首页 > 最新文献

2020 IEEE International Conference on Artificial Intelligence and Information Systems (ICAIIS)最新文献

英文 中文
Study on Fuzzy Identity Authentication Approach Based on String Matching 基于字符串匹配的模糊身份认证方法研究
He Jingsha, Lihua Zhen
In the Internet world, identity authentication is achieved through account number and password, but diverse restrictions have been imposed on password along with the increasing number of websites. However, users find it more difficult to memorize their password due to its complicated structure and too many characters, and often input or remember it incorrectly, which affects their practical experience. Identity authentication technique relates to the account security of users, while the authentication by password makes it impossible for conventional character matching to improve the practical experience of users. After analyzing the existing algorithms for string matching, this paper puts forward an identity authentication approach based on fuzzy string matching. By taking the information of users in a leaked database as the data source in the analysis, this paper reveals that the proposed approach can accurately identify each user's habit of creating a password. After analyzing the string matching technique, an improvement is made to allow users to complete identity authentication when they cannot remember the exact password. The test results show that the proposed approach will not only help complete the identity authentication process, but also effectively protect the password strength and information security of users.
在互联网世界中,身份认证是通过账号和密码来实现的,但是随着网站的增多,密码也受到了各种各样的限制。然而,由于密码结构复杂,字符过多,用户记忆难度较大,经常输入或记忆错误,影响了用户的实际使用体验。身份认证技术关系到用户的账户安全,而密码认证使得传统的字符匹配无法实现,提高了用户的使用体验。在分析了现有字符串匹配算法的基础上,提出了一种基于模糊字符串匹配的身份认证方法。本文以泄露数据库中的用户信息为数据源进行分析,表明本文提出的方法可以准确识别每个用户创建密码的习惯。在分析了字符串匹配技术之后,进行了改进,允许用户在记不住确切的密码时完成身份验证。测试结果表明,该方法不仅有助于完成身份认证过程,而且有效地保护了用户的密码强度和信息安全。
{"title":"Study on Fuzzy Identity Authentication Approach Based on String Matching","authors":"He Jingsha, Lihua Zhen","doi":"10.1109/ICAIIS49377.2020.9194847","DOIUrl":"https://doi.org/10.1109/ICAIIS49377.2020.9194847","url":null,"abstract":"In the Internet world, identity authentication is achieved through account number and password, but diverse restrictions have been imposed on password along with the increasing number of websites. However, users find it more difficult to memorize their password due to its complicated structure and too many characters, and often input or remember it incorrectly, which affects their practical experience. Identity authentication technique relates to the account security of users, while the authentication by password makes it impossible for conventional character matching to improve the practical experience of users. After analyzing the existing algorithms for string matching, this paper puts forward an identity authentication approach based on fuzzy string matching. By taking the information of users in a leaked database as the data source in the analysis, this paper reveals that the proposed approach can accurately identify each user's habit of creating a password. After analyzing the string matching technique, an improvement is made to allow users to complete identity authentication when they cannot remember the exact password. The test results show that the proposed approach will not only help complete the identity authentication process, but also effectively protect the password strength and information security of users.","PeriodicalId":416002,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Information Systems (ICAIIS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124313410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Service Composition Optimization Based on the Fireworks Algorithm Mixing Hybrid Mutation and Tournament Strategy 基于混合变异和竞赛策略的Fireworks算法的服务组合优化
Hua Qu, Jiang Bian, Yanpeng Zhang
With web service's standards continuously proposed and the amount of web services increasing, the single-function web service is difficult to solve the problem of complex and changing real-time. In order to acquire the complex services through composing multiple simple Web service, an improved fireworks algorithm that mixing hybrid mutation and tournament strategies are proposed in this paper. Firstly, the hybrid mutation is used to optimize the fireworks mutation process, so as to avoid the algorithm falling into local optimum and improve its global search ability. Then the tournament selection strategy is adopted to pick out the next generation of fireworks population and improve the speed of algorithm convergence. Experimental results verify that the algorithm is effective and stable for Web service composition problems.
