首页 > 最新文献

2018 Eighth International Conference on Information Science and Technology (ICIST)最新文献

英文 中文
A Novel Migration Technique to Balance Thermal Distribution for Future Heterogeneous 3D Chip Multiprocessors 一种新的迁移技术来平衡未来异构三维芯片多处理器的热分布
Pub Date : 2018-06-01 DOI: 10.1109/ICIST.2018.8426111
S. Aljeddani, F. Mohammadi
The industry trend of Chip Multiprocessors (CMPs) architecture is to move from 2D CMPs to 3D CMPs architecture which obtains higher performance, more reliability, reduced cache access latency, and increased cache bandwidth. Moreover, 3D CMP architectures have recently gained significant attention to tackle the increasing power consumption in single core processors. However, one key challenge in designing the 3D CMP is the thermal issue as a result of maximizing the throughput. The thermal hotspot causes performance degradation and reliability reduction in the 3D CMP. In this paper, a run-time task migration approach is proposed to balance the temperature and reduce the number of hotspots in the 3D CMP without any performance degradation. The proposed approach is divided into two algorithms that aim at maximizing the throughput on the 3D CMP while satisfying the peak temperature constraint. Experimental results on the PARSEC benchmarks show that the proposed architecture yields up to 60 % reduction in overall chip energy with just 17 % performance degradation on average over all the used workloads. The best energy saving was 72 % with a negligible performance degradation.
芯片多处理器(Chip Multiprocessors, cmp)架构的行业趋势是由2D cmp架构向3D cmp架构发展,从而获得更高的性能、更高的可靠性、更低的缓存访问延迟和更大的缓存带宽。此外,3D CMP架构最近获得了极大的关注,以解决单核处理器中不断增加的功耗。然而,设计3D CMP的一个关键挑战是由于最大限度地提高吞吐量而导致的热问题。热热点会导致3D CMP的性能下降和可靠性降低。本文提出了一种运行时任务迁移方法,在不降低性能的前提下平衡3D CMP中的温度和减少热点数量。该方法分为两种算法,目的是在满足峰值温度约束的情况下最大化3D CMP的吞吐量。PARSEC基准测试的实验结果表明,在所有使用的工作负载中,所提出的架构的总体芯片能量减少了60%,而性能平均下降了17%。最好的节能效果是72%,性能下降可以忽略不计。
{"title":"A Novel Migration Technique to Balance Thermal Distribution for Future Heterogeneous 3D Chip Multiprocessors","authors":"S. Aljeddani, F. Mohammadi","doi":"10.1109/ICIST.2018.8426111","DOIUrl":"https://doi.org/10.1109/ICIST.2018.8426111","url":null,"abstract":"The industry trend of Chip Multiprocessors (CMPs) architecture is to move from 2D CMPs to 3D CMPs architecture which obtains higher performance, more reliability, reduced cache access latency, and increased cache bandwidth. Moreover, 3D CMP architectures have recently gained significant attention to tackle the increasing power consumption in single core processors. However, one key challenge in designing the 3D CMP is the thermal issue as a result of maximizing the throughput. The thermal hotspot causes performance degradation and reliability reduction in the 3D CMP. In this paper, a run-time task migration approach is proposed to balance the temperature and reduce the number of hotspots in the 3D CMP without any performance degradation. The proposed approach is divided into two algorithms that aim at maximizing the throughput on the 3D CMP while satisfying the peak temperature constraint. Experimental results on the PARSEC benchmarks show that the proposed architecture yields up to 60 % reduction in overall chip energy with just 17 % performance degradation on average over all the used workloads. The best energy saving was 72 % with a negligible performance degradation.","PeriodicalId":331555,"journal":{"name":"2018 Eighth International Conference on Information Science and Technology (ICIST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133433672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Compression Hashing Scheme for Large-Scale Face Retrieval 一种用于大规模人脸检索的压缩哈希算法
Pub Date : 2018-06-01 DOI: 10.1109/ICIST.2018.8426095
Jiayong Li, Wing W. Y. Ng, Xing Tian
Hashing method has the intrinsic problem that a long binary code yields better precision but requires a larger storage cost. Most of existing hashing methods aim to find an optimal code length to trade off the precision and storage. However, in reality, the scale of the face images is enormous and thus the storage burden is unimaginative heavy. We propose to apply a similarity-preserving compression scheme to existing unsupervised hashing methods, so as to reduce storage burden while maintaining a high precision. We employ two different lengths of code, including a long code with original length and a short code with length after m-time compression. The hash code for the query face preserves the original code length while the hash code for stored image is compressed with a ratio m to reduce storage cost. When performing face retrieval, the compressed hash code for the stored face is m-time repeatedly concentrated, in order to be compared with the long hash code for the query based on Hamming distance. Experimental results on large-scale retrieval demonstrate that the proposed compression scheme can be efficiently applied in existing methods and achieves both a high precision and a small storage space.
