首页 > 最新文献

2021 International Conference on Computer Engineering and Application (ICCEA)最新文献

英文 中文
Pedestrian fusion tracking method based on multimodal information com-plementation 基于多模态信息互补的行人融合跟踪方法
Pub Date : 2021-06-01 DOI: 10.1109/ICCEA53728.2021.00028
Zhang Xue, Li Yi, Zuo Jie, Liu Shiqian
A pedestrian fusion tracking method with complementary multimodal information is proposed, and a fusion decision tracking model with detection followed by fusion and then tracking is established. The detection module uses a modified CenterNet network with a richer feature information backbone network and a lightweight prediction module, and the scene data is collected to train multiple detectors for multiple modalities. A decision process based on the confidence of detection results and feature similarity is proposed to achieve the fusion of multimodal detection results, and the fused results are fed to the tracker to achieve continuous pedestrian tracking. The results show that the proposed fusion tracking model can complement each other’s multi-modal information and provide better and more robust tracking results than the single-modal tracker for continuous tracking in multiple scenes.
提出了一种具有互补多模态信息的行人融合跟踪方法,建立了先检测后融合再跟踪的融合决策跟踪模型。检测模块采用改进的CenterNet网络,具有更丰富的特征信息骨干网和轻量级的预测模块,采集场景数据,训练多模态的多个检测器。提出一种基于检测结果置信度和特征相似度的决策过程,实现多模态检测结果的融合,并将融合后的结果反馈给跟踪器,实现对行人的连续跟踪。结果表明,所提出的融合跟踪模型能够在多场景下实现多模态信息的互补,提供比单模态跟踪器更好、更鲁棒的跟踪结果。
{"title":"Pedestrian fusion tracking method based on multimodal information com-plementation","authors":"Zhang Xue, Li Yi, Zuo Jie, Liu Shiqian","doi":"10.1109/ICCEA53728.2021.00028","DOIUrl":"https://doi.org/10.1109/ICCEA53728.2021.00028","url":null,"abstract":"A pedestrian fusion tracking method with complementary multimodal information is proposed, and a fusion decision tracking model with detection followed by fusion and then tracking is established. The detection module uses a modified CenterNet network with a richer feature information backbone network and a lightweight prediction module, and the scene data is collected to train multiple detectors for multiple modalities. A decision process based on the confidence of detection results and feature similarity is proposed to achieve the fusion of multimodal detection results, and the fused results are fed to the tracker to achieve continuous pedestrian tracking. The results show that the proposed fusion tracking model can complement each other’s multi-modal information and provide better and more robust tracking results than the single-modal tracker for continuous tracking in multiple scenes.","PeriodicalId":325790,"journal":{"name":"2021 International Conference on Computer Engineering and Application (ICCEA)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115988241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
KVM PT Based Coverage Feedback Fuzzing for Network Key Devices 基于KVM PT的网络关键设备覆盖反馈模糊测试
Pub Date : 2021-06-01 DOI: 10.1109/ICCEA53728.2021.00025
L. Zhiqiang, Peng Jianshan, Bi Yechuan, Liang Xiaowei
With the advent of the network era, network security has attracted more and more attention. As the key node in the network, network key devices play an important role in protecting the internal network and ensuring the network security. For the vulnerability of network key devices, security analysis has become an important concern of security personnel. Fuzzing is an automatic and effective vulnerability mining technology. In this paper, we propose the first coverage feedback fuzzy testing framework based on KVM PT technology for network key devices, aiming to solve the feasibility of applying fuzzy tools in network critical devices. At the same time, a fuzzy test agent technology based on firmware modification is proposed to help speed up the call of testcases. We evaluated the framework on Cisco ASA firewall, and trigger CVE-2018-0101, which proves the effectiveness of the framework.
