首页 > 最新文献

2020 IEEE International Conference on Artificial Intelligence and Information Systems (ICAIIS)最新文献

英文 中文
Cordic-based Softmax Acceleration Method of Convolution Neural Network on FPGA 基于cordic的FPGA卷积神经网络Softmax加速方法
Yongxiang Cao, Wan'ang Xiao, Jingdun Jia, Dehua Wu, Weixin Zhou
With the vigorous development of computing power, Convolutional Neural Network (CNN) is developing rapidly, and new CNN structures with more layers and better performance continue to appear. Field Programmable Gate Array(FPGA) has gradually become the best choice for people to deploy and accelerate CNNs as a current research hotspot. This paper has studied the hardware acceleration method of FPGA to implement and simulate the Softmax layer of Alexnet on Vivado 2018.1. Combined with the features of FPGA, the Cordic algorithm is used to implement basic operations such as division and exponential functions, instead of consuming floating-point arithmetic resources. The paper proposes a method to shrink the convergence domain and analyzes the errors generated by the different digits of data after quantization and fixed-point inputs. The relative error of the Softmax layer exponential function is controlled below 0.0146% by reducing the bit width which satisfied the design requirements and saved resources. This method can complete the calculation and classification of the Softmax layer in 66.5 cycles without processing the layer data at fixed points, which greatly improves the calculation speed of the Softmax layer.
随着计算能力的蓬勃发展,卷积神经网络(Convolutional Neural Network, CNN)发展迅速,层数更多、性能更好的新型CNN结构不断出现。现场可编程门阵列(FPGA)作为当前的研究热点,逐渐成为人们部署和加速cnn的最佳选择。本文研究了FPGA的硬件加速方法,在Vivado 2018.1上实现并仿真Alexnet的Softmax层。结合FPGA的特点,采用Cordic算法实现除法、指数函数等基本运算,不消耗浮点运算资源。本文提出了一种缩小收敛域的方法,并分析了数据经过量化和定点输入后不同位数所产生的误差。通过减小位宽,Softmax层指数函数的相对误差控制在0.0146%以下,满足了设计要求,节约了资源。该方法无需处理固定点层数据,只需66.5个循环即可完成Softmax层的计算和分类,大大提高了Softmax层的计算速度。
{"title":"Cordic-based Softmax Acceleration Method of Convolution Neural Network on FPGA","authors":"Yongxiang Cao, Wan'ang Xiao, Jingdun Jia, Dehua Wu, Weixin Zhou","doi":"10.1109/ICAIIS49377.2020.9194894","DOIUrl":"https://doi.org/10.1109/ICAIIS49377.2020.9194894","url":null,"abstract":"With the vigorous development of computing power, Convolutional Neural Network (CNN) is developing rapidly, and new CNN structures with more layers and better performance continue to appear. Field Programmable Gate Array(FPGA) has gradually become the best choice for people to deploy and accelerate CNNs as a current research hotspot. This paper has studied the hardware acceleration method of FPGA to implement and simulate the Softmax layer of Alexnet on Vivado 2018.1. Combined with the features of FPGA, the Cordic algorithm is used to implement basic operations such as division and exponential functions, instead of consuming floating-point arithmetic resources. The paper proposes a method to shrink the convergence domain and analyzes the errors generated by the different digits of data after quantization and fixed-point inputs. The relative error of the Softmax layer exponential function is controlled below 0.0146% by reducing the bit width which satisfied the design requirements and saved resources. This method can complete the calculation and classification of the Softmax layer in 66.5 cycles without processing the layer data at fixed points, which greatly improves the calculation speed of the Softmax layer.","PeriodicalId":416002,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Information Systems (ICAIIS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124058692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
MaskS R-CNN Text Detector 屏蔽R-CNN文本检测器
P. Duan, Jiahao Pan, Wenbi Rao
Scene text detection and scene text recognition are important components of scene text recognition system. Scene text detection, the initial stage of scene text recognition, aims to find out text area in the picture. Recently the target detection method Mask R-CNN has been employed scene text detection and achieved good performance. In this paper, we set forth a model, MaskS R-CNN text detector, based on Mask R-CNN, which attempts to detect scene text. In this model, a network block of Mask Scoring R-CNN is introduced to learn the high quality of the predicted instance mask scores. The mask scoring mechanism correct the inconformity between mask quality and mask score, at the same time improves instance segmentation performance by attaching great importance to more accurate mask predictions. The method put forward in this paper can achieve multi-directional and multi-language natural scene text detection. Compared with some existing traditional location methods based on edge, color and texture and some location methods based on deep learning, it is a relatively innovative method.