随着web服务标准的不断提出和web服务数量的不断增加,单一功能的web服务难以解决复杂多变的实时性问题。为了通过组合多个简单的Web服务来获取复杂的服务,本文提出了一种混合混合变异和竞赛策略的改进烟花算法。首先,利用混合突变对烟花突变过程进行优化,避免算法陷入局部最优,提高算法的全局搜索能力;然后采用锦标赛选择策略来挑选下一代烟花种群,提高算法的收敛速度。实验结果验证了该算法对Web服务组合问题的有效性和稳定性。
{"title":"Service Composition Optimization Based on the Fireworks Algorithm Mixing Hybrid Mutation and Tournament Strategy","authors":"Hua Qu, Jiang Bian, Yanpeng Zhang","doi":"10.1109/ICAIIS49377.2020.9194837","DOIUrl":"https://doi.org/10.1109/ICAIIS49377.2020.9194837","url":null,"abstract":"With web service's standards continuously proposed and the amount of web services increasing, the single-function web service is difficult to solve the problem of complex and changing real-time. In order to acquire the complex services through composing multiple simple Web service, an improved fireworks algorithm that mixing hybrid mutation and tournament strategies are proposed in this paper. Firstly, the hybrid mutation is used to optimize the fireworks mutation process, so as to avoid the algorithm falling into local optimum and improve its global search ability. Then the tournament selection strategy is adopted to pick out the next generation of fireworks population and improve the speed of algorithm convergence. Experimental results verify that the algorithm is effective and stable for Web service composition problems.","PeriodicalId":416002,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Information Systems (ICAIIS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117077520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An adaptive iterative weighted fusion algorithm based on pig farm environment detection 基于猪场环境检测的自适应迭代加权融合算法
Haojie Wang, Bo Liu
The traditional way of information collection in pigsty environment often results in uneven distribution of collected information due to sensor distribution, environmental noise and other problems, and the statistical results are biased, thus affecting the final decision-making. Based on this problem, in order to improve the accuracy of piggery environmental information collection, this paper proposes an adaptive iterative weighted fusion algorithm to improve piggery environmental monitoring. The experimental results show that the fusion variance obtained by using the simple arithmetic mean method is larger, and the variance obtained by using the adaptive weighted fusion algorithm is about 2 times lower than that obtained by using the simple arithmetic mean method, but the adaptive weighted fusion algorithm will have the problem of variance value ossification, which is solved by using the adaptive iterative weighted fusion algorithm, and the pig house environment is improved monitoring effect.
传统的猪圈环境信息采集方式,往往由于传感器分布、环境噪声等问题,导致采集到的信息分布不均匀,统计结果存在偏差,从而影响最终的决策。针对这一问题,为了提高猪舍环境信息采集的准确性,本文提出了一种自适应迭代加权融合算法来改进猪舍环境监测。实验结果表明,采用简单算术平均法得到的融合方差较大,采用自适应加权融合算法得到的融合方差比采用简单算术平均法得到的融合方差小2倍左右,但自适应加权融合算法存在方差值骨化问题,采用自适应迭代加权融合算法解决了该问题。并改善了猪舍环境的监测效果。
{"title":"An adaptive iterative weighted fusion algorithm based on pig farm environment detection","authors":"Haojie Wang, Bo Liu","doi":"10.1109/ICAIIS49377.2020.9194815","DOIUrl":"https://doi.org/10.1109/ICAIIS49377.2020.9194815","url":null,"abstract":"The traditional way of information collection in pigsty environment often results in uneven distribution of collected information due to sensor distribution, environmental noise and other problems, and the statistical results are biased, thus affecting the final decision-making. Based on this problem, in order to improve the accuracy of piggery environmental information collection, this paper proposes an adaptive iterative weighted fusion algorithm to improve piggery environmental monitoring. The experimental results show that the fusion variance obtained by using the simple arithmetic mean method is larger, and the variance obtained by using the adaptive weighted fusion algorithm is about 2 times lower than that obtained by using the simple arithmetic mean method, but the adaptive weighted fusion algorithm will have the problem of variance value ossification, which is solved by using the adaptive iterative weighted fusion algorithm, and the pig house environment is improved monitoring effect.","PeriodicalId":416002,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Information Systems (ICAIIS)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116388300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on FC-AE-1553 bus acquisition technology FC-AE-1553总线采集技术研究
Zhiyuan Gao, Gang Huang, Xiaopeng Qi
The FC-AE-1553 bus protocol is used to transmit optical fiber data in the aircraft mission system. The existing acquisition methods cannot be collected, because they are not compatible with the FC-AE-1553 protocol. So a bus acquisition method is proposed in this paper. The FPGA processor is used and an embedded design scheme with full logic control is adopted in the FC-AE-1553 bus acquisition module. It has features of high-speed data acquisition, processing and operation control. Ground test and installation verification are completed, the system design is reliable and can meet the mission requirements.
