2023 5th International Conference on Communications, Information System and Computer Engineering (CISCE)最新文献

筛选
英文 中文
Inerrant-Bits Consumption for Over-the-Air Computation-based Multi-tier Computing 基于无线计算的多层计算的无误比特消耗
Junjie Wan, Fan Zhang, Kunlun Wang
{"title":"Inerrant-Bits Consumption for Over-the-Air Computation-based Multi-tier Computing","authors":"Junjie Wan, Fan Zhang, Kunlun Wang","doi":"10.1109/CISCE58541.2023.10142476","DOIUrl":"https://doi.org/10.1109/CISCE58541.2023.10142476","url":null,"abstract":"In this paper, we propose an novel performance metric inerrant-bits consumption (IBC) in an Over-the-Air computation (AirComp) based multi-tier computing system to evaluate the computation efficiency, which is based on the total task computation and communication energy consumptions. Then we solve an optimal transmit power design problem to minimize the IBC of an AirComp system under the peak power constraint of sensors. To address the non-convexity of the optimization problem, an efficient optimization algorithm is developed to obtain a closed-form solution. Given the power allocation result, we obtain the task offloading result. By comparing our optimal power transmission policy with two benchmark policies in simulation, we show that our proposed scheme outperforms the baseline schemes with different SNR and the sensor number setups.","PeriodicalId":145263,"journal":{"name":"2023 5th International Conference on Communications, Information System and Computer Engineering (CISCE)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132436414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Analysis and Improvement of Railway Vehicle-to-ground Authentication and Key Negotiation Protocol 铁道车辆对地认证与密钥协商协议的安全性分析与改进
Teng Long, Yuanyi Dong
{"title":"Security Analysis and Improvement of Railway Vehicle-to-ground Authentication and Key Negotiation Protocol","authors":"Teng Long, Yuanyi Dong","doi":"10.1109/CISCE58541.2023.10142684","DOIUrl":"https://doi.org/10.1109/CISCE58541.2023.10142684","url":null,"abstract":"Authentication and key negotiation are the basis for safe railway operation. In response to the security risks of the LTE-R authentication process for next-generation railway wireless communication systems, improvements are made in the framework of the EPS-AKA protocol to generate anonymous identities that will be updated after each authentication, with a timestamp added while the protocol is being executed. The key negotiation phase enables the update of the long-term shared key, eliminating the risk of long-term shared key K leakage. The improved protocol not only achieves IMSI confidentiality protection and resists replay attacks, but also provides forward security. Security and performance analyses show that the improved protocol outperforms existing schemes in terms of computational cost and can meet the requirements for secure and efficient vehicle-to-ground authentication.","PeriodicalId":145263,"journal":{"name":"2023 5th International Conference on Communications, Information System and Computer Engineering (CISCE)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115864163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A study of digital twin-based digital derivation mechanisms for manufacturing companies 基于数字孪生的制造企业数字衍生机制研究
Feng Wang, Cao Zhe, Mingwei Sun
{"title":"A study of digital twin-based digital derivation mechanisms for manufacturing companies","authors":"Feng Wang, Cao Zhe, Mingwei Sun","doi":"10.1109/CISCE58541.2023.10142669","DOIUrl":"https://doi.org/10.1109/CISCE58541.2023.10142669","url":null,"abstract":"This paper starts from the endogenous causes of value creation of the digital twin of manufacturing enterprises and breaks down the composition and functions of the digital twin. Through the process linkage and collaboration of the digital twin, the 4.0 value chain architecture of manufacturing enterprises is dissected. On this basis, the endogenous driving mechanism of the supply chain and industrial chain derived from the 4.0 value chain of manufacturing enterprises is analysed using manufacturing big data, and the framework of the enterprise digital endogenous integration tower 3D process of manufacturing enterprises is proposed, and the nature and derivation mechanism of the supply chain of manufacturing enterprises based on the 4.0 value chain drive is analysed to systematise the formation mechanism and framing mode of the digital twin. The manufacturing enterprise industrial chain is the main body of the digital economy development and the fundamental research paradigm of the new theory of the newly created digital era, whose breakthrough and transformation is the basis for the future matching and optimisation of industrial core elements with industrial digital organisation and technological innovation resources. This is a newly innovative exploration of the digital knowledge system of manufacturing enterprises, which will have a profound impact on the construction of a digital enterprise industry chain with full perception, full connectivity, full scenario and full intelligence, boosting the development of the digital economy and building a new paradigm system of macro and micro interdisciplinary theories.","PeriodicalId":145263,"journal":{"name":"2023 5th International Conference on Communications, Information System and Computer Engineering (CISCE)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131949360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unstructured Road Slope Recognition Based on Improved RANSAC Algorithm 基于改进RANSAC算法的非结构化道路坡度识别
