首页 > 最新文献

2022 7th International Conference on Communication, Image and Signal Processing (CCISP)最新文献

英文 中文
Graph Construction Based on Temporal Information and Frame Sampling for Human Action Recognition 基于时间信息和帧采样的人体动作识别图构建
Pub Date : 2022-11-01 DOI: 10.1109/CCISP55629.2022.9974302
Han Yang, Xueqin Jiang, H. Ge, Yuting Cao, Rong Ye
With the innovation and progress of data analysis, human action recognition has become a significant research direction with broad applications in many situations. We propose a skeleton temporal graph (STG) based on graph signal processing (GSP), graph spectral domain, and human action recognition. The temporal information between adjacent frames of action data is extracted by uniform sampling and redefining temporal edge weights. We reconstruct the graph Laplacian matrix from the skeleton and temporal information. According to the graph Laplacian matrix, the coefficient matrix used for classification is calculated by spectral graph wavelet transform (SGWT). In addition, we use a recent classification method eXtreme Gradient Boosting (XGBoost), to improve experimental accuracy. Our method outperforms the existing approach when applied to three publicly available datasets.
随着数据分析技术的创新和进步,人体动作识别已成为一个重要的研究方向,在许多情况下都有广泛的应用。我们提出了一种基于图信号处理(GSP)、图谱域和人体动作识别的骨架时间图(STG)。通过均匀采样和重新定义时间边权重,提取动作数据相邻帧间的时间信息。利用骨架和时间信息重构图拉普拉斯矩阵。根据图拉普拉斯矩阵,利用谱图小波变换(SGWT)计算用于分类的系数矩阵。此外,我们使用了一种最新的分类方法极端梯度增强(XGBoost),以提高实验精度。当应用于三个公开可用的数据集时,我们的方法优于现有的方法。
{"title":"Graph Construction Based on Temporal Information and Frame Sampling for Human Action Recognition","authors":"Han Yang, Xueqin Jiang, H. Ge, Yuting Cao, Rong Ye","doi":"10.1109/CCISP55629.2022.9974302","DOIUrl":"https://doi.org/10.1109/CCISP55629.2022.9974302","url":null,"abstract":"With the innovation and progress of data analysis, human action recognition has become a significant research direction with broad applications in many situations. We propose a skeleton temporal graph (STG) based on graph signal processing (GSP), graph spectral domain, and human action recognition. The temporal information between adjacent frames of action data is extracted by uniform sampling and redefining temporal edge weights. We reconstruct the graph Laplacian matrix from the skeleton and temporal information. According to the graph Laplacian matrix, the coefficient matrix used for classification is calculated by spectral graph wavelet transform (SGWT). In addition, we use a recent classification method eXtreme Gradient Boosting (XGBoost), to improve experimental accuracy. Our method outperforms the existing approach when applied to three publicly available datasets.","PeriodicalId":431851,"journal":{"name":"2022 7th International Conference on Communication, Image and Signal Processing (CCISP)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128722144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Visualization Analysis of Domestic and Foreign Cyber Security Research Based on CiteSpace 基于CiteSpace的国内外网络安全研究可视化分析
Pub Date : 2022-11-01 DOI: 10.1109/CCISP55629.2022.9974454
Jian-Xun Zhu, Jun-jing Tian, Jinqiang Ma, Zhi-Hong Miao, Zhanrong Guo, Lin Fan
Objective To visually display the research results of network security by knowledge mapping, analyze the research status of this field, and provide reference for future research in this field. Methods In this paper, 2197 articles in “CNKI” and 4932 articles in “WOS” database from 2012 to 2021 were visualized by literature metrology. CiteSpace software is used for metrological analysis and knowledge mapping. Results The research shows that the total number of network security documents in 2012–2021 shows an upward trend. There is less cooperation among the core authors. The US and China dominate the field of cyber security. There are both similarities and differences in network security research at home and abroad. Foreign research focuses on network attack and defense, while domestic research is widely distributed, including personal information, digital economy, artificial intelligence, political security and international governance. But the domestic research lacks the depth, and should strengthen the research on the cyber attack and defense.