FC-AE-1553总线协议用于飞机任务系统的光纤数据传输。现有的采集方法无法采集,因为它们与FC-AE-1553协议不兼容。为此,本文提出了一种总线采集方法。FC-AE-1553总线采集模块采用FPGA处理器,采用全逻辑控制的嵌入式设计方案。它具有高速数据采集、处理和运行控制的特点。地面试验和安装验证完成,系统设计可靠,能够满足任务要求。
{"title":"Research on FC-AE-1553 bus acquisition technology","authors":"Zhiyuan Gao, Gang Huang, Xiaopeng Qi","doi":"10.1109/ICAIIS49377.2020.9194909","DOIUrl":"https://doi.org/10.1109/ICAIIS49377.2020.9194909","url":null,"abstract":"The FC-AE-1553 bus protocol is used to transmit optical fiber data in the aircraft mission system. The existing acquisition methods cannot be collected, because they are not compatible with the FC-AE-1553 protocol. So a bus acquisition method is proposed in this paper. The FPGA processor is used and an embedded design scheme with full logic control is adopted in the FC-AE-1553 bus acquisition module. It has features of high-speed data acquisition, processing and operation control. Ground test and installation verification are completed, the system design is reliable and can meet the mission requirements.","PeriodicalId":416002,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Information Systems (ICAIIS)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124401841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research and Implementation of Secure Industrial Communication Protocols 安全工业通信协议的研究与实现
Wang Jingran, L. Mingzhe, Xu Aidong, Hu Bo, Han Xiaojia, Zhou Xiufang
Industrial control systems(ICS) are widely used in national infrastructure such as electricity, water conservancy and energy to control the operation of production equipment. The ICS information security problems will cause a series of consequences. This paper focuses on the security problems existing in industrial communication protocols, studies the secure protocols to guarantee the secure transmission of industrial datas, and realizes the end-to-end identity authentication and data encryption transmission on Modbus/TCP protocol.
