Pub Date : 2021-06-18DOI: 10.1109/IMCEC51613.2021.9482297
Zhuang He, Fanqiang Lin
In this paper, a shaping filter based on distributed algorithm is proposed for baseband signal shaping filter in the process of signal modulation. The paper first introduces the process of signal modulation, then analyzes the shaping filter principle of the traditional multiplier structure, and then proposes a distributed algorithm to replace the traditional multiplier structure. In the distributed algorithm, the filter coefficients generated by MATLAB are first stored in BRAM by using LUT lookup table, and then the addressing method is used to replace the accumulation method to realize the shaping filter. The experimental results show that the improved structure can significantly reduce the resource occupation in FPGA, and also has a good filtering result. The distributed algorithm has a good application in the high order shaping filter.
{"title":"Design of signal shaping filter based on distributed algorithm","authors":"Zhuang He, Fanqiang Lin","doi":"10.1109/IMCEC51613.2021.9482297","DOIUrl":"https://doi.org/10.1109/IMCEC51613.2021.9482297","url":null,"abstract":"In this paper, a shaping filter based on distributed algorithm is proposed for baseband signal shaping filter in the process of signal modulation. The paper first introduces the process of signal modulation, then analyzes the shaping filter principle of the traditional multiplier structure, and then proposes a distributed algorithm to replace the traditional multiplier structure. In the distributed algorithm, the filter coefficients generated by MATLAB are first stored in BRAM by using LUT lookup table, and then the addressing method is used to replace the accumulation method to realize the shaping filter. The experimental results show that the improved structure can significantly reduce the resource occupation in FPGA, and also has a good filtering result. The distributed algorithm has a good application in the high order shaping filter.","PeriodicalId":240400,"journal":{"name":"2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129383200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Distributed Denial-of-Service (DDoS) attack is a long-lived attack that is hugely harmful to the Internet. In particular, the emergence of a new type of DDoS called Link Flooding Attack (LFA) makes the detection and defense more difficult. In LFA, the attacker cuts off a specific area by controlling large numbers of bots to send low-rate traffic to congest selected links. Since the attack flows are similar to the legitimate ones, traditional schemes like anomaly detection and intrusion detection are no longer applicable. Blockchain provides a new solution to address this issue. In this paper, we propose a blockchain-based LFA detection scheme, which is deployed on routers and servers in and around the area that we want to protect. Blockchain technology is used to record and share the traceroute information, which enables the hosts in the protected region to easily trace the flow paths. We implement our scheme in Ethereum and conduct simulation experiments to evaluate its performance. The results show that our scheme can achieve timely detection of LFA with a high detection rate and a low false positive rate, as well as a low overhead.
{"title":"A Blockchain Based Link-Flooding Attack Detection Scheme","authors":"Wanqin Cao, Yun-Ping Huang, Dezheng Li, Feng Yang, Xiaofeng Jiang, Jian Yang","doi":"10.1109/IMCEC51613.2021.9482363","DOIUrl":"https://doi.org/10.1109/IMCEC51613.2021.9482363","url":null,"abstract":"Distributed Denial-of-Service (DDoS) attack is a long-lived attack that is hugely harmful to the Internet. In particular, the emergence of a new type of DDoS called Link Flooding Attack (LFA) makes the detection and defense more difficult. In LFA, the attacker cuts off a specific area by controlling large numbers of bots to send low-rate traffic to congest selected links. Since the attack flows are similar to the legitimate ones, traditional schemes like anomaly detection and intrusion detection are no longer applicable. Blockchain provides a new solution to address this issue. In this paper, we propose a blockchain-based LFA detection scheme, which is deployed on routers and servers in and around the area that we want to protect. Blockchain technology is used to record and share the traceroute information, which enables the hosts in the protected region to easily trace the flow paths. We implement our scheme in Ethereum and conduct simulation experiments to evaluate its performance. The results show that our scheme can achieve timely detection of LFA with a high detection rate and a low false positive rate, as well as a low overhead.","PeriodicalId":240400,"journal":{"name":"2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129501281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-18DOI: 10.1109/IMCEC51613.2021.9482232
Qiusheng Wang, Li Liu, Weiyong Tian
Cooperative reconnaissance is an important task scenario of multi-UAV cooperative mission. The complex environments require UAVs to move along the road-network and complete reconnaissance of the road in mission scenarios such as urban warfare, precision agriculture, logistics and transportation. In this paper, considering the road-network constraints during the task execution, the task assignment problem of multi-UAV cooperative road-network reconnaissance is defined, and the model of multi-UAV road-network reconnaissance traveling salesman problem (MRRTSP) is established. Furthermore, a customized genetic algorithm for road-network reconnaissance (CGA-RR) is used to solve the task assignment problem. Simulation results show the effectiveness of the algorithm, which can achieve the optimal multi-UAV task assignment.
