{"title":"Trusted Authentication Scheme for Data Source Based on Short Group Signature","authors":"Zhu Jinhui, Liu Xin, Shen Peipei, Xin Xiaopeng, Chen Kai, Zheng Guiping","doi":"10.1109/ASSP54407.2021.00033","DOIUrl":"https://doi.org/10.1109/ASSP54407.2021.00033","url":null,"abstract":"With the rapid development of Internet application service related industries, the Internet of things, as an extension and expansion of Internet application services, has introduced new security risks in the process of various services. These security risks bring direct losses and broader potential threats to users and service providers of application services. This inevitable and substantial threat increasingly restricts the further promotion and development of the Internet of things, and trusted computing technology provides a new direction for the continuous development of the Internet of things. Therefore, the research on various application service modes and implementation processes related to the Internet of things has become the focus in the field of the Internet of things. The main content and work of this chapter is based on the existing signature technology and combined with the application background of the data transmission process in the Internet of things, to study and design a scheme for realizing the trusted authentication of the data source in the data transmission process of the Internet of things.","PeriodicalId":153782,"journal":{"name":"2021 2nd Asia Symposium on Signal Processing (ASSP)","volume":"6 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114034842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proceedings 2021 2nd Asia Symposium on Signal Processing ASSP 2021","authors":"","doi":"10.1109/assp54407.2021.00001","DOIUrl":"https://doi.org/10.1109/assp54407.2021.00001","url":null,"abstract":"","PeriodicalId":153782,"journal":{"name":"2021 2nd Asia Symposium on Signal Processing (ASSP)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116276465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Liang Yu, He Haibo, He Yi, Ouyang Jinlong, Lei Yuyang
{"title":"Optimization of Luminance Computational Model of HDRI by the Multi-linear Regression Method","authors":"Liang Yu, He Haibo, He Yi, Ouyang Jinlong, Lei Yuyang","doi":"10.1109/ASSP54407.2021.00011","DOIUrl":"https://doi.org/10.1109/ASSP54407.2021.00011","url":null,"abstract":"The luminance measurement based on the High Dynamic Range Image (HDRI) is currently the mainstream luminance test scheme, and the research on the related luminance computational model has also attracted great attention. The effectiveness of this technique mainly depends on the luminance computational model, which is established by linear regression method or HDRscope software method currently. However, both methods have shortcomings, such as complex experiments and low accuracy. In order to address these problems, we creatively proposed the use of multi-linear regression method to optimize the previous HDRI luminance computational model. The linear regression method, the HDRscope software method and the multi-linear regression method are systematically compared in theory and experiment, which proves the applicability and effectiveness of multi-linear regression method. Compared to the traditional linear regression method, it reduces the dependence on the test equipment, simplifies the test process, and can ensure the accuracy of the test results effectively; compared to the HDRscope software method, it improves the accuracy rate significantly. Therefore, the utilization of multi-linear regression method to construct and optimize the HDRI luminance computational model can not only ensure the accuracy of the test results, simplify the process, but also reduce the dependence on the colorimeter. In practical applications, this will be an effective and reliable strategy.","PeriodicalId":153782,"journal":{"name":"2021 2nd Asia Symposium on Signal Processing (ASSP)","volume":"58 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133020979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Construction of Trusted Group for Centralized IOT","authors":"Rui Xin, Liang Chen, Ning Lu, Xin Liu, Wei Liu, Guiping Zheng","doi":"10.1109/ASSP54407.2021.00027","DOIUrl":"https://doi.org/10.1109/ASSP54407.2021.00027","url":null,"abstract":"How to build trusted group is a key problem to be solved in the IOT environment. For centralized networking, this paper proposes a trusted group construction mechanism based on trusted measurement, analyzes the network characteristics of centralized networking, and gives a simple network topology. Adopt hierarchical management to Trusted measurement of the perceived nodes of the IOT. On this basis, build a trusted group, determine whether the trusted individuals join or not, periodically replace the domain management nodes, and detect and eliminate malicious