工业控制系统(ICS)广泛应用于电力、水利、能源等国家基础设施,控制生产设备的运行。ICS信息安全问题将造成一系列的后果。本文针对工业通信协议中存在的安全问题,研究保证工业数据安全传输的安全协议,在Modbus/TCP协议上实现端到端的身份认证和数据加密传输。
{"title":"Research and Implementation of Secure Industrial Communication Protocols","authors":"Wang Jingran, L. Mingzhe, Xu Aidong, Hu Bo, Han Xiaojia, Zhou Xiufang","doi":"10.1109/ICAIIS49377.2020.9194854","DOIUrl":"https://doi.org/10.1109/ICAIIS49377.2020.9194854","url":null,"abstract":"Industrial control systems(ICS) are widely used in national infrastructure such as electricity, water conservancy and energy to control the operation of production equipment. The ICS information security problems will cause a series of consequences. This paper focuses on the security problems existing in industrial communication protocols, studies the secure protocols to guarantee the secure transmission of industrial datas, and realizes the end-to-end identity authentication and data encryption transmission on Modbus/TCP protocol.","PeriodicalId":416002,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Information Systems (ICAIIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129318320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
MmWave MIMO Physical layer Authentication by Using Channel Sparsity 利用信道稀疏性的毫米波MIMO物理层认证
Jie Tang, Aidong Xu, Yixin Jiang, Yunan Zhang, H. Wen, Tengyue Zhang
MmWave MIMO communication is an emerging technique to enable the gigabit-per-second data communication rates for Internet of Things (IoT) networks. However, mmWave IoT networks face serious security spoofing attack threats. The lightweight channel-based physical layer authentication can detect spoofing attacks in IoT networks, which has attracted great attentions. However, current schemes are mainly focused on sub-6 GHz microwave communication systems. In this work, we study an efficient physical layer channel based authentication by using sparse propriety of mmWave MIMO channel. By extracting the low-rank and sparse peak of virtual angle of arrival (AoA) and departure (AoD) information of mmWave MIMO virtual channel in the beamspace domain, we shows its validity and effectiveness to improve the authentication performance. The simulation results verified the validity and effectiveness of the proposed scheme.
毫米波MIMO通信是实现物联网(IoT)网络每秒千兆数据通信速率的新兴技术。然而,毫米波物联网网络面临着严重的安全欺骗攻击威胁。基于通道的轻量级物理层认证可以检测物联网网络中的欺骗攻击,受到了广泛关注。然而,目前的方案主要集中在6 GHz以下的微波通信系统。本文利用毫米波MIMO信道的稀疏特性,研究了一种高效的基于物理层信道的身份验证方法。通过在波束空间域中提取毫米波MIMO虚拟信道的虚到达角(AoA)和虚出发角(AoD)信息的低秩稀疏峰值,验证了该方法提高认证性能的有效性。仿真结果验证了该方案的有效性。
{"title":"MmWave MIMO Physical layer Authentication by Using Channel Sparsity","authors":"Jie Tang, Aidong Xu, Yixin Jiang, Yunan Zhang, H. Wen, Tengyue Zhang","doi":"10.1109/ICAIIS49377.2020.9194916","DOIUrl":"https://doi.org/10.1109/ICAIIS49377.2020.9194916","url":null,"abstract":"MmWave MIMO communication is an emerging technique to enable the gigabit-per-second data communication rates for Internet of Things (IoT) networks. However, mmWave IoT networks face serious security spoofing attack threats. The lightweight channel-based physical layer authentication can detect spoofing attacks in IoT networks, which has attracted great attentions. However, current schemes are mainly focused on sub-6 GHz microwave communication systems. In this work, we study an efficient physical layer channel based authentication by using sparse propriety of mmWave MIMO channel. By extracting the low-rank and sparse peak of virtual angle of arrival (AoA) and departure (AoD) information of mmWave MIMO virtual channel in the beamspace domain, we shows its validity and effectiveness to improve the authentication performance. The simulation results verified the validity and effectiveness of the proposed scheme.","PeriodicalId":416002,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Information Systems (ICAIIS)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127313118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Advanced 5G system chip MOCVD process parameter control and simulation based on BP neural network and Smith predictor 基于BP神经网络和Smith预测器的先进5G系统芯片MOCVD工艺参数控制与仿真
Yu-Wen Zhou, Kuo-Chi Chang, Kai-Chun Chu, David Kwabena Amesimenu, Ntawiheba Jean Damour, Shoaib Ahmad, Shamim Md Obaydul Haque, Joram Gakiza, Abdalaziz Altayeb Ibrahim Omer
in the advanced 5G chip process system, MOCVD is one of the key film processes in modern wafer manufacturing. MOCVD technology has a very high application value and broad application prospects that mainly used in semiconductor materials, nano materials and other material growth fields. The application field of MOCVD makes its process require high accuracy of temperature, flow, pressure and other parameters control. However, based on the conventional Smith predictor, this paper simulated the system with Simulink, and found that the system has overshoot and long regulation time, and the control effect is not ideal. In view of MOCVD parameter control, the BP neural network theory is combined to improve the controller, and a Smith predictive controller based on neural network is obtained. The simulation results show that the intelligent PID control based on neural network has a good effect on MOCVD temperature, flow and other parameters control, with lower overshoot and less system regulation time.