目的通过知识图谱可视化地展示网络安全的研究成果,分析该领域的研究现状,为今后该领域的研究提供参考。方法采用文献计量法对2012 - 2021年中国知网(CNKI)收录的2197篇文章和WOS数据库收录的4932篇文章进行可视化分析。使用CiteSpace软件进行计量分析和知识映射。结果研究表明,2012-2021年网络安全文档总数呈上升趋势。核心作者之间的合作较少。中美两国在网络安全领域占据主导地位。国内外对网络安全的研究既有相似之处,也有差异。国外的研究主要集中在网络攻击与防御方面,而国内的研究则分布广泛,包括个人信息、数字经济、人工智能、政治安全、国际治理等。但国内的研究缺乏深度,应加强对网络攻击与防御的研究。
{"title":"Visualization Analysis of Domestic and Foreign Cyber Security Research Based on CiteSpace","authors":"Jian-Xun Zhu, Jun-jing Tian, Jinqiang Ma, Zhi-Hong Miao, Zhanrong Guo, Lin Fan","doi":"10.1109/CCISP55629.2022.9974454","DOIUrl":"https://doi.org/10.1109/CCISP55629.2022.9974454","url":null,"abstract":"Objective To visually display the research results of network security by knowledge mapping, analyze the research status of this field, and provide reference for future research in this field. Methods In this paper, 2197 articles in “CNKI” and 4932 articles in “WOS” database from 2012 to 2021 were visualized by literature metrology. CiteSpace software is used for metrological analysis and knowledge mapping. Results The research shows that the total number of network security documents in 2012–2021 shows an upward trend. There is less cooperation among the core authors. The US and China dominate the field of cyber security. There are both similarities and differences in network security research at home and abroad. Foreign research focuses on network attack and defense, while domestic research is widely distributed, including personal information, digital economy, artificial intelligence, political security and international governance. But the domestic research lacks the depth, and should strengthen the research on the cyber attack and defense.","PeriodicalId":431851,"journal":{"name":"2022 7th International Conference on Communication, Image and Signal Processing (CCISP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128649403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced style transfer with colorization and super-resolution 增强风格转移与着色和超分辨率
Pub Date : 2022-11-01 DOI: 10.1109/CCISP55629.2022.9974475
Liu JinKua, Yang ChenXiang, H. B. Abdalla
Style transfer is a novel and successful technology in the field of computer vision which allow people to create art pieces without training. This research has combined style transfer, colorization, and super-resolution algorithm to create a method to create art pieces from the black-white image as content and sketch art pieces as style with high resolution. This method could significantly lower the demand for art creation and allow people with little artistic skill to create desired artwork. Moreover, this research compares the impact of the different parameters in style transfer and the influence of the colorization in different processing stages resulting that colorizing the content image before style transfer would create a single style image that is more controllable but colorizing the generated image after style transfer would result in a more unpredictable multi-style image which depends on the training dataset of the image and the ratio of the weight in style transfer.
风格转换是计算机视觉领域一项新颖而成功的技术,它使人们无需训练就能创作艺术品。本研究结合风格转移、着色和超分辨率算法,创造了一种以黑白图像为内容、素描艺术作品为风格的高分辨率艺术作品创作方法。这种方法可以大大降低对艺术创作的需求,让没有什么艺术技能的人也能创作出自己想要的艺术品。此外,本研究还比较了不同参数对风格迁移的影响以及不同处理阶段着色的影响,结果表明,在风格迁移之前对内容图像进行着色会产生更可控的单一风格图像,而在风格迁移之后对生成的图像进行着色会产生更不可预测的多风格图像,这取决于图像的训练数据集和风格迁移中权重的比例。
{"title":"Enhanced style transfer with colorization and super-resolution","authors":"Liu JinKua, Yang ChenXiang, H. B. Abdalla","doi":"10.1109/CCISP55629.2022.9974475","DOIUrl":"https://doi.org/10.1109/CCISP55629.2022.9974475","url":null,"abstract":"Style transfer is a novel and successful technology in the field of computer vision which allow people to create art pieces without training. This research has combined style transfer, colorization, and super-resolution algorithm to create a method to create art pieces from the black-white image as content and sketch art pieces as style with high resolution. This method could significantly lower the demand for art creation and allow people with little artistic skill to create desired artwork. Moreover, this research compares the impact of the different parameters in style transfer and