首页 > 最新文献

2019 6th International Conference on Dependable Systems and Their Applications (DSA)最新文献

英文 中文
Wireless Transmitter Identification Using Multicore Path Network 基于多核路径网络的无线发射机识别
Hui Yu, Shanchuan Ying, Sai Huang, Fan Ning, Z. Feng
Due to the widespread use of wireless communication network, the criminals easily access the Internet through these distributed points for illegal activities. However the identity of the software layer is easily falsified. If the hardware characteristics can be analyzed from the wireless transmitter, it will greatly improve the accuracy of the wireless transmitters. This paper proposes a framework for identifying wireless transmitters using multicore path network (MPN). The nonlinear power amplifier (PA) model uses volterra series to describe the nonlinear behavior of the wireless transmitters. In the proposed MPN, cyclic spectrum features are extracted as the network input. The framework not only reuses features by residual branch path but also explores new features by dense connection path. Meanwhile the MPN merges different scales through different convolution kernels. Through simulation results, we demonstrate that the proposed scheme can be superior than recent methods and has moderate computational complexity.
由于无线通信网络的广泛使用,犯罪分子很容易通过这些分布式点进入互联网进行非法活动。但是,软件层的身份很容易被伪造。如果能从无线发射机的硬件特性上进行分析,将大大提高无线发射机的精度。提出了一种基于多核路径网络(MPN)的无线发射机识别框架。非线性功率放大器(PA)模型采用volterra级数来描述无线发射机的非线性行为。在提出的MPN中,提取循环频谱特征作为网络输入。该框架不仅通过残差分支路径复用特征,而且通过密集连接路径挖掘新特征。同时,MPN通过不同的卷积核来合并不同的尺度。仿真结果表明,该方案优于现有的算法,且具有中等的计算复杂度。
{"title":"Wireless Transmitter Identification Using Multicore Path Network","authors":"Hui Yu, Shanchuan Ying, Sai Huang, Fan Ning, Z. Feng","doi":"10.1109/DSA.2019.00062","DOIUrl":"https://doi.org/10.1109/DSA.2019.00062","url":null,"abstract":"Due to the widespread use of wireless communication network, the criminals easily access the Internet through these distributed points for illegal activities. However the identity of the software layer is easily falsified. If the hardware characteristics can be analyzed from the wireless transmitter, it will greatly improve the accuracy of the wireless transmitters. This paper proposes a framework for identifying wireless transmitters using multicore path network (MPN). The nonlinear power amplifier (PA) model uses volterra series to describe the nonlinear behavior of the wireless transmitters. In the proposed MPN, cyclic spectrum features are extracted as the network input. The framework not only reuses features by residual branch path but also explores new features by dense connection path. Meanwhile the MPN merges different scales through different convolution kernels. Through simulation results, we demonstrate that the proposed scheme can be superior than recent methods and has moderate computational complexity.","PeriodicalId":342719,"journal":{"name":"2019 6th International Conference on Dependable Systems and Their Applications (DSA)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124592499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi Ontology-Based System-Level Software Fuzzy FMEA Method 基于多本体的系统级软件模糊FMEA方法
Xuan Hu, Jie Liu, Yichen Wang
Failure Mode and Effect Analysis (FMEA) is a method for identifying and analyzing potential failures in systems and has been widely used for reliability and safety analysis of hardware and software systems. However, there are some shortcomings when the traditional method is applied to the system-level software FMEA, e.g., the relevant domain knowledge is scattered and not systematic, which makes the analysis result greatly depend on the experience and the familiarity of the domain to be analyzed of the analyst. Moreover, traditional methods are usually based on textual descriptions and have no tool support. These shortcomings greatly hinder the sharing and reuse of system-level software FMEA knowledge. Besides, the traditional method uses the risk priority number (RPN) to determine the priority of the failure mode, ignoring the objective attributes of the system itself, which is not reasonable enough. This paper presents a multi ontology-based system-level software fuzzy FMEA method. This method realizes the sharing and reuse of domain knowledge through the ontology. In addition, the failure mode rating method based on entropy weight and fuzzy TOPSIS overcomes the shortcoming of the traditional method and can improve the rationality of failure mode rating.
