{"title":"Research on 3D gesture recognition in virtual maintenance","authors":"Yuling Yan, Minye Chen, Xiaojie Cao","doi":"10.1145/3290420.3290423","DOIUrl":"https://doi.org/10.1145/3290420.3290423","url":null,"abstract":"In the process of virtual maintenance training, in order to achieve more natural human-computer interaction and enable trainees get the best immersion, it is particularly important to recognize 3D gestures in the real environment. By analyzing the development status of today's three-dimensional gesture recognition technology, gesture recognition device Leap Motion Controller is used to collect gestures in virtual maintenance training, and simulation experiments are carried out by SVM and PNN algorithm. The results show that the static gesture recognition rate of both algorithms can reach 100%, but SVM has a higher computing efficiency. The optimized PNN can achieve higher recognition rate for dynamic gestures, and the processing efficiency after PCA processing is higher.","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125971771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Anomaly detection for health assessment and prediction of diesel generator set","authors":"Yuxue Liu, Mingzhong Qiao, Shuli Jia","doi":"10.1145/3290420.3290464","DOIUrl":"https://doi.org/10.1145/3290420.3290464","url":null,"abstract":"Diesel generator set is widely used in a variety of fields including industry, agriculture and daily life. In order to obtain the operation status information of generator set in time to facilitate health management and fault prediction, a wireless sensor network based data collection system is developed. Most of the sensor data is streaming time series data, in which anomalies provide important information in critical situations. Hierarchical temporal memory (HTM) is a technology of cone neuron model based on the interaction between neuroscience and physiology of pyramidal neurons in the cerebral cortex of the human brain. HTM learns time-based patterns in unlabeled data on a continuous basis and it is very robust to noise and high capacity. HTM is used for anomaly detection for diesel generator set health assessment and prediction, and the primary results show that HTM base anomaly detection method is superior to other anomaly detection methods and has the potential to be used in the health assessment and prediction of diesel generator set.","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128127450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An ensemble method","authors":"Jun Liang","doi":"10.1145/3290420.3290454","DOIUrl":"https://doi.org/10.1145/3290420.3290454","url":null,"abstract":"This paper gives an ensemble method called EKNN-RF. Its base classifiers use an enhanced KNN algorithm where an optimal nearest neighbor number and a distance function on a validation set are obtained to make these parameters better reflect the distribution of real data. The feature set of each base classifier is obtained through bootstrap sampling from original feature set, and make the features with higher importance have a better weight. Then the training set of each base classifier is also obtained by bootstrap sampling based original training set and the newly generated feature set. Finally, each base classifier votes to determine the classification result. Experimental results show that compared with Adaboost, Naive Bayes, RandomForest, DCT-KNN [1], LMKNN+DWKNN [2], W-KNN [3], dwh-KNN [4] and LI-KNN [5], the ensemble method EKNN-RF has certain advantages and higher classification accuracy on some datasets.","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126070204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance analysis of joint relay selection and power allocation protocol for two-way relaying networks","authors":"Hui Zhi, Feiyue Wang, Ziju Huang, Jun Zhu","doi":"10.1145/3290420.3290467","DOIUrl":"https://doi.org/10.1145/3290420.3290467","url":null,"abstract":"The joint relay selection and power allocation (JRS-PA) protocol combines power allocation (PA) and relay selection (RS) very well for two-way relaying (TWR) networks. In order to explore the system performance of JRS-PA protocol, we study the outage probability and diversity-multiplexing tradeoff (DMT) of JRS-PA protocol in TWR networks. For the sake of obtaining an effective performance evaluation for outage probability over the entire signal-to-noise ratio (SNR) (or transmission power) region, we first obtain the upper-lower bounds. Due to the fact that the obtained lower bound (lower bound 1) is very close to the exact outage probability only in low SNR region, we obtain another lower bound (lower bound 2), which can be used to evaluate the performance well in high SNR. Simulations developed to validate the derived analytical results show that the approximation outage probability can be used well to evaluate system outage probability over the entire SNR region. In addition, the simulation results indicate that JRS-PA protocol can achieve lower outage probability than other two protocols.","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116815944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Q. Zeng, Hua Zhao, H. Duan, C. Li, Weijian Ni, N. Xie, Xiuli Diao
{"title":"State-of-art: text similarity computing","authors":"Q. Zeng, Hua Zhao, H. Duan, C. Li, Weijian Ni, N. Xie, Xiuli Diao","doi":"10.1145/3290420.3290473","DOIUrl":"https://doi.org/10.1145/3290420.3290473","url":null,"abstract":"In recent years, there have been extensive studies and rapid progresses in text similarity computing that is one of the host and important techniques in many NLP applications. This paper first introduces the background, the basic computing process, the related resources and the techniques of text similarity computing. By comparing several typical models, three key issues about text similarity computing are addressed in details which include text representation model, the similarity calculation and the quality evaluation. The typical applications of text similarity computing are addressed. Finally, the difficulties to compute the text similarity and many future research directions are discussed..","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127560068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic pricing at electric vehicle charging stations for waiting time reduction","authors":"Peng Xu, Xiaoshan Sun, Junjie Wang, Jinyang Li, Wei Zheng, Hengchang Liu","doi":"10.1145/3290420.3290462","DOIUrl":"https://doi.org/10.1145/3290420.3290462","url":null,"abstract":"The load balancing of electric vehicle (EV) charging at