首页 > 最新文献

2022 IEEE 5th International Conference on Computer and Communication Engineering Technology (CCET)最新文献

英文 中文
Hierarchical Feature Fusion and Multi-scale Cost Aggregation for Stereo Matching 层次特征融合与多尺度代价聚合立体匹配
Jiaquan Zhang, Pengfei Li, Xin'an Wang, Yong Zhao
To further improve the accuracy of disparity estimation in ill-posed regions and weak texture regions, in this paper we propose HFMANet: which is a stereo matching method based on hierarchical feature fusion and multi-scale cost aggregation. Specifically, we first propose a hierarchical feature fusion module, which innovatively fuses low-level features and high-level features to obtain rich semantic information while retaining the edge information of the image. Secondly, we propose a multi-scale cost aggregation module to extract rich global context information. At the same time, the layer-by-layer fusion optimization helps increase the receptive field to capture more structural information, reduce the dependence on local information, and help the disparity estimation of ill-posed regions and weak-textured regions. Comprehensive experiments are conducted on the SceneFlow and KITTI datasets, and achieve competitive results, which proves the effectiveness of the proposed method.
为了进一步提高病态区域和弱纹理区域视差估计的精度,本文提出了一种基于层次特征融合和多尺度代价聚合的立体匹配方法HFMANet。具体而言,我们首先提出了一种分层特征融合模块,该模块创新性地融合了低级特征和高级特征,在保留图像边缘信息的同时获得丰富的语义信息。其次,我们提出了一个多尺度成本聚合模块来提取丰富的全局上下文信息。同时,通过逐层融合优化,增加接收野以捕获更多的结构信息,减少对局部信息的依赖,有助于病态区域和弱纹理区域的视差估计。在SceneFlow和KITTI数据集上进行了综合实验,取得了比较好的结果,证明了所提方法的有效性。
{"title":"Hierarchical Feature Fusion and Multi-scale Cost Aggregation for Stereo Matching","authors":"Jiaquan Zhang, Pengfei Li, Xin'an Wang, Yong Zhao","doi":"10.1109/CCET55412.2022.9906319","DOIUrl":"https://doi.org/10.1109/CCET55412.2022.9906319","url":null,"abstract":"To further improve the accuracy of disparity estimation in ill-posed regions and weak texture regions, in this paper we propose HFMANet: which is a stereo matching method based on hierarchical feature fusion and multi-scale cost aggregation. Specifically, we first propose a hierarchical feature fusion module, which innovatively fuses low-level features and high-level features to obtain rich semantic information while retaining the edge information of the image. Secondly, we propose a multi-scale cost aggregation module to extract rich global context information. At the same time, the layer-by-layer fusion optimization helps increase the receptive field to capture more structural information, reduce the dependence on local information, and help the disparity estimation of ill-posed regions and weak-textured regions. Comprehensive experiments are conducted on the SceneFlow and KITTI datasets, and achieve competitive results, which proves the effectiveness of the proposed method.","PeriodicalId":329327,"journal":{"name":"2022 IEEE 5th International Conference on Computer and Communication Engineering Technology (CCET)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127554159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Lightweight Attribute-based Encryption Scheme for Data Access Control in Smart Grids 基于属性的智能电网数据访问控制轻量级加密方案
Guocong Feng, Tingting Mu, Huahui Lyu, Hang Yang, Yuyang Lai, Huijuan Li
Smart grids are envisioned as the next-generation electricity grids. The data measured from the smart grid is very sensitive. It is thus highly necessary to adopt data access control in smart grids to guarantee the security and privacy of the measured data. Due to its flexibility and scalability, attribute-based encryption (ABE) is widely utilized to realize data access control in smart grids. However, most existing ABE solutions impose a heavy decryption overhead on their users. To this end, we propose a lightweight attribute-based encryption scheme for data access control in smart grids by adopting the idea of computation outsourcing. Under our proposed scheme, users can outsource a large amount of computation to a server during the decryption phase while still guaranteeing the security and privacy of the data. Theoretical analysis and experimental evaluation demonstrate that our scheme outperforms the existing schemes by achieving a very low decryption cost.