哈希方法有一个固有的问题,即长二进制代码产生更好的精度,但需要更大的存储成本。大多数现有的散列方法的目标是找到一个最优的代码长度来权衡精度和存储。然而,在现实中,人脸图像的规模巨大,因此存储负担是难以想象的沉重。我们提出在现有的无监督哈希方法中应用保持相似度的压缩方案,以减少存储负担,同时保持较高的精度。我们采用了两种不同长度的编码,包括具有原始长度的长编码和经过m时间压缩后具有长度的短编码。查询面哈希码保留原始码长,存储图像哈希码按比例m压缩,以降低存储成本。在进行人脸检索时,对存储人脸的压缩哈希码进行m-time重复集中,以便与基于汉明距离的查询的长哈希码进行比较。大规模检索实验结果表明,所提出的压缩方案可以有效地应用于现有的压缩方法中,既能达到较高的检索精度,又能占用较小的存储空间。
{"title":"A Compression Hashing Scheme for Large-Scale Face Retrieval","authors":"Jiayong Li, Wing W. Y. Ng, Xing Tian","doi":"10.1109/ICIST.2018.8426095","DOIUrl":"https://doi.org/10.1109/ICIST.2018.8426095","url":null,"abstract":"Hashing method has the intrinsic problem that a long binary code yields better precision but requires a larger storage cost. Most of existing hashing methods aim to find an optimal code length to trade off the precision and storage. However, in reality, the scale of the face images is enormous and thus the storage burden is unimaginative heavy. We propose to apply a similarity-preserving compression scheme to existing unsupervised hashing methods, so as to reduce storage burden while maintaining a high precision. We employ two different lengths of code, including a long code with original length and a short code with length after m-time compression. The hash code for the query face preserves the original code length while the hash code for stored image is compressed with a ratio m to reduce storage cost. When performing face retrieval, the compressed hash code for the stored face is m-time repeatedly concentrated, in order to be compared with the long hash code for the query based on Hamming distance. Experimental results on large-scale retrieval demonstrate that the proposed compression scheme can be efficiently applied in existing methods and achieves both a high precision and a small storage space.","PeriodicalId":331555,"journal":{"name":"2018 Eighth International Conference on Information Science and Technology (ICIST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114123571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AP Based CBR for Endpoint Carbon Content Prediction of BOF Steelmaking 基于AP的CBR转炉炼钢终点含碳量预测
Pub Date : 2018-06-01 DOI: 10.1109/ICIST.2018.8426080
Yuan Cheng, Jun Xing, Jie Dong, Zhiseng Wang, Xinzhe Wang
The endpoint carbon content of steelmaking is an important criterion for steel quality. Aiming at increasing the accuracy of endpoint carbon content prediction in basic oxygen furnace (BOF) steelmaking, this paper uses case-based reasoning (CBR) method to predict the endpoint carbon content of BOF steelmaking. In CBR, case retrieval makes a significant impact on reasoning result. Therefore, we apply affinity propagation (AP) clustering algorithm and waterfilling algorithm to enhance the case retrieval so as to improve the accuracy and stability of endpoint carbon content prediction. Through the simulation experiment, this paper compares the new model we proposed with the widely used method at present. The results show that the improved CBR can obviously improve the accuracy of endpoint carbon content prediction.