随着网络时代的到来,网络安全越来越受到人们的重视。网络密钥设备作为网络中的关键节点,在保护内部网络、保障网络安全方面发挥着重要作用。对于网络关键设备的脆弱性,安全分析已成为安全人员关注的重要问题。模糊分析是一种自动有效的漏洞挖掘技术。本文提出了首个基于KVM PT技术的网络关键设备覆盖反馈模糊测试框架,旨在解决模糊工具在网络关键设备中应用的可行性。同时,提出了一种基于固件修改的模糊测试代理技术,以加快测试用例的调用速度。我们在Cisco ASA防火墙上对该框架进行了评估,并触发了CVE-2018-0101,证明了该框架的有效性。
{"title":"KVM PT Based Coverage Feedback Fuzzing for Network Key Devices","authors":"L. Zhiqiang, Peng Jianshan, Bi Yechuan, Liang Xiaowei","doi":"10.1109/ICCEA53728.2021.00025","DOIUrl":"https://doi.org/10.1109/ICCEA53728.2021.00025","url":null,"abstract":"With the advent of the network era, network security has attracted more and more attention. As the key node in the network, network key devices play an important role in protecting the internal network and ensuring the network security. For the vulnerability of network key devices, security analysis has become an important concern of security personnel. Fuzzing is an automatic and effective vulnerability mining technology. In this paper, we propose the first coverage feedback fuzzy testing framework based on KVM PT technology for network key devices, aiming to solve the feasibility of applying fuzzy tools in network critical devices. At the same time, a fuzzy test agent technology based on firmware modification is proposed to help speed up the call of testcases. We evaluated the framework on Cisco ASA firewall, and trigger CVE-2018-0101, which proves the effectiveness of the framework.","PeriodicalId":325790,"journal":{"name":"2021 International Conference on Computer Engineering and Application (ICCEA)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114814791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A News Title Generation Method Based on UNILM Framework via Adversarial Training 基于UNILM框架的对抗训练新闻标题生成方法
Pub Date : 2021-06-01 DOI: 10.1109/ICCEA53728.2021.00014
Yue Heng
Text generation is now a very mature task. Many methods have been applied to text generation and achieved good results. This paper uses the pre-trained model Unilm with adversarial training to generate news headlines from the Thucnews dataset. We fine tune the methods and parameters in the model and produced some results for reference or comparison
文本生成现在是一个非常成熟的任务。许多方法已经应用于文本生成,并取得了良好的效果。本文使用带有对抗训练的预训练模型Unilm从Thucnews数据集生成新闻标题。我们对模型中的方法和参数进行了微调,得出了一些可供参考或比较的结果
{"title":"A News Title Generation Method Based on UNILM Framework via Adversarial Training","authors":"Yue Heng","doi":"10.1109/ICCEA53728.2021.00014","DOIUrl":"https://doi.org/10.1109/ICCEA53728.2021.00014","url":null,"abstract":"Text generation is now a very mature task. Many methods have been applied to text generation and achieved good results. This paper uses the pre-trained model Unilm with adversarial training to generate news headlines from the Thucnews dataset. We fine tune the methods and parameters in the model and produced some results for reference or comparison","PeriodicalId":325790,"journal":{"name":"2021 International Conference on Computer Engineering and Application (ICCEA)","volume":"219 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121468474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Predictive analysis of the loss of online shopping users based on data mining 基于数据挖掘的网购用户流失预测分析
Pub Date : 2021-06-01 DOI: 10.1109/ICCEA53728.2021.00029
Ziping Liu
In the fast-changing Internet era, the advantages of e-commerce over traditional shopping models are becoming more and more obvious, and convenient and fast online shopping patterns are attracting more and more users. At the same time, large-scale transactions and demand between e-commerce competition is becoming increasingly fierce, inter-enterprise competition on the one hand to promote the development of e-commerce, at the same time, but also accelerate the survival of e-commerce. Enterprise competition has intensified, customers to the enterprise, has become the most important resource, how to attract customers and retain customers has become the focus of the enterprise, which also makes customer loss become the concern of many enterprises. E-commerce companies in order to ensure their own healthy development in the fierce competition market, not only to make their products attractive, but also in-depth understanding of user preferences and satisfaction, the user’s behavior characteristics of in-depth exploration. E-commerce user behavior instability is greater, the churn rate is high, then, can we find customers in time before the loss, while helping the marketing department to target the loss of customer base and develop appropriate marketing programs is an important work of the enterprise marketing department.It is an important work in the daily operation and management of e-commerce enterprises to predict the loss of users more accurately, to implement targeted retention strategies for users who are at greater risk of loss, and to reduce the churn rate. In these areas, data mining can help businesses. In this paper, data mining technology is applied to business analysis to predict the loss of Tmall users within a certain period of time, so as to implement retention strategy and reduce the churn rate.