在先进的5G芯片工艺系统中,MOCVD是现代晶圆制造中的关键膜工艺之一。MOCVD技术具有很高的应用价值和广阔的应用前景,主要应用于半导体材料、纳米材料等材料生长领域。MOCVD的应用领域使得其工艺对温度、流量、压力等参数控制的精度要求很高。然而,本文在传统Smith预测器的基础上,利用Simulink对系统进行了仿真,发现系统存在超调、调节时间长、控制效果不理想等问题。针对MOCVD参数控制问题,结合BP神经网络理论对控制器进行改进,得到了基于神经网络的Smith预测控制器。仿真结果表明,基于神经网络的智能PID控制对MOCVD温度、流量等参数的控制效果良好,超调量小,系统调节时间短。
{"title":"Advanced 5G system chip MOCVD process parameter control and simulation based on BP neural network and Smith predictor","authors":"Yu-Wen Zhou, Kuo-Chi Chang, Kai-Chun Chu, David Kwabena Amesimenu, Ntawiheba Jean Damour, Shoaib Ahmad, Shamim Md Obaydul Haque, Joram Gakiza, Abdalaziz Altayeb Ibrahim Omer","doi":"10.1109/ICAIIS49377.2020.9194801","DOIUrl":"https://doi.org/10.1109/ICAIIS49377.2020.9194801","url":null,"abstract":"in the advanced 5G chip process system, MOCVD is one of the key film processes in modern wafer manufacturing. MOCVD technology has a very high application value and broad application prospects that mainly used in semiconductor materials, nano materials and other material growth fields. The application field of MOCVD makes its process require high accuracy of temperature, flow, pressure and other parameters control. However, based on the conventional Smith predictor, this paper simulated the system with Simulink, and found that the system has overshoot and long regulation time, and the control effect is not ideal. In view of MOCVD parameter control, the BP neural network theory is combined to improve the controller, and a Smith predictive controller based on neural network is obtained. The simulation results show that the intelligent PID control based on neural network has a good effect on MOCVD temperature, flow and other parameters control, with lower overshoot and less system regulation time.","PeriodicalId":416002,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Information Systems (ICAIIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128897724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A novel vision based pointer instrument reading algorithm 一种新的基于视觉的指针仪表读取算法
Huan-jun Liu
A novel pointer instrument reading algorithm is presented to replace human reading. The image sequences of pointer instrument are captured. Firstly, this paper proposes an image sequences analysis method based on unsupervised learning to segment the moving objects and background. This paper proposes a new method for extracting motion features based on the gray change rules in image sequence. Then a novel unsupervised learning method is used to classify the image sequences into the motion objects and backgrounds efficiently according to these features. Secondly the according to the characteristic of pointer instrument, the rotation central of pointer is get by Hough transform. And then Then the angles of the center of scales and pointer regions relatives to the rotation center can be calculated separately. At last the readings of pointer instrument are calculated from these angles. This study verified the effectiveness of the proposed algorithm through experiments.