nodes, so as to maintain the dynamic and trusted operation of the group. Simulation results show the credibility measurement results in this mechanism can well reflect the real state of the perceived nodes of the IOT, and can timely identify and eliminate malicious nodes, it also has a good performance in group energy consumption.","PeriodicalId":153782,"journal":{"name":"2021 2nd Asia Symposium on Signal Processing (ASSP)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124689945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PLC Ladder Diagram for a Sliding Mode Filtering Tracking Differentiator","authors":"Wande An, Shanhai Jin","doi":"10.1109/ASSP54407.2021.00016","DOIUrl":"https://doi.org/10.1109/ASSP54407.2021.00016","url":null,"abstract":"Tracking input signal by providing its derivatives is important in control applications. However, input signal usually contains undesirable noise that may lead to system failure. On the other hand, in industrial environment, Programmable Logic Controllers (PLC) are still main digital controllers. Different from computers and MCUs, PLC employs a program language called Ladder Diagram, which maps the control logics through graphical symbols and blocks. This paper presents a ladder diagram for implementing a sliding mode filtering tracking differentiator on PLC to track input signal by removing noise. Experimental results validate the effectiveness of the presented method.","PeriodicalId":153782,"journal":{"name":"2021 2nd Asia Symposium on Signal Processing (ASSP)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129789402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yipeng Li, Lizhe Liu, Yutao Liu, Lirong Mei, Jie Lin, Hongkun Wang, Jingsong Yang, Xiaoshen Yan
{"title":"Research on Integrated Communication and Positioning Technology of Ship Formation in Weak Navigation Environment","authors":"Yipeng Li, Lizhe Liu, Yutao Liu, Lirong Mei, Jie Lin, Hongkun Wang, Jingsong Yang, Xiaoshen Yan","doi":"10.1109/ASSP54407.2021.00032","DOIUrl":"https://doi.org/10.1109/ASSP54407.2021.00032","url":null,"abstract":"Nowadays, communication device and positioning device are generally equipped on sophisticated shipborne combat platforms. If they are installed separately, they will occupy more platform space and be overcrowded; moreover, they will also reduce stealth performance and electromagnetic compatibility of ships. To solve this problem, we propose an integrated communication and localization method based on digital phased array antenna, employ its simultaneous multiple beams ability to reduce the time of signal search and communication link establishment, and meanwhile we apply super resolution Direction of Arrival (DOA) estimation algorithm and two-way propagation delay to carry out direction finding and ranging precisely. This method we present in this paper can realize the integration of communication and localization, furthermore, it does not rely on satellite system, especially suitable for the situation of ships formation self-organizing communication network and mutual positioning under weak navigation even satellite rejection environment.","PeriodicalId":153782,"journal":{"name":"2021 2nd Asia Symposium on Signal Processing (ASSP)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127848524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development and Application Research of 5G Private Network Equipment For Ship Construction","authors":"Xinyu Liu, Dongyao Wang, Maopu Wu, Zhaosheng Dong","doi":"10.1109/ASSP54407.2021.00028","DOIUrl":"https://doi.org/10.1109/ASSP54407.2021.00028","url":null,"abstract":"At present, the networking rate of equipment and digitization level in the shipbuilding industry is generally lower than that in other industries. The 5G network provides a feasible solution to adapt to the complex manufacturing environment of the shipyard workshop. In order to ensure the reliability and real-time performance of the network at all times, a set of 5G independent private network equipment for the shipbuilding industry is developed, including private network terminal, base station and core network equipment. It is verified that the equipment can meet the requirements of high-performance network for shipbuilding in the laboratory environment. 