2020 IEEE 3rd International Conference on Computer and Communication Engineering Technology (CCET)最新文献

筛选
英文 中文
An Efficient Hybrid WCNS-CPR Algorithm in Shock Capturing 一种高效的混合WCNS-CPR休克捕获算法
Jia Guo, Lingyan Tang, Songhe Song, Huajun Zhu, Zhen-Guo Yan
{"title":"An Efficient Hybrid WCNS-CPR Algorithm in Shock Capturing","authors":"Jia Guo, Lingyan Tang, Songhe Song, Huajun Zhu, Zhen-Guo Yan","doi":"10.1109/CCET50901.2020.9213085","DOIUrl":"https://doi.org/10.1109/CCET50901.2020.9213085","url":null,"abstract":"An efficient hybrid shock-capturing algorithm based on WCNS (Weighted compact nonlinear scheme) and CPR (Correction procedure via reconstruction) is proposed. TVB (Total Variation Bounded) shock detection indicator is used to identify cells with shocks. Then WCNS is used to capture shocks in these cells, while other cells are calculated by CPR. A strategy of algorithm switching is developed. Numerical experiments are simulated to test accuracy, shock-capturing ability and computational efficiency. The results show that this hybrid algorithm achieves expected high-order accuracy and high resolution and has less computational cost compared to WCNS.","PeriodicalId":236862,"journal":{"name":"2020 IEEE 3rd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129473457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Design of Jitter Free Symbol Synchronization Lock Detector 无抖动符号同步锁检测器的设计
Jie Zhan, Zhichun Chen, Yuyao Shen
{"title":"On the Design of Jitter Free Symbol Synchronization Lock Detector","authors":"Jie Zhan, Zhichun Chen, Yuyao Shen","doi":"10.1109/CCET50901.2020.9213120","DOIUrl":"https://doi.org/10.1109/CCET50901.2020.9213120","url":null,"abstract":"Symbol synchronization lock detection plays an important role in the design of wireless communication receivers. This study deals with the problem that the self-noise interference reduces the performances of symbol synchronization lock detection when the signs of adjacent symbols are the same. A novel jitter free symbol lock detection method is proposed. This method introduces the jitter free prefilter to the two samples per symbol detector. By shaping the received signal, baseband signal obtains regular symbol-period-spaced zero-crossings. Thereby, the self-noise caused by mid-symbol signal is reduced. Simulation results demonstrate that the proposed method significantly improves the detection performances of symbol synchronization lock detection by reducing self-noise interference. The structure of the proposed lock detection method is easy to implement and expand. This study has practical meaning in the design of signal receivers.","PeriodicalId":236862,"journal":{"name":"2020 IEEE 3rd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132350373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
2D Human Pose Estimation from Monocular Images: A Survey 基于单眼图像的二维人体姿态估计:综述
Jingtian Sun, Chen Xue, Lu Yanan, Jianwen Cao
{"title":"2D Human Pose Estimation from Monocular Images: A Survey","authors":"Jingtian Sun, Chen Xue, Lu Yanan, Jianwen Cao","doi":"10.1109/CCET50901.2020.9213131","DOIUrl":"https://doi.org/10.1109/CCET50901.2020.9213131","url":null,"abstract":"Human pose estimation is a computer vision problem that tries to estimate human body joints location and decide how they are connected to each other. It has been long studied and is still a frontier research field nowadays. In this paper, a comprehensive survey of human pose estimation from 2D monocular images is given, including from the classical representative works to the most recent deep-learning-based methods. The goal of the paper is to let the reader get a brief understanding on how human pose estimation methods work and see how these methods have developed, how they different from each other but in the same time share some common ideas. This paper inherits one of the most admitted way to categorize human pose estimation methods by dividing them into top-down and bottom-up methods, pipelines and some of the milestone works are introduced, comparison and discussion among ideas and methods are made. There are also new methods that jump out of the restriction of purely top- down or bottom-up, this paper includes them as well in later sections. Then this paper collects some datasets that is used frequently, and ways of error measurement are given. Finally, overall discussion is made including unsolved problems and currently challenging tasks.","PeriodicalId":236862,"journal":{"name":"2020 IEEE 3rd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130455955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Multi-Protocol Smart Sensing Method Based on Lightweight Deep Neural Network for Edge Computing 一种基于轻量级深度神经网络的边缘计算多协议智能感知方法
Ganghong Zhang, Yan Zhen, Libin Zheng, Jinhong He
