首页 > 最新文献

2020 2nd International Conference on Advances in Computer Technology, Information Science and Communications (CTISC)最新文献

英文 中文
Research on an improved practical byzantine fault tolerance algorithm 一种改进的实用拜占庭容错算法研究
Seybou Sakho, Jian-biao Zhang, Firdaous Essaf, Khalid Badiss, Tchewafei Abide, Julius Kibet Kiprop
PBFT is a consensus algorithm based on Byzantine fault tolerance that is widely used in current systems like blockchains. However, this algorithm has some problems that slow down its use on a large scale. In the interest of solving its problems, we have combined it with the Distributed Proof of Stake (DPoS) algorithm and smart contract technology to improve it and make it better. For this, Smart contracts were deployed in the network to improve the selection process of accounting nodes and participated in the operating process of the PBFT algorithm in order to make the selection process more transparent, incorruptible, and secure. Concerning the problem of the scalability of the nodes of the system, it will be possible to make a readjustment of the consensus algorithm to make it more flexible. The modification can be done by implementing readjustment counters, which will count the number of nodes in the network each time a consensus is reached or a node is ejected from the network, then automatically distributes the list of new nodes in the network. This new list of nodes will constitute the new network on which the new consensus will be based. To make it more secure and more sensitive to Byzantine faults, the sensitivity margin is improved.
PBFT是一种基于拜占庭容错的共识算法,广泛应用于区块链等当前系统。然而,该算法存在一些问题,减缓了它在大规模应用中的速度。为了解决其问题,我们将其与分布式权益证明(DPoS)算法和智能合约技术相结合,对其进行改进并使其变得更好。为此,在网络中部署智能合约,改进计费节点的选择过程,并参与PBFT算法的操作过程,使选择过程更加透明、廉洁、安全。关于系统节点的可扩展性问题,可以对共识算法进行重新调整,使其更加灵活。修改可以通过实现重新调整计数器来完成,该计数器将在每次达成共识或从网络中弹出节点时计算网络中的节点数量,然后自动分配网络中新节点的列表。这个新的节点列表将构成新的网络,新共识将基于此。为了提高系统的安全性和对拜占庭式故障的敏感性,提高了系统的灵敏度裕度。
{"title":"Research on an improved practical byzantine fault tolerance algorithm","authors":"Seybou Sakho, Jian-biao Zhang, Firdaous Essaf, Khalid Badiss, Tchewafei Abide, Julius Kibet Kiprop","doi":"10.1109/CTISC49998.2020.00035","DOIUrl":"https://doi.org/10.1109/CTISC49998.2020.00035","url":null,"abstract":"PBFT is a consensus algorithm based on Byzantine fault tolerance that is widely used in current systems like blockchains. However, this algorithm has some problems that slow down its use on a large scale. In the interest of solving its problems, we have combined it with the Distributed Proof of Stake (DPoS) algorithm and smart contract technology to improve it and make it better. For this, Smart contracts were deployed in the network to improve the selection process of accounting nodes and participated in the operating process of the PBFT algorithm in order to make the selection process more transparent, incorruptible, and secure. Concerning the problem of the scalability of the nodes of the system, it will be possible to make a readjustment of the consensus algorithm to make it more flexible. The modification can be done by implementing readjustment counters, which will count the number of nodes in the network each time a consensus is reached or a node is ejected from the network, then automatically distributes the list of new nodes in the network. This new list of nodes will constitute the new network on which the new consensus will be based. To make it more secure and more sensitive to Byzantine faults, the sensitivity margin is improved.","PeriodicalId":266384,"journal":{"name":"2020 2nd International Conference on Advances in Computer Technology, Information Science and Communications (CTISC)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128810880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
RoadRouter: Multi-Task Learning of Road Network Extraction with Graph Representation RoadRouter:基于图表示的道路网络提取的多任务学习
Shicheng Zu, LinTao Wan, Dong Li, Zhongfeng Qiu
Since most state-of-the-art road mappers pose the road network extraction as a binary segmentation trained on the RGB dataset, our proposed ‘RoadRouter’ system pushes the frontier by classifying the roads into seven categories based on the SpaceNet annotations. Our system is built with the Red/Near-Infrared dataset, making use of the asphalt’s spectral signature to differentiate roads from other influential noises. For addressing the disconnected road gaps problem, we propose the stacked hourglass network with dual supervision. Inspired by the human behavior of tracing the road networks via a constant orientation, incorporating the orientation learning as auxiliary loss leads to more robust and synergistic representations favorable for road connectivity refinement. The intermediate supervision provided by stacking the hourglass modules successively also serves as a connectivity refinement mechanism. In the case of modeling the long-range interaction among the per-pixel predictions, the traditional color-based appearance kernel is not useful in CRF post-processing. We propose the pixel-wise orientation CRF specific for bridging the fragmented road segments. We also formalize an image transformation protocol to parse the topology from the road segmentation. The undirected closed graphs can thereby be constructed from probabilistic inferences. Various graph-based algorithms, e.g., the shortest path searching, can be implemented on the road graph representations.
