首页 > 最新文献

2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)最新文献

英文 中文
Design of signal shaping filter based on distributed algorithm 基于分布式算法的信号整形滤波器设计
Zhuang He, Fanqiang Lin
In this paper, a shaping filter based on distributed algorithm is proposed for baseband signal shaping filter in the process of signal modulation. The paper first introduces the process of signal modulation, then analyzes the shaping filter principle of the traditional multiplier structure, and then proposes a distributed algorithm to replace the traditional multiplier structure. In the distributed algorithm, the filter coefficients generated by MATLAB are first stored in BRAM by using LUT lookup table, and then the addressing method is used to replace the accumulation method to realize the shaping filter. The experimental results show that the improved structure can significantly reduce the resource occupation in FPGA, and also has a good filtering result. The distributed algorithm has a good application in the high order shaping filter.
本文提出了一种基于分布式算法的基带信号整形滤波器,用于信号调制过程中的整形滤波器。本文首先介绍了信号调制的过程,然后分析了传统乘法器结构的整形滤波原理,在此基础上提出了一种取代传统乘法器结构的分布式算法。在分布式算法中,首先使用LUT查找表将MATLAB生成的滤波器系数存储在BRAM中,然后用寻址法代替累加法实现整形滤波器。实验结果表明,改进后的结构可以显著减少FPGA对资源的占用,并具有良好的滤波效果。分布式算法在高阶整形滤波器中有很好的应用。
{"title":"Design of signal shaping filter based on distributed algorithm","authors":"Zhuang He, Fanqiang Lin","doi":"10.1109/IMCEC51613.2021.9482297","DOIUrl":"https://doi.org/10.1109/IMCEC51613.2021.9482297","url":null,"abstract":"In this paper, a shaping filter based on distributed algorithm is proposed for baseband signal shaping filter in the process of signal modulation. The paper first introduces the process of signal modulation, then analyzes the shaping filter principle of the traditional multiplier structure, and then proposes a distributed algorithm to replace the traditional multiplier structure. In the distributed algorithm, the filter coefficients generated by MATLAB are first stored in BRAM by using LUT lookup table, and then the addressing method is used to replace the accumulation method to realize the shaping filter. The experimental results show that the improved structure can significantly reduce the resource occupation in FPGA, and also has a good filtering result. The distributed algorithm has a good application in the high order shaping filter.","PeriodicalId":240400,"journal":{"name":"2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129383200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Blockchain Based Link-Flooding Attack Detection Scheme 基于区块链的链路泛洪攻击检测方案
Wanqin Cao, Yun-Ping Huang, Dezheng Li, Feng Yang, Xiaofeng Jiang, Jian Yang
Distributed Denial-of-Service (DDoS) attack is a long-lived attack that is hugely harmful to the Internet. In particular, the emergence of a new type of DDoS called Link Flooding Attack (LFA) makes the detection and defense more difficult. In LFA, the attacker cuts off a specific area by controlling large numbers of bots to send low-rate traffic to congest selected links. Since the attack flows are similar to the legitimate ones, traditional schemes like anomaly detection and intrusion detection are no longer applicable. Blockchain provides a new solution to address this issue. In this paper, we propose a blockchain-based LFA detection scheme, which is deployed on routers and servers in and around the area that we want to protect. Blockchain technology is used to record and share the traceroute information, which enables the hosts in the protected region to easily trace the flow paths. We implement our scheme in Ethereum and conduct simulation experiments to evaluate its performance. The results show that our scheme can achieve timely detection of LFA with a high detection rate and a low false positive rate, as well as a low overhead.