the influence of the colorization in different processing stages resulting that colorizing the content image before style transfer would create a single style image that is more controllable but colorizing the generated image after style transfer would result in a more unpredictable multi-style image which depends on the training dataset of the image and the ratio of the weight in style transfer.","PeriodicalId":431851,"journal":{"name":"2022 7th International Conference on Communication, Image and Signal Processing (CCISP)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132004219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Indoor positioning method based on Improved Elman neural network using sparrow search 基于改进Elman神经网络的麻雀搜索室内定位方法
Pub Date : 2022-11-01 DOI: 10.1109/CCISP55629.2022.9974419
Tiansheng Shen, Wenying Chen, Binbin Zhu, Yan Wang, Yongliang Zhou, Xiuping Wang
N owadays, indoor positioning algorithms have attracted comprehensive attention and research. Due to multipath effect in the complex indoor environment, it is difficult to position with high precision. In this paper a BLE(Bluetooth Low Energy) indoor positioning algorithm based on ISSA(Improved Sparrow Search Algorithm) with Cat chaotic mapping is proposed. Firstly the abnormal data are removed by BDOR(Bilateral Direction Outlier Removal) algorithm before establishing the database of the collected BLE data. Then the rest of data are filtered by improved Kalman filter. The ISSA-Elman models are studied to predict the horizontal and vertical coordinates of the point to be tested. Results of experiments reveal that the proposed algorithm performs precisely in indoor positioning. The minimal position error is nearly 2cm.
目前,室内定位算法得到了广泛的关注和研究。由于复杂的室内环境中存在多径效应,难以实现高精度定位。本文提出了一种基于Cat混沌映射的改进麻雀搜索算法(ISSA)的BLE(Bluetooth Low Energy)室内定位算法。首先用BDOR(Bilateral Direction Outlier Removal)算法去除异常数据,然后建立采集到的BLE数据数据库。然后用改进的卡尔曼滤波对剩余数据进行滤波。研究了ISSA-Elman模型来预测待测点的横坐标和纵坐标。实验结果表明,该算法在室内定位中具有较好的精度。最小位置误差接近2cm。
{"title":"An Indoor positioning method based on Improved Elman neural network using sparrow search","authors":"Tiansheng Shen, Wenying Chen, Binbin Zhu, Yan Wang, Yongliang Zhou, Xiuping Wang","doi":"10.1109/CCISP55629.2022.9974419","DOIUrl":"https://doi.org/10.1109/CCISP55629.2022.9974419","url":null,"abstract":"N owadays, indoor positioning algorithms have attracted comprehensive attention and research. Due to multipath effect in the complex indoor environment, it is difficult to position with high precision. In this paper a BLE(Bluetooth Low Energy) indoor positioning algorithm based on ISSA(Improved Sparrow Search Algorithm) with Cat chaotic mapping is proposed. Firstly the abnormal data are removed by BDOR(Bilateral Direction Outlier Removal) algorithm before establishing the database of the collected BLE data. Then the rest of data are filtered by improved Kalman filter. The ISSA-Elman models are studied to predict the horizontal and vertical coordinates of the point to be tested. Results of experiments reveal that the proposed algorithm performs precisely in indoor positioning. The minimal position error is nearly 2cm.","PeriodicalId":431851,"journal":{"name":"2022 7th International Conference on Communication, Image and Signal Processing (CCISP)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127854479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Modified Thinning Framework Against Noise 一种改进的抗噪细化框架
Pub Date : 2022-11-01 DOI: 10.1109/CCISP55629.2022.9974468
Yuanxu Liu, Jun Ma, X. Ren, V. Tsviatkou, Hao Li
We proposed a modified thinning framework that based on the scale space technique to automatically extract skeletons from images without manual-tuning. The proposed framework can increase the robustness of the thinning algorithm, it not only can suppress the boundary noise, but also can alleviate the inner noise. These two types of noise generally cause the appearance of the abundant of the unwanted branches in the outcome of the thinning algorithm, which arise the difficulties of the later recognition or matching process in skeleton. The experiment has proved the proposed framework has better performance when comparing with the other existing methods.
