Pub Date : 2020-03-01DOI: 10.1109/ICAIIS49377.2020.9194847
He Jingsha, Lihua Zhen
In the Internet world, identity authentication is achieved through account number and password, but diverse restrictions have been imposed on password along with the increasing number of websites. However, users find it more difficult to memorize their password due to its complicated structure and too many characters, and often input or remember it incorrectly, which affects their practical experience. Identity authentication technique relates to the account security of users, while the authentication by password makes it impossible for conventional character matching to improve the practical experience of users. After analyzing the existing algorithms for string matching, this paper puts forward an identity authentication approach based on fuzzy string matching. By taking the information of users in a leaked database as the data source in the analysis, this paper reveals that the proposed approach can accurately identify each user's habit of creating a password. After analyzing the string matching technique, an improvement is made to allow users to complete identity authentication when they cannot remember the exact password. The test results show that the proposed approach will not only help complete the identity authentication process, but also effectively protect the password strength and information security of users.
{"title":"Study on Fuzzy Identity Authentication Approach Based on String Matching","authors":"He Jingsha, Lihua Zhen","doi":"10.1109/ICAIIS49377.2020.9194847","DOIUrl":"https://doi.org/10.1109/ICAIIS49377.2020.9194847","url":null,"abstract":"In the Internet world, identity authentication is achieved through account number and password, but diverse restrictions have been imposed on password along with the increasing number of websites. However, users find it more difficult to memorize their password due to its complicated structure and too many characters, and often input or remember it incorrectly, which affects their practical experience. Identity authentication technique relates to the account security of users, while the authentication by password makes it impossible for conventional character matching to improve the practical experience of users. After analyzing the existing algorithms for string matching, this paper puts forward an identity authentication approach based on fuzzy string matching. By taking the information of users in a leaked database as the data source in the analysis, this paper reveals that the proposed approach can accurately identify each user's habit of creating a password. After analyzing the string matching technique, an improvement is made to allow users to complete identity authentication when they cannot remember the exact password. The test results show that the proposed approach will not only help complete the identity authentication process, but also effectively protect the password strength and information security of users.","PeriodicalId":416002,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Information Systems (ICAIIS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124313410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICAIIS49377.2020.9194837
Hua Qu, Jiang Bian, Yanpeng Zhang
With web service's standards continuously proposed and the amount of web services increasing, the single-function web service is difficult to solve the problem of complex and changing real-time. In order to acquire the complex services through composing multiple simple Web service, an improved fireworks algorithm that mixing hybrid mutation and tournament strategies are proposed in this paper. Firstly, the hybrid mutation is used to optimize the fireworks mutation process, so as to avoid the algorithm falling into local optimum and improve its global search ability. Then the tournament selection strategy is adopted to pick out the next generation of fireworks population and improve the speed of algorithm convergence. Experimental results verify that the algorithm is effective and stable for Web service composition problems.
{"title":"Service Composition Optimization Based on the Fireworks Algorithm Mixing Hybrid Mutation and Tournament Strategy","authors":"Hua Qu, Jiang Bian, Yanpeng Zhang","doi":"10.1109/ICAIIS49377.2020.9194837","DOIUrl":"https://doi.org/10.1109/ICAIIS49377.2020.9194837","url":null,"abstract":"With web service's standards continuously proposed and the amount of web services increasing, the single-function web service is difficult to solve the problem of complex and changing real-time. In order to acquire the complex services through composing multiple simple Web service, an improved fireworks algorithm that mixing hybrid mutation and tournament strategies are proposed in this paper. Firstly, the hybrid mutation is used to optimize the fireworks mutation process, so as to avoid the algorithm falling into local optimum and improve its global search ability. Then the tournament selection strategy is adopted to pick out the next generation of fireworks population and improve the speed of algorithm convergence. Experimental results verify that the algorithm is effective and stable for Web service composition problems.","PeriodicalId":416002,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Information Systems (ICAIIS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117077520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICAIIS49377.2020.9194815
Haojie Wang, Bo Liu
The traditional way of information collection in pigsty environment often results in uneven distribution of collected information due to sensor distribution, environmental noise and other problems, and the statistical results are biased, thus affecting the final decision-making. Based on this problem, in order to improve the accuracy of piggery environmental information collection, this paper proposes an adaptive iterative weighted fusion algorithm to improve piggery environmental monitoring. The experimental results show that the fusion variance obtained by using the simple arithmetic mean method is larger, and the variance obtained by using the adaptive weighted fusion algorithm is about 2 times lower than that obtained by using the simple arithmetic mean method, but the adaptive weighted fusion algorithm will have the problem of variance value ossification, which is solved by using the adaptive iterative weighted fusion algorithm, and the pig house environment is improved monitoring effect.