分布式拒绝服务(DDoS)攻击是一种长期存在的攻击,对互联网有着巨大的危害。特别是链路泛洪攻击(Link Flooding Attack, LFA)的出现,使得检测和防御更加困难。在LFA中,攻击者通过控制大量机器人发送低速率流量来阻塞选定的链接,从而切断特定区域。由于攻击流与合法攻击流相似,传统的异常检测、入侵检测等方案已不再适用。区块链为解决这个问题提供了一个新的解决方案。在本文中,我们提出了一种基于区块链的LFA检测方案,该方案部署在我们想要保护的区域及其周围的路由器和服务器上。使用区块链技术记录和共享traceroute信息,使受保护区域内的主机能够轻松跟踪流量路径。我们在以太坊中实现了我们的方案,并进行了模拟实验来评估其性能。结果表明,该方案能够实现对LFA的及时检测,检测率高,误报率低,开销小。
{"title":"A Blockchain Based Link-Flooding Attack Detection Scheme","authors":"Wanqin Cao, Yun-Ping Huang, Dezheng Li, Feng Yang, Xiaofeng Jiang, Jian Yang","doi":"10.1109/IMCEC51613.2021.9482363","DOIUrl":"https://doi.org/10.1109/IMCEC51613.2021.9482363","url":null,"abstract":"Distributed Denial-of-Service (DDoS) attack is a long-lived attack that is hugely harmful to the Internet. In particular, the emergence of a new type of DDoS called Link Flooding Attack (LFA) makes the detection and defense more difficult. In LFA, the attacker cuts off a specific area by controlling large numbers of bots to send low-rate traffic to congest selected links. Since the attack flows are similar to the legitimate ones, traditional schemes like anomaly detection and intrusion detection are no longer applicable. Blockchain provides a new solution to address this issue. In this paper, we propose a blockchain-based LFA detection scheme, which is deployed on routers and servers in and around the area that we want to protect. Blockchain technology is used to record and share the traceroute information, which enables the hosts in the protected region to easily trace the flow paths. We implement our scheme in Ethereum and conduct simulation experiments to evaluate its performance. The results show that our scheme can achieve timely detection of LFA with a high detection rate and a low false positive rate, as well as a low overhead.","PeriodicalId":240400,"journal":{"name":"2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129501281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Cooperative Task Assignment of Multi-UAV in Road-network Reconnaissance Using Customized Genetic Algorithm 基于自定义遗传算法的多无人机路网侦察协同任务分配
Qiusheng Wang, Li Liu, Weiyong Tian
Cooperative reconnaissance is an important task scenario of multi-UAV cooperative mission. The complex environments require UAVs to move along the road-network and complete reconnaissance of the road in mission scenarios such as urban warfare, precision agriculture, logistics and transportation. In this paper, considering the road-network constraints during the task execution, the task assignment problem of multi-UAV cooperative road-network reconnaissance is defined, and the model of multi-UAV road-network reconnaissance traveling salesman problem (MRRTSP) is established. Furthermore, a customized genetic algorithm for road-network reconnaissance (CGA-RR) is used to solve the task assignment problem. Simulation results show the effectiveness of the algorithm, which can achieve the optimal multi-UAV task assignment.
协同侦察是多无人机协同任务的重要任务场景。复杂的环境要求无人机沿着道路网络移动,并在城市战争、精准农业、物流和运输等任务场景中完成道路侦察。考虑任务执行过程中路网约束,定义了多无人机协同公路网侦察任务分配问题,建立了多无人机公路网侦察旅行推销员问题(MRRTSP)模型。在此基础上,采用自定义路网侦察遗传算法(CGA-RR)解决路网侦察任务分配问题。仿真结果表明了该算法的有效性,可以实现多无人机任务的最优分配。
{"title":"Cooperative Task Assignment of Multi-UAV in Road-network Reconnaissance Using Customized Genetic Algorithm","authors":"Qiusheng Wang, Li Liu, Weiyong Tian","doi":"10.1109/IMCEC51613.2021.9482232","DOIUrl":"https://doi.org/10.1109/IMCEC51613.2021.9482232","url":null,"abstract":"Cooperative reconnaissance is an important task scenario of multi-UAV cooperative mission. The complex environments require UAVs to move along the road-network and complete reconnaissance of the road in mission scenarios such as urban warfare, precision agriculture, logistics and transportation. In this paper, considering the road-network constraints during the task execution, the task assignment problem of multi-UAV cooperative road-network reconnaissance is defined, and the model of multi-UAV road-network reconnaissance traveling salesman problem (MRRTSP) is established. Furthermore, a customized genetic algorithm for road-network reconnaissance (CGA-RR) is used to solve the task assignment problem. Simulation results show the effectiveness of the algorithm, which can achieve the optimal multi-UAV task assignment.","PeriodicalId":240400,"journal":{"name":"2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128432803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on the Requirement Analysis Method of Emergency Communication Task List 应急通信任务清单需求分析方法研究
Baishun Zuo, Wei Zhu, Changsheng Yin, Haoran Chen
Task list can effectively solve the differences in concept understanding and action cognition of emergency communication joint command and control organization and management. Full and correct requirement analysis is the basis and premise of developing emergency communication task list (ECTL). Based on DoDAF version 2.0, this paper proposes a multi viewpoint requirement analysis method, and establishes an ECTL requirement analysis model from the viewpoint of full, operational, capability and system viewpoints, which provides a basis for the next task list requirement analysis.