炼钢终点含碳量是衡量钢材质量的重要指标。为了提高转炉炼钢终点含碳量预测的准确性,采用基于案例推理的方法对转炉炼钢终点含碳量进行预测。在CBR中,案例检索对推理结果有重要影响。因此,我们采用亲和传播(affinity propagation, AP)聚类算法和注水算法来增强案例检索,从而提高端点碳含量预测的准确性和稳定性。通过仿真实验,将本文提出的新模型与目前广泛使用的方法进行了比较。结果表明,改进后的CBR能明显提高终点碳含量预测的精度。
{"title":"AP Based CBR for Endpoint Carbon Content Prediction of BOF Steelmaking","authors":"Yuan Cheng, Jun Xing, Jie Dong, Zhiseng Wang, Xinzhe Wang","doi":"10.1109/ICIST.2018.8426080","DOIUrl":"https://doi.org/10.1109/ICIST.2018.8426080","url":null,"abstract":"The endpoint carbon content of steelmaking is an important criterion for steel quality. Aiming at increasing the accuracy of endpoint carbon content prediction in basic oxygen furnace (BOF) steelmaking, this paper uses case-based reasoning (CBR) method to predict the endpoint carbon content of BOF steelmaking. In CBR, case retrieval makes a significant impact on reasoning result. Therefore, we apply affinity propagation (AP) clustering algorithm and waterfilling algorithm to enhance the case retrieval so as to improve the accuracy and stability of endpoint carbon content prediction. Through the simulation experiment, this paper compares the new model we proposed with the widely used method at present. The results show that the improved CBR can obviously improve the accuracy of endpoint carbon content prediction.","PeriodicalId":331555,"journal":{"name":"2018 Eighth International Conference on Information Science and Technology (ICIST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125083791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Robust and Accurate Simultaneous Localization and Mapping System for RGB-D Cameras RGB-D相机的鲁棒精确同步定位与制图系统
Pub Date : 2018-06-01 DOI: 10.1109/ICIST.2018.8426128
Huayou Wang, Y. Hu, Liying Yang, Yuqing He
This paper presents a feature-based simultaneous localization and mapping (SLAM) system for RGB-D cameras that operates in real time, in indoor environments. The system is composed of three central components: tracking, mapping and loop closing which are based on ORB-SLAM2 [1]. The tracking part estimates the pose of a frame via optimizing both the reprojection error and inverse depth error of matching feature points, rather than just optimizing the reprojection error like ORB-SLAM2 [1]. The mapping part optimizes the pose of all keyframes and the position of all map points by using bundle adjustment, and an occupancy grid map of the surrounding environment is constructed based on the octree-based mapping framework OctoMap [2] for high-level tasks, and the map is more useful then the sparse points representation in ORB-SLAM2 [1]. The loop closing of ORB-SLAM2 [1] just uses color appearance information, but our system uses both the color appearance information and depth consistency to deal with inaccurate data association. The experiment results in the TUM RGB-D dataset [3] shows that our system achieves better localization accuracy and robustness than ORB-SLAM2 [1].
