Jia Guo, Lingyan Tang, Songhe Song, Huajun Zhu, Zhen-Guo Yan
{"title":"An Efficient Hybrid WCNS-CPR Algorithm in Shock Capturing","authors":"Jia Guo, Lingyan Tang, Songhe Song, Huajun Zhu, Zhen-Guo Yan","doi":"10.1109/CCET50901.2020.9213085","DOIUrl":"https://doi.org/10.1109/CCET50901.2020.9213085","url":null,"abstract":"An efficient hybrid shock-capturing algorithm based on WCNS (Weighted compact nonlinear scheme) and CPR (Correction procedure via reconstruction) is proposed. TVB (Total Variation Bounded) shock detection indicator is used to identify cells with shocks. Then WCNS is used to capture shocks in these cells, while other cells are calculated by CPR. A strategy of algorithm switching is developed. Numerical experiments are simulated to test accuracy, shock-capturing ability and computational efficiency. The results show that this hybrid algorithm achieves expected high-order accuracy and high resolution and has less computational cost compared to WCNS.","PeriodicalId":236862,"journal":{"name":"2020 IEEE 3rd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129473457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Design of Jitter Free Symbol Synchronization Lock Detector","authors":"Jie Zhan, Zhichun Chen, Yuyao Shen","doi":"10.1109/CCET50901.2020.9213120","DOIUrl":"https://doi.org/10.1109/CCET50901.2020.9213120","url":null,"abstract":"Symbol synchronization lock detection plays an important role in the design of wireless communication receivers. This study deals with the problem that the self-noise interference reduces the performances of symbol synchronization lock detection when the signs of adjacent symbols are the same. A novel jitter free symbol lock detection method is proposed. This method introduces the jitter free prefilter to the two samples per symbol detector. By shaping the received signal, baseband signal obtains regular symbol-period-spaced zero-crossings. Thereby, the self-noise caused by mid-symbol signal is reduced. Simulation results demonstrate that the proposed method significantly improves the detection performances of symbol synchronization lock detection by reducing self-noise interference. The structure of the proposed lock detection method is easy to implement and expand. This study has practical meaning in the design of signal receivers.","PeriodicalId":236862,"journal":{"name":"2020 IEEE 3rd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132350373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"2D Human Pose Estimation from Monocular Images: A Survey","authors":"Jingtian Sun, Chen Xue, Lu Yanan, Jianwen Cao","doi":"10.1109/CCET50901.2020.9213131","DOIUrl":"https://doi.org/10.1109/CCET50901.2020.9213131","url":null,"abstract":"Human pose estimation is a computer vision problem that tries to estimate human body joints location and decide how they are connected to each other. It has been long studied and is still a frontier research field nowadays. In this paper, a comprehensive survey of human pose estimation from 2D monocular images is given, including from the classical representative works to the most recent deep-learning-based methods. The goal of the paper is to let the reader get a brief understanding on how human pose estimation methods work and see how these methods have developed, how they different from each other but in the same time share some common ideas. This paper inherits one of the most admitted way to categorize human pose estimation methods by dividing them into top-down and bottom-up methods, pipelines and some of the milestone works are introduced, comparison and discussion among ideas and methods are made. There are also new methods that jump out of the restriction of purely top- down or bottom-up, this paper includes them as well in later sections. Then this paper collects some datasets that is used frequently, and ways of error measurement are given. Finally, overall discussion is made including unsolved problems and currently challenging tasks.","PeriodicalId":236862,"journal":{"name":"2020 IEEE 3rd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130455955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Multi-Protocol Smart Sensing Method Based on Lightweight Deep Neural Network for Edge Computing","authors":"Ganghong Zhang, Yan Zhen, Libin Zheng, Jinhong He","doi":"10.1109/CCET50901.2020.9213172","DOIUrl":"https://doi.org/10.1109/CCET50901.2020.9213172","url":null,"abstract":"Correctly recognizing protocol types of packets from different communication channels and implementing protocol analysis is fundamental to data acquisition for edge computing in power Internet of Things. Such studies have so far been largely restricted to specified type of protocol, because only when the type is known can the protocol be parsed. Targeting more protocol types requires methods that can automatically recognize various types of protocols with both high recognition rate and high