Guoyi Che, Yongchun Cao, Ao Zhu, Qiang Lin, Zhengxing Man, Haijun Wang
{"title":"Segmentation of bone metastases based on attention mechanism","authors":"Guoyi Che, Yongchun Cao, Ao Zhu, Qiang Lin, Zhengxing Man, Haijun Wang","doi":"10.1109/ICPECA51329.2021.9362531","DOIUrl":"https://doi.org/10.1109/ICPECA51329.2021.9362531","url":null,"abstract":"SPECT bone imaging is an important means to assist doctors in diagnosing diseases. The traditional processing method is that radiologists diagnose images. Manual diagnosis is not only cumbersome and time-consuming, but also different diagnosis results will be caused by the different diagnosis experience of doctors. In view of the above problems, this paper uses U-Net network as the basic model, and at the same time conducts model performance optimization research. Based on the U-Net network, the attention mechanism is integrated to segment the bone metastases in the pelvic area. Introducing the attention mechanism into the U-Net network can help improve the correlation of the pelvic region and reduce the interference caused by problems such as uneven brightness and low contrast to the model. Through multiple sets of experimental demonstrations, the U-Net network integrated with the attention mechanism can better segment bone metastases in the pelvic region based on SPECT images, and the model indicators have been significantly improved.","PeriodicalId":119798,"journal":{"name":"2021 IEEE International Conference on Power Electronics, Computer Applications (ICPECA)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126199879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Frequent Itemsets Mining Algorithm for Uncertain Data Streams Based on Triangular Matrix","authors":"Yang Junrui, Yang Jingyi","doi":"10.1109/ICPECA51329.2021.9362705","DOIUrl":"https://doi.org/10.1109/ICPECA51329.2021.9362705","url":null,"abstract":"Aiming at the problem of frequent itemsets mining in uncertain data flows, this paper proposes a botm-mine for frequent itemsets mining in uncertain data flows. In this algorithm, trigonometric matrix, queue and frequent item set tree are used to construct the profile structure to store the relevant data flow information of transactions. The support degree of items $1_{-}$ and $2_{-}$ itemsets is efficiently stored in the matrix through matrix. Compared with the transaction matrix, it not only saves space, but also reduces the complexity of computing each support degree, and at the same time has better space-time efficiency.","PeriodicalId":119798,"journal":{"name":"2021 IEEE International Conference on Power Electronics, Computer Applications (ICPECA)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128171116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Application of EPA Bus Technology in Embedded System","authors":"C. Cui, Ying Jiang, Lei Yuan, Shudi Guo","doi":"10.1109/ICPECA51329.2021.9362677","DOIUrl":"https://doi.org/10.1109/ICPECA51329.2021.9362677","url":null,"abstract":"Aiming at the problems of low data throughput, poor information security, difficulty in compatibility of heterogeneous networks, and inability to be fully autonomous and controllable of 1553B/CAN bus, which are widely used in current embedded systems. Based on China’s industrial control bus EPA, which has completely independent intellectual property rights, a full EPA-based “one network to the end” electrical system data transmission program is proposed. It broke through the key technologies of multi-network cascade, multiple redundancy, and dynamic topology changes faced by EPA applied to embedded systems, and built an integrated embedded system bus simulation test platform. The test results show that the EPA bus network can meet the requirements of the embedded system, can significantly improve the transmission performance, real-time performance, reliability and safety of the embedded system, and is completely autonomous and controllable, which is helpful to the improvement of the embedded system.","PeriodicalId":119798,"journal":{"name":"2021 IEEE International Conference on Power Electronics, Computer Applications (ICPECA)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123486976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An improved YOLOv3 method for PCB surface defect detection","authors":"Zhuo Lan, Yang Hong, Yuan Li","doi":"10.1109/ICPECA51329.2021.9362675","DOIUrl":"https://doi.org/10.1109/ICPECA51329.2021.9362675","url":null,"abstract":"In view of the low detection efficiency and high missed detection rate in the current printed circuit board (PCB), this paper proposes an improved YOLOv3 PCB surface defect detection method. This method is based on the YOLOv3 network model. The improvement of its network structure mainly includes: 1. Combine the batch normalization (BN, Batch Normalization) layer to the convolutional layer, improve the forward reasoning speed of the model, and reduce the model’s PCB defects the training time of the dataset. 2. Aiming at the problem that the objective function and evaluation metric are not uniform in the YOLOv3 object detection algorithm, the GIoU performance metric and loss function are used to improve the detection effect of the model on small and medium targets of PCB defects. 