失效模式与影响分析(FMEA)是一种识别和分析系统潜在故障的方法,已广泛应用于硬件和软件系统的可靠性和安全性分析。然而,传统方法在应用于系统级软件FMEA时存在一些不足,如相关领域知识分散,不系统,分析结果很大程度上依赖于分析人员的经验和对所分析领域的熟悉程度。此外,传统方法通常基于文本描述,没有工具支持。这些缺点极大地阻碍了系统级软件FMEA知识的共享和重用。此外,传统方法使用风险优先级数(RPN)来确定故障模式的优先级,忽略了系统本身的客观属性,这是不够合理的。提出了一种基于多本体的系统级软件模糊FMEA方法。该方法通过本体实现领域知识的共享和重用。此外,基于熵权和模糊TOPSIS的故障模式评级方法克服了传统方法的不足,提高了故障模式评级的合理性。
{"title":"Multi Ontology-Based System-Level Software Fuzzy FMEA Method","authors":"Xuan Hu, Jie Liu, Yichen Wang","doi":"10.1109/DSA.2019.00015","DOIUrl":"https://doi.org/10.1109/DSA.2019.00015","url":null,"abstract":"Failure Mode and Effect Analysis (FMEA) is a method for identifying and analyzing potential failures in systems and has been widely used for reliability and safety analysis of hardware and software systems. However, there are some shortcomings when the traditional method is applied to the system-level software FMEA, e.g., the relevant domain knowledge is scattered and not systematic, which makes the analysis result greatly depend on the experience and the familiarity of the domain to be analyzed of the analyst. Moreover, traditional methods are usually based on textual descriptions and have no tool support. These shortcomings greatly hinder the sharing and reuse of system-level software FMEA knowledge. Besides, the traditional method uses the risk priority number (RPN) to determine the priority of the failure mode, ignoring the objective attributes of the system itself, which is not reasonable enough. This paper presents a multi ontology-based system-level software fuzzy FMEA method. This method realizes the sharing and reuse of domain knowledge through the ontology. In addition, the failure mode rating method based on entropy weight and fuzzy TOPSIS overcomes the shortcoming of the traditional method and can improve the rationality of failure mode rating.","PeriodicalId":342719,"journal":{"name":"2019 6th International Conference on Dependable Systems and Their Applications (DSA)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129015332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automatic Detection for Reused Open Source Codes Based on Similarity Identification of Software Networks 基于软件网络相似性识别的可重用开源代码自动检测
Tao Shi, Liang Yan, Haoran Guo, J. Ai
Software plays an increasingly important role in today's world. With the advent of open-source software, an increasing number of developers begin to focus on and apply open-source software as a basic tool for their program development. However, at the same time, introducing open-source software into their own software introduces various types of defects and disadvantages. These unknown risks may cause incalculable economic loss aud credit crises if they were to be exploited in the future. Therefore, it is an important and urgent problem to detect the components of open-source software that may be reused when outsourcing software. To help detecting opensource software components in large-scale software projects, this paper proposes automatic identification technology for subnetworks with similar structural characteristics. This technology is based on node role classification, node similarity matching, and similar subnetwork search. This subject applies complex network technology to the comparison of software networks. In contrast to traditional code detection technology, this study does not constrain the text information of the software's source code. Considering that the basic skeleton structure of an application, in the processes of code reuse and features, remains the same, its network structure is used instead of its software structure to avoid problems such as poor detection results of similar codes as a result of text modification. This technology starts from the software features and the structure of software network.
软件在当今世界扮演着越来越重要的角色。随着开源软件的出现,越来越多的开发者开始关注并应用开源软件作为程序开发的基本工具。然而,同时,将开源软件引入到自己的软件中会引入各种类型的缺陷和缺点。这些未知的风险如果在未来被利用,可能会造成不可估量的经济损失和信贷危机。因此,在软件外包时,如何检测开源软件中可能被重用的组件是一个重要而紧迫的问题。为了帮助大型软件项目中开源软件组件的检测,本文提出了具有相似结构特征的子网自动识别技术。该技术基于节点角色分类、节点相似度匹配和相似子网搜索。本课题将复杂网络技术应用于软件网络的比较。与传统的代码检测技术相比,本研究不约束软件源代码的文本信息。考虑到应用程序的基本骨架结构在代码重用和特征处理过程中保持不变,采用其网络结构代替其软件结构,避免了由于文本修改导致相似代码检测结果不佳的问题。该技术从软件特性和软件网络结构入手。
{"title":"Automatic Detection for Reused Open Source Codes Based on Similarity Identification of Software Networks","authors":"Tao Shi, Liang Yan, Haoran Guo, J. Ai","doi":"10.1109/DSA.2019.00042","DOIUrl":"https://doi.org/10.1109/DSA.2019.00042","url":null,"abstract":"Software plays an increasingly important role in today's world. With the advent of open-source software, an increasing number of developers begin to focus on and apply open-source software as a basic tool for their program development. However, at the same time, introducing open-source software into their own software introduces various types of defects and disadvantages. These unknown risks may cause incalculable economic loss aud credit crises if they were to be exploited in the future. Therefore, it is an important and urgent problem to detect the components of open-source software that may be reused when outsourcing software. To help detecting opensource software components in large-scale software projects, this paper proposes automatic identification technology for subnetworks with similar structural characteristics. This technology is based on node role classification, node similarity matching, and similar subnetwork search. This subject applies complex network technology to the comparison of software networks. In contrast to traditional code detection technology, this study does not constrain the text information of the software's source code. Considering that the basic skeleton structure of an application, in the processes of code reuse and features, remains the same, its network structure is used instead of its software structure to avoid problems such as poor detection results of similar codes as a result of text modification. This technology starts from the software features and the structure of software network.","PeriodicalId":342719,"journal":{"name":"2019 6th International Conference on Dependable Systems and Their Applications (DSA)","volume":"192 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124259713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Learning Latest Private-Cluster-State to Improve the Performance of Sample-Based Cluster Scheduling 学习最新私有集群状态以提高基于样本的集群调度性能