场景文本检测和场景文本识别是场景文本识别系统的重要组成部分。场景文本检测是场景文本识别的初级阶段,目的是找出图像中的文本区域。近年来,目标检测方法Mask R-CNN被用于场景文本检测,并取得了良好的效果。本文提出了一种基于Mask R-CNN的Mask R-CNN文本检测器模型,尝试对场景文本进行检测。在该模型中,引入了Mask Scoring R-CNN的网络块来学习预测实例掩码分数的高质量。掩码评分机制纠正了掩码质量和掩码评分之间的不一致性,同时通过重视更准确的掩码预测来提高实例分割性能。本文提出的方法可以实现多方位、多语言的自然场景文本检测。与现有的一些基于边缘、颜色和纹理的传统定位方法以及一些基于深度学习的定位方法相比,它是一种相对创新的方法。
{"title":"MaskS R-CNN Text Detector","authors":"P. Duan, Jiahao Pan, Wenbi Rao","doi":"10.1109/ICAIIS49377.2020.9194911","DOIUrl":"https://doi.org/10.1109/ICAIIS49377.2020.9194911","url":null,"abstract":"Scene text detection and scene text recognition are important components of scene text recognition system. Scene text detection, the initial stage of scene text recognition, aims to find out text area in the picture. Recently the target detection method Mask R-CNN has been employed scene text detection and achieved good performance. In this paper, we set forth a model, MaskS R-CNN text detector, based on Mask R-CNN, which attempts to detect scene text. In this model, a network block of Mask Scoring R-CNN is introduced to learn the high quality of the predicted instance mask scores. The mask scoring mechanism correct the inconformity between mask quality and mask score, at the same time improves instance segmentation performance by attaching great importance to more accurate mask predictions. The method put forward in this paper can achieve multi-directional and multi-language natural scene text detection. Compared with some existing traditional location methods based on edge, color and texture and some location methods based on deep learning, it is a relatively innovative method.","PeriodicalId":416002,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Information Systems (ICAIIS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130339114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detection and recognition of hand abnormal state based on deep learning algorithm 基于深度学习算法的手部异常状态检测与识别
Xiaoping Yu, Lin Zhu, Lanxu Jia
The system collects and detects hand information of relevant persons in a specific area, and transmits the data to the server for calculation and processing. In response to the abnormal state of the hand, the result picture is fed back to the staff in real time through the mobile app. This paper proposes a method for detecting and recognizing abnormal hand states based on the improved yolov3 algorithm. The system collects real-time pictures of the hand through the camera to determine whether the hand is carrying ring, bandages, and whether there are bleeding points. After optimizing the network and preprocessing the data, the algorithm accuracy can reach 99.7%. In addition, the simplified processing of the model can reduce the burden on the hardware system.