{"title":"An adaptive iterative weighted fusion algorithm based on pig farm environment detection","authors":"Haojie Wang, Bo Liu","doi":"10.1109/ICAIIS49377.2020.9194815","DOIUrl":"https://doi.org/10.1109/ICAIIS49377.2020.9194815","url":null,"abstract":"The traditional way of information collection in pigsty environment often results in uneven distribution of collected information due to sensor distribution, environmental noise and other problems, and the statistical results are biased, thus affecting the final decision-making. Based on this problem, in order to improve the accuracy of piggery environmental information collection, this paper proposes an adaptive iterative weighted fusion algorithm to improve piggery environmental monitoring. The experimental results show that the fusion variance obtained by using the simple arithmetic mean method is larger, and the variance obtained by using the adaptive weighted fusion algorithm is about 2 times lower than that obtained by using the simple arithmetic mean method, but the adaptive weighted fusion algorithm will have the problem of variance value ossification, which is solved by using the adaptive iterative weighted fusion algorithm, and the pig house environment is improved monitoring effect.","PeriodicalId":416002,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Information Systems (ICAIIS)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116388300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICAIIS49377.2020.9194909
Zhiyuan Gao, Gang Huang, Xiaopeng Qi
The FC-AE-1553 bus protocol is used to transmit optical fiber data in the aircraft mission system. The existing acquisition methods cannot be collected, because they are not compatible with the FC-AE-1553 protocol. So a bus acquisition method is proposed in this paper. The FPGA processor is used and an embedded design scheme with full logic control is adopted in the FC-AE-1553 bus acquisition module. It has features of high-speed data acquisition, processing and operation control. Ground test and installation verification are completed, the system design is reliable and can meet the mission requirements.
{"title":"Research on FC-AE-1553 bus acquisition technology","authors":"Zhiyuan Gao, Gang Huang, Xiaopeng Qi","doi":"10.1109/ICAIIS49377.2020.9194909","DOIUrl":"https://doi.org/10.1109/ICAIIS49377.2020.9194909","url":null,"abstract":"The FC-AE-1553 bus protocol is used to transmit optical fiber data in the aircraft mission system. The existing acquisition methods cannot be collected, because they are not compatible with the FC-AE-1553 protocol. So a bus acquisition method is proposed in this paper. The FPGA processor is used and an embedded design scheme with full logic control is adopted in the FC-AE-1553 bus acquisition module. It has features of high-speed data acquisition, processing and operation control. Ground test and installation verification are completed, the system design is reliable and can meet the mission requirements.","PeriodicalId":416002,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Information Systems (ICAIIS)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124401841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICAIIS49377.2020.9194854
Wang Jingran, L. Mingzhe, Xu Aidong, Hu Bo, Han Xiaojia, Zhou Xiufang
Industrial control systems(ICS) are widely used in national infrastructure such as electricity, water conservancy and energy to control the operation of production equipment. The ICS information security problems will cause a series of consequences. This paper focuses on the security problems existing in industrial communication protocols, studies the secure protocols to guarantee the secure transmission of industrial datas, and realizes the end-to-end identity authentication and data encryption transmission on Modbus/TCP protocol.
