首页 > 最新文献

2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)最新文献

英文 中文
RF Fingerprint Recognition in Resource-Constrained Edge Computing 资源受限边缘计算中的射频指纹识别
Di Liu, Hao Wang, Mengjuan Wang
RF fingerprinting is a method to identify different wireless devices based on hardware differences in the communication devices, aiming to assist in solving the problem of secure access to wireless networks. Traditional RF fingerprinting relies on feature extraction and the training and prediction of data under a single node. However, in real-world application scenarios, it is impractical to send all data to a centralized location, and these approaches do not take into account the limited resources such as bandwidth and storage in edge networks. In this paper, we use distributed machine learning to solve the problem of learning models from data from multiple edge nodes. And the high communication cost in distributed machine learning is optimized for the problem of resource constraint of edge devices. Simulation results show that the method can not only cope with the training problem of a large amount of data but also reduce the communication cost on the edge devices, which can reduce the training time by about 9%.
射频指纹识别是一种基于通信设备硬件差异来识别不同无线设备的方法,旨在帮助解决无线网络的安全接入问题。传统的射频指纹识别依赖于单个节点下的特征提取和数据的训练和预测。然而,在实际应用场景中,将所有数据发送到集中位置是不切实际的,并且这些方法没有考虑到边缘网络中带宽和存储等有限资源。在本文中,我们使用分布式机器学习来解决从多个边缘节点的数据中学习模型的问题。针对边缘设备的资源约束问题,对分布式机器学习中通信成本高的问题进行了优化。仿真结果表明,该方法不仅可以处理大量数据的训练问题,而且可以降低边缘设备上的通信成本,使训练时间减少约9%。
{"title":"RF Fingerprint Recognition in Resource-Constrained Edge Computing","authors":"Di Liu, Hao Wang, Mengjuan Wang","doi":"10.1109/ICCWAMTIP53232.2021.9674057","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674057","url":null,"abstract":"RF fingerprinting is a method to identify different wireless devices based on hardware differences in the communication devices, aiming to assist in solving the problem of secure access to wireless networks. Traditional RF fingerprinting relies on feature extraction and the training and prediction of data under a single node. However, in real-world application scenarios, it is impractical to send all data to a centralized location, and these approaches do not take into account the limited resources such as bandwidth and storage in edge networks. In this paper, we use distributed machine learning to solve the problem of learning models from data from multiple edge nodes. And the high communication cost in distributed machine learning is optimized for the problem of resource constraint of edge devices. Simulation results show that the method can not only cope with the training problem of a large amount of data but also reduce the communication cost on the edge devices, which can reduce the training time by about 9%.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129727653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Cross-Chain Solutions Based On Proxy Network 基于代理网络的跨链解决方案
Wang Wei, Wang Juan, Wang Ziyang, Liuyaning
Most of the current research on cross-chain technology focuses on the efficiency and security of currency transactions, which cannot be well applied to the non-financial field of storing large-volume engineering documents and data. Cross-chain supervision and storage is more difficult, and data structure conversion is complicated. To solve these problems, this paper applies node performance index and identity evaluation techniques to engineering document data cross-linking, and proposes a cross-linking scheme of the agent network. Based on the government node characteristics of blockchain in the field of engineering document management, an agent node election algorithm is designed and an agent cross-chain network is constructed. Simulation results show that this scheme can complete agent election and cross-chain message forwarding, and has application value.
