In recent years, there have been many natural disasters in China. After the disaster, communication equipment was damaged to varying degrees, which severely hindered the establishment of communication links between disaster relief departments and disaster sites, which caused great inconvenience to disaster relief tasks. The classification of picture compression technology and commonly used encoding methods was introduced, the international compression standard JPEG algorithm was selected as the picture compression algorithm in this article, the implementation steps of color mode conversion, transformation, quantization, and encoding in the JPEG algorithm was introduced, and finally the Java package was used to implement this compression algorithm. The current status of Beidou satellite navigation system was expounded. A communication program based on Beidou short message communication technology for image transmission was written. The experimental environment and experimental steps were detailed. The feasibility of the JPEG image compression algorithm was verified, which laid the foundation for the improvement of the subsequent experimental process.
{"title":"Research on picture transmission technology based on Beidou communication technology","authors":"Zhiqiang Wang, Zhongtao Dong, Dan Qie","doi":"10.1117/12.2639310","DOIUrl":"https://doi.org/10.1117/12.2639310","url":null,"abstract":"In recent years, there have been many natural disasters in China. After the disaster, communication equipment was damaged to varying degrees, which severely hindered the establishment of communication links between disaster relief departments and disaster sites, which caused great inconvenience to disaster relief tasks. The classification of picture compression technology and commonly used encoding methods was introduced, the international compression standard JPEG algorithm was selected as the picture compression algorithm in this article, the implementation steps of color mode conversion, transformation, quantization, and encoding in the JPEG algorithm was introduced, and finally the Java package was used to implement this compression algorithm. The current status of Beidou satellite navigation system was expounded. A communication program based on Beidou short message communication technology for image transmission was written. The experimental environment and experimental steps were detailed. The feasibility of the JPEG image compression algorithm was verified, which laid the foundation for the improvement of the subsequent experimental process.","PeriodicalId":336892,"journal":{"name":"Neural Networks, Information and Communication Engineering","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114686290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aiming at the characteristics of underwater acoustic networks such as long delay, low channel utilization and low throughput, as well as the existence of temporal-spatial uncertainties and hidden terminals problem, this paper proposes a concurrent scheduling MAC protocol. The protocol exchanges information such as ID, location, level of the receiving and sending nodes, and the scheduling time of data reception by sending handshake control frames. so as to realize the concurrent transmission of data from multiple sending nodes to one receiving node, which not only avoids data collision to a great extent, but also effectively solves the problems of temporal-spatial uncertainties, hidden terminals and and high energy consumption and other problems in Underwater Acoustic Networks, and improve the fairness of node channel access. Network performance such as channel utilization and network throughput. The simulation results shows that the network throughput of CS-MAC protocol is better than ALOHA, R-MAC, and slotted- FAMA, etc. CS-MAC protocol outperforms ALOHA and LSPB-MAC protocols in terms of packet delivery rate and end-to-end delay.
{"title":"CS-MAC: A concurrent scheduling MAC protocol for underwater acoustic networks","authors":"Yi Shang, Xiujuan Du","doi":"10.1117/12.2639195","DOIUrl":"https://doi.org/10.1117/12.2639195","url":null,"abstract":"Aiming at the characteristics of underwater acoustic networks such as long delay, low channel utilization and low throughput, as well as the existence of temporal-spatial uncertainties and hidden terminals problem, this paper proposes a concurrent scheduling MAC protocol. The protocol exchanges information such as ID, location, level of the receiving and sending nodes, and the scheduling time of data reception by sending handshake control frames. so as to realize the concurrent transmission of data from multiple sending nodes to one receiving node, which not only avoids data collision to a great extent, but also effectively solves the problems of temporal-spatial uncertainties, hidden terminals and and high energy consumption and other problems in Underwater Acoustic Networks, and improve the fairness of node channel access. Network performance such as channel utilization and network throughput. The simulation results shows that the network throughput of CS-MAC protocol is better than ALOHA, R-MAC, and slotted- FAMA, etc. CS-MAC protocol outperforms ALOHA and LSPB-MAC protocols in terms of packet delivery rate and end-to-end delay.","PeriodicalId":336892,"journal":{"name":"Neural Networks, Information and Communication Engineering","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129389990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fengyu Wu, Xiu-Yu Liu, J. Wang, Ying Liu, Min Wang
The application purpose of space rapid response launch system based on data link refers to integrate the command information system, sensor system, the launch platform, and platform-mounted command and control system, test and launch control system, measurement and control system and other elements, to realize end-to-end information interconnection and application interoperability, so as to expand the situational awareness scope, command and control efficiency and action coordination ability of a single launch unit. This paper has carried out the research on the launch efficiency improvement methods based on data link application system, distributed decision making and other key technologies, the application work modes and workflows for the typical launch mission scenario, so as to improve the effectiveness of joint command and control at the campaign level and operational coordination at the tactical level.
