Pub Date : 2023-11-14DOI: 10.54097/fcis.v5i3.13847
Qirui Jiang, Yuqi Liu
In the target detection task of aircraft turnaround milestone in foggy scenario, there are some problems such as unstable location of prediction frame boundary, high error detection rate and poor detection effect of small target. A new target detection method BTM-YOLO (Broad-sighted upsample and three-dimensional attention multiple detection head YOLO) is proposed, which is based on YOLOv7 network. Add a small target detection head to improve the ability of small target detection; The up-sampling module OVRAFE is introduced to reduce the information loss in the up-sampling process. Replace CIoU with Median Wise IoU (MWIoU) to suppress the problem of poor sample swelling in data sets. The improved model makes up for the performance shortcomings of small target detection in foggy days, and the average detection accuracy on the real foggy day test set is 76.2%, which is 3.32% higher than that of the original model, basically meeting the task requirements.
在大雾场景下的飞机转弯里程碑目标检测任务中,存在预测帧边界位置不稳定、错误检测率高、小目标检测效果差等问题。基于 YOLOv7 网络,提出了一种新的目标检测方法 BTM-YOLO(Broad-sighted upsample and three-dimensional attention multiple detection head YOLO)。增加小目标检测头,提高小目标检测能力;引入上采样模块 OVRAFE,减少上采样过程中的信息丢失。用中值智能 IoU(MWIoU)代替 CIoU,以解决数据集样本膨胀性差的问题。改进后的模型弥补了雾天小目标检测的性能缺陷,在真实雾天测试集上的平均检测精度为 76.2%,比原模型提高了 3.32%,基本满足任务要求。
{"title":"Object Detection for Aircraft Turnover Milestone based on Modified","authors":"Qirui Jiang, Yuqi Liu","doi":"10.54097/fcis.v5i3.13847","DOIUrl":"https://doi.org/10.54097/fcis.v5i3.13847","url":null,"abstract":"In the target detection task of aircraft turnaround milestone in foggy scenario, there are some problems such as unstable location of prediction frame boundary, high error detection rate and poor detection effect of small target. A new target detection method BTM-YOLO (Broad-sighted upsample and three-dimensional attention multiple detection head YOLO) is proposed, which is based on YOLOv7 network. Add a small target detection head to improve the ability of small target detection; The up-sampling module OVRAFE is introduced to reduce the information loss in the up-sampling process. Replace CIoU with Median Wise IoU (MWIoU) to suppress the problem of poor sample swelling in data sets. The improved model makes up for the performance shortcomings of small target detection in foggy days, and the average detection accuracy on the real foggy day test set is 76.2%, which is 3.32% higher than that of the original model, basically meeting the task requirements.","PeriodicalId":346823,"journal":{"name":"Frontiers in Computing and Intelligent Systems","volume":"339 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139277752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-14DOI: 10.54097/fcis.v5i3.13857
Zhiren Zhu
Biometrics is more and more widely used in the security system, with the current realistic needs as a starting point, a microcontroller-based fingerprint identification electronic lock design method is proposed to realize the transformation from the traditional security system door locks to the new fingerprint identification electronic locks. This design uses the matrix keyboard to enter the password and fingerprint to unlock the door in two ways: Through the fingerprint module to collect fingerprints; stm32 microcontroller as the main control module of the fingerprint identification electronic lock, the fingerprints collected by the AS608 fingerprint module and the fingerprints in the memory of the microcontroller will be compared, and the results will be displayed on the screen, the comparison is successful to open the lock, and vice versa does not open the lock. Through the 4x4 matrix keyboard to realize the password unlocking; stm32 microcontroller as the main control module of the fingerprint identification electronic lock, the password entered on the matrix keyboard and the password in the memory of the microcontroller will be compared, and the unlocking result will be displayed on the screen. This design has the advantages of small size, high cost-effectiveness and reliable safety factor. The overall test results of the system show that the fingerprint identification electronic lock functions normally, and the functional modules work stably, realizing the basic functions that the fingerprint identification electronic lock has, which can be used for door locks and other various devices that need security locks.
