International Conference on Critical Infrastructure Protection最新文献

筛选
英文 中文
Research on 3D gesture recognition in virtual maintenance 虚拟维修中的三维手势识别研究
International Conference on Critical Infrastructure Protection Pub Date : 2018-11-02 DOI: 10.1145/3290420.3290423
Yuling Yan, Minye Chen, Xiaojie Cao
{"title":"Research on 3D gesture recognition in virtual maintenance","authors":"Yuling Yan, Minye Chen, Xiaojie Cao","doi":"10.1145/3290420.3290423","DOIUrl":"https://doi.org/10.1145/3290420.3290423","url":null,"abstract":"In the process of virtual maintenance training, in order to achieve more natural human-computer interaction and enable trainees get the best immersion, it is particularly important to recognize 3D gestures in the real environment. By analyzing the development status of today's three-dimensional gesture recognition technology, gesture recognition device Leap Motion Controller is used to collect gestures in virtual maintenance training, and simulation experiments are carried out by SVM and PNN algorithm. The results show that the static gesture recognition rate of both algorithms can reach 100%, but SVM has a higher computing efficiency. The optimized PNN can achieve higher recognition rate for dynamic gestures, and the processing efficiency after PCA processing is higher.","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125971771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Anomaly detection for health assessment and prediction of diesel generator set 用于柴油发电机组健康评估与预测的异常检测
International Conference on Critical Infrastructure Protection Pub Date : 2018-11-02 DOI: 10.1145/3290420.3290464
Yuxue Liu, Mingzhong Qiao, Shuli Jia
{"title":"Anomaly detection for health assessment and prediction of diesel generator set","authors":"Yuxue Liu, Mingzhong Qiao, Shuli Jia","doi":"10.1145/3290420.3290464","DOIUrl":"https://doi.org/10.1145/3290420.3290464","url":null,"abstract":"Diesel generator set is widely used in a variety of fields including industry, agriculture and daily life. In order to obtain the operation status information of generator set in time to facilitate health management and fault prediction, a wireless sensor network based data collection system is developed. Most of the sensor data is streaming time series data, in which anomalies provide important information in critical situations. Hierarchical temporal memory (HTM) is a technology of cone neuron model based on the interaction between neuroscience and physiology of pyramidal neurons in the cerebral cortex of the human brain. HTM learns time-based patterns in unlabeled data on a continuous basis and it is very robust to noise and high capacity. HTM is used for anomaly detection for diesel generator set health assessment and prediction, and the primary results show that HTM base anomaly detection method is superior to other anomaly detection methods and has the potential to be used in the health assessment and prediction of diesel generator set.","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128127450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An ensemble method 集成方法
International Conference on Critical Infrastructure Protection Pub Date : 2018-11-02 DOI: 10.1145/3290420.3290454
Jun Liang
{"title":"An ensemble method","authors":"Jun Liang","doi":"10.1145/3290420.3290454","DOIUrl":"https://doi.org/10.1145/3290420.3290454","url":null,"abstract":"This paper gives an ensemble method called EKNN-RF. Its base classifiers use an enhanced KNN algorithm where an optimal nearest neighbor number and a distance function on a validation set are obtained to make these parameters better reflect the distribution of real data. The feature set of each base classifier is obtained through bootstrap sampling from original feature set, and make the features with higher importance have a better weight. Then the training set of each base classifier is also obtained by bootstrap sampling based original training set and the newly generated feature set. Finally, each base classifier votes to determine the classification result. Experimental results show that compared with Adaboost, Naive Bayes, RandomForest, DCT-KNN [1], LMKNN+DWKNN [2], W-KNN [3], dwh-KNN [4] and LI-KNN [5], the ensemble method EKNN-RF has certain advantages and higher classification accuracy on some datasets.","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126070204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Performance analysis of joint relay selection and power allocation protocol for two-way relaying networks 双向中继网络联合中继选择与功率分配协议的性能分析
International Conference on Critical Infrastructure Protection Pub Date : 2018-11-02 DOI: 10.1145/3290420.3290467
Hui Zhi, Feiyue Wang, Ziju Huang, Jun Zhu
