首页 > 最新文献

2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)最新文献

英文 中文
A QCNN Algorithm Deployed on A Quantum Computer 在量子计算机上部署的QCNN算法
Xinmiao Chen, Bo Jiang, Yongzheng Wu, Yong-jin Ye
CNN (Convolutional neural network) is an excellent machine learning model, especially in image recognition, where they have excellent results. However, it is difficult to learn effectively if the given dimensionality of the data or model is too large. QCNN QCNN (Quantum Convolutional Neural Network) offer new solutions to the problems faced by CNN using a quantum computing environment and provide directions for improving the performance of existing learning models. However, most of the current QCNN models are only simulation programs running on a classical computer and cannot actually run on a quantum computer. In this paper, we propose a QCNN model with a quantum encoding circuit that can encode classical data into quantum data, allowing the QCNN to run on quantum computers. Firstly, we introduce the method of quantum state amplitude encoding to represent the high-dimensional classical data into the form of quantum states, constructing a bridge between traditional data and quantum state transformation, while significantly reducing the dimensionality of the processed data. Secondly, we construct the QCNN model and analyze how to implement the image recognition function by QCNN network and the optimization method of the model. Finally, we validate the learning effect of the model using MNIST handwritten digits and compare and discuss the learning effect of QCNN with classical models.
CNN(卷积神经网络)是一种优秀的机器学习模型,特别是在图像识别方面,它们有很好的效果。然而,如果给定的数据或模型的维数太大,则很难有效地学习。QCNN(量子卷积神经网络)利用量子计算环境为CNN面临的问题提供了新的解决方案,并为改进现有学习模型的性能提供了方向。然而,目前大多数QCNN模型只是在经典计算机上运行的模拟程序,并不能在量子计算机上实际运行。在本文中,我们提出了一个带有量子编码电路的QCNN模型,该模型可以将经典数据编码为量子数据,从而使QCNN能够在量子计算机上运行。首先,我们引入量子态幅度编码的方法,将高维经典数据表示为量子态的形式,在传统数据和量子态转换之间搭建了一座桥梁,同时显著降低了处理后数据的维数。其次,我们构建了QCNN模型,分析了如何利用QCNN网络实现图像识别功能以及模型的优化方法。最后,我们使用MNIST手写数字验证了模型的学习效果,并与经典模型进行了比较和讨论。
{"title":"A QCNN Algorithm Deployed on A Quantum Computer","authors":"Xinmiao Chen, Bo Jiang, Yongzheng Wu, Yong-jin Ye","doi":"10.1109/CCPQT56151.2022.00074","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00074","url":null,"abstract":"CNN (Convolutional neural network) is an excellent machine learning model, especially in image recognition, where they have excellent results. However, it is difficult to learn effectively if the given dimensionality of the data or model is too large. QCNN QCNN (Quantum Convolutional Neural Network) offer new solutions to the problems faced by CNN using a quantum computing environment and provide directions for improving the performance of existing learning models. However, most of the current QCNN models are only simulation programs running on a classical computer and cannot actually run on a quantum computer. In this paper, we propose a QCNN model with a quantum encoding circuit that can encode classical data into quantum data, allowing the QCNN to run on quantum computers. Firstly, we introduce the method of quantum state amplitude encoding to represent the high-dimensional classical data into the form of quantum states, constructing a bridge between traditional data and quantum state transformation, while significantly reducing the dimensionality of the processed data. Secondly, we construct the QCNN model and analyze how to implement the image recognition function by QCNN network and the optimization method of the model. Finally, we validate the learning effect of the model using MNIST handwritten digits and compare and discuss the learning effect of QCNN with classical models.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127095018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
WAPI Protocol Security Performance Evaluation WAPI协议安全性能评估
Fan Sun, Hong Wen, Yanxu Zhu, Xinchen Xu
Due to wireless LAN is closed to our daily life and our terminals, the malicious attack actions are easily to be launched to the open wireless broadcast channel. WAPI (Wireless LAN Authentication and Privacy Infrastructure) is one of influential standards for wireless LAN. To understand and strengthen WAPI protocol, this paper studies the security performance of WAPI protocol, analyzes the defects of WAPI protocol and the possible security threats and losses caused by the defects. A security performance evaluation strategy based on CVSS standard is also proposed, and quantitatively evaluates the security performance of WAPI protocol. According to our quantitative evaluation, it is possible to know which part of the WAPI is the security weak part, and improvement and enhanced measurement should be paid more attention in the future.
