首页 > 最新文献

2021 International Conference on Computer Engineering and Application (ICCEA)最新文献

英文 中文
Radar Signal Detection Based on Ambiguity Function and Deep Learning 基于模糊函数和深度学习的雷达信号检测
Pub Date : 2021-06-01 DOI: 10.1109/ICCEA53728.2021.00059
Fengrong Lv, Zeyu Dong, T. Wan, Kaili Jiang, Xueli Fang, Lei Zhang
The ambiguity function describes the joint characteristics of the signal in the time domain and the frequency domain, and is usually used for signal recognition. The time domain and frequency domain distribution of noise is more spurious than the signal. Its ambiguity function can also reflect its characteristics. However, the direct use of the ambiguity function as the signal feature will increase the amount of calculation of the detection system, so slice it, which reduces the burden on the system for detecting signal information while preserving the information. At the same time, the radar signal detection based on neural network can avoid the influence of artificially setting the threshold on the detection performance of the system. So, we propose an algorithm for inputting the extracted fuzzy function slice sequence into a neural network to realize signal detection. Simulation proves that when the signal-to-noise ratio of the received signal is very low, our proposed method still has a high detection probability.
模糊函数描述了信号在时域和频域的联合特征,通常用于信号识别。噪声的时域和频域分布比信号更具有杂散性。其歧义功能也能反映其特点。但是,直接使用模糊函数作为信号特征会增加检测系统的计算量,因此对其进行切片,在保留信息的同时减轻了系统检测信号信息的负担。同时,基于神经网络的雷达信号检测可以避免人为设置阈值对系统检测性能的影响。因此,我们提出了一种将提取的模糊函数切片序列输入到神经网络中实现信号检测的算法。仿真证明,当接收信号的信噪比很低时,我们提出的方法仍然具有很高的检测概率。
{"title":"Radar Signal Detection Based on Ambiguity Function and Deep Learning","authors":"Fengrong Lv, Zeyu Dong, T. Wan, Kaili Jiang, Xueli Fang, Lei Zhang","doi":"10.1109/ICCEA53728.2021.00059","DOIUrl":"https://doi.org/10.1109/ICCEA53728.2021.00059","url":null,"abstract":"The ambiguity function describes the joint characteristics of the signal in the time domain and the frequency domain, and is usually used for signal recognition. The time domain and frequency domain distribution of noise is more spurious than the signal. Its ambiguity function can also reflect its characteristics. However, the direct use of the ambiguity function as the signal feature will increase the amount of calculation of the detection system, so slice it, which reduces the burden on the system for detecting signal information while preserving the information. At the same time, the radar signal detection based on neural network can avoid the influence of artificially setting the threshold on the detection performance of the system. So, we propose an algorithm for inputting the extracted fuzzy function slice sequence into a neural network to realize signal detection. Simulation proves that when the signal-to-noise ratio of the received signal is very low, our proposed method still has a high detection probability.","PeriodicalId":325790,"journal":{"name":"2021 International Conference on Computer Engineering and Application (ICCEA)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129978406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Rock painting restoration method based on saliency detection and TV model 基于显著性检测和电视模型的岩画修复方法
Pub Date : 2021-06-01 DOI: 10.1109/ICCEA53728.2021.00032
Yin Yue, Zhou Jun
Traditional restoration algorithms are not effective enough to fully repair rock paintings. The barley lithology is used as an example in this work to demonstrate a novel repair algorithm based on saliency detection and total variation (TV). The damage detection area of the rock painting image is extracted by saliency detection, then the improved TV model is applied to complete the repair. Experiments show that the proposed algorithm can effectively improve the poor robustness and virtual boundary of the traditional TV model image restoration algorithm, and make the image smoother and achieve better repair results. At the same time, a set of solutions for the extraction and restoration of structural rock paintings has been formed.