{"title":"The Electronic Lock of Fingerprint Identification","authors":"Zhiren Zhu","doi":"10.54097/fcis.v5i3.13857","DOIUrl":"https://doi.org/10.54097/fcis.v5i3.13857","url":null,"abstract":"Biometrics is more and more widely used in the security system, with the current realistic needs as a starting point, a microcontroller-based fingerprint identification electronic lock design method is proposed to realize the transformation from the traditional security system door locks to the new fingerprint identification electronic locks. This design uses the matrix keyboard to enter the password and fingerprint to unlock the door in two ways: Through the fingerprint module to collect fingerprints; stm32 microcontroller as the main control module of the fingerprint identification electronic lock, the fingerprints collected by the AS608 fingerprint module and the fingerprints in the memory of the microcontroller will be compared, and the results will be displayed on the screen, the comparison is successful to open the lock, and vice versa does not open the lock. Through the 4x4 matrix keyboard to realize the password unlocking; stm32 microcontroller as the main control module of the fingerprint identification electronic lock, the password entered on the matrix keyboard and the password in the memory of the microcontroller will be compared, and the unlocking result will be displayed on the screen. This design has the advantages of small size, high cost-effectiveness and reliable safety factor. The overall test results of the system show that the fingerprint identification electronic lock functions normally, and the functional modules work stably, realizing the basic functions that the fingerprint identification electronic lock has, which can be used for door locks and other various devices that need security locks.","PeriodicalId":346823,"journal":{"name":"Frontiers in Computing and Intelligent Systems","volume":"39 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139276611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-14DOI: 10.54097/fcis.v5i3.13810
Zicheng Liu
With the rapid development of computer technology, 3D animation has become a hot and concerned field. Whether it is movies, TV, games or other digital media, 3D animation is playing an increasingly important role. In the process of 3D animation, computers need to deal with a lot of data and complex calculations, so efficient algorithms are of great significance to improve the efficiency of animation production and the quality of simulation. Efficient algorithm plays a vital role in 3D animation, which can improve the computational efficiency, reduce the computational time and save computational resources, and at the same time improve the accuracy and realism of simulation. In this paper, the application of an efficient algorithm-finite element method in the dynamic simulation of viscoelastic fluid is introduced in detail. At the same time, the article also discusses the future technical trends and development direction, which provides ideas and references for further research.
{"title":"Application of Efficient Algorithm in Dynamic Simulation of Viscoelastic Fluid in 3D Animation","authors":"Zicheng Liu","doi":"10.54097/fcis.v5i3.13810","DOIUrl":"https://doi.org/10.54097/fcis.v5i3.13810","url":null,"abstract":"With the rapid development of computer technology, 3D animation has become a hot and concerned field. Whether it is movies, TV, games or other digital media, 3D animation is playing an increasingly important role. In the process of 3D animation, computers need to deal with a lot of data and complex calculations, so efficient algorithms are of great significance to improve the efficiency of animation production and the quality of simulation. Efficient algorithm plays a vital role in 3D animation, which can improve the computational efficiency, reduce the computational time and save computational resources, and at the same time improve the accuracy and realism of simulation. In this paper, the application of an efficient algorithm-finite element method in the dynamic simulation of viscoelastic fluid is introduced in detail. At the same time, the article also discusses the future technical trends and development direction, which provides ideas and references for further research.","PeriodicalId":346823,"journal":{"name":"Frontiers in Computing and Intelligent Systems","volume":"56 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139276205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-14DOI: 10.54097/fcis.v5i3.13841
Minghui Zhang
DARTS has achieved great result in Image classification field, the accuracy predictor and computation costs are the key of DNAS algorithm. Searching for a high-performance architecture always costs Large amount of computation. With a gradient-based bi-level optimization, DARTS using one-step optimization which makes the process available within a few GPU day, because of the one-step optimization , there exists a great gap between the architectures in search and evaluation. In this paper, we propose a zero-cost DARTS method which using multi-step optimization to address the above issues. To further reduce the computational requirements, we use the zen-score to estimate architectures in evaluation stage. Experiments on CIFAR-10 and our private data sets show that our algorithm play a certain role in solving the above problems.