{"title":"Cooperative Task Assignment of Multi-UAV in Road-network Reconnaissance Using Customized Genetic Algorithm","authors":"Qiusheng Wang, Li Liu, Weiyong Tian","doi":"10.1109/IMCEC51613.2021.9482232","DOIUrl":"https://doi.org/10.1109/IMCEC51613.2021.9482232","url":null,"abstract":"Cooperative reconnaissance is an important task scenario of multi-UAV cooperative mission. The complex environments require UAVs to move along the road-network and complete reconnaissance of the road in mission scenarios such as urban warfare, precision agriculture, logistics and transportation. In this paper, considering the road-network constraints during the task execution, the task assignment problem of multi-UAV cooperative road-network reconnaissance is defined, and the model of multi-UAV road-network reconnaissance traveling salesman problem (MRRTSP) is established. Furthermore, a customized genetic algorithm for road-network reconnaissance (CGA-RR) is used to solve the task assignment problem. Simulation results show the effectiveness of the algorithm, which can achieve the optimal multi-UAV task assignment.","PeriodicalId":240400,"journal":{"name":"2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128432803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-18DOI: 10.1109/imcec51613.2021.9482022
Baishun Zuo, Wei Zhu, Changsheng Yin, Haoran Chen
Task list can effectively solve the differences in concept understanding and action cognition of emergency communication joint command and control organization and management. Full and correct requirement analysis is the basis and premise of developing emergency communication task list (ECTL). Based on DoDAF version 2.0, this paper proposes a multi viewpoint requirement analysis method, and establishes an ECTL requirement analysis model from the viewpoint of full, operational, capability and system viewpoints, which provides a basis for the next task list requirement analysis.
{"title":"Research on the Requirement Analysis Method of Emergency Communication Task List","authors":"Baishun Zuo, Wei Zhu, Changsheng Yin, Haoran Chen","doi":"10.1109/imcec51613.2021.9482022","DOIUrl":"https://doi.org/10.1109/imcec51613.2021.9482022","url":null,"abstract":"Task list can effectively solve the differences in concept understanding and action cognition of emergency communication joint command and control organization and management. Full and correct requirement analysis is the basis and premise of developing emergency communication task list (ECTL). Based on DoDAF version 2.0, this paper proposes a multi viewpoint requirement analysis method, and establishes an ECTL requirement analysis model from the viewpoint of full, operational, capability and system viewpoints, which provides a basis for the next task list requirement analysis.","PeriodicalId":240400,"journal":{"name":"2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129336488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-18DOI: 10.1109/IMCEC51613.2021.9481992
Zhang Laifu, X. Yudong, Yu Hua, Yang Hong, Wang Qian, Zhang Yu
Aiming at the problems of corrosion and defect detection of grounding grid in power system, an intelligent imaging method of pulse electromagnetic inverse scattering is proposed in this paper. Firstly, based on the difference of electrical parameters between grounding grid equipment and surrounding soil medium, the electrical parameter amplitude image reconstruction of substation equipment grounding system is realized, and then the fault or defect of grounding grid is reflected by electrical parameter anomaly. Therefore, this paper first analyzes the basic theory of intelligent imaging detection of grounding grid based on scattering principle, then designs and develops the intelligent detection system of grounding grid state, and carries out the numerical experiment and the test experiment of grounding grid samples. Finally, combined with narrow pulse emission, electromagnetic detection, multiple coverage detection and other technologies, according to the requirements of shallow detection and imaging resolution of grounding grid, the intelligent detection method of grounding grid is studied.
