International Conference on Critical Infrastructure Protection最新文献

筛选
英文 中文
Secrecy relaying strategy over correlated fading channels using CSI estimation 基于CSI估计的相关衰落信道保密中继策略
International Conference on Critical Infrastructure Protection Pub Date : 2019-11-15 DOI: 10.1145/3369985.3369986
Wang Chen, Mingzhi Wang
{"title":"Secrecy relaying strategy over correlated fading channels using CSI estimation","authors":"Wang Chen, Mingzhi Wang","doi":"10.1145/3369985.3369986","DOIUrl":"https://doi.org/10.1145/3369985.3369986","url":null,"abstract":"Cooperative relaying is considered as an effective method to improve the secrecy performance of wireless communications. However, the existing relay selection strategies do not consider the channel correlations between the main and eavesdropping links which limits the secrecy performance. In this paper, the authors explore how to select relay under correlated fading channels in a multiple decode-and-forward (DF) relay network. To this end, the authors adopt the minimum mean squared error (MMSE) method to estimate the channel state information (CSI) of relay-eavesdropper link based on the channel correlation and then propose the single-relay selection (SRS) strategy. Simulation results show that the proposed SRS strategy outperforms other SRS strategies significantly. To further improve the secrecy performance of the DF system, we propose a novel multiple-relay selection (MRS) method for correlated channels taking advantage of estimating the relay-eavesdropper channel. Results show that our MRS strategy performs better than its SRS version and other MRS strategies. We also find that the our MRS strategy gets more performance gain than other strategies with the number of relays increases indicating the effectiveness of estimating the eavesdropping channel in secure relaying.","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134634152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep learning chips: challenges and opportunities for ubiquitous power internet of things 深度学习芯片:无处不在的电力物联网的挑战与机遇
International Conference on Critical Infrastructure Protection Pub Date : 2019-11-15 DOI: 10.1145/3369985.3370039
Ganghong Zhang, Chao Huo, Jianan Yuan
{"title":"Deep learning chips: challenges and opportunities for ubiquitous power internet of things","authors":"Ganghong Zhang, Chao Huo, Jianan Yuan","doi":"10.1145/3369985.3370039","DOIUrl":"https://doi.org/10.1145/3369985.3370039","url":null,"abstract":"Tasks of Ubiquitous Power Internet of Things run through the power generation, transmission, transformation, distribution, electricity use and other links, requiring advanced communication, artificial intelligence, big data and other technologies. Deep learning chips provide computational power for algorithm execution and data processing, which are indispensable foundations and basic components for intelligent terminals. Therefore, this paper summarizes the challenges and opportunities faced by deep learning chips in the construction of ubiquitous power Internet of Things. Firstly, the four parts of ubiquitous power Internet of Things including terminal layer, network layer, platform layer and application layer are described. Secondly, the key technologies of deep learning technology and deep neural network accelerator involved in deep learning chips are summarized. Finally, the research work of deep learning chips for ubiquitous power Internet of Things is surveyed. The main functions and existing problems are discussed, and the future research work is proposed.","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134592053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Big data prototype practice for unmanned surface vehicle 无人水面车辆大数据原型实践
International Conference on Critical Infrastructure Protection Pub Date : 2018-11-02 DOI: 10.1145/3290420.3290466
Shuli Jia, Liyong Ma, Shuting Zhang
{"title":"Big data prototype practice for unmanned surface vehicle","authors":"Shuli Jia, Liyong Ma, Shuting Zhang","doi":"10.1145/3290420.3290466","DOIUrl":"https://doi.org/10.1145/3290420.3290466","url":null,"abstract":"In recent years, unmanned surface vehicle (USV) has made great progress with the development of communication and electronic technologies. In the future, USVs will be widely used in marine tasks. USV has begun to offer a wide variety of large heterogeneous data sources. The architecture of USV big data is discussed. A prototype system of USV big data is established, and a preliminary anomaly detection application based on isolation forest method is developed. The effective anomaly detection results show that the USV big data prototype system and the anomaly detection application is feasible. The establishment of USV big data system is meaningful and the system can provide effective application services.","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122267250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Adoption model analysis of digital service system application for multi generation community in Indonesia 印尼多代社区数字服务系统应用采用模式分析
International Conference on Critical Infrastructure Protection Pub Date : 2018-11-02 DOI: 10.1145/3290420.3290436
Raden Arief Naufaldi, A. Suzianti