在瞬息万变的互联网时代,电子商务相对于传统购物模式的优势越来越明显,方便快捷的网上购物模式吸引着越来越多的用户。与此同时,电子商务之间的大规模交易和需求竞争也日趋激烈,企业间的竞争一方面促进了电子商务的发展,同时,也加速了电子商务的生存。企业竞争愈演愈烈,客户对于企业来说,已经成为最重要的资源,如何吸引客户和留住客户成为企业关注的焦点,这也使得客户流失成为很多企业关注的问题。电子商务企业要想在激烈的竞争市场中保证自身的健康发展,不仅要使自己的产品具有吸引力,还要深入了解用户的喜好和满意度,对用户的行为特征进行深入探索。电子商务用户行为的不稳定性较大,流失率较高,那么,能否在客户流失之前及时发现客户,同时帮助营销部门针对流失的客户群制定相应的营销方案是企业营销部门的一项重要工作。更准确地预测用户流失,对流失风险较大的用户实施有针对性的留存策略,降低流失率,是电商企业日常运营管理中的一项重要工作。在这些领域,数据挖掘可以帮助企业。本文将数据挖掘技术应用到业务分析中,预测天猫用户在一定时间内的流失情况,从而实施留存策略,降低流失率。
{"title":"Predictive analysis of the loss of online shopping users based on data mining","authors":"Ziping Liu","doi":"10.1109/ICCEA53728.2021.00029","DOIUrl":"https://doi.org/10.1109/ICCEA53728.2021.00029","url":null,"abstract":"In the fast-changing Internet era, the advantages of e-commerce over traditional shopping models are becoming more and more obvious, and convenient and fast online shopping patterns are attracting more and more users. At the same time, large-scale transactions and demand between e-commerce competition is becoming increasingly fierce, inter-enterprise competition on the one hand to promote the development of e-commerce, at the same time, but also accelerate the survival of e-commerce. Enterprise competition has intensified, customers to the enterprise, has become the most important resource, how to attract customers and retain customers has become the focus of the enterprise, which also makes customer loss become the concern of many enterprises. E-commerce companies in order to ensure their own healthy development in the fierce competition market, not only to make their products attractive, but also in-depth understanding of user preferences and satisfaction, the user’s behavior characteristics of in-depth exploration. E-commerce user behavior instability is greater, the churn rate is high, then, can we find customers in time before the loss, while helping the marketing department to target the loss of customer base and develop appropriate marketing programs is an important work of the enterprise marketing department.It is an important work in the daily operation and management of e-commerce enterprises to predict the loss of users more accurately, to implement targeted retention strategies for users who are at greater risk of loss, and to reduce the churn rate. In these areas, data mining can help businesses. In this paper, data mining technology is applied to business analysis to predict the loss of Tmall users within a certain period of time, so as to implement retention strategy and reduce the churn rate.","PeriodicalId":325790,"journal":{"name":"2021 International Conference on Computer Engineering and Application (ICCEA)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124847543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Location Method of Smoke Pollution Source based on LMBP Neural Network 基于LMBP神经网络的烟雾污染源定位方法
Pub Date : 2021-06-01 DOI: 10.1109/ICCEA53728.2021.00027
Jianwu Long, Jiangzhou Zhu, Xinyu Feng, Tong Li, Xinlei Song
In complex outdoor scenes, most applicable neural networks can only detect and identify smoke, but cannot accurately locate the source of its pollution. In response to this problem, this paper proposes a smoke pollution source location method based on LMBP neural network to improve the prediction and location results of outdoor smoke pollution sources. This paper first analyzes the related knowledge of artificial neural network (ANN) and Levenberg-Marquardt algorithm (LM algorithm). Then it studies the ANN-BP model based on gradient descent method and the ANN-LMBP model based on the LM algorithm. Finally, experimental simulations verify the feasibility of the ANN-LMBP model in the problem of smoke pollution source location and its strong generalization ability. The error between the latitude and longitude of the ANN-LMBP model proposed in this paper and the actual latitude and longitude in the actual scene are both within 200 meters, which is of great significance for studying the location of smoke pollution sources in complex scenes.
