Pub Date : 2022-08-01DOI: 10.1109/CCPQT56151.2022.00074
Xinmiao Chen, Bo Jiang, Yongzheng Wu, Yong-jin Ye
CNN (Convolutional neural network) is an excellent machine learning model, especially in image recognition, where they have excellent results. However, it is difficult to learn effectively if the given dimensionality of the data or model is too large. QCNN QCNN (Quantum Convolutional Neural Network) offer new solutions to the problems faced by CNN using a quantum computing environment and provide directions for improving the performance of existing learning models. However, most of the current QCNN models are only simulation programs running on a classical computer and cannot actually run on a quantum computer. In this paper, we propose a QCNN model with a quantum encoding circuit that can encode classical data into quantum data, allowing the QCNN to run on quantum computers. Firstly, we introduce the method of quantum state amplitude encoding to represent the high-dimensional classical data into the form of quantum states, constructing a bridge between traditional data and quantum state transformation, while significantly reducing the dimensionality of the processed data. Secondly, we construct the QCNN model and analyze how to implement the image recognition function by QCNN network and the optimization method of the model. Finally, we validate the learning effect of the model using MNIST handwritten digits and compare and discuss the learning effect of QCNN with classical models.
{"title":"A QCNN Algorithm Deployed on A Quantum Computer","authors":"Xinmiao Chen, Bo Jiang, Yongzheng Wu, Yong-jin Ye","doi":"10.1109/CCPQT56151.2022.00074","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00074","url":null,"abstract":"CNN (Convolutional neural network) is an excellent machine learning model, especially in image recognition, where they have excellent results. However, it is difficult to learn effectively if the given dimensionality of the data or model is too large. QCNN QCNN (Quantum Convolutional Neural Network) offer new solutions to the problems faced by CNN using a quantum computing environment and provide directions for improving the performance of existing learning models. However, most of the current QCNN models are only simulation programs running on a classical computer and cannot actually run on a quantum computer. In this paper, we propose a QCNN model with a quantum encoding circuit that can encode classical data into quantum data, allowing the QCNN to run on quantum computers. Firstly, we introduce the method of quantum state amplitude encoding to represent the high-dimensional classical data into the form of quantum states, constructing a bridge between traditional data and quantum state transformation, while significantly reducing the dimensionality of the processed data. Secondly, we construct the QCNN model and analyze how to implement the image recognition function by QCNN network and the optimization method of the model. Finally, we validate the learning effect of the model using MNIST handwritten digits and compare and discuss the learning effect of QCNN with classical models.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127095018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-01DOI: 10.1109/CCPQT56151.2022.00035
Fan Sun, Hong Wen, Yanxu Zhu, Xinchen Xu
Due to wireless LAN is closed to our daily life and our terminals, the malicious attack actions are easily to be launched to the open wireless broadcast channel. WAPI (Wireless LAN Authentication and Privacy Infrastructure) is one of influential standards for wireless LAN. To understand and strengthen WAPI protocol, this paper studies the security performance of WAPI protocol, analyzes the defects of WAPI protocol and the possible security threats and losses caused by the defects. A security performance evaluation strategy based on CVSS standard is also proposed, and quantitatively evaluates the security performance of WAPI protocol. According to our quantitative evaluation, it is possible to know which part of the WAPI is the security weak part, and improvement and enhanced measurement should be paid more attention in the future.