我们提出了一种改进的基于尺度空间技术的细化框架,可以在不需要手动调整的情况下自动提取图像中的骨架。该框架不仅可以抑制边界噪声,还可以减轻内部噪声,提高了稀疏算法的鲁棒性。这两种类型的噪声通常会导致稀疏算法的结果中出现大量不需要的分支,从而给后续的骨架识别或匹配过程带来困难。实验结果表明,该框架与现有方法相比具有更好的性能。
{"title":"A Modified Thinning Framework Against Noise","authors":"Yuanxu Liu, Jun Ma, X. Ren, V. Tsviatkou, Hao Li","doi":"10.1109/CCISP55629.2022.9974468","DOIUrl":"https://doi.org/10.1109/CCISP55629.2022.9974468","url":null,"abstract":"We proposed a modified thinning framework that based on the scale space technique to automatically extract skeletons from images without manual-tuning. The proposed framework can increase the robustness of the thinning algorithm, it not only can suppress the boundary noise, but also can alleviate the inner noise. These two types of noise generally cause the appearance of the abundant of the unwanted branches in the outcome of the thinning algorithm, which arise the difficulties of the later recognition or matching process in skeleton. The experiment has proved the proposed framework has better performance when comparing with the other existing methods.","PeriodicalId":431851,"journal":{"name":"2022 7th International Conference on Communication, Image and Signal Processing (CCISP)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126644020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A YOLOX-Based Detection Method of Triple-Cascade Feature Level Fusion for Power System External Defects 基于yolox的电力系统外部缺陷三级联特征级融合检测方法
Pub Date : 2022-11-01 DOI: 10.1109/CCISP55629.2022.9974428
Yufeng Sheng, Yingying Dai, Zixiao Luo, Chengming Jin, Chao Jiang, Liang Xue, Haoyang Cui
With the digital transformation of the power system, it is of great significance to realize intelligent identification of external breaking defects of overhead transmission lines and power pylons. This paper proposes a YOLOX-based detection method of triple-cascade feature level fusion for power system external defects. Based on YOLOX, the triple-cascade feature level fusion defect recognition and detection method, which is classified layer by layer according to the device inclusion relationship, are adopted. First, the types of equipment are judged, and then the grading standard are determined. Further, the part of the defect types, which are difficult to distinguish in the traditional machine learning algorithm, are refined and identified for the details. Finally, the proposed method is verified based on Python and NVIDIA Jetson TX2 platform with using the image data-set of the overhead transmission lines and power pylons. The mAP value of the model reaches 95.34%, which is higher 10.13% than that of YOLOX, and the detection speed reaches 32fps, which shows a promising performance for the robustness and real-time requirements of defect identification in the new power system.
随着电力系统的数字化改造,实现架空输电线路和电力铁塔外部破断缺陷的智能识别具有重要意义。提出了一种基于yolox的电力系统外部缺陷三级联特征级融合检测方法。基于YOLOX,采用三级联特征级融合缺陷识别检测方法,根据器件包含关系逐层分类。首先判断设备的种类,然后确定分级标准。进一步,对传统机器学习算法难以区分的部分缺陷类型进行了细化和识别。最后,基于Python和NVIDIA Jetson TX2平台,利用架空输电线路和电力铁塔的图像数据集,对所提方法进行了验证。该模型的mAP值达到95.34%,比YOLOX提高10.13%,检测速度达到32fps,对于新型电力系统缺陷识别的鲁棒性和实时性要求具有良好的性能。
{"title":"A YOLOX-Based Detection Method of Triple-Cascade Feature Level Fusion for Power System External Defects","authors":"Yufeng Sheng, Yingying Dai, Zixiao Luo, Chengming Jin, Chao Jiang, Liang Xue, Haoyang Cui","doi":"10.1109/CCISP55629.2022.9974428","DOIUrl":"https://doi.org/10.1109/CCISP55629.2022.9974428","url":null,"abstract":"With the digital transformation of the power system, it is of great significance to realize intelligent identification of external breaking defects of overhead transmission lines and power pylons. This paper proposes a YOLOX-based detection method of triple-cascade feature level fusion for power system external defects. Based on YOLOX, the triple-cascade feature level fusion defect recognition and detection method, which is classified layer by layer according to the device inclusion relationship, are adopted. First, the types of equipment are judged, and then the grading standard are determined. Further, the part of the defect types, which are difficult to distinguish in the traditional machine learning algorithm, are refined and identified for the details. Finally, the proposed method is verified based on Python and NVIDIA Jetson TX2 platform with using the image data-set of the overhead transmission lines and power pylons. The mAP value of the model reaches 95.34%, which is higher 10.13% than that of YOLOX, and the detection speed reaches 32fps, which shows a promising performance for the robustness and real-time requirements of defect identification in the new power system.","PeriodicalId":431851,"journal":{"name":"2022 7th International Conference on Communication, Image and Signal Processing (CCISP)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126788333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-scale and Multi-directional Fusion Method for Building Circular Layout Image Based on Morphological Transformation 基于形态变换的建筑圆形布局图像多尺度多方向融合方法