提出了一种新的指针式仪表读取算法来代替人工读取。捕获了指针仪表的图像序列。首先,本文提出了一种基于无监督学习的图像序列分析方法来分割运动目标和背景。提出了一种基于图像序列灰度变化规则提取运动特征的新方法。然后,利用一种新颖的无监督学习方法,根据运动目标和背景的特征,将图像序列有效地分类为运动目标和背景。其次,根据指针仪表的特点,通过霍夫变换得到指针的旋转中心;然后分别计算尺度中心和指针区域相对于旋转中心的角度。最后根据这些角度计算了指针式仪表的读数。本研究通过实验验证了所提算法的有效性。
{"title":"A novel vision based pointer instrument reading algorithm","authors":"Huan-jun Liu","doi":"10.1109/ICAIIS49377.2020.9194879","DOIUrl":"https://doi.org/10.1109/ICAIIS49377.2020.9194879","url":null,"abstract":"A novel pointer instrument reading algorithm is presented to replace human reading. The image sequences of pointer instrument are captured. Firstly, this paper proposes an image sequences analysis method based on unsupervised learning to segment the moving objects and background. This paper proposes a new method for extracting motion features based on the gray change rules in image sequence. Then a novel unsupervised learning method is used to classify the image sequences into the motion objects and backgrounds efficiently according to these features. Secondly the according to the characteristic of pointer instrument, the rotation central of pointer is get by Hough transform. And then Then the angles of the center of scales and pointer regions relatives to the rotation center can be calculated separately. At last the readings of pointer instrument are calculated from these angles. This study verified the effectiveness of the proposed algorithm through experiments.","PeriodicalId":416002,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Information Systems (ICAIIS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132203135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detection and classification of malware based on FastText 基于FastText的恶意软件检测与分类
Luming Feng, Yanpeng Cui, Jianwei Hu
Nowadays, the Internet has penetrated into every corner of people's lives. It brings convenience to my life as well as certain risks. Millions of new types of malware appear every day, affecting thousands or even millions of home computer users. And attackers can use fully automated design and reuse malware, which makes the threshold for cybercrime lower and lower. Therefore, we urgently need a detection technology that can be applied to the current rapidly changing malware ecosystem. Based on the fact that the implementation of software functions must use Windows API functions, this paper proposes to dynamically extract the API call sequence patterns of different categories of malware, then used FastText as the classifier and word representation. The model is applied to two open malware datasets, and the experimental results show that the proposed method has high detection rate and low false alarm rate, which proves that it can effectively detect and classify malware.
如今,互联网已经渗透到人们生活的每一个角落。它给我的生活带来了便利,也带来了一定的风险。每天都有数以百万计的新型恶意软件出现,影响着成千上万甚至数百万的家庭电脑用户。攻击者可以使用完全自动化的设计和重用恶意软件,这使得网络犯罪的门槛越来越低。因此,我们迫切需要一种能够应用于当前快速变化的恶意软件生态系统的检测技术。基于软件功能的实现必须使用Windows API函数的事实,本文提出动态提取不同类别恶意软件的API调用序列模式,并采用FastText作为分类器和词表示。将该模型应用于两个开放的恶意软件数据集,实验结果表明,该方法具有较高的检测率和较低的虚警率,能够有效地对恶意软件进行检测和分类。
{"title":"Detection and classification of malware based on FastText","authors":"Luming Feng, Yanpeng Cui, Jianwei Hu","doi":"10.1109/ICAIIS49377.2020.9194806","DOIUrl":"https://doi.org/10.1109/ICAIIS49377.2020.9194806","url":null,"abstract":"Nowadays, the Internet has penetrated into every corner of people's lives. It brings convenience to my life as well as certain risks. Millions of new types of malware appear every day, affecting thousands or even millions of home computer users. And attackers can use fully automated design and reuse malware, which makes the threshold for cybercrime lower and lower. Therefore, we urgently need a detection technology that can be applied to the current rapidly changing malware ecosystem. Based on the fact that the implementation of software functions must use Windows API functions, this paper proposes to dynamically extract the API call sequence patterns of different categories of malware, then used FastText as the classifier and word representation. The model is applied to two open malware datasets, and the experimental results show that the proposed method has high detection rate and low false alarm rate, which proves that it can effectively detect and classify malware.","PeriodicalId":416002,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Information Systems (ICAIIS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125541951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unmanned Aerial Vehicle remote sensing image dehazing via global parameters 基于全局参数的无人机遥感图像去雾