Yawen Wang, Qing Wang
Sample based cluster scheduling is considered promising for its high-scalability and low-latency. Its major limitation, on the other hand, is its very limited view of cluster resource state. The limitation confines both its decision precision and the support towards many important scheduling features. There have been several approaches to solve this limitation, yet these works are mostly high-cost solutions that use either extra communication or system component to collect more resource information, which damage the scalability and latency of sample based cluster scheduling. In this paper, we propose L-PCS, a novel learning-based approach based on latest private-cluster-state to generate a relatively accurate knowledge of global cluster state. L-PCS gathers and learns process data of schedulers and predicts a more precise approximation of real-time cluster state for each scheduler. It is a dynamic model updated through time for time-validity. The results predicted by trained model serve as references when schedulers make scheduling decisions. Experiment shows that comparing to sample based schedulers without such learning mechanism, L-PCS improves mean absolute error by 2 × to 3 × and gang scheduling results show a maximum increase of 10.1% to 25.09%.
基于样本的集群调度因其高可伸缩性和低延迟而被认为是有前途的。另一方面,它的主要限制是它对集群资源状态的视图非常有限。这种限制限制了它的决策精度和对许多重要调度特征的支持。有几种方法可以解决这一限制,但这些工作大多是高成本的解决方案,使用额外的通信或系统组件来收集更多的资源信息,这会损害基于样本的集群调度的可伸缩性和延迟。在本文中,我们提出了一种新的基于学习的方法L-PCS,它基于最新的私有集群状态来生成相对准确的全局集群状态知识。L-PCS收集和学习调度程序的进程数据,并为每个调度程序预测更精确的实时集群状态近似值。它是一个动态模型,随着时间的推移而更新,以保证时间有效性。训练后的模型预测结果可作为调度决策的参考。实验表明,与没有这种学习机制的基于样本的调度程序相比,L-PCS的平均绝对误差提高了2 ~ 3倍,组调度结果最大提高了10.1% ~ 25.09%。
{"title":"Learning Latest Private-Cluster-State to Improve the Performance of Sample-Based Cluster Scheduling","authors":"Yawen Wang, Qing Wang","doi":"10.1109/DSA.2019.00014","DOIUrl":"https://doi.org/10.1109/DSA.2019.00014","url":null,"abstract":"Sample based cluster scheduling is considered promising for its high-scalability and low-latency. Its major limitation, on the other hand, is its very limited view of cluster resource state. The limitation confines both its decision precision and the support towards many important scheduling features. There have been several approaches to solve this limitation, yet these works are mostly high-cost solutions that use either extra communication or system component to collect more resource information, which damage the scalability and latency of sample based cluster scheduling. In this paper, we propose L-PCS, a novel learning-based approach based on latest private-cluster-state to generate a relatively accurate knowledge of global cluster state. L-PCS gathers and learns process data of schedulers and predicts a more precise approximation of real-time cluster state for each scheduler. It is a dynamic model updated through time for time-validity. The results predicted by trained model serve as references when schedulers make scheduling decisions. Experiment shows that comparing to sample based schedulers without such learning mechanism, L-PCS improves mean absolute error by 2 × to 3 × and gang scheduling results show a maximum increase of 10.1% to 25.09%.","PeriodicalId":342719,"journal":{"name":"2019 6th International Conference on Dependable Systems and Their Applications (DSA)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125248207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Synthesizing Secure Reactive Controller for Unmanned Aerial System 无人机系统安全响应控制器的综合
W. Lu, Shaoxian Shu, Rao Shi, Rui Li, Wei Dong
Complex CPS such as VAS got rapid development these years, but also became vulnerable to GPS spoofing, packets injection, buffer-overflow and other malicious attacks. Ensuring the behaviors of VAS always keeping secure no matter how the environment changes, would be a prospective direction for VAS security. This paper aims at presenting a reactive synthesisbased approach to implement the automatic generation of secure VAS controller. First, we study the operating mechanism of VAS and construct a high-Ievel model consisting of actuator and monitor. Besides, we analyze the security threats of VAS from the perspective of hardware, software and data transmission, and then extract the corresponding specifications of security properties with LTL formulas. Based on the VAS model and security specifications, the controller can be constructed by GR(l) synthesis algorithm, which is a two-player game process between VAV and Environment. Finally, we expand the function of LTLMoP platform to construct the automatons for controller in multi-robots system, which provides secure behavior strategies under several typical VAS attack scenarios.