该系统对特定区域内相关人员的手部信息进行采集和检测,并将数据传输到服务器进行计算和处理。针对手部的异常状态,将结果图片通过手机app实时反馈给工作人员。本文提出了一种基于改进yolov3算法的手部异常状态检测与识别方法。系统通过摄像头实时采集手部图像,判断手部是否带着戒指、绷带、是否有出血点。经过网络优化和数据预处理,算法准确率可达99.7%。此外,模型的简化处理可以减轻硬件系统的负担。
{"title":"Detection and recognition of hand abnormal state based on deep learning algorithm","authors":"Xiaoping Yu, Lin Zhu, Lanxu Jia","doi":"10.1109/ICAIIS49377.2020.9194919","DOIUrl":"https://doi.org/10.1109/ICAIIS49377.2020.9194919","url":null,"abstract":"The system collects and detects hand information of relevant persons in a specific area, and transmits the data to the server for calculation and processing. In response to the abnormal state of the hand, the result picture is fed back to the staff in real time through the mobile app. This paper proposes a method for detecting and recognizing abnormal hand states based on the improved yolov3 algorithm. The system collects real-time pictures of the hand through the camera to determine whether the hand is carrying ring, bandages, and whether there are bleeding points. After optimizing the network and preprocessing the data, the algorithm accuracy can reach 99.7%. In addition, the simplified processing of the model can reduce the burden on the hardware system.","PeriodicalId":416002,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Information Systems (ICAIIS)","volume":"189 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128934783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Polyvalent Wireless Communication System (PWCS); A Potentially Useful Technology for Opportunistic Networks 多价无线通信系统;机会主义网络的潜在有用技术
Cossi Blaise Avoussoukpo, Chunxiang Xu, Marius Tchenagnon
The concept of the Internet of things is a paradigm that is supposed to integrate several complex technologies. Opportunistic Networks due to its nature, do share common characteristics with the Internet of Things. Thus, the study of opportunistic Networks could greatly benefit the Internet of Things area of research. The Opportunistic Networks aim to use the altruism of mobile or immobile things to achieve specific tasks. However, among other challenges to solve for the Opportunistic Networks to work appropriately is the lack of a flexible, low-cost, and polyvalent communication system. Thankfully, the Polyvalent(Multipurpose) Wireless Communication System (PWCS) appears as a serious candidate to solve that challenge. This paper aims to show the correlation between an existing but unexplored technology; the PWCS, and Opportunistic Networks providing four main contributions. First, this paper clarifies the concept of opportunistic networks. Second, it points out the key differences between OppNets and some communications models that emerged from Mobile Ad hoc Networks research. Third, it presents the PWCS. Finally, it provides the correlation between OppNets and the PWCS and also discusses the limitations of the PWCS. The PWCS, if given unbiased attention, may add value to the communication field.
物联网的概念是一种范式,它应该集成几种复杂的技术。机会主义网络由于其性质,确实与物联网具有共同的特征。因此,机会网络的研究可以极大地促进物联网领域的研究。机会主义网络旨在利用可移动或不可移动事物的利他性来完成特定的任务。然而,机会主义网络需要解决的其他挑战之一是缺乏灵活、低成本和多价的通信系统。值得庆幸的是,多价(多用途)无线通信系统(PWCS)似乎是解决这一挑战的重要候选者。本文旨在展示现有但尚未开发的技术之间的相关性;PWCS和机会主义网络提供了四个主要贡献。首先,本文厘清了机会主义网络的概念。其次,指出OppNets与移动自组织网络研究中出现的一些通信模型之间的关键区别。第三,介绍了PWCS。最后,给出了OppNets与PWCS之间的相关性,并讨论了PWCS的局限性。如果给予不偏不倚的关注,PWCS可以为通信领域增加价值。
{"title":"Polyvalent Wireless Communication System (PWCS); A Potentially Useful Technology for Opportunistic Networks","authors":"Cossi Blaise Avoussoukpo, Chunxiang Xu, Marius Tchenagnon","doi":"10.1109/ICAIIS49377.2020.9194809","DOIUrl":"https://doi.org/10.1109/ICAIIS49377.2020.9194809","url":null,"abstract":"The concept of the Internet of things is a paradigm that is supposed to integrate several complex technologies. Opportunistic Networks due to its nature, do share common characteristics with the Internet of Things. Thus, the study of opportunistic Networks could greatly benefit the Internet of Things area of research. The Opportunistic Networks aim to use the altruism of mobile or immobile things to achieve specific tasks. However, among other challenges to solve for the Opportunistic Networks to work appropriately is the lack of a flexible, low-cost, and polyvalent communication system. Thankfully, the Polyvalent(Multipurpose) Wireless Communication System (PWCS) appears as a serious candidate to solve that challenge. This paper aims to show the correlation between an existing but unexplored technology; the PWCS, and Opportunistic Networks providing four main contributions. First, this paper clarifies the concept of opportunistic networks. Second, it points out the key differences between OppNets and some communications models that emerged from Mobile Ad hoc Networks research. Third, it presents the PWCS. Finally, it provides the correlation between OppNets and the PWCS and also discusses the limitations of the PWCS. The PWCS, if given unbiased attention, may add value to the communication field.","PeriodicalId":416002,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Information Systems (ICAIIS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127604702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
RLM: a new mask countermeasure to resist HO-CPA for GIFT RLM:一种新的抗GIFT - HO-CPA掩码对策
Yueqing Li, Shihui Zheng
As a further development of the side channel technique, the security of crypto-chips has received extensive attention from researchers. A mask scheme based on a random number generator is usually used to protect crypto-chips, but it will result in extra memory and time consumption. How to balance the security of crypto-chips and the memory consumption has always been the research focus. In this paper, we use a random number generator to design a random loop mask scheme (RLM) for GIFT algorithm. The binary value of a random number is used to set the position and value of masks. In addition, the rotating S-box of the RSM scheme is combined with the small generation mask of a fixed mask scheme to make the RLM more secure. The experimental results show that the RLM scheme protects the intermediate values from being leaked. Compared to other common schemes, our RLM scheme could resist not only correlation power analysis (CPA) attacks but also higher-order correlation power analysis (HO-CP A) attacks. In addition, the RAM consumption was 49% less than that of the global mask scheme.