5G integrated network scheme is designed to meet the needs of low-cost and high-performance network. At the same time, three typical 5G applications for ship construction are studied, including key equipment networking management, intermediate products status tracking and AR-aided ship block assembly based on 5G integrated network, which will improve the efficiency and quality of ship block construction.","PeriodicalId":153782,"journal":{"name":"2021 2nd Asia Symposium on Signal Processing (ASSP)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121721540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fault Detection and Diagnosis Based on the Machine Learning Method of Lifting Scheme Wavelet and PCA","authors":"Xiaojie Chao, Taoran Zhang, Longcan Chen","doi":"10.1109/ASSP54407.2021.00023","DOIUrl":"https://doi.org/10.1109/ASSP54407.2021.00023","url":null,"abstract":"In order to improve the wavelet threshold denosing effect and overcome the low efficiency and accuracy problem of conventional fault detection and diagnosis (FDD) methods, an novel approach based on threshold denosing function with double variable parameters and lifting scheme wavelet is proposed. Firstly, the proposed method is applied to denose the data of TE process. Then, the preprocessed data is classified by Principle Component Analysis (PCA) to detection and diagnose the faults. To certify the characteristic of the method, the proposed method is applied to detect and diagnose the faults in TE process, and compare with the soft and hard threshold methods which are used with lifting wavelet and PCA. Simulation results show that, the ensemble denosing method based on threshold denosing function with double variable parameters and lifting scheme wavelet is better than conventional denosing methods, meanwhile, the accuracy of fault detection and diagnosis with PCA is improved. These steps, which should require generation of the final output from the styled paper, are mentioned here in this paragraph. First, users have to run “Reference Numbering” from the “Reference Elements” menu; this is the first step to start the bibliography marking (it should be clicked while keeping the cursor at the beginning of the reference list). After the marking is complete, the reference element runs all the options under the “Cross Linking” menu.","PeriodicalId":153782,"journal":{"name":"2021 2nd Asia Symposium on Signal Processing (ASSP)","volume":"86 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131374774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yuanrong He, Ping Chen, Zhiying Xie, ShuHan Chen, Xiaohui Song
{"title":"Research on Information Extraction Technology of Wall Cracks in Historic Buildings","authors":"Yuanrong He, Ping Chen, Zhiying Xie, ShuHan Chen, Xiaohui Song","doi":"10.1109/ASSP54407.2021.00041","DOIUrl":"https://doi.org/10.1109/ASSP54407.2021.00041","url":null,"abstract":"The historical building has undergone thousands of years of vicissitudes and changes, and it is in an extremely fragile situation. Therefore, it is urgent to detect and repair the damage of the historical building. In this paper, three-dimensional laser scanning and digital image processing technology are combined to be used in non-contact and non-destructive measurement of cracks in historic building walls. Application results show that this research method can detect historical building crack information more efficiently and accurately. It not only realizes non-destructive measurement of historical building wall cracks, but also expands the application range of 3D laser point cloud data and innovates the protection of ancient buildings. The method is of great significance to the research on the automatic extraction of damage information of historical buildings.","PeriodicalId":153782,"journal":{"name":"2021 2nd Asia Symposium on Signal Processing (ASSP)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134265770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Security and Privacy Problem in the Data Life Cycle for the IoT Scenario","authors":"Shisong Yang, Yuwen Chen, Zhen Yang","doi":"10.1109/ASSP54407.2021.00021","DOIUrl":"https://doi.org/10.1109/ASSP54407.2021.00021","url":null,"abstract":"Sensors have been deployed into different scenarios to collect data, including health data, environmental data, etc. Data have been collected, transmitted, analyzed, etc. Those data are highly related to people's privacy, protecting data privacy becomes necessary. Different methods have been applied to protect data privacy during the life cycle in the Internet of Things scenarios. At the data collecting phase, data aggregation methods are proposed. At the data transmission phase, mutual authentication and key establishment schemes are proposed to help entities to build a secure two-way communication channel, data can be transmitted securely. At the data analyzing phase, privacy-preserving machine learning methods have been discussed, including collaboratively learning and other encrypted machine learning as a service technology, they can protect users' data privacy at the training phase and inference phase respectively. In this study, we mainly discussed these kinds of methods for protecting data security and privacy in the Internet of Things scenario.","PeriodicalId":153782,"journal":{"name":"2021 2nd Asia Symposium on Signal Processing (ASSP)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125583010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}