efficiency. To be suitable for edge computing in power Internet of Things, this paper proposes a light-weight deep neural network model named PPRNet trained with data frames from protocols of different types. The experimental results show that the technique is very effective on sensing 6 protocol types applied in power IoT containing DL/T645-2007, Q/GDW1376.1, and IEC62056. This model allows us to sense different types of protocol when previously unknown data frames entering in a system, and overcome the dilemma of economically deploying an artificial intelligence system to an edge device. This method has the ability of learning and expanding, can be extended to identify and apply other application protocols. It may ultimately help speed up the recognition of protocol types, and promotes the interconnection and interoperation of access devices and the plug-and-play.","PeriodicalId":236862,"journal":{"name":"2020 IEEE 3rd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131655783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohammad Abrar Shakil Sejan, Md Habibur Rahman, W. Chung
{"title":"MPPM Based Bi-directional Long Range Visible Light Communication for Indoor Particulate Matter Monitoring","authors":"Mohammad Abrar Shakil Sejan, Md Habibur Rahman, W. Chung","doi":"10.1109/CCET50901.2020.9213130","DOIUrl":"https://doi.org/10.1109/CCET50901.2020.9213130","url":null,"abstract":"In this study, we have focused on monitoring indoor particulate matter by using multiple pulse position modulation (MPPM) to transfer fine particulate matter (PM) data in long distance. According to the world health organization, PM has a dangerous effect on the human body and causes different deadly diseases. Previous studies have showed that exposure to PM-related pollution causes cardiovascular and other respiratory diseases. Thus, it is crucial to measure PM concentration in places like hospitals and nursing homes. Visible light communication (VLC) is used for short-range optical communication. VLC has features like electromagnetic interference-free, virtually unlimited bandwidth, no known health effect to the human body, and secure communication. MPPM is a modulation technique which is power efficient compared to other modulation schemes. We have applied the MPPM by (4, 2) formation where 4 is the slot length and 2 pulses in each slot, to send bits in long-distance transmission using VLC. Two nodes used to complete the bidirectional communication, one node requests the sensor data, and another sends the response. We have achieved a 15 m distance between two nodes with a reliable error rate.","PeriodicalId":236862,"journal":{"name":"2020 IEEE 3rd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"357 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133029608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Li Zeke, Chen Zewen, W. Chunyan, Xu Zhiguang, Liang Ye
{"title":"Research on Security Evaluation Technology of Wireless Access of Electric Power Monitoring System Based on Fuzzy","authors":"Li Zeke, Chen Zewen, W. Chunyan, Xu Zhiguang, Liang Ye","doi":"10.1109/CCET50901.2020.9213143","DOIUrl":"https://doi.org/10.1109/CCET50901.2020.9213143","url":null,"abstract":"In order to solve the defense problem of wireless network security threats in new energy stations, a new wireless network security risk assessment model which proposes a wireless access security evaluation method for power monitoring system based on fuzzy theory, was established based on the study of security risk assessment methods in this paper. The security evaluation method first divides the security evaluation factor set, then determines the security evaluation weight coefficient, then calculates the network security level membership matrix, and finally combines specific examples to analyze the resulting data. this paper provided new ideas and methods for the wireless access security evaluation of new energy stations.","PeriodicalId":236862,"journal":{"name":"2020 IEEE 3rd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"8 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132273757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of the Runtime Intrusion Prevention of ARM-Based Systems in Wireless Networks","authors":"Sun Zhou","doi":"10.1109/CCET50901.2020.9213116","DOIUrl":"https://doi.org/10.1109/CCET50901.2020.9213116","url":null,"abstract":"Nowadays, most wireless communication modules are built based on ARM-based chips. Buffer overflow attack (BOA) is one of the mainstream runtime intrusion on the ARM architecture. However, so far there are few reports on evaluation of the intrusion prevention capability of ARM-based operating systems from BOAs. To provide with such evaluation, in this paper, first, the Runtime Intrusion Prevention Evaluator was implemented on ARM-based operating systems, which we called RIPE-ARM, where 850 kinds of effective BOAs are integrated. Next, using