Other Conferences最新文献

筛选
英文 中文
Design and research of MCU innovation simulation based on the perspective of technological innovation product development 基于技术创新产品开发视角的单片机创新模拟设计与研究
Other Conferences Pub Date : 2024-06-06 DOI: 10.1117/12.3032017
Qingquan Cui, Yanqiong Li, Ning Wang
{"title":"Design and research of MCU innovation simulation based on the perspective of technological innovation product development","authors":"Qingquan Cui, Yanqiong Li, Ning Wang","doi":"10.1117/12.3032017","DOIUrl":"https://doi.org/10.1117/12.3032017","url":null,"abstract":"The single chip microcomputer has many applications in the research and development of intelligent products and scientific and innovative products. How to improve the efficiency of development and design application effect in the design of single chip microcomputer is worth in-depth study. This paper takes the development of scientific and technological innovation products as the starting point, analyzes and studies how to effectively improve the development efficiency of MCU developers by using Proteus, and gives the specific design ideas and methods. Through the design and analysis of four actual MCU cases, the design efficiency and design effect of developers are verified. Through the statistics and analysis of the actual developer's development data, the design ideas and methods constructed in this paper can effectively improve the time and efficiency of single chip development, and have certain advantages and effects in innovative products, which can be widely used in single chip learning and education.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141379761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image steganalysis based on model compression 基于模型压缩的图像隐匿分析
Other Conferences Pub Date : 2024-06-06 DOI: 10.1117/12.3031915
Siyuan Huang, Minqing Zhang, Xiong Zhang, Chao Jiang, Yongjun Kong, Fuqiang Di, Yan Ke
{"title":"Image steganalysis based on model compression","authors":"Siyuan Huang, Minqing Zhang, Xiong Zhang, Chao Jiang, Yongjun Kong, Fuqiang Di, Yan Ke","doi":"10.1117/12.3031915","DOIUrl":"https://doi.org/10.1117/12.3031915","url":null,"abstract":"Deep learning technology has developed rapidly in recent years, and deep learning-based steganography and steganalysis techniques have also achieved fruitful results. In the past few years, the over-expanded structure of steganalyzers based on deep learning has led to huge computational and storage costs. In this article, we propose image steganalysis based on model compression, and apply the model compression method to image steganalysis to reduce the network infrastructure of the existing large-scale over-parameter steganalyzer based on deep learning. We conducted extensive experiments on the BOSSBase+BOWS2 dataset. As can be seen from the experiment, compared with the original steganalysis model, the model structure we proposed can achieve performance with fewer parameters and floating-point operations. This model has better portability and scalability.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141381404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real-time traffic intrusion detection based on CNN-LSTM deep neural networks 基于 CNN-LSTM 深度神经网络的实时流量入侵检测
Other Conferences Pub Date : 2024-06-06 DOI: 10.1117/12.3031914
Runjie Liu, Yinpu Ma, Xu Gao, Lianji Zhang
{"title":"Real-time traffic intrusion detection based on CNN-LSTM deep neural networks","authors":"Runjie Liu, Yinpu Ma, Xu Gao, Lianji Zhang","doi":"10.1117/12.3031914","DOIUrl":"https://doi.org/10.1117/12.3031914","url":null,"abstract":"As Internet technology is developed and applied, the problems of large amounts of real-time traffic data and many unknown attacks are becoming increasingly serious, and intrusion detection systems have increased in efficiency and effectiveness. In this paper, a real-time traffic intrusion detection method based on Inception-LSTM deep neural network combining CNN and LSTM is proposed for improving label-based intrusion detection performance. Network traffic records are converted into 2D gray scale graphs. It extracts network traffic features using image processing techniques with high generalization ability. Experimental validation is performed on the publicly available CIC-IDS-2017 dataset, and the results show that the proposed Inception-LSTM neural network improves the detection accuracy and F1-score by 0.5% and 0.7%, respectively; the results of the comparison between the detection done on real-time captured traffic data and the network security devices show that the method is effective and feasible.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141381418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of embedded target turntable system based on BS mode 基于 BS 模式的嵌入式目标转盘系统设计
Other Conferences Pub Date : 2024-06-06 DOI: 10.1117/12.3031923
Xiaojuan Chen, Shuai Lian