{"title":"Adoption model analysis of digital service system application for multi generation community in Indonesia","authors":"Raden Arief Naufaldi, A. Suzianti","doi":"10.1145/3290420.3290436","DOIUrl":"https://doi.org/10.1145/3290420.3290436","url":null,"abstract":"The rapid development of the digital age can change almost every aspect of modern life. With the advancement of technology, all can be done more easily. This creates a concept called \"Smart City\" where all the things that people do everyday in the city become integrated and sustainable by technology. Currently in Indonesia all business sectors have entered an era where digital platform plays an important role in it, PT Railink is one of them, PT Railink as a new provider of airport rail services issued online ticketing service based on smartphones, which of course aims to facilitate consumers to be more convenient to book the airport train tickets, but currently Railink application may not be widely accepted by the users of this service. This study focuses on measuring the acceptability of technology in Railink applications by using TAM and TRA modifications based on the SEM methodology. This research was conducted in Jakarta with two study materials, which are X and Y generations society. The result of research shows high positive impression felt about the usefulness and easiness for both generations. Analysis of technology adoption lifecycle and technology roadmaping shows that Railink application has been adopted by early majority and late majority. This indicates that the Railink app is in the ascent and mature stages, so it's important for application developers to continue promoting in order to attract more X generation to use Railink application, and for Y generation, developers should keep updating features, and make a loyalty points for the Y generation to continue using the Railink application for the next 5-10 years.","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127906347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A system for real-time detecting and recognizing object person 一种实时检测和识别目标人的系统
International Conference on Critical Infrastructure Protection Pub Date : 2018-11-02 DOI: 10.1145/3290420.3290452
Xin Yi, Xingcheng Luo
{"title":"A system for real-time detecting and recognizing object person","authors":"Xin Yi, Xingcheng Luo","doi":"10.1145/3290420.3290452","DOIUrl":"https://doi.org/10.1145/3290420.3290452","url":null,"abstract":"Today, artificial intelligence (AI) has become more and more popular in daily life, such as face recognition, speech recognition, automated driving. In this paper, a chained system based on neural network model is proposed to detect certain person in video, who is in some list. In this system, face detection and face recognition play an important role, especially in face recognition, At the same time, it requires high real-time performance. The Viola-Jones[1] algorithm is employed to do face detection work, and for face recognition, a convolution neural network is proposed. After we use this system to do some tests in real conditions, we get a result of high real-time performance. In most instances, object people can be recognized correctly with great fluency.","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131516896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An extensible fault tolerance testing framework for microservice-based cloud applications 用于基于微服务的云应用程序的可扩展容错测试框架
International Conference on Critical Infrastructure Protection Pub Date : 2018-11-02 DOI: 10.1145/3290420.3290476
Na Wu, Decheng Zuo, Zhan Zhang
{"title":"An extensible fault tolerance testing framework for microservice-based cloud applications","authors":"Na Wu, Decheng Zuo, Zhan Zhang","doi":"10.1145/3290420.3290476","DOIUrl":"https://doi.org/10.1145/3290420.3290476","url":null,"abstract":"A growing number of enterprises are beginning to adopt the microservice architecture to build their applications in clouds. The microservice architecture breakdowns the traditional development pattern of monolithic applications. The heterogeneity of the development technologies and the accelerated service component lifecycle provide both opportunity and challenge for building high-availability microservice-based applications. Because failures are inevitable in dynamic and complex cloud environments, it is necessary to test the fault tolerant capability of applications. To this end, we propose an extensible fault tolerance testing framework for microservice-based cloud applications based on the non-intrusive fault injection. Users can customize and execute test cases with the proposed framework to verify the manner and performance of the fault tolerance of the target service. We take a use case to show the fault tolerance testing process of the framework.","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131538295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Redesign of user interface for e-government application using usability testing method 使用可用性测试方法重新设计电子政务应用程序的用户界面
International Conference on Critical Infrastructure Protection Pub Date : 2018-11-02 DOI: 10.1145/3290420.3290433
Prilly Putri Adinda, A. Suzianti
{"title":"Redesign of user interface for e-government application using usability testing method","authors":"Prilly Putri Adinda, A. Suzianti","doi":"10.1145/3290420.3290433","DOIUrl":"https://doi.org/10.1145/3290420.3290433","url":null,"abstract":"Along with the development of technology and internet, there are several cities in Indonesia that are being transformed into smart city and one of them is Kota Bekasi. In the process towards implementing the smart city, Kota Bekasi government launched a mobile application to facilitate the public in accessing public service information in order to achieve smart governance. This research aims to analyze the e-government mobile application usability with usability testing method by using the approach of performance metrics, retrospective think aloud protocol (RTA), self-reported metrics through a SUS questionnaire (SUS) and Questionnaire of User Interface Satisfaction (QUIS). The results obtained from this research is the usability level of the application is still very low with score 43.438 which is in the worst imaginable to poor range and still in grade scale F to D. Therefore, performed redesign of user interface using the principles of UI design, 10 Heuristics of User Interface Design and usability testing analysis. The result of redesigning the user interface has been proven to be more effective with SUS score of 82.2.","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"4 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133007876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