目前对跨链技术的研究大多集中在货币交易的效率和安全性上,不能很好地应用于存储大量工程文档和数据的非金融领域。跨链监管和存储难度较大,数据结构转换复杂。针对这些问题,本文将节点性能指标和身份评价技术应用于工程文档数据的交联,提出了一种代理网络的交联方案。根据区块链在工程文档管理领域的政务节点特点,设计了代理节点选举算法,构建了代理跨链网络。仿真结果表明,该方案能够完成代理的选举和跨链消息的转发,具有一定的应用价值。
{"title":"A Cross-Chain Solutions Based On Proxy Network","authors":"Wang Wei, Wang Juan, Wang Ziyang, Liuyaning","doi":"10.1109/ICCWAMTIP53232.2021.9674133","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674133","url":null,"abstract":"Most of the current research on cross-chain technology focuses on the efficiency and security of currency transactions, which cannot be well applied to the non-financial field of storing large-volume engineering documents and data. Cross-chain supervision and storage is more difficult, and data structure conversion is complicated. To solve these problems, this paper applies node performance index and identity evaluation techniques to engineering document data cross-linking, and proposes a cross-linking scheme of the agent network. Based on the government node characteristics of blockchain in the field of engineering document management, an agent node election algorithm is designed and an agent cross-chain network is constructed. Simulation results show that this scheme can complete agent election and cross-chain message forwarding, and has application value.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130975089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Tradeblock: Blockchain Based System for Online Classified Advertisement Industries Tradeblock:基于区块链的在线分类广告行业系统
Collins Sey, Xiaoyu Li, Weizhong Qian, Linda Delali Fiasam, Seth Larweh Kodjiku, Adu Asare Baffour, Isaac Adjei-Mensah
For decades, classified ads were limited to newspapers, which offered advertisers, small-type notices grouped under specific categories. However, owing to the growing use of mobile internet, online classified market is rapidly gaining grounds in our world. This rapid growth in the classified industry has led to an increase in the number of companies seeking to gain share in this ever-growing market and also with a direct relation to increase in online scammers and fraudulent activities and also trust relationship issues. Scammers detected on one classified ad platform replicate their bad behaviors on multiple platforms. This research presents an innovative solution known as “TradeBlock”, for online classified ad industries to solve these key issues and to improve the whole online classified ad industry using blockchain's complete immutable and decentralized technology of keeping records.
几十年来,分类广告仅限于报纸,报纸向广告商提供按特定类别分组的小型广告。然而,由于移动互联网的日益普及,在线分类市场正在迅速发展。分类行业的快速增长导致越来越多的公司寻求在这个不断增长的市场中获得份额,这也与在线骗子和欺诈活动的增加以及信任关系问题直接相关。在一个分类广告平台上发现的骗子会在多个平台上复制他们的不良行为。本研究为在线分类广告行业提供了一个名为“tradelock”的创新解决方案,以解决这些关键问题,并利用区块链的完全不可变和分散的记录保存技术来改善整个在线分类广告行业。
{"title":"Tradeblock: Blockchain Based System for Online Classified Advertisement Industries","authors":"Collins Sey, Xiaoyu Li, Weizhong Qian, Linda Delali Fiasam, Seth Larweh Kodjiku, Adu Asare Baffour, Isaac Adjei-Mensah","doi":"10.1109/ICCWAMTIP53232.2021.9674070","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674070","url":null,"abstract":"For decades, classified ads were limited to newspapers, which offered advertisers, small-type notices grouped under specific categories. However, owing to the growing use of mobile internet, online classified market is rapidly gaining grounds in our world. This rapid growth in the classified industry has led to an increase in the number of companies seeking to gain share in this ever-growing market and also with a direct relation to increase in online scammers and fraudulent activities and also trust relationship issues. Scammers detected on one classified ad platform replicate their bad behaviors on multiple platforms. This research presents an innovative solution known as “TradeBlock”, for online classified ad industries to solve these key issues and to improve the whole online classified ad industry using blockchain's complete immutable and decentralized technology of keeping records.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"04 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128185425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Vulmg: A Static Detection Solution For Source Code Vulnerabilities Based On Code Property Graph and Graph Attention Network 基于代码属性图和图关注网络的源代码漏洞静态检测解决方案Vulmg
Zhang Haojie, Liao Yujun, Liu Yiwei, Zhou Nanxin
As the number of vulnerabilities continues to rise, security incidents triggered by vulnerabilities emerge endlessly. Current vulnerability detection methods still have some problems, such as detecting only a single function, relying heavily on expert knowledge, and being unable to achieve automation. According to the observation of the Juliet dataset, we find vulnerability exists not only within the single function but also between the called function and the calling function. Meanwhile, there are some differences between vulnerable functions and non-vulnerable functions in the code property graph. Therefore, this article proposes a vulnerability detection solution named VULMG, which converts vulnerability detection into the graph classification problem. VULMG includes a vectorization component named VecG and a deep learning classification model named MGGAT. Based on the code property graph, VecG extracts the lexical, grammatical, and semantic information of the source code as a feature matrix and extracts information such as structure, control, and dependence as three adjacency matrices. MGGAT is a deep learning model based on the graph attention network, which is used for graph classification. Besides, VULMG uses the FCG to associate the calling function with the called function so that it can detect the cross-function vulnerabilities. We selected CWE369 and CWE476 from the Juliet dataset for testing, and the F1 scores were 94.43% and 96.3%. The evaluation results indicate that VULMG outperforms Flawfinder, RATS, BiLSTM, SVM, and GCN, which verifies the effectiveness of the proposed solution.