作为侧信道技术的进一步发展,加密芯片的安全性受到了研究人员的广泛关注。通常使用基于随机数生成器的掩码方案来保护加密芯片,但它会导致额外的内存和时间消耗。如何平衡加密芯片的安全性和存储消耗一直是研究的热点。本文利用随机数生成器设计了GIFT算法的随机循环掩码方案(RLM)。随机数的二进制值用于设置掩码的位置和值。此外,RSM方案的旋转s盒与固定掩码方案的小生成掩码相结合,使RLM更加安全。实验结果表明,RLM方案保护了中间值不被泄露。与其他常用方案相比,我们的RLM方案不仅可以抵抗相关功率分析(CPA)攻击,还可以抵抗高阶相关功率分析(HO-CP A)攻击。此外,RAM消耗比全局掩码方案少49%。
{"title":"RLM: a new mask countermeasure to resist HO-CPA for GIFT","authors":"Yueqing Li, Shihui Zheng","doi":"10.1109/ICAIIS49377.2020.9194867","DOIUrl":"https://doi.org/10.1109/ICAIIS49377.2020.9194867","url":null,"abstract":"As a further development of the side channel technique, the security of crypto-chips has received extensive attention from researchers. A mask scheme based on a random number generator is usually used to protect crypto-chips, but it will result in extra memory and time consumption. How to balance the security of crypto-chips and the memory consumption has always been the research focus. In this paper, we use a random number generator to design a random loop mask scheme (RLM) for GIFT algorithm. The binary value of a random number is used to set the position and value of masks. In addition, the rotating S-box of the RSM scheme is combined with the small generation mask of a fixed mask scheme to make the RLM more secure. The experimental results show that the RLM scheme protects the intermediate values from being leaked. Compared to other common schemes, our RLM scheme could resist not only correlation power analysis (CPA) attacks but also higher-order correlation power analysis (HO-CP A) attacks. In addition, the RAM consumption was 49% less than that of the global mask scheme.","PeriodicalId":416002,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Information Systems (ICAIIS)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127850504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multipath Mitigation Analysis using Hatch Filter and DTW in Single Frequency RTK 单频RTK中基于Hatch滤波器和DTW的多径抑制分析
N. Echoda, S. Z. Farooq, Hong Xuebao, J. Chukwuma, Dongkai Yang
Multipath being a stochastic GNSS error is hard to eliminate. For two receivers operating in differential GNSS mode with a short baseline (below 10 km in this case), it is possible to mitigate geographically common errors to both receivers but not multipath. Real Time Kinematic (RTK) uses carrier-phase observations to form differences in real time. The single frequency (SF) code observations for receivers functioning in RTK are filtered through code-carrier combination of observations. The Hatch filter algorithm is often utilized in SF-GNSS based applications to detect cycle slips and also to mitigate multipath. However, choosing an effective smoothing window is important to ensure that the Hatch filtered output matches closely to that of the input raw signal. Dynamic Time Warping (DTW) was used to get appropriate smoothing constant value for the Hatch filter by measuring the squared Euclidean distances of corresponding points of the two signals. Using dynamic data collected for 906 epochs from two receivers configured in RTK mode, a bespoke SF-RTK software was used to compare the positioning results of the Hatch filtered output to that of the widely used RTKLIB software. The results showed that the standard deviation of the differences of the ECEF coordinates between the two software are within centimetre levels.