智能电网被设想为下一代电网。从智能电网测得的数据非常敏感。因此,在智能电网中采用数据访问控制来保证被测数据的安全性和隐私性是非常必要的。基于属性的加密(ABE)由于其灵活性和可扩展性,在智能电网中被广泛用于实现数据访问控制。然而,大多数现有的ABE解决方案对其用户施加了沉重的解密开销。为此,我们采用计算外包的思想,提出了一种轻量级的基于属性的智能电网数据访问控制加密方案。在我们提出的方案下,用户可以在解密阶段将大量计算外包给服务器,同时仍然保证数据的安全性和隐私性。理论分析和实验评估表明,该方案具有较低的解密成本,优于现有的加密方案。
{"title":"A Lightweight Attribute-based Encryption Scheme for Data Access Control in Smart Grids","authors":"Guocong Feng, Tingting Mu, Huahui Lyu, Hang Yang, Yuyang Lai, Huijuan Li","doi":"10.1109/CCET55412.2022.9906352","DOIUrl":"https://doi.org/10.1109/CCET55412.2022.9906352","url":null,"abstract":"Smart grids are envisioned as the next-generation electricity grids. The data measured from the smart grid is very sensitive. It is thus highly necessary to adopt data access control in smart grids to guarantee the security and privacy of the measured data. Due to its flexibility and scalability, attribute-based encryption (ABE) is widely utilized to realize data access control in smart grids. However, most existing ABE solutions impose a heavy decryption overhead on their users. To this end, we propose a lightweight attribute-based encryption scheme for data access control in smart grids by adopting the idea of computation outsourcing. Under our proposed scheme, users can outsource a large amount of computation to a server during the decryption phase while still guaranteeing the security and privacy of the data. Theoretical analysis and experimental evaluation demonstrate that our scheme outperforms the existing schemes by achieving a very low decryption cost.","PeriodicalId":329327,"journal":{"name":"2022 IEEE 5th International Conference on Computer and Communication Engineering Technology (CCET)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131077268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Intelligent Communication Scheduling System Based on Network Slices 基于网络切片的智能通信调度系统研究
Chenchen Dou, Xue Wang, Rui Dai
The rapid development of smart grid has put forward higher requirements on communication technology. With the rapid development of power wireless communication network, the demand of power business becomes more and more complicated and diverse. However, the current single-standard network has poor coverage, poor power service carrying capacity, and weak transmission stability and security. To address the above problems, this paper explores the network slicing technology for intelligent power distribution services. Based on the analysis of existing network access selection methods, a network selection strategy for quality of service (QoS) assurance of power services is proposed for the characteristics of power distribution services. Combining its own QoS requirements and the characteristics of the network to be accessed, the power service can realize the access selection of the optimal adaptation network. In order to better meet various vertical industry applications, network slicing is required in both the core network and the radio access network, i.e., end-to-end network slicing is realized, and network slicing can be customized to tailor network functions and reasonably allocate network resources according to service scenario requirements. After receiving a request for network slicing, operators need to map the virtual network functions required for network slicing to the underlying physical network, a process that involves the optimal allocation of physical resources.
