首页 > 最新文献

2022 21st International Symposium on Communications and Information Technologies (ISCIT)最新文献

英文 中文
Improved Decision Based Adaptive Threshold Median Filter for Fingerprint Image Salt and Pepper Noise Denoising 基于改进决策的自适应阈值中值滤波指纹图像椒盐噪声去噪
Pub Date : 2022-09-27 DOI: 10.1109/ISCIT55906.2022.9931257
Xi Lin, Lianfang Tian, Qiliang Du, Chuanbo Qin
This paper proposes an Improved Decision Based Adaptive Threshold Median Filter(IDBATMF) for fingerprint image salt and pepper noise denoising, which can more effectively remove the salt and pepper noise in fingerprint images and preserve the details of the image. The algorithm first detects noise, introduces the minimum absolute brightness difference to reflect the difference between candidate noise pixels and surrounding non-noise pixels, and innovatively sets a linear threshold, which is adapted to the local noise density and compared with the minimum absolute brightness difference to distinguish noise pixels. When removing noise, the window size used is determined by the extreme pixel density in the window, and the median of the non-extreme pixel in the window is used for replacement. The methods mentioned in this paper are compared with Standard Median Filter (SMF), Adaptive Median Filter (AMF), Modified Adaptive Median Filter (MAMF), Switching Median Filter (SWMF), Adaptive Switching Median Filter (ASMF), the Decision Based Algorithm (DBA), and the Modified Decision Based Algorithm (MDBA). The experimental results show that, compared with the existing methods, the method proposed in this paper better considers the local characteristics of the image, and has better processing effect under various noise densities.
本文提出了一种改进的基于决策的自适应阈值中值滤波器(IDBATMF)用于指纹图像椒盐噪声去噪,能够更有效地去除指纹图像中的椒盐噪声并保留图像的细节。该算法首先对噪声进行检测,引入最小绝对亮度差来反映候选噪声像素与周围非噪声像素之间的差异,并创新地设置线性阈值,该阈值适应局部噪声密度,与最小绝对亮度差进行比较来区分噪声像素。在去除噪声时,使用的窗口大小由窗口内的极值像素密度决定,使用窗口内非极值像素的中值进行替换。本文所提到的方法与标准中值滤波器(SMF)、自适应中值滤波器(AMF)、改进自适应中值滤波器(MAMF)、切换中值滤波器(SWMF)、自适应切换中值滤波器(ASMF)、基于决策的算法(DBA)和改进的基于决策的算法(MDBA)进行了比较。实验结果表明,与现有方法相比,本文提出的方法更好地考虑了图像的局部特征,在不同噪声密度下具有更好的处理效果。
{"title":"Improved Decision Based Adaptive Threshold Median Filter for Fingerprint Image Salt and Pepper Noise Denoising","authors":"Xi Lin, Lianfang Tian, Qiliang Du, Chuanbo Qin","doi":"10.1109/ISCIT55906.2022.9931257","DOIUrl":"https://doi.org/10.1109/ISCIT55906.2022.9931257","url":null,"abstract":"This paper proposes an Improved Decision Based Adaptive Threshold Median Filter(IDBATMF) for fingerprint image salt and pepper noise denoising, which can more effectively remove the salt and pepper noise in fingerprint images and preserve the details of the image. The algorithm first detects noise, introduces the minimum absolute brightness difference to reflect the difference between candidate noise pixels and surrounding non-noise pixels, and innovatively sets a linear threshold, which is adapted to the local noise density and compared with the minimum absolute brightness difference to distinguish noise pixels. When removing noise, the window size used is determined by the extreme pixel density in the window, and the median of the non-extreme pixel in the window is used for replacement. The methods mentioned in this paper are compared with Standard Median Filter (SMF), Adaptive Median Filter (AMF), Modified Adaptive Median Filter (MAMF), Switching Median Filter (SWMF), Adaptive Switching Median Filter (ASMF), the Decision Based Algorithm (DBA), and the Modified Decision Based Algorithm (MDBA). The experimental results show that, compared with the existing methods, the method proposed in this paper better considers the local characteristics of the image, and has better processing effect under various noise densities.","PeriodicalId":325919,"journal":{"name":"2022 21st International Symposium on Communications and Information Technologies (ISCIT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124504742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Covert Communication and Image Authentication Algorithm Based on Adversarial Examples 基于对抗性示例的隐蔽通信和图像认证算法
Pub Date : 2022-09-27 DOI: 10.1109/ISCIT55906.2022.9931289
Qiwen Wu, Zijing Feng, Yingkai Huang, Jiehui Zhong, Xiaolong Liu
The research on the application of adversarial examples mainly focuses on considering adversarial examples as a threat in the past. In order to make better use of the adversarial examples, rather than just taking it as the defects of neural network, a covert communication method based on adversarial examples is proposed in this paper. Using the characteristics that adversarial examples can carry information, we combine it with specific coding rules to develop a covert communication algorithm. Unlike the traditional steganography, the secret information is not contained in the communication content of the sender and the receiver itself in the proposed scheme. The mapping relationship between adversarial examples and secret information is hidden in the neural network model, so as to realize the hidden transmission of information and improve the concealment and security of communication. At the same time, the tamper identification is embedded in the tensor of adversarial output. When the image is modified during transmission, the tamper identification will also change, so that the image can be authenticated. Experiments show the feasibility of the algorithm and verify that it can completely extract secret information from the encrypted image adversarial example and authenticate the integrity of the image.
