首页 > 最新文献

2020 Zooming Innovation in Consumer Technologies Conference (ZINC)最新文献

英文 中文
A Dual-input Multi-label Classification Approach for Non-Intrusive Load Monitoring via Deep Learning 基于深度学习的非侵入式负载监测双输入多标签分类方法
Pub Date : 2020-05-01 DOI: 10.1109/ZINC50678.2020.9161776
Halil Çimen, E. Palacios-García, N. Çetinkaya, J. Vasquez, J. Guerrero
Non-intrusive load monitoring (NILM) is the process of obtaining appliance-level data from users’ total electricity consumption data. These data can be of great benefit, especially in demand response applications. In this paper, a multi-label classification for NILM based on a two-input gated recurrent unit (GRU) is presented. Since the presented method is designed with a multi-label approach, great savings in training time are achieved. While a separate model is trained for each appliance in the literature, only one model is trained in the proposed model. Besides, the model was trained using two different inputs. The first is the total active power value consumed by the whole house. The second input is the Spikes obtained by analyzing this active power consumption. Simply put, spikes are obtained by analyzing the instant power changes in active power. Both inputs are evaluated with a convolutional layer and necessary features are extracted. Obtained features are fed into the GRU to be able to analyze time-dependent changes. The simulation results show that an additional input can slightly improve the analysis accuracy. Besides, it was found that the second input is useful especially in the analysis of short-term devices.
非侵入式负荷监测(NILM)是从用户的总用电量数据中获取电器级数据的过程。这些数据非常有用,特别是在需求响应应用程序中。本文提出了一种基于双输入门控循环单元(GRU)的NILM多标签分类方法。由于该方法采用了多标签方法,大大节省了训练时间。虽然文献中为每个设备训练了一个单独的模型,但在建议的模型中只训练了一个模型。此外,该模型使用两个不同的输入进行训练。首先是整个房屋消耗的总有功功率值。第二个输入是通过分析此有功功耗获得的峰值。简单地说,尖峰是通过分析有功功率的瞬时功率变化而得到的。两个输入都用卷积层进行评估,并提取必要的特征。获得的特征被输入到GRU中,以便能够分析随时间的变化。仿真结果表明,一个额外的输入可以略微提高分析精度。此外,发现第二种输入尤其在短期装置的分析中是有用的。
{"title":"A Dual-input Multi-label Classification Approach for Non-Intrusive Load Monitoring via Deep Learning","authors":"Halil Çimen, E. Palacios-García, N. Çetinkaya, J. Vasquez, J. Guerrero","doi":"10.1109/ZINC50678.2020.9161776","DOIUrl":"https://doi.org/10.1109/ZINC50678.2020.9161776","url":null,"abstract":"Non-intrusive load monitoring (NILM) is the process of obtaining appliance-level data from users’ total electricity consumption data. These data can be of great benefit, especially in demand response applications. In this paper, a multi-label classification for NILM based on a two-input gated recurrent unit (GRU) is presented. Since the presented method is designed with a multi-label approach, great savings in training time are achieved. While a separate model is trained for each appliance in the literature, only one model is trained in the proposed model. Besides, the model was trained using two different inputs. The first is the total active power value consumed by the whole house. The second input is the Spikes obtained by analyzing this active power consumption. Simply put, spikes are obtained by analyzing the instant power changes in active power. Both inputs are evaluated with a convolutional layer and necessary features are extracted. Obtained features are fed into the GRU to be able to analyze time-dependent changes. The simulation results show that an additional input can slightly improve the analysis accuracy. Besides, it was found that the second input is useful especially in the analysis of short-term devices.","PeriodicalId":6731,"journal":{"name":"2020 Zooming Innovation in Consumer Technologies Conference (ZINC)","volume":"1 1","pages":"259-263"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88935894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Darknet and Bitcoin De-anonymization: Emerging Development 暗网和比特币去匿名化:新兴发展
Pub Date : 2020-05-01 DOI: 10.1109/ZINC50678.2020.9161431
Wenlin Han, Viet-An Duong, Long Nguyen, Caesar Mier
Darknet websites, the warm beds for money laundry, child pornography, and illicit drug trafficking, are built on hidden services and anonymous communication protocols. Cryptocurrencies, such as Bitcoin, is the major payment method used on Darknet. In this paper, we summarize and introduce the latest development on de-anonymization techniques used to reveal the hidden information that are helpful for crime investigation, which is a key step for the future research work.