本文提出了一种基于特征的同步定位和测绘(SLAM)系统,用于RGB-D相机在室内环境中实时运行。该系统由基于ORB-SLAM2[1]的跟踪、映射和闭环三个核心部分组成。跟踪部分通过优化匹配特征点的重投影误差和逆深度误差来估计帧的姿态,而不是像ORB-SLAM2[1]那样只优化重投影误差。映射部分通过束调整对所有关键帧的姿态和所有地图点的位置进行优化,并基于基于八叉树的映射框架OctoMap[2]构建周围环境的占用网格地图,用于高级任务,该地图比ORB-SLAM2[1]中的稀疏点表示更有用。ORB-SLAM2[1]的闭环只使用颜色外观信息,而我们的系统同时使用颜色外观信息和深度一致性来处理数据关联不准确的问题。在TUM RGB-D数据集[3]上的实验结果表明,我们的系统比ORB-SLAM2[1]具有更好的定位精度和鲁棒性。
{"title":"A Robust and Accurate Simultaneous Localization and Mapping System for RGB-D Cameras","authors":"Huayou Wang, Y. Hu, Liying Yang, Yuqing He","doi":"10.1109/ICIST.2018.8426128","DOIUrl":"https://doi.org/10.1109/ICIST.2018.8426128","url":null,"abstract":"This paper presents a feature-based simultaneous localization and mapping (SLAM) system for RGB-D cameras that operates in real time, in indoor environments. The system is composed of three central components: tracking, mapping and loop closing which are based on ORB-SLAM2 [1]. The tracking part estimates the pose of a frame via optimizing both the reprojection error and inverse depth error of matching feature points, rather than just optimizing the reprojection error like ORB-SLAM2 [1]. The mapping part optimizes the pose of all keyframes and the position of all map points by using bundle adjustment, and an occupancy grid map of the surrounding environment is constructed based on the octree-based mapping framework OctoMap [2] for high-level tasks, and the map is more useful then the sparse points representation in ORB-SLAM2 [1]. The loop closing of ORB-SLAM2 [1] just uses color appearance information, but our system uses both the color appearance information and depth consistency to deal with inaccurate data association. The experiment results in the TUM RGB-D dataset [3] shows that our system achieves better localization accuracy and robustness than ORB-SLAM2 [1].","PeriodicalId":331555,"journal":{"name":"2018 Eighth International Conference on Information Science and Technology (ICIST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125117902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effects of Unilateral Restriction of the Metatarsophalangeal Joints on Biped Robot Walking 跖趾关节单侧受限对双足机器人行走的影响
Pub Date : 2018-06-01 DOI: 10.1109/ICIST.2018.8426106
Yixiang Liu, Xizhe Zang, Niansong Zhang, Yubin Liu, Ming Wu
The metatarsophalangeal (MTP) joints play critical roles in the push-off phase of human locomotion, but are usually absent in biped robots. Our previous research found that when the unilateral MTP joints were restricted, non-disabled subjects exerted a compensatory mechanism, that is, the intact limb was relied more than the restricted limb. This paper aims to study the effects of unilateral restrictions of the MTP joints on biped robot walking. Gait performance of a biped robot model was analyzed under two conditions, i.e., walking normally, and walking with the MTP joints of the right foot restricted. The results show that unilateral restrictions of the MTP joints lead to larger demands for driving torque and power on partial joints, more total energy consumption, and lower energy efficiency. These results can help understand the functions of the MTP joints in more depth, and offer some inspirations to the researches of biped robots.
跖趾关节(MTP)在人体运动的推离阶段起着至关重要的作用,但在双足机器人中通常不存在。我们之前的研究发现,当单侧MTP关节受限时,非残疾受试者存在代偿机制,即对完整肢体的依赖大于对受限肢体的依赖。本文旨在研究MTP关节单侧约束对双足机器人行走的影响。对双足机器人模型在正常行走和右足MTP关节受限行走两种情况下的步态性能进行了分析。结果表明:单侧约束导致局部节点驱动转矩和功率需求增大,总能耗增大,能效降低;这些结果有助于更深入地了解MTP关节的功能,并为双足机器人的研究提供一些启示。
{"title":"Effects of Unilateral Restriction of the Metatarsophalangeal Joints on Biped Robot Walking","authors":"Yixiang Liu, Xizhe Zang, Niansong Zhang, Yubin Liu, Ming Wu","doi":"10.1109/ICIST.2018.8426106","DOIUrl":"https://doi.org/10.1109/ICIST.2018.8426106","url":null,"abstract":"The metatarsophalangeal (MTP) joints play critical roles in the push-off phase of human locomotion, but are usually absent in biped robots. Our previous research found that when the unilateral MTP joints were restricted, non-disabled subjects exerted a compensatory mechanism, that is, the intact limb was relied more than the restricted limb. This paper aims to study the effects of unilateral restrictions of the MTP joints on biped robot walking. Gait performance of a biped robot model was analyzed under two conditions, i.e., walking normally, and walking with the MTP joints of the right foot restricted. The results show that unilateral restrictions of the MTP joints lead to larger demands for driving torque and power on partial joints, more total energy consumption, and lower energy efficiency. These results can help understand the functions of the MTP joints in more depth, and offer some inspirations to the researches of biped robots.","PeriodicalId":331555,"journal":{"name":"2018 Eighth International Conference on Information Science and Technology (ICIST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129259898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Classification of Dynamic In-Hand Manipulation Based on SEMG and Kinect 基于表面肌电信号和Kinect的动态手部操作分类
Pub Date : 2018-06-01 DOI: 10.1109/ICIST.2018.8426180
Yaxu Xue, Zhaojie Ju, Kui Xiang
This paper proposes a hand motion capture system for recognizing dynamic in-hand manipulation of the subjects based on the famous sensing techniques, then transferring the manipulation skills into different bionic hand applications, such as prosthetic hand, animation hand, human computer interaction. By recoding the ten defined in-hand manipulations demonstrated by different subjects, the hand motion information is captured with hybrid SEMG and Kinect. Through the data preprocessing including motion segmentation and feature extraction, recognizing ten different types of hand motions based on the rich feature information are investigated by using Marquardt-Levenberg algorithm based artificial neural network, and the experimental results show the effectiveness and feasibility of this method.