Liang Hong, Lijin Han, Hui Liu
{"title":"Unstructured Road Slope Recognition Based on Improved RANSAC Algorithm","authors":"Liang Hong, Lijin Han, Hui Liu","doi":"10.1109/CISCE58541.2023.10142624","DOIUrl":"https://doi.org/10.1109/CISCE58541.2023.10142624","url":null,"abstract":"Unstructured road scenes usually have bumpy and undulating features, and there are often obstacles such as potholes and stones on the ground. At the same time, the lidar point cloud with low beams is relatively sparse, which easily affects the accuracy of slope detection results. In response to these problems, this paper proposes a real-time detection method for unstructured road slope based on the improved RANSAC algorithm. Use inertial navigation to obtain vehicle motion information, fuse historical frame point clouds to enrich the point cloud density, then perform multi-scale rasterization on the point cloud, and then use the improved RANSAC algorithm to fit the point cloud, and finally get the slope of the road. Experimental results verify that the algorithm can improve detection accuracy, real-time performance, and effectiveness.","PeriodicalId":145263,"journal":{"name":"2023 5th International Conference on Communications, Information System and Computer Engineering (CISCE)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114649014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Bridge Vibration Extraction Based on Parameters Optimization Variational Modal Decomposition 基于参数优化变分模态分解的桥梁振动提取分析
Yu Xia, Shouhua Wang, Xiyan Sun
{"title":"Analysis of Bridge Vibration Extraction Based on Parameters Optimization Variational Modal Decomposition","authors":"Yu Xia, Shouhua Wang, Xiyan Sun","doi":"10.1109/CISCE58541.2023.10142439","DOIUrl":"https://doi.org/10.1109/CISCE58541.2023.10142439","url":null,"abstract":"The bridge vibration data collected by accelerometer contains the event and intensity of the bridge vibration as well as the information of the inherent frequency of the bridge, and the problem of feature extraction of the vibration signal is a prerequisite for the safety monitoring of the bridge. For the problem that the number of modal decompositions and penalty term coefficients affect the extraction of vibration features in the variational modal decomposition, a multi-objective optimization method is proposed, and the optimized algorithm is combined with HHT to extract vibration features. Firstly, the mean envelope entropy and center frequency are used to establish the objective function, determine the number of modal decompositions and penalty coefficients, then the vibration data are processed using the optimized variational modal decomposition method to obtain several individual components, and finally, the vibration event time-frequency map is obtained using HHT. Variational Modal Decomposition (VMD) can accurately extract each component of the simulated signal and outperforms the Empirical Modal Decomposition (EMD) algorithm in terms of anti-mode aliasing. In the vibration information processing of the bridge, the acceleration data processed by VMD-HHT can obtain the individual vibration event time-frequency information, and the bridge vibration frequencies identified by using VMD-HHT differ from the third-order intrinsic frequencies of the bridge by 0.022 Hz, 0.091 Hz, and 0.231 Hz, respectively, indicating that this method has certain reliability.","PeriodicalId":145263,"journal":{"name":"2023 5th International Conference on Communications, Information System and Computer Engineering (CISCE)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125088401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Named Entity Recognition in Judicial Field Based on ERNIE-Gram 基于ERNIE-Gram的司法领域命名实体识别研究
Juan Wang, Bitao Peng, Jing Tang
{"title":"Research on Named Entity Recognition in Judicial Field Based on ERNIE-Gram","authors":"Juan Wang, Bitao Peng, Jing Tang","doi":"10.1109/CISCE58541.2023.10142258","DOIUrl":"https://doi.org/10.1109/CISCE58541.2023.10142258","url":null,"abstract":"Named Entity Recognition is a key and fundamental task in natural language processing and can benefit many downstream tasks such as knowledge graph construction, question answering system, machine reading, etc. In view of the contradiction between the rapidly increasing of judgement documents and the low efficiency of manual analysis in the judicial field, we propose a NER model by using a combination of ERNIE-Gram, BiGRU, and CRF. ERNIE-Gram adopts multi-granularity n-gram language learning mechanism to learn the semantic of n-grams more adequately. Thus, we first employ the ERNIE-Gram to capture rich language representation, then we feed them into the BiGRU to obtain more important text features, finally, we use the CRF to decode and output optimal labeling sequence. We conduct experiments on an open dataset of the 2021 “Challenge of AI in Law” information extraction subtask and compare our model with currently familiar models for NER task. Experimental results demonstrate that our proposed model achieves a F1-score of 87.01%, and outperforms all the baseline models.","PeriodicalId":145263,"journal":{"name":"2023 5th International Conference on Communications, Information System and Computer Engineering (CISCE)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117083780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Continuous epoch distance integration for unsupervised person re-identification 无监督人再识别的连续历元距离积分
Lei Yang
