{"title":"Research on binocular stereo matching algorithm based on dynamic tilt window","authors":"Chengjun Yu, Yi Li","doi":"10.1117/12.2682455","DOIUrl":"https://doi.org/10.1117/12.2682455","url":null,"abstract":"Aiming at the low precision of the traditional binocular stereo matching algorithm in calculating the matching cost of the strong texture area, a binocular stereo matching algorithm based on a dynamic tilted window is proposed. First, the absolute value of brightness or color difference is replaced by random initialization of pixels, and then the traditional Census cross-domain transformation is replaced by a dynamically tilted disparity plane. For the traditional algorithm, the matching accuracy is improved, making the window more adaptable to the actual environment. In the cost calculation step, a gray histogram is added as an indicator for judging the texture difference, which improves the matching cost in the strong texture area; on this basis, iterates from space propagation, plane propagation to view propagation. In the parallax optimization step, left-right consistency detection and parallax filling are used to further optimize the reduction of the false matching rate. The experimental data is compared with the standard images on the Middlebury dataset. The results show that the average error matching rate of the disparity map generated by the stereo matching algorithm of the dynamic tilted window of this method reaches 4.03%. Compared with the Census algorithm, the matching error rate is respectively reduced. 21.1%, effectively improving the matching accuracy; compared with other algorithms, the false matching rate for high texture areas increased by 1.2% and 3.71%.","PeriodicalId":177416,"journal":{"name":"Conference on Electronic Information Engineering and Data Processing","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124393423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A blockchain-based intelligent transportation devices and data management method","authors":"Jun Li, Guangjun Gong","doi":"10.1117/12.2682393","DOIUrl":"https://doi.org/10.1117/12.2682393","url":null,"abstract":"The existing intelligent transportation system for device management and control may have some challenges, such as simplistic traffic device management, difficult traffic data storage and management, and difficult to guarantee traffic data security. These challenges all bring adverse effects to the smooth development of the work of the traffic department. To address the above problems, this paper designs a blockchain-based intelligent transportation device and data management method. The information of the devices connected to the system is anchored to the blockchain through the blockchain deposition technology, and the whole life cycle of the devices is managed. The data collection and distributed storage of the traffic devices are realized based on the smart contract technology. Combined with the tamper-evident and traceable characteristics of blockchain, this method provides scientific management of device and device data with high security and scalability, and provides ideas and methods for building a security management architecture for transportation device control system.","PeriodicalId":177416,"journal":{"name":"Conference on Electronic Information Engineering and Data Processing","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114843613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Underwater image enhancement based on residual network and image formation model","authors":"Xiaohu Feng, Anjun Song","doi":"10.1117/12.2682384","DOIUrl":"https://doi.org/10.1117/12.2682384","url":null,"abstract":"Our paper presents a new deep learning-based algorithm for improving the visual quality of images captured by underwater robots. The algorithm is designed to address the common issues of color distortion, low contrast, and lack of detail that often plague underwater images. By leveraging an image formation model, the proposed method is able to eliminate the effects of underwater environmental factors and enhance the color, detail, and overall visual appeal of the images. The performance of the proposed method is evaluated using objective metrics such as PSNR and SSIM, and the results demonstrate its effectiveness in improving the visual quality of underwater images. In addition, the proposed method is found to be computationally efficient, making it well-suited for use in real-time application. The proposed method has the potential to significantly improve the visual quality of underwater images and open up new opportunities for underwater exploration and conservation.","PeriodicalId":177416,"journal":{"name":"Conference on Electronic Information Engineering and Data Processing","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115044560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A text sentiment multi-classification method based on dual graph convolutional network","authors":"Ling Gan, Zuojie Chen","doi":"10.1117/12.2682317","DOIUrl":"https://doi.org/10.1117/12.2682317","url":null,"abstract":"At present, text sentiment multi-classification model has problems of insufficient semantic feature fusion and ignore the syntactic structure of sentences. Therefore, this paper proposes a dual graph convolutional network model, which extract semantic and syntactic information of text by semantic graph convolutional network and syntactic graph convolutional network. Also, this paper proposes a label graph embedding method to fuse richer semantic features. Finally, experiments on two public datasets show that our method achieves better results.","PeriodicalId":177416,"journal":{"name":"Conference on Electronic Information Engineering and Data Processing","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124758806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"VRDF: a network slicing algorithm based on VRF and VDF","authors":"Jian Wang, Jinhong Cai","doi":"10.1117/12.2682357","DOIUrl":"https://doi.org/10.1117/12.2682357","url":null,"abstract":"Blockchain technology solves the trust problem in the Internet, but there are limitations in the scalability of blockchain systems compared to traditional centralized servers, which restricts its development in practical applications. The sharding technology is a solution in the field of traditional database, which can solve the problem of limited database performance. Applying the sharding technology to blockchain system can make the blockchain system process transactions in parallel and thus improve its scalability. Therefore, studying the slicing algorithm can greatly improve the scalability of blockchain systems and promote the development and application of blockchain technology. In this paper, a random, fair, secure and stable network slicing method based on Verifiable Delay Function (VDF) and Verifiable Random Function (VRF) is proposed. Experiments show that compared with several typical blockchain system slicing algorithms, the slicing algorithm proposed in this paper has different degrees of improvement in security, throughput and storage.","PeriodicalId":177416,"journal":{"name":"Conference