{"title":"Research on Imaging Method of Power System Grounding Grid Based on Scattering Principle","authors":"Zhang Laifu, X. Yudong, Yu Hua, Yang Hong, Wang Qian, Zhang Yu","doi":"10.1109/IMCEC51613.2021.9481992","DOIUrl":"https://doi.org/10.1109/IMCEC51613.2021.9481992","url":null,"abstract":"Aiming at the problems of corrosion and defect detection of grounding grid in power system, an intelligent imaging method of pulse electromagnetic inverse scattering is proposed in this paper. Firstly, based on the difference of electrical parameters between grounding grid equipment and surrounding soil medium, the electrical parameter amplitude image reconstruction of substation equipment grounding system is realized, and then the fault or defect of grounding grid is reflected by electrical parameter anomaly. Therefore, this paper first analyzes the basic theory of intelligent imaging detection of grounding grid based on scattering principle, then designs and develops the intelligent detection system of grounding grid state, and carries out the numerical experiment and the test experiment of grounding grid samples. Finally, combined with narrow pulse emission, electromagnetic detection, multiple coverage detection and other technologies, according to the requirements of shallow detection and imaging resolution of grounding grid, the intelligent detection method of grounding grid is studied.","PeriodicalId":240400,"journal":{"name":"2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129054033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-18DOI: 10.1109/IMCEC51613.2021.9482007
Fangze Guo, Chenhuan Liu, Shanshan Hao, CongXiao Bao, Xing Li
IPv6, as the next generation Internet protocol, is supported by most manufacturers, but the deployment speed is very slow. In this paper, we analyze the problems in the actual use of IPv4-IPv6 dual stack in WLAN, find out problems of operating costs, security and user privacy, conclude that IPv4-IPv6 dual stack prevents the transition from IPv4 to IPv6. In order to solve these problems in IPv6 deployment on WLAN, we propose an IPv6-only WLAN structure combined with IVI. Next, we analyze the modules of our structure from the aspects of authentication methods and IP address assignment, choose the most reasonable method, and consider security and user privacy issues. Finally, we deployed our solution on the Tsinghua campus network and provide services to more than 30,000 teachers and students. Our solution helps speed up the deployment of the IPv6 networks.
{"title":"ADIW: A Solution on General Deployment in IPv6-only WLANs","authors":"Fangze Guo, Chenhuan Liu, Shanshan Hao, CongXiao Bao, Xing Li","doi":"10.1109/IMCEC51613.2021.9482007","DOIUrl":"https://doi.org/10.1109/IMCEC51613.2021.9482007","url":null,"abstract":"IPv6, as the next generation Internet protocol, is supported by most manufacturers, but the deployment speed is very slow. In this paper, we analyze the problems in the actual use of IPv4-IPv6 dual stack in WLAN, find out problems of operating costs, security and user privacy, conclude that IPv4-IPv6 dual stack prevents the transition from IPv4 to IPv6. In order to solve these problems in IPv6 deployment on WLAN, we propose an IPv6-only WLAN structure combined with IVI. Next, we analyze the modules of our structure from the aspects of authentication methods and IP address assignment, choose the most reasonable method, and consider security and user privacy issues. Finally, we deployed our solution on the Tsinghua campus network and provide services to more than 30,000 teachers and students. Our solution helps speed up the deployment of the IPv6 networks.","PeriodicalId":240400,"journal":{"name":"2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130795561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-18DOI: 10.1109/IMCEC51613.2021.9482288
Haiyan Lv, Wei Song
In order to cope with the fast pace and high efficiency of cognitive electronic warfare, self-organizing competitive neural network is introduced to quickly evaluate the threat of cognitive electronic warfare to the communication system, so as to overcome the shortcomings of previous evaluation methods, such as poor evaluation effect and great dependence on prior knowledge. Firstly, the concept of cognitive electronic warfare and its threat to communication system are introduced. Secondly, by comparison, the self-organizing competitive neural network is selected as the core of communication threat evaluation. Finally, evaluation process is simulated by MATLAB simulation software to verify its effectiveness.