智能电网的快速发展对通信技术提出了更高的要求。随着电力无线通信网络的快速发展,电力业务的需求变得越来越复杂和多样化。但目前的单一标准网络存在覆盖范围差、电力业务承载能力差、传输稳定性和安全性差的问题。针对上述问题,本文探索了面向智能配电业务的网络切片技术。在分析现有网络接入选择方法的基础上,针对配电业务的特点,提出了一种保证电力业务服务质量的网络选择策略。电力业务结合自身的QoS要求和接入网络的特点,可以实现最优适配网络的接入选择。为了更好地满足各种垂直行业应用,核心网和无线接入网都需要进行网络切片,即实现端到端网络切片,并可根据业务场景需求定制网络切片,定制网络功能,合理分配网络资源。运营商收到网络切片请求后,需要将网络切片所需的虚拟网络功能映射到底层物理网络,这是一个物理资源最优分配的过程。
{"title":"Research on Intelligent Communication Scheduling System Based on Network Slices","authors":"Chenchen Dou, Xue Wang, Rui Dai","doi":"10.1109/CCET55412.2022.9906378","DOIUrl":"https://doi.org/10.1109/CCET55412.2022.9906378","url":null,"abstract":"The rapid development of smart grid has put forward higher requirements on communication technology. With the rapid development of power wireless communication network, the demand of power business becomes more and more complicated and diverse. However, the current single-standard network has poor coverage, poor power service carrying capacity, and weak transmission stability and security. To address the above problems, this paper explores the network slicing technology for intelligent power distribution services. Based on the analysis of existing network access selection methods, a network selection strategy for quality of service (QoS) assurance of power services is proposed for the characteristics of power distribution services. Combining its own QoS requirements and the characteristics of the network to be accessed, the power service can realize the access selection of the optimal adaptation network. In order to better meet various vertical industry applications, network slicing is required in both the core network and the radio access network, i.e., end-to-end network slicing is realized, and network slicing can be customized to tailor network functions and reasonably allocate network resources according to service scenario requirements. After receiving a request for network slicing, operators need to map the virtual network functions required for network slicing to the underlying physical network, a process that involves the optimal allocation of physical resources.","PeriodicalId":329327,"journal":{"name":"2022 IEEE 5th International Conference on Computer and Communication Engineering Technology (CCET)","volume":"84 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130699861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fake News Detection Based on Two-Branch Network and Domain Adversarial 基于双分支网络和领域对抗的假新闻检测
Ying Guo, Hong Ge, Jinhong Li
Fake news detection is essential for society, however, implicit state information in features is ignored in multimodal fake news detection, resulting in inefficient of feature. There are also poor domain generality of features problems. So, a Two-Branch Network with Domain Adversarial (TBNDA), is proposed. Firstly, a pre-trained language model is used to encode features on textual information, and the hidden layer of word information and sentence information in the features is extracted separately using a two-branch network. Secondly, a pre-trained residual network model is used to encode the image information, and a two-branch network model is used to extract the different hidden layer image feature information. Finally, a domain adversarial network module is constructed to extract generic features between domains. The accuracy of the proposed model is S9.6% and S4.7% on the Weibo dataset and Twitter dataset respectively. The two-branch network improves the feature representation of images and text, and the domain adversarial network extracts features with generality, enhancing the migration performance of the model and improving the detection of fake news.
假新闻检测对于社会来说是必不可少的,但在多模态假新闻检测中,忽略了特征中隐含的状态信息,导致特征检测效率低下。特征问题的领域通用性也很差。为此,提出了一种具有域对抗的双分支网络(TBNDA)。首先,利用预训练好的语言模型对文本信息进行特征编码,利用双分支网络分别提取特征中的词信息和句子信息隐藏层;其次,采用预训练残差网络模型对图像信息进行编码,并采用双分支网络模型提取不同隐藏层图像特征信息;最后,构建了域对抗网络模块,提取域间的共性特征。该模型在微博数据集和Twitter数据集上的准确率分别为S9.6%和S4.7%。双分支网络改进了图像和文本的特征表示,领域对抗网络提取具有通用性的特征,增强了模型的迁移性能,提高了假新闻的检测能力。
{"title":"Fake News Detection Based on Two-Branch Network and Domain Adversarial","authors":"Ying Guo, Hong Ge, Jinhong Li","doi":"10.1109/CCET55412.2022.9906330","DOIUrl":"https://doi.org/10.1109/CCET55412.2022.9906330","url":null,"abstract":"Fake news detection is essential for society, however, implicit state information in features is ignored in multimodal fake news detection, resulting in inefficient of feature. There are also poor domain generality of features problems. So, a Two-Branch Network with Domain Adversarial (TBNDA), is proposed. Firstly, a pre-trained language model is used to encode features on textual information, and the hidden layer of word information and sentence information in the features is extracted separately using a two-branch network. Secondly, a pre-trained residual network model is used to encode the image information, and a two-branch network model is used to extract the different hidden layer image