{"title":"A Multi-Protocol Smart Sensing Method Based on Lightweight Deep Neural Network for Edge Computing","authors":"Ganghong Zhang, Yan Zhen, Libin Zheng, Jinhong He","doi":"10.1109/CCET50901.2020.9213172","DOIUrl":"https://doi.org/10.1109/CCET50901.2020.9213172","url":null,"abstract":"Correctly recognizing protocol types of packets from different communication channels and implementing protocol analysis is fundamental to data acquisition for edge computing in power Internet of Things. Such studies have so far been largely restricted to specified type of protocol, because only when the type is known can the protocol be parsed. Targeting more protocol types requires methods that can automatically recognize various types of protocols with both high recognition rate and high efficiency. To be suitable for edge computing in power Internet of Things, this paper proposes a light-weight deep neural network model named PPRNet trained with data frames from protocols of different types. The experimental results show that the technique is very effective on sensing 6 protocol types applied in power IoT containing DL/T645-2007, Q/GDW1376.1, and IEC62056. This model allows us to sense different types of protocol when previously unknown data frames entering in a system, and overcome the dilemma of economically deploying an artificial intelligence system to an edge device. This method has the ability of learning and expanding, can be extended to identify and apply other application protocols. It may ultimately help speed up the recognition of protocol types, and promotes the interconnection and interoperation of access devices and the plug-and-play.","PeriodicalId":236862,"journal":{"name":"2020 IEEE 3rd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131655783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MPPM Based Bi-directional Long Range Visible Light Communication for Indoor Particulate Matter Monitoring 基于MPPM的双向远程可见光通信室内颗粒物监测
Mohammad Abrar Shakil Sejan, Md Habibur Rahman, W. Chung
{"title":"MPPM Based Bi-directional Long Range Visible Light Communication for Indoor Particulate Matter Monitoring","authors":"Mohammad Abrar Shakil Sejan, Md Habibur Rahman, W. Chung","doi":"10.1109/CCET50901.2020.9213130","DOIUrl":"https://doi.org/10.1109/CCET50901.2020.9213130","url":null,"abstract":"In this study, we have focused on monitoring indoor particulate matter by using multiple pulse position modulation (MPPM) to transfer fine particulate matter (PM) data in long distance. According to the world health organization, PM has a dangerous effect on the human body and causes different deadly diseases. Previous studies have showed that exposure to PM-related pollution causes cardiovascular and other respiratory diseases. Thus, it is crucial to measure PM concentration in places like hospitals and nursing homes. Visible light communication (VLC) is used for short-range optical communication. VLC has features like electromagnetic interference-free, virtually unlimited bandwidth, no known health effect to the human body, and secure communication. MPPM is a modulation technique which is power efficient compared to other modulation schemes. We have applied the MPPM by (4, 2) formation where 4 is the slot length and 2 pulses in each slot, to send bits in long-distance transmission using VLC. Two nodes used to complete the bidirectional communication, one node requests the sensor data, and another sends the response. We have achieved a 15 m distance between two nodes with a reliable error rate.","PeriodicalId":236862,"journal":{"name":"2020 IEEE 3rd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"357 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133029608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research on Security Evaluation Technology of Wireless Access of Electric Power Monitoring System Based on Fuzzy 基于模糊的电力监控系统无线接入安全评估技术研究
Li Zeke, Chen Zewen, W. Chunyan, Xu Zhiguang, Liang Ye
{"title":"Research on Security Evaluation Technology of Wireless Access of Electric Power Monitoring System Based on Fuzzy","authors":"Li Zeke, Chen Zewen, W. Chunyan, Xu Zhiguang, Liang Ye","doi":"10.1109/CCET50901.2020.9213143","DOIUrl":"https://doi.org/10.1109/CCET50901.2020.9213143","url":null,"abstract":"In order to solve the defense problem of wireless network security threats in new energy stations, a new wireless network security risk assessment model which proposes a wireless access security evaluation method for power monitoring system based on fuzzy theory, was established based on the study of security risk assessment methods in this paper. The security evaluation method first divides the security evaluation factor set, then determines the security evaluation weight coefficient, then calculates the network security level membership matrix, and finally combines specific examples to analyze the resulting data. this paper provided new ideas and methods for the wireless access security evaluation of new energy stations.","PeriodicalId":236862,"journal":{"name":"2020 IEEE 3rd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"8 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132273757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of the Runtime Intrusion Prevention of ARM-Based Systems in Wireless Networks 基于arm的无线网络系统运行时入侵防御评估
Sun Zhou