由于无线局域网对我们的日常生活和终端是封闭的,恶意攻击行为很容易被发起到开放的无线广播信道上。WAPI (Wireless LAN Authentication and Privacy Infrastructure,无线局域网认证和隐私基础设施)是无线局域网中具有重要影响的标准之一。为了理解和加强WAPI协议,本文研究了WAPI协议的安全性能,分析了WAPI协议的缺陷以及这些缺陷可能造成的安全威胁和损失。提出了一种基于CVSS标准的安全性能评价策略,对WAPI协议的安全性能进行了定量评价。根据我们的定量评价,可以知道WAPI的哪一部分是安全薄弱的部分,未来应该更加重视改进和加强测量。
{"title":"WAPI Protocol Security Performance Evaluation","authors":"Fan Sun, Hong Wen, Yanxu Zhu, Xinchen Xu","doi":"10.1109/CCPQT56151.2022.00035","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00035","url":null,"abstract":"Due to wireless LAN is closed to our daily life and our terminals, the malicious attack actions are easily to be launched to the open wireless broadcast channel. WAPI (Wireless LAN Authentication and Privacy Infrastructure) is one of influential standards for wireless LAN. To understand and strengthen WAPI protocol, this paper studies the security performance of WAPI protocol, analyzes the defects of WAPI protocol and the possible security threats and losses caused by the defects. A security performance evaluation strategy based on CVSS standard is also proposed, and quantitatively evaluates the security performance of WAPI protocol. According to our quantitative evaluation, it is possible to know which part of the WAPI is the security weak part, and improvement and enhanced measurement should be paid more attention in the future.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125907615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-01DOI: 10.1109/CCPQT56151.2022.00014
Fu Li, Jiadong Sun, Yongchao Duan, Peng Cai
The existing mainstream parking lot self-service payment systems are implemented with APPs and mini programs as entrances. Usually, special application software needs to be developed, and servers or cloud servers will be deployed to support the work of the background software system. A certain amount of capital investment may even require equipment room etc., which makes the construction threshold of the parking lot self-service payment system in this way relatively high. This paper expounds a parking lot payment USSD (Unstructured Supplementary Data Service) service and system based on OCS (Online Charging System). The business and system mainly involve the field of communication, especially the USSD business under the OCS architecture in the GSM (Global System of Mobile communication) mobile intelligent network. This service and system use traditional telecommunication network equipment, USSD service system and mobile terminal to provide users with a convenient, fast and less investment parking lot self-service payment service and system. Because the equipment and systems in the existing telecommunication network are used, the investment in software and hardware is relatively low, so it has good economic value.
现有主流的停车场自助支付系统都是以app和小程序为入口实现的。通常需要开发专门的应用软件,部署服务器或云服务器来支持后台软件系统的工作。一定的资金投入甚至可能需要机房等,这使得以这种方式建设停车场自助付费系统的门槛相对较高。阐述了一种基于OCS (Online Charging system)的停车场收费USSD (Unstructured Supplementary Data Service)服务和系统。业务和系统主要涉及通信领域,特别是GSM(全球移动通信系统)移动智能网络中OCS架构下的USSD业务。本服务和系统采用传统的电信网络设备、USSD服务系统和移动终端,为用户提供方便、快捷、投资少的停车场自助支付服务和系统。由于使用的是现有电信网络中的设备和系统,软硬件投资相对较低,具有良好的经济价值。
{"title":"A parking lot payment USSD service and system based on OCS","authors":"Fu Li, Jiadong Sun, Yongchao Duan, Peng Cai","doi":"10.1109/CCPQT56151.2022.00014","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00014","url":null,"abstract":"The existing mainstream parking lot self-service payment systems are implemented with APPs and mini programs as entrances. Usually, special application software needs to be developed, and servers or cloud servers will be deployed to support the work of the background software system. A certain amount of capital investment may even require equipment room etc., which makes the construction threshold of the parking lot self-service payment system in this way relatively high. This paper expounds a parking lot payment USSD (Unstructured Supplementary Data Service) service and system based on OCS (Online Charging System). The business and system mainly involve the field of communication, especially the USSD business under the OCS architecture in the GSM (Global System of Mobile communication) mobile intelligent network. This service and system use traditional telecommunication network equipment, USSD service system and mobile terminal to provide users with a convenient, fast and less investment parking lot self-service payment service and system. Because the equipment and systems in the existing telecommunication network are used, the investment in software and hardware is relatively low, so it has good economic value.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126826300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-01DOI: 10.1109/CCPQT56151.2022.00021
Pengfei Du, Yueqiang Shi, Qi Zeng, Xuejun Zhang
Unmanned aerial vehicles (UAVs) are becoming increasingly prevalent in wireless communications scheme with theirs inherent advantages of convenience, low cost and flexibility. However, due to the maneuverability of UAVs, the decoding sequence changes frequently, which generates the difficulty in accomplishing the method of joint optimization of UAVs track and transmitting energy in non-orthogonal multiple access (NOMA) assisted UAVs wireless communication scheme. Therefore, based on the aggregate energy constraint and maximum speed constraint in UAV flight, we investigate into maximizing the minimum aggregate reachable rate of data signalling of the user by optimizing UAV trace and transmitting power jointly. Faced with this nonconvexity problem, we firstly make it convexification, while making the objective function smooth. Then, we develop a track design and transmission power control algorithm (TDPCA) with low complexity. Next, alternate optimization and continuous convex programming are used to solve the transformation problem. Specifically, we convert this problem into two independent sub-problems: transmission power control problem and UVA trace design problem. Then, one of the subproblems is solved iteratively, while the other subproblems keep fixed until the TDPCA converges. Finally, we present lots of simulation results to verify that the TDPCA can effectively enhance the aggregate reachable data rate compared with the reference algorithms that have fixed track and transmit power.