传统的修复算法不足以完全修复岩画。本文以大麦岩性为例,展示了一种基于显著性检测和总变异(TV)的修复算法。通过显著性检测提取岩画图像的损伤检测区域,然后应用改进的TV模型完成修复。实验表明,该算法能有效改善传统电视模型图像恢复算法鲁棒性差和虚边界的问题,使图像更加平滑,修复效果更好。同时,形成了一套结构岩画提取与修复的解决方案。
{"title":"Rock painting restoration method based on saliency detection and TV model","authors":"Yin Yue, Zhou Jun","doi":"10.1109/ICCEA53728.2021.00032","DOIUrl":"https://doi.org/10.1109/ICCEA53728.2021.00032","url":null,"abstract":"Traditional restoration algorithms are not effective enough to fully repair rock paintings. The barley lithology is used as an example in this work to demonstrate a novel repair algorithm based on saliency detection and total variation (TV). The damage detection area of the rock painting image is extracted by saliency detection, then the improved TV model is applied to complete the repair. Experiments show that the proposed algorithm can effectively improve the poor robustness and virtual boundary of the traditional TV model image restoration algorithm, and make the image smoother and achieve better repair results. At the same time, a set of solutions for the extraction and restoration of structural rock paintings has been formed.","PeriodicalId":325790,"journal":{"name":"2021 International Conference on Computer Engineering and Application (ICCEA)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128774797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detection approach of webshell attacks based on multi-dimensional dynamic features 基于多维动态特征的webshell攻击检测方法
Pub Date : 2021-06-01 DOI: 10.1109/ICCEA53728.2021.00056
Z. Jiawen, Cao Xiaomei, Wang Shaohui
Feature extraction is a critical step when using machine learning. High-quality features help improve model performance. Feature extraction methods are still not perfect in current webshell detection schemes based on machine learning, so there is still room for improvement in webshell detection accuracy. Aimed at solving the imperfect feature extraction problem, a webshell attack detection method based on multi-dimensional dynamic features is proposed. In addition to source code of a PHP file, its opcode sequence is analyzed and processed to reduce the impact of obfuscation and encryption technology on attack detection. To improve webshell detection accuracy, TextRank algorithm of natural language processing is introduced to extract relevant features, providing optimized data for subsequent training machine learning algorithm. Simulation experiment results show that the proposed method can accurately distinguish between normal pages and webshell attacks, and the accuracy rate is as high as 99.574%.
特征提取是使用机器学习的关键步骤。高质量的特性有助于提高模型性能。目前基于机器学习的webshell检测方案中,特征提取方法还不够完善,因此webshell检测的准确率还有提升的空间。针对特征提取不完善的问题,提出了一种基于多维动态特征的webshell攻击检测方法。除了PHP文件的源代码外,还对其操作码序列进行了分析和处理,以减少混淆和加密技术对攻击检测的影响。为了提高webshell检测准确率,引入自然语言处理的TextRank算法提取相关特征,为后续训练机器学习算法提供优化数据。仿真实验结果表明,该方法能够准确区分正常页面和webshell攻击,准确率高达99.574%。
{"title":"Detection approach of webshell attacks based on multi-dimensional dynamic features","authors":"Z. Jiawen, Cao Xiaomei, Wang Shaohui","doi":"10.1109/ICCEA53728.2021.00056","DOIUrl":"https://doi.org/10.1109/ICCEA53728.2021.00056","url":null,"abstract":"Feature extraction is a critical step when using machine learning. High-quality features help improve model performance. Feature extraction methods are still not perfect in current webshell detection schemes based on machine learning, so there is still room for improvement in webshell detection accuracy. Aimed at solving the imperfect feature extraction problem, a webshell attack detection method based on multi-dimensional dynamic features is proposed. In addition to source code of a PHP file, its opcode sequence is analyzed and processed to reduce the impact of obfuscation and encryption technology on attack detection. To improve webshell detection accuracy, TextRank algorithm of natural language processing is introduced to extract relevant features, providing optimized data for subsequent training machine learning algorithm. Simulation experiment results show that the proposed method can accurately distinguish between normal pages and webshell attacks, and the accuracy rate is as high as 99.574%.","PeriodicalId":325790,"journal":{"name":"2021 International Conference on Computer Engineering and Application (ICCEA)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122134935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sentiment Analysis of Financial Texts Based on Attention Mechanism of FinBERT and BiLSTM 基于FinBERT和BiLSTM注意机制的财经文本情感分析
Pub Date : 2021-06-01 DOI: 10.1109/ICCEA53728.2021.00022
Wenjuan Cheng, Siyi Chen
More and more studies are using sophisticated textual sentiment models to help us better understand behavioral finance patterns across financial market participants. Most of the existing sentiment analysis methods are oriented to general fields. Most text representation extraction methods use fixed token encoders. Generally, sentiment analysis models are invalid for financial applications. To overcome these challenges, a text sentiment analysis model (BBiLSTM-Attention) for financial fields is proposed. The model uses the pre-training language model FinBERT as a feature extractor to dynamically obtain the context information of comments, and combinate BiLSTM and multiple attention mechanisms to extract the sentiment of financial comments. Experiments is performed using financial field commentary dataset. The results show improved accuracy and generalization ability, accuracy reached 79.33%, and F1-score reached 0.8068.