随着漏洞数量的不断增加,漏洞引发的安全事件层出不穷。目前的漏洞检测方法还存在检测功能单一、严重依赖专家知识、无法实现自动化等问题。通过对Juliet数据集的观察,我们发现漏洞不仅存在于单个函数内部,也存在于被调用函数与被调用函数之间。同时,代码属性图中脆弱函数与非脆弱函数存在一定的差异。因此,本文提出了一种名为VULMG的漏洞检测方案,将漏洞检测转化为图分类问题。VULMG包括一个矢量化组件VecG和一个深度学习分类模型MGGAT。基于代码属性图,VecG将源代码的词法、语法和语义信息提取为特征矩阵,将结构、控制、依赖等信息提取为三个邻接矩阵。MGGAT是一种基于图注意网络的深度学习模型,用于图的分类。此外,VULMG使用FCG将调用函数与被调用函数关联起来,以便检测跨功能漏洞。我们选择Juliet数据集中的CWE369和CWE476进行测试,F1得分分别为94.43%和96.3%。评估结果表明,VULMG优于缺陷查找器、RATS、BiLSTM、SVM和GCN,验证了该方法的有效性。
{"title":"Vulmg: A Static Detection Solution For Source Code Vulnerabilities Based On Code Property Graph and Graph Attention Network","authors":"Zhang Haojie, Liao Yujun, Liu Yiwei, Zhou Nanxin","doi":"10.1109/ICCWAMTIP53232.2021.9674145","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674145","url":null,"abstract":"As the number of vulnerabilities continues to rise, security incidents triggered by vulnerabilities emerge endlessly. Current vulnerability detection methods still have some problems, such as detecting only a single function, relying heavily on expert knowledge, and being unable to achieve automation. According to the observation of the Juliet dataset, we find vulnerability exists not only within the single function but also between the called function and the calling function. Meanwhile, there are some differences between vulnerable functions and non-vulnerable functions in the code property graph. Therefore, this article proposes a vulnerability detection solution named VULMG, which converts vulnerability detection into the graph classification problem. VULMG includes a vectorization component named VecG and a deep learning classification model named MGGAT. Based on the code property graph, VecG extracts the lexical, grammatical, and semantic information of the source code as a feature matrix and extracts information such as structure, control, and dependence as three adjacency matrices. MGGAT is a deep learning model based on the graph attention network, which is used for graph classification. Besides, VULMG uses the FCG to associate the calling function with the called function so that it can detect the cross-function vulnerabilities. We selected CWE369 and CWE476 from the Juliet dataset for testing, and the F1 scores were 94.43% and 96.3%. The evaluation results indicate that VULMG outperforms Flawfinder, RATS, BiLSTM, SVM, and GCN, which verifies the effectiveness of the proposed solution.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"62 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120817103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improve Traffic Organization in the Passenger Gravitation Zone 完善客流重点区交通组织
Rajabov Bakhrom, Liu Lan
The modernization of production and the realization of its development require proper transportation infrastructure to build road transportation on all elements of the transportation network, expand the transportation of technical equipment, and improve its reliability. This article aims to study the improvement of traffic organization in the passenger gravity zone. This article takes this city as an example. According to the characteristics of the research objects, the factor analysis method is used to calculate and rank the attractiveness of nodes, and determine the attractiveness level and size of these nodes. Experimental data shows that in order to make it easier for tourists and citizens to transfer to buses, subways and other means of transportation in the city, the city must gradually establish a slow transportation transfer system. The slow traffic transfer system here is mainly the transfer of public bicycles, walking and other modes of transportation. The results of the experiment show that the survey of the transportation modes of 400 passengers to the city estimates that the current state of transportation in the city in the first half of 2020 is: buses accounted for 14.0%, walking accounted for 28.3%, bicycles and electric vehicles accounted for 24.2%, Private cars accounted for 19.2%, taxis accounted for 14.3%, so the slow traffic attracted 52.5%. Without systematically studying the nature of changes in passenger traffic in the transportation network, it is impossible to successfully solve the problem of rational organization of passenger transportation and effective use of rolling stock. Through the study of passenger volume, the distribution of time, route length and direction of travel can be determined, so as to better solve the problem of traffic organization.