暗网网站是洗钱、儿童色情和非法毒品交易的温床,它们建立在隐藏服务和匿名通信协议之上。比特币等加密货币是暗网上使用的主要支付方式。本文总结和介绍了反匿名化技术的最新进展,该技术用于揭示隐藏信息,有助于犯罪侦查,这是未来研究工作的关键步骤。
{"title":"Darknet and Bitcoin De-anonymization: Emerging Development","authors":"Wenlin Han, Viet-An Duong, Long Nguyen, Caesar Mier","doi":"10.1109/ZINC50678.2020.9161431","DOIUrl":"https://doi.org/10.1109/ZINC50678.2020.9161431","url":null,"abstract":"Darknet websites, the warm beds for money laundry, child pornography, and illicit drug trafficking, are built on hidden services and anonymous communication protocols. Cryptocurrencies, such as Bitcoin, is the major payment method used on Darknet. In this paper, we summarize and introduce the latest development on de-anonymization techniques used to reveal the hidden information that are helpful for crime investigation, which is a key step for the future research work.","PeriodicalId":6731,"journal":{"name":"2020 Zooming Innovation in Consumer Technologies Conference (ZINC)","volume":"249 1","pages":"222-226"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85888070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Pattern Combination and Variation Syntax for Case Similarity 大小写相似的模式组合和变化语法
Pub Date : 2020-05-01 DOI: 10.1109/ZINC50678.2020.9161786
W. Suwarningsih
This paper aims to explain a new way of seeking case similarities to Case Based Reasoning question and answering system. A new concept used is to create a combination of sentence patterns with the variations of syntax and relation between words in sentences. More precisely, we improve the similarity from a resource-poor source language. The combination of pattern was made for the variation of the fridge using Predicate Argument Structure (PAS) analysis, whereas the combination of pattern with the relation between words was by forming Sub Tree (ST) and Subset Tree (SST) from parsing tree. The result of forming a combination of these patterns was then selected to obtain an appropriate answer. Accuracy resulted by using the combination of this pattern resulted in a significant value equal to 88.64% of 132 question sentences used as data testing.
本文旨在解释基于案例推理的问答系统中寻找案例相似性的一种新方法。一个新的概念是用句法的变化和句子中单词之间的关系来创造句型的组合。更准确地说,我们提高了资源贫乏的源语言的相似性。使用谓词参数结构(PAS)分析对冰箱的变化进行模式组合,而通过解析树形成子树(ST)和子集树(SST)将模式与词间关系结合起来。然后选择这些模式组合的结果以获得适当的答案。使用这种模式的组合产生的准确率显著值为88.64%,用于数据测试的132个问题句。
{"title":"Pattern Combination and Variation Syntax for Case Similarity","authors":"W. Suwarningsih","doi":"10.1109/ZINC50678.2020.9161786","DOIUrl":"https://doi.org/10.1109/ZINC50678.2020.9161786","url":null,"abstract":"This paper aims to explain a new way of seeking case similarities to Case Based Reasoning question and answering system. A new concept used is to create a combination of sentence patterns with the variations of syntax and relation between words in sentences. More precisely, we improve the similarity from a resource-poor source language. The combination of pattern was made for the variation of the fridge using Predicate Argument Structure (PAS) analysis, whereas the combination of pattern with the relation between words was by forming Sub Tree (ST) and Subset Tree (SST) from parsing tree. The result of forming a combination of these patterns was then selected to obtain an appropriate answer. Accuracy resulted by using the combination of this pattern resulted in a significant value equal to 88.64% of 132 question sentences used as data testing.","PeriodicalId":6731,"journal":{"name":"2020 Zooming Innovation in Consumer Technologies Conference (ZINC)","volume":"280 3 1","pages":"48-53"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86573695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vision-Based Extrapolation of Road Lane Lines in Controlled Conditions 受控条件下基于视觉的道路车道线外推
Pub Date : 2020-05-01 DOI: 10.1109/ZINC50678.2020.9161779