任务清单可以有效解决应急通信联合指挥控制组织与管理在概念理解和行动认知上的差异。全面、正确的需求分析是制定应急通信任务清单的基础和前提。基于DoDAF 2.0版本,提出了一种多视点需求分析方法,并从全视点、可操作性视点、能力视点和系统视点建立了ECTL需求分析模型,为下一步任务列表需求分析提供了依据。
{"title":"Research on the Requirement Analysis Method of Emergency Communication Task List","authors":"Baishun Zuo, Wei Zhu, Changsheng Yin, Haoran Chen","doi":"10.1109/imcec51613.2021.9482022","DOIUrl":"https://doi.org/10.1109/imcec51613.2021.9482022","url":null,"abstract":"Task list can effectively solve the differences in concept understanding and action cognition of emergency communication joint command and control organization and management. Full and correct requirement analysis is the basis and premise of developing emergency communication task list (ECTL). Based on DoDAF version 2.0, this paper proposes a multi viewpoint requirement analysis method, and establishes an ECTL requirement analysis model from the viewpoint of full, operational, capability and system viewpoints, which provides a basis for the next task list requirement analysis.","PeriodicalId":240400,"journal":{"name":"2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129336488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Imaging Method of Power System Grounding Grid Based on Scattering Principle 基于散射原理的电力系统接地网成像方法研究
Zhang Laifu, X. Yudong, Yu Hua, Yang Hong, Wang Qian, Zhang Yu
Aiming at the problems of corrosion and defect detection of grounding grid in power system, an intelligent imaging method of pulse electromagnetic inverse scattering is proposed in this paper. Firstly, based on the difference of electrical parameters between grounding grid equipment and surrounding soil medium, the electrical parameter amplitude image reconstruction of substation equipment grounding system is realized, and then the fault or defect of grounding grid is reflected by electrical parameter anomaly. Therefore, this paper first analyzes the basic theory of intelligent imaging detection of grounding grid based on scattering principle, then designs and develops the intelligent detection system of grounding grid state, and carries out the numerical experiment and the test experiment of grounding grid samples. Finally, combined with narrow pulse emission, electromagnetic detection, multiple coverage detection and other technologies, according to the requirements of shallow detection and imaging resolution of grounding grid, the intelligent detection method of grounding grid is studied.
针对电力系统接地网的腐蚀和缺陷检测问题,提出了一种脉冲电磁逆散射智能成像方法。首先,根据接地网设备与周围土壤介质的电参数差异,实现变电站设备接地系统的电参数幅值图像重建,然后通过电参数异常来反映接地网的故障或缺陷。因此,本文首先分析了基于散射原理的接地网智能成像检测的基本理论,然后设计开发了接地网状态智能检测系统,并进行了接地网样本的数值实验和测试实验。最后,结合窄脉冲发射、电磁探测、多重覆盖探测等技术,根据接地网浅层探测和成像分辨率的要求,研究了接地网的智能探测方法。
{"title":"Research on Imaging Method of Power System Grounding Grid Based on Scattering Principle","authors":"Zhang Laifu, X. Yudong, Yu Hua, Yang Hong, Wang Qian, Zhang Yu","doi":"10.1109/IMCEC51613.2021.9481992","DOIUrl":"https://doi.org/10.1109/IMCEC51613.2021.9481992","url":null,"abstract":"Aiming at the problems of corrosion and defect detection of grounding grid in power system, an intelligent imaging method of pulse electromagnetic inverse scattering is proposed in this paper. Firstly, based on the difference of electrical parameters between grounding grid equipment and surrounding soil medium, the electrical parameter amplitude image reconstruction of substation equipment grounding system is realized, and then the fault or defect of grounding grid is reflected by electrical parameter anomaly. Therefore, this paper first analyzes the basic theory of intelligent imaging detection of grounding grid based on scattering principle, then designs and develops the intelligent detection system of grounding grid state, and carries out the numerical experiment and the test experiment of grounding grid samples. Finally, combined with narrow pulse emission, electromagnetic detection, multiple coverage detection and other technologies, according to the requirements of shallow detection and imaging resolution of grounding grid, the intelligent detection method of grounding grid is studied.","PeriodicalId":240400,"journal":{"name":"2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129054033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ADIW: A Solution on General Deployment in IPv6-only WLANs ADIW:在纯ipv6局域网中通用部署的解决方案
Fangze Guo, Chenhuan Liu, Shanshan Hao, CongXiao Bao, Xing Li
IPv6, as the next generation Internet protocol, is supported by most manufacturers, but the deployment speed is very slow. In this paper, we analyze the problems in the actual use of IPv4-IPv6 dual stack in WLAN, find out problems of operating costs, security and user privacy, conclude that IPv4-IPv6 dual stack prevents the transition from IPv4 to IPv6. In order to solve these problems in IPv6 deployment on WLAN, we propose an IPv6-only WLAN structure combined with IVI. Next, we analyze the modules of our structure from the aspects of authentication methods and IP address assignment, choose the most reasonable method, and consider security and user privacy issues. Finally, we deployed our solution on the Tsinghua campus network and provide services to more than 30,000 teachers and students. Our solution helps speed up the deployment of the IPv6 networks.
