Pub Date : 2020-12-11DOI: 10.1109/TOCS50858.2020.9339621
Peng Zhai, Jingsha He, Nafei Zhu
With the continuous deepening of social informatization, the Internet of Things (IoT) devices are used in large quantities. Traditional centralized access control cannot meet the network access control requirements of large-scale IoT environments. Access control is one of the importation technology of information security. This paper establishes the dynamic game access control model which encourages interactive entities to rationally choose strategies expected by the system driven by its own benefits through the designed mechanism. Taking benefits as the driven force, the mechanism rewards the honest nodes and punishes and restrains the non-honest nodes, and then reaches the general state of equalization between entities which meets the goal. Finally, experiments prove that this method is effective in the open Internet of Things, which can greatly enhance the security of data access between IoT sensors, and can effectively protect the privacy of network entity data.
{"title":"Research on Network Access Control in the Open Internet of Things Environment","authors":"Peng Zhai, Jingsha He, Nafei Zhu","doi":"10.1109/TOCS50858.2020.9339621","DOIUrl":"https://doi.org/10.1109/TOCS50858.2020.9339621","url":null,"abstract":"With the continuous deepening of social informatization, the Internet of Things (IoT) devices are used in large quantities. Traditional centralized access control cannot meet the network access control requirements of large-scale IoT environments. Access control is one of the importation technology of information security. This paper establishes the dynamic game access control model which encourages interactive entities to rationally choose strategies expected by the system driven by its own benefits through the designed mechanism. Taking benefits as the driven force, the mechanism rewards the honest nodes and punishes and restrains the non-honest nodes, and then reaches the general state of equalization between entities which meets the goal. Finally, experiments prove that this method is effective in the open Internet of Things, which can greatly enhance the security of data access between IoT sensors, and can effectively protect the privacy of network entity data.","PeriodicalId":373862,"journal":{"name":"2020 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129484818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Automatic medical image segmentation helps to diagnose and treat stroke timely. In this paper, it is proposing an improved U-Net neural network for the auxiliary diagnosis of intracerebral hemorrhage, which realizes the automatic segmentation of the hemorrhage on CT images. First, clustering the pixels of brain CT images into four categories: white matter, gray matter, cerebrospinal fluid, and hemorrhage by fuzzy C-means clustering method, then removing the skull by morphological image method, and finally proposing an improved U-Net neural network model to segment hemorrhage automatically. Experiments show that the dice similarity coefficient reaches 0.860 ± 0.031, which is better than the other methods. It dramatically improves the accuracy of segmentation for intracerebral hemorrhage.
{"title":"Segmentation of intracerebral hemorrhage based on improved U-Net","authors":"Guogang Cao, Yijie Wang, Xinyu Zhu, Mengxue Li, Xiaoyan Wang, Ying Chen","doi":"10.1109/TOCS50858.2020.9339707","DOIUrl":"https://doi.org/10.1109/TOCS50858.2020.9339707","url":null,"abstract":"Automatic medical image segmentation helps to diagnose and treat stroke timely. In this paper, it is proposing an improved U-Net neural network for the auxiliary diagnosis of intracerebral hemorrhage, which realizes the automatic segmentation of the hemorrhage on CT images. First, clustering the pixels of brain CT images into four categories: white matter, gray matter, cerebrospinal fluid, and hemorrhage by fuzzy C-means clustering method, then removing the skull by morphological image method, and finally proposing an improved U-Net neural network model to segment hemorrhage automatically. Experiments show that the dice similarity coefficient reaches 0.860 ± 0.031, which is better than the other methods. It dramatically improves the accuracy of segmentation for intracerebral hemorrhage.","PeriodicalId":373862,"journal":{"name":"2020 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129517316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-11DOI: 10.1109/TOCS50858.2020.9339718
Cundong Tang, Li Chen, Zhiping Wang, Y. Sima
Software defect is an important indicator to evaluate software product quality. To reduce the defects of software products and to improve the quality of software is always the goal of software development. This paper combines the simulated annealing (SA) algorithm and JCUDA technology to improve the BP algorithm, to build an improved software defect prediction model with higher prediction accuracy. The experimental results show that the software defect prediction model based on improved BP algorithm is able to accurately predict the software defects, which is better than the traditional BP algorithm.