生产现代化及其发展的实现,需要适当的交通基础设施,在交通运输网的各个要素上建设道路运输,扩大技术装备的运输,提高其可靠性。本文旨在研究客流重点区交通组织的改进。本文以这个城市为例。根据研究对象的特点,采用因子分析法对节点的吸引力进行计算和排序,确定节点的吸引力水平和大小。实验数据表明,为了让游客和市民更方便地换乘城市中的公交车、地铁等交通工具,城市必须逐步建立慢速交通换乘系统。这里的慢速交通换乘系统主要是公共自行车、步行等交通方式的换乘。实验结果显示,通过对400名乘客到城市的交通方式的调查估算,2020年上半年城市交通现状为:公交车占14.0%,步行占28.3%,自行车和电动车占24.2%,私家车占19.2%,出租车占14.3%,因此慢行交通吸引了52.5%。如果不系统地研究交通网络中客运变化的性质,就不可能成功地解决客运的合理组织和车辆的有效利用问题。通过对客运量的研究,可以确定时间、路线长度和行驶方向的分布,从而更好地解决交通组织问题。
{"title":"Improve Traffic Organization in the Passenger Gravitation Zone","authors":"Rajabov Bakhrom, Liu Lan","doi":"10.1109/ICCWAMTIP53232.2021.9674122","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674122","url":null,"abstract":"The modernization of production and the realization of its development require proper transportation infrastructure to build road transportation on all elements of the transportation network, expand the transportation of technical equipment, and improve its reliability. This article aims to study the improvement of traffic organization in the passenger gravity zone. This article takes this city as an example. According to the characteristics of the research objects, the factor analysis method is used to calculate and rank the attractiveness of nodes, and determine the attractiveness level and size of these nodes. Experimental data shows that in order to make it easier for tourists and citizens to transfer to buses, subways and other means of transportation in the city, the city must gradually establish a slow transportation transfer system. The slow traffic transfer system here is mainly the transfer of public bicycles, walking and other modes of transportation. The results of the experiment show that the survey of the transportation modes of 400 passengers to the city estimates that the current state of transportation in the city in the first half of 2020 is: buses accounted for 14.0%, walking accounted for 28.3%, bicycles and electric vehicles accounted for 24.2%, Private cars accounted for 19.2%, taxis accounted for 14.3%, so the slow traffic attracted 52.5%. Without systematically studying the nature of changes in passenger traffic in the transportation network, it is impossible to successfully solve the problem of rational organization of passenger transportation and effective use of rolling stock. Through the study of passenger volume, the distribution of time, route length and direction of travel can be determined, so as to better solve the problem of traffic organization.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124002551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NFCS: An Efficient Neural Framework for Cold Start Recommendation NFCS:冷启动推荐的有效神经框架
Wang Zhou, Laixiang Qiu, Meijun Duan, Amin Ul Haq
In this article we have illustrated an efficient and effective neural framework referred to as NFCS for cold start recommendation. In this neural network, the average ratings will be as the input, and the missing ratings will be regarded as the dropout rate for the neural network. Therefore, in the output layer ratings will be reconstructed, which could provide an high performance solution for cold start problem. Experimental results also demonstrate that NFCS could outperform state-of-the-art PMF and IRCD-ICS over real life datasets.