本文提出了一种基于著名传感技术的手部动作捕捉系统,用于识别受试者的动态手部操作,并将操作技能转化为不同的仿生手应用,如假手、动画手、人机交互。通过对不同受试者所演示的十种定义的手部操作进行重新编码,手的运动信息通过混合表面肌电信号和Kinect被捕获。通过对数据进行预处理,包括运动分割和特征提取,研究了基于Marquardt-Levenberg算法的人工神经网络基于丰富的特征信息识别十种不同类型的手部运动,实验结果表明了该方法的有效性和可行性。
{"title":"Classification of Dynamic In-Hand Manipulation Based on SEMG and Kinect","authors":"Yaxu Xue, Zhaojie Ju, Kui Xiang","doi":"10.1109/ICIST.2018.8426180","DOIUrl":"https://doi.org/10.1109/ICIST.2018.8426180","url":null,"abstract":"This paper proposes a hand motion capture system for recognizing dynamic in-hand manipulation of the subjects based on the famous sensing techniques, then transferring the manipulation skills into different bionic hand applications, such as prosthetic hand, animation hand, human computer interaction. By recoding the ten defined in-hand manipulations demonstrated by different subjects, the hand motion information is captured with hybrid SEMG and Kinect. Through the data preprocessing including motion segmentation and feature extraction, recognizing ten different types of hand motions based on the rich feature information are investigated by using Marquardt-Levenberg algorithm based artificial neural network, and the experimental results show the effectiveness and feasibility of this method.","PeriodicalId":331555,"journal":{"name":"2018 Eighth International Conference on Information Science and Technology (ICIST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131813715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Projection-Based Algorithm for Constrained L1- Minimization Optimization with Application to Sparse Signal Reconstruction 基于投影的约束L1最小化优化算法及其在稀疏信号重构中的应用
Pub Date : 2018-06-01 DOI: 10.1109/ICIST.2018.8426078
Qingshan Liu, Wei Zhang, Jiang Xiong, Bingrong Xu, Long Cheng
In this paper, a projection-base algorithm is proposed for solving the constrained L1-minimization problem. Furthermore, the algorithm is utilized to sparse signal reconstruction. The L1 -minimization is first converted into some equations which are described by the projections onto a hyer box set and the nonnegative quadrant. Then a iterative algorithm is proposed for solving the L1 -minimization problem. Next, the algorithm is applied to sparse signal reconstruction described as an L1- minimization problem subject to L∞ -norm noise constraint, or equivalently bound constraint. Finally, several experiments are presented to show the performance of the proposed algorithm.