feature information. Finally, a domain adversarial network module is constructed to extract generic features between domains. The accuracy of the proposed model is S9.6% and S4.7% on the Weibo dataset and Twitter dataset respectively. The two-branch network improves the feature representation of images and text, and the domain adversarial network extracts features with generality, enhancing the migration performance of the model and improving the detection of fake news.","PeriodicalId":329327,"journal":{"name":"2022 IEEE 5th International Conference on Computer and Communication Engineering Technology (CCET)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131051812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Non-intrusive Load Monitoring for Consistent Shape Loads Based on Convolutional Neural Network 基于卷积神经网络的非侵入式一致形状载荷监测
Xiang Li, Y. Guo, Meng Yan, Xin Wu
As the key method for demand-side management in power grid, non-intrusive load monitoring (NILM) keep up to the power consumption of various users in real time and provides data to support the formulation of relevant power policies. In order to achieve accurate resident load monitoring, this paper proposes a NILM architecture focus on consistent shape loads (CSL). Loads in CSL meet the following conditions: 1) current waveform images of different load individuals in the same type are highly similar. 2) different types of load waveform images are different in shapes which are distinguishable. Besides, a non-intrusive load monitoring method based on convolutional neural network (CNN) to identify CSL load is proposed and carried out on actual users. Power consumption data of CSL with different operating environments is taken as training samples. The outcome of our experiment shows the effectiveness of the method in accurately distinguishing CSL and high-precision identification which reaches 97.06%. The method ensures the real-time performance and accuracy of load monitoring.
非侵入式负荷监测(NILM)是电网需求侧管理的关键手段,实时掌握各类用户的用电情况,为制定相关电力政策提供数据支持。为了实现准确的驻留荷载监测,本文提出了一种基于一致形状荷载(CSL)的NILM体系结构。CSL荷载满足以下条件:1)同一类型不同荷载个体的电流波形图像高度相似。2)不同类型的负载波形图像形状不同,易于区分。此外,提出了一种基于卷积神经网络(CNN)的非侵入式负荷监测方法来识别CSL负荷,并在实际用户中进行了应用。以CSL在不同运行环境下的功耗数据作为训练样本。实验结果表明,该方法对CSL的准确识别和高精度识别达到了97.06%。该方法保证了负荷监测的实时性和准确性。
{"title":"Non-intrusive Load Monitoring for Consistent Shape Loads Based on Convolutional Neural Network","authors":"Xiang Li, Y. Guo, Meng Yan, Xin Wu","doi":"10.1109/CCET55412.2022.9906390","DOIUrl":"https://doi.org/10.1109/CCET55412.2022.9906390","url":null,"abstract":"As the key method for demand-side management in power grid, non-intrusive load monitoring (NILM) keep up to the power consumption of various users in real time and provides data to support the formulation of relevant power policies. In order to achieve accurate resident load monitoring, this paper proposes a NILM architecture focus on consistent shape loads (CSL). Loads in CSL meet the following conditions: 1) current waveform images of different load individuals in the same type are highly similar. 2) different types of load waveform images are different in shapes which are distinguishable. Besides, a non-intrusive load monitoring method based on convolutional neural network (CNN) to identify CSL load is proposed and carried out on actual users. Power consumption data of CSL with different operating environments is taken as training samples. The outcome of our experiment shows the effectiveness of the method in accurately distinguishing CSL and high-precision identification which reaches 97.06%. The method ensures the real-time performance and accuracy of load monitoring.","PeriodicalId":329327,"journal":{"name":"2022 IEEE 5th International Conference on Computer and Communication Engineering Technology (CCET)","volume":"212 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115772868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent optimization Research of the Washout Algorithm for Flight Simulators 飞行模拟器洗出算法的智能优化研究
Jingyi Wang, Zhengping Li, Lijun Wang, Shujun Guo
The simulation fidelity of the flight simulator is affected by the pros and cons of the washout algorithm. Using the classical washout algorithm with fast feedback, simple structure, and easy adjustment, it is found that the choice of parameters directly impacts the perceived fidelity. ensure Based on the research on the problem of insufficient simulation effect caused by parameter selection, the author decided to analyze the perception error of the human vestibular system and combine it with the limitations of the flight simulator. Then, the intelligent optimization method combining genetic algorithm and particle swarm optimization is used to find the optimal filter parameters and carry out simulation analysis. The results show that the classical washout algorithm with optimized parameters can effectively use the platform space to reduce perceptual error and improve simulation fidelity.