public charging stations has gained increasing attention in recent years. In reality, a majority of EV drivers choose to charge at the nearest public charging stations. This incurs uneven utilization ratio and longer waiting time at popular stations. This substantially reduces the QoS performance of this public service. Dynamically balancing the charging load thus is an important and challenging problem and yet remains unsolved. In this paper, we propose a novel dynamic pricing approach that allows charging stations to adjust their service fees in real time based on their charging load, which in turn encourages drivers to switch to farther while less crowded and cheaper stations for charging. We develop a notification system for drivers to receive valuable information about all nearby charging stations including electricity price, service fee, estimated waiting time and time to arrive there. Our solution is evaluated through a real-world dataset, called e-charge, which includes 1,851 charging stations in Beijing, China. Experimental results demonstrate that our approach reduces the average waiting time by 21.1% compared to not using the approach. Our work will further shed lights on general dynamic load balancing techniques in cost-sensitive human-in-the-loop IoT applications.","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129101390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An introduction and review of petri net unfolding technology","authors":"R. Tao, Faming Lu, Xueping Zhang, Guanye Zhu","doi":"10.1145/3290420.3290430","DOIUrl":"https://doi.org/10.1145/3290420.3290430","url":null,"abstract":"Due to its intuitive graphical representation and variety of mathematical analysis methods, Petri nets are widely used in modeling and analysis of distributed and concurrent systems. However, state explosion problem has been hampering the practical application of Petri nets. Because the state explosion problem mainly results from arbitrary interleaving of highly concurrent activities, net unfolding technology and its complete finite prefixes have been proposed to overcome the problem. Now, with the vigorous development, net unfolding technology is widely applied to many areas including soundness verification of workflow nets, verification of multi-agent system, etc. This paper presents an overview of the latest advances in Petri net unfolding technology and its application. In addition, some promising research directions in unfolding of unbounded Petri nets are proposed.","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121519974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xinxing Zhou, Quanwang Cai, Z. Wang, Fei Wen, Y. Qiu
{"title":"Efficient design and implementation of channelized reconnaissance receiver","authors":"Xinxing Zhou, Quanwang Cai, Z. Wang, Fei Wen, Y. Qiu","doi":"10.1145/3290420.3290478","DOIUrl":"https://doi.org/10.1145/3290420.3290478","url":null,"abstract":"The traditional wideband digital channelized receiver in electronic warfare has problems of large amount of data, occupying too much computing resources and complex realization. In order to solve these problems, an optimization design method for channelization based on high processing rate is proposed. Firstly the mathematical model of channelization with arbitrary oversampling factor is derived theoretically, and the appropriate oversampling factor is chosen to establish the polyphase architecture. Secondly the polyphase filter bank is optimized to run at higher rate and all the operations of the channelization are designed to work at the same rate. The proposed method is successfully implemented on the hardware, and the result shows that the method is correct and easy to implement. Additionally its processing speed is fast and the computing resources are saved as well.","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127173985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient SIMD implementation for accelerating convolutional neural network","authors":"Sung-Jin Lee, Sang-Soo Park, Ki-Seok Chung","doi":"10.1145/3290420.3290444","DOIUrl":"https://doi.org/10.1145/3290420.3290444","url":null,"abstract":"Convolutional Neural Network (CNN) has been used in a variety of fields such as computer vision, speech recognition, and natural language processing. Because the amount of computation has increased tremendously, CNN has lately been accelerated through accelerators such as Graphic Processing Unit (GPU). However, resource-constrained embedded platforms such as Internet of Things (IoT) devices cannot afford to have such accelerators. Therefore, it is important to accelerate CNN by only the CPU efficiently. In this paper, we propose a method to accelerate CNN by using the Single Instruction Multiple Data (SIMD) unit integrated in many CPUs. Modern CPU includes a SIMD unit which is commonly used for vector operations. The proposed method implemented on an ARM's NEON can maximize the utilization of vector registers in the SIMD unit. Our proposed implementation has achieved a speed-up of up to 2.66 in execution time and an energy reduction of up to 3.55 times than the conventional implementation.","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127594432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Log-quantization on GRU networks","authors":"Sangki Park, Sang-Soo Park, Ki-Seok Chung","doi":"10.1145/3290420.3290443","DOIUrl":"https://doi.org/10.1145/3290420.3290443","url":null,"abstract":"Today, recurrent neural network (RNN) is used in various applications like image captioning, speech recognition and machine translation. However, because of data dependencies, recurrent neural network is hard to parallelize. Furthermore, to increase network's accuracy, recurrent neural network uses complicated cell units such as long short-term memory (LSTM) and gated recurrent unit (GRU). To run such models on an embedded system, the size of the network model and the amount of computation need to be reduced to achieve low power consumption and low required memory bandwidth. In this paper, implementation of RNN based on GRU with a logarithmic quantization method is proposed. The proposed implementation is synthesized using high-level synthesis (HLS) targeting Xilinx ZCU102 FPGA running at 100MHz. The proposed implementation with an 8-bit log-quantization achieves 90.57% accuracy without re-training or fine-tuning. And the memory usage is 31% lower than that for an implementation with 32-bit floating point data representation.","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130023219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}