VAS等复杂的CPS近年来发展迅速,但也容易受到GPS欺骗、数据包注入、缓冲区溢出等恶意攻击。无论环境如何变化,保证VAS的行为始终保持安全,将是VAS安全的未来发展方向。提出了一种基于响应式合成的安全VAS控制器自动生成方法。首先,研究了VAS的运行机理,构建了由执行器和监控器组成的高级模型。此外,我们从硬件、软件和数据传输的角度分析了VAS的安全威胁,然后用LTL公式提取出相应的安全属性规范。在VAS模型和安全规范的基础上,采用GR(l)综合算法构建控制器,该算法是VAV与环境之间的二人博弈过程。最后,我们扩展了LTLMoP平台的功能,构建了多机器人系统中的控制器自动机,提供了几种典型的VAS攻击场景下的安全行为策略。
{"title":"Synthesizing Secure Reactive Controller for Unmanned Aerial System","authors":"W. Lu, Shaoxian Shu, Rao Shi, Rui Li, Wei Dong","doi":"10.1109/DSA.2019.00065","DOIUrl":"https://doi.org/10.1109/DSA.2019.00065","url":null,"abstract":"Complex CPS such as VAS got rapid development these years, but also became vulnerable to GPS spoofing, packets injection, buffer-overflow and other malicious attacks. Ensuring the behaviors of VAS always keeping secure no matter how the environment changes, would be a prospective direction for VAS security. This paper aims at presenting a reactive synthesisbased approach to implement the automatic generation of secure VAS controller. First, we study the operating mechanism of VAS and construct a high-Ievel model consisting of actuator and monitor. Besides, we analyze the security threats of VAS from the perspective of hardware, software and data transmission, and then extract the corresponding specifications of security properties with LTL formulas. Based on the VAS model and security specifications, the controller can be constructed by GR(l) synthesis algorithm, which is a two-player game process between VAV and Environment. Finally, we expand the function of LTLMoP platform to construct the automatons for controller in multi-robots system, which provides secure behavior strategies under several typical VAS attack scenarios.","PeriodicalId":342719,"journal":{"name":"2019 6th International Conference on Dependable Systems and Their Applications (DSA)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128485803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
[Title page iii] [标题页iii]
{"title":"[Title page iii]","authors":"","doi":"10.1109/dsa.2019.00002","DOIUrl":"https://doi.org/10.1109/dsa.2019.00002","url":null,"abstract":"","PeriodicalId":342719,"journal":{"name":"2019 6th International Conference on Dependable Systems and Their Applications (DSA)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128580805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software Defect Prediction Model Based on Improved BP Neural Network 基于改进BP神经网络的软件缺陷预测模型
Y. Liu, Fengli Sun, Jun Yang, Donghong Zhou
This paper proposes a software defect prediction algorithm based on improved BP neural network, which can effectively improve the prediction accuracy caused by the imbalance of the category distribution of data within the project. In this paper, in order to improve the data imbalance in the project, we use SMOTE algorithm to increase the minority samples (defective software modules), the ENN (Extended Nearest Neighbor Algorithm ) data cleaning algorithm is performed for the post-sampling data noise problem. The SA ( Simulated Annealing ) algorithm is used to optimize the four- layers BP neural network to establish the classification prediction model on the AEEEM database. We use cross validation to evaluate the performance of the proposed algorithm on AEEEM database. The results show that the proposed algorithm can effectively improve the performance of the model in predicting unbalanced data.