由于无线局域网对我们的日常生活和终端是封闭的,恶意攻击行为很容易被发起到开放的无线广播信道上。WAPI (Wireless LAN Authentication and Privacy Infrastructure,无线局域网认证和隐私基础设施)是无线局域网中具有重要影响的标准之一。为了理解和加强WAPI协议,本文研究了WAPI协议的安全性能,分析了WAPI协议的缺陷以及这些缺陷可能造成的安全威胁和损失。提出了一种基于CVSS标准的安全性能评价策略,对WAPI协议的安全性能进行了定量评价。根据我们的定量评价,可以知道WAPI的哪一部分是安全薄弱的部分,未来应该更加重视改进和加强测量。
{"title":"WAPI Protocol Security Performance Evaluation","authors":"Fan Sun, Hong Wen, Yanxu Zhu, Xinchen Xu","doi":"10.1109/CCPQT56151.2022.00035","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00035","url":null,"abstract":"Due to wireless LAN is closed to our daily life and our terminals, the malicious attack actions are easily to be launched to the open wireless broadcast channel. WAPI (Wireless LAN Authentication and Privacy Infrastructure) is one of influential standards for wireless LAN. To understand and strengthen WAPI protocol, this paper studies the security performance of WAPI protocol, analyzes the defects of WAPI protocol and the possible security threats and losses caused by the defects. A security performance evaluation strategy based on CVSS standard is also proposed, and quantitatively evaluates the security performance of WAPI protocol. According to our quantitative evaluation, it is possible to know which part of the WAPI is the security weak part, and improvement and enhanced measurement should be paid more attention in the future.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125907615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A parking lot payment USSD service and system based on OCS 基于OCS的停车场支付USSD服务与系统
Fu Li, Jiadong Sun, Yongchao Duan, Peng Cai
The existing mainstream parking lot self-service payment systems are implemented with APPs and mini programs as entrances. Usually, special application software needs to be developed, and servers or cloud servers will be deployed to support the work of the background software system. A certain amount of capital investment may even require equipment room etc., which makes the construction threshold of the parking lot self-service payment system in this way relatively high. This paper expounds a parking lot payment USSD (Unstructured Supplementary Data Service) service and system based on OCS (Online Charging System). The business and system mainly involve the field of communication, especially the USSD business under the OCS architecture in the GSM (Global System of Mobile communication) mobile intelligent network. This service and system use traditional telecommunication network equipment, USSD service system and mobile terminal to provide users with a convenient, fast and less investment parking lot self-service payment service and system. Because the equipment and systems in the existing telecommunication network are used, the investment in software and hardware is relatively low, so it has good economic value.