{"title":"Research on application of space rapid response launch system based on data link","authors":"Fengyu Wu, Xiu-Yu Liu, J. Wang, Ying Liu, Min Wang","doi":"10.1117/12.2639282","DOIUrl":"https://doi.org/10.1117/12.2639282","url":null,"abstract":"The application purpose of space rapid response launch system based on data link refers to integrate the command information system, sensor system, the launch platform, and platform-mounted command and control system, test and launch control system, measurement and control system and other elements, to realize end-to-end information interconnection and application interoperability, so as to expand the situational awareness scope, command and control efficiency and action coordination ability of a single launch unit. This paper has carried out the research on the launch efficiency improvement methods based on data link application system, distributed decision making and other key technologies, the application work modes and workflows for the typical launch mission scenario, so as to improve the effectiveness of joint command and control at the campaign level and operational coordination at the tactical level.","PeriodicalId":336892,"journal":{"name":"Neural Networks, Information and Communication Engineering","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130680775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the vigorous development of the Internet, the number of commonly used software has also increased rapidly. The security and reliability of software have become important challenges that researchers must deal with. Fuzzing is a way of detecting vulnerabilities by providing unintended inputs to the target software and observing the final running results. During these years, fuzzing has proven its effectiveness in software security testing. But a large number of fuzzing tools rely solely on runtime information while testing software. Achieving static vulnerability prediction for programs in advance can greatly improve the efficiency of fuzzing. Vulnerability prediction aims to obtain the possibility of vulnerabilities in different parts of the program. The existing vulnerability prediction methods are relatively simple for feature extraction between basic blocks. We design a novel model combining self-attention mechanism and convolutional neural networks, which can extract and integrate the internal information of functions. Compared with the state-of-the-art V-Fuzz, our recall can be improved by 9.7 percentage points, and the accuracies of K-100~K-1000 can be higher than 90%.
{"title":"Improve vulnerability prediction performance using self-attention mechanism and convolutional neural network","authors":"Bingjie Duan, Xu Zhou, Xugang Wu","doi":"10.1117/12.2639144","DOIUrl":"https://doi.org/10.1117/12.2639144","url":null,"abstract":"With the vigorous development of the Internet, the number of commonly used software has also increased rapidly. The security and reliability of software have become important challenges that researchers must deal with. Fuzzing is a way of detecting vulnerabilities by providing unintended inputs to the target software and observing the final running results. During these years, fuzzing has proven its effectiveness in software security testing. But a large number of fuzzing tools rely solely on runtime information while testing software. Achieving static vulnerability prediction for programs in advance can greatly improve the efficiency of fuzzing. Vulnerability prediction aims to obtain the possibility of vulnerabilities in different parts of the program. The existing vulnerability prediction methods are relatively simple for feature extraction between basic blocks. We design a novel model combining self-attention mechanism and convolutional neural networks, which can extract and integrate the internal information of functions. Compared with the state-of-the-art V-Fuzz, our recall can be improved by 9.7 percentage points, and the accuracies of K-100~K-1000 can be higher than 90%.","PeriodicalId":336892,"journal":{"name":"Neural Networks, Information and Communication Engineering","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114055842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the process of research on ship path tracking control, considering that the rudder angle needs to be optimized and the rudder amplitude and speed are constrained, this paper proposes a model predictive control (MPC) algorithm. High-order nonlinear observers are designed to avoid the impact of environmental interference and solve the problem that the highorder state value of the system is not easy to measure. At the same time, the speed state of the ship and the total unknown items including model uncertainties and external interference are estimated. The prediction model in the article uses a separate ship model that considers the response system of the steering gear, which makes the ship motion control more in line with the actual situation and improves the accuracy. Finally, it is verified by Matlab simulation. The designed controller enables the ship to track the reference path under the time-varying disturbance of wind, waves and currents, and the rudder angle is small and smooth. The results show the effectiveness of the design.