过去对对抗性样例应用的研究主要集中在将对抗性样例视为一种威胁。为了更好地利用对抗样例,而不是将其视为神经网络的缺陷,本文提出了一种基于对抗样例的隐蔽通信方法。利用对抗性示例可以携带信息的特点,我们将其与特定的编码规则相结合,开发了一种隐蔽通信算法。与传统的隐写技术不同,该方案中的秘密信息不包含在发送方和接收方本身的通信内容中。将对抗实例与秘密信息的映射关系隐藏在神经网络模型中,从而实现信息的隐式传输,提高通信的隐蔽性和安全性。同时,将篡改识别嵌入到对抗输出的张量中。当图像在传输过程中被修改时,篡改者标识也会发生变化,从而可以对图像进行认证。实验证明了该算法的可行性,并验证了该算法能够完全从加密图像对抗示例中提取秘密信息,验证图像的完整性。
{"title":"Covert Communication and Image Authentication Algorithm Based on Adversarial Examples","authors":"Qiwen Wu, Zijing Feng, Yingkai Huang, Jiehui Zhong, Xiaolong Liu","doi":"10.1109/ISCIT55906.2022.9931289","DOIUrl":"https://doi.org/10.1109/ISCIT55906.2022.9931289","url":null,"abstract":"The research on the application of adversarial examples mainly focuses on considering adversarial examples as a threat in the past. In order to make better use of the adversarial examples, rather than just taking it as the defects of neural network, a covert communication method based on adversarial examples is proposed in this paper. Using the characteristics that adversarial examples can carry information, we combine it with specific coding rules to develop a covert communication algorithm. Unlike the traditional steganography, the secret information is not contained in the communication content of the sender and the receiver itself in the proposed scheme. The mapping relationship between adversarial examples and secret information is hidden in the neural network model, so as to realize the hidden transmission of information and improve the concealment and security of communication. At the same time, the tamper identification is embedded in the tensor of adversarial output. When the image is modified during transmission, the tamper identification will also change, so that the image can be authenticated. Experiments show the feasibility of the algorithm and verify that it can completely extract secret information from the encrypted image adversarial example and authenticate the integrity of the image.","PeriodicalId":325919,"journal":{"name":"2022 21st International Symposium on Communications and Information Technologies (ISCIT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125276041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fast CU Partition Decision Algorithm for AVS3 Based on Frequency Domain 基于频域的AVS3快速CU分区决策算法
Pub Date : 2022-09-27 DOI: 10.1109/ISCIT55906.2022.9931199
Chenggang Xu, Yi Wu, Lei Chen, Zihao Liu, Ceyao Cao
The third generation of Audio Video coding Standard (AVS3) is an emerging video coding standard that surpasses High Efficiency Video Coding (HEVC). AVS3 allows flexible block subdivision to achieve great coding performance by applying Quad- Tree (QT), Binary-Tree (BT) and Extend Quad-Tree (EQT) partition structure, while the increased flexibility comes at the cost of enormous computational complexity. In this paper, we present a novel fast partition algorithm for all coding units (CUs) based on Discrete cosine transform (DCT) coefficients in frequency domain, which can also obtain the image texture features like Spatial domain and guide to skip horizontal/vertical BT/EQT partition of CUs or early terminate the partition of flat CUs. Experimental results show that the proposed fast CU partition algorithm achieves about a 26 % encoding time reduction on average with only a 0.45 % Bjantegaard Delta Bit Rate (BDBR) increase for the AVS3 reference software HPM 14.0 under All-Intra configuration.