在复杂的室外场景中,大多数适用的神经网络只能检测和识别烟雾,而不能准确定位其污染源。针对这一问题,本文提出了一种基于LMBP神经网络的烟雾污染源定位方法,以改善室外烟雾污染源的预测定位结果。本文首先分析了人工神经网络(ANN)和Levenberg-Marquardt算法(LM算法)的相关知识。然后研究了基于梯度下降法的ANN-BP模型和基于LM算法的ANN-LMBP模型。最后,通过实验仿真验证了ANN-LMBP模型在烟雾污染源定位问题中的可行性和较强的泛化能力。本文提出的ANN-LMBP模型的经纬度与实际场景的经纬度误差均在200米以内,这对于研究复杂场景中烟雾污染源的位置具有重要意义。
{"title":"Location Method of Smoke Pollution Source based on LMBP Neural Network","authors":"Jianwu Long, Jiangzhou Zhu, Xinyu Feng, Tong Li, Xinlei Song","doi":"10.1109/ICCEA53728.2021.00027","DOIUrl":"https://doi.org/10.1109/ICCEA53728.2021.00027","url":null,"abstract":"In complex outdoor scenes, most applicable neural networks can only detect and identify smoke, but cannot accurately locate the source of its pollution. In response to this problem, this paper proposes a smoke pollution source location method based on LMBP neural network to improve the prediction and location results of outdoor smoke pollution sources. This paper first analyzes the related knowledge of artificial neural network (ANN) and Levenberg-Marquardt algorithm (LM algorithm). Then it studies the ANN-BP model based on gradient descent method and the ANN-LMBP model based on the LM algorithm. Finally, experimental simulations verify the feasibility of the ANN-LMBP model in the problem of smoke pollution source location and its strong generalization ability. The error between the latitude and longitude of the ANN-LMBP model proposed in this paper and the actual latitude and longitude in the actual scene are both within 200 meters, which is of great significance for studying the location of smoke pollution sources in complex scenes.","PeriodicalId":325790,"journal":{"name":"2021 International Conference on Computer Engineering and Application (ICCEA)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124974177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Effective Integrated Intrusion Detection Model Based on Deep Neural Network 基于深度神经网络的有效集成入侵检测模型
Pub Date : 2021-06-01 DOI: 10.1109/ICCEA53728.2021.00037
Wei Wan, Z. Peng, Jinxia Wei, Jing Zhao, Chun Long, Guanyao Du
With the rapid development of big data and cloud computing, network security threats are also growing. More and more researchers pay attention to the study of intrusion detection algorithms. Traditional intrusion detection algorithms are often unable to detect attacks with high dimensional and imbalanced data as input training data. In order to solve the problem above, this paper proposes an integrated intrusion detection model based on deep neural network. Furthermore, model integration solves the problem of sample imbalance and improves the generalization ability of the model. In this paper, we firstly use Generative Adversarial Networks(GAN) model to sample dataset. Then, multiple deep neural network (DNN) classifiers are established and special screening of the classifiers was carried out. Afterwards, all DNN classifiers were integrated based on AdaBoost integration algorithm. During the training of DNN classifiers, the training samples are sampled through an antagonistic generation network, which reduce the impact of data imbalance on classification performance of DNN classifiers. Finally, by conducting experiments with KDD 99 and NS-KDD data sets, the good stability and high accuracy of proposed model are verified.
随着大数据和云计算的快速发展,网络安全威胁也越来越大。入侵检测算法的研究越来越受到研究者的重视。传统的入侵检测算法往往无法检测到以高维和不平衡数据作为输入训练数据的攻击。为了解决上述问题,本文提出了一种基于深度神经网络的集成入侵检测模型。此外,模型集成解决了样本不平衡问题,提高了模型的泛化能力。本文首先使用生成对抗网络(GAN)模型对数据集进行采样。然后,建立了多个深度神经网络分类器,并对分类器进行了特殊筛选。然后,基于AdaBoost整合算法对所有DNN分类器进行整合。在DNN分类器的训练过程中,训练样本通过拮抗生成网络进行采样,减少了数据不平衡对DNN分类器分类性能的影响。最后,通过KDD 99和NS-KDD数据集的实验,验证了该模型的良好稳定性和较高的精度。
{"title":"An Effective Integrated Intrusion Detection Model Based on Deep Neural Network","authors":"Wei Wan, Z. Peng, Jinxia Wei, Jing Zhao, Chun Long, Guanyao Du","doi":"10.1109/ICCEA53728.2021.00037","DOIUrl":"https://doi.org/10.1109/ICCEA53728.2021.00037","url":null,"abstract":"With the rapid development of big data and cloud computing, network security threats are also growing. More and more researchers pay attention to the study of intrusion detection algorithms. Traditional intrusion detection algorithms are often unable to detect attacks with high dimensional and imbalanced data as input training data. In order to solve the problem above, this paper proposes an integrated intrusion detection model based on deep neural network. Furthermore, model integration solves the problem of sample imbalance and improves the generalization ability of the model. In this paper, we firstly use Generative Adversarial Networks(GAN) model