冲蚀算法的优劣影响着飞行模拟器的仿真保真度。采用反馈快、结构简单、易调整的经典洗净算法,发现参数的选择直接影响感知保真度。在对参数选择导致的仿真效果不足问题进行研究的基础上,笔者决定对人体前庭系统的感知误差进行分析,并将其与飞行模拟器的局限性相结合。然后,采用遗传算法和粒子群算法相结合的智能优化方法寻找最优滤波器参数并进行仿真分析。结果表明,经参数优化的经典洗净算法能有效利用平台空间,减小感知误差,提高仿真保真度。
{"title":"Intelligent optimization Research of the Washout Algorithm for Flight Simulators","authors":"Jingyi Wang, Zhengping Li, Lijun Wang, Shujun Guo","doi":"10.1109/CCET55412.2022.9906381","DOIUrl":"https://doi.org/10.1109/CCET55412.2022.9906381","url":null,"abstract":"The simulation fidelity of the flight simulator is affected by the pros and cons of the washout algorithm. Using the classical washout algorithm with fast feedback, simple structure, and easy adjustment, it is found that the choice of parameters directly impacts the perceived fidelity. ensure Based on the research on the problem of insufficient simulation effect caused by parameter selection, the author decided to analyze the perception error of the human vestibular system and combine it with the limitations of the flight simulator. Then, the intelligent optimization method combining genetic algorithm and particle swarm optimization is used to find the optimal filter parameters and carry out simulation analysis. The results show that the classical washout algorithm with optimized parameters can effectively use the platform space to reduce perceptual error and improve simulation fidelity.","PeriodicalId":329327,"journal":{"name":"2022 IEEE 5th International Conference on Computer and Communication Engineering Technology (CCET)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132233086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Granularity Classification and Feature Fusion Methods in Traffic Sign Detection 交通标志检测中的粒度分类与特征融合方法
Wei Huang, Xiaohong Shi, Qi Xu, Qingshu Li, Peng Yang
Nowadays, deep learning based on detection algorithms have replaced the traditional manual feature extraction target algorithms and have achieved amazing results in many places with their powerful automatic feature extraction capabilities. However, the results are not ideal for the detection of small targets with low resolution and a lot of noise, such as traffic signs. To address the current problems of slow detection speed and low detection accuracy in small target detection, this paper adopts a feedback-driven mechanism to solve the image level imbalance of the input feature space under the original data distribution. At the same time, this paper designs a novel and flexible two-stage traffic sign recognition framework. The complex task of traffic sign detection and recognition is decomposed into two stages: 1) designing a superclass classifier to more accurately separate traffic signs in complex natural scene images; 2) The idea of similarity metric learning is used to design fine-grained classifiers to recognize traffic signs. Finally, to verify the effectiveness of the model, the model was first compared with Faster R-CNN and found to possess higher detection accuracy; then the model was experimented with the R-FCN model on TTIOOK dataset and CCTSDB dataset respectively, and the comparison of the experimental results revealed that the model improved over the R-FCN model in most of the metrics in the traffic sign detection task.