由于大多数最先进的道路绘制器将道路网络提取作为在RGB数据集上训练的二值分割,我们提出的“RoadRouter”系统通过基于SpaceNet注释将道路分为七类来推动前沿。我们的系统是基于红/近红外数据集构建的,利用沥青的光谱特征来区分道路和其他有影响的噪音。为了解决道路缝隙不连通的问题,我们提出了具有双重监督的叠加沙漏网络。受人类通过恒定方向跟踪道路网络的行为的启发,将方向学习作为辅助损失结合起来,可以产生更稳健和协同的表征,有利于道路连通性的改进。通过将沙漏模块依次堆叠提供的中间监督也可作为连通性优化机制。在对每像素预测之间的远程交互建模的情况下,传统的基于颜色的外观核在CRF后处理中是无用的。我们提出了像素方向的CRF,专门用于桥接破碎的道路段。我们还形式化了一种图像转换协议来解析道路分割的拓扑结构。因此,无向闭图可以由概率推断构造。各种基于图的算法,例如最短路径搜索,可以在道路图表示上实现。
{"title":"RoadRouter: Multi-Task Learning of Road Network Extraction with Graph Representation","authors":"Shicheng Zu, LinTao Wan, Dong Li, Zhongfeng Qiu","doi":"10.1109/CTISC49998.2020.00031","DOIUrl":"https://doi.org/10.1109/CTISC49998.2020.00031","url":null,"abstract":"Since most state-of-the-art road mappers pose the road network extraction as a binary segmentation trained on the RGB dataset, our proposed ‘RoadRouter’ system pushes the frontier by classifying the roads into seven categories based on the SpaceNet annotations. Our system is built with the Red/Near-Infrared dataset, making use of the asphalt’s spectral signature to differentiate roads from other influential noises. For addressing the disconnected road gaps problem, we propose the stacked hourglass network with dual supervision. Inspired by the human behavior of tracing the road networks via a constant orientation, incorporating the orientation learning as auxiliary loss leads to more robust and synergistic representations favorable for road connectivity refinement. The intermediate supervision provided by stacking the hourglass modules successively also serves as a connectivity refinement mechanism. In the case of modeling the long-range interaction among the per-pixel predictions, the traditional color-based appearance kernel is not useful in CRF post-processing. We propose the pixel-wise orientation CRF specific for bridging the fragmented road segments. We also formalize an image transformation protocol to parse the topology from the road segmentation. The undirected closed graphs can thereby be constructed from probabilistic inferences. Various graph-based algorithms, e.g., the shortest path searching, can be implemented on the road graph representations.","PeriodicalId":266384,"journal":{"name":"2020 2nd International Conference on Advances in Computer Technology, Information Science and Communications (CTISC)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127427413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Prediction of Optimal Power Allocation for Enhancing Security-Reliability Tradeoff with the Application of Artificial Neural Networks 应用人工神经网络预测最优功率分配增强安全-可靠性权衡
Xiaoyu Wang, Yuanyuan Gao, Guangna Zhang, Mingxi Guo
In this paper, we propose a power allocation scheme in order to improve both secure and reliable performance in the wireless two-hop threshold-selection decode-and-forward (DF) relaying networks, which is so crucial to set a threshold value related the signal-to-noise ratio (SNR) of the source signal at relay nodes for perfect decoding. We adapt the maximal-ratio combining (MRC) receiving SNR from the direct and relaying paths both at the destination and at the eavesdropper. Particularly worth mentioning is that the closed expression form of outage probability and intercept probability is driven, which can quantify the security and reliability, respectively. We also make endeavors to utilize a metric to tradeoff the security and the reliability (SRT) and find out the relevance between them in the balanced case. But beyond that, in the pursuit of tradeoff performance, power allocation tends to depend on the threshold value. In other words, it provides a new method optimizing total power to the source and the relay by the threshold value. The results are obtained from analysis, confirmed by simulation, and predicted by artificial neural networks (ANNs), which is trained with back propagation (BP) algorithm, and thus the feasibility of the proposed method is verified.