{"title":"Continuous epoch distance integration for unsupervised person re-identification","authors":"Lei Yang","doi":"10.1109/CISCE58541.2023.10142496","DOIUrl":"https://doi.org/10.1109/CISCE58541.2023.10142496","url":null,"abstract":"Unsupervised person re-identification aims to learn discriminative feature representations for person retrieval from unlabeled datasets. Clustering-based methods achieve state-of-the-art performance in this research direction. However, the noisy pseudo-labels generated during the clustering process and the interference caused by background noise limit the performance of the model. To this end, this paper proposes continuous epoch distance integration for unsupervised person re-identification, which performs clustering by integrating the distance matrix between two consecutive epochs to generate reliable pseudo-labels. In addition, the attention module of spatial structure and channel dimension is also proposed, so that the model pays more attention to the person itself and eliminates the interference of the background. The effectiveness of this method is verified on Market-1501, DukeMTMC-ReID, and MSMT17. The experimental results show that this method is superior to the current mainstream unsupervised person re-identification method.","PeriodicalId":145263,"journal":{"name":"2023 5th International Conference on Communications, Information System and Computer Engineering (CISCE)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115857999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Fragile Zero-watermarking Algorithm Based on Quaternion and LBP under the Background of Blockchain 区块链背景下基于四元数和LBP的脆弱零水印算法
Feng Liu
{"title":"A Novel Fragile Zero-watermarking Algorithm Based on Quaternion and LBP under the Background of Blockchain","authors":"Feng Liu","doi":"10.1109/CISCE58541.2023.10142515","DOIUrl":"https://doi.org/10.1109/CISCE58541.2023.10142515","url":null,"abstract":"After the emergence of blockchain technology, although the problem of copyright protection on the chain has been solved, the problem of cross-chain prosecution and confirmation protection has not been solved.Zero watermarking is a technique that achieves copyright protection without any modification to the carrier image. This paper proposes a fragile zero-watermarking algorithm based on quaternion and LBP.In this way, the joint blockchain and fragile zero-watermark technology can solve the problem of cross-chain prosecution and confirmation protection.","PeriodicalId":145263,"journal":{"name":"2023 5th International Conference on Communications, Information System and Computer Engineering (CISCE)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115462255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of Miniaturized Multiband Substrate Integrated Waveguide Filters 小型化多波段基板集成波导滤波器的设计
Qiaochu Li
{"title":"Design of Miniaturized Multiband Substrate Integrated Waveguide Filters","authors":"Qiaochu Li","doi":"10.1109/CISCE58541.2023.10142576","DOIUrl":"https://doi.org/10.1109/CISCE58541.2023.10142576","url":null,"abstract":"Multi-band filters are crucial for enabling the transmission of multiple signals simultaneously in modern communication systems. However, there is a lack of multi-band filters with small size, easy integration and superior filtering performance, so in this paper, we propose a design method for multi-band substrate integrated waveguide filters that overcomes these challenges. Combining the design methods of single-band and dual-band filters with substrate integrated waveguide resonators can increase the number of passbands without increasing the physical size of the filter. In theory, bandpass filters with arbitrary passbands can be designed in a specified order. As an example, the corresponding dual-band filter and triple-band filter are designed for verification in this paper. The simulation results show that the filter exhibits sharp out-of-band rejection, a compact structure, and a return loss less than -20dB, indicating excellent filtering characteristics, but the required physical size is the same as that of a single-band filter. The measurement results coincide with the simulation results, indicating the feasibility of the proposed method.","PeriodicalId":145263,"journal":{"name":"2023 5th International Conference on Communications, Information System and Computer Engineering (CISCE)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128260433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Visual Detection Method of Laser Welding Seam 激光焊缝视觉检测方法研究
Binyu Wang, Wusheng Chou
{"title":"Research on Visual Detection Method of Laser Welding Seam","authors":"Binyu Wang, Wusheng Chou","doi":"10.1109/CISCE58541.2023.10142667","DOIUrl":"https://doi.org/10.1109/CISCE58541.2023.10142667","url":null,"abstract":"Weld defects produced by welding will destroy the quality of products. The visual detection method of weld seam using artificial neural network has been applied in industry, but few researchers have established a method to measure the shape of weld seam. In this paper, a feasible scheme based on image processing and artificial neural network is proposed, which not only detects the location of weld defects, but also measures the geometric dimensions of welds. The effectiveness of the method was verified by testing on the self-built dataset and the average accuracy of the size measurement reached 95.9%.","PeriodicalId":145263,"journal":{"name":"2023 5th International Conference on Communications, Information System and Computer Engineering (CISCE)","volume":" 18","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113950170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信