本文提出了一种基于投影的求解约束l1 -最小化问题的算法。并将该算法应用于稀疏信号重构。首先将L1 -最小化问题转化为一些方程,这些方程是由在超盒集和非负象限上的投影来描述的。然后提出了求解L1最小问题的迭代算法。接下来,将该算法应用于稀疏信号重构,描述为受L∞范数噪声约束或等效约束约束的L1-最小化问题。最后,通过实验验证了该算法的有效性。
{"title":"A Projection-Based Algorithm for Constrained L1- Minimization Optimization with Application to Sparse Signal Reconstruction","authors":"Qingshan Liu, Wei Zhang, Jiang Xiong, Bingrong Xu, Long Cheng","doi":"10.1109/ICIST.2018.8426078","DOIUrl":"https://doi.org/10.1109/ICIST.2018.8426078","url":null,"abstract":"In this paper, a projection-base algorithm is proposed for solving the constrained L1-minimization problem. Furthermore, the algorithm is utilized to sparse signal reconstruction. The L1 -minimization is first converted into some equations which are described by the projections onto a hyer box set and the nonnegative quadrant. Then a iterative algorithm is proposed for solving the L1 -minimization problem. Next, the algorithm is applied to sparse signal reconstruction described as an L1- minimization problem subject to L∞ -norm noise constraint, or equivalently bound constraint. Finally, several experiments are presented to show the performance of the proposed algorithm.","PeriodicalId":331555,"journal":{"name":"2018 Eighth International Conference on Information Science and Technology (ICIST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130380312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Binocular Vision-Based Autonomous Path Planning for UAVs in Unknown Outdoor Scenes 基于双目视觉的未知室外场景无人机自主路径规划
Pub Date : 2018-06-01 DOI: 10.1109/ICIST.2018.8426133
Yisha Liu, Yan Zhuang, Long Wan, Ge Guo
It is a classic task for Unmanned Aerial Vehicles (UAVs) to accomplish autonomous scene perception and path planning in unknown 3-D outdoor environments. This paper investigates the problems of obstacle avoidance and path planning using binocular vision system. During the UAV's flight, the binocular vision sensor is used to obtain the local environment information in real time, and the distribution of obstacles in the environment can also be analyzed with the depth images acquired by the binocular vision. Inspired by the idea of dynamic window algorithm, a 3-D path planning algorithm is proposed to convert the global path to the combination of a group of local paths by using a series of 3-D models of predefined local paths. According to the screening algorithm for the passable candidate paths, the UAV will select the optimal one to guide its flight. A series of experiments are conducted by using a quadrotor platform DJI M100 and experimental results show the validity of the proposed approach.
在未知的三维室外环境中实现自主场景感知和路径规划是无人机的经典任务。本文研究了利用双目视觉系统进行避障和路径规划的问题。在无人机飞行过程中,利用双目视觉传感器实时获取局部环境信息,并利用双目视觉获取的深度图像分析环境中障碍物的分布情况。受动态窗口算法思想的启发,提出了一种三维路径规划算法,利用一系列预先定义好的局部路径的三维模型,将全局路径转化为一组局部路径的组合。根据可通过候选路径的筛选算法,无人机将选择最优路径引导其飞行。在DJI M100四旋翼平台上进行了一系列实验,实验结果表明了该方法的有效性。
{"title":"Binocular Vision-Based Autonomous Path Planning for UAVs in Unknown Outdoor Scenes","authors":"Yisha Liu, Yan Zhuang, Long Wan, Ge Guo","doi":"10.1109/ICIST.2018.8426133","DOIUrl":"https://doi.org/10.1109/ICIST.2018.8426133","url":null,"abstract":"It is a classic task for Unmanned Aerial Vehicles (UAVs) to accomplish autonomous scene perception and path planning in unknown 3-D outdoor environments. This paper investigates the problems of obstacle avoidance and path planning using binocular vision system. During the UAV's flight, the binocular vision sensor is used to obtain the local environment information in real time, and the distribution of obstacles in the environment can also be analyzed with the depth images acquired by the binocular vision. Inspired by the idea of dynamic window algorithm, a 3-D path planning algorithm is proposed to convert the global path to the combination of a group of local paths by using a series of 3-D models of predefined local paths. According to the screening algorithm for the passable candidate paths, the UAV will select the optimal one to guide its flight. A series of experiments are conducted by using a quadrotor platform DJI M100 and experimental results show the validity of the proposed approach.","PeriodicalId":331555,"journal":{"name":"2018 Eighth International Conference on Information Science and Technology (ICIST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130779861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