为了提高无线两跳阈值选择译码转发(DF)中继网络的安全可靠性能,本文提出了一种功率分配方案,在中继节点上设置与源信号信噪比(SNR)相关的阈值是实现完美译码的关键。我们采用最大比组合(MRC)接收信噪比从直接路径和中继路径在目的地和窃听者。特别值得一提的是,驱动了中断概率和拦截概率的封闭表达式,可以分别对安全性和可靠性进行量化。我们还尝试使用一个度量来权衡安全性和可靠性(SRT),并在平衡的情况下找出它们之间的相关性。但除此之外,在追求权衡性能时,功率分配往往依赖于阈值。换句话说,它提供了一种通过阈值优化源和继电器总功率的新方法。结果通过分析得到,仿真验证,并利用BP算法训练人工神经网络进行预测,从而验证了所提方法的可行性。
{"title":"Prediction of Optimal Power Allocation for Enhancing Security-Reliability Tradeoff with the Application of Artificial Neural Networks","authors":"Xiaoyu Wang, Yuanyuan Gao, Guangna Zhang, Mingxi Guo","doi":"10.1109/CTISC49998.2020.00013","DOIUrl":"https://doi.org/10.1109/CTISC49998.2020.00013","url":null,"abstract":"In this paper, we propose a power allocation scheme in order to improve both secure and reliable performance in the wireless two-hop threshold-selection decode-and-forward (DF) relaying networks, which is so crucial to set a threshold value related the signal-to-noise ratio (SNR) of the source signal at relay nodes for perfect decoding. We adapt the maximal-ratio combining (MRC) receiving SNR from the direct and relaying paths both at the destination and at the eavesdropper. Particularly worth mentioning is that the closed expression form of outage probability and intercept probability is driven, which can quantify the security and reliability, respectively. We also make endeavors to utilize a metric to tradeoff the security and the reliability (SRT) and find out the relevance between them in the balanced case. But beyond that, in the pursuit of tradeoff performance, power allocation tends to depend on the threshold value. In other words, it provides a new method optimizing total power to the source and the relay by the threshold value. The results are obtained from analysis, confirmed by simulation, and predicted by artificial neural networks (ANNs), which is trained with back propagation (BP) algorithm, and thus the feasibility of the proposed method is verified.","PeriodicalId":266384,"journal":{"name":"2020 2nd International Conference on Advances in Computer Technology, Information Science and Communications (CTISC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122076460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Web Masquerade Based on the MAC Addresses : How to change the web contents without changing the corresponding uniform resource locators 基于MAC地址的Web伪装:在不改变对应的统一资源定位符的情况下,改变Web内容
Shigeo Akashi, Yao Tong
Web masquerade is defined as the network skill enabling to display various kinds of web contents on the monitors without changing URLs which are input into the web browsers. It is well known that there is a method of web masquerade which can change the web contents according to a change of the switchport to which a personal computer is directly connected. In this paper, we introduce another method of web masquerade which can change the web contents according to a change of the MAC address attached to a personal computer. In other words, we introduce the new system playing the role at the datalink layer which is analogous to the role being played by the vlan membership policy system at the network layer.