第三代音频视频编码标准(AVS3)是超越HEVC (High Efficiency Video coding)的新兴视频编码标准。AVS3允许灵活的块细分通过应用四叉树(QT)、二叉树(BT)和扩展四叉树(EQT)分区结构来实现出色的编码性能,而增加的灵活性是以巨大的计算复杂度为代价的。本文提出了一种基于频域离散余弦变换(DCT)系数对所有编码单元(cu)进行快速划分的新算法,该算法还可以获得图像的空间域等纹理特征,并指导跳过cu的水平/垂直BT/EQT划分或提前终止平面cu的划分。实验结果表明,对于AVS3参考软件HPM 14.0,在All-Intra配置下,所提出的快速CU划分算法平均可减少26%的编码时间,仅增加0.45%的BDBR (Bjantegaard Delta比特率)。
{"title":"Fast CU Partition Decision Algorithm for AVS3 Based on Frequency Domain","authors":"Chenggang Xu, Yi Wu, Lei Chen, Zihao Liu, Ceyao Cao","doi":"10.1109/ISCIT55906.2022.9931199","DOIUrl":"https://doi.org/10.1109/ISCIT55906.2022.9931199","url":null,"abstract":"The third generation of Audio Video coding Standard (AVS3) is an emerging video coding standard that surpasses High Efficiency Video Coding (HEVC). AVS3 allows flexible block subdivision to achieve great coding performance by applying Quad- Tree (QT), Binary-Tree (BT) and Extend Quad-Tree (EQT) partition structure, while the increased flexibility comes at the cost of enormous computational complexity. In this paper, we present a novel fast partition algorithm for all coding units (CUs) based on Discrete cosine transform (DCT) coefficients in frequency domain, which can also obtain the image texture features like Spatial domain and guide to skip horizontal/vertical BT/EQT partition of CUs or early terminate the partition of flat CUs. Experimental results show that the proposed fast CU partition algorithm achieves about a 26 % encoding time reduction on average with only a 0.45 % Bjantegaard Delta Bit Rate (BDBR) increase for the AVS3 reference software HPM 14.0 under All-Intra configuration.","PeriodicalId":325919,"journal":{"name":"2022 21st International Symposium on Communications and Information Technologies (ISCIT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131235575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Spatial-Temporal Content Popularity Prediction in Cache Enabled Cellular Networks 缓存支持蜂窝网络的时空内容流行度预测
Pub Date : 2022-09-27 DOI: 10.1109/ISCIT55906.2022.9931189
Li Li, Hongfeng Tian, Yapeng Wang, Tiankui Zhang
With the development of Internet and mobile communication technology, the mobile network traffic is increasing at exponential rates. Edge caching is a promising technology to reduce network load and content distribution delay. Through content popularity prediction, cache revenue and network per-formance can be improved. This paper proposes a temporal graph convolutional network (TGCN) based content popularity prediction algorithm, which explore the spatial-temporal two-dimensional features in the cellular networks. The proposed TGCN algorithm captures the temporal-dimension dependence from the content request sequence in the base stations (BSs) and the spatial-dimension dependence from different BSs. Then the content request at each BS in the next time cycle is predicted by TGCN. Simulation results show that, compared with the existing algorithms, the proposed algorithm can effectively improve the prediction accuracy of content requests, at least 3%, and improve the cache hit rate of the networks.