如今,基于检测算法的深度学习已经取代了传统的人工特征提取目标算法,并以其强大的自动特征提取能力在很多地方取得了惊人的效果。然而,对于低分辨率和大量噪声的小目标(如交通标志)的检测结果并不理想。针对目前小目标检测中检测速度慢、检测精度低的问题,本文采用反馈驱动机制解决原始数据分布下输入特征空间的图像级失衡问题。同时,设计了一种新颖、灵活的两阶段交通标志识别框架。将复杂的交通标志检测与识别任务分解为两个阶段:1)设计超类分类器,在复杂的自然场景图像中更准确地分离交通标志;2)利用相似度度量学习的思想设计细粒度分类器来识别交通标志。最后,为了验证模型的有效性,首先将该模型与Faster R-CNN进行比较,发现该模型具有更高的检测精度;然后分别在TTIOOK数据集和CCTSDB数据集上与R-FCN模型进行了实验,实验结果表明,该模型在交通标志检测任务的大部分指标上都优于R-FCN模型。
{"title":"Granularity Classification and Feature Fusion Methods in Traffic Sign Detection","authors":"Wei Huang, Xiaohong Shi, Qi Xu, Qingshu Li, Peng Yang","doi":"10.1109/CCET55412.2022.9906331","DOIUrl":"https://doi.org/10.1109/CCET55412.2022.9906331","url":null,"abstract":"Nowadays, deep learning based on detection algorithms have replaced the traditional manual feature extraction target algorithms and have achieved amazing results in many places with their powerful automatic feature extraction capabilities. However, the results are not ideal for the detection of small targets with low resolution and a lot of noise, such as traffic signs. To address the current problems of slow detection speed and low detection accuracy in small target detection, this paper adopts a feedback-driven mechanism to solve the image level imbalance of the input feature space under the original data distribution. At the same time, this paper designs a novel and flexible two-stage traffic sign recognition framework. The complex task of traffic sign detection and recognition is decomposed into two stages: 1) designing a superclass classifier to more accurately separate traffic signs in complex natural scene images; 2) The idea of similarity metric learning is used to design fine-grained classifiers to recognize traffic signs. Finally, to verify the effectiveness of the model, the model was first compared with Faster R-CNN and found to possess higher detection accuracy; then the model was experimented with the R-FCN model on TTIOOK dataset and CCTSDB dataset respectively, and the comparison of the experimental results revealed that the model improved over the R-FCN model in most of the metrics in the traffic sign detection task.","PeriodicalId":329327,"journal":{"name":"2022 IEEE 5th International Conference on Computer and Communication Engineering Technology (CCET)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129758231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Overview of SRv6 Standardization and Application towards 5G-Advanced and 6G 面向5G-Advanced和6G的SRv6标准化与应用综述
Zhiwei Mo, Biao Long
Segment Routing over IPv6 (SRv6) is a source routing technique based on IPv6 data plane, which has been widely concerned. Benefit from its simplicity, scalability and programmability, SRv6 has been proposed to be introduced into mobile core network in 3GPP and IETF. SRv6 related standards and applications include alternative user plane protocol of core network, service function chaining, computing power network and smarter user plane. This paper will make a theoretical analysis of SRv6 and then overview the situation of SRv6 standardization and application. Finally, the development of SRv6 in standardization is prospected. With development of 5G-Advanced and 6G, SRv6 can contribute to leverage Software Defined Network (SDN) and Network Function Virtualization (NFV) in mobile network and facilitate fixed mobile convergence.