Web masquerade是一种能够在不改变输入到Web浏览器的url的情况下在监视器上显示各种Web内容的网络技能。众所周知,有一种网络伪装的方法,可以根据个人电脑直接连接的交换机端口的变化来改变网络内容。本文介绍了另一种网络伪装的方法,该方法可以根据附加在个人计算机上的MAC地址的变化来改变网络内容。换句话说,我们引入了在数据链路层扮演类似于vlan成员策略系统在网络层扮演的角色的新系统。
{"title":"Web Masquerade Based on the MAC Addresses : How to change the web contents without changing the corresponding uniform resource locators","authors":"Shigeo Akashi, Yao Tong","doi":"10.1109/CTISC49998.2020.00024","DOIUrl":"https://doi.org/10.1109/CTISC49998.2020.00024","url":null,"abstract":"Web masquerade is defined as the network skill enabling to display various kinds of web contents on the monitors without changing URLs which are input into the web browsers. It is well known that there is a method of web masquerade which can change the web contents according to a change of the switchport to which a personal computer is directly connected. In this paper, we introduce another method of web masquerade which can change the web contents according to a change of the MAC address attached to a personal computer. In other words, we introduce the new system playing the role at the datalink layer which is analogous to the role being played by the vlan membership policy system at the network layer.","PeriodicalId":266384,"journal":{"name":"2020 2nd International Conference on Advances in Computer Technology, Information Science and Communications (CTISC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129487713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improved Blockchain Consensus Mechanism Based on PBFT Algorithm 基于PBFT算法的改进区块链共识机制
Ge Yu, Bin Wu, Xinxin Niu
Practical Byzantine Fault Tolerance (PBFT) is a blockchain consensus mechanism that is widely used at present, but the confidence of blockchain node in PBFT cannot be guaranteed, and a large amount of communication resources will be consumed in the process of reaching consensus. The paper proposes a new consensus mechanism, namely the Dynamic Grouping Byzantine Fault Tolerance Mechanism (DGBFT) based on confidence. The principles of DGBFT are as follows: 1) By extending the node’s attributes with the confidence, and designing a mechanism to evaluate the node’s confidence, therefore, the confidence adjustment and grouping adjustment can be performed on the nodes in the system. By grouping the confidence nodes by the confidence group, the communication complexity is greatly reduced, and the malicious nodes can be effectively excluded. Finally, the experimental results show that the blockchain applying the improved mechanism can significantly improve the communication efficiency of the system and the overall confidence of the system.
实用拜占庭容错(Practical Byzantine Fault Tolerance, PBFT)是目前广泛使用的区块链共识机制,但区块链节点在PBFT中的置信度无法保证,在达成共识的过程中会消耗大量的通信资源。提出了一种新的共识机制,即基于置信度的动态分组拜占庭容错机制(DGBFT)。DGBFT的原理如下:1)通过对节点属性进行置信度扩展,并设计节点置信度评估机制,从而对系统中的节点进行置信度调整和分组调整。通过将信任节点按信任组分组,大大降低了通信复杂度,有效地排除了恶意节点。最后,实验结果表明,采用改进机制的区块链可以显著提高系统的通信效率和系统的整体置信度。
{"title":"Improved Blockchain Consensus Mechanism Based on PBFT Algorithm","authors":"Ge Yu, Bin Wu, Xinxin Niu","doi":"10.1109/CTISC49998.2020.00009","DOIUrl":"https://doi.org/10.1109/CTISC49998.2020.00009","url":null,"abstract":"Practical Byzantine Fault Tolerance (PBFT) is a blockchain consensus mechanism that is widely used at present, but the confidence of blockchain node in PBFT cannot be guaranteed, and a large amount of communication resources will be consumed in the process of reaching consensus. The paper proposes a new consensus mechanism, namely the Dynamic Grouping Byzantine Fault Tolerance Mechanism (DGBFT) based on confidence. The principles of DGBFT are as follows: 1) By extending the node’s attributes with the confidence, and designing a mechanism to evaluate the node’s confidence, therefore, the confidence adjustment and grouping adjustment can be performed on the nodes in the system. By grouping the confidence nodes by the confidence group, the communication complexity is greatly reduced, and the malicious nodes can be effectively excluded. Finally, the experimental results show that the blockchain applying the improved mechanism can significantly improve the communication efficiency of the system and the overall confidence of the system.","PeriodicalId":266384,"journal":{"name":"2020 2nd International Conference on Advances in Computer Technology, Information Science and Communications (CTISC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117262755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