Stevan Stevic, Marko Dragojevic, Momcilo Krunic, N. Cetic
Keeping vehicle in the right track while driving is common task for humans, as they perceive lane lines with ease. Naturally, one of the essential tasks for autonomous vehicle would be to detect lane lines. Except for using them as constant reference in steering controller, they are used as inputs in other driver assistance functions like lane departure warning, for example. Different road and weather conditions make it difficult to detect lane lines, as marking can become indistinct or disappear. Many simple vision-based algorithms rely on detection of edges of the markings with Canny edge detection and previously mentioned problems can affect proper extrapolation of lanes. This paper also belongs to vision-based group of algorithms that use camera. It presents usage of color thresholding to detect lane edges and together with perspective transformations and Hough transform to extrapolate lane segments in image with controlled conditions. These conditions include straight road and sunny weather. We used OpenCV computer vision framework that supports mentioned functionalities and algorithms, with Python, to obtain and compare results.
驾驶时保持车辆在正确的轨道上是人类的共同任务,因为他们很容易识别车道线。当然,自动驾驶汽车的基本任务之一就是检测车道线。除了将它们用作转向控制器的恒定参考外,它们还用作其他驾驶员辅助功能的输入,例如车道偏离警告。不同的道路和天气条件使得检测车道线变得困难,因为标记可能变得模糊或消失。许多简单的基于视觉的算法依赖于Canny边缘检测对标记边缘的检测,前面提到的问题会影响车道的正确外推。本文也属于基于视觉的一组使用相机的算法。利用颜色阈值法检测车道边缘,并结合透视变换和霍夫变换在受控条件下外推图像中的车道段。这些条件包括笔直的道路和晴朗的天气。我们使用支持上述功能和算法的OpenCV计算机视觉框架和Python来获取和比较结果。
{"title":"Vision-Based Extrapolation of Road Lane Lines in Controlled Conditions","authors":"Stevan Stevic, Marko Dragojevic, Momcilo Krunic, N. Cetic","doi":"10.1109/ZINC50678.2020.9161779","DOIUrl":"https://doi.org/10.1109/ZINC50678.2020.9161779","url":null,"abstract":"Keeping vehicle in the right track while driving is common task for humans, as they perceive lane lines with ease. Naturally, one of the essential tasks for autonomous vehicle would be to detect lane lines. Except for using them as constant reference in steering controller, they are used as inputs in other driver assistance functions like lane departure warning, for example. Different road and weather conditions make it difficult to detect lane lines, as marking can become indistinct or disappear. Many simple vision-based algorithms rely on detection of edges of the markings with Canny edge detection and previously mentioned problems can affect proper extrapolation of lanes. This paper also belongs to vision-based group of algorithms that use camera. It presents usage of color thresholding to detect lane edges and together with perspective transformations and Hough transform to extrapolate lane segments in image with controlled conditions. These conditions include straight road and sunny weather. We used OpenCV computer vision framework that supports mentioned functionalities and algorithms, with Python, to obtain and compare results.","PeriodicalId":6731,"journal":{"name":"2020 Zooming Innovation in Consumer Technologies Conference (ZINC)","volume":"8 1","pages":"174-177"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90043330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Utility analysis and rating of energy storages in trolleybus power supply system 无轨电车供电系统储能的效用分析与评价
Pub Date : 2020-05-01 DOI: 10.1109/ZINC50678.2020.9161777
Mikoaj Bartłmiejczyk, L. Jarzebowicz
The article discusses two energy storage applications in power supply system of public electrified transport. The first application aims at reducing the peak power of the traction substation. The second application increases effectiveness of using solar power plant to cover partial power demand of traction supply system. These two applications were discussed and analyzed based on trolleybus supply system in Gdynia, where most measurements were recorded.