{"title":"A Zero-Cost Darts Base on Multi-Step Optimization","authors":"Minghui Zhang","doi":"10.54097/fcis.v5i3.13841","DOIUrl":"https://doi.org/10.54097/fcis.v5i3.13841","url":null,"abstract":"DARTS has achieved great result in Image classification field, the accuracy predictor and computation costs are the key of DNAS algorithm. Searching for a high-performance architecture always costs Large amount of computation. With a gradient-based bi-level optimization, DARTS using one-step optimization which makes the process available within a few GPU day, because of the one-step optimization , there exists a great gap between the architectures in search and evaluation. In this paper, we propose a zero-cost DARTS method which using multi-step optimization to address the above issues. To further reduce the computational requirements, we use the zen-score to estimate architectures in evaluation stage. Experiments on CIFAR-10 and our private data sets show that our algorithm play a certain role in solving the above problems.","PeriodicalId":346823,"journal":{"name":"Frontiers in Computing and Intelligent Systems","volume":"38 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139277360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-14DOI: 10.54097/fcis.v5i3.13860
Shenrui Lin, Yuangang Li, Yaru Wang
Multibeam bathymetric system is an underwater terrain measurement technology with high efficiency, high accuracy and high resolution. Based on the multibeam bathymetric system, this paper establishes an ideal geometric model and an isobath iterative model. Through the physical method of ideal model, the actual physical problem of multibeam sounding is abstracted into a geometric model about a conic curve, and under the constraint of overlap rate, the coordinates of the next survey line are iterated according to the current depth to solve the optimal set of survey lines. First, the seawater depths, strip coverage widths, and overlap rates with the previous line are calculated for lines at different distances from the center point. Then, the angle between the direction of the survey line and the projection of the normal direction of the seafloor slope on the horizontal plane is introduced to solve for the current coverage width of the survey line. Again, the optimal set of survey lines is solved under the constraint of the overlap rate. Finally, Sobel edge detection is used to divide the surface of the seafloor terrain into multiple planes with defined slope angles to solve the optimal line set for the entire seafloor surface. The structure of the proposed mathematical model is clear and simple, which is in line with the actual situation.
{"title":"Optimization Model of Survey Line Layout for Multibeam Bathymetric Systems","authors":"Shenrui Lin, Yuangang Li, Yaru Wang","doi":"10.54097/fcis.v5i3.13860","DOIUrl":"https://doi.org/10.54097/fcis.v5i3.13860","url":null,"abstract":"Multibeam bathymetric system is an underwater terrain measurement technology with high efficiency, high accuracy and high resolution. Based on the multibeam bathymetric system, this paper establishes an ideal geometric model and an isobath iterative model. Through the physical method of ideal model, the actual physical problem of multibeam sounding is abstracted into a geometric model about a conic curve, and under the constraint of overlap rate, the coordinates of the next survey line are iterated according to the current depth to solve the optimal set of survey lines. First, the seawater depths, strip coverage widths, and overlap rates with the previous line are calculated for lines at different distances from the center point. Then, the angle between the direction of the survey line and the projection of the normal direction of the seafloor slope on the horizontal plane is introduced to solve for the current coverage width of the survey line. Again, the optimal set of survey lines is solved under the constraint of the overlap rate. Finally, Sobel edge detection is used to divide the surface of the seafloor terrain into multiple planes with defined slope angles to solve the optimal line set for the entire seafloor surface. The structure of the proposed mathematical model is clear and simple, which is in line with the actual situation.","PeriodicalId":346823,"journal":{"name":"Frontiers in Computing and Intelligent Systems","volume":"53 9","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139277442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-14DOI: 10.54097/fcis.v5i3.13838
Qin Wang
The purpose of this paper is to discuss the path selection of independent chip innovation in China and the influence of technology blockade in the US. Firstly, this paper introduces the current situation and development trend of global chip industry, and analyzes the current situation and challenges of chip industry in China. Secondly, this paper discusses the path selection of independent chip innovation in China from the perspectives of technology, industry and market, and puts forward corresponding policy suggestions. Finally, this paper analyzes the influence of US technology blockade on China's chip independent innovation and its countermeasures. The research shows that if China's chip industry wants to gain advantages in the fierce global competition, it must strengthen independent innovation and improve its own technical level and innovation ability. At the same time, it is necessary to actively respond to the impact of the US technology blockade, strengthen international cooperation, and promote the healthy development of the global chip industry. I hope the research in this paper can provide some theoretical support and practical reference for the independent innovation of China's chip industry, and contribute to the future development of China's chip industry.