CTISC 2020 Committees 中国科协2020委员会
S. Hsieh, Shigeo Akashi, Ping Guo, Xiaochen Yuan, Bo-Hao Chen, Yuan Ze, Jiankang Ren
International Technical Program Committees William (Michael) Pace, Texas A&M University, USA Francesco Colace, University of Salerno, Itlay Bok-Min Goi (SMIEEE), Universiti Tunku Abdul Rahman (UTAR), Malaysia Emanuel S. Grant, University of North Dakota, US Hosam El-Ocla (SMIEEE), Lakehead University, Canada Yung-Hui Li, National Central University, Taiwan Wai Lam Hoo, University of Malaya, Malaysia Jain-shing Liu, Providence University, Taiwan Xin Lou, Advanced Digital Sciences Center, Singapore Muhammad Roil Bilad, Universiti Teknologi Petronas, Malaysia Hussain Al-Aqrabi, University of Huddersfield, UK Bohumil Brtník, University of Pardubice, Czech Republic Zainb Dawod, Brunel University London, UK Cathryn Peoples, The Open University, UK Ahmad El-Banna, Benha University, Egypt Zakariya Chabani, Istanbul University, Turkey Seppo Sirkemaa, University of Turku, Finland Juryon Paik, Pyeongtaek University, South Korea Anas M.R. AlSobeh, Yarmouk University, Jordan Shamsul Jamel Elias, Universiti Teknologi MARA, Malaysia Syed Farooq Ali, University of Management and Technology, Pakistan Hadi Sutopo, Kalbis Institute, Indonesia Turi, Michael, California State University, Fullerton, USA Anastasia Anagnostou, Brunel University London, UK
{"title":"CTISC 2020 Committees","authors":"S. Hsieh, Shigeo Akashi, Ping Guo, Xiaochen Yuan, Bo-Hao Chen, Yuan Ze, Jiankang Ren","doi":"10.1109/ctisc49998.2020.00006","DOIUrl":"https://doi.org/10.1109/ctisc49998.2020.00006","url":null,"abstract":"International Technical Program Committees William (Michael) Pace, Texas A&M University, USA Francesco Colace, University of Salerno, Itlay Bok-Min Goi (SMIEEE), Universiti Tunku Abdul Rahman (UTAR), Malaysia Emanuel S. Grant, University of North Dakota, US Hosam El-Ocla (SMIEEE), Lakehead University, Canada Yung-Hui Li, National Central University, Taiwan Wai Lam Hoo, University of Malaya, Malaysia Jain-shing Liu, Providence University, Taiwan Xin Lou, Advanced Digital Sciences Center, Singapore Muhammad Roil Bilad, Universiti Teknologi Petronas, Malaysia Hussain Al-Aqrabi, University of Huddersfield, UK Bohumil Brtník, University of Pardubice, Czech Republic Zainb Dawod, Brunel University London, UK Cathryn Peoples, The Open University, UK Ahmad El-Banna, Benha University, Egypt Zakariya Chabani, Istanbul University, Turkey Seppo Sirkemaa, University of Turku, Finland Juryon Paik, Pyeongtaek University, South Korea Anas M.R. AlSobeh, Yarmouk University, Jordan Shamsul Jamel Elias, Universiti Teknologi MARA, Malaysia Syed Farooq Ali, University of Management and Technology, Pakistan Hadi Sutopo, Kalbis Institute, Indonesia Turi, Michael, California State University, Fullerton, USA Anastasia Anagnostou, Brunel University London, UK","PeriodicalId":266384,"journal":{"name":"2020 2nd International Conference on Advances in Computer Technology, Information Science and Communications (CTISC)","volume":"347 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124278773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LFTag: A Scalable Visual Fiducial System with Low Spatial Frequency LFTag:一种可扩展的低空间频率视觉基准系统
Ben Wang
Visual fiducial systems are a key component of many robotics and AR/VR applications for 6-DOF monocular relative pose estimation and target identification. This paper presents LFTag, a visual fiducial system based on topological detection and relative position data encoding which optimizes data density within spatial frequency constraints. The marker is constructed to resolve rotational ambiguity, which combined with the robust geometric and topological false positive rejection, allows all marker bits to be used for data.When compared to existing state-of-the-art square binary markers (AprilTag) and topological markers (TopoTag) in simulation, the proposed fiducial system (LFTag) offers significant advances in dictionary size and range. LFTag 3×3 achieves 546 times the dictionary size of AprilTag 25h9 and LFTag 4×4 achieves 126 thousand times the dictionary size of AprilTag 41h12 while simultaneously achieving longer detection range. LFTag 3×3 also achieves more than twice the detection range of TopoTag 4×4 at the same dictionary size.