越来越多的研究使用复杂的文本情感模型来帮助我们更好地理解金融市场参与者的行为金融模式。现有的情感分析方法大多面向一般领域。大多数文本表示提取方法使用固定标记编码器。一般来说,情感分析模型在金融应用中是无效的。为了克服这些挑战,本文提出了一种金融领域的文本情感分析模型(BBiLSTM-Attention)。该模型采用预训练语言模型FinBERT作为特征提取器,动态获取评论的上下文信息,并结合BiLSTM和多注意机制提取财务评论的情感。实验使用金融领域评论数据集进行。结果表明,准确率和泛化能力均有提高,准确率达到79.33%,f1得分达到0.8068。
{"title":"Sentiment Analysis of Financial Texts Based on Attention Mechanism of FinBERT and BiLSTM","authors":"Wenjuan Cheng, Siyi Chen","doi":"10.1109/ICCEA53728.2021.00022","DOIUrl":"https://doi.org/10.1109/ICCEA53728.2021.00022","url":null,"abstract":"More and more studies are using sophisticated textual sentiment models to help us better understand behavioral finance patterns across financial market participants. Most of the existing sentiment analysis methods are oriented to general fields. Most text representation extraction methods use fixed token encoders. Generally, sentiment analysis models are invalid for financial applications. To overcome these challenges, a text sentiment analysis model (BBiLSTM-Attention) for financial fields is proposed. The model uses the pre-training language model FinBERT as a feature extractor to dynamically obtain the context information of comments, and combinate BiLSTM and multiple attention mechanisms to extract the sentiment of financial comments. Experiments is performed using financial field commentary dataset. The results show improved accuracy and generalization ability, accuracy reached 79.33%, and F1-score reached 0.8068.","PeriodicalId":325790,"journal":{"name":"2021 International Conference on Computer Engineering and Application (ICCEA)","volume":"433 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122802013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Robustness and Discrimination Oriented Image Hashing with CVA and Texture Structure Descriptor 基于CVA和纹理结构描述符的图像哈希算法
Pub Date : 2021-06-01 DOI: 10.1109/ICCEA53728.2021.00015
Guiping Sun
Image hashing is an essential technology for the community of multimedia security, and has been extensively applied in image authentication and content protection. This paper designs a new image hashing scheme with CVA and texture structure descriptor. A valuable contribution is the color DWT (Discrete Wavelet Transform) representation by incorporating CVA (color vector angle) matrix into LL sub-band. Since CVA can well retain the color information, desirable discrimination of our hashing is achieved. In addition, as LBP (local binary pattern) is texture structure descriptor, feature extraction with LBP from the color DWT representation ensures good classification performance between robustness and discrimination. The effectiveness of our hashing scheme is validated by various experiments with open databases. Experimental results demonstrate that the proposed image hashing scheme is superior to the state-of-the-art schemes in terms of classification performance between perceptual robustness and discriminative capability.
图像哈希是多媒体安全领域的一项重要技术,在图像认证和内容保护方面得到了广泛的应用。本文设计了一种基于CVA和纹理结构描述符的图像哈希算法。一个有价值的贡献是通过将CVA(颜色向量角)矩阵合并到LL子带的颜色DWT(离散小波变换)表示。由于CVA可以很好地保留颜色信息,因此可以实现理想的哈希判别。此外,由于LBP (local binary pattern)是纹理结构描述符,利用LBP从颜色DWT表示中提取特征,保证了鲁棒性和判别性之间良好的分类性能。通过在开放数据库上的各种实验验证了该散列方案的有效性。实验结果表明,所提出的图像哈希算法在感知鲁棒性和判别能力两方面的分类性能优于现有算法。
{"title":"Robustness and Discrimination Oriented Image Hashing with CVA and Texture Structure Descriptor","authors":"Guiping Sun","doi":"10.1109/ICCEA53728.2021.00015","DOIUrl":"https://doi.org/10.1109/ICCEA53728.2021.00015","url":null,"abstract":"Image hashing is an essential technology for the community of multimedia security, and has been extensively applied in image authentication and content protection. This paper designs a new image hashing scheme with CVA and texture structure descriptor. A valuable contribution is the color DWT (Discrete Wavelet Transform) representation by incorporating CVA (color vector angle) matrix into LL sub-band. Since CVA can well retain the color information, desirable discrimination of our hashing is achieved. In addition, as LBP (local binary pattern) is texture structure descriptor, feature extraction with LBP from the color DWT representation ensures good classification