在本文中,我们展示了一种高效的神经框架,称为NFCS,用于冷启动推荐。在该神经网络中,将平均评分作为输入,缺失评分作为神经网络的辍学率。因此,在输出层对额定值进行重构,可以为冷启动问题提供高性能的解决方案。实验结果还表明,NFCS在现实生活数据集上的表现优于最先进的PMF和IRCD-ICS。
{"title":"NFCS: An Efficient Neural Framework for Cold Start Recommendation","authors":"Wang Zhou, Laixiang Qiu, Meijun Duan, Amin Ul Haq","doi":"10.1109/ICCWAMTIP53232.2021.9674059","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674059","url":null,"abstract":"In this article we have illustrated an efficient and effective neural framework referred to as NFCS for cold start recommendation. In this neural network, the average ratings will be as the input, and the missing ratings will be regarded as the dropout rate for the neural network. Therefore, in the output layer ratings will be reconstructed, which could provide an high performance solution for cold start problem. Experimental results also demonstrate that NFCS could outperform state-of-the-art PMF and IRCD-ICS over real life datasets.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123539246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimized QC-LDPC Coded Cooperation for Single Relay Wireless Cooperative Communication System 单中继无线协同通信系统优化QC-LDPC编码协作
Harit Rijal, Yang Fengfan, Gershon Rodor
This literature proposes an optimized design of a coded cooperative system using QC LDPC codes with joint decoding at the destination based on the bilayered Tanner graph. Firstly, the literature first introduces QC-LDPC and its construction method based on exponent matrix and base matrix. Then equivalent parity check matrix was constructed in the destination using the bi-layer Tanner graph for the coded cooperation. The literature implemented the iterative Belief Propagation (BP) algorithm-based decoding method to decode equivalent parity check matrix at the destination. Finally, BER performance analysis was performed. The performance analysis result illustrated that the optimized QC-LDPC coded cooperation has a better performance compared to the non-cooperative coded systems over similar channel conditions.
本文提出了一种基于双层Tanner图的QC LDPC码在目的地联合译码的编码协作系统的优化设计。首先,文献首先介绍了QC-LDPC及其基于指数矩阵和基矩阵的构造方法。然后利用双层Tanner图在目标区域构造等价奇偶校验矩阵,实现编码合作。文献实现了基于迭代信念传播(BP)算法的解码方法,在目的地解码等效奇偶校验矩阵。最后,进行误码率性能分析。性能分析结果表明,在相似信道条件下,优化后的QC-LDPC编码合作比非合作编码系统具有更好的性能。
{"title":"Optimized QC-LDPC Coded Cooperation for Single Relay Wireless Cooperative Communication System","authors":"Harit Rijal, Yang Fengfan, Gershon Rodor","doi":"10.1109/ICCWAMTIP53232.2021.9674081","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674081","url":null,"abstract":"This literature proposes an optimized design of a coded cooperative system using QC LDPC codes with joint decoding at the destination based on the bilayered Tanner graph. Firstly, the literature first introduces QC-LDPC and its construction method based on exponent matrix and base matrix. Then equivalent parity check matrix was constructed in the destination using the bi-layer Tanner graph for the coded cooperation. The literature implemented the iterative Belief Propagation (BP) algorithm-based decoding method to decode equivalent parity check matrix at the destination. Finally, BER performance analysis was performed. The performance analysis result illustrated that the optimized QC-LDPC coded cooperation has a better performance compared to the non-cooperative coded systems over similar channel conditions.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122855050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improvement of PBFT Consensus Mechanism Based on Credibility 基于可信度的PBFT共识机制改进
Wang Ziyang, Wang Juan, Liu Yaning, Wang Wei
Consensus mechanism is particularly critical in blockchain technology. Aiming at the shortcomings of traditional consensus mechanisms in the application of power system engineering management, this article improves the Byzantine Fault Tolerance (PBFT) consensus algorithm based on the reputation value. First, according to different business environments, design the corresponding credit value influencing factors, and then use each influencing factor as input, and use the random forest algorithm to classify the nodes into three node clusters based on the reputation value of high, medium, and low. Election of the master node is carried out in the high reputation value node cluster and the continuous election of the master node is suppressed, and the low reputation value cluster is detected to find possible malicious nodes. The simulation experiment results show that the master nodes are more secure and evenly distributed; at the same time, malicious nodes in the system can be found to ensure system stability.