多路径误差是GNSS的随机误差,难以消除。对于两个以差分GNSS模式运行的接收器,其基线较短(在这种情况下低于10公里),可以减轻两个接收器在地理上的常见错误,但不能减轻多路径。实时运动学(Real Time Kinematic, RTK)利用载波相位观测来实时形成差分。在RTK中运行的接收机的单频(SF)代码观测值通过观测值的码载波组合进行过滤。哈奇滤波算法通常用于基于SF-GNSS的应用中,以检测周跳和减轻多径。然而,选择一个有效的平滑窗口是重要的,以确保Hatch滤波输出与输入原始信号紧密匹配。通过测量两个信号对应点的欧氏距离的平方,采用动态时间扭曲(Dynamic Time Warping, DTW)得到合适的Hatch滤波器平滑常数值。利用配置为RTK模式的两个接收机906次采集的动态数据,使用定制的SF-RTK软件将Hatch滤波输出的定位结果与广泛使用的RTKLIB软件的定位结果进行比较。结果表明,两种软件ECEF坐标差值的标准差均在厘米级以内。
{"title":"Multipath Mitigation Analysis using Hatch Filter and DTW in Single Frequency RTK","authors":"N. Echoda, S. Z. Farooq, Hong Xuebao, J. Chukwuma, Dongkai Yang","doi":"10.1109/ICAIIS49377.2020.9194831","DOIUrl":"https://doi.org/10.1109/ICAIIS49377.2020.9194831","url":null,"abstract":"Multipath being a stochastic GNSS error is hard to eliminate. For two receivers operating in differential GNSS mode with a short baseline (below 10 km in this case), it is possible to mitigate geographically common errors to both receivers but not multipath. Real Time Kinematic (RTK) uses carrier-phase observations to form differences in real time. The single frequency (SF) code observations for receivers functioning in RTK are filtered through code-carrier combination of observations. The Hatch filter algorithm is often utilized in SF-GNSS based applications to detect cycle slips and also to mitigate multipath. However, choosing an effective smoothing window is important to ensure that the Hatch filtered output matches closely to that of the input raw signal. Dynamic Time Warping (DTW) was used to get appropriate smoothing constant value for the Hatch filter by measuring the squared Euclidean distances of corresponding points of the two signals. Using dynamic data collected for 906 epochs from two receivers configured in RTK mode, a bespoke SF-RTK software was used to compare the positioning results of the Hatch filtered output to that of the widely used RTKLIB software. The results showed that the standard deviation of the differences of the ECEF coordinates between the two software are within centimetre levels.","PeriodicalId":416002,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Information Systems (ICAIIS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122719627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Research on the optimal coordinated control strategy of ‘source-grid-load-storage’ including electric vehicle and distributed power supply 包含电动汽车和分布式电源的“源-网-蓄负荷”最优协调控制策略研究
Guang-bin Huang, Hao Ma, Xi Chen, Binrong Zhang, Chang Liu, Jing Zhang
Because the electric vehicle load is a complex space-time load with comprehensive influence factors. Therefore, this paper considers the temporal and spatial characteristics of the electric vehicle load and the time sequence characteristics of the distributed generation. It establishes optimization model of distribution network containing the plug-in electric vehicle and distributed generation. To optimize the annual total cost of distribution network, it uses Monte Carlo simulation to get the temporal and spatial characteristics of electric vehicle load. Based on the coordinated control strategy, the model is solved by a hybrid particle swarm optimization algorithm with mutation and crossover operation.