{"title":"The Path Selection of China's Chip Independent Innovation and the Influence of United States Technology Blockade","authors":"Qin Wang","doi":"10.54097/fcis.v5i3.13838","DOIUrl":"https://doi.org/10.54097/fcis.v5i3.13838","url":null,"abstract":"The purpose of this paper is to discuss the path selection of independent chip innovation in China and the influence of technology blockade in the US. Firstly, this paper introduces the current situation and development trend of global chip industry, and analyzes the current situation and challenges of chip industry in China. Secondly, this paper discusses the path selection of independent chip innovation in China from the perspectives of technology, industry and market, and puts forward corresponding policy suggestions. Finally, this paper analyzes the influence of US technology blockade on China's chip independent innovation and its countermeasures. The research shows that if China's chip industry wants to gain advantages in the fierce global competition, it must strengthen independent innovation and improve its own technical level and innovation ability. At the same time, it is necessary to actively respond to the impact of the US technology blockade, strengthen international cooperation, and promote the healthy development of the global chip industry. I hope the research in this paper can provide some theoretical support and practical reference for the independent innovation of China's chip industry, and contribute to the future development of China's chip industry.","PeriodicalId":346823,"journal":{"name":"Frontiers in Computing and Intelligent Systems","volume":"77 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139277450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-14DOI: 10.54097/fcis.v5i3.13854
Yufan Wang, Yuqing Leng, Yuhong Chen
Cold storage belongs to a low-temperature process, which is a form of warehouse, but the biggest difference with the warehouse is "cold", that is, internal cold and external heat. Due to the different nature of use and inventory goods, the warehouse is always at low temperature and high humidity and environments with frequent changes in temperature and humidity. In the process of opening and closing the cold storage door, there will be a large amount of energy consumption, so how to improve energy utilization and reduce costs has become an important issue.
{"title":"Analysis of Hot Air Invasion Characteristics of Cold Storage Smart Door During Opening and Closing Process","authors":"Yufan Wang, Yuqing Leng, Yuhong Chen","doi":"10.54097/fcis.v5i3.13854","DOIUrl":"https://doi.org/10.54097/fcis.v5i3.13854","url":null,"abstract":"Cold storage belongs to a low-temperature process, which is a form of warehouse, but the biggest difference with the warehouse is \"cold\", that is, internal cold and external heat. Due to the different nature of use and inventory goods, the warehouse is always at low temperature and high humidity and environments with frequent changes in temperature and humidity. In the process of opening and closing the cold storage door, there will be a large amount of energy consumption, so how to improve energy utilization and reduce costs has become an important issue.","PeriodicalId":346823,"journal":{"name":"Frontiers in Computing and Intelligent Systems","volume":"8 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139276207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-14DOI: 10.54097/fcis.v5i3.13856
Ying Feng, Chunyan Luo
As companies attempt to make analysis an important data support component of daily decision-making, big data analysis technology is rapidly expanding across all industries. Although there are many software tools and libraries available to assist analysts and software engineers in developing solutions, enterprises are looking for reliable analysis platforms that can meet their specific goals and requirements. In order to minimize costs, such platforms also need to coexist with existing IT infrastructure and reuse the knowledge and resources already accumulated within the organization. To meet these requirements, this article proposes the Data Analysis Solution Engineering (DASE) framework - a knowledge driven approach supported by semantic web technology, for the design and development of requirements engineering and new data analysis platforms. It includes capturing data analysis platform requirements through a knowledge base, and enterprises learning how to use this data analysis platform to analyze all daily production data involved in the engineering data analysis platform. This article analyzes the DASE framework through knowledge modeling, requirement modeling, data architecture modeling, and platform design modeling, and demonstrates how it promotes knowledge and requirement driven data analysis platform engineering. The resulting data analysis platform is considered user-friendly, easy to maintain, and flexible in handling changes in requirements. This work contributes to the knowledge system of knowledge driven requirements engineering and data analysis platform engineering by providing customized models and reference architectures for different analytical application fields.