IPv6作为下一代互联网协议,得到了大多数厂商的支持,但部署速度非常慢。本文分析了IPv4-IPv6双栈在WLAN中实际使用中存在的问题,找出了运行成本、安全性和用户隐私等问题,得出了IPv4-IPv6双栈阻碍了IPv4向IPv6的过渡的结论。为了解决这些问题,我们提出了一种与IVI相结合的纯IPv6无线局域网结构。接下来,我们从认证方法和IP地址分配两个方面对我们的结构模块进行分析,选择最合理的方法,并考虑安全性和用户隐私问题。最后,我们将我们的解决方案部署在清华校园网上,为3万多名师生提供服务。我们的解决方案有助于加快IPv6网络的部署。
{"title":"ADIW: A Solution on General Deployment in IPv6-only WLANs","authors":"Fangze Guo, Chenhuan Liu, Shanshan Hao, CongXiao Bao, Xing Li","doi":"10.1109/IMCEC51613.2021.9482007","DOIUrl":"https://doi.org/10.1109/IMCEC51613.2021.9482007","url":null,"abstract":"IPv6, as the next generation Internet protocol, is supported by most manufacturers, but the deployment speed is very slow. In this paper, we analyze the problems in the actual use of IPv4-IPv6 dual stack in WLAN, find out problems of operating costs, security and user privacy, conclude that IPv4-IPv6 dual stack prevents the transition from IPv4 to IPv6. In order to solve these problems in IPv6 deployment on WLAN, we propose an IPv6-only WLAN structure combined with IVI. Next, we analyze the modules of our structure from the aspects of authentication methods and IP address assignment, choose the most reasonable method, and consider security and user privacy issues. Finally, we deployed our solution on the Tsinghua campus network and provide services to more than 30,000 teachers and students. Our solution helps speed up the deployment of the IPv6 networks.","PeriodicalId":240400,"journal":{"name":"2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130795561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Threat Assessment of Cognitive Electronic Warfare to Communication based on Self-organizing Competitive Neural Network 基于自组织竞争神经网络的认知电子战通信威胁评估
Haiyan Lv, Wei Song
In order to cope with the fast pace and high efficiency of cognitive electronic warfare, self-organizing competitive neural network is introduced to quickly evaluate the threat of cognitive electronic warfare to the communication system, so as to overcome the shortcomings of previous evaluation methods, such as poor evaluation effect and great dependence on prior knowledge. Firstly, the concept of cognitive electronic warfare and its threat to communication system are introduced. Secondly, by comparison, the self-organizing competitive neural network is selected as the core of communication threat evaluation. Finally, evaluation process is simulated by MATLAB simulation software to verify its effectiveness.