{"title":"Research and Implementation of Secure Industrial Communication Protocols","authors":"Wang Jingran, L. Mingzhe, Xu Aidong, Hu Bo, Han Xiaojia, Zhou Xiufang","doi":"10.1109/ICAIIS49377.2020.9194854","DOIUrl":"https://doi.org/10.1109/ICAIIS49377.2020.9194854","url":null,"abstract":"Industrial control systems(ICS) are widely used in national infrastructure such as electricity, water conservancy and energy to control the operation of production equipment. The ICS information security problems will cause a series of consequences. This paper focuses on the security problems existing in industrial communication protocols, studies the secure protocols to guarantee the secure transmission of industrial datas, and realizes the end-to-end identity authentication and data encryption transmission on Modbus/TCP protocol.","PeriodicalId":416002,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Information Systems (ICAIIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129318320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICAIIS49377.2020.9194916
Jie Tang, Aidong Xu, Yixin Jiang, Yunan Zhang, H. Wen, Tengyue Zhang
MmWave MIMO communication is an emerging technique to enable the gigabit-per-second data communication rates for Internet of Things (IoT) networks. However, mmWave IoT networks face serious security spoofing attack threats. The lightweight channel-based physical layer authentication can detect spoofing attacks in IoT networks, which has attracted great attentions. However, current schemes are mainly focused on sub-6 GHz microwave communication systems. In this work, we study an efficient physical layer channel based authentication by using sparse propriety of mmWave MIMO channel. By extracting the low-rank and sparse peak of virtual angle of arrival (AoA) and departure (AoD) information of mmWave MIMO virtual channel in the beamspace domain, we shows its validity and effectiveness to improve the authentication performance. The simulation results verified the validity and effectiveness of the proposed scheme.
{"title":"MmWave MIMO Physical layer Authentication by Using Channel Sparsity","authors":"Jie Tang, Aidong Xu, Yixin Jiang, Yunan Zhang, H. Wen, Tengyue Zhang","doi":"10.1109/ICAIIS49377.2020.9194916","DOIUrl":"https://doi.org/10.1109/ICAIIS49377.2020.9194916","url":null,"abstract":"MmWave MIMO communication is an emerging technique to enable the gigabit-per-second data communication rates for Internet of Things (IoT) networks. However, mmWave IoT networks face serious security spoofing attack threats. The lightweight channel-based physical layer authentication can detect spoofing attacks in IoT networks, which has attracted great attentions. However, current schemes are mainly focused on sub-6 GHz microwave communication systems. In this work, we study an efficient physical layer channel based authentication by using sparse propriety of mmWave MIMO channel. By extracting the low-rank and sparse peak of virtual angle of arrival (AoA) and departure (AoD) information of mmWave MIMO virtual channel in the beamspace domain, we shows its validity and effectiveness to improve the authentication performance. The simulation results verified the validity and effectiveness of the proposed scheme.","PeriodicalId":416002,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Information Systems (ICAIIS)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127313118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICAIIS49377.2020.9194801
Yu-Wen Zhou, Kuo-Chi Chang, Kai-Chun Chu, David Kwabena Amesimenu, Ntawiheba Jean Damour, Shoaib Ahmad, Shamim Md Obaydul Haque, Joram Gakiza, Abdalaziz Altayeb Ibrahim Omer
in the advanced 5G chip process system, MOCVD is one of the key film processes in modern wafer manufacturing. MOCVD technology has a very high application value and broad application prospects that mainly used in semiconductor materials, nano materials and other material growth fields. The application field of MOCVD makes its process require high accuracy of temperature, flow, pressure and other parameters control. However, based on the conventional Smith predictor, this paper simulated the system with Simulink, and found that the system has overshoot and long regulation time, and the control effect is not ideal. In view of MOCVD parameter control, the BP neural network theory is combined to improve the controller, and a Smith predictive controller based on neural network is obtained. The simulation results show that the intelligent PID control based on neural network has a good effect on MOCVD temperature, flow and other parameters control, with lower overshoot and less system regulation time.