the QEMU virtual machine, we set up an ARM-based system, Raspberry Pi, for the evaluation. Then, the RIPE-ARM was used to test and evaluate the intrusion prevention capability of Raspberry Pi. The kinds of BOAs that each defense or defense combination can successfully prevent were identified, respectively. We found that among all these defense methods, there is one combinational method turns out to be optimal that is able to make 840 of the total 850 kinds of attacks fail. Also, the results show that there are ten BOA kinds that no defense can mitigate. Those kinds are presented in details.","PeriodicalId":236862,"journal":{"name":"2020 IEEE 3rd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115409297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on the Early Warning of College Online Public Opinion under the Big Data Environment","authors":"Jinhai Li, Feiyu Pan, Bin Zhou, Jiaming Pei","doi":"10.1109/CCET50901.2020.9213153","DOIUrl":"https://doi.org/10.1109/CCET50901.2020.9213153","url":null,"abstract":"College online public opinion which is based on social public opinion is a kind of self-expression of college students on some hot issues in the current campus and in the society. The college students through it expressing their opinions by giving vent to their feelings. However, according to the current situation, due to the anomie of college students' online public opinion and the proliferation of false public opinions in the network, as well as the absence of public opinion warning and network guidance. This leads to the problem of college online public opinion increasingly serious. The early warning research of college online public opinion has also been paid more and more attention by the academic circle. Based on the analysis of the current situation of college online public opinion, this paper analyzes and designs three functional modules of early warning of college online public opinion: collection, analysis and early warning. At the same time, the organization system of online and offline is put forward to guarantee the efficient operation of college online public opinion warning mechanism.","PeriodicalId":236862,"journal":{"name":"2020 IEEE 3rd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123447328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xu Shipu, Wang Yunsheng, Huang Wenwen, Wu Yingjing, Liu Yong
{"title":"Design and Implementation of Pig Growth Monitoring System Based on Wireless Communication","authors":"Xu Shipu, Wang Yunsheng, Huang Wenwen, Wu Yingjing, Liu Yong","doi":"10.1109/CCET50901.2020.9213123","DOIUrl":"https://doi.org/10.1109/CCET50901.2020.9213123","url":null,"abstract":"This research takes the core microcontroller STM32 based on ARM Cortex M3 as the hardware platform. Combining the latest wireless communication technology, sensing technology and radio frequency identification technology, this paper has developed a set of remote monitoring system for breeding pig growth. We collect ear tag data through a card reader to identify pigs, weighing sensors and hopper weighing sensors. This system will collect pig weight data and feed intake data. The collected data is transmitted to the remote server in real time through the wireless communication module. This data is processed by computer to generate various reports, and the growth performance curve is automatically drawn. Through the analysis of the performance curve, the pastor can select the best breeding pig for breeding piglets.","PeriodicalId":236862,"journal":{"name":"2020 IEEE 3rd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123252061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DPA: Demand-Based Partition and Data Allocation for Hybrid On-Chip Memory","authors":"Jianfeng Wang, Leibo Liu, Jianfeng Zhu, Shaojun Wei","doi":"10.1109/CCET50901.2020.9213108","DOIUrl":"https://doi.org/10.1109/CCET50901.2020.9213108","url":null,"abstract":"The performance and energy consumption of the memory system has become an essential bottleneck in modern processors. Scratchpad memory (SPM) is widely used in the embedded system for meeting the constrict of energy consumption. The hybrid memory architecture has been proposed to improve the energy efficiency of the overall system. Previous works focus on optimizing data allocations in the fixed-size cache and SPM. However, applications have different preferences for cache and SPM. Fixed memory structures may cause a waste of storage resources. In this paper, a reconfigurable mechanism is proposed to dynamically adjust the partition of the local memory and allocate data with high-locality into the SPM. Our experimental results show that our method improves the energy-delay product by 12.0% on average compared with the previous works.","PeriodicalId":236862,"journal":{"name":"2020 IEEE 3rd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116638801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}