现有主流的停车场自助支付系统都是以app和小程序为入口实现的。通常需要开发专门的应用软件,部署服务器或云服务器来支持后台软件系统的工作。一定的资金投入甚至可能需要机房等,这使得以这种方式建设停车场自助付费系统的门槛相对较高。阐述了一种基于OCS (Online Charging system)的停车场收费USSD (Unstructured Supplementary Data Service)服务和系统。业务和系统主要涉及通信领域,特别是GSM(全球移动通信系统)移动智能网络中OCS架构下的USSD业务。本服务和系统采用传统的电信网络设备、USSD服务系统和移动终端,为用户提供方便、快捷、投资少的停车场自助支付服务和系统。由于使用的是现有电信网络中的设备和系统,软硬件投资相对较低,具有良好的经济价值。
{"title":"A parking lot payment USSD service and system based on OCS","authors":"Fu Li, Jiadong Sun, Yongchao Duan, Peng Cai","doi":"10.1109/CCPQT56151.2022.00014","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00014","url":null,"abstract":"The existing mainstream parking lot self-service payment systems are implemented with APPs and mini programs as entrances. Usually, special application software needs to be developed, and servers or cloud servers will be deployed to support the work of the background software system. A certain amount of capital investment may even require equipment room etc., which makes the construction threshold of the parking lot self-service payment system in this way relatively high. This paper expounds a parking lot payment USSD (Unstructured Supplementary Data Service) service and system based on OCS (Online Charging System). The business and system mainly involve the field of communication, especially the USSD business under the OCS architecture in the GSM (Global System of Mobile communication) mobile intelligent network. This service and system use traditional telecommunication network equipment, USSD service system and mobile terminal to provide users with a convenient, fast and less investment parking lot self-service payment service and system. Because the equipment and systems in the existing telecommunication network are used, the investment in software and hardware is relatively low, so it has good economic value.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126826300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Joint Trajectory Design and Transmit Power Control in NOMA-Aided UAV Communication Systems noma辅助无人机通信系统联合轨迹设计与发射功率控制
Pengfei Du, Yueqiang Shi, Qi Zeng, Xuejun Zhang
Unmanned aerial vehicles (UAVs) are becoming increasingly prevalent in wireless communications scheme with theirs inherent advantages of convenience, low cost and flexibility. However, due to the maneuverability of UAVs, the decoding sequence changes frequently, which generates the difficulty in accomplishing the method of joint optimization of UAVs track and transmitting energy in non-orthogonal multiple access (NOMA) assisted UAVs wireless communication scheme. Therefore, based on the aggregate energy constraint and maximum speed constraint in UAV flight, we investigate into maximizing the minimum aggregate reachable rate of data signalling of the user by optimizing UAV trace and transmitting power jointly. Faced with this nonconvexity problem, we firstly make it convexification, while making the objective function smooth. Then, we develop a track design and transmission power control algorithm (TDPCA) with low complexity. Next, alternate optimization and continuous convex programming are used to solve the transformation problem. Specifically, we convert this problem into two independent sub-problems: transmission power control problem and UVA trace design problem. Then, one of the subproblems is solved iteratively, while the other subproblems keep fixed until the TDPCA converges. Finally, we present lots of simulation results to verify that the TDPCA can effectively enhance the aggregate reachable data rate compared with the reference algorithms that have fixed track and transmit power.
无人机以其固有的方便、低成本、灵活等优点,在无线通信领域得到越来越广泛的应用。然而,由于无人机的机动性,解码序列变化频繁,这给非正交多址(NOMA)辅助无人机无线通信方案中无人机航迹和发射能量联合优化方法的实现带来困难。因此,基于无人机飞行中的总能量约束和最大速度约束,通过联合优化无人机航迹和发射功率,研究最大化用户数据信令的最小总可达速率。面对这种非凸性问题,我们首先使其凸化,同时使目标函数光滑。然后,我们开发了一种低复杂度的轨道设计和传输功率控制算法(TDPCA)。其次,利用交替优化和连续凸规划来解决变换问题。具体来说,我们将该问题转化为两个独立的子问题:传输功率控制问题和UVA迹线设计问题。然后,迭代求解其中一个子问题,而其他子问题保持不变,直到TDPCA收敛。最后,给出了大量的仿真结果,验证了TDPCA与固定航迹和发射功率的参考算法相比,可以有效地提高总可达数据速率。