{"title":"Threat Assessment of Cognitive Electronic Warfare to Communication based on Self-organizing Competitive Neural Network","authors":"Haiyan Lv, Wei Song","doi":"10.1109/IMCEC51613.2021.9482288","DOIUrl":"https://doi.org/10.1109/IMCEC51613.2021.9482288","url":null,"abstract":"In order to cope with the fast pace and high efficiency of cognitive electronic warfare, self-organizing competitive neural network is introduced to quickly evaluate the threat of cognitive electronic warfare to the communication system, so as to overcome the shortcomings of previous evaluation methods, such as poor evaluation effect and great dependence on prior knowledge. Firstly, the concept of cognitive electronic warfare and its threat to communication system are introduced. Secondly, by comparison, the self-organizing competitive neural network is selected as the core of communication threat evaluation. Finally, evaluation process is simulated by MATLAB simulation software to verify its effectiveness.","PeriodicalId":240400,"journal":{"name":"2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131333049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-18DOI: 10.1109/IMCEC51613.2021.9482099
Jinkun Zhang, Hongqing Yang, Zhe Sun, Chi Hu, Chunlei Li
The equipment software exchanges information with external systems through UDP interface, with complex operating process, close business relation and strict timing constraint. In the existing testing methods, manual testing is incompetent, physical testing is difficult to inject fault data, the cost and cycle of developing special testing tools are very high. Therefore, this paper proposes an automated testing method of multi-UDP interface equipment software based on scenario and data driven. Firstly, the equipment software is divided into main business module and secondary business module, and two scenarios are defined: system scenario and business scenario. The test case suite is obtained by traversing the scenarios. Secondly, according to the transmission characteristics of UDP data, the five-layer exchange data configuration rules are formulated to describe the exchange data between the equipment software and external systems, and test data configuration files are formed. Thirdly, the principle of data driven automated test execution is interpreted, and a UDP interface test tool is developed, which supports parsing test data configuration files, listening to the output of multiple UDP interfaces, and automatically injecting data incentives to drive the automated execution of the equipment software business processes. Finally, applied in a monitoring equipment software, the results show that, compared with manual testing and physical testing, the proposed method is more suitable for multi-UDP interface equipment software with complex operating process, close business relation and strict timing constraint. It can quickly establish a testing environment, automatically inject data incentives, reduce test cost, improve test efficiency, and facilitate regression testing.
