reflected signals, the KGR performance can be significantly improved. The information theoretical security is fully investigated, and the upper bound value of KGR is derived to comprehensively evaluate the system performance. The simulations fully validate the effectiveness and robustness of the proposed new and really novel, and interesting scheme.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131998404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The traditional nursing process usually consists of five steps: nursing assessment, nursing diagnosis, nursing planning, nursing implementation and nursing evaluation. With an ageing population[1], the transfer of bedridden patients during care delivery has become a major issue in-
{"title":"Visualization of Human Lying Angle Based on Deep Convolutional Neural Network","authors":"Mingwei Zhong, Xingshang Wang, Fangyan Dong, Kewei Chen, Yongfei Feng","doi":"10.1109/CCPQT56151.2022.00022","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00022","url":null,"abstract":"The traditional nursing process usually consists of five steps: nursing assessment, nursing diagnosis, nursing planning, nursing implementation and nursing evaluation. With an ageing population[1], the transfer of bedridden patients during care delivery has become a major issue in-","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126622482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-01DOI: 10.1109/CCPQT56151.2022.00047
Yaoping Zeng, Dong Liu
With the network changes brought by 5G, Mobile Edge Computing (MEC) has been deeply concerned as a prospective computing pattern. In MEC network, offloading the tasks to edge servers can address the problems of 5G mobile users' delay sensitivity and insufficient energy. To further decrease the delay and energy consumption, the offloaded task data can be reduced by compressing part of the task data before computing offloading. This paper investigates the problem of collectively optimizing computation offloading, data compression, and resource distribution aiming at minimizing the total system cost with limited MEC computational capacity. To solve the problem, an improved sparrow search algorithm (ISSA) is developed, which integrates circle chaotic mapping strategy, dynamic step factor strategy and Levy flight strategy, and lots of experiments verified the excellent performance of ISSA-based offloading scheme. Experimental results show the developed offloading scheme outperforms the sparrow search algorithm (SSA) based offloading scheme and particle swarm optimization (PSO) based offloading scheme in reducing the total system cost.
{"title":"Computation Offloading Based on Improved Sparrow Search Algorithm in Edge Computing Scenario","authors":"Yaoping Zeng, Dong Liu","doi":"10.1109/CCPQT56151.2022.00047","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00047","url":null,"abstract":"With the network changes brought by 5G, Mobile Edge Computing (MEC) has been deeply concerned as a prospective computing pattern. In MEC network, offloading the tasks to edge servers can address the problems of 5G mobile users' delay sensitivity and insufficient energy. To further decrease the delay and energy consumption, the offloaded task data can be reduced by compressing part of the task data before computing offloading. This paper investigates the problem of collectively optimizing computation offloading, data compression, and resource distribution aiming at minimizing the total system cost with limited MEC computational capacity. To solve the problem, an improved sparrow search algorithm (ISSA) is developed, which integrates circle chaotic mapping strategy, dynamic step factor strategy and Levy flight strategy, and lots of experiments verified the excellent performance of ISSA-based offloading scheme. Experimental results show the developed offloading scheme outperforms the sparrow search algorithm (SSA) based offloading scheme and particle swarm optimization (PSO) based offloading scheme in reducing the total system cost.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124812203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ceramic is widely used in solar collectors because of its high absorption to the solar radiation. As the performance of ceramic is mainly decided by its optical properties, this work proposes an inverse model with the combination of the null-collision reverse Monte Carlo method (NC-RMC) and the covariance matrix adaptation evolution strategy (CMA-ES) to obtain the spectral optical properties of ceramic. A multi-angle model is introduced to handle the ill-posedness of the inverse problem. Numerical experiments are operated to investigate the inverse algorithm whose results show that the proposed inverse model is can provide an accurate solution to retrieving the optical properties of ceramic.
{"title":"An Inverse Estimation of the Spectral Properties of Ceramic with the Null-collision Reverse Monte Carlo","authors":"Zeyu Zhu, H. Qi, Baohai Gao, Kefu Li, Juqi Zhang, Zhitian Niu","doi":"10.1109/CCPQT56151.2022.00075","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00075","url":null,"abstract":"Ceramic is widely used in solar collectors because of its high absorption to the solar radiation. As the performance of ceramic is mainly decided by its optical properties, this work proposes an inverse model with the combination of the null-collision reverse Monte Carlo method (NC-RMC) and the covariance matrix adaptation evolution strategy (CMA-ES) to obtain the spectral optical properties of ceramic. A multi-angle model is introduced to handle the ill-posedness of the inverse problem. Numerical experiments are operated to investigate the inverse algorithm whose results show that the proposed inverse model is can provide an accurate solution to retrieving the optical properties of ceramic.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127120104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}