{"title":"Design of embedded target turntable system based on BS mode","authors":"Xiaojuan Chen, Shuai Lian","doi":"10.1117/12.3031923","DOIUrl":"https://doi.org/10.1117/12.3031923","url":null,"abstract":"In order to meet the maintenance requirements of harsh environment and unattended equipment sites, it is proposed to use an embedded Web server as the core in the embedded target turntable system and use HTML web pages to design the human-computer interaction interface to facilitate cross-platform control. Deliver equipment software upgrades and equipment status monitoring, complete human-computer interaction, and achieve remote unmanned control. The article gives the key code for the server implementation. Through experiments, it is verified that the design scheme has little dependence on the control terminal platform and is reliable in operation. It is very suitable for promotion and application in monitoring and control and can improve equipment maintenance efficiency.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141379896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reversible data hiding in JPEG images based on two-stage embedding 基于两级嵌入的 JPEG 图像中的可逆数据隐藏
Other Conferences Pub Date : 2024-06-06 DOI: 10.1117/12.3032095
Fuqiang Di, Tianxue Li, Pan Yang, Siyuan Huang, Yongjun Kong
{"title":"Reversible data hiding in JPEG images based on two-stage embedding","authors":"Fuqiang Di, Tianxue Li, Pan Yang, Siyuan Huang, Yongjun Kong","doi":"10.1117/12.3032095","DOIUrl":"https://doi.org/10.1117/12.3032095","url":null,"abstract":"Reversible data hiding in images has become one of the research hotspots in the field of information hiding. JPEG images are widely used on social networks, and the research on reversible information hiding technology for JPEG images is of great significance. The existing reversible information hiding algorithms for JPEG images generally lack robustness, which affects the practical application of the algorithms. Inspired by the robust reversible algorithm for spatial domain images, this paper introduces a two-stage embedding method into JPEG images and proposes a new reversible data hiding algorithm for JPEG images based on two-stage embedding. First, apply robust watermarking technology to embed watermark information in the image to achieve robustness, and then apply reversible watermarking technology to embed distortion information to realize reversibility. Experiments have shown that, even if the carrier image is attacked, robust watermarks can still be extracted correctly. Although image restoration cannot be completed due to the destruction of reversible watermarks, the visual quality of the restored image can meet the requirements.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141380415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Method and design of encrypted image hiding based on random LSB matching 基于随机 LSB 匹配的加密图像隐藏方法与设计
Other Conferences Pub Date : 2024-06-06 DOI: 10.1117/12.3032037
Feng Yun
{"title":"Method and design of encrypted image hiding based on random LSB matching","authors":"Feng Yun","doi":"10.1117/12.3032037","DOIUrl":"https://doi.org/10.1117/12.3032037","url":null,"abstract":"The Internet has provided great convenience for people, but at the same time, there have also been some problems that infringe on people's interests. How to effectively protect intellectual property rights and prevent works from being tampered with without permission is one of the issues that the Internet is concerned about. Information hiding is a method of hiding secret information into a general carrier of information, in order to prevent others from discovering it during transmission. Therefore, this article proposes a method for hiding encrypted images based on the random LSB matching algorithm. The experimental results show that this method can achieve better hiding effects.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141378039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A keystone extension to defend against cache timing attacks 抵御缓存定时攻击的 Keystone 扩展
Other Conferences Pub Date : 2024-06-06 DOI: 10.1117/12.3032012
Kai Nie, Rongcai Zhao, Xiao Zhang, Haoyang Chai
{"title":"A keystone extension to defend against cache timing attacks","authors":"Kai Nie, Rongcai Zhao, Xiao Zhang, Haoyang Chai","doi":"10.1117/12.3032012","DOIUrl":"https://doi.org/10.1117/12.3032012","url":null,"abstract":"Trusted Execution Environment (TEE) find extensive applications in various scenarios such as secure cloud services, databases, big data computing, and blockchain. They establish a secure operational zone, often referred to as an Enclave, for applications. The Keystone Trusted Execution Environment offers a range of security primitives, including memory isolation, secure boot, and remote authentication. It stands out as the first open-source framework under the RISC-V architecture designed for constructing customized TEEs and is currently the mainstream TEE in the RISC-V architecture. However, Keystone itself does not provide protection for Enclaves or security monitors against Cache timing attacks. Recent research has demonstrated that malicious actors, leveraging Spectre attacks, can use Cache timing attack techniques to detect Enclave data through shared caches. This paper proposes a Keystone extension design, calling the extended framework Keyson-LLCI (Last Leavel Cache Isolation). Through security analysis, we prove that it can isolate enclaves and operating systems into different cache paths at the LLC level, thus eliminating the influence of cache side channels and increasing the isolation and security of enclaves. We implemented this hardware extension on an FPGA development board and conducted performance testing and IOZone testing. The test results indicate that Keystone-LLCI can effectively defend against Cache timing attacks, with a performance loss of approximately 14%. The latency of read and write operations increased by 12.4% and 14.1%, respectively. It represents an extension design with relatively low performance loss.