performance between robustness and discrimination. The effectiveness of our hashing scheme is validated by various experiments with open databases. Experimental results demonstrate that the proposed image hashing scheme is superior to the state-of-the-art schemes in terms of classification performance between perceptual robustness and discriminative capability.","PeriodicalId":325790,"journal":{"name":"2021 International Conference on Computer Engineering and Application (ICCEA)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122845855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on the Typical Application of Knowledge Graph in Power Marketing 知识图谱在电力营销中的典型应用研究
Pub Date : 2021-06-01 DOI: 10.1109/ICCEA53728.2021.00069
W. Meng, Dongning Zhang, Tengxuan Guo, Zhenguo Zong, Yijuan Liu, Yanmei Wang, Jing Li, Weiyi Zhu
On the premise of introducing the knowledge graph and its application in the daily scenarios of power grids, and building and displaying the knowledge graph for specific scenarios, this study intuitively shows the correlation of each link in each scenario and discovers the corresponding problems. Reasonable suggestions are accordingly made to improve the daily work patterns, enhance the service quality of each link, and boost the refinement of the management of daily affairs. Through the application of knowledge graph in the typical daily scenarios in power marketing, this paper aims to form a panoramic knowledge graph of the power grids on the basis of smart brain among all businesses and organizations in the near future to promote the intelligent operation of the power grids [1].
本研究在介绍知识图谱及其在电网日常场景中的应用,构建并展示具体场景知识图谱的前提下,直观地展示了每个场景中各个环节的相关性,并发现了相应的问题。据此提出合理化建议,改进日常工作模式,提升各环节服务质量,推动日常事务管理精细化。本文旨在通过知识图谱在电力营销典型日常场景中的应用,在不久的将来,在所有企业和组织之间形成基于智能大脑的电网全景知识图谱,促进电网的智能化运行[1]。
{"title":"Research on the Typical Application of Knowledge Graph in Power Marketing","authors":"W. Meng, Dongning Zhang, Tengxuan Guo, Zhenguo Zong, Yijuan Liu, Yanmei Wang, Jing Li, Weiyi Zhu","doi":"10.1109/ICCEA53728.2021.00069","DOIUrl":"https://doi.org/10.1109/ICCEA53728.2021.00069","url":null,"abstract":"On the premise of introducing the knowledge graph and its application in the daily scenarios of power grids, and building and displaying the knowledge graph for specific scenarios, this study intuitively shows the correlation of each link in each scenario and discovers the corresponding problems. Reasonable suggestions are accordingly made to improve the daily work patterns, enhance the service quality of each link, and boost the refinement of the management of daily affairs. Through the application of knowledge graph in the typical daily scenarios in power marketing, this paper aims to form a panoramic knowledge graph of the power grids on the basis of smart brain among all businesses and organizations in the near future to promote the intelligent operation of the power grids [1].","PeriodicalId":325790,"journal":{"name":"2021 International Conference on Computer Engineering and Application (ICCEA)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124548401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Dual Mapping Model for Virtual-real Fusion in 5G 5G虚实融合的双映射模型
Pub Date : 2021-06-01 DOI: 10.1109/ICCEA53728.2021.00031
Gao Xirong, Li Dan
The research believes that there may be some mutual conversion and interaction mechanism between entity and virtual mirroring. The mathematical structure of virtual space and real space were described by matrix algebra tools. Then, the physical and cyberspace matrix corresponding to virtual-real space were set. After the feature information of entity was classified from the perspective of technical realization, a path of deconstruction and reconstruction of entity to mirror conversion was designed to prove the process of virtual-real fusion. Influence factor were considered, sensitivity and conversion noise, then the dual mapping model for virtual-real fusion is constructed. The case of Internet of vehicle for the mapping was demonstrated. The results above had enriched the theory of the virtual-real fusion of physical space and cyberspace.