{"title":"Study on Software Defect Prediction Model Based on Improved BP Algorithm","authors":"Cundong Tang, Li Chen, Zhiping Wang, Y. Sima","doi":"10.1109/TOCS50858.2020.9339718","DOIUrl":"https://doi.org/10.1109/TOCS50858.2020.9339718","url":null,"abstract":"Software defect is an important indicator to evaluate software product quality. To reduce the defects of software products and to improve the quality of software is always the goal of software development. This paper combines the simulated annealing (SA) algorithm and JCUDA technology to improve the BP algorithm, to build an improved software defect prediction model with higher prediction accuracy. The experimental results show that the software defect prediction model based on improved BP algorithm is able to accurately predict the software defects, which is better than the traditional BP algorithm.","PeriodicalId":373862,"journal":{"name":"2020 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129848693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-11DOI: 10.1109/TOCS50858.2020.9339611
Y. Lv, Zheng Sui, Linjuan Li
As an industry-specific dedicated communication network, electric power communication is gradually formed and developed with the development of power systems. It is mainly used to alleviate the lack of communication capabilities caused by the slow development of the public network and to fill the public network's inability to meet the special communications of some power departments. The contradiction of demand to ensure the normal and efficient operation of specialized electric power production. Nowadays, power communication security technology is becoming more and more important, and detecting the disconnection of communication cables is the main means to ensure smooth communication. This paper proposes a distributed monitoring system to detect the disconnection of communication cables. MSP430F149 and FPGA are used to form a high-speed variable sampling rate system to detect obstacles in communication cables. DTMF dial chip MT8888 and embedded modem chip MSM7512 are used to realize remote alarm and data exchange functions. The whole system is easy to control, flexible, and expandable. The experimental results show that this article has solved the problem of online monitoring of communication cables. The sustained and rapid growth of China's economy has provided a huge market space for the development of communication cable security technology. The strong temptation of the Chinese market has made the world focus on the Chinese market. The huge production capacity formed by China's cable security technology let the world admire. With the continuous expansion of China's power industry, data communication industry, urban rail transit industry, automobile industry, shipbuilding and other industries, the demand for wires and cables will also grow rapidly. In the future, there is still huge development potential for wire and cable protection.
{"title":"Online Monitoring System of Cable Based on Microchip 51","authors":"Y. Lv, Zheng Sui, Linjuan Li","doi":"10.1109/TOCS50858.2020.9339611","DOIUrl":"https://doi.org/10.1109/TOCS50858.2020.9339611","url":null,"abstract":"As an industry-specific dedicated communication network, electric power communication is gradually formed and developed with the development of power systems. It is mainly used to alleviate the lack of communication capabilities caused by the slow development of the public network and to fill the public network's inability to meet the special communications of some power departments. The contradiction of demand to ensure the normal and efficient operation of specialized electric power production. Nowadays, power communication security technology is becoming more and more important, and detecting the disconnection of communication cables is the main means to ensure smooth communication. This paper proposes a distributed monitoring system to detect the disconnection of communication cables. MSP430F149 and FPGA are used to form a high-speed variable sampling rate system to detect obstacles in communication cables. DTMF dial chip MT8888 and embedded modem chip MSM7512 are used to realize remote alarm and data exchange functions. The whole system is easy to control, flexible, and expandable. The experimental results show that this article has solved the problem of online monitoring of communication cables. The sustained and rapid growth of China's economy has provided a huge market space for the development of communication cable security technology. The strong temptation of the Chinese market has made the world focus on the Chinese market. The huge production capacity formed by China's cable security technology let the world admire. With the continuous expansion of China's power industry, data communication industry, urban rail transit industry, automobile industry, shipbuilding and other industries, the demand for wires and cables will also grow rapidly. In the future, there is still huge development potential for wire and cable protection.","PeriodicalId":373862,"journal":{"name":"2020 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)","volume":"02 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129883263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-11DOI: 10.1109/TOCS50858.2020.9339693
Fei Xia, Jian Hu
In order to achieve the purpose of integrating VFW flexibly and improving its efficiency, application of virtual firewall (VFW) in computer network security has been explored. OpenStack-based cloud platform VFW system is analyzed with functional requirements and non-functional requirements, and the functional modules of the VFW are divided. Then, the design of VFW system architecture, application layer and functional modules is carried out. Based on the development of OpenStack cloud platform, the realization process of each functional module is elaborated, and finally, a novel queuing model is used to test the efficiency of the VFW system and the test results are analyzed. The theoretical packet loss rate of VFW system is higher than that of simulation experiment, and the error is larger when the number of VFW deployment is small. The average error between the theoretical and simulation results is 6%, and the final error after adjusting the algorithm is 4%. The optimal deployment scheme obtained by simulation experiment is highly consistent with the theoretical results. The model can successfully simulate the deployment of VFW and quickly get the optimal deployment scheme.