为了应对认知电子战的快节奏和高效率,引入自组织竞争神经网络快速评估认知电子战对通信系统的威胁,克服了以往评估方法评估效果差、对先验知识依赖大的缺点。首先,介绍了认知电子战的概念及其对通信系统的威胁。其次,通过比较,选择自组织竞争神经网络作为通信威胁评估的核心;最后,利用MATLAB仿真软件对评价过程进行仿真,验证其有效性。
{"title":"Threat Assessment of Cognitive Electronic Warfare to Communication based on Self-organizing Competitive Neural Network","authors":"Haiyan Lv, Wei Song","doi":"10.1109/IMCEC51613.2021.9482288","DOIUrl":"https://doi.org/10.1109/IMCEC51613.2021.9482288","url":null,"abstract":"In order to cope with the fast pace and high efficiency of cognitive electronic warfare, self-organizing competitive neural network is introduced to quickly evaluate the threat of cognitive electronic warfare to the communication system, so as to overcome the shortcomings of previous evaluation methods, such as poor evaluation effect and great dependence on prior knowledge. Firstly, the concept of cognitive electronic warfare and its threat to communication system are introduced. Secondly, by comparison, the self-organizing competitive neural network is selected as the core of communication threat evaluation. Finally, evaluation process is simulated by MATLAB simulation software to verify its effectiveness.","PeriodicalId":240400,"journal":{"name":"2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131333049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automated Testing of Multi-UDP Interface Equipment Software based on Scenario and Data Driven 基于场景和数据驱动的多udp接口设备软件自动化测试
Jinkun Zhang, Hongqing Yang, Zhe Sun, Chi Hu, Chunlei Li
The equipment software exchanges information with external systems through UDP interface, with complex operating process, close business relation and strict timing constraint. In the existing testing methods, manual testing is incompetent, physical testing is difficult to inject fault data, the cost and cycle of developing special testing tools are very high. Therefore, this paper proposes an automated testing method of multi-UDP interface equipment software based on scenario and data driven. Firstly, the equipment software is divided into main business module and secondary business module, and two scenarios are defined: system scenario and business scenario. The test case suite is obtained by traversing the scenarios. Secondly, according to the transmission characteristics of UDP data, the five-layer exchange data configuration rules are formulated to describe the exchange data between the equipment software and external systems, and test data configuration files are formed. Thirdly, the principle of data driven automated test execution is interpreted, and a UDP interface test tool is developed, which supports parsing test data configuration files, listening to the output of multiple UDP interfaces, and automatically injecting data incentives to drive the automated execution of the equipment software business processes. Finally, applied in a monitoring equipment software, the results show that, compared with manual testing and physical testing, the proposed method is more suitable for multi-UDP interface equipment software with complex operating process, close business relation and strict timing constraint. It can quickly establish a testing environment, automatically inject data incentives, reduce test cost, improve test efficiency, and facilitate regression testing.
设备软件通过UDP接口与外部系统进行信息交换,操作过程复杂,业务关系密切,时间约束严格。在现有的测试方法中,人工测试能力不足,物理测试难以注入故障数据,开发专用测试工具的成本和周期很高。为此,本文提出了一种基于场景和数据驱动的多udp接口设备软件自动化测试方法。首先,将设备软件划分为主要业务模块和次要业务模块,并定义了系统场景和业务场景两种场景。测试用例套件是通过遍历场景获得的。其次,根据UDP数据的传输特点,制定五层交换数据配置规则,描述设备软件与外部系统之间的交换数据,形成测试数据配置文件。再次,阐释了数据驱动自动化测试执行的原理,开发了UDP接口测试工具,该工具支持解析测试数据配置文件、监听多个UDP接口的输出、自动注入数据激励等功能,驱动设备软件业务流程的自动化执行。最后,将该方法应用于某监控设备软件中,结果表明,与人工测试和物理测试相比,该方法更适合于操作流程复杂、业务关系密切、时序约束严格的多udp接口设备软件。它可以快速建立测试环境,自动注入数据激励,降低测试成本,提高测试效率,便于回归测试。
{"title":"Automated Testing of Multi-UDP Interface Equipment Software based on Scenario and Data Driven","authors":"Jinkun Zhang, Hongqing Yang, Zhe Sun, Chi Hu, Chunlei Li","doi":"10.1109/IMCEC51613.2021.9482099","DOIUrl":"https://doi.org/10.1109/IMCEC51613.2021.9482099","url":null,"abstract":"The equipment software exchanges information with external systems through UDP interface, with complex operating process, close business relation and strict timing constraint. In the existing testing methods, manual testing is incompetent, physical testing is difficult to inject fault data, the cost and cycle of developing special testing tools are very high. Therefore, this paper proposes an automated testing method of multi-UDP interface equipment software based on scenario and data driven. Firstly, the equipment software is divided into main business module and secondary business module, and two scenarios are defined: system scenario and business scenario. The test case suite is obtained by traversing the scenarios. Secondly, according to the transmission characteristics of UDP data, the five-layer exchange data configuration rules are formulated to describe the exchange data between the equipment software and external systems, and test data configuration files are formed. Thirdly, the principle of data driven automated test execution is interpreted, and a UDP interface test tool is developed, which supports parsing test data configuration files, listening to the output of multiple UDP interfaces, and automatically injecting data incentives to drive the automated execution of the equipment software business processes. Finally, applied in a monitoring equipment software, the results show that, compared with manual testing and physical testing, the proposed method is more suitable for multi-UDP interface equipment software with complex operating process, close business relation and strict timing constraint. It can quickly establish a testing environment, automatically inject data incentives, reduce test cost, improve test efficiency, and facilitate regression testing.","PeriodicalId":240400,"journal":{"name":"2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129268150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Belief Propagation based Deep Neural Networks for MIMO Detection: DNN-BP 基于信念传播的深度神经网络MIMO检测:DNN-BP
Changqing Zhou, Bo Ma
The paper introduces principles of Belief Propagation (BP) algorithm and Damped BP algorithm firstly. Then, with the BP algorithm and machine learning, this paper proposes a detection algorithm based on BP based deep neural networks (DNN-BP). The DNN-BP algorithm selects the optimal damping factor through machine learning methods, which solves the problem that the damping factor is difficult to determine in traditional algorithms. Simulation results show that the DNN-BP detection algorithm can further improve the convergence of the BP algorithm and improve the Bit Error Rate performance.