视觉基准系统是许多机器人和AR/VR应用的关键组成部分,用于6自由度单眼相对姿态估计和目标识别。本文提出了一种基于拓扑检测和相对位置数据编码的视觉基准系统LFTag,该系统在空间频率约束下优化了数据密度。该标记用于解决旋转模糊,结合鲁棒的几何和拓扑误报抑制,允许所有标记位用于数据。与仿真中现有的最先进的正方形二进制标记(AprilTag)和拓扑标记(TopoTag)相比,所提出的基准系统(LFTag)在字典大小和范围方面提供了显着的进步。LFTag 3×3达到了AprilTag 25h9字典大小的546倍,LFTag 4×4达到了AprilTag 41h12字典大小的12.6万倍,同时实现了更长的检测范围。在相同字典大小的情况下,LFTag 3×3的检测范围是TopoTag 4×4的两倍以上。
{"title":"LFTag: A Scalable Visual Fiducial System with Low Spatial Frequency","authors":"Ben Wang","doi":"10.1109/CTISC49998.2020.00030","DOIUrl":"https://doi.org/10.1109/CTISC49998.2020.00030","url":null,"abstract":"Visual fiducial systems are a key component of many robotics and AR/VR applications for 6-DOF monocular relative pose estimation and target identification. This paper presents LFTag, a visual fiducial system based on topological detection and relative position data encoding which optimizes data density within spatial frequency constraints. The marker is constructed to resolve rotational ambiguity, which combined with the robust geometric and topological false positive rejection, allows all marker bits to be used for data.When compared to existing state-of-the-art square binary markers (AprilTag) and topological markers (TopoTag) in simulation, the proposed fiducial system (LFTag) offers significant advances in dictionary size and range. LFTag 3×3 achieves 546 times the dictionary size of AprilTag 25h9 and LFTag 4×4 achieves 126 thousand times the dictionary size of AprilTag 41h12 while simultaneously achieving longer detection range. LFTag 3×3 also achieves more than twice the detection range of TopoTag 4×4 at the same dictionary size.","PeriodicalId":266384,"journal":{"name":"2020 2nd International Conference on Advances in Computer Technology, Information Science and Communications (CTISC)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124299244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Parameter Estimation of Sinusoid Frequency Modulation Signal in Heavy-tailed Noise 重尾噪声下正弦波调频信号的参数估计
Xing Yongchang, Hong Wei, Zhang Heng, Ding Youfeng, Sun Bin, Hu Wankun
In this paper, we proposed a novel algorithm based on the generalized cyclic stationary characteristics for estimating sinusoidal frequency-modulated (SFM) signals in the presence of heavy-tailed noise. The properties of the cyclic autocorrelation function for parameter estimation are first investigated. Then, the modulation frequency of the SFM signal is estimated based on the generalized cyclic stationary characteristics. Finally, the carrier frequency and modulation index are achieved by constructing the reference signal. Theoretical analysis and numerical simulation indicate that the proposed method can significantly improve the performance of parameters estimation of SFM signals in the presence of heavy-tailed noise.