{"title":"Application of Virtual Firewall in Computer Network Security","authors":"Fei Xia, Jian Hu","doi":"10.1109/TOCS50858.2020.9339693","DOIUrl":"https://doi.org/10.1109/TOCS50858.2020.9339693","url":null,"abstract":"In order to achieve the purpose of integrating VFW flexibly and improving its efficiency, application of virtual firewall (VFW) in computer network security has been explored. OpenStack-based cloud platform VFW system is analyzed with functional requirements and non-functional requirements, and the functional modules of the VFW are divided. Then, the design of VFW system architecture, application layer and functional modules is carried out. Based on the development of OpenStack cloud platform, the realization process of each functional module is elaborated, and finally, a novel queuing model is used to test the efficiency of the VFW system and the test results are analyzed. The theoretical packet loss rate of VFW system is higher than that of simulation experiment, and the error is larger when the number of VFW deployment is small. The average error between the theoretical and simulation results is 6%, and the final error after adjusting the algorithm is 4%. The optimal deployment scheme obtained by simulation experiment is highly consistent with the theoretical results. The model can successfully simulate the deployment of VFW and quickly get the optimal deployment scheme.","PeriodicalId":373862,"journal":{"name":"2020 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127379204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-11DOI: 10.1109/TOCS50858.2020.9339754
Han Xuemin, Zheng Gaofeng, Qin Dandan, Chen Qingping, Liu Pengxi, Xu Zhong-ping
Enterprise Architecture is the core link that connects corporate strategy and specific solutions. It comprehensively interprets corporate strategy and business needs to form the status, needs and blueprints of enterprise informatization construction. It also adopts quantitative and controllable management methods to ensure the realization of future development goals. Since the rapid development of science and technology, information technology has already been integrated into every aspect of our lives. Informationization has become one of the important characteristics of modern society. The degree of enterprise informationization is gradually deepening. Following the information architecture of State Grid Corporation, using TOGAF method combined with Anhui Electric Power Company's business goals and strategies to do research and diagnose the current situation of Anhui Electric Power Company's business architecture, data architecture, application architecture, and technical architecture. In addition to strictly complying with the unified promotion system of the State Grid Corporation structure, carry out the informatization architecture differentiated design of the independent construction system; propose the direction for future informatization architecture improvement; initially decompose the company's strategic goals into specific information construction; clarify the blueprint of the architectural goals and future evolution routes; implement and control them in stages to ensure the realization of company's strategic goals.
{"title":"Research on Informatization Planning and Control Design of Power Grid Enterprises Based on Enterprise Architecture","authors":"Han Xuemin, Zheng Gaofeng, Qin Dandan, Chen Qingping, Liu Pengxi, Xu Zhong-ping","doi":"10.1109/TOCS50858.2020.9339754","DOIUrl":"https://doi.org/10.1109/TOCS50858.2020.9339754","url":null,"abstract":"Enterprise Architecture is the core link that connects corporate strategy and specific solutions. It comprehensively interprets corporate strategy and business needs to form the status, needs and blueprints of enterprise informatization construction. It also adopts quantitative and controllable management methods to ensure the realization of future development goals. Since the rapid development of science and technology, information technology has already been integrated into every aspect of our lives. Informationization has become one of the important characteristics of modern society. The degree of enterprise informationization is gradually deepening. Following the information architecture of State Grid Corporation, using TOGAF method combined with Anhui Electric Power Company's business goals and strategies to do research and diagnose the current situation of Anhui Electric Power Company's business architecture, data architecture, application architecture, and technical architecture. In addition to strictly complying with the unified promotion system of the State Grid Corporation structure, carry out the informatization architecture differentiated design of the independent construction system; propose the direction for future informatization architecture improvement; initially decompose the company's strategic goals into specific information construction; clarify the blueprint of the architectural goals and future evolution routes; implement and control them in stages to ensure the realization of company's strategic goals.","PeriodicalId":373862,"journal":{"name":"2020 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125591218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-11DOI: 10.1109/TOCS50858.2020.9339764
Lijuan Shi, Qing Li, Kui Zhang, Shengqiang Qian
Colleges and universities are person-intensive places, and it is difficult for them to prevent and control the epidemic after students return to school. In the post-epidemic era, college students face many difficulties in health and safety. In view of the poor fire-fighting facilities, difficult evacuation and difficult temperature monitoring in and out of dormitories, this paper developed a digital alarm system in the post-epidemic era with college dormitory as the carrier. The system was divided into two parts: the master controller and the monitoring nodes. The monitoring nodes were installed in each dormitory room. The data was collected by temperature sensor and smoke sensor, and the data was transmitted to the upper computer by wireless module. According to the functional requirements of the digital alarm system, the upper computer interface had designed two modules: temperature anomaly alarm and fire alarm. The upper computer could display the data monitoring situation of each dormitory and realized digital alarm according to the data analysis results.