{"title":"Advanced 5G system chip MOCVD process parameter control and simulation based on BP neural network and Smith predictor","authors":"Yu-Wen Zhou, Kuo-Chi Chang, Kai-Chun Chu, David Kwabena Amesimenu, Ntawiheba Jean Damour, Shoaib Ahmad, Shamim Md Obaydul Haque, Joram Gakiza, Abdalaziz Altayeb Ibrahim Omer","doi":"10.1109/ICAIIS49377.2020.9194801","DOIUrl":"https://doi.org/10.1109/ICAIIS49377.2020.9194801","url":null,"abstract":"in the advanced 5G chip process system, MOCVD is one of the key film processes in modern wafer manufacturing. MOCVD technology has a very high application value and broad application prospects that mainly used in semiconductor materials, nano materials and other material growth fields. The application field of MOCVD makes its process require high accuracy of temperature, flow, pressure and other parameters control. However, based on the conventional Smith predictor, this paper simulated the system with Simulink, and found that the system has overshoot and long regulation time, and the control effect is not ideal. In view of MOCVD parameter control, the BP neural network theory is combined to improve the controller, and a Smith predictive controller based on neural network is obtained. The simulation results show that the intelligent PID control based on neural network has a good effect on MOCVD temperature, flow and other parameters control, with lower overshoot and less system regulation time.","PeriodicalId":416002,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Information Systems (ICAIIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128897724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICAIIS49377.2020.9194879
Huan-jun Liu
A novel pointer instrument reading algorithm is presented to replace human reading. The image sequences of pointer instrument are captured. Firstly, this paper proposes an image sequences analysis method based on unsupervised learning to segment the moving objects and background. This paper proposes a new method for extracting motion features based on the gray change rules in image sequence. Then a novel unsupervised learning method is used to classify the image sequences into the motion objects and backgrounds efficiently according to these features. Secondly the according to the characteristic of pointer instrument, the rotation central of pointer is get by Hough transform. And then Then the angles of the center of scales and pointer regions relatives to the rotation center can be calculated separately. At last the readings of pointer instrument are calculated from these angles. This study verified the effectiveness of the proposed algorithm through experiments.
{"title":"A novel vision based pointer instrument reading algorithm","authors":"Huan-jun Liu","doi":"10.1109/ICAIIS49377.2020.9194879","DOIUrl":"https://doi.org/10.1109/ICAIIS49377.2020.9194879","url":null,"abstract":"A novel pointer instrument reading algorithm is presented to replace human reading. The image sequences of pointer instrument are captured. Firstly, this paper proposes an image sequences analysis method based on unsupervised learning to segment the moving objects and background. This paper proposes a new method for extracting motion features based on the gray change rules in image sequence. Then a novel unsupervised learning method is used to classify the image sequences into the motion objects and backgrounds efficiently according to these features. Secondly the according to the characteristic of pointer instrument, the rotation central of pointer is get by Hough transform. And then Then the angles of the center of scales and pointer regions relatives to the rotation center can be calculated separately. At last the readings of pointer instrument are calculated from these angles. This study verified the effectiveness of the proposed algorithm through experiments.","PeriodicalId":416002,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Information Systems (ICAIIS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132203135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICAIIS49377.2020.9194806
Luming Feng, Yanpeng Cui, Jianwei Hu
Nowadays, the Internet has penetrated into every corner of people's lives. It brings convenience to my life as well as certain risks. Millions of new types of malware appear every day, affecting thousands or even millions of home computer users. And attackers can use fully automated design and reuse malware, which makes the threshold for cybercrime lower and lower. Therefore, we urgently need a detection technology that can be applied to the current rapidly changing malware ecosystem. Based on the fact that the implementation of software functions must use Windows API functions, this paper proposes to dynamically extract the API call sequence patterns of different categories of malware, then used FastText as the classifier and word representation. The model is applied to two open malware datasets, and the experimental results show that the proposed method has high detection rate and low false alarm rate, which proves that it can effectively detect and classify malware.