{"title":"Evaluation of the Runtime Intrusion Prevention of ARM-Based Systems in Wireless Networks","authors":"Sun Zhou","doi":"10.1109/CCET50901.2020.9213116","DOIUrl":"https://doi.org/10.1109/CCET50901.2020.9213116","url":null,"abstract":"Nowadays, most wireless communication modules are built based on ARM-based chips. Buffer overflow attack (BOA) is one of the mainstream runtime intrusion on the ARM architecture. However, so far there are few reports on evaluation of the intrusion prevention capability of ARM-based operating systems from BOAs. To provide with such evaluation, in this paper, first, the Runtime Intrusion Prevention Evaluator was implemented on ARM-based operating systems, which we called RIPE-ARM, where 850 kinds of effective BOAs are integrated. Next, using the QEMU virtual machine, we set up an ARM-based system, Raspberry Pi, for the evaluation. Then, the RIPE-ARM was used to test and evaluate the intrusion prevention capability of Raspberry Pi. The kinds of BOAs that each defense or defense combination can successfully prevent were identified, respectively. We found that among all these defense methods, there is one combinational method turns out to be optimal that is able to make 840 of the total 850 kinds of attacks fail. Also, the results show that there are ten BOA kinds that no defense can mitigate. Those kinds are presented in details.","PeriodicalId":236862,"journal":{"name":"2020 IEEE 3rd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115409297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on the Early Warning of College Online Public Opinion under the Big Data Environment 大数据环境下高校网络舆情预警研究
Jinhai Li, Feiyu Pan, Bin Zhou, Jiaming Pei
{"title":"Research on the Early Warning of College Online Public Opinion under the Big Data Environment","authors":"Jinhai Li, Feiyu Pan, Bin Zhou, Jiaming Pei","doi":"10.1109/CCET50901.2020.9213153","DOIUrl":"https://doi.org/10.1109/CCET50901.2020.9213153","url":null,"abstract":"College online public opinion which is based on social public opinion is a kind of self-expression of college students on some hot issues in the current campus and in the society. The college students through it expressing their opinions by giving vent to their feelings. However, according to the current situation, due to the anomie of college students' online public opinion and the proliferation of false public opinions in the network, as well as the absence of public opinion warning and network guidance. This leads to the problem of college online public opinion increasingly serious. The early warning research of college online public opinion has also been paid more and more attention by the academic circle. Based on the analysis of the current situation of college online public opinion, this paper analyzes and designs three functional modules of early warning of college online public opinion: collection, analysis and early warning. At the same time, the organization system of online and offline is put forward to guarantee the efficient operation of college online public opinion warning mechanism.","PeriodicalId":236862,"journal":{"name":"2020 IEEE 3rd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123447328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design and Implementation of Pig Growth Monitoring System Based on Wireless Communication 基于无线通信的猪生长监测系统的设计与实现
Xu Shipu, Wang Yunsheng, Huang Wenwen, Wu Yingjing, Liu Yong
{"title":"Design and Implementation of Pig Growth Monitoring System Based on Wireless Communication","authors":"Xu Shipu, Wang Yunsheng, Huang Wenwen, Wu Yingjing, Liu Yong","doi":"10.1109/CCET50901.2020.9213123","DOIUrl":"https://doi.org/10.1109/CCET50901.2020.9213123","url":null,"abstract":"This research takes the core microcontroller STM32 based on ARM Cortex M3 as the hardware platform. Combining the latest wireless communication technology, sensing technology and radio frequency identification technology, this paper has developed a set of remote monitoring system for breeding pig growth. We collect ear tag data through a card reader to identify pigs, weighing sensors and hopper weighing sensors. This system will collect pig weight data and feed intake data. The collected data is transmitted to the remote server in real time through the wireless communication module. This data is processed by computer to generate various reports, and the growth performance curve is automatically drawn. Through the analysis of the performance curve, the pastor can select the best breeding pig for breeding piglets.","PeriodicalId":236862,"journal":{"name":"2020 IEEE 3rd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123252061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
DPA: Demand-Based Partition and Data Allocation for Hybrid On-Chip Memory 混合片上存储器的基于需求的分区和数据分配
Jianfeng Wang, Leibo Liu, Jianfeng Zhu, Shaojun Wei
{"title":"DPA: Demand-Based Partition and Data Allocation for Hybrid On-Chip Memory","authors":"Jianfeng Wang, Leibo Liu, Jianfeng Zhu, Shaojun Wei","doi":"10.1109/CCET50901.2020.9213108","DOIUrl":"https://doi.org/10.1109/CCET50901.2020.9213108","url":null,"abstract":"The performance and energy consumption of the memory system has become an essential bottleneck in modern processors. Scratchpad memory (SPM) is widely used in the embedded system for meeting the constrict of energy consumption. The hybrid memory architecture has been proposed to improve the energy efficiency of the overall system. Previous works focus on optimizing data allocations in the fixed-size cache and SPM. However, applications have different preferences for cache and SPM. Fixed memory structures may cause a waste of storage resources. In this paper, a reconfigurable mechanism is proposed to dynamically adjust the partition of the local memory and allocate data with high-locality into the SPM. Our experimental results show that our method improves the energy-delay product by 12.0% on average compared with the previous works.","PeriodicalId":236862,"journal":{"name":"2020 IEEE 3rd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116638801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信