{"title":"Joint Trajectory Design and Transmit Power Control in NOMA-Aided UAV Communication Systems","authors":"Pengfei Du, Yueqiang Shi, Qi Zeng, Xuejun Zhang","doi":"10.1109/CCPQT56151.2022.00021","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00021","url":null,"abstract":"Unmanned aerial vehicles (UAVs) are becoming increasingly prevalent in wireless communications scheme with theirs inherent advantages of convenience, low cost and flexibility. However, due to the maneuverability of UAVs, the decoding sequence changes frequently, which generates the difficulty in accomplishing the method of joint optimization of UAVs track and transmitting energy in non-orthogonal multiple access (NOMA) assisted UAVs wireless communication scheme. Therefore, based on the aggregate energy constraint and maximum speed constraint in UAV flight, we investigate into maximizing the minimum aggregate reachable rate of data signalling of the user by optimizing UAV trace and transmitting power jointly. Faced with this nonconvexity problem, we firstly make it convexification, while making the objective function smooth. Then, we develop a track design and transmission power control algorithm (TDPCA) with low complexity. Next, alternate optimization and continuous convex programming are used to solve the transformation problem. Specifically, we convert this problem into two independent sub-problems: transmission power control problem and UVA trace design problem. Then, one of the subproblems is solved iteratively, while the other subproblems keep fixed until the TDPCA converges. Finally, we present lots of simulation results to verify that the TDPCA can effectively enhance the aggregate reachable data rate compared with the reference algorithms that have fixed track and transmit power.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128642937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving Continuous Variable Quantum Key Distribution Using Heralded Hybrid Linear amplifier and Heralded Noiseless Linear amplifier When source in the Middle 采用前置混合线性放大器和前置无噪声线性放大器改进连续可变量子密钥分配
L. Wu, Zili Zou, Yanyan Feng, Jian Zhou
We propose a protocol to improve the transmission distance and secure key rate of quantum channels, the NLA-HLA QKD. The untrusted entanglement is sent to users by a quantum channel. It is capable of long transmission distances while maintaining high secure key rates and resisting the higher noise. Using the method of calculating secure key rate with the coherent state, the secure key of the NLA-HLA QKD protocol is derived. The effects of the parameters G and g on the key rate are analyzed through simulation experiments. By regulating the values of G and g, the application range of the protocol can be improved. Optimal parameters are used under specific circumstances to ensure the validity of the protocol.
为了提高量子信道的传输距离和安全密钥速率,我们提出了一种NLA-HLA QKD协议。不可信纠缠通过量子信道发送给用户。它能够长距离传输,同时保持高安全密钥速率和抵抗较高的噪声。利用相干态计算安全密钥速率的方法,推导出了NLA-HLA QKD协议的安全密钥。通过仿真实验分析了参数G和G对密钥率的影响。通过调节G和G的值,可以扩大协议的适用范围。在特定情况下使用最优参数,以保证协议的有效性。
{"title":"Improving Continuous Variable Quantum Key Distribution Using Heralded Hybrid Linear amplifier and Heralded Noiseless Linear amplifier When source in the Middle","authors":"L. Wu, Zili Zou, Yanyan Feng, Jian Zhou","doi":"10.1109/CCPQT56151.2022.00040","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00040","url":null,"abstract":"We propose a protocol to improve the transmission distance and secure key rate of quantum channels, the NLA-HLA QKD. The untrusted entanglement is sent to users by a quantum channel. It is capable of long transmission distances while maintaining high secure key rates and resisting the higher noise. Using the method of calculating secure key rate with the coherent state, the secure key of the NLA-HLA QKD protocol is derived. The effects of the parameters G and g on the key rate are analyzed through simulation experiments. By regulating the values of G and g, the application range of the protocol can be improved. Optimal parameters are used under specific circumstances to ensure the validity of the protocol.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131497901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
False Data Injection Attack on Atmospheric Electric Field in Thunderstorm Warning 雷暴预警中大气电场的假数据注入攻击
Xiang Li, Kadhim Hayawi, Yi Chen, Shih Yu Chang, Hong Wen, P. Ho, L. Yang, Qiyuan Yin
Thunderstorm warning plays an important role in lightning prevention and disaster mitigation. In practical applications, thunderstorm warning system is also vulnerable to attacks, such as False Data Injection Attack (FDIA). However, there is a lack of research on False Data Injection Attack for thunderstorm warning. Therefore, this paper put forwards a FDIA method based on principal component analysis (PCA) for atmospheric electric field (AEF), which is usually used for thunderstorm warning. In the FDIA scenario, the AEF-based thunderstorm warning algorithm is also introduced with electric field differential index (EFDI). Finally, experiments are conducted based on AEF data collected by an atmospheric electric field meter (AEFM) about the real thunderstorm. The experimental results show that FDIA seriously interferes with the results of the AEF-based thunderstorm warning.