to sample dataset. Then, multiple deep neural network (DNN) classifiers are established and special screening of the classifiers was carried out. Afterwards, all DNN classifiers were integrated based on AdaBoost integration algorithm. During the training of DNN classifiers, the training samples are sampled through an antagonistic generation network, which reduce the impact of data imbalance on classification performance of DNN classifiers. Finally, by conducting experiments with KDD 99 and NS-KDD data sets, the good stability and high accuracy of proposed model are verified.","PeriodicalId":325790,"journal":{"name":"2021 International Conference on Computer Engineering and Application (ICCEA)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126657011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
[Copyright notice] (版权)
Pub Date : 2021-06-01 DOI: 10.1109/iccea53728.2021.00003
{"title":"[Copyright notice]","authors":"","doi":"10.1109/iccea53728.2021.00003","DOIUrl":"https://doi.org/10.1109/iccea53728.2021.00003","url":null,"abstract":"","PeriodicalId":325790,"journal":{"name":"2021 International Conference on Computer Engineering and Application (ICCEA)","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134015424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Radar-Communication Integrated Conformal Array Antenna Sharing Design 雷达-通信集成共形阵列天线共享设计
Pub Date : 2021-06-01 DOI: 10.1109/ICCEA53728.2021.00092
Zhiyong Li, H. Lou, Wenting Han, Yang Fan
A method of aperture allocation for cylindrical array antennas for the integration of radar communication is proposed. Firstly, analyze the pattern of the cylindrical array and establish a shared aperture model on this basis; secondly, select the highest sidelobe level of the radar array and the communication channel capacity as the optimization target and transform the allocation of array element positions into multiple Target optimization problem; Finally, the improved genetic algorithm is used for optimization calculation, and related simulation experiments are completed. The simulation results prove that the maximum sidelobe level of the radar and the communication channel capacity can simultaneously meet the requirements of the working index and the antenna aperture is shared.
提出了一种用于雷达通信集成的圆柱阵列天线孔径分配方法。首先,分析圆柱阵列的方向图,在此基础上建立共享孔径模型;其次,选取雷达阵列的最高副瓣电平和通信信道容量作为优化目标,将阵元位置分配问题转化为多目标优化问题;最后,采用改进的遗传算法进行优化计算,并完成了相关的仿真实验。仿真结果表明,雷达最大旁瓣电平和通信信道容量能够同时满足工作指标的要求,且天线孔径是共享的。
{"title":"Radar-Communication Integrated Conformal Array Antenna Sharing Design","authors":"Zhiyong Li, H. Lou, Wenting Han, Yang Fan","doi":"10.1109/ICCEA53728.2021.00092","DOIUrl":"https://doi.org/10.1109/ICCEA53728.2021.00092","url":null,"abstract":"A method of aperture allocation for cylindrical array antennas for the integration of radar communication is proposed. Firstly, analyze the pattern of the cylindrical array and establish a shared aperture model on this basis; secondly, select the highest sidelobe level of the radar array and the communication channel capacity as the optimization target and transform the allocation of array element positions into multiple Target optimization problem; Finally, the improved genetic algorithm is used for optimization calculation, and related simulation experiments are completed. The simulation results prove that the maximum sidelobe level of the radar and the communication channel capacity can simultaneously meet the requirements of the working index and the antenna aperture is shared.","PeriodicalId":325790,"journal":{"name":"2021 International Conference on Computer Engineering and Application (ICCEA)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134068753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on multiple observation stations target tracking based on UKF algorithm 基于UKF算法的多观测站目标跟踪研究
Pub Date : 2021-06-01 DOI: 10.1109/ICCEA53728.2021.00051
Lieping Zhang, Zhihao Li, Shenglan Zhang, Yanlin Yu, Yong Liang, Zuqiong Zhang
Aiming at the problem of multiple observation stations target tracking, a multiple observation stations target tracking based on the unscented Kalman filter (UKF) algorithm is studied. Firstly, the modeling principle of multiple observation stations target tracking is given. On this basis, the multiple observation stations target tracking based on the UKF algorithm is proposed. Finally, a simulation experiment was carried out through MATLAB. The simulation results show that compared with a single observation station, the UKF target tracking algorithm based on multiple observation stations has higher tracking accuracy.