{"title":"Automated Testing of Multi-UDP Interface Equipment Software based on Scenario and Data Driven","authors":"Jinkun Zhang, Hongqing Yang, Zhe Sun, Chi Hu, Chunlei Li","doi":"10.1109/IMCEC51613.2021.9482099","DOIUrl":"https://doi.org/10.1109/IMCEC51613.2021.9482099","url":null,"abstract":"The equipment software exchanges information with external systems through UDP interface, with complex operating process, close business relation and strict timing constraint. In the existing testing methods, manual testing is incompetent, physical testing is difficult to inject fault data, the cost and cycle of developing special testing tools are very high. Therefore, this paper proposes an automated testing method of multi-UDP interface equipment software based on scenario and data driven. Firstly, the equipment software is divided into main business module and secondary business module, and two scenarios are defined: system scenario and business scenario. The test case suite is obtained by traversing the scenarios. Secondly, according to the transmission characteristics of UDP data, the five-layer exchange data configuration rules are formulated to describe the exchange data between the equipment software and external systems, and test data configuration files are formed. Thirdly, the principle of data driven automated test execution is interpreted, and a UDP interface test tool is developed, which supports parsing test data configuration files, listening to the output of multiple UDP interfaces, and automatically injecting data incentives to drive the automated execution of the equipment software business processes. Finally, applied in a monitoring equipment software, the results show that, compared with manual testing and physical testing, the proposed method is more suitable for multi-UDP interface equipment software with complex operating process, close business relation and strict timing constraint. It can quickly establish a testing environment, automatically inject data incentives, reduce test cost, improve test efficiency, and facilitate regression testing.","PeriodicalId":240400,"journal":{"name":"2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129268150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-18DOI: 10.1109/IMCEC51613.2021.9482384
Changqing Zhou, Bo Ma
The paper introduces principles of Belief Propagation (BP) algorithm and Damped BP algorithm firstly. Then, with the BP algorithm and machine learning, this paper proposes a detection algorithm based on BP based deep neural networks (DNN-BP). The DNN-BP algorithm selects the optimal damping factor through machine learning methods, which solves the problem that the damping factor is difficult to determine in traditional algorithms. Simulation results show that the DNN-BP detection algorithm can further improve the convergence of the BP algorithm and improve the Bit Error Rate performance.
{"title":"Belief Propagation based Deep Neural Networks for MIMO Detection: DNN-BP","authors":"Changqing Zhou, Bo Ma","doi":"10.1109/IMCEC51613.2021.9482384","DOIUrl":"https://doi.org/10.1109/IMCEC51613.2021.9482384","url":null,"abstract":"The paper introduces principles of Belief Propagation (BP) algorithm and Damped BP algorithm firstly. Then, with the BP algorithm and machine learning, this paper proposes a detection algorithm based on BP based deep neural networks (DNN-BP). The DNN-BP algorithm selects the optimal damping factor through machine learning methods, which solves the problem that the damping factor is difficult to determine in traditional algorithms. Simulation results show that the DNN-BP detection algorithm can further improve the convergence of the BP algorithm and improve the Bit Error Rate performance.","PeriodicalId":240400,"journal":{"name":"2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128855507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-18DOI: 10.1109/IMCEC51613.2021.9482067
Jiajun Zhu, Fanglei Shi, Jiaying Li
In view of the frequent occurrence of traffic problems such as urban traffic congestion and traffic accidents, people pay more and more attention to traffic safety. This paper takes the key technical problems such as front vehicle detection and identification and pre-collision detection in the advanced driving assistance system as the research object, this paper puts forward a computer vision solution based on YOLOv5 algorithm and monocular camera distance calibration, which provides more comprehensive driving environment information for the advanced driving assistance system and improves the active safety of the vehicle. Finally, a case study is given to verify the superiority of the algorithm proposed in this paper.
{"title":"Advanced Driver Assistance System based on Machine Vision","authors":"Jiajun Zhu, Fanglei Shi, Jiaying Li","doi":"10.1109/IMCEC51613.2021.9482067","DOIUrl":"https://doi.org/10.1109/IMCEC51613.2021.9482067","url":null,"abstract":"In view of the frequent occurrence of traffic problems such as urban traffic congestion and traffic accidents, people pay more and more attention to traffic safety. This paper takes the key technical problems such as front vehicle detection and identification and pre-collision detection in the advanced driving assistance system as the research object, this paper puts forward a computer vision solution based on YOLOv5 algorithm and monocular camera distance calibration, which provides more comprehensive driving environment information for the advanced driving assistance system and improves the active safety of the vehicle. Finally, a case study is given to verify the superiority of the algorithm proposed in this paper.","PeriodicalId":240400,"journal":{"name":"2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125343438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}