{"title":"Digital alarm system for dormitory in post-epidemic era","authors":"Lijuan Shi, Qing Li, Kui Zhang, Shengqiang Qian","doi":"10.1109/TOCS50858.2020.9339764","DOIUrl":"https://doi.org/10.1109/TOCS50858.2020.9339764","url":null,"abstract":"Colleges and universities are person-intensive places, and it is difficult for them to prevent and control the epidemic after students return to school. In the post-epidemic era, college students face many difficulties in health and safety. In view of the poor fire-fighting facilities, difficult evacuation and difficult temperature monitoring in and out of dormitories, this paper developed a digital alarm system in the post-epidemic era with college dormitory as the carrier. The system was divided into two parts: the master controller and the monitoring nodes. The monitoring nodes were installed in each dormitory room. The data was collected by temperature sensor and smoke sensor, and the data was transmitted to the upper computer by wireless module. According to the functional requirements of the digital alarm system, the upper computer interface had designed two modules: temperature anomaly alarm and fire alarm. The upper computer could display the data monitoring situation of each dormitory and realized digital alarm according to the data analysis results.","PeriodicalId":373862,"journal":{"name":"2020 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123363100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-11DOI: 10.1109/TOCS50858.2020.9339703
S. Yan, Haijun Wang
We present a giant chaotic network having the characteristics of a giant nonlinear chaotic dynamic system. Based on two space coupling Lorentz systems with different parameters, a hyper-chaotic energy source is used to drive each chaotic system in two-way. Which results in a parallel series network with two ways. Each node in two-way of network is a highly nonlinear dynamic system and has the chaotic characteristics, where each node of network is a chaotic system. Then, we define such network as a giant chaotic network or a giant nonlinear chaotic dynamic system. We find many hyper-chaotic states and their hyper-chaotic regions via a Lyapunov exponents diagram. We also give a bifurcation diagram to illustrate roughly dynamic behavior of the two coupling Lorentz system from a stable state to a single-periodic state, a multi-periodic state, a chaotic state and a hyper-chaotic state by shifting some parameter. And we discuss all kinds of state synchronization difference via the maximal LES. The network can be found to obtain a hyper-chaotic synchronization and all kinds of state synchronizations in all nodes in two-way. Our research result is of great significance to the research of artificial network, complex system and artificial intelligence.