Yuexiang Fan, Yongfeng Cao, Xiuzhang Yang
Unmanned Aerial Vehicle (UAV) aerial mapping technology is becoming more and more widely used for its specific advantages. But in some areas, where there is fog or haze, the visibility of images degrades severely. To solve this problem, we propose a formation model for UAV remote sensing hazed images by converting the dehazing problem into the computation of two global parameters, including airlight vector and transmission. Specifically, we first get the airlight vector by a statistical law of variation in local image brightness, but only use its precise magnitude; secondly, we estimate the accurate airlight orientation based on the geometric property of pixels (projected in RGB space) of the patches in which the transmission and surface reflectance are approximately constant. Thirdly, we calculate a mean transmission from the top 20% darkest pixels in the dark channel and use it as the global transmission. The dehazing experiments based on synthetic images show that our algorithm can get a more accurate airlight vector and global transmission. The experiments based on actual UAV images show that our algorithm has a good histogram shape preservation, which can effectively enhance the clarity of the hazed images. For UAV hazed remote sensing images of mapping, our algorithm can effectively improve the visual effect and enhance visibility.
无人机(UAV)航空测图技术以其独特的优势得到越来越广泛的应用。但在一些有雾或霾的地区,图像的可见度会严重下降。为了解决这一问题,将无人机遥感雾霾图像的消霾问题转化为两个全局参数的计算,包括航光矢量和透射率,提出了一种无人机遥感雾霾图像的形成模型。具体来说,我们首先根据局部图像亮度变化的统计规律得到航光矢量,但只使用其精确的星等;其次,在透射率和表面反射率近似恒定的情况下,我们根据像素的几何特性(投影在RGB空间中)估计精确的航光方向。第三,我们从暗通道中最暗的前20%像素计算平均传输,并将其用作全局传输。基于合成图像的去雾实验表明,该算法可以获得更精确的航迹矢量和全局传输。基于实际无人机图像的实验表明,该算法具有良好的直方图形状保持性,可以有效增强雾化图像的清晰度。对于无人机雾霾遥感影像的制图,我们的算法可以有效地改善视觉效果,增强能见度。
{"title":"Unmanned Aerial Vehicle remote sensing image dehazing via global parameters","authors":"Yuexiang Fan, Yongfeng Cao, Xiuzhang Yang","doi":"10.1109/ICAIIS49377.2020.9194852","DOIUrl":"https://doi.org/10.1109/ICAIIS49377.2020.9194852","url":null,"abstract":"Unmanned Aerial Vehicle (UAV) aerial mapping technology is becoming more and more widely used for its specific advantages. But in some areas, where there is fog or haze, the visibility of images degrades severely. To solve this problem, we propose a formation model for UAV remote sensing hazed images by converting the dehazing problem into the computation of two global parameters, including airlight vector and transmission. Specifically, we first get the airlight vector by a statistical law of variation in local image brightness, but only use its precise magnitude; secondly, we estimate the accurate airlight orientation based on the geometric property of pixels (projected in RGB space) of the patches in which the transmission and surface reflectance are approximately constant. Thirdly, we calculate a mean transmission from the top 20% darkest pixels in the dark channel and use it as the global transmission. The dehazing experiments based on synthetic images show that our algorithm can get a more accurate airlight vector and global transmission. The experiments based on actual UAV images show that our algorithm has a good histogram shape preservation, which can effectively enhance the clarity of the hazed images. For UAV hazed remote sensing images of mapping, our algorithm can effectively improve the visual effect and enhance visibility.","PeriodicalId":416002,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Information Systems (ICAIIS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123377495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2020 IEEE International Conference on Artificial Intelligence and Information Systems (ICAIIS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1