3. Use the K-means++ clustering algorithm to optimize the K-means clustering algorithm, and determine the appropriate anchor boxes for the PCB defect dataset. 4. Multiscale training is used to enhance the robustness of the model for image detection with different resolutions. The experimental results show that mAP (Mean Average Precision) reaches 92.13%, and the detection rate is increased to 63f/s, which is improved compared to the YOLOv3 model, and has a better application prospect in PCB surface defect detection.","PeriodicalId":119798,"journal":{"name":"2021 IEEE International Conference on Power Electronics, Computer Applications (ICPECA)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121949962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ontology Modeling of Army Equipment Maintenance Support Business Process under the New System Base on IDEF5/Owl","authors":"Liming Li, Ping Gu, Wei Wang","doi":"10.1109/ICPECA51329.2021.9362563","DOIUrl":"https://doi.org/10.1109/ICPECA51329.2021.9362563","url":null,"abstract":"IDEF5, as a semantic information modeling method, plays an important role in solving the problem of knowledge sharing and reuse. Aiming at the characteristics of the army equipment maintenance support business process under the new system, the IDEF5 graphical ontology development method and OWL semantic description language were used to establish the army equipment maintenance support business process ontology under the new system. This study provides a new idea and method for the establishment of the military conceptual model of the army equipment maintenance support business process under the new system, and has theoretical significance and application value for improving the semantic consistency of the military conceptual model of the army equipment maintenance support business process under the new system and the degree of development automation.","PeriodicalId":119798,"journal":{"name":"2021 IEEE International Conference on Power Electronics, Computer Applications (ICPECA)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121988550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiaolong Li, Tengteng Zhao, Wei Zhang, Zhiqiang Gan, Fu-Sheng Liu
{"title":"A visual analysis framework of attack paths based on network traffic","authors":"Xiaolong Li, Tengteng Zhao, Wei Zhang, Zhiqiang Gan, Fu-Sheng Liu","doi":"10.1109/ICPECA51329.2021.9362725","DOIUrl":"https://doi.org/10.1109/ICPECA51329.2021.9362725","url":null,"abstract":"With the rapid development of the Internet, cyberspace security has become a potentially huge problem. At the same time, the disclosure of cyberspace vulnerabilities is getting faster and faster. Traditional protection methods based on known features cannot effectively defend against new network attacks. Network attack is no more a single vulnerability exploit, but an APT attack based on multiple complicated methods. Cyberspace attacks have become “rationalized” on the surface. Currently, there are a lot of researches about visualization of attack paths, but there is no an overall plan to reproduce the attack path. Most researches focus on the detection and characterization individual based on single behavior cyberspace attacks, which loose it’s abilities to help security personnel understand the complete attack behavior of attackers. The key factors of this paper is to collect the attackers’ aggressive behavior by reverse retrospective method based on the actual shooting range environment. By finding attack nodes and dividing offensive behavior into time series, we can characterize the attacker’s behavior path vividly and comprehensively.","PeriodicalId":119798,"journal":{"name":"2021 IEEE International Conference on Power Electronics, Computer Applications (ICPECA)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128203287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Compact Microstrip Antenna Based on Minkowski-Like Sided Fractal","authors":"Feng Qin, Jiuhuai Lei, Baoping Ren","doi":"10.1109/ICPECA51329.2021.9362721","DOIUrl":"https://doi.org/10.1109/ICPECA51329.2021.9362721","url":null,"abstract":"In this paper, a compact microstrip patch antenna with Minkowski-like sided fractal structure is presented. It is fed by a microstrip feed line and a λ/4 impedance converter is introduced to provide smooth transitional impedance for improved impedance matching. The design process and performance of the fractal antennas with different iterations are given and analyzed in detail. Finally, for demonstration purpose, the second iteration version of the Minkowski-like sided fractal antenna is fabricated and tested. Measurements are in good agreement with the simulations. Measurements show that the resonant frequency is 2.14GHz with the return loss of -24dB. The proposed 2nd iteration fractal antenna provides an area reduction of 43.7% as compared with the square patch antenna with the same resonant frequency. Meanwhile, it does not degrade the performance of the