随着企业试图将分析作为日常决策的重要数据支持组成部分,大数据分析技术正在各行各业迅速扩展。尽管有许多软件工具和库可协助分析师和软件工程师开发解决方案,但企业仍在寻找能够满足其特定目标和要求的可靠分析平台。为了最大限度地降低成本,这些平台还需要与现有的 IT 基础设施共存,并重新利用企业内部已经积累的知识和资源。为满足这些要求,本文提出了数据分析解决方案工程(DASE)框架--一种由语义网技术支持的知识驱动方法,用于设计和开发需求工程和新的数据分析平台。它包括通过知识库捕获数据分析平台需求,以及企业学习如何使用该数据分析平台来分析工程数据分析平台所涉及的所有日常生产数据。本文通过知识建模、需求建模、数据架构建模和平台设计建模对 DASE 框架进行了分析,并展示了该框架如何促进知识和需求驱动的数据分析平台工程。由此产生的数据分析平台被认为是用户友好、易于维护、可灵活处理需求变化的。这项工作通过为不同的分析应用领域提供定制模型和参考架构,为知识驱动的需求工程和数据分析平台工程的知识体系做出了贡献。
{"title":"Research on the Application of Big Data Analysis Platform in the Enterprise Management Optimization","authors":"Ying Feng, Chunyan Luo","doi":"10.54097/fcis.v5i3.13856","DOIUrl":"https://doi.org/10.54097/fcis.v5i3.13856","url":null,"abstract":"As companies attempt to make analysis an important data support component of daily decision-making, big data analysis technology is rapidly expanding across all industries. Although there are many software tools and libraries available to assist analysts and software engineers in developing solutions, enterprises are looking for reliable analysis platforms that can meet their specific goals and requirements. In order to minimize costs, such platforms also need to coexist with existing IT infrastructure and reuse the knowledge and resources already accumulated within the organization. To meet these requirements, this article proposes the Data Analysis Solution Engineering (DASE) framework - a knowledge driven approach supported by semantic web technology, for the design and development of requirements engineering and new data analysis platforms. It includes capturing data analysis platform requirements through a knowledge base, and enterprises learning how to use this data analysis platform to analyze all daily production data involved in the engineering data analysis platform. This article analyzes the DASE framework through knowledge modeling, requirement modeling, data architecture modeling, and platform design modeling, and demonstrates how it promotes knowledge and requirement driven data analysis platform engineering. The resulting data analysis platform is considered user-friendly, easy to maintain, and flexible in handling changes in requirements. This work contributes to the knowledge system of knowledge driven requirements engineering and data analysis platform engineering by providing customized models and reference architectures for different analytical application fields.","PeriodicalId":346823,"journal":{"name":"Frontiers in Computing and Intelligent Systems","volume":"26 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139276367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-14DOI: 10.54097/fcis.v5i3.13865
Hao Xu, Hequn Xian
The pervasive application of network technology has given rise to a numerous of network attacks, including Distributed Denial of Service (DDoS) attacks. DDoS attacks can lead to the collapse of network resources, making the target server unable to support legitimate users, which is a critical issue in cyberspace security. In complex real-world network environments, differentiating DDoS attack traffic from normal traffic is a challenging task, making it significant to effectively distinguish between attack types in order to resist DDoS attacks. However, traditional DDoS attack detection methods have certain limitations in terms of data preprocessing and detection efficiency. In this paper, we propose a lightweight framework based on deep learning called SAE-CNN-Detection (SCD), which combines stacked autoencoder network (SAE) and convolutional neural network (CNN) for DDoS attacks detection. The CIC-DDoS2019 dataset is used to simulate network traffic that has suffered from DDoS attacks, and this system employs adaptive preprocessing techniques for the dataset. The results demonstrate that multi-classification experiment achieves an accuracy of 97.2% for DDoS attack types, while the binary classification experiment achieves an accuracy of 99.1%.