{"title":"A Giant Chaotic Network Based on Hyperchaotic Parallel Series Network","authors":"S. Yan, Haijun Wang","doi":"10.1109/TOCS50858.2020.9339703","DOIUrl":"https://doi.org/10.1109/TOCS50858.2020.9339703","url":null,"abstract":"We present a giant chaotic network having the characteristics of a giant nonlinear chaotic dynamic system. Based on two space coupling Lorentz systems with different parameters, a hyper-chaotic energy source is used to drive each chaotic system in two-way. Which results in a parallel series network with two ways. Each node in two-way of network is a highly nonlinear dynamic system and has the chaotic characteristics, where each node of network is a chaotic system. Then, we define such network as a giant chaotic network or a giant nonlinear chaotic dynamic system. We find many hyper-chaotic states and their hyper-chaotic regions via a Lyapunov exponents diagram. We also give a bifurcation diagram to illustrate roughly dynamic behavior of the two coupling Lorentz system from a stable state to a single-periodic state, a multi-periodic state, a chaotic state and a hyper-chaotic state by shifting some parameter. And we discuss all kinds of state synchronization difference via the maximal LES. The network can be found to obtain a hyper-chaotic synchronization and all kinds of state synchronizations in all nodes in two-way. Our research result is of great significance to the research of artificial network, complex system and artificial intelligence.","PeriodicalId":373862,"journal":{"name":"2020 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121623172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-11DOI: 10.1109/TOCS50858.2020.9339762
Ongoiba Ousmane, Tao Hu, Yang Wang, Miming Zhou
Using the array signal reception theory, we analyzed the mathematical model of the proposed time-modulated rectangle array (TMRA). For practical applications, the uniform circular arrays (UCAs) used in orbital angular momentum (OAM) based multiple-input-multiple-output (MIMO) systems are replaced by the general uniform rectangle arrays (URAs). The employment of radio frequency (RF) switches at the bandlimited receiver significantly reduce the hardware overhead and avoid the unlimited spectrum expansion caused by switches. The detailed derivation of an example of 4 × 4 TMRA time-modulated sequence (TMS) is given in this letter. Our numerical results demonstrate that the TMRA receiver obtains better reception gain, bandwidth, and sidelobe control than a single UCA based OAM receiver.
{"title":"A Low Complexity Multi-Mode Radio Vortex Receiver for OFDM-OAM Networks","authors":"Ongoiba Ousmane, Tao Hu, Yang Wang, Miming Zhou","doi":"10.1109/TOCS50858.2020.9339762","DOIUrl":"https://doi.org/10.1109/TOCS50858.2020.9339762","url":null,"abstract":"Using the array signal reception theory, we analyzed the mathematical model of the proposed time-modulated rectangle array (TMRA). For practical applications, the uniform circular arrays (UCAs) used in orbital angular momentum (OAM) based multiple-input-multiple-output (MIMO) systems are replaced by the general uniform rectangle arrays (URAs). The employment of radio frequency (RF) switches at the bandlimited receiver significantly reduce the hardware overhead and avoid the unlimited spectrum expansion caused by switches. The detailed derivation of an example of 4 × 4 TMRA time-modulated sequence (TMS) is given in this letter. Our numerical results demonstrate that the TMRA receiver obtains better reception gain, bandwidth, and sidelobe control than a single UCA based OAM receiver.","PeriodicalId":373862,"journal":{"name":"2020 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116673432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-11DOI: 10.1109/TOCS50858.2020.9339695
Zeli Wang, Xiaoting Liu, Xiaomei Zhang
In order to enhance the visualization of low-quality images and adapt to the practical work of public security picture detection and visual detection in haze weather, we integrate the currently widely applicable processing methods and adopt a new processing method. This method uses the quad-tree method to solve the problem of the selection defect of the priori atmospheric light value of the dark channel. Aiming at the interference effect between the wavelet frequency division reconstruction coefficients, the adaptive correlation method under the gradient is applied. For noise that gains along with wavelet coefficients, we gives a noise reduction method by compromises the threshold. The experimental results show that the hierarchical contrast of the image is fine, the color fidelity is fine, and the indicators are generally better than other algorithms.
{"title":"A Effective Method Using Wavelet Transform for Haze and Noisy Image","authors":"Zeli Wang, Xiaoting Liu, Xiaomei Zhang","doi":"10.1109/TOCS50858.2020.9339695","DOIUrl":"https://doi.org/10.1109/TOCS50858.2020.9339695","url":null,"abstract":"In order to enhance the visualization of low-quality images and adapt to the practical work of public security picture detection and visual detection in haze weather, we integrate the currently widely applicable processing methods and adopt a new processing method. This method uses the quad-tree method to solve the problem of the selection defect of the priori atmospheric light value of the dark channel. Aiming at the interference effect between the wavelet frequency division reconstruction coefficients, the adaptive correlation method under the gradient is applied. For noise that gains along with wavelet coefficients, we gives a noise reduction method by compromises the threshold. The experimental results show that the hierarchical contrast of the image is fine, the color fidelity is fine, and the indicators are generally better than other algorithms.","PeriodicalId":373862,"journal":{"name":"2020 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121463063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}