本文讨论了储能在公共电气化交通供电系统中的两种应用。第一个应用旨在降低牵引变电站的峰值功率。二是提高了利用太阳能电站满足牵引供电系统部分电力需求的有效性。以记录最多测量值的格丁尼亚无轨电车供电系统为例,对这两种应用进行了讨论和分析。
{"title":"Utility analysis and rating of energy storages in trolleybus power supply system","authors":"Mikoaj Bartłmiejczyk, L. Jarzebowicz","doi":"10.1109/ZINC50678.2020.9161777","DOIUrl":"https://doi.org/10.1109/ZINC50678.2020.9161777","url":null,"abstract":"The article discusses two energy storage applications in power supply system of public electrified transport. The first application aims at reducing the peak power of the traction substation. The second application increases effectiveness of using solar power plant to cover partial power demand of traction supply system. These two applications were discussed and analyzed based on trolleybus supply system in Gdynia, where most measurements were recorded.","PeriodicalId":6731,"journal":{"name":"2020 Zooming Innovation in Consumer Technologies Conference (ZINC)","volume":"134 1","pages":"237-241"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73295124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Side Channel Attack Resistance of the Elliptic Curve Point Multiplication using Gaussian Integers 高斯整数椭圆曲线点乘法的侧信道抗攻击
Pub Date : 2020-05-01 DOI: 10.1109/ZINC50678.2020.9161769
Malek Safieh, Johann-Philipp Thiers, J. Freudenberger
Elliptic curve cryptography is a cornerstone of embedded security. However, hardware implementations of the elliptic curve point multiplication are prone to side channel attacks. In this work, we present a new key expansion algorithm which improves the resistance against timing and simple power analysis attacks. Furthermore, we consider a new concept for calculating the point multiplication, where the points of the curve are represented as Gaussian integers. Gaussian integers are subset of the complex numbers, such that the real and imaginary parts are integers. Since Gaussian integer fields are isomorphic to prime fields, this concept is suitable for many elliptic curves. Representing the key by a Gaussian integer expansion is beneficial to reduce the computational complexity and the memory requirements of a secure hardware implementation.
椭圆曲线密码是嵌入式安全的基石。然而,椭圆曲线点乘法的硬件实现容易受到侧信道攻击。在这项工作中,我们提出了一种新的密钥扩展算法,提高了对时序和简单功率分析攻击的抵抗力。此外,我们考虑了计算点乘法的新概念,其中曲线的点表示为高斯整数。高斯整数是复数的子集,因此实部和虚部都是整数。由于高斯整数场与素场是同构的,所以这个概念适用于许多椭圆曲线。用高斯整数展开表示密钥有利于降低安全硬件实现的计算复杂度和内存需求。
{"title":"Side Channel Attack Resistance of the Elliptic Curve Point Multiplication using Gaussian Integers","authors":"Malek Safieh, Johann-Philipp Thiers, J. Freudenberger","doi":"10.1109/ZINC50678.2020.9161769","DOIUrl":"https://doi.org/10.1109/ZINC50678.2020.9161769","url":null,"abstract":"Elliptic curve cryptography is a cornerstone of embedded security. However, hardware implementations of the elliptic curve point multiplication are prone to side channel attacks. In this work, we present a new key expansion algorithm which improves the resistance against timing and simple power analysis attacks. Furthermore, we consider a new concept for calculating the point multiplication, where the points of the curve are represented as Gaussian integers. Gaussian integers are subset of the complex numbers, such that the real and imaginary parts are integers. Since Gaussian integer fields are isomorphic to prime fields, this concept is suitable for many elliptic curves. Representing the key by a Gaussian integer expansion is beneficial to reduce the computational complexity and the memory requirements of a secure hardware implementation.","PeriodicalId":6731,"journal":{"name":"2020 Zooming Innovation in Consumer Technologies Conference (ZINC)","volume":"109 1","pages":"231-236"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79592023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Automatic Privacy Preservation for User-based Data Sharing on Social Media 基于用户的社交媒体数据共享的自动隐私保护