雷暴预警在防雷减灾中起着重要作用。在实际应用中,雷暴预警系统也容易受到攻击,例如FDIA (False Data Injection Attack)。然而,针对雷暴预警的虚假数据注入攻击研究较少。为此,本文提出了一种基于主成分分析(PCA)的大气电场(AEF) FDIA方法,该方法通常用于雷暴预警。在FDIA场景下,还引入了基于电场差分指数(EFDI)的aef雷暴预警算法。最后,利用大气电场计(AEFM)采集的实际雷暴天气数据进行了实验研究。实验结果表明,FDIA严重干扰了基于aef的雷暴预警结果。
{"title":"False Data Injection Attack on Atmospheric Electric Field in Thunderstorm Warning","authors":"Xiang Li, Kadhim Hayawi, Yi Chen, Shih Yu Chang, Hong Wen, P. Ho, L. Yang, Qiyuan Yin","doi":"10.1109/CCPQT56151.2022.00045","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00045","url":null,"abstract":"Thunderstorm warning plays an important role in lightning prevention and disaster mitigation. In practical applications, thunderstorm warning system is also vulnerable to attacks, such as False Data Injection Attack (FDIA). However, there is a lack of research on False Data Injection Attack for thunderstorm warning. Therefore, this paper put forwards a FDIA method based on principal component analysis (PCA) for atmospheric electric field (AEF), which is usually used for thunderstorm warning. In the FDIA scenario, the AEF-based thunderstorm warning algorithm is also introduced with electric field differential index (EFDI). Finally, experiments are conducted based on AEF data collected by an atmospheric electric field meter (AEFM) about the real thunderstorm. The experimental results show that FDIA seriously interferes with the results of the AEF-based thunderstorm warning.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134237017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Graph-based Optimial Electrical Transaction Scheme of the Micro Grid under Edge Calculating 边缘计算下基于图的微电网最优电力交易方案
Ziyu Zhou, Hong Wen
In order to adapt to the new situation of dynamic interaction of demand user and power generation side, the micro -grid dual -layer control model was proposed, which used the form of a graph to build a model of power transaction cost between user nodes. How to optimize such model is still an open problem. In this paper, the shortest circuit diameter algorithm is employed to minimize transaction costs and maximize benefits under the scenario that the transaction cost of buying and selling electricity between users is performed. This article proposes the shortest road algorithm of two types of optimizations to explore its appropriate application scenarios in the micro -grid power transaction system.
为适应需求用户与发电侧动态交互的新形势,提出微网双层控制模型,采用图的形式建立用户节点间电力交易成本模型。如何优化这种模型仍然是一个悬而未决的问题。本文在用户之间买卖电力的交易成本场景下,采用最短电路直径算法实现交易成本最小化和收益最大化。本文提出了两类优化的最短路径算法,探索其在微网电力交易系统中的合适应用场景。
{"title":"A Graph-based Optimial Electrical Transaction Scheme of the Micro Grid under Edge Calculating","authors":"Ziyu Zhou, Hong Wen","doi":"10.1109/CCPQT56151.2022.00032","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00032","url":null,"abstract":"In order to adapt to the new situation of dynamic interaction of demand user and power generation side, the micro -grid dual -layer control model was proposed, which used the form of a graph to build a model of power transaction cost between user nodes. How to optimize such model is still an open problem. In this paper, the shortest circuit diameter algorithm is employed to minimize transaction costs and maximize benefits under the scenario that the transaction cost of buying and selling electricity between users is performed. This article proposes the shortest road algorithm of two types of optimizations to explore its appropriate application scenarios in the micro -grid power transaction system.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124606563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Vision-based Semantic SLAM towards Indoor Dynamic Environment 基于视觉的室内动态环境语义SLAM研究
Chun Yang, Tingxu Lyu
Most of the maps constructed based on traditional visual SLAM technology are sparse maps, which only contain geometric information and do not contain semantic information, which limits the robot to complete the tasks of understanding. In this paper, we propose a vision-based semantic SLAM method. The visual odometry is optimized by using semantic information to remove the influence of dynamic objects in the scene. Based on the proposed method, we can finally construct a semantic map. Experiments show that, our system effectively improves the positioning and mapping accuracy.