本文首先介绍了信念传播(BP)算法和阻尼BP算法的原理。然后,结合BP算法和机器学习,提出了一种基于BP的深度神经网络(DNN-BP)检测算法。DNN-BP算法通过机器学习方法选择最优阻尼因子,解决了传统算法中阻尼因子难以确定的问题。仿真结果表明,DNN-BP检测算法可以进一步改善BP算法的收敛性,提高误码率性能。
{"title":"Belief Propagation based Deep Neural Networks for MIMO Detection: DNN-BP","authors":"Changqing Zhou, Bo Ma","doi":"10.1109/IMCEC51613.2021.9482384","DOIUrl":"https://doi.org/10.1109/IMCEC51613.2021.9482384","url":null,"abstract":"The paper introduces principles of Belief Propagation (BP) algorithm and Damped BP algorithm firstly. Then, with the BP algorithm and machine learning, this paper proposes a detection algorithm based on BP based deep neural networks (DNN-BP). The DNN-BP algorithm selects the optimal damping factor through machine learning methods, which solves the problem that the damping factor is difficult to determine in traditional algorithms. Simulation results show that the DNN-BP detection algorithm can further improve the convergence of the BP algorithm and improve the Bit Error Rate performance.","PeriodicalId":240400,"journal":{"name":"2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128855507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Advanced Driver Assistance System based on Machine Vision 基于机器视觉的高级驾驶辅助系统
Jiajun Zhu, Fanglei Shi, Jiaying Li
In view of the frequent occurrence of traffic problems such as urban traffic congestion and traffic accidents, people pay more and more attention to traffic safety. This paper takes the key technical problems such as front vehicle detection and identification and pre-collision detection in the advanced driving assistance system as the research object, this paper puts forward a computer vision solution based on YOLOv5 algorithm and monocular camera distance calibration, which provides more comprehensive driving environment information for the advanced driving assistance system and improves the active safety of the vehicle. Finally, a case study is given to verify the superiority of the algorithm proposed in this paper.
鉴于城市交通拥堵、交通事故等交通问题的频繁发生,人们越来越重视交通安全。本文以先进驾驶辅助系统中前方车辆检测与识别、碰撞前检测等关键技术问题为研究对象,提出了基于YOLOv5算法和单目摄像机距离标定的计算机视觉解决方案,为先进驾驶辅助系统提供更全面的驾驶环境信息,提高了车辆的主动安全性。最后,通过实例验证了本文算法的优越性。
{"title":"Advanced Driver Assistance System based on Machine Vision","authors":"Jiajun Zhu, Fanglei Shi, Jiaying Li","doi":"10.1109/IMCEC51613.2021.9482067","DOIUrl":"https://doi.org/10.1109/IMCEC51613.2021.9482067","url":null,"abstract":"In view of the frequent occurrence of traffic problems such as urban traffic congestion and traffic accidents, people pay more and more attention to traffic safety. This paper takes the key technical problems such as front vehicle detection and identification and pre-collision detection in the advanced driving assistance system as the research object, this paper puts forward a computer vision solution based on YOLOv5 algorithm and monocular camera distance calibration, which provides more comprehensive driving environment information for the advanced driving assistance system and improves the active safety of the vehicle. Finally, a case study is given to verify the superiority of the algorithm proposed in this paper.","PeriodicalId":240400,"journal":{"name":"2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125343438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1