共识机制在区块链技术中尤为关键。针对传统共识机制在电力系统工程管理应用中的不足,改进了基于声誉值的拜占庭容错(PBFT)共识算法。首先,根据不同的商业环境,设计相应的信用值影响因素,然后将每个影响因素作为输入,使用随机森林算法将节点按照信誉值的高、中、低分为三个节点簇。在信誉值高的节点集群中进行主节点的选举,抑制主节点的连续选举,检测信誉值低的节点集群,发现可能存在的恶意节点。仿真实验结果表明,主节点更安全、分布更均匀;同时发现系统中的恶意节点,保证系统的稳定性。
{"title":"Improvement of PBFT Consensus Mechanism Based on Credibility","authors":"Wang Ziyang, Wang Juan, Liu Yaning, Wang Wei","doi":"10.1109/ICCWAMTIP53232.2021.9674168","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674168","url":null,"abstract":"Consensus mechanism is particularly critical in blockchain technology. Aiming at the shortcomings of traditional consensus mechanisms in the application of power system engineering management, this article improves the Byzantine Fault Tolerance (PBFT) consensus algorithm based on the reputation value. First, according to different business environments, design the corresponding credit value influencing factors, and then use each influencing factor as input, and use the random forest algorithm to classify the nodes into three node clusters based on the reputation value of high, medium, and low. Election of the master node is carried out in the high reputation value node cluster and the continuous election of the master node is suppressed, and the low reputation value cluster is detected to find possible malicious nodes. The simulation experiment results show that the master nodes are more secure and evenly distributed; at the same time, malicious nodes in the system can be found to ensure system stability.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129743891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Manifold-Derived Gradients Link the Cortical Morphology to Gene Expression in Patients with Epilepsy 流形衍生的梯度将癫痫患者的皮质形态与基因表达联系起来
Yang Siqi, Meng Yao, Zhiqiang Zhang, Liao Wei
Diffusion embedding techniques offer the means to map brain organizational principles into a single manifold, called gradients, which help us understand how multi-scale brain features are related to each other. These links can help us understand the neural mechanism, and further broaden our insight into the relation between structure and function. In this study, manifold gradient was leveraged to study the link of macroscopic morphology to cortical gene expression in 92 genetic generalized epilepsy with generalized tonic-clonic seizures (GTCS), and 116 healthy controls. Diffusion map embedding was used to estimate the gradients of morphometric similarity (MS) connectome, which described the interregional similarity through five cortical features. The results revealed significant between-group differences in the MS gradient in GTCS, mainly involved in high-level networks. And the changes in MS gradient showed a positively correlation between expression profile of epileptic risk genes.
扩散嵌入技术提供了将大脑组织原理映射到一个称为梯度的单一流形的方法,这有助于我们理解多尺度大脑特征是如何相互关联的。这些联系可以帮助我们理解神经机制,并进一步拓宽我们对结构与功能关系的认识。本研究利用多元梯度研究了92例遗传性广泛性癫痫伴全身性强直-阵挛发作(GTCS)患者和116例健康对照者的宏观形态学与皮质基因表达的关系。采用扩散图嵌入方法估计形态相似性连接组的梯度,该连接组通过5个皮层特征描述区域间的相似性。结果显示,GTCS的MS梯度在组间存在显著差异,主要涉及高级网络。MS梯度的变化与癫痫危险基因的表达谱呈正相关。
{"title":"Manifold-Derived Gradients Link the Cortical Morphology to Gene Expression in Patients with Epilepsy","authors":"Yang Siqi, Meng Yao, Zhiqiang Zhang, Liao Wei","doi":"10.1109/ICCWAMTIP53232.2021.9674125","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674125","url":null,"abstract":"Diffusion embedding techniques offer the means to map brain organizational principles into a single manifold, called gradients, which help us understand how multi-scale brain features are related to each other. These links can help us understand the neural mechanism, and further broaden our insight into the relation between structure and function. In this study, manifold gradient was leveraged to study the link of macroscopic morphology to cortical gene expression in 92 genetic generalized epilepsy with generalized tonic-clonic seizures (GTCS), and 116 healthy controls. Diffusion map embedding was used to estimate the gradients of morphometric similarity (MS) connectome, which described the interregional similarity through five cortical features. The results revealed significant between-group differences in the MS gradient in GTCS, mainly involved in high-level networks. And the changes in MS gradient showed a positively correlation between expression profile of epileptic risk genes.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129789540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Explore on Application of BDS-3 RSMC in the Field of Image Transmission 北斗三号RSMC在图像传输领域的应用探讨