随着互联网和移动通信技术的发展,移动网络流量呈指数级增长。边缘缓存是一种很有前途的技术,可以减少网络负载和内容分发延迟。通过内容流行度预测,可以提高缓存收益和网络性能。本文提出了一种基于时间图卷积网络(TGCN)的内容流行度预测算法,该算法探索了蜂窝网络中的时空二维特征。提出的TGCN算法从基站的内容请求序列中获取时间维度的相关性,从不同基站中获取空间维度的相关性。然后通过TGCN预测下一个时间周期内每个BS的内容请求。仿真结果表明,与现有算法相比,所提算法能有效提高内容请求的预测精度,至少提高3%,并提高网络的缓存命中率。
{"title":"Spatial-Temporal Content Popularity Prediction in Cache Enabled Cellular Networks","authors":"Li Li, Hongfeng Tian, Yapeng Wang, Tiankui Zhang","doi":"10.1109/ISCIT55906.2022.9931189","DOIUrl":"https://doi.org/10.1109/ISCIT55906.2022.9931189","url":null,"abstract":"With the development of Internet and mobile communication technology, the mobile network traffic is increasing at exponential rates. Edge caching is a promising technology to reduce network load and content distribution delay. Through content popularity prediction, cache revenue and network per-formance can be improved. This paper proposes a temporal graph convolutional network (TGCN) based content popularity prediction algorithm, which explore the spatial-temporal two-dimensional features in the cellular networks. The proposed TGCN algorithm captures the temporal-dimension dependence from the content request sequence in the base stations (BSs) and the spatial-dimension dependence from different BSs. Then the content request at each BS in the next time cycle is predicted by TGCN. Simulation results show that, compared with the existing algorithms, the proposed algorithm can effectively improve the prediction accuracy of content requests, at least 3%, and improve the cache hit rate of the networks.","PeriodicalId":325919,"journal":{"name":"2022 21st International Symposium on Communications and Information Technologies (ISCIT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134189713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Visualization Tool of Microprocessor Instruction for Designing New Architecture with Meta-Instructions 基于元指令设计新体系结构的微处理器指令可视化工具
Pub Date : 2022-09-27 DOI: 10.1109/ISCIT55906.2022.9931311
Tomoyuki Morimoto, Shunsuke Onogi, Tadahiro Ogita, Ryota Kawamata, Ziming Wang, Toshiyuki Tsutsumi
When making a new microprocessor (MPU), the instruction set architecture is considered. It is also necessary to design how to work the instructions in hardware circuits of the MPU. As a solution to these, we previously proposed a method of expressing the instruction in two ways of semantic expression and functional expression. We also developed a tool that can visualize the instruction. In this paper, we have improved this method by extending a usual MPU to a meta-instruction for any MPU. We have also developed a conversion method for the meta-instruction using a relationship between the semantic and the functional expressions. Then we verified how well our meta-instruction can represent the usual instructions. It is confirmed that most of them can be represented by the meta-instruction. Since our developed tool user can design the meta-instructions from either semantic or functional expression and both expressions can be automatically converted to each other, they can design the instruction of a new MPU and can understand hardware circuits for the MPU instruction by the functional expression.
在制作新的微处理器(MPU)时,需要考虑指令集体系结构。此外,还需要对微处理器硬件电路中指令的工作方式进行设计。为了解决这些问题,我们之前提出了一种以语义表达和功能表达两种方式表达指令的方法。我们还开发了一种工具,可以将教学可视化。在本文中,我们改进了这种方法,将一个普通的MPU扩展为一个适用于任何MPU的元指令。我们还开发了一种利用语义表达式和函数表达式之间关系的元指令转换方法。然后我们验证了我们的元指令如何很好地表示通常的指令。证实了它们中的大多数都可以用元指令来表示。由于我们开发的工具用户既可以从语义表达式设计元指令,也可以从功能表达式设计元指令,并且语义表达式和功能表达式之间可以相互自动转换,因此用户可以设计新的微处理器指令,并可以通过功能表达式理解微处理器指令的硬件电路。