Pub Date : 2020-05-01 DOI: 10.1109/ZINC50678.2020.9161804
Wenlin Han, Yugali Bafna
Social media networking has turned out to be an essential factor for people wherein from sharing relevant documents to exchanging messages; everything is taken place via these social media sites. However, on social media, when a new user joins the group, (s)he must not be given access to all the previous messages. Hence it is necessary to predict the relationship between the users. This primary aim is to predict the link by taking into consideration using three criteria, which includes classifying sentiments from text messages, recognizing faces from pictures and videos posted on social media to find the relationship between the users. Various algorithms and methods were studies for this purpose wherein neural networks can be used for predicting the relationship between the users.
社交媒体网络已经成为人们必不可少的因素,从分享相关文件到交换信息;一切都是通过这些社交媒体网站发生的。然而,在社交媒体上,当一个新用户加入群组时,他不能被授予访问所有以前的消息的权限。因此,有必要预测用户之间的关系。其主要目的是通过考虑三个标准来预测链接,这三个标准包括从短信中分类情感,从社交媒体上发布的图片和视频中识别人脸,以找到用户之间的关系。为此目的研究了各种算法和方法,其中神经网络可用于预测用户之间的关系。
{"title":"Automatic Privacy Preservation for User-based Data Sharing on Social Media","authors":"Wenlin Han, Yugali Bafna","doi":"10.1109/ZINC50678.2020.9161804","DOIUrl":"https://doi.org/10.1109/ZINC50678.2020.9161804","url":null,"abstract":"Social media networking has turned out to be an essential factor for people wherein from sharing relevant documents to exchanging messages; everything is taken place via these social media sites. However, on social media, when a new user joins the group, (s)he must not be given access to all the previous messages. Hence it is necessary to predict the relationship between the users. This primary aim is to predict the link by taking into consideration using three criteria, which includes classifying sentiments from text messages, recognizing faces from pictures and videos posted on social media to find the relationship between the users. Various algorithms and methods were studies for this purpose wherein neural networks can be used for predicting the relationship between the users.","PeriodicalId":6731,"journal":{"name":"2020 Zooming Innovation in Consumer Technologies Conference (ZINC)","volume":"336 1","pages":"227-230"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74981789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Elliptic Curve Cryptographic Coprocessor for Resource-Constrained Systems with Arithmetic over Solinas Primes and Arbitrary Prime Fields 具有索利纳素数和任意素数域算术的资源约束系统椭圆曲线密码协处理器
Pub Date : 2020-05-01 DOI: 10.1109/ZINC50678.2020.9161807
Johann-Philipp Thiers, Malek Safieh, J. Freudenberger
Many resource-constrained systems still rely on symmetric cryptography for verification and authentication. Asymmetric cryptographic systems provide higher security levels, but are very computational intensive. Hence, embedded systems can benefit from hardware assistance, i.e., coprocessors optimized for the required public key operations. In this work, we propose an elliptic curve cryptographic coprocessors design for resource-constrained systems. Many such coprocessor designs consider only special (Solinas) prime fields, which enable a low-complexity modulo arithmetic. Other implementations support arbitrary prime curves using the Montgomery reduction. These implementations typically require more time for the point multiplication. We present a coprocessor design that has low area requirements and enables a trade-off between performance and flexibility. The point multiplication can be performed either using a fast arithmetic based on Solinas primes or using a slower, but flexible Montgomery modular arithmetic.