{"title":"SCD: A Detection System for DDoS Attacks based on SAE-CNN Networks","authors":"Hao Xu, Hequn Xian","doi":"10.54097/fcis.v5i3.13865","DOIUrl":"https://doi.org/10.54097/fcis.v5i3.13865","url":null,"abstract":"The pervasive application of network technology has given rise to a numerous of network attacks, including Distributed Denial of Service (DDoS) attacks. DDoS attacks can lead to the collapse of network resources, making the target server unable to support legitimate users, which is a critical issue in cyberspace security. In complex real-world network environments, differentiating DDoS attack traffic from normal traffic is a challenging task, making it significant to effectively distinguish between attack types in order to resist DDoS attacks. However, traditional DDoS attack detection methods have certain limitations in terms of data preprocessing and detection efficiency. In this paper, we propose a lightweight framework based on deep learning called SAE-CNN-Detection (SCD), which combines stacked autoencoder network (SAE) and convolutional neural network (CNN) for DDoS attacks detection. The CIC-DDoS2019 dataset is used to simulate network traffic that has suffered from DDoS attacks, and this system employs adaptive preprocessing techniques for the dataset. The results demonstrate that multi-classification experiment achieves an accuracy of 97.2% for DDoS attack types, while the binary classification experiment achieves an accuracy of 99.1%.","PeriodicalId":346823,"journal":{"name":"Frontiers in Computing and Intelligent Systems","volume":"27 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139276418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-14DOI: 10.54097/fcis.v5i3.13855
Fanrun Meng, Zhiren Zhu, Liming Zhou
With the epidemic raging around the world, people's health is under great threat. How people can detect the epidemic in the first time becomes a very important matter. At this stage, the primary symptom of the outbreak is fever. Therefore, whether in hospitals, various government administrative departments or in office buildings, residential areas and other crowded areas, will be measured by the body temperature to judge the health of personnel. However, the traditional methods of temperature detection need to touch or test the subjects at close range, which will bring certain threats to the human health of the inspectors. Therefore, the design of non-contact and remote epidemic prevention and control equipment is extremely urgent. In this paper, through the use of STM32F103C8T6 micro-controller, the ultrasonic ranging module is used to monitor the distance of the measured personnel in real time. When the measured personnel enter the test range, the infrared temperature sensor MLX90614 is used to test the temperature of the measured personnel. Once it exceeds the set alarm value, the alarm is alerted. The system has high testing efficiency and precision, which is suitable for epidemic prevention and control.
{"title":"Non-contact Infrared Temperature Measuring Device based on stm32","authors":"Fanrun Meng, Zhiren Zhu, Liming Zhou","doi":"10.54097/fcis.v5i3.13855","DOIUrl":"https://doi.org/10.54097/fcis.v5i3.13855","url":null,"abstract":"With the epidemic raging around the world, people's health is under great threat. How people can detect the epidemic in the first time becomes a very important matter. At this stage, the primary symptom of the outbreak is fever. Therefore, whether in hospitals, various government administrative departments or in office buildings, residential areas and other crowded areas, will be measured by the body temperature to judge the health of personnel. However, the traditional methods of temperature detection need to touch or test the subjects at close range, which will bring certain threats to the human health of the inspectors. Therefore, the design of non-contact and remote epidemic prevention and control equipment is extremely urgent. In this paper, through the use of STM32F103C8T6 micro-controller, the ultrasonic ranging module is used to monitor the distance of the measured personnel in real time. When the measured personnel enter the test range, the infrared temperature sensor MLX90614 is used to test the temperature of the measured personnel. Once it exceeds the set alarm value, the alarm is alerted. The system has high testing efficiency and precision, which is suitable for epidemic prevention and control.","PeriodicalId":346823,"journal":{"name":"Frontiers in Computing and Intelligent Systems","volume":"37 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139277006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}