因为电动汽车载荷是一个影响因素综合的复杂时空载荷。因此,本文考虑了电动汽车负荷的时空特性和分布式发电的时序特性。建立了包含插电式电动汽车和分布式发电的配电网优化模型。为了优化配电网年总成本,采用蒙特卡罗仿真方法得到了电动汽车负荷的时空特征。基于协调控制策略,采用带有变异和交叉操作的混合粒子群优化算法对模型进行求解。
{"title":"Research on the optimal coordinated control strategy of ‘source-grid-load-storage’ including electric vehicle and distributed power supply","authors":"Guang-bin Huang, Hao Ma, Xi Chen, Binrong Zhang, Chang Liu, Jing Zhang","doi":"10.1109/ICAIIS49377.2020.9194707","DOIUrl":"https://doi.org/10.1109/ICAIIS49377.2020.9194707","url":null,"abstract":"Because the electric vehicle load is a complex space-time load with comprehensive influence factors. Therefore, this paper considers the temporal and spatial characteristics of the electric vehicle load and the time sequence characteristics of the distributed generation. It establishes optimization model of distribution network containing the plug-in electric vehicle and distributed generation. To optimize the annual total cost of distribution network, it uses Monte Carlo simulation to get the temporal and spatial characteristics of electric vehicle load. Based on the coordinated control strategy, the model is solved by a hybrid particle swarm optimization algorithm with mutation and crossover operation.","PeriodicalId":416002,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Information Systems (ICAIIS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123091696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Camouflaged Object Detection Model Based on Deep Learning 一种基于深度学习的伪装目标检测模型
Yong Wang, Ling Li, Xin Yang, Xinxin Wang, Hui Liu
Camouflaged object detection is a hard assignment due to their textures are similar to the background. The main intention of this paper is probe into a problem about the camouflaged object detection, that is, detecting its camouflaged object for a given image. This problem has not been well studied in spite of a large area of potential applications such as camouflage military targets detection and wildlife protection. To address this problem, a camouflage object detection method based on deep learning is proposed. The suggested method can detect camouflaged object which can extract deep features automatically. It can also provide detection probability which reflect camouflage efficiency. Experimental results show that the deep learning measure can effectively detect different scene, representing the camouflage level of low, medium and high respectively.
伪装物体检测是一个困难的任务,因为它们的纹理与背景相似。本文的主要目的是探讨一个伪装目标检测问题,即对给定图像进行伪装目标的检测。尽管迷彩在军事目标探测和野生动物保护等方面有广泛的潜在应用,但这一问题尚未得到很好的研究。为了解决这一问题,提出了一种基于深度学习的伪装目标检测方法。该方法能够自动提取伪装目标的深层特征。它还能提供反映伪装效率的探测概率。实验结果表明,该深度学习方法可以有效检测不同场景,分别代表低、中、高伪装水平。
{"title":"A Camouflaged Object Detection Model Based on Deep Learning","authors":"Yong Wang, Ling Li, Xin Yang, Xinxin Wang, Hui Liu","doi":"10.1109/ICAIIS49377.2020.9194881","DOIUrl":"https://doi.org/10.1109/ICAIIS49377.2020.9194881","url":null,"abstract":"Camouflaged object detection is a hard assignment due to their textures are similar to the background. The main intention of this paper is probe into a problem about the camouflaged object detection, that is, detecting its camouflaged object for a given image. This problem has not been well studied in spite of a large area of potential applications such as camouflage military targets detection and wildlife protection. To address this problem, a camouflage object detection method based on deep learning is proposed. The suggested method can detect camouflaged object which can extract deep features automatically. It can also provide detection probability which reflect camouflage efficiency. Experimental results show that the deep learning measure can effectively detect different scene, representing the camouflage level of low, medium and high respectively.","PeriodicalId":416002,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Information Systems (ICAIIS)","volume":"322 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115771783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Network Security Analysis of Industrial Control System Based on Attack-Defense Tree 基于攻击防御树的工业控制系统网络安全分析
Sui He, Ding Lei, Wang Shuang, Chunbo Liu, Zhaojun Gu
In order to cope with the network attack of industrial control system, this paper proposes a quantifiable attack-defense tree model. In order to reduce the influence of subjective factors on weight calculation and the probability of attack events, the Fuzzy Analytic Hierarchy Process and the Attack-Defense Tree model are combined. First, the model provides a variety of security attributes for attack and defense leaf nodes. Secondly, combining the characteristics of leaf nodes, a fuzzy consistency matrix is constructed to calculate the security attribute weight of leaf nodes, and the probability of attack and defense leaf nodes. Then, the influence of defense node on attack behavior is analyzed. Finally, the network risk assessment of typical airport oil supply automatic control system has been undertaken as a case study using this attack-defense tree model. The result shows that this model can truly reflect the impact of defense measures on the attack behavior, and provide a reference for the network security scheme.