{"title":"Joint Trajectory Design and Transmit Power Control in NOMA-Aided UAV Communication Systems","authors":"Pengfei Du, Yueqiang Shi, Qi Zeng, Xuejun Zhang","doi":"10.1109/CCPQT56151.2022.00021","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00021","url":null,"abstract":"Unmanned aerial vehicles (UAVs) are becoming increasingly prevalent in wireless communications scheme with theirs inherent advantages of convenience, low cost and flexibility. However, due to the maneuverability of UAVs, the decoding sequence changes frequently, which generates the difficulty in accomplishing the method of joint optimization of UAVs track and transmitting energy in non-orthogonal multiple access (NOMA) assisted UAVs wireless communication scheme. Therefore, based on the aggregate energy constraint and maximum speed constraint in UAV flight, we investigate into maximizing the minimum aggregate reachable rate of data signalling of the user by optimizing UAV trace and transmitting power jointly. Faced with this nonconvexity problem, we firstly make it convexification, while making the objective function smooth. Then, we develop a track design and transmission power control algorithm (TDPCA) with low complexity. Next, alternate optimization and continuous convex programming are used to solve the transformation problem. Specifically, we convert this problem into two independent sub-problems: transmission power control problem and UVA trace design problem. Then, one of the subproblems is solved iteratively, while the other subproblems keep fixed until the TDPCA converges. Finally, we present lots of simulation results to verify that the TDPCA can effectively enhance the aggregate reachable data rate compared with the reference algorithms that have fixed track and transmit power.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128642937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-01DOI: 10.1109/CCPQT56151.2022.00040
L. Wu, Zili Zou, Yanyan Feng, Jian Zhou
We propose a protocol to improve the transmission distance and secure key rate of quantum channels, the NLA-HLA QKD. The untrusted entanglement is sent to users by a quantum channel. It is capable of long transmission distances while maintaining high secure key rates and resisting the higher noise. Using the method of calculating secure key rate with the coherent state, the secure key of the NLA-HLA QKD protocol is derived. The effects of the parameters G and g on the key rate are analyzed through simulation experiments. By regulating the values of G and g, the application range of the protocol can be improved. Optimal parameters are used under specific circumstances to ensure the validity of the protocol.
{"title":"Improving Continuous Variable Quantum Key Distribution Using Heralded Hybrid Linear amplifier and Heralded Noiseless Linear amplifier When source in the Middle","authors":"L. Wu, Zili Zou, Yanyan Feng, Jian Zhou","doi":"10.1109/CCPQT56151.2022.00040","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00040","url":null,"abstract":"We propose a protocol to improve the transmission distance and secure key rate of quantum channels, the NLA-HLA QKD. The untrusted entanglement is sent to users by a quantum channel. It is capable of long transmission distances while maintaining high secure key rates and resisting the higher noise. Using the method of calculating secure key rate with the coherent state, the secure key of the NLA-HLA QKD protocol is derived. The effects of the parameters G and g on the key rate are analyzed through simulation experiments. By regulating the values of G and g, the application range of the protocol can be improved. Optimal parameters are used under specific circumstances to ensure the validity of the protocol.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131497901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-01DOI: 10.1109/CCPQT56151.2022.00045
Xiang Li, Kadhim Hayawi, Yi Chen, Shih Yu Chang, Hong Wen, P. Ho, L. Yang, Qiyuan Yin
Thunderstorm warning plays an important role in lightning prevention and disaster mitigation. In practical applications, thunderstorm warning system is also vulnerable to attacks, such as False Data Injection Attack (FDIA). However, there is a lack of research on False Data Injection Attack for thunderstorm warning. Therefore, this paper put forwards a FDIA method based on principal component analysis (PCA) for atmospheric electric field (AEF), which is usually used for thunderstorm warning. In the FDIA scenario, the AEF-based thunderstorm warning algorithm is also introduced with electric field differential index (EFDI). Finally, experiments are conducted based on AEF data collected by an atmospheric electric field meter (AEFM) about the real thunderstorm. The experimental results show that FDIA seriously interferes with the results of the AEF-based thunderstorm warning.