Ye Quanguo, Ji Jing, Chen Wei
As a core of the national spatial-info assets, the BeiDou satellite navigation system (BDS) has a unique function is short messages, it is different from GPS, GLONASS and other global navigation satellite systems (GNSS). In the white paper, the regional short messages communication (RSMC) has reached 1,000 Chinese characters per slot (or 14k bits per slot), and the system capacity has been increased to 10 million times per hour. For BDS-3 RSMC service, this paper proposes an engineering scheme of image transmission and processing based on “cloud-edge-end”, and via simulation verification, it is found that for high-definition (HD) images with a resolution of $1024times 768mathrm{p}$, H.265 and proposed compression method compares the average data, compression ratio, standard deviation, subjective evaluation and time and other indicators, and finally verifies that the RSMC can realize high-definition image transmission under the VP8 compression coding condition. The engineering scheme of “cloud-edge-end” is feasible. To this point, the RSMC will have the ability to escape the scope of text and audio in real-time. At the same time, the improvement of its coverage and system capacity will also increase the worth of the BDS-3 RSMC image transmission, and further improve the communication on transportation, emergency and other fields.
作为国家空间信息资产的核心,北斗卫星导航系统(BDS)具有不同于GPS、GLONASS等全球卫星导航系统(GNSS)的独特功能——短报文。在白皮书中,区域短信通信(RSMC)已达到每插槽1000个汉字(即每插槽14k比特),系统容量已提高到每小时1000万次。针对BDS-3 RSMC业务,本文提出了一种基于“云边缘端”的图像传输与处理工程方案,并通过仿真验证,发现对于分辨率为1024 × 768 maththrm {p}$的高清(HD)图像,H.265与所提出的压缩方法比较了平均数据、压缩比、标准差、主观评价和时间等指标;最后验证了RSMC可以在VP8压缩编码条件下实现高清图像传输。“云边端”的工程方案是可行的。至此,RSMC将有能力在实时情况下脱离文本和音频的范围。同时,其覆盖范围和系统容量的提升也将增加北斗三号RSMC图像传输的价值,进一步提高交通、应急等领域的通信能力。
{"title":"Explore on Application of BDS-3 RSMC in the Field of Image Transmission","authors":"Ye Quanguo, Ji Jing, Chen Wei","doi":"10.1109/ICCWAMTIP53232.2021.9674094","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674094","url":null,"abstract":"As a core of the national spatial-info assets, the BeiDou satellite navigation system (BDS) has a unique function is short messages, it is different from GPS, GLONASS and other global navigation satellite systems (GNSS). In the white paper, the regional short messages communication (RSMC) has reached 1,000 Chinese characters per slot (or 14k bits per slot), and the system capacity has been increased to 10 million times per hour. For BDS-3 RSMC service, this paper proposes an engineering scheme of image transmission and processing based on “cloud-edge-end”, and via simulation verification, it is found that for high-definition (HD) images with a resolution of $1024times 768mathrm{p}$, H.265 and proposed compression method compares the average data, compression ratio, standard deviation, subjective evaluation and time and other indicators, and finally verifies that the RSMC can realize high-definition image transmission under the VP8 compression coding condition. The engineering scheme of “cloud-edge-end” is feasible. To this point, the RSMC will have the ability to escape the scope of text and audio in real-time. At the same time, the improvement of its coverage and system capacity will also increase the worth of the BDS-3 RSMC image transmission, and further improve the communication on transportation, emergency and other fields.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128893751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1