基于传统视觉SLAM技术构建的地图大多是稀疏地图,仅包含几何信息,不包含语义信息,这限制了机器人完成理解任务。本文提出了一种基于视觉的语义SLAM方法。利用语义信息对视觉里程计进行优化,去除场景中动态物体的影响。基于所提出的方法,我们最终可以构造一个语义映射。实验表明,该系统有效地提高了定位和制图精度。
{"title":"Research on Vision-based Semantic SLAM towards Indoor Dynamic Environment","authors":"Chun Yang, Tingxu Lyu","doi":"10.1109/CCPQT56151.2022.00016","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00016","url":null,"abstract":"Most of the maps constructed based on traditional visual SLAM technology are sparse maps, which only contain geometric information and do not contain semantic information, which limits the robot to complete the tasks of understanding. In this paper, we propose a vision-based semantic SLAM method. The visual odometry is optimized by using semantic information to remove the influence of dynamic objects in the scene. Based on the proposed method, we can finally construct a semantic map. Experiments show that, our system effectively improves the positioning and mapping accuracy.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127484014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cable Fault Detection And Extraction based on UAV Collected Images 基于无人机采集图像的电缆故障检测与提取
Li Cong, Chengbin Huang, Jisheng Sui, Zeng Dou, Jia Li, Yamei Li, Zhen Han
To ensure the reliability of power supply, power enterprises need to spend a lot of manpower and material resources to inspect power lines every year. With the development of sensor technology and communication transmission technology, the quality of the acquisition of images, the control of flight trajectory, and the reliability of data transmission have been greatly improved, which also makes UAV inspection a reality. Nowadays, it is widely used because of its low cost and high degree of automation. In the era of rapid development of science and technology, the power line image extraction technology is still more difficult. Therefore, in this paper, on the basis of the traditional technology, Robert edge detection operator is improved. On the original basis, the adaptive parameter noise filtering is added to reduce the interference of other object contour in the background, Thence the accuracy of extraction techniques is improved in different intricate background. In the future, further research on the combination of UAV and sensor technology will be of great significance to our life.
为了保证供电的可靠性,电力企业每年都需要花费大量的人力和物力对电力线路进行检查。随着传感器技术和通信传输技术的发展,图像的采集质量、飞行轨迹的控制、数据传输的可靠性都有了很大的提高,这也使得无人机巡检成为现实。如今,由于成本低,自动化程度高,被广泛使用。在科技飞速发展的时代,电力线图像的提取技术仍然比较困难。因此,本文在传统技术的基础上,对罗伯特边缘检测算子进行了改进。在原有的基础上,加入自适应参数噪声滤波以减少背景中其他目标轮廓的干扰,从而提高了在不同复杂背景下提取技术的精度。在未来,进一步研究无人机与传感器技术的结合将对我们的生活具有重要意义。
{"title":"Cable Fault Detection And Extraction based on UAV Collected Images","authors":"Li Cong, Chengbin Huang, Jisheng Sui, Zeng Dou, Jia Li, Yamei Li, Zhen Han","doi":"10.1109/CCPQT56151.2022.00073","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00073","url":null,"abstract":"To ensure the reliability of power supply, power enterprises need to spend a lot of manpower and material resources to inspect power lines every year. With the development of sensor technology and communication transmission technology, the quality of the acquisition of images, the control of flight trajectory, and the reliability of data transmission have been greatly improved, which also makes UAV inspection a reality. Nowadays, it is widely used because of its low cost and high degree of automation. In the era of rapid development of science and technology, the power line image extraction technology is still more difficult. Therefore, in this paper, on the basis of the traditional technology, Robert edge detection operator is improved. On the original basis, the adaptive parameter noise filtering is added to reduce the interference of other object contour in the background, Thence the accuracy of extraction techniques is improved in different intricate background. In the future, further research on the combination of UAV and sensor technology will be of great significance to our life.