雷暴预警在防雷减灾中起着重要作用。在实际应用中,雷暴预警系统也容易受到攻击,例如FDIA (False Data Injection Attack)。然而,针对雷暴预警的虚假数据注入攻击研究较少。为此,本文提出了一种基于主成分分析(PCA)的大气电场(AEF) FDIA方法,该方法通常用于雷暴预警。在FDIA场景下,还引入了基于电场差分指数(EFDI)的aef雷暴预警算法。最后,利用大气电场计(AEFM)采集的实际雷暴天气数据进行了实验研究。实验结果表明,FDIA严重干扰了基于aef的雷暴预警结果。
{"title":"False Data Injection Attack on Atmospheric Electric Field in Thunderstorm Warning","authors":"Xiang Li, Kadhim Hayawi, Yi Chen, Shih Yu Chang, Hong Wen, P. Ho, L. Yang, Qiyuan Yin","doi":"10.1109/CCPQT56151.2022.00045","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00045","url":null,"abstract":"Thunderstorm warning plays an important role in lightning prevention and disaster mitigation. In practical applications, thunderstorm warning system is also vulnerable to attacks, such as False Data Injection Attack (FDIA). However, there is a lack of research on False Data Injection Attack for thunderstorm warning. Therefore, this paper put forwards a FDIA method based on principal component analysis (PCA) for atmospheric electric field (AEF), which is usually used for thunderstorm warning. In the FDIA scenario, the AEF-based thunderstorm warning algorithm is also introduced with electric field differential index (EFDI). Finally, experiments are conducted based on AEF data collected by an atmospheric electric field meter (AEFM) about the real thunderstorm. The experimental results show that FDIA seriously interferes with the results of the AEF-based thunderstorm warning.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134237017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-01DOI: 10.1109/CCPQT56151.2022.00032
Ziyu Zhou, Hong Wen
In order to adapt to the new situation of dynamic interaction of demand user and power generation side, the micro -grid dual -layer control model was proposed, which used the form of a graph to build a model of power transaction cost between user nodes. How to optimize such model is still an open problem. In this paper, the shortest circuit diameter algorithm is employed to minimize transaction costs and maximize benefits under the scenario that the transaction cost of buying and selling electricity between users is performed. This article proposes the shortest road algorithm of two types of optimizations to explore its appropriate application scenarios in the micro -grid power transaction system.
{"title":"A Graph-based Optimial Electrical Transaction Scheme of the Micro Grid under Edge Calculating","authors":"Ziyu Zhou, Hong Wen","doi":"10.1109/CCPQT56151.2022.00032","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00032","url":null,"abstract":"In order to adapt to the new situation of dynamic interaction of demand user and power generation side, the micro -grid dual -layer control model was proposed, which used the form of a graph to build a model of power transaction cost between user nodes. How to optimize such model is still an open problem. In this paper, the shortest circuit diameter algorithm is employed to minimize transaction costs and maximize benefits under the scenario that the transaction cost of buying and selling electricity between users is performed. This article proposes the shortest road algorithm of two types of optimizations to explore its appropriate application scenarios in the micro -grid power transaction system.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124606563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-01DOI: 10.1109/CCPQT56151.2022.00016
Chun Yang, Tingxu Lyu
Most of the maps constructed based on traditional visual SLAM technology are sparse maps, which only contain geometric information and do not contain semantic information, which limits the robot to complete the tasks of understanding. In this paper, we propose a vision-based semantic SLAM method. The visual odometry is optimized by using semantic information to remove the influence of dynamic objects in the scene. Based on the proposed method, we can finally construct a semantic map. Experiments show that, our system effectively improves the positioning and mapping accuracy.