Pub Date : 2022-11-01 DOI: 10.1109/CCISP55629.2022.9974464
Peng Zou, Hongtu Xie, Xiao Hu, Jinfeng He, Guoqian Wang
The circular imaging technology of the building layout can obtain its internal information, which has been widely applied in the field of anti-terrorisms and combats. The problems of the imaging broadening caused by the scattering of the echo in the process of the penetrating between building walls bring the great inconvenience to the building layout reconstruction. In this paper, a multi-scale and multi-directional fusion method for the building circular layout image based on the morphological transformation has been proposed. Firstly, the multi-scale and multi-directional decomposition of the images from the various perspectives has been carried out by the nonsubsampled shearlet transformation. Moreover, the fusion method based on the morphological changes is carried out for low-frequency images, while the fusion method of taking the large regional variance is adopted for the high-frequency images. Finally, the inverse nonsubsampled shearlet transform transformation is respectively performed on the fused images, which can obtain the high-quality and high-precision building layout image. The experiment results are shown to prove the effectiveness of the proposed method.
建筑物布局的圆形成像技术可以获取建筑物的内部信息,在反恐和作战领域得到了广泛的应用。建筑墙体间穿透过程中回波散射引起的成像展宽问题给建筑布局重建带来了极大的不便。提出了一种基于形态变换的建筑圆形布局图像多尺度多方位融合方法。首先,利用非下采样shearlet变换对不同角度的图像进行多尺度、多向分解;对低频图像采用基于形态学变化的融合方法,对高频图像采用取大区域方差的融合方法。最后,对融合后的图像分别进行非下采样shearlet逆变换,得到高质量、高精度的建筑布局图像。实验结果证明了该方法的有效性。
{"title":"Multi-scale and Multi-directional Fusion Method for Building Circular Layout Image Based on Morphological Transformation","authors":"Peng Zou, Hongtu Xie, Xiao Hu, Jinfeng He, Guoqian Wang","doi":"10.1109/CCISP55629.2022.9974464","DOIUrl":"https://doi.org/10.1109/CCISP55629.2022.9974464","url":null,"abstract":"The circular imaging technology of the building layout can obtain its internal information, which has been widely applied in the field of anti-terrorisms and combats. The problems of the imaging broadening caused by the scattering of the echo in the process of the penetrating between building walls bring the great inconvenience to the building layout reconstruction. In this paper, a multi-scale and multi-directional fusion method for the building circular layout image based on the morphological transformation has been proposed. Firstly, the multi-scale and multi-directional decomposition of the images from the various perspectives has been carried out by the nonsubsampled shearlet transformation. Moreover, the fusion method based on the morphological changes is carried out for low-frequency images, while the fusion method of taking the large regional variance is adopted for the high-frequency images. Finally, the inverse nonsubsampled shearlet transform transformation is respectively performed on the fused images, which can obtain the high-quality and high-precision building layout image. The experiment results are shown to prove the effectiveness of the proposed method.","PeriodicalId":431851,"journal":{"name":"2022 7th International Conference on Communication, Image and Signal Processing (CCISP)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122636826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tamper-Proof Storage of User Movement Logs in Smart Parks 智能园区用户移动日志的防篡改存储
Pub Date : 2022-11-01 DOI: 10.1109/CCISP55629.2022.9974528
Yiru Niu, Hong Jiang, Xiaobing Huang, Qi Zhao, H. Xiang, Xiaofeng Xia, Yue Zhao
With the introduction of the smart city concept and the rapid development of various emerging technologies such as cloud computing, Internet of Things, big data and artificial intelligence, traditional parks have also ushered in new opportunities and are developing in a smarter direction. Since the park is an open area with frequent movement of people and equipment, it is prone to security problems. At this point, logs will be a good aid for incident accountability. In this paper, we mainly use Merkle hash tree and distributed storage for secure storage of logs. Meanwhile, to ensure the non-repudiation of logs, the signatures of users and log-generating devices are required when generating logs. After analysis, the scheme proposed in this paper can achieve tamper-proof and traceability of logs.
