2020 2nd International Conference on Advances in Computer Technology, Information Science and Communications (CTISC)最新文献

筛选
英文 中文
Research on an improved practical byzantine fault tolerance algorithm 一种改进的实用拜占庭容错算法研究
Seybou Sakho, Jian-biao Zhang, Firdaous Essaf, Khalid Badiss, Tchewafei Abide, Julius Kibet Kiprop
{"title":"Research on an improved practical byzantine fault tolerance algorithm","authors":"Seybou Sakho, Jian-biao Zhang, Firdaous Essaf, Khalid Badiss, Tchewafei Abide, Julius Kibet Kiprop","doi":"10.1109/CTISC49998.2020.00035","DOIUrl":"https://doi.org/10.1109/CTISC49998.2020.00035","url":null,"abstract":"PBFT is a consensus algorithm based on Byzantine fault tolerance that is widely used in current systems like blockchains. However, this algorithm has some problems that slow down its use on a large scale. In the interest of solving its problems, we have combined it with the Distributed Proof of Stake (DPoS) algorithm and smart contract technology to improve it and make it better. For this, Smart contracts were deployed in the network to improve the selection process of accounting nodes and participated in the operating process of the PBFT algorithm in order to make the selection process more transparent, incorruptible, and secure. Concerning the problem of the scalability of the nodes of the system, it will be possible to make a readjustment of the consensus algorithm to make it more flexible. The modification can be done by implementing readjustment counters, which will count the number of nodes in the network each time a consensus is reached or a node is ejected from the network, then automatically distributes the list of new nodes in the network. This new list of nodes will constitute the new network on which the new consensus will be based. To make it more secure and more sensitive to Byzantine faults, the sensitivity margin is improved.","PeriodicalId":266384,"journal":{"name":"2020 2nd International Conference on Advances in Computer Technology, Information Science and Communications (CTISC)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128810880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
RoadRouter: Multi-Task Learning of Road Network Extraction with Graph Representation RoadRouter:基于图表示的道路网络提取的多任务学习
Shicheng Zu, LinTao Wan, Dong Li, Zhongfeng Qiu
{"title":"RoadRouter: Multi-Task Learning of Road Network Extraction with Graph Representation","authors":"Shicheng Zu, LinTao Wan, Dong Li, Zhongfeng Qiu","doi":"10.1109/CTISC49998.2020.00031","DOIUrl":"https://doi.org/10.1109/CTISC49998.2020.00031","url":null,"abstract":"Since most state-of-the-art road mappers pose the road network extraction as a binary segmentation trained on the RGB dataset, our proposed ‘RoadRouter’ system pushes the frontier by classifying the roads into seven categories based on the SpaceNet annotations. Our system is built with the Red/Near-Infrared dataset, making use of the asphalt’s spectral signature to differentiate roads from other influential noises. For addressing the disconnected road gaps problem, we propose the stacked hourglass network with dual supervision. Inspired by the human behavior of tracing the road networks via a constant orientation, incorporating the orientation learning as auxiliary loss leads to more robust and synergistic representations favorable for road connectivity refinement. The intermediate supervision provided by stacking the hourglass modules successively also serves as a connectivity refinement mechanism. In the case of modeling the long-range interaction among the per-pixel predictions, the traditional color-based appearance kernel is not useful in CRF post-processing. We propose the pixel-wise orientation CRF specific for bridging the fragmented road segments. We also formalize an image transformation protocol to parse the topology from the road segmentation. The undirected closed graphs can thereby be constructed from probabilistic inferences. Various graph-based algorithms, e.g., the shortest path searching, can be implemented on the road graph representations.","PeriodicalId":266384,"journal":{"name":"2020 2nd International Conference on Advances in Computer Technology, Information Science and Communications (CTISC)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127427413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Prediction of Optimal Power Allocation for Enhancing Security-Reliability Tradeoff with the Application of Artificial Neural Networks 应用人工神经网络预测最优功率分配增强安全-可靠性权衡
Xiaoyu Wang, Yuanyuan Gao, Guangna Zhang, Mingxi Guo
{"title":"Prediction of Optimal Power Allocation for Enhancing Security-Reliability Tradeoff with the Application of Artificial Neural Networks","authors":"Xiaoyu Wang, Yuanyuan Gao, Guangna Zhang, Mingxi Guo","doi":"10.1109/CTISC49998.2020.00013","DOIUrl":"https://doi.org/10.1109/CTISC49998.2020.00013","url":null,"abstract":"In this paper, we propose a power allocation scheme in order to improve both secure and reliable performance in the wireless two-hop threshold-selection decode-and-forward (DF) relaying networks, which is so crucial to set a threshold value related the signal-to-noise ratio (SNR) of the source signal at relay nodes for perfect decoding. We adapt the maximal-ratio combining (MRC) receiving SNR from the direct and relaying paths both at the destination and at the eavesdropper. Particularly worth mentioning is that the closed expression form of outage probability and intercept probability is driven, which can quantify the security and reliability, respectively. We also make endeavors to utilize a metric to tradeoff the security and the reliability (SRT) and find