8th International Conference on Information Science and Technology 第八届信息科学与技术国际会议
Pub Date : 2018-06-01 DOI: 10.1109/icist.2018.8426170
{"title":"8th International Conference on Information Science and Technology","authors":"","doi":"10.1109/icist.2018.8426170","DOIUrl":"https://doi.org/10.1109/icist.2018.8426170","url":null,"abstract":"","PeriodicalId":331555,"journal":{"name":"2018 Eighth International Conference on Information Science and Technology (ICIST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125260195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Weakness of Ultra-Lightweight Mutual Authentication PRotocol for IoT Devices Using RFlD Tags 使用rfid标签的物联网设备的超轻量级互认证协议的弱点
Pub Date : 2018-06-01 DOI: 10.1109/ICIST.2018.8426178
J. Khor, M. Sidorov
Internet of Things (IoT) has stimulated great interest in many researchers owing to its capability to connect billions of physical devices to the internet via heterogeneous access network. Security is a paramount aspect of IoT that needs to be addressed urgently to keep sensitive data private. However, from previous research studies, a number of security flaws in terms of keeping data private can be identified. Tewari and Gupta proposed an ultra-lightweight mutual authentication pRotocol that utilizes bitwise operation to achieve security in IoT networks that use RFID tags. The pRotocol is improved by Wang et. al. to prevent a full key disclosure attack. However, this paper shows that both of the pRotocols are susceptible to full disclosure, man-in-the-middle, tracking, and de-synchronization attacks. A detailed security analysis is conducted and results are presented to prove their vulnerability. Based on the aforementioned analysis, the pRotocol is modified and improved using a three pass mutual authentication. GNY logic is used to formally verify the security of the pRotocol.
物联网(IoT)能够通过异构接入网将数十亿物理设备连接到互联网,引起了许多研究人员的极大兴趣。安全是物联网的一个重要方面,需要紧急解决,以保持敏感数据的私密性。然而,从之前的研究来看,在保持数据隐私方面可以识别出许多安全漏洞。Tewari和Gupta提出了一种超轻量级的相互认证协议,该协议利用位操作来实现使用RFID标签的物联网网络的安全性。该协议由Wang等人改进,以防止完整的密钥泄露攻击。然而,本文表明这两个协议都容易受到完全披露、中间人攻击、跟踪和反同步攻击的影响。对其进行了详细的安全分析,并给出了分析结果来证明其脆弱性。在上述分析的基础上,对协议进行了修改和改进,采用了三次双向认证。GNY逻辑用于正式验证协议的安全性。
{"title":"Weakness of Ultra-Lightweight Mutual Authentication PRotocol for IoT Devices Using RFlD Tags","authors":"J. Khor, M. Sidorov","doi":"10.1109/ICIST.2018.8426178","DOIUrl":"https://doi.org/10.1109/ICIST.2018.8426178","url":null,"abstract":"Internet of Things (IoT) has stimulated great interest in many researchers owing to its capability to connect billions of physical devices to the internet via heterogeneous access network. Security is a paramount aspect of IoT that needs to be addressed urgently to keep sensitive data private. However, from previous research studies, a number of security flaws in terms of keeping data private can be identified. Tewari and Gupta proposed an ultra-lightweight mutual authentication pRotocol that utilizes bitwise operation to achieve security in IoT networks that use RFID tags. The pRotocol is improved by Wang et. al. to prevent a full key disclosure attack. However, this paper shows that both of the pRotocols are susceptible to full disclosure, man-in-the-middle, tracking, and de-synchronization attacks. A detailed security analysis is conducted and results are presented to prove their vulnerability. Based on the aforementioned analysis, the pRotocol is modified and improved using a three pass mutual authentication. GNY logic is used to formally verify the security of the pRotocol.","PeriodicalId":331555,"journal":{"name":"2018 Eighth International Conference on Information Science and Technology (ICIST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115775282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2018 Eighth International Conference on Information Science and Technology (ICIST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1