本文提出了一种基于广义循环平稳特性的重尾噪声下正弦调频信号估计算法。首先研究了用于参数估计的循环自相关函数的性质。然后,根据广义循环平稳特性估计SFM信号的调制频率。最后,通过构造参考信号得到载波频率和调制指数。理论分析和数值仿真结果表明,该方法能显著提高存在重尾噪声的SFM信号的参数估计性能。
{"title":"Parameter Estimation of Sinusoid Frequency Modulation Signal in Heavy-tailed Noise","authors":"Xing Yongchang, Hong Wei, Zhang Heng, Ding Youfeng, Sun Bin, Hu Wankun","doi":"10.1109/CTISC49998.2020.00014","DOIUrl":"https://doi.org/10.1109/CTISC49998.2020.00014","url":null,"abstract":"In this paper, we proposed a novel algorithm based on the generalized cyclic stationary characteristics for estimating sinusoidal frequency-modulated (SFM) signals in the presence of heavy-tailed noise. The properties of the cyclic autocorrelation function for parameter estimation are first investigated. Then, the modulation frequency of the SFM signal is estimated based on the generalized cyclic stationary characteristics. Finally, the carrier frequency and modulation index are achieved by constructing the reference signal. Theoretical analysis and numerical simulation indicate that the proposed method can significantly improve the performance of parameters estimation of SFM signals in the presence of heavy-tailed noise.","PeriodicalId":266384,"journal":{"name":"2020 2nd International Conference on Advances in Computer Technology, Information Science and Communications (CTISC)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122891049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Low-altitude UAV Detection Method Based on One-staged Detection Framework 基于一级检测框架的低空无人机检测方法
Wenchao Zhao, Qiang Zhang, Haihan Li, Bin Li, Jiaohao Zhang
Illegal flight of unmanned aerial vehicles (UAVs) poses serious threats to the public and national security. With the characteristics of small size and low flight height, UAVs are difficult for the traditional air-defense system to detect. Therefore, to deal with the illegal UAV flight, this paper proposed a state-of-the art low-altitude UAV detection method. Firstly, a large-scale UAV data set including multiple kinds of UAVs is collected and constructed. Then, based on one stage detection framework, the UAV detection (UAVDet) network is presented with the improvement of more detection scales, utilization of focal loss and specific data augmentation. Experiment results show that the proposed UAV detection method has significant improvement on UAV detection performance, and it is competent to achieve real-time and effective UAV detection.
无人机的非法飞行对公众和国家安全构成严重威胁。无人机具有体积小、飞行高度低的特点,是传统防空系统难以探测到的。因此,为了应对无人机的非法飞行,本文提出了一种目前最先进的低空无人机检测方法。首先,采集并构建了包含多种无人机的大型无人机数据集;在此基础上,提出了基于一级检测框架的无人机检测(UAVDet)网络,改进了检测尺度,利用了焦损,增强了具体数据。实验结果表明,提出的无人机检测方法对无人机的检测性能有显著提高,能够实现实时、有效的无人机检测。
{"title":"Low-altitude UAV Detection Method Based on One-staged Detection Framework","authors":"Wenchao Zhao, Qiang Zhang, Haihan Li, Bin Li, Jiaohao Zhang","doi":"10.1109/CTISC49998.2020.00026","DOIUrl":"https://doi.org/10.1109/CTISC49998.2020.00026","url":null,"abstract":"Illegal flight of unmanned aerial vehicles (UAVs) poses serious threats to the public and national security. With the characteristics of small size and low flight height, UAVs are difficult for the traditional air-defense system to detect. Therefore, to deal with the illegal UAV flight, this paper proposed a state-of-the art low-altitude UAV detection method. Firstly, a large-scale UAV data set including multiple kinds of UAVs is collected and constructed. Then, based on one stage detection framework, the UAV detection (UAVDet) network is presented with the improvement of more detection scales, utilization of focal loss and specific data augmentation. Experiment results show that the proposed UAV detection method has significant improvement on UAV detection performance, and it is competent to achieve real-time and effective UAV detection.","PeriodicalId":266384,"journal":{"name":"2020 2nd International Conference on Advances in Computer Technology, Information Science and Communications (CTISC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129362425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Research on Spectrum Sensing System Based on Composite Neural Network 基于复合神经网络的频谱传感系统研究