研究认为,实体镜像与虚拟镜像之间可能存在某种相互转换和交互作用的机制。利用矩阵代数工具描述了虚空间和实空间的数学结构。然后,设置与虚实空间相对应的物理矩阵和网络空间矩阵。从技术实现的角度对实体的特征信息进行分类后,设计了实体解构重构到镜像转换的路径,证明了虚实融合的过程。在考虑灵敏度和转换噪声等影响因素的基础上,建立了虚实融合的对偶映射模型。以车联网为例进行了地图绘制。上述结果丰富了物理空间与网络空间虚实融合的理论。
{"title":"A Dual Mapping Model for Virtual-real Fusion in 5G","authors":"Gao Xirong, Li Dan","doi":"10.1109/ICCEA53728.2021.00031","DOIUrl":"https://doi.org/10.1109/ICCEA53728.2021.00031","url":null,"abstract":"The research believes that there may be some mutual conversion and interaction mechanism between entity and virtual mirroring. The mathematical structure of virtual space and real space were described by matrix algebra tools. Then, the physical and cyberspace matrix corresponding to virtual-real space were set. After the feature information of entity was classified from the perspective of technical realization, a path of deconstruction and reconstruction of entity to mirror conversion was designed to prove the process of virtual-real fusion. Influence factor were considered, sensitivity and conversion noise, then the dual mapping model for virtual-real fusion is constructed. The case of Internet of vehicle for the mapping was demonstrated. The results above had enriched the theory of the virtual-real fusion of physical space and cyberspace.","PeriodicalId":325790,"journal":{"name":"2021 International Conference on Computer Engineering and Application (ICCEA)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130456045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Radar Active Deception Jamming Identification Method Based on RESNET and Bispectrum Features 基于RESNET和双谱特征的雷达主动欺骗干扰识别方法研究
Pub Date : 2021-06-01 DOI: 10.1109/ICCEA53728.2021.00102
Kunteng Wang, Zeyu Dong, T. Wan, Kaili Jiang, Wanan Xiong, Xueli Fang
In the complex electromagnetic environment of modern electronic warfare, active deception jamming poses a serious threat to radar. This paper proposes the identification of active deception jamming based on residual neural network (RESNET), and studies the bispectral characteristics of the signal and the method of identifying the active deception jamming of RESNET. This algorithm firstly extracts the bispectral features of the jamming signal, and uses the bispectral diagonal slice as the input of RSNET to realize the recognition of active deception jamming. Simulation results show that the algorithm has high recognition accuracy, not only has good anti-noise performance, but also has excellent robustness under low JSR.
在现代电子战复杂的电磁环境中,主动欺骗干扰对雷达构成了严重威胁。提出了基于残差神经网络(RESNET)的有源欺骗干扰识别方法,研究了信号的双谱特征及RESNET有源欺骗干扰的识别方法。该算法首先提取干扰信号的双谱特征,利用双谱对角片作为RSNET的输入,实现对有源欺骗干扰的识别。仿真结果表明,该算法具有较高的识别精度,不仅具有良好的抗噪声性能,而且在低JSR下具有优异的鲁棒性。
{"title":"Research on Radar Active Deception Jamming Identification Method Based on RESNET and Bispectrum Features","authors":"Kunteng Wang, Zeyu Dong, T. Wan, Kaili Jiang, Wanan Xiong, Xueli Fang","doi":"10.1109/ICCEA53728.2021.00102","DOIUrl":"https://doi.org/10.1109/ICCEA53728.2021.00102","url":null,"abstract":"In the complex electromagnetic environment of modern electronic warfare, active deception jamming poses a serious threat to radar. This paper proposes the identification of active deception jamming based on residual neural network (RESNET), and studies the bispectral characteristics of the signal and the method of identifying the active deception jamming of RESNET. This algorithm firstly extracts the bispectral features of the jamming signal, and uses the bispectral diagonal slice as the input of RSNET to realize the recognition of active deception jamming. Simulation results show that the algorithm has high recognition accuracy, not only has good anti-noise performance, but also has excellent robustness under low JSR.","PeriodicalId":325790,"journal":{"name":"2021 International Conference on Computer Engineering and Application (ICCEA)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134382628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Dynamic Gain Military Game Algorithm Based on Episodic Memory 基于情景记忆的动态增益军事博弈算法
Pub Date : 2021-06-01 DOI: 10.1109/ICCEA53728.2021.00013
Jun He, Jun Yang
In recent years, the development of deep reinforcement learning has become a new research frontier in the field of artificial intelligence. In the complex and changeable battlefield environment of military confrontation, how to use reinforcement learning methods to assist in formulating a set of efficient military game strategies has become a new research direction. The military game confrontation environment usually uses static reward settings ignoring the importance of captured target in the tactical arrangement. This paper starts from the use of episodic memory Q-network model to train drone swarm confrontation and uses expert knowledge to design a local state target threat assessment method. By analyzing the threat indicator of killed target, it provides drones with dynamic rewards to help drones comb local situation. Aiming at the problem that the static weight of episodic memory is very inefficient by manual adjustment in complex military confrontation environment, we use dynamic weight adjustment strategy inspired by multitask learning. Through the improvement of above method, we establish a dynamic gain drones confrontation model based on episodic memory with methods of dynamic reward mechanism and dynamic weight adjustment. The effectiveness of model is verified by machine-to-machine confrontation which provides thoughts for the analysis of military game decision-making in the complex battlefield environment.