本文提出了一种基于改进BP神经网络的软件缺陷预测算法,可以有效提高项目内数据类别分布不平衡所导致的预测精度。本文为了改善工程中的数据不平衡问题,采用SMOTE算法增加少数样本(缺陷软件模块),采用ENN(扩展最近邻算法)数据清洗算法解决采样后的数据噪声问题。采用模拟退火算法对四层BP神经网络进行优化,在AEEEM数据库上建立分类预测模型。我们使用交叉验证来评估该算法在AEEEM数据库上的性能。结果表明,该算法能有效提高模型对不平衡数据的预测性能。
{"title":"Software Defect Prediction Model Based on Improved BP Neural Network","authors":"Y. Liu, Fengli Sun, Jun Yang, Donghong Zhou","doi":"10.1109/DSA.2019.00095","DOIUrl":"https://doi.org/10.1109/DSA.2019.00095","url":null,"abstract":"This paper proposes a software defect prediction algorithm based on improved BP neural network, which can effectively improve the prediction accuracy caused by the imbalance of the category distribution of data within the project. In this paper, in order to improve the data imbalance in the project, we use SMOTE algorithm to increase the minority samples (defective software modules), the ENN (Extended Nearest Neighbor Algorithm ) data cleaning algorithm is performed for the post-sampling data noise problem. The SA ( Simulated Annealing ) algorithm is used to optimize the four- layers BP neural network to establish the classification prediction model on the AEEEM database. We use cross validation to evaluate the performance of the proposed algorithm on AEEEM database. The results show that the proposed algorithm can effectively improve the performance of the model in predicting unbalanced data.","PeriodicalId":342719,"journal":{"name":"2019 6th International Conference on Dependable Systems and Their Applications (DSA)","volume":"152 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129214388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Method of Improved Automatic Light Tracing 一种改进的自动光跟踪方法
Yujian Jiang, Yan-Niu Ren, Kai Song, Wei Jiang
At present Auto-Tracking technology attracted increasing attention in the field of stage lighting. Most of the existing automatic lighting tracing methods adopt indoor positioning technology to acquire the location parameters of the tracing object. Then the location parameters were converted into the control data of moving light for automatic tracing. The main problems are as follows: one is the positional errors of special light position such as front light and fixed-point light. The other is the miss tracking of moving targets. In this paper, according to the projection requirements of front light and fixed-point light, the existing tracing model is improved. The error between the spot and the actual position is analyzed. Test results show that the accuracy of the upper left and upper right directions is relatively high. The bigger the curvature amplitude is, the bigger the error is. At the same time, the test data provide theory evidence for the setting of the tracing light position and the design of the performance route.
目前,自动跟踪技术在舞台灯光领域受到越来越多的关注。现有的照明自动跟踪方法大多采用室内定位技术来获取跟踪对象的位置参数。然后将定位参数转换为运动光的控制数据进行自动跟踪。主要问题有:一是前灯、定点灯等特殊光源位置的定位误差。二是对移动目标的脱靶跟踪。本文根据前光源和定点光源的投影要求,对现有的跟踪模型进行了改进。分析了现场位置与实际位置之间的误差。测试结果表明,左上方向和右上方向的精度较高。曲率幅值越大,误差越大。同时,试验数据为跟踪灯位置的设置和性能路线的设计提供了理论依据。
{"title":"A Method of Improved Automatic Light Tracing","authors":"Yujian Jiang, Yan-Niu Ren, Kai Song, Wei Jiang","doi":"10.1109/DSA.2019.00016","DOIUrl":"https://doi.org/10.1109/DSA.2019.00016","url":null,"abstract":"At present Auto-Tracking technology attracted increasing attention in the field of stage lighting. Most of the existing automatic lighting tracing methods adopt indoor positioning technology to acquire the location parameters of the tracing object. Then the location parameters were converted into the control data of moving light for automatic tracing. The main problems are as follows: one is the positional errors of special light position such as front light and fixed-point light. The other is the miss tracking of moving targets. In this paper, according to the projection requirements of front light and fixed-point light, the existing tracing model is improved. The error between the spot and the actual position is analyzed. Test results show that the accuracy of the upper left and upper right directions is relatively high. The bigger the curvature amplitude is, the bigger the error is. At the same time, the test data provide theory evidence for the setting of the tracing light position and the design of the performance route.","PeriodicalId":342719,"journal":{"name":"2019 6th International Conference on Dependable Systems and Their Applications (DSA)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126606265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2019 6th International Conference on Dependable Systems and Their Applications (DSA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1