为了应对工业控制系统的网络攻击,提出了一种可量化的攻击防御树模型。为了减少主观因素对权重计算和攻击事件概率的影响,将模糊层次分析法与攻击-防御树模型相结合。首先,该模型为攻击和防御叶节点提供了各种安全属性。其次,结合叶节点的特征,构造模糊一致性矩阵,计算叶节点的安全属性权值,以及攻击和防御叶节点的概率;然后分析了防御节点对攻击行为的影响。最后,以典型机场供油自动控制系统为例,应用该攻击-防御树模型进行了网络风险评估。结果表明,该模型能够真实反映防御措施对攻击行为的影响,为网络安全方案提供参考。
{"title":"Network Security Analysis of Industrial Control System Based on Attack-Defense Tree","authors":"Sui He, Ding Lei, Wang Shuang, Chunbo Liu, Zhaojun Gu","doi":"10.1109/ICAIIS49377.2020.9194818","DOIUrl":"https://doi.org/10.1109/ICAIIS49377.2020.9194818","url":null,"abstract":"In order to cope with the network attack of industrial control system, this paper proposes a quantifiable attack-defense tree model. In order to reduce the influence of subjective factors on weight calculation and the probability of attack events, the Fuzzy Analytic Hierarchy Process and the Attack-Defense Tree model are combined. First, the model provides a variety of security attributes for attack and defense leaf nodes. Secondly, combining the characteristics of leaf nodes, a fuzzy consistency matrix is constructed to calculate the security attribute weight of leaf nodes, and the probability of attack and defense leaf nodes. Then, the influence of defense node on attack behavior is analyzed. Finally, the network risk assessment of typical airport oil supply automatic control system has been undertaken as a case study using this attack-defense tree model. The result shows that this model can truly reflect the impact of defense measures on the attack behavior, and provide a reference for the network security scheme.","PeriodicalId":416002,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Information Systems (ICAIIS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131193463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of moving target tracking system based on Jetson platform 基于Jetson平台的运动目标跟踪系统设计
Xuejun Wang, Zhiguo Zhou, Yun Li
This paper proposes an improved ASMS algorithm for mean shift scale problem, which integrates the ASMS algorithm into the Ross system and transplants it to the Jetsontx2 platform. In this method, the outline rectangle frame of the object to be tracked is drawn on the picture sent back by UAV, and the pixel coordinates of the rectangle frame are encapsulated into Mavlink protocol and sent to Jetsontx2 platform through UDP for tracking algorithm. The experimental results show that the tracking system based on Jetsontx2 platform can overcome the problems of tracking instability, poor imaging effect and low definition.
本文提出了一种改进的asm算法,将asm算法集成到Ross系统中,并移植到Jetsontx2平台上。该方法在无人机发回的图像上绘制待跟踪对象的轮廓矩形帧,将矩形帧的像素坐标封装到Mavlink协议中,通过UDP发送到Jetsontx2平台进行跟踪算法。实验结果表明,基于Jetsontx2平台的跟踪系统可以克服跟踪不稳定、成像效果差和清晰度低等问题。
{"title":"Design of moving target tracking system based on Jetson platform","authors":"Xuejun Wang, Zhiguo Zhou, Yun Li","doi":"10.1109/ICAIIS49377.2020.9194918","DOIUrl":"https://doi.org/10.1109/ICAIIS49377.2020.9194918","url":null,"abstract":"This paper proposes an improved ASMS algorithm for mean shift scale problem, which integrates the ASMS algorithm into the Ross system and transplants it to the Jetsontx2 platform. In this method, the outline rectangle frame of the object to be tracked is drawn on the picture sent back by UAV, and the pixel coordinates of the rectangle frame are encapsulated into Mavlink protocol and sent to Jetsontx2 platform through UDP for tracking algorithm. The experimental results show that the tracking system based on Jetsontx2 platform can overcome the problems of tracking instability, poor imaging effect and low definition.","PeriodicalId":416002,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Information Systems (ICAIIS)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123804976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2020 IEEE International Conference on Artificial Intelligence and Information Systems (ICAIIS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1