{"title":"Visualization Tool of Microprocessor Instruction for Designing New Architecture with Meta-Instructions","authors":"Tomoyuki Morimoto, Shunsuke Onogi, Tadahiro Ogita, Ryota Kawamata, Ziming Wang, Toshiyuki Tsutsumi","doi":"10.1109/ISCIT55906.2022.9931311","DOIUrl":"https://doi.org/10.1109/ISCIT55906.2022.9931311","url":null,"abstract":"When making a new microprocessor (MPU), the instruction set architecture is considered. It is also necessary to design how to work the instructions in hardware circuits of the MPU. As a solution to these, we previously proposed a method of expressing the instruction in two ways of semantic expression and functional expression. We also developed a tool that can visualize the instruction. In this paper, we have improved this method by extending a usual MPU to a meta-instruction for any MPU. We have also developed a conversion method for the meta-instruction using a relationship between the semantic and the functional expressions. Then we verified how well our meta-instruction can represent the usual instructions. It is confirmed that most of them can be represented by the meta-instruction. Since our developed tool user can design the meta-instructions from either semantic or functional expression and both expressions can be automatically converted to each other, they can design the instruction of a new MPU and can understand hardware circuits for the MPU instruction by the functional expression.","PeriodicalId":325919,"journal":{"name":"2022 21st International Symposium on Communications and Information Technologies (ISCIT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117097831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RAMA: Robust Auction Scheme with Multiple Authorities in IoT RAMA:物联网中具有多个授权的健壮拍卖方案
Pub Date : 2022-09-27 DOI: 10.1109/ISCIT55906.2022.9931197
Qian Meng, Zhuoyang Liang, Zhonghua Shen, Yong Liu, Yuying Liu, Jiamin Hu
With the vigorous development of the Internet of Things (IoT), technologies based on IoT have been widely used in various fields. Among them, the electronic auction technology based on the IoT has been applied. The traditional electronic auction scheme cannot be flexibly applied in IoT scenario and most auction schemes often have only one authority, which has a great burden on operation and low efficiency, resulting in a single-point performance bottleneck. In order to solve above problems, we use a hierarchical multiple authorities system to propose a Robust Auction scheme with Multiple Authorities in IoT (RAMA). Besides, a lightweight range query protocol which can get the highest bidder in electronic auction is adopted to avoid deploying expensive sensors and aggregators in the IoT configuration. Moreover, security of the hierarchical multiple authorities system have been proved through rigorous security analysis, which indicate that the adopted range query protocol not only ensures the security of encrypted bidding but also prevents it from being stolen by malicious adversaries. Finally, we conduct simulation experiments and analyze experimental results to verify the feasibility of the scheme. Specifically, when the number of bidders is 1000, the time-consuming to generate the secret key and the time-consuming to obtain the maximum bidding price are not exceed 0.5s in the simulation experiment.
随着物联网的蓬勃发展,基于物联网的技术已广泛应用于各个领域。其中,基于物联网的电子拍卖技术得到了应用。传统的电子拍卖方案无法灵活应用于物联网场景,多数拍卖方案往往只有一个权限,运营负担大,效率低,造成单点性能瓶颈。为了解决上述问题,我们使用分层多权限系统提出了物联网多权限鲁棒拍卖方案(RAMA)。此外,为了避免在物联网配置中部署昂贵的传感器和聚合器,采用了一种轻量级的范围查询协议,可以在电子拍卖中获得最高出价者。此外,通过严格的安全性分析,证明了分层多权限系统的安全性,表明所采用的范围查询协议既保证了加密竞价的安全性,又防止了加密竞价被恶意攻击者窃取。最后进行了仿真实验,并对实验结果进行了分析,验证了方案的可行性。具体来说,当投标人数量为1000时,仿真实验中生成密钥的时间和获得最高投标价格的时间均不超过0.5s。
{"title":"RAMA: Robust Auction Scheme with Multiple Authorities in IoT","authors":"Qian Meng, Zhuoyang Liang, Zhonghua Shen, Yong Liu, Yuying Liu, Jiamin Hu","doi":"10.1109/ISCIT55906.2022.9931197","DOIUrl":"https://doi.org/10.1109/ISCIT55906.2022.9931197","url":null,"abstract":"With the vigorous development of the Internet of Things (IoT), technologies based on IoT have been widely used in various fields. Among them, the electronic auction technology based on the IoT has been applied. The traditional electronic auction scheme cannot be flexibly applied in IoT scenario and most auction schemes often have only one authority, which has a great burden on operation and low efficiency, resulting in a single-point performance bottleneck. In order to solve above problems, we use a hierarchical multiple authorities system to propose a Robust Auction scheme with Multiple Authorities in IoT (RAMA). Besides, a lightweight range query protocol which can get the highest bidder in electronic auction is adopted to avoid deploying expensive