{"title":"Detection and classification of malware based on FastText","authors":"Luming Feng, Yanpeng Cui, Jianwei Hu","doi":"10.1109/ICAIIS49377.2020.9194806","DOIUrl":"https://doi.org/10.1109/ICAIIS49377.2020.9194806","url":null,"abstract":"Nowadays, the Internet has penetrated into every corner of people's lives. It brings convenience to my life as well as certain risks. Millions of new types of malware appear every day, affecting thousands or even millions of home computer users. And attackers can use fully automated design and reuse malware, which makes the threshold for cybercrime lower and lower. Therefore, we urgently need a detection technology that can be applied to the current rapidly changing malware ecosystem. Based on the fact that the implementation of software functions must use Windows API functions, this paper proposes to dynamically extract the API call sequence patterns of different categories of malware, then used FastText as the classifier and word representation. The model is applied to two open malware datasets, and the experimental results show that the proposed method has high detection rate and low false alarm rate, which proves that it can effectively detect and classify malware.","PeriodicalId":416002,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Information Systems (ICAIIS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125541951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICAIIS49377.2020.9194852
Yuexiang Fan, Yongfeng Cao, Xiuzhang Yang
Unmanned Aerial Vehicle (UAV) aerial mapping technology is becoming more and more widely used for its specific advantages. But in some areas, where there is fog or haze, the visibility of images degrades severely. To solve this problem, we propose a formation model for UAV remote sensing hazed images by converting the dehazing problem into the computation of two global parameters, including airlight vector and transmission. Specifically, we first get the airlight vector by a statistical law of variation in local image brightness, but only use its precise magnitude; secondly, we estimate the accurate airlight orientation based on the geometric property of pixels (projected in RGB space) of the patches in which the transmission and surface reflectance are approximately constant. Thirdly, we calculate a mean transmission from the top 20% darkest pixels in the dark channel and use it as the global transmission. The dehazing experiments based on synthetic images show that our algorithm can get a more accurate airlight vector and global transmission. The experiments based on actual UAV images show that our algorithm has a good histogram shape preservation, which can effectively enhance the clarity of the hazed images. For UAV hazed remote sensing images of mapping, our algorithm can effectively improve the visual effect and enhance visibility.
{"title":"Unmanned Aerial Vehicle remote sensing image dehazing via global parameters","authors":"Yuexiang Fan, Yongfeng Cao, Xiuzhang Yang","doi":"10.1109/ICAIIS49377.2020.9194852","DOIUrl":"https://doi.org/10.1109/ICAIIS49377.2020.9194852","url":null,"abstract":"Unmanned Aerial Vehicle (UAV) aerial mapping technology is becoming more and more widely used for its specific advantages. But in some areas, where there is fog or haze, the visibility of images degrades severely. To solve this problem, we propose a formation model for UAV remote sensing hazed images by converting the dehazing problem into the computation of two global parameters, including airlight vector and transmission. Specifically, we first get the airlight vector by a statistical law of variation in local image brightness, but only use its precise magnitude; secondly, we estimate the accurate airlight orientation based on the geometric property of pixels (projected in RGB space) of the patches in which the transmission and surface reflectance are approximately constant. Thirdly, we calculate a mean transmission from the top 20% darkest pixels in the dark channel and use it as the global transmission. The dehazing experiments based on synthetic images show that our algorithm can get a more accurate airlight vector and global transmission. The experiments based on actual UAV images show that our algorithm has a good histogram shape preservation, which can effectively enhance the clarity of the hazed images. For UAV hazed remote sensing images of mapping, our algorithm can effectively improve the visual effect and enhance visibility.","PeriodicalId":416002,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Information Systems (ICAIIS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123377495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}