针对多观测站目标跟踪问题,研究了一种基于无嗅卡尔曼滤波(UKF)的多观测站目标跟踪算法。首先,给出了多观测站目标跟踪的建模原理。在此基础上,提出了基于UKF算法的多观测站目标跟踪。最后,通过MATLAB进行仿真实验。仿真结果表明,与单观测站相比,基于多观测站的UKF目标跟踪算法具有更高的跟踪精度。
{"title":"Research on multiple observation stations target tracking based on UKF algorithm","authors":"Lieping Zhang, Zhihao Li, Shenglan Zhang, Yanlin Yu, Yong Liang, Zuqiong Zhang","doi":"10.1109/ICCEA53728.2021.00051","DOIUrl":"https://doi.org/10.1109/ICCEA53728.2021.00051","url":null,"abstract":"Aiming at the problem of multiple observation stations target tracking, a multiple observation stations target tracking based on the unscented Kalman filter (UKF) algorithm is studied. Firstly, the modeling principle of multiple observation stations target tracking is given. On this basis, the multiple observation stations target tracking based on the UKF algorithm is proposed. Finally, a simulation experiment was carried out through MATLAB. The simulation results show that compared with a single observation station, the UKF target tracking algorithm based on multiple observation stations has higher tracking accuracy.","PeriodicalId":325790,"journal":{"name":"2021 International Conference on Computer Engineering and Application (ICCEA)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134046062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Numerical simulation of aerodynamic force and moored state in airship transport process 飞艇运输过程中气动力和系泊状态的数值模拟
Pub Date : 2021-06-01 DOI: 10.1109/ICCEA53728.2021.00034
Yuan Liu, Baogang Geng, Yongdong Zhang, Z. Wang, Du Lu, Xuan Yao
Aiming at the problem that the stability of airship’s posture is destroyed by turbulent flow when the airship leaves the large factory building, the Computational Fluid Dynamics(CFD) numerical simulation and finite element simulation method are used to simulate the condition that airship transport process in lateral incoming flow. The results shows that the turbulent flow of large factory building causes the variation of surface wind load of airship in the transport process, and the equivalent force and moment acting on airship body center show a certain degree of fluctuations; In lateral incoming flow, compared with the case of restrained by mooring tower, the transfer mode without mooring tower will produce less overall displacement and less extreme value of force on mooring rope. The simulation results provide an effective reference for the safety of airship transport process.
针对飞艇在离开大型厂房时被湍流破坏姿态稳定性的问题,采用计算流体力学(CFD)数值模拟和有限元模拟方法,对飞艇在侧向来流中的运输过程进行了模拟。结果表明:大型厂房的紊流引起飞艇在运输过程中的地面风荷载发生变化,作用在飞艇体中心的等效力和力矩呈现一定程度的波动;在侧向入流中,与有系泊塔约束的情况相比,无系泊塔的传递方式产生的总位移更小,对系泊绳的力极值也更小。仿真结果为飞艇运输过程的安全提供了有效的参考。
{"title":"Numerical simulation of aerodynamic force and moored state in airship transport process","authors":"Yuan Liu, Baogang Geng, Yongdong Zhang, Z. Wang, Du Lu, Xuan Yao","doi":"10.1109/ICCEA53728.2021.00034","DOIUrl":"https://doi.org/10.1109/ICCEA53728.2021.00034","url":null,"abstract":"Aiming at the problem that the stability of airship’s posture is destroyed by turbulent flow when the airship leaves the large factory building, the Computational Fluid Dynamics(CFD) numerical simulation and finite element simulation method are used to simulate the condition that airship transport process in lateral incoming flow. The results shows that the turbulent flow of large factory building causes the variation of surface wind load of airship in the transport process, and the equivalent force and moment acting on airship body center show a certain degree of fluctuations; In lateral incoming flow, compared with the case of restrained by mooring tower, the transfer mode without mooring tower will produce less overall displacement and less extreme value of force on mooring rope. The simulation results provide an effective reference for the safety of airship transport process.","PeriodicalId":325790,"journal":{"name":"2021 International Conference on Computer Engineering and Application (ICCEA)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114942208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2021 International Conference on Computer Engineering and Application (ICCEA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1