sensors and aggregators in the IoT configuration. Moreover, security of the hierarchical multiple authorities system have been proved through rigorous security analysis, which indicate that the adopted range query protocol not only ensures the security of encrypted bidding but also prevents it from being stolen by malicious adversaries. Finally, we conduct simulation experiments and analyze experimental results to verify the feasibility of the scheme. Specifically, when the number of bidders is 1000, the time-consuming to generate the secret key and the time-consuming to obtain the maximum bidding price are not exceed 0.5s in the simulation experiment.","PeriodicalId":325919,"journal":{"name":"2022 21st International Symposium on Communications and Information Technologies (ISCIT)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117345203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Radio Map Construction Using Fingerprints Clustering and Voronoi Diagram for Indoor Positioning 基于指纹聚类和Voronoi图的室内定位无线地图构建
Pub Date : 2022-09-27 DOI: 10.1109/ISCIT55906.2022.9931255
Yun Fen Yong, Chee Keong Tan, Ian K. T. Tan, Su-Wei Tan
Bluetooth low energy (BLE)-based fingerprinting technique has received great attention in indoor localization systems. Despite its significant advantages, the offline site surveys to collect fingerprints to construct a radio map for precise localization in the online phase remain the key challenge because it requires tremendous human effort, time, and cost. To alleviate this issue, this paper presents a novel fingerprint interpolation technique for constructing the radio map based on reference point (RP) clustering and the Voronoi diagram. Firstly, the collected RPs are clustered based on a threshold value of received signal strength difference using the proposed clustering algorithm. A Voronoi diagram is drawn using the centroid of each cluster to partition the clusters in which virtual fingerprints are then generated using the Kriging interpolation algorithm to build a complete radio map. By grouping RPs with similar characteristics in the same region, more accurate virtual fingerprints can be inferred since the RPs in the same region have the tendency to experience similar multipath fading and signal shadowing effects. Experimental results show that the proposed scheme reduces the localization error up to 14% compared to the interpolation without clustering. As a result, we can overcome the site survey issues for IPS by constructing a radio map with more accurate localization results.
基于蓝牙低功耗(BLE)的指纹识别技术在室内定位系统中受到广泛关注。尽管具有显著的优势,但离线现场调查收集指纹以构建用于在线阶段精确定位的无线电地图仍然是主要的挑战,因为它需要大量的人力、时间和成本。为了解决这一问题,本文提出了一种基于参考点聚类和Voronoi图构建无线地图的指纹插值方法。首先,基于接收信号强度差阈值对采集到的rp进行聚类;利用每个聚类的质心绘制Voronoi图来划分聚类,然后使用Kriging插值算法生成虚拟指纹以构建完整的无线电地图。通过对同一区域内具有相似特征的rp进行分组,可以推断出更准确的虚拟指纹,因为同一区域内的rp往往会经历相似的多径衰落和信号阴影效应。实验结果表明,与不聚类的插值方法相比,该方法可将定位误差降低14%。因此,我们可以通过构建具有更准确定位结果的无线电地图来克服IPS的站点调查问题。
{"title":"Radio Map Construction Using Fingerprints Clustering and Voronoi Diagram for Indoor Positioning","authors":"Yun Fen Yong, Chee Keong Tan, Ian K. T. Tan, Su-Wei Tan","doi":"10.1109/ISCIT55906.2022.9931255","DOIUrl":"https://doi.org/10.1109/ISCIT55906.2022.9931255","url":null,"abstract":"Bluetooth low energy (BLE)-based fingerprinting technique has received great attention in indoor localization systems. Despite its significant advantages, the offline site surveys to collect fingerprints to construct a radio map for precise localization in the online phase remain the key challenge because it requires tremendous human effort, time, and cost. To alleviate this issue, this paper presents a novel fingerprint interpolation technique for constructing the radio map based on reference point (RP) clustering and the Voronoi diagram. Firstly, the collected RPs are clustered based on a threshold value of received signal strength difference using the proposed clustering algorithm. A Voronoi diagram is drawn using the centroid of each cluster to partition the clusters in which virtual fingerprints are then generated using the Kriging interpolation algorithm to build a complete radio map. By grouping RPs