Long Zhang, Min Zhao, Cheng Tan, Gang Li, Chunying Lv
Electromagnetic spectrum sensing is an important component of electromagnetic spectrum capability. With the development of spectrum sensing technology, there are still many problems and challenges in practical applications. For example, though the spectrum sensing field has diversified, the system is still based on manual operation; there are massive and diverse data, but the depth and breadth of data mining are insufficient; there is a large amount of historical data, multiple heterogeneous and unlabeled data types, and multidimensional non fusion platforms. The above difficulties hinder the construction of electromagnetic spectrum sensing ability and efficiency. Therefore, we propose a spectrum sensing system based on composite neural network architecture, the overall architecture includes three layers; spectrum sensing layer, data processing layer and situation analysis layer, which realizes the bottom data processing and high-dimensional spectrum sensing analysis. With the development of artificial intelligence technology [1], the above problems can be further improved and the development from artificial to intelligent can be realized gradually by using deep learning algorithm framework and exploring the advanced artificial intelligence technology. Finally, a three-dimensional electromagnetic situation map is formed from the time dimension, space dimension and spectrum dimension, so as to realize intelligence.
电磁频谱传感是电磁频谱能力的重要组成部分。随着频谱传感技术的发展,在实际应用中还存在许多问题和挑战。例如,虽然频谱传感领域已经多样化,但系统仍以人工操作为主;数据量大、种类多,但挖掘的深度和广度不足;存在大量的历史数据,多种异构和未标记的数据类型,以及多维的非融合平台。上述困难阻碍了电磁频谱传感能力和效率的建设。因此,我们提出了一种基于复合神经网络架构的频谱感知系统,总体架构包括三层;频谱感知层、数据处理层和态势分析层,实现底层数据处理和高维频谱感知分析。随着人工智能技术[1]的发展,利用深度学习算法框架,探索先进的人工智能技术,可以进一步改善上述问题,逐步实现从人工到智能的发展。最后,从时间维度、空间维度和频谱维度形成三维电磁态势图,实现智能化。
{"title":"Research on Spectrum Sensing System Based on Composite Neural Network","authors":"Long Zhang, Min Zhao, Cheng Tan, Gang Li, Chunying Lv","doi":"10.1109/CTISC49998.2020.00010","DOIUrl":"https://doi.org/10.1109/CTISC49998.2020.00010","url":null,"abstract":"Electromagnetic spectrum sensing is an important component of electromagnetic spectrum capability. With the development of spectrum sensing technology, there are still many problems and challenges in practical applications. For example, though the spectrum sensing field has diversified, the system is still based on manual operation; there are massive and diverse data, but the depth and breadth of data mining are insufficient; there is a large amount of historical data, multiple heterogeneous and unlabeled data types, and multidimensional non fusion platforms. The above difficulties hinder the construction of electromagnetic spectrum sensing ability and efficiency. Therefore, we propose a spectrum sensing system based on composite neural network architecture, the overall architecture includes three layers; spectrum sensing layer, data processing layer and situation analysis layer, which realizes the bottom data processing and high-dimensional spectrum sensing analysis. With the development of artificial intelligence technology [1], the above problems can be further improved and the development from artificial to intelligent can be realized gradually by using deep learning algorithm framework and exploring the advanced artificial intelligence technology. Finally, a three-dimensional electromagnetic situation map is formed from the time dimension, space dimension and spectrum dimension, so as to realize intelligence.","PeriodicalId":266384,"journal":{"name":"2020 2nd International Conference on Advances in Computer Technology, Information Science and Communications (CTISC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122727355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2020 2nd International Conference on Advances in Computer Technology, Information Science and Communications (CTISC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1