on Electronic Information Engineering and Data Processing","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129988547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research and optimization of RFID tag anti-collision algorithm","authors":"Miao Bai, Zhiying Yang","doi":"10.1117/12.2682439","DOIUrl":"https://doi.org/10.1117/12.2682439","url":null,"abstract":"In order to reduce the total identification time of readers and improve the system throughput in Radio Frequency Identification (RFID) systems, a new algorithm is proposed. Based on the Frame-Slotted ALOHA (FSA) algorithm, Tags are grouped according to the number of time slots during the reader's recognition process. For tags in collision time slots after a frame ends, the Collision Tree (CT) algorithm is used for group recognition, solving the starvation problem of the FSA algorithm and significantly reducing the total identification time of the reader. Simulation experiments have demonstrated that the algorithm proposed by the author significantly reduces the processing time when compared to the CT algorithm. and achieves a throughput rate that is higher than the traditional CT algorithm When the number of tags exceeds 260, reaching a maximum of 52% when the number of tags is around 400.","PeriodicalId":177416,"journal":{"name":"Conference on Electronic Information Engineering and Data Processing","volume":"12700 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130167611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using a region-restrictive erasing method for one-stage weakly-supervised semantic segmentation","authors":"Yi Li","doi":"10.1117/12.2682352","DOIUrl":"https://doi.org/10.1117/12.2682352","url":null,"abstract":"Image segmentation is a classical and basic problem in the domain of computer vision. Due to the fact that fully supervision segmentation methods require dense time-consuming and expensive manual-annotations, lots of WSSS (Weakly-Supervised Semantic Segmentation) methods have been proposed to take advantage of the simplicity and availability of weak supervision annotations. In this work, we build an integrated framework to jointly train the classification task and the segmentation task guided by a self-supervised thinking with only image-level supervision and a compound refinement strategy. Then, we introduce a restrictive adversarial erasing approach to push our model to find more segmentation cues. We evaluate the proposed method on PASCAL VOC 2012 benchmark, and the experiments show that our method can achieve competitive performance compared with the earlier methods.","PeriodicalId":177416,"journal":{"name":"Conference on Electronic Information Engineering and Data Processing","volume":"214 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122377010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jianzhou You, Bozhong Liu, Yang Wang, Laiyoumei Jiang
{"title":"Tracking the prevalence of compromised passwords using long-term honeypot data","authors":"Jianzhou You, Bozhong Liu, Yang Wang, Laiyoumei Jiang","doi":"10.1117/12.2682267","DOIUrl":"https://doi.org/10.1117/12.2682267","url":null,"abstract":"Passwords are critical issues in the world of cyber security. Unfortunately, despite best efforts, passwords continue to be compromised and leaked onto the Internet, leading to an alarming number of compromised passwords in circulation. In this study, we compare honeypot-captured data from 2021 and 2023 to measure the prevalence of compromised passwords in real-world cyberattacks. Specially, we designed and deployed an online SSH honeypot on the cloud server to capture the latest cyber intelligence in the wild. Our findings show that over 90% of brute force attacks involve the use of compromised passwords, indicating a high level of password vulnerability. Additionally, we observe that the effectiveness of strong-password policies in mitigating such attacks appears limited. This study highlights the need for better password security strategies to counter the high prevalence of compromised passwords in cyberattacks.","PeriodicalId":177416,"journal":{"name":"Conference on Electronic Information Engineering and Data Processing","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130617101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and implementation of 4K ultra HD video recording and playback system based on HI3531D","authors":"Fanchang Zeng","doi":"10.1117/12.2682429","DOIUrl":"https://doi.org/10.1117/12.2682429","url":null,"abstract":"In order to meet the requirements for 4K ultra high-definition video recording, storage and playback, as well as the need for long-term capture and recording of screen information of the operating terminal in important control scenarios such as shipborne, on-board and airborne, it is convenient for post event technical analysis, service quality assessment, drill rehearsal and operation accident liability determination. The domestic video codec processor Hisilicon HI3531D is studied. A video recording and playback system supporting 4K video capture and H.264/H.265 codec is designed and implemented. The compression algorithm of H.264/H.265 coding standard is used to realize the compression, storage and functions of video data. Single channel codec 3840x2160@30fps resolution can reach 17.6Mbps, the codec system delay can reach 110ms in JARI Works OS, and the dual redundant Ethernet switching time can reach 23.5ms.","PeriodicalId":177416,"journal":{"name":"Conference on Electronic Information Engineering and Data Processing","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131295538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new network segmentation method integrating branch cutting and node splitting","authors":"Gulong Chen, Zheng Li, Jierui Yang, Yu Zhang, Zhaofeng Zhang","doi":"10.1117/12.2682288","DOIUrl":"https://doi.org/10.1117/12.2682288","url":null,"abstract":"With the continuous expansion of distribution network scale, the real-time performance of distribution network segmentation algorithm is increasingly difficult to meet the requirements of practical engineering. The result of network segmentation is actually to divide a whole into various smaller modules and calculate and solve these small modules respectively. Based on this, this paper adopts a new network segmentation method integrating branch cutting and node splitting. In this way, nodes and branches are operated accordingly. The boundary variables generated by this way include both the voltage on the split node and the current on the cut branch. Using a new model of distribution network - hierarchical topology model, the global optimization problem is transformed into a multi-stage segmentation problem. At the same time, the negative fast division of distribution network is realized by searching for split nodes and cutting branches. The simulation results of an example show that the algorithm is correct, effective and fast.","PeriodicalId":177416,"journal":{"name":"Conference on Electronic Information Engineering and Data Processing","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125520192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}