{"title":"Performance analysis of joint relay selection and power allocation protocol for two-way relaying networks","authors":"Hui Zhi, Feiyue Wang, Ziju Huang, Jun Zhu","doi":"10.1145/3290420.3290467","DOIUrl":"https://doi.org/10.1145/3290420.3290467","url":null,"abstract":"The joint relay selection and power allocation (JRS-PA) protocol combines power allocation (PA) and relay selection (RS) very well for two-way relaying (TWR) networks. In order to explore the system performance of JRS-PA protocol, we study the outage probability and diversity-multiplexing tradeoff (DMT) of JRS-PA protocol in TWR networks. For the sake of obtaining an effective performance evaluation for outage probability over the entire signal-to-noise ratio (SNR) (or transmission power) region, we first obtain the upper-lower bounds. Due to the fact that the obtained lower bound (lower bound 1) is very close to the exact outage probability only in low SNR region, we obtain another lower bound (lower bound 2), which can be used to evaluate the performance well in high SNR. Simulations developed to validate the derived analytical results show that the approximation outage probability can be used well to evaluate system outage probability over the entire SNR region. In addition, the simulation results indicate that JRS-PA protocol can achieve lower outage probability than other two protocols.","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116815944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
State-of-art: text similarity computing 现状:文本相似度计算
International Conference on Critical Infrastructure Protection Pub Date : 2018-11-02 DOI: 10.1145/3290420.3290473
Q. Zeng, Hua Zhao, H. Duan, C. Li, Weijian Ni, N. Xie, Xiuli Diao
{"title":"State-of-art: text similarity computing","authors":"Q. Zeng, Hua Zhao, H. Duan, C. Li, Weijian Ni, N. Xie, Xiuli Diao","doi":"10.1145/3290420.3290473","DOIUrl":"https://doi.org/10.1145/3290420.3290473","url":null,"abstract":"In recent years, there have been extensive studies and rapid progresses in text similarity computing that is one of the host and important techniques in many NLP applications. This paper first introduces the background, the basic computing process, the related resources and the techniques of text similarity computing. By comparing several typical models, three key issues about text similarity computing are addressed in details which include text representation model, the similarity calculation and the quality evaluation. The typical applications of text similarity computing are addressed. Finally, the difficulties to compute the text similarity and many future research directions are discussed..","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127560068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Dynamic pricing at electric vehicle charging stations for waiting time reduction 电动汽车充电站动态定价,减少等待时间
International Conference on Critical Infrastructure Protection Pub Date : 2018-11-02 DOI: 10.1145/3290420.3290462
Peng Xu, Xiaoshan Sun, Junjie Wang, Jinyang Li, Wei Zheng, Hengchang Liu
{"title":"Dynamic pricing at electric vehicle charging stations for waiting time reduction","authors":"Peng Xu, Xiaoshan Sun, Junjie Wang, Jinyang Li, Wei Zheng, Hengchang Liu","doi":"10.1145/3290420.3290462","DOIUrl":"https://doi.org/10.1145/3290420.3290462","url":null,"abstract":"The load balancing of electric vehicle (EV) charging at public charging stations has gained increasing attention in recent years. In reality, a majority of EV drivers choose to charge at the nearest public charging stations. This incurs uneven utilization ratio and longer waiting time at popular stations. This substantially reduces the QoS performance of this public service. Dynamically balancing the charging load thus is an important and challenging problem and yet remains unsolved. In this paper, we propose a novel dynamic pricing approach that allows charging stations to adjust their service fees in real time based on their charging load, which in turn encourages drivers to switch to farther while less crowded and cheaper stations for charging. We develop a notification system for drivers to receive valuable information about all nearby charging stations including electricity price, service fee, estimated waiting time and time to arrive there. Our solution is evaluated through a real-world dataset, called e-charge, which includes 1,851 charging stations in Beijing, China. Experimental results demonstrate that our approach reduces the average waiting time by 21.1% compared to not using the approach. Our work will further shed lights on general dynamic load balancing techniques in cost-sensitive human-in-the-loop IoT applications.","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129101390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An introduction and review of petri net unfolding technology petri网展开技术的介绍与综述
International Conference on Critical Infrastructure Protection Pub Date : 2018-11-02 DOI: 10.1145/3290420.3290430
R. Tao, Faming Lu, Xueping Zhang, Guanye Zhu
{"title":"An introduction and review of petri net unfolding technology","authors":"R. Tao, Faming Lu, Xueping Zhang, Guanye Zhu","doi":"10.1145/3290420.3290430","DOIUrl":"https://doi.org/10.1145/3290420.3290430","url":null,"abstract":"Due to its intuitive graphical representation and variety of mathematical analysis methods, Petri nets are widely used in modeling and analysis of distributed and concurrent systems. However, state explosion problem has been hampering the practical application of Petri nets. Because the state explosion problem mainly results from arbitrary interleaving of highly concurrent activities, net unfolding technology and its complete finite prefixes have been proposed to overcome the problem. Now, with the vigorous development, net unfolding technology is widely applied to many areas including soundness verification of workflow nets, verification of multi-agent system, etc. This paper presents an overview of the latest advances in Petri net unfolding technology and its application. In addition, some promising research directions in unfolding of unbounded Petri nets are proposed.","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121519974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficient design and implementation of channelized reconnaissance receiver 信道化侦察接收机的高效设计与实现