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141379466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TeTPCM: building endogenous trusted computing on trusted execution environment TeTPCM:在可信执行环境上构建内生可信计算
Other Conferences Pub Date : 2024-06-06 DOI: 10.1117/12.3031944
Jiajian Li, Chenlin Huang, Jun Luo, Jinzhu Kong, Yiwen Ji, Yongpeng Liu, Kaikai Sun, Shuyang Deng
{"title":"TeTPCM: building endogenous trusted computing on trusted execution environment","authors":"Jiajian Li, Chenlin Huang, Jun Luo, Jinzhu Kong, Yiwen Ji, Yongpeng Liu, Kaikai Sun, Shuyang Deng","doi":"10.1117/12.3031944","DOIUrl":"https://doi.org/10.1117/12.3031944","url":null,"abstract":"Traditional Trusted Computing is mainly implemented in the form of boards, chips, etc., and the requirements of hardware modification have greatly limited the widely use of trusted computing. To cope with the dilemma, the idea of designing “Trusted Computing on Chips” becomes a trend with the development of the build-in security module in CPUs. The main challenge lies on how to make full use of processor security features and design a dual-computing security system that meets the requirements of Trusted Computing 3.0. At present, the built-in secure and cryptographic units on processors, such as Phytium and Loongson, and the supported Trust Execution Environment have already provided the foundation for endogenous trusted computing. In this paper, we propose TeTPCM: a TEE Based Endogenous Trusted Platform Control Module (TPCM), which builds an endogenous trusted computing architecture by the collaboration of the TEE and the SoC on phytium processor. Experimental analysis shows that compared with the general-purpose trusted computing chip, endogenous trusted TPCM does not need additional hardware, and is characterized by strong capability, high performance, good scalability, and has better application prospects.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141378185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Haptic texture rendering based on vision 基于视觉的触觉纹理渲染
Other Conferences Pub Date : 2024-06-06 DOI: 10.1117/12.3032085
Meiqi Zhao, Ge Yu, Yu He
{"title":"Haptic texture rendering based on vision","authors":"Meiqi Zhao, Ge Yu, Yu He","doi":"10.1117/12.3032085","DOIUrl":"https://doi.org/10.1117/12.3032085","url":null,"abstract":"During teleoperation tasks such as disinfection and cleaning inside the space station, the operator on the ground controls the robotic arm within the experimental cabinet to maintain continuous contact with areas of different texture properties by operating the handle of a haptic device. Therefore, real-time and stable haptic feedback can help operators distinguish between different contact areas and assist in completing various teleoperation tasks. This article constructs a 2.5D virtual model integrating shape and texture using curved texture images based on a visual approach. It proposes a textured haptic rendering algorithm, which includes two steps of collision detection and collision response, to achieve virtual force computation integrating contact force and texture force. Finally, the real-time performance and stability of the algorithm are evaluated through subjective and objective experiments.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141376360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of kinematics simulation software for 6R series robot 为 6R 系列机器人设计运动学模拟软件
Other Conferences Pub Date : 2024-06-06 DOI: 10.1117/12.3031917
WenBin Wu, Zheng Zhang
{"title":"Design of kinematics simulation software for 6R series robot","authors":"WenBin Wu, Zheng Zhang","doi":"10.1117/12.3031917","DOIUrl":"https://doi.org/10.1117/12.3031917","url":null,"abstract":"In this paper, a joint angle selection method basedIn this paper, a joint angle selection method based on Conformal Geometric Algebra (CGA) is proposed for the inverse kinematics model of robot. Then a CGA library is developed and used to construct various kinematic models of 6R serial manipulators. The software of spatial 6R serial manipulator kinematic simulation is developed by Qt and OpenGL technology. This software includes the above-mentioned CGA library and kinematic models. It can display the STL format robot model in three dimensions and modify the size of the model and plan its trajectory.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141381567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信