随着智慧城市概念的引入,以及云计算、物联网、大数据、人工智能等各种新兴技术的快速发展,传统园区也迎来了新的机遇,正朝着更加智能化的方向发展。由于公园是一个开放的区域,人员和设备的流动频繁,容易出现安全问题。在这一点上,日志将是事件问责制的良好辅助。在本文中,我们主要使用Merkle哈希树和分布式存储来实现日志的安全存储。同时,为了保证日志的不可否认性,在生成日志时需要用户和日志产生设备的签名。经过分析,本文提出的方案可以实现日志的防篡改和可追溯性。
{"title":"Tamper-Proof Storage of User Movement Logs in Smart Parks","authors":"Yiru Niu, Hong Jiang, Xiaobing Huang, Qi Zhao, H. Xiang, Xiaofeng Xia, Yue Zhao","doi":"10.1109/CCISP55629.2022.9974528","DOIUrl":"https://doi.org/10.1109/CCISP55629.2022.9974528","url":null,"abstract":"With the introduction of the smart city concept and the rapid development of various emerging technologies such as cloud computing, Internet of Things, big data and artificial intelligence, traditional parks have also ushered in new opportunities and are developing in a smarter direction. Since the park is an open area with frequent movement of people and equipment, it is prone to security problems. At this point, logs will be a good aid for incident accountability. In this paper, we mainly use Merkle hash tree and distributed storage for secure storage of logs. Meanwhile, to ensure the non-repudiation of logs, the signatures of users and log-generating devices are required when generating logs. After analysis, the scheme proposed in this paper can achieve tamper-proof and traceability of logs.","PeriodicalId":431851,"journal":{"name":"2022 7th International Conference on Communication, Image and Signal Processing (CCISP)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131291354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Progress of ADS-B IN technology in civil aviation applications ADS-B IN技术在民用航空中的应用进展
Pub Date : 2022-11-01 DOI: 10.1109/CCISP55629.2022.9974442
Dong Yun, Yang Yong, Xu Kaijun, Xuan ZhaoYu
ADS-B technology is one of the critical surveillance technologies identified by ICAO for the future and one of the four main directions that the China Civil Aviation New Technology Application and Development Committee has focused on shortly. According to the direction of aircraft data transmission, the airborne ADS-B application functions can be divided into OUT and IN categories. ADS-B IN means that the aircraft can receive ADS-B OUT information sent by other aircraft to provide operational support or information sent by ground station equipment to provide operational support to the pilot. ADS-B IN technology enables aircraft to receive ADS-B information from surrounding aircraft, achieve traffic situation awareness, and implement “TCAS-like” functions applicable to general aviation flight characteristics to improve general aviation flight safety further. This paper provides an in-depth analysis of the current status of international ADS-B IN technology development, discusses in detail the update of relevant policies and regulations of Chinese civil aviation and the progress of demonstration and validation, and analyzes the main problems existing in actual operation.