近年来,深度强化学习的发展成为人工智能领域一个新的研究前沿。在军事对抗复杂多变的战场环境下,如何利用强化学习方法辅助制定一套高效的军事博弈策略成为新的研究方向。军事博弈对抗环境通常采用静态奖励设置,忽略了捕获目标在战术安排中的重要性。本文从使用情景记忆q网络模型训练无人机群对抗入手,利用专家知识设计了一种局部状态目标威胁评估方法。通过分析被击杀目标的威胁指标,为无人机提供动态奖励,帮助无人机梳理局部情况。针对复杂军事对抗环境下情景记忆的静态权重通过人工调整效率低下的问题,采用多任务学习启发的动态权重调整策略。通过对上述方法的改进,采用动态奖励机制和动态权重调整方法,建立了基于情景记忆的动态增益无人机对抗模型。通过机对机对抗验证了模型的有效性,为复杂战场环境下军事博弈决策分析提供了思路。
{"title":"Dynamic Gain Military Game Algorithm Based on Episodic Memory","authors":"Jun He, Jun Yang","doi":"10.1109/ICCEA53728.2021.00013","DOIUrl":"https://doi.org/10.1109/ICCEA53728.2021.00013","url":null,"abstract":"In recent years, the development of deep reinforcement learning has become a new research frontier in the field of artificial intelligence. In the complex and changeable battlefield environment of military confrontation, how to use reinforcement learning methods to assist in formulating a set of efficient military game strategies has become a new research direction. The military game confrontation environment usually uses static reward settings ignoring the importance of captured target in the tactical arrangement. This paper starts from the use of episodic memory Q-network model to train drone swarm confrontation and uses expert knowledge to design a local state target threat assessment method. By analyzing the threat indicator of killed target, it provides drones with dynamic rewards to help drones comb local situation. Aiming at the problem that the static weight of episodic memory is very inefficient by manual adjustment in complex military confrontation environment, we use dynamic weight adjustment strategy inspired by multitask learning. Through the improvement of above method, we establish a dynamic gain drones confrontation model based on episodic memory with methods of dynamic reward mechanism and dynamic weight adjustment. The effectiveness of model is verified by machine-to-machine confrontation which provides thoughts for the analysis of military game decision-making in the complex battlefield environment.","PeriodicalId":325790,"journal":{"name":"2021 International Conference on Computer Engineering and Application (ICCEA)","volume":"162 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133288289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Software Support Process 软件支持过程研究
Pub Date : 2021-06-01 DOI: 10.1109/ICCEA53728.2021.00088
Wei Zhang, Dahai Jin, Zhiqing Shi, Xiangxuan Tian
With the rapid development of information technology, the status and role of software are more and more prominent. At the same time, due to the increasing scale and complexity, software problems are also increasing. Therefore, the importance of software support is also increasing. This paper briefly introduces the concept and classification of software support, puts forward the process of pre-deployment software support and post-deployment software support, and then discusses the principles and agency of software support.
随着信息技术的飞速发展,软件的地位和作用越来越突出。同时,由于规模和复杂性的不断增加,软件问题也越来越多。因此,软件支持的重要性也在增加。简要介绍了软件支持的概念和分类,提出了部署前软件支持和部署后软件支持的流程,讨论了软件支持的原则和机构。
{"title":"Research on Software Support Process","authors":"Wei Zhang, Dahai Jin, Zhiqing Shi, Xiangxuan Tian","doi":"10.1109/ICCEA53728.2021.00088","DOIUrl":"https://doi.org/10.1109/ICCEA53728.2021.00088","url":null,"abstract":"With the rapid development of information technology, the status and role of software are more and more prominent. At the same time, due to the increasing scale and complexity, software problems are also increasing. Therefore, the importance of software support is also increasing. This paper briefly introduces the concept and classification of software support, puts forward the process of pre-deployment software support and post-deployment software support, and then discusses the principles and agency of software support.","PeriodicalId":325790,"journal":{"name":"2021 International Conference on Computer Engineering and Application (ICCEA)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131294527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2021 International Conference on Computer Engineering and Application (ICCEA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1