{"title":"Path following of ships based on high order nonlinear observer","authors":"Yi Fan, R. Bu, Xianghui Liu","doi":"10.1117/12.2639168","DOIUrl":"https://doi.org/10.1117/12.2639168","url":null,"abstract":"In the process of research on ship path tracking control, considering that the rudder angle needs to be optimized and the rudder amplitude and speed are constrained, this paper proposes a model predictive control (MPC) algorithm. High-order nonlinear observers are designed to avoid the impact of environmental interference and solve the problem that the highorder state value of the system is not easy to measure. At the same time, the speed state of the ship and the total unknown items including model uncertainties and external interference are estimated. The prediction model in the article uses a separate ship model that considers the response system of the steering gear, which makes the ship motion control more in line with the actual situation and improves the accuracy. Finally, it is verified by Matlab simulation. The designed controller enables the ship to track the reference path under the time-varying disturbance of wind, waves and currents, and the rudder angle is small and smooth. The results show the effectiveness of the design.","PeriodicalId":336892,"journal":{"name":"Neural Networks, Information and Communication Engineering","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122384992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yong Sun, Guangzhao Lu, Di Wang, Shaopan Zhang, W. Yang, Ji-rong Xue
Ammunition damage effect is an important basis for system simulation and ammunition power analysis. To solve the problem of ammunition damage effect analysis, it is necessary to collect relevant data, model, simulate and analyze ammunition. Based on the theoretical formula and test data, this paper proposes a typical ammunition modeling, power field analysis and damage effect analysis method, and constructs the corresponding typical ammunition damage effect analysis software, which includes database, parametric modeling module, power field analysis module, three dimensional visualization module. Compared with the corresponding test data, the credibility of the method and the availability of the software are verified.
{"title":"A typical ammunition damage effect analysis method and software","authors":"Yong Sun, Guangzhao Lu, Di Wang, Shaopan Zhang, W. Yang, Ji-rong Xue","doi":"10.1117/12.2639292","DOIUrl":"https://doi.org/10.1117/12.2639292","url":null,"abstract":"Ammunition damage effect is an important basis for system simulation and ammunition power analysis. To solve the problem of ammunition damage effect analysis, it is necessary to collect relevant data, model, simulate and analyze ammunition. Based on the theoretical formula and test data, this paper proposes a typical ammunition modeling, power field analysis and damage effect analysis method, and constructs the corresponding typical ammunition damage effect analysis software, which includes database, parametric modeling module, power field analysis module, three dimensional visualization module. Compared with the corresponding test data, the credibility of the method and the availability of the software are verified.","PeriodicalId":336892,"journal":{"name":"Neural Networks, Information and Communication Engineering","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126525596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The elevator dispatching system is an organic part of the elevator transportation, which can guarantee the smooth, safe and effective operation of the elevator. China's traditional elevator scheduling system is mainly through the button to call the elevator. The traditional elevator group control method based on the minimum waiting time can not meet the overall demand of the elevator due to its single evaluation index, which leads to a series of problems such as low efficiency of elevator group control and poor joint mobility. In view of this situation, an intelligent elevator scheduling system based on image recognition and voice recognition is designed in this paper. Image recognition, voice recognition and Internet of Things are combined to increase the communication between elevator and passengers, as to improve the efficiency and comfort of passengers and reduce the energy consumption of elevator.
{"title":"Intelligent elevator scheduling algorithm based on image recognition and voice recognition","authors":"Xu Liu, Juntao Huang, X. Tang","doi":"10.1117/12.2639296","DOIUrl":"https://doi.org/10.1117/12.2639296","url":null,"abstract":"The elevator dispatching system is an organic part of the elevator transportation, which can guarantee the smooth, safe and effective operation of the elevator. China's traditional elevator scheduling system is mainly through the button to call the elevator. The traditional elevator group control method based on the minimum waiting time can not meet the overall demand of the elevator due to its single evaluation index, which leads to a series of problems such as low efficiency of elevator group control and poor joint mobility. In view of this situation, an intelligent elevator scheduling system based on image recognition and voice recognition is designed in this paper. Image recognition, voice recognition and Internet of Things are combined to increase the communication between elevator and passengers, as to improve the efficiency and comfort of passengers and reduce the energy consumption of elevator.","PeriodicalId":336892,"journal":{"name":"Neural Networks, Information and Communication Engineering","volume":"217 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116527417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Digital pulse-position modulation (PPM) is a time-domain version of frequency-shift keying that encodes each variable pulse to a particular position within a period. Although numerous essays have researched PPM applied to optical fiber, the PPM process with additive white Gaussian noise (AWGN) was not mentioned. In this paper, a relatively simple model was constructed for 2-bit message signals passing through the AWGN channel. While encoding the baseband signals, Gray Code was adopted to encode them in each period separated into four equal parts. Afterward, they all passed through the AWGN channel, and the constellation of baseband signals and received signals was performed in MATLAB. Then we applied the minimum distance identification method to find the estimated baseband signals. Finally, the PPM signal-tonoise ratio (SNR) was obtained based on previous probability errors. Executing the codes in MATLAB, we got the baseband signals, constellation, and SNR function that can all be directly shown in the figure. In general, our work filled the gap of the PPM method sending over the AWGN channel. This can also become the preliminary foundation for a broader range of applications using PPM to implement the whole communication process with AWGN.