许多资源受限的系统仍然依赖于对称加密进行验证和身份验证。非对称密码系统提供更高的安全级别,但计算量非常大。因此,嵌入式系统可以从硬件辅助中获益,即为所需的公钥操作优化的协处理器。在这项工作中,我们提出了一种资源受限系统的椭圆曲线密码协处理器设计。许多这样的协处理器设计只考虑特殊的(Solinas)素数域,从而实现低复杂度的模运算。其他实现使用Montgomery约简支持任意素数曲线。这些实现通常需要更多的时间进行点乘法运算。我们提出的协处理器设计具有低面积要求,并能够在性能和灵活性之间进行权衡。点乘法既可以使用基于Solinas素数的快速运算,也可以使用较慢但灵活的Montgomery模运算。
{"title":"An Elliptic Curve Cryptographic Coprocessor for Resource-Constrained Systems with Arithmetic over Solinas Primes and Arbitrary Prime Fields","authors":"Johann-Philipp Thiers, Malek Safieh, J. Freudenberger","doi":"10.1109/ZINC50678.2020.9161807","DOIUrl":"https://doi.org/10.1109/ZINC50678.2020.9161807","url":null,"abstract":"Many resource-constrained systems still rely on symmetric cryptography for verification and authentication. Asymmetric cryptographic systems provide higher security levels, but are very computational intensive. Hence, embedded systems can benefit from hardware assistance, i.e., coprocessors optimized for the required public key operations. In this work, we propose an elliptic curve cryptographic coprocessors design for resource-constrained systems. Many such coprocessor designs consider only special (Solinas) prime fields, which enable a low-complexity modulo arithmetic. Other implementations support arbitrary prime curves using the Montgomery reduction. These implementations typically require more time for the point multiplication. We present a coprocessor design that has low area requirements and enables a trade-off between performance and flexibility. The point multiplication can be performed either using a fast arithmetic based on Solinas primes or using a slower, but flexible Montgomery modular arithmetic.","PeriodicalId":6731,"journal":{"name":"2020 Zooming Innovation in Consumer Technologies Conference (ZINC)","volume":"16 1","pages":"313-318"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75888369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Band Reducing Based SVM Classification Method in Hyperspectral Image Processing 高光谱图像处理中基于减带的SVM分类方法
Pub Date : 2020-05-01 DOI: 10.1109/ZINC50678.2020.9161813
Orhan Yaman, Hasan Yetiş, M. Karakose
In this study, a method based on image processing and machine learning is proposed for classification in hyperspectral images. The proposed method is tested on Indian Pines and KSC (Kennedy Space Center) datasets. As a preprocessing step, normalization, median filter and mean filter were applied to all bands in the hyperspectral data set. After the pre-processing, new bands are obtained by averaging the 5, 25 and 125 bands in the dataset. The obtained bands are combined and features extracted. The multi-band dataset is transformed into a single-band feature matrix. Classification is made by adding class labels to the feature matrix. SVM (Support Vector Machines) Linear, SVM Quadratic and SVM Cubic methods are used for classification using MATLAB Classification Learner Toolbox. For all the two data sets, 99% accuracy was obtained with the SVM classification algorithm.