with similar characteristics in the same region, more accurate virtual fingerprints can be inferred since the RPs in the same region have the tendency to experience similar multipath fading and signal shadowing effects. Experimental results show that the proposed scheme reduces the localization error up to 14% compared to the interpolation without clustering. As a result, we can overcome the site survey issues for IPS by constructing a radio map with more accurate localization results.","PeriodicalId":325919,"journal":{"name":"2022 21st International Symposium on Communications and Information Technologies (ISCIT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125638967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Bacterial Foraging Optimization Algorithm for DV-Hop Localization DV-Hop定位的细菌觅食优化算法研究
Pub Date : 2022-09-27 DOI: 10.1109/ISCIT55906.2022.9931221
Zhenjie Pan, Wei Xia
Bacterial foraging optimization (BFO) has attracted much attention and been widely applied in a variety of scientific and engineering applications since its inception. This paper proposes a DV -Hop localization algorithm based on bacterial foraging optimization by analysing the DV -Hop localization algorithm which lack of positioning in the wireless sensor network location. To improve the positioning accuracy of DV -Hop algorithm the algorithm use bacterial foraging algorithm to locate the position of the third step in the DV-Hop unknown node. Experimental results show that the algorithm proposed in this paper has better localization effect than the basic DV _Hop algorithm, and it effectively improves the location accuracy, which proves the validity of our proposed method.
细菌觅食优化(Bacterial foraging optimization, BFO)自提出以来就受到了广泛的关注,并在各种科学和工程应用中得到了广泛的应用。通过分析无线传感器网络定位中缺乏定位的DV -Hop定位算法,提出了一种基于细菌觅食优化的DV -Hop定位算法。为了提高DV-Hop算法的定位精度,该算法采用细菌觅食算法在DV-Hop未知节点上定位第三步的位置。实验结果表明,本文算法比基本的DV _Hop算法具有更好的定位效果,有效地提高了定位精度,证明了本文方法的有效性。
{"title":"Research on Bacterial Foraging Optimization Algorithm for DV-Hop Localization","authors":"Zhenjie Pan, Wei Xia","doi":"10.1109/ISCIT55906.2022.9931221","DOIUrl":"https://doi.org/10.1109/ISCIT55906.2022.9931221","url":null,"abstract":"Bacterial foraging optimization (BFO) has attracted much attention and been widely applied in a variety of scientific and engineering applications since its inception. This paper proposes a DV -Hop localization algorithm based on bacterial foraging optimization by analysing the DV -Hop localization algorithm which lack of positioning in the wireless sensor network location. To improve the positioning accuracy of DV -Hop algorithm the algorithm use bacterial foraging algorithm to locate the position of the third step in the DV-Hop unknown node. Experimental results show that the algorithm proposed in this paper has better localization effect than the basic DV _Hop algorithm, and it effectively improves the location accuracy, which proves the validity of our proposed method.","PeriodicalId":325919,"journal":{"name":"2022 21st International Symposium on Communications and Information Technologies (ISCIT)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125929464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Comparison of the Effectiveness of Techniques for Predicting Binary Dependent Variables 二元因变量预测技术的有效性比较
Pub Date : 2022-09-27 DOI: 10.1109/ISCIT55906.2022.9931323
Tianxiang Cao, Xin Song, Jun Wang
The Invoice Disputes Team wants to identify further opportunities to reduce invoice disputes and the team would like to explore whether data analytics can drive further improvements. The purpose of this paper is to compare the effectiveness of the eight approaches to predict binary dependent variables according to the specified data. The techniques examined are Logistic Regression, Probit Regression, CHAID, CART, Neural Networks, Bagging, Random Forests and Boosting. This paper describes the data set, the effectiveness measures used and the approaches, and also shows the results for each of the eight approaches that are examined. The simulation results show that both Bagging and Random forests seem to do better than other approaches.