An information filtering method for Link16 system based on fresh-keeping degree 基于保鲜度的Link16系统信息过滤方法
International Conference on Critical Infrastructure Protection Pub Date : 2018-11-02 DOI: 10.1145/3290420.3290474
Cuntao Liu, Wendong Zhao, Zhengqin Xu
{"title":"An information filtering method for Link16 system based on fresh-keeping degree","authors":"Cuntao Liu, Wendong Zhao, Zhengqin Xu","doi":"10.1145/3290420.3290474","DOIUrl":"https://doi.org/10.1145/3290420.3290474","url":null,"abstract":"In view of the characteristic of TDMA slot resource allocation in Link16 system used by U.S. military and the application characteristics of battlefield situation information, the concept of information fresh-keeping degree has been proposed, and the delay performance of information transmission based on uniform flow, Poisson flow and burst flow under different time slot allocation is analyzed. Based on OPNET network simulation software, the simulation scenario of Link16 communication network based on planning is designed and constructed, and the correctness of the analysis results is verified. On this basis, a battlefield information filtering mechanism based on fresh-keeping degree is proposed. The theoretical analysis and simulation results show that the mechanism can effectively guarantee the effectiveness of receiving data under the strong service load scenario.","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132768740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Combining depth-estimation-based multi-spectral photometric stereo and SLAM for real-time dense 3D reconstruction 基于深度估计的多光谱测光立体与SLAM相结合进行实时密集三维重建
International Conference on Critical Infrastructure Protection Pub Date : 2018-11-02 DOI: 10.1145/3290420.3290458
Yuanhong Xu, Pei Dong, Liang Lu, Junyu Dong, Lin Qi
{"title":"Combining depth-estimation-based multi-spectral photometric stereo and SLAM for real-time dense 3D reconstruction","authors":"Yuanhong Xu, Pei Dong, Liang Lu, Junyu Dong, Lin Qi","doi":"10.1145/3290420.3290458","DOIUrl":"https://doi.org/10.1145/3290420.3290458","url":null,"abstract":"Obtaining dense 3D reconstruction with low computational cost is one of the important goals in the field of Simultaneous Localization and Mapping (SLAM). In this paper we propose a dense 3D reconstruction framework from monocular multi-spectral video sequences using jointly semi-dense SLAM and depth-estimation-based Multi-spectral Photometric Stereo approaches. Starting from multi-spectral video, we use SALM to reconstruct a semi-dense 3D shape that will be densified. Then the depth maps estimated via conditional Generative Adversarial Nets (cGAN) are fed as priors into optimization-based multi-spectral photometric stereo for dense surface normal recovery. Finally, we use camera poses for view conversion in fusion procedure where we combine the relative sparse point cloud with the dense surface normal to get a dense point cloud. Experiments show that our method can effectively obtain denser 3D reconstruction.","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126165960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-scale representation based on convolutional neural networks for tracking 基于卷积神经网络的多尺度表示跟踪
International Conference on Critical Infrastructure Protection Pub Date : 2018-11-02 DOI: 10.1145/3290420.3290477
Fan Wang, Biying Liu, Yan Yang, Shuangshuo Tang, Xiaopeng Hu
{"title":"Multi-scale representation based on convolutional neural networks for tracking","authors":"Fan Wang, Biying Liu, Yan Yang, Shuangshuo Tang, Xiaopeng Hu","doi":"10.1145/3290420.3290477","DOIUrl":"https://doi.org/10.1145/3290420.3290477","url":null,"abstract":"Visual Tracking technology is one of the major branches in computer vision. Although it has been studied for many years, there are still a number of challenges need to be overcome. In this paper, we propose a tracking algorithm based on multi-scale convolutional neural networks trained on large amounts of tracking sequence data with ground-truth bounding targets. Instead using the raw pixels to feed to the models, we use the image gradient to learn the object representation. We implement this by generating multiple scale version images from Laplacian pyramid, and we maintain a pool of networks corresponding to each kind of video for each scale and utilize the VGG-net to pre-train our models. From the models, we can extract multi-scale feature representations to encode the appearance. In addition, we improved the multiple instance learning tracking algorithm by introduce a penalty factor in the sigmoid function to solve the saturation problem. Using the multi-scale feature representations, we train a classifier combined with the improved MIL algorithm. The results comparing with several state-of-the-art methods on challenging sequences have proved the effectiveness of our proposed algorithm.","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127316805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信