本文提出了一种基于图像处理和机器学习的高光谱图像分类方法。该方法在印第安松和肯尼迪航天中心的数据集上进行了测试。作为预处理步骤,对高光谱数据集的所有波段进行归一化、中值滤波和均值滤波。预处理后,对数据集中的5、25和125波段进行平均,得到新的波段。将得到的波段进行组合并提取特征。将多波段数据集转换为单波段特征矩阵。通过向特征矩阵中添加类标签来进行分类。在MATLAB分类学习工具箱中使用支持向量机线性、二次和三次方法进行分类。对于这两个数据集,SVM分类算法的准确率均达到99%。
{"title":"Band Reducing Based SVM Classification Method in Hyperspectral Image Processing","authors":"Orhan Yaman, Hasan Yetiş, M. Karakose","doi":"10.1109/ZINC50678.2020.9161813","DOIUrl":"https://doi.org/10.1109/ZINC50678.2020.9161813","url":null,"abstract":"In this study, a method based on image processing and machine learning is proposed for classification in hyperspectral images. The proposed method is tested on Indian Pines and KSC (Kennedy Space Center) datasets. As a preprocessing step, normalization, median filter and mean filter were applied to all bands in the hyperspectral data set. After the pre-processing, new bands are obtained by averaging the 5, 25 and 125 bands in the dataset. The obtained bands are combined and features extracted. The multi-band dataset is transformed into a single-band feature matrix. Classification is made by adding class labels to the feature matrix. SVM (Support Vector Machines) Linear, SVM Quadratic and SVM Cubic methods are used for classification using MATLAB Classification Learner Toolbox. For all the two data sets, 99% accuracy was obtained with the SVM classification algorithm.","PeriodicalId":6731,"journal":{"name":"2020 Zooming Innovation in Consumer Technologies Conference (ZINC)","volume":"11 1","pages":"21-25"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76436716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
On the Development of the Automatic Weed Detection Tool 杂草自动检测工具的研制
Pub Date : 2020-05-01 DOI: 10.1109/ZINC50678.2020.9161802
Hristo Skačev, A. Mićović, Bojan Gutić, Dusan Dotilic, Ana Vesić, Vuk Ignjatović, Sava Lakićević, M. Jakovljević, M. Zivkovic
The goal of this project is to digitalize, and improve the agriculture industry in our region, in the Republic of Serbia. Agriculture is largely involved in Serbia’s financial state, with the potential to be one of the main sources of revenue. Unfortunately, it lacks structure and innovation. Once we understood the significance and the importance it has on our economy, we decided to develop an application that would tackle these issues with specialized tools and services that we would provide to our user in an elegant and easy to use interface. The tool we created is used for weed detection, enabling farmers to easily locate and remove it. In this document are written the details of our current state of development and the plans we have for the future.
该项目的目标是实现塞尔维亚共和国本地区农业产业的数字化和改善。农业在很大程度上涉及塞尔维亚的财政状况,有可能成为主要的收入来源之一。不幸的是,它缺乏结构和创新。一旦我们理解了它对我们经济的意义和重要性,我们决定开发一个应用程序,用专门的工具和服务来解决这些问题,我们将以优雅和易于使用的界面提供给我们的用户。我们创建的工具用于杂草检测,使农民能够轻松定位和清除杂草。在这份文件中详细描述了我们目前的发展状况和我们对未来的计划。
{"title":"On the Development of the Automatic Weed Detection Tool","authors":"Hristo Skačev, A. Mićović, Bojan Gutić, Dusan Dotilic, Ana Vesić, Vuk Ignjatović, Sava Lakićević, M. Jakovljević, M. Zivkovic","doi":"10.1109/ZINC50678.2020.9161802","DOIUrl":"https://doi.org/10.1109/ZINC50678.2020.9161802","url":null,"abstract":"The goal of this project is to digitalize, and improve the agriculture industry in our region, in the Republic of Serbia. Agriculture is largely involved in Serbia’s financial state, with the potential to be one of the main sources of revenue. Unfortunately, it lacks structure and innovation. Once we understood the significance and the importance it has on our economy, we decided to develop an application that would tackle these issues with specialized tools and services that we would provide to our user in an elegant and easy to use interface. The tool we created is used for weed detection, enabling farmers to easily locate and remove it. In this document are written the details of our current state of development and the plans we have for the future.","PeriodicalId":6731,"journal":{"name":"2020 Zooming Innovation in Consumer Technologies Conference (ZINC)","volume":"26 1","pages":"123-126"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73941294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2020 Zooming Innovation in Consumer Technologies Conference (ZINC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1