{"title":"The communication process of digital binary pulse-position modulation with additive white Gaussian noise","authors":"R. Bi","doi":"10.1117/12.2640680","DOIUrl":"https://doi.org/10.1117/12.2640680","url":null,"abstract":"Digital pulse-position modulation (PPM) is a time-domain version of frequency-shift keying that encodes each variable pulse to a particular position within a period. Although numerous essays have researched PPM applied to optical fiber, the PPM process with additive white Gaussian noise (AWGN) was not mentioned. In this paper, a relatively simple model was constructed for 2-bit message signals passing through the AWGN channel. While encoding the baseband signals, Gray Code was adopted to encode them in each period separated into four equal parts. Afterward, they all passed through the AWGN channel, and the constellation of baseband signals and received signals was performed in MATLAB. Then we applied the minimum distance identification method to find the estimated baseband signals. Finally, the PPM signal-tonoise ratio (SNR) was obtained based on previous probability errors. Executing the codes in MATLAB, we got the baseband signals, constellation, and SNR function that can all be directly shown in the figure. In general, our work filled the gap of the PPM method sending over the AWGN channel. This can also become the preliminary foundation for a broader range of applications using PPM to implement the whole communication process with AWGN.","PeriodicalId":336892,"journal":{"name":"Neural Networks, Information and Communication Engineering","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114486108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper proposes a new model-based gait recognition method. Different from other methods using 3D (3-dimensional) keypoint information and skeleton information, we directly stack the 2D (2-dimensional) keypoint heatmaps in the gait sequence in the time dimension, and input it into the network structure based on 3D-CNN (3-dimensional-convolutional neural network). Then, through the gait analysis on the two dimensions of time and space, the effective gait features are finally obtained. Compared with other model-based methods, this method is more clear, concise and elegant in the process of feature extraction. The test of CASIA-B dataset shows that in the model-based gait recognition method, we have competitive performance.
{"title":"A new method for gait recognition with 2D pose estimation","authors":"Han Yan, Y. Piao, Xiunan Li","doi":"10.1117/12.2639153","DOIUrl":"https://doi.org/10.1117/12.2639153","url":null,"abstract":"This paper proposes a new model-based gait recognition method. Different from other methods using 3D (3-dimensional) keypoint information and skeleton information, we directly stack the 2D (2-dimensional) keypoint heatmaps in the gait sequence in the time dimension, and input it into the network structure based on 3D-CNN (3-dimensional-convolutional neural network). Then, through the gait analysis on the two dimensions of time and space, the effective gait features are finally obtained. Compared with other model-based methods, this method is more clear, concise and elegant in the process of feature extraction. The test of CASIA-B dataset shows that in the model-based gait recognition method, we have competitive performance.","PeriodicalId":336892,"journal":{"name":"Neural Networks, Information and Communication Engineering","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115541853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In order to solve the problem of low positioning accuracy of disaster relief personnel and rescue efficiency when a disaster occurs in a coal mine, this paper proposes a disaster relief personnel positioning system for coal mine based on Micro-Electro-Mechanical System (MEMS) sensor. The proposed system uses the MPU9150 inertial sensor to obtain measurement data and the CC2530 microprocessor as the main control chip for data acquisition and processing. In the proposed system, the Pedestrian Dead Reckoning (PDR) algorithm is used to determine the step size based on the fusion expression between the walking frequency variance and acceleration, and the quaternion method is used to estimate pedestrian orientation angle. In order to reduce the error caused by the drift of the accelerometer and gyroscope, the extended Kalman filter is employed to correct the original data. The experimental results show that the positioning error of the proposed system is less than 1.6 m in 100 m. Thus, the proposed method can achieve high accuracy in the disaster relief personnel positioning in an underground coal mine.
{"title":"Design and application research of mine underground disaster relief personnel positioning system based on MEMS sensor","authors":"Yue Zhao, Jianyong Wang, Chengyong Duan","doi":"10.1117/12.2639253","DOIUrl":"https://doi.org/10.1117/12.2639253","url":null,"abstract":"In order to solve the problem of low positioning accuracy of disaster relief personnel and rescue efficiency when a disaster occurs in a coal mine, this paper proposes a disaster relief personnel positioning system for coal mine based on Micro-Electro-Mechanical System (MEMS) sensor. The proposed system uses the MPU9150 inertial sensor to obtain measurement data and the CC2530 microprocessor as the main control chip for data acquisition and processing. In the proposed system, the Pedestrian Dead Reckoning (PDR) algorithm is used to determine the step size based on the fusion expression between the walking frequency variance and acceleration, and the quaternion method is used to estimate pedestrian orientation angle. In order to reduce the error caused by the drift of the accelerometer and gyroscope, the extended Kalman filter is employed to correct the original data. The experimental results show that the positioning error of the proposed system is less than 1.6 m in 100 m. Thus, the proposed method can achieve high accuracy in the disaster relief personnel positioning in an underground coal mine.","PeriodicalId":336892,"journal":{"name":"Neural Networks, Information and Communication Engineering","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124425993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}