发票争议团队希望找到更多的机会来减少发票争议,团队希望探索数据分析是否可以推动进一步的改进。本文的目的是比较根据指定数据预测二元因变量的八种方法的有效性。研究的技术包括逻辑回归、概率回归、CHAID、CART、神经网络、Bagging、随机森林和Boosting。本文描述了数据集、使用的有效性度量和方法,并显示了所检查的八种方法中的每种方法的结果。仿真结果表明,套袋法和随机森林法似乎都比其他方法效果更好。
{"title":"A Comparison of the Effectiveness of Techniques for Predicting Binary Dependent Variables","authors":"Tianxiang Cao, Xin Song, Jun Wang","doi":"10.1109/ISCIT55906.2022.9931323","DOIUrl":"https://doi.org/10.1109/ISCIT55906.2022.9931323","url":null,"abstract":"The Invoice Disputes Team wants to identify further opportunities to reduce invoice disputes and the team would like to explore whether data analytics can drive further improvements. The purpose of this paper is to compare the effectiveness of the eight approaches to predict binary dependent variables according to the specified data. The techniques examined are Logistic Regression, Probit Regression, CHAID, CART, Neural Networks, Bagging, Random Forests and Boosting. This paper describes the data set, the effectiveness measures used and the approaches, and also shows the results for each of the eight approaches that are examined. The simulation results show that both Bagging and Random forests seem to do better than other approaches.","PeriodicalId":325919,"journal":{"name":"2022 21st International Symposium on Communications and Information Technologies (ISCIT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126119376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Surface Defect Detection of Aircraft Glass Canopy Based on Improved YOLOv4 基于改进YOLOv4的飞机玻璃罩表面缺陷检测
Pub Date : 2022-09-27 DOI: 10.1109/ISCIT55906.2022.9931195
Jing Wang, Siwen Wei, Kexin Wang, Jianhong Li
Aiming at the problems of low detection accuracy and high false detection rate in traditional defect detection methods, an improved YOLOv4 model for surface defect detection of aircraft glass canopy is proposed. In this paper, an improved FReLU activation function is used instead of Mish to better adaptively capture the spatial correlation to improve the defect detection efficiency. It is worth mentioning that due to the high aspect ratio of defects, this paper defines the rotated rectangle method without adding rotation anchors, which greatly improves the prediction speed of the model. Finally, this paper solves the problem of model fitting by optimizing the loss function of the model. Experiments show that the mAP value of our model on the test set reaches 93.34 %, which is 4.58 % higher than original YOLOv4 model, which proves the effectiveness of our model on the aircraft glass canopy surface defect dataset.
针对传统缺陷检测方法检测精度低、误检率高的问题,提出了一种改进的YOLOv4飞机玻璃冠层表面缺陷检测模型。本文采用改进的FReLU激活函数代替Mish,更好地自适应捕获空间相关性,提高缺陷检测效率。值得一提的是,由于缺陷的高纵横比,本文定义了不添加旋转锚点的旋转矩形方法,大大提高了模型的预测速度。最后,本文通过优化模型的损失函数来解决模型拟合问题。实验表明,该模型在测试集上的mAP值达到了93.34%,比原来的YOLOv4模型提高了4.58%,证明了该模型在飞机玻璃冠层表面缺陷数据集上的有效性。
{"title":"Surface Defect Detection of Aircraft Glass Canopy Based on Improved YOLOv4","authors":"Jing Wang, Siwen Wei, Kexin Wang, Jianhong Li","doi":"10.1109/ISCIT55906.2022.9931195","DOIUrl":"https://doi.org/10.1109/ISCIT55906.2022.9931195","url":null,"abstract":"Aiming at the problems of low detection accuracy and high false detection rate in traditional defect detection methods, an improved YOLOv4 model for surface defect detection of aircraft glass canopy is proposed. In this paper, an improved FReLU activation function is used instead of Mish to better adaptively capture the spatial correlation to improve the defect detection efficiency. It is worth mentioning that due to the high aspect ratio of defects, this paper defines the rotated rectangle method without adding rotation anchors, which greatly improves the prediction speed of the model. Finally, this paper solves the problem of model fitting by optimizing the loss function of the model. Experiments show that the mAP value of our model on the test set reaches 93.34 %, which is 4.58 % higher than original YOLOv4 model, which proves the effectiveness of our model on the aircraft glass canopy surface defect dataset.","PeriodicalId":325919,"journal":{"name":"2022 21st International Symposium on Communications and Information Technologies (ISCIT)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122449458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 21st International Symposium on Communications and Information Technologies (ISCIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1