antenna.","PeriodicalId":119798,"journal":{"name":"2021 IEEE International Conference on Power Electronics, Computer Applications (ICPECA)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129942182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application research of unmanned ship route dynamic planning based on meteorological big data","authors":"Yijing Zhang, Yuliang Shi","doi":"10.1109/ICPECA51329.2021.9362697","DOIUrl":"https://doi.org/10.1109/ICPECA51329.2021.9362697","url":null,"abstract":"In order to realize that unmanned cargo ship can move forward according to the optimal route and reduce the risk in the harsh environment of wind and wave, a D* algorithm for dynamic route planning based on A* static route planning is proposed. Firstly, spark big data processing platform is built. The big data platform is used to preprocess data, extract effective features and build weather forecast models. In the construction of weather forecast model, the commonly used forecasting models are used to predict and optimize the optimal model parameters. Select the F1 value of each model for comparison, and then select the model with the highest F1 value in each period as the prediction model of the period according to the characteristics of weather data. Finally, the results of multiple models are summarized to form the final weather forecast data set. Then, according to the starting point and terminal point, combined with D* dynamic programming algorithm, a safe and shortest route is planned when the threat changes constantly.","PeriodicalId":119798,"journal":{"name":"2021 IEEE International Conference on Power Electronics, Computer Applications (ICPECA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131041609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"User Fast Authentication Method Based on Microservices","authors":"Jiangbing Yang, Haibo Hou, Hui Li, Qiurong Zhu","doi":"10.1109/ICPECA51329.2021.9362656","DOIUrl":"https://doi.org/10.1109/ICPECA51329.2021.9362656","url":null,"abstract":"Aiming to the characteristics and requirements of high concurrent user authentication request and high demand of real-time system response in the microservices, this paper proposes a kind of user fast authentication method based on microservices, which is a storage model applying binary system to mark abnormal user status. Combining with present system architecture, this method rebuilds the system authentication process of microservices and solves the technical difficulties of frequent user authentication and high demand of server performance during the using of microservices architecture. The authors first analyze and state the authentication bottleneck and security issues that the system faces after the emergence of microservices from the basic situation of user authentication; second, come up with a general authentication process on the basis of microservices system, and design a system authentication model; then, design system simulation test method, analyze and compare the simulation test results; in the end, verify the feasibility of the method proposed in this paper based on test results and analyze the value and significance of the existence of this system.","PeriodicalId":119798,"journal":{"name":"2021 IEEE International Conference on Power Electronics, Computer Applications (ICPECA)","volume":"333 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134483793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Acoustic Signal Compression Research Based on Wavelet and Compressed Sensing","authors":"Tian Gao, Liwei Jiang, Xingshun Wang, Liyuan Qiu","doi":"10.1109/ICPECA51329.2021.9362686","DOIUrl":"https://doi.org/10.1109/ICPECA51329.2021.9362686","url":null,"abstract":"Due to the ocean observation and detection requirements, as well as the construction of ocean defense system engineering, collecting and transmitting a large number of acoustic signals are prerequisite for subsequent processing and analysis. Massive detection data bring a big challenge for transmission lines and underwater processors. The detection acoustic signals can be compressed for storage and reconstructed for processing. In this paper, data compression methods are proposed based on wavelet transform and compressed sensing, the two algorithms are applied and compared for acoustic signal compression. The empirical mode decomposition algorithm is applied for pro-processing. Multilayer wavelet compression is used for getting a compressed acoustic signals. Gradient projection is used for sparse reconstruction. The experimental results show that both methods can perform well in acoustic signal compression, retain the main characteristics of the original acoustic signal, and greatly reduce signals to be transmitted and processed. Wavelet compression is faster in calculation. Compressed sensing is able to achieve a higher compression ratio.","PeriodicalId":119798,"journal":{"name":"2021 IEEE International Conference on Power Electronics, Computer Applications (ICPECA)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133478861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}