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129940873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PCIe Cryptographic Accelerator Based on Domestic FPGA 基于国产FPGA的PCIe加密加速器
Kunlun Zhao, Wei Liu, Qi Mu, Hongliang Wang, Ruifeng Li, Zhangzhao He
FPGA offers great advantages over ASICs (Application Specific Integrated Circuits) and software when being used for cryptographic applications. However, PCIe cryptographic cards are based on foreign FPGA chips such as Xilinx and Intel. In this paper, a system design and implementation method of high-speed PCIe cryptographic accelerator based on domestic FPGA is proposed, which implements SM4 algorithm. The system consists of hardware module, logic cryptographic algorithm module, host driver and API (Application Programming Interface) module. An optimized scheme for PCIe DMA is implemented in this paper. The PCIe Gen2*4 simultaneous read/write bandwidth is up to 14.08 Gbps with 88% utilization. Based-on pipeline mode, SM4 cryptographic algorithm achieves encryption/decryption speeds of 13.53/13.51 Gbps, respectively. The FPGA accelerated implementation is twice faster than the software implementation in both encryption and decryption modes. The cryptographic system is able to be used as an integral part of CPU-FPGA heterogeneous secure data cryptographic applications.
当用于加密应用时,FPGA比asic(专用集成电路)和软件提供了巨大的优势。而PCIe加密卡是基于国外的FPGA芯片,如Xilinx、Intel等。本文提出了一种基于国产FPGA的高速PCIe密码加速器的系统设计与实现方法,实现了SM4算法。该系统由硬件模块、逻辑密码算法模块、主机驱动程序和API(应用程序编程接口)模块组成。本文实现了一种PCIe DMA的优化方案。PCIe Gen2*4同时读写带宽高达14.08 Gbps,利用率高达88%。SM4加密算法基于流水线模式,加解密速度分别为13.53/13.51 Gbps。FPGA加速实现在加密和解密模式上都比软件实现快两倍。该密码系统可作为CPU-FPGA异构安全数据加密应用的组成部分。
{"title":"PCIe Cryptographic Accelerator Based on Domestic FPGA","authors":"Kunlun Zhao, Wei Liu, Qi Mu, Hongliang Wang, Ruifeng Li, Zhangzhao He","doi":"10.1109/CCPQT56151.2022.00011","DOIUrl":"https://doi.org/10.1109/CCPQT56151.2022.00011","url":null,"abstract":"FPGA offers great advantages over ASICs (Application Specific Integrated Circuits) and software when being used for cryptographic applications. However, PCIe cryptographic cards are based on foreign FPGA chips such as Xilinx and Intel. In this paper, a system design and implementation method of high-speed PCIe cryptographic accelerator based on domestic FPGA is proposed, which implements SM4 algorithm. The system consists of hardware module, logic cryptographic algorithm module, host driver and API (Application Programming Interface) module. An optimized scheme for PCIe DMA is implemented in this paper. The PCIe Gen2*4 simultaneous read/write bandwidth is up to 14.08 Gbps with 88% utilization. Based-on pipeline mode, SM4 cryptographic algorithm achieves encryption/decryption speeds of 13.53/13.51 Gbps, respectively. The FPGA accelerated implementation is twice faster than the software implementation in both encryption and decryption modes. The cryptographic system is able to be used as an integral part of CPU-FPGA heterogeneous secure data cryptographic applications.","PeriodicalId":235893,"journal":{"name":"2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124681430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1