IPv6分段路由(SRv6)是一种基于IPv6数据平面的源路由技术,受到了广泛的关注。得益于其简单性、可扩展性和可编程性,SRv6已被提议引入3GPP和IETF的移动核心网。SRv6相关标准和应用包括核心网备选用户平面协议、业务功能链、算力网、智能用户平面等。本文将对SRv6进行理论分析,然后概述SRv6的标准化和应用情况。最后对SRv6在标准化方面的发展进行了展望。随着5G-Advanced和6G的发展,SRv6将有助于充分利用移动网络中的软件定义网络(SDN)和网络功能虚拟化(NFV),促进固-移动融合。
{"title":"An Overview of SRv6 Standardization and Application towards 5G-Advanced and 6G","authors":"Zhiwei Mo, Biao Long","doi":"10.1109/CCET55412.2022.9906338","DOIUrl":"https://doi.org/10.1109/CCET55412.2022.9906338","url":null,"abstract":"Segment Routing over IPv6 (SRv6) is a source routing technique based on IPv6 data plane, which has been widely concerned. Benefit from its simplicity, scalability and programmability, SRv6 has been proposed to be introduced into mobile core network in 3GPP and IETF. SRv6 related standards and applications include alternative user plane protocol of core network, service function chaining, computing power network and smarter user plane. This paper will make a theoretical analysis of SRv6 and then overview the situation of SRv6 standardization and application. Finally, the development of SRv6 in standardization is prospected. With development of 5G-Advanced and 6G, SRv6 can contribute to leverage Software Defined Network (SDN) and Network Function Virtualization (NFV) in mobile network and facilitate fixed mobile convergence.","PeriodicalId":329327,"journal":{"name":"2022 IEEE 5th International Conference on Computer and Communication Engineering Technology (CCET)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126908192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GNSS Receiver Anti-jamming Algorithm Based on Estimation of Array Steering Vector 基于阵列转向矢量估计的GNSS接收机抗干扰算法
Dawei Wang, Xibin Wang, Junhong Wang, Peng Du, Xiaoqiong Yao
An adaptive blind beam-forming algorithm based on array steering vector estimation is proposed to suppress interference signals received by the satellite navigation receivers. The received data are firstly projected to signal plus noise subspace to suppress strong interference in the first stage. Then the output data from the signal plus noise subspace are sent to carrier phase estimation modules, where each satellite navigation signal is tracked to estimate array steering vector. With the estimated steering vector, beams pointing to the direction of navigation satellites can be formed. Simulation results show that the proposed algorithm is valid for interference suppression in presence of interference, and the anti-jamming performance is much better than the power inversion (PI) algorithm and maximum carrier to noise ratio (MCNR) with three successive integrations.
针对卫星导航接收机接收到的干扰信号,提出了一种基于阵列转向矢量估计的自适应盲波束形成算法。首先将接收到的数据投影到信号加噪声子空间,抑制第一阶段的强干扰。然后将信号加噪声子空间的输出数据发送到载波相位估计模块,在载波相位估计模块中跟踪每个卫星导航信号以估计阵列转向矢量。利用估计的导向矢量,可以形成指向导航卫星方向的波束。仿真结果表明,该算法在存在干扰的情况下能够有效抑制干扰,且抗干扰性能明显优于功率反演(PI)算法和三次连续积分的最大载波噪声比(MCNR)算法。
{"title":"GNSS Receiver Anti-jamming Algorithm Based on Estimation of Array Steering Vector","authors":"Dawei Wang, Xibin Wang, Junhong Wang, Peng Du, Xiaoqiong Yao","doi":"10.1109/CCET55412.2022.9906341","DOIUrl":"https://doi.org/10.1109/CCET55412.2022.9906341","url":null,"abstract":"An adaptive blind beam-forming algorithm based on array steering vector estimation is proposed to suppress interference signals received by the satellite navigation receivers. The received data are firstly projected to signal plus noise subspace to suppress strong interference in the first stage. Then the output data from the signal plus noise subspace are sent to carrier phase estimation modules, where each satellite navigation signal is tracked to estimate array steering vector. With the estimated steering vector, beams pointing to the direction of navigation satellites can be formed. Simulation results show that the proposed algorithm is valid for interference suppression in presence of interference, and the anti-jamming performance is much better than the power inversion (PI) algorithm and maximum carrier to noise ratio (MCNR) with three successive integrations.","PeriodicalId":329327,"journal":{"name":"2022 IEEE 5th International Conference on Computer and Communication Engineering Technology (CCET)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127323273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2022 IEEE 5th International Conference on Computer and Communication Engineering Technology (CCET)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1