ADS-B技术是国际民航组织确定的未来关键监视技术之一,也是中国民航新技术应用与发展委员会近期重点关注的四个主要方向之一。根据飞机数据传输的方向,机载ADS-B应用功能可分为OUT和IN两类。ADS-B IN是指飞机可以接收其他飞机发送的ADS-B OUT信息以提供作战保障,或者接收地面站设备发送的信息以向飞行员提供作战保障。ADS-B IN技术使飞机能够接收周围飞机的ADS-B信息,实现交通态势感知,实现适用于通用航空飞行特性的“类tcas”功能,进一步提高通用航空飞行安全性。本文深入分析了国际ADS-B IN技术发展现状,详细论述了我国民航相关政策法规的更新和论证验证的进展,分析了实际运行中存在的主要问题。
{"title":"Progress of ADS-B IN technology in civil aviation applications","authors":"Dong Yun, Yang Yong, Xu Kaijun, Xuan ZhaoYu","doi":"10.1109/CCISP55629.2022.9974442","DOIUrl":"https://doi.org/10.1109/CCISP55629.2022.9974442","url":null,"abstract":"ADS-B technology is one of the critical surveillance technologies identified by ICAO for the future and one of the four main directions that the China Civil Aviation New Technology Application and Development Committee has focused on shortly. According to the direction of aircraft data transmission, the airborne ADS-B application functions can be divided into OUT and IN categories. ADS-B IN means that the aircraft can receive ADS-B OUT information sent by other aircraft to provide operational support or information sent by ground station equipment to provide operational support to the pilot. ADS-B IN technology enables aircraft to receive ADS-B information from surrounding aircraft, achieve traffic situation awareness, and implement “TCAS-like” functions applicable to general aviation flight characteristics to improve general aviation flight safety further. This paper provides an in-depth analysis of the current status of international ADS-B IN technology development, discusses in detail the update of relevant policies and regulations of Chinese civil aviation and the progress of demonstration and validation, and analyzes the main problems existing in actual operation.","PeriodicalId":431851,"journal":{"name":"2022 7th International Conference on Communication, Image and Signal Processing (CCISP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131489056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multi-step stereo matching algorithm based on image fragment and confidence propagation 基于图像片段和置信度传播的多步立体匹配算法
Pub Date : 2022-11-01 DOI: 10.1109/CCISP55629.2022.9974317
Yingjiang Li, Yaping Deng, Yuzhong Zhong
This paper presents a multi-step stereo matching algorithm that can be applied to multiple scenes. To adapt to different application scenarios, the algorithm divides the stereo matching process into three steps: point, fragment, and plane. First, the texture points of an image are extracted and the stereo matching (point disparity) of these points is performed using the improved self-aware matching measure (SAMM) algorithm. Then, according to the edge information of the image, a smooth region is divided into different fragments in the horizontal direction. The disparity estimation of the smooth region (segment disparity) is obtained through the confidence propagation of disparity values of texture points in the fragments. Finally, based on the similarity of plane disparity, a disparity map is generated using the disparity refining algorithm (plane disparity), and a final high-precision disparity value is obtained. The experimental results show that the proposed algorithm has high operational efficiency and accurate disparity estimation. Moreover, the algorithm may be adapted for more application scenarios.
提出了一种适用于多场景的多步立体匹配算法。为了适应不同的应用场景,该算法将立体匹配过程分为三点:点、片段、平面。首先,提取图像的纹理点,利用改进的自感知匹配测度(SAMM)算法对这些点进行立体匹配(点视差);然后,根据图像的边缘信息,在水平方向上将光滑区域划分为不同的碎片。通过对碎片中纹理点的视差值进行置信度传播,得到光滑区域(片段视差)的视差估计。最后,基于平面视差的相似性,利用视差细化算法(平面视差)生成视差图,得到最终的高精度视差值。实验结果表明,该算法运算效率高,视差估计准确。此外,该算法可以适应更多的应用场景。
{"title":"Multi-step stereo matching algorithm based on image fragment and confidence propagation","authors":"Yingjiang Li, Yaping Deng, Yuzhong Zhong","doi":"10.1109/CCISP55629.2022.9974317","DOIUrl":"https://doi.org/10.1109/CCISP55629.2022.9974317","url":null,"abstract":"This paper presents a multi-step stereo matching algorithm that can be applied to multiple scenes. To adapt to different application scenarios, the algorithm divides the stereo matching process into three steps: point, fragment, and plane. First, the texture points of an image are extracted and the stereo matching (point disparity) of these points is performed using the improved self-aware matching measure (SAMM) algorithm. Then, according to the edge information of the image, a smooth region is divided into different fragments in the horizontal direction. The disparity estimation of the smooth region (segment disparity) is obtained through the confidence propagation of disparity values of texture points in the fragments. Finally, based on the similarity of plane disparity, a disparity map is generated using the disparity refining algorithm (plane disparity), and a final high-precision disparity value is obtained. The experimental results show that the proposed algorithm has high operational efficiency and accurate disparity estimation. Moreover, the algorithm may be adapted for more application scenarios.","PeriodicalId":431851,"journal":{"name":"2022 7th International Conference on Communication, Image and Signal Processing (CCISP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131741510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 7th International Conference on Communication, Image and Signal Processing (CCISP)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1