International Conference on Critical Infrastructure Protection Pub Date : 2018-11-02 DOI: 10.1145/3290420.3290478
Xinxing Zhou, Quanwang Cai, Z. Wang, Fei Wen, Y. Qiu
{"title":"Efficient design and implementation of channelized reconnaissance receiver","authors":"Xinxing Zhou, Quanwang Cai, Z. Wang, Fei Wen, Y. Qiu","doi":"10.1145/3290420.3290478","DOIUrl":"https://doi.org/10.1145/3290420.3290478","url":null,"abstract":"The traditional wideband digital channelized receiver in electronic warfare has problems of large amount of data, occupying too much computing resources and complex realization. In order to solve these problems, an optimization design method for channelization based on high processing rate is proposed. Firstly the mathematical model of channelization with arbitrary oversampling factor is derived theoretically, and the appropriate oversampling factor is chosen to establish the polyphase architecture. Secondly the polyphase filter bank is optimized to run at higher rate and all the operations of the channelization are designed to work at the same rate. The proposed method is successfully implemented on the hardware, and the result shows that the method is correct and easy to implement. Additionally its processing speed is fast and the computing resources are saved as well.","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127173985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient SIMD implementation for accelerating convolutional neural network 加速卷积神经网络的高效SIMD实现
International Conference on Critical Infrastructure Protection Pub Date : 2018-11-02 DOI: 10.1145/3290420.3290444
Sung-Jin Lee, Sang-Soo Park, Ki-Seok Chung
{"title":"Efficient SIMD implementation for accelerating convolutional neural network","authors":"Sung-Jin Lee, Sang-Soo Park, Ki-Seok Chung","doi":"10.1145/3290420.3290444","DOIUrl":"https://doi.org/10.1145/3290420.3290444","url":null,"abstract":"Convolutional Neural Network (CNN) has been used in a variety of fields such as computer vision, speech recognition, and natural language processing. Because the amount of computation has increased tremendously, CNN has lately been accelerated through accelerators such as Graphic Processing Unit (GPU). However, resource-constrained embedded platforms such as Internet of Things (IoT) devices cannot afford to have such accelerators. Therefore, it is important to accelerate CNN by only the CPU efficiently. In this paper, we propose a method to accelerate CNN by using the Single Instruction Multiple Data (SIMD) unit integrated in many CPUs. Modern CPU includes a SIMD unit which is commonly used for vector operations. The proposed method implemented on an ARM's NEON can maximize the utilization of vector registers in the SIMD unit. Our proposed implementation has achieved a speed-up of up to 2.66 in execution time and an energy reduction of up to 3.55 times than the conventional implementation.","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127594432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Log-quantization on GRU networks GRU网络的日志量化
International Conference on Critical Infrastructure Protection Pub Date : 2018-11-02 DOI: 10.1145/3290420.3290443
Sangki Park, Sang-Soo Park, Ki-Seok Chung
{"title":"Log-quantization on GRU networks","authors":"Sangki Park, Sang-Soo Park, Ki-Seok Chung","doi":"10.1145/3290420.3290443","DOIUrl":"https://doi.org/10.1145/3290420.3290443","url":null,"abstract":"Today, recurrent neural network (RNN) is used in various applications like image captioning, speech recognition and machine translation. However, because of data dependencies, recurrent neural network is hard to parallelize. Furthermore, to increase network's accuracy, recurrent neural network uses complicated cell units such as long short-term memory (LSTM) and gated recurrent unit (GRU). To run such models on an embedded system, the size of the network model and the amount of computation need to be reduced to achieve low power consumption and low required memory bandwidth. In this paper, implementation of RNN based on GRU with a logarithmic quantization method is proposed. The proposed implementation is synthesized using high-level synthesis (HLS) targeting Xilinx ZCU102 FPGA running at 100MHz. The proposed implementation with an 8-bit log-quantization achieves 90.57% accuracy without re-training or fine-tuning. And the memory usage is 31% lower than that for an implementation with 32-bit floating point data representation.","PeriodicalId":259201,"journal":{"name":"International Conference on Critical Infrastructure Protection","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130023219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信