{"title":"Research on Vision-based Semantic SLAM towards Indoor Dynamic Environment","authors":"Chun Yang, Tingxu Lyu","doi":"10.1109/CCPQT56151.2022.00016","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00016","url":null,"abstract":"Most of the maps constructed based on traditional visual SLAM technology are sparse maps, which only contain geometric information and do not contain semantic information, which limits the robot to complete the tasks of understanding. In this paper, we propose a vision-based semantic SLAM method. The visual odometry is optimized by using semantic information to remove the influence of dynamic objects in the scene. Based on the proposed method, we can finally construct a semantic map. Experiments show that, our system effectively improves the positioning and mapping accuracy.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127484014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-01DOI: 10.1109/CCPQT56151.2022.00073
Li Cong, Chengbin Huang, Jisheng Sui, Zeng Dou, Jia Li, Yamei Li, Zhen Han
To ensure the reliability of power supply, power enterprises need to spend a lot of manpower and material resources to inspect power lines every year. With the development of sensor technology and communication transmission technology, the quality of the acquisition of images, the control of flight trajectory, and the reliability of data transmission have been greatly improved, which also makes UAV inspection a reality. Nowadays, it is widely used because of its low cost and high degree of automation. In the era of rapid development of science and technology, the power line image extraction technology is still more difficult. Therefore, in this paper, on the basis of the traditional technology, Robert edge detection operator is improved. On the original basis, the adaptive parameter noise filtering is added to reduce the interference of other object contour in the background, Thence the accuracy of extraction techniques is improved in different intricate background. In the future, further research on the combination of UAV and sensor technology will be of great significance to our life.
{"title":"Cable Fault Detection And Extraction based on UAV Collected Images","authors":"Li Cong, Chengbin Huang, Jisheng Sui, Zeng Dou, Jia Li, Yamei Li, Zhen Han","doi":"10.1109/CCPQT56151.2022.00073","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00073","url":null,"abstract":"To ensure the reliability of power supply, power enterprises need to spend a lot of manpower and material resources to inspect power lines every year. With the development of sensor technology and communication transmission technology, the quality of the acquisition of images, the control of flight trajectory, and the reliability of data transmission have been greatly improved, which also makes UAV inspection a reality. Nowadays, it is widely used because of its low cost and high degree of automation. In the era of rapid development of science and technology, the power line image extraction technology is still more difficult. Therefore, in this paper, on the basis of the traditional technology, Robert edge detection operator is improved. On the original basis, the adaptive parameter noise filtering is added to reduce the interference of other object contour in the background, Thence the accuracy of extraction techniques is improved in different intricate background. In the future, further research on the combination of UAV and sensor technology will be of great significance to our life.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129940873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
FPGA offers great advantages over ASICs (Application Specific Integrated Circuits) and software when being used for cryptographic applications. However, PCIe cryptographic cards are based on foreign FPGA chips such as Xilinx and Intel. In this paper, a system design and implementation method of high-speed PCIe cryptographic accelerator based on domestic FPGA is proposed, which implements SM4 algorithm. The system consists of hardware module, logic cryptographic algorithm module, host driver and API (Application Programming Interface) module. An optimized scheme for PCIe DMA is implemented in this paper. The PCIe Gen2*4 simultaneous read/write bandwidth is up to 14.08 Gbps with 88% utilization. Based-on pipeline mode, SM4 cryptographic algorithm achieves encryption/decryption speeds of 13.53/13.51 Gbps, respectively. The FPGA accelerated implementation is twice faster than the software implementation in both encryption and decryption modes. The cryptographic system is able to be used as an integral part of CPU-FPGA heterogeneous secure data cryptographic applications.
{"title":"PCIe Cryptographic Accelerator Based on Domestic FPGA","authors":"Kunlun Zhao, Wei Liu, Qi Mu, Hongliang Wang, Ruifeng Li, Zhangzhao He","doi":"10.1109/CCPQT56151.2022.00011","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00011","url":null,"abstract":"FPGA offers great advantages over ASICs (Application Specific Integrated Circuits) and software when being used for cryptographic applications. However, PCIe cryptographic cards are based on foreign FPGA chips such as Xilinx and Intel. In this paper, a system design and implementation method of high-speed PCIe cryptographic accelerator based on domestic FPGA is proposed, which implements SM4 algorithm. The system consists of hardware module, logic cryptographic algorithm module, host driver and API (Application Programming Interface) module. An optimized scheme for PCIe DMA is implemented in this paper. The PCIe Gen2*4 simultaneous read/write bandwidth is up to 14.08 Gbps with 88% utilization. Based-on pipeline mode, SM4 cryptographic algorithm achieves encryption/decryption speeds of 13.53/13.51 Gbps, respectively. The FPGA accelerated implementation is twice faster than the software implementation in both encryption and decryption modes. The cryptographic system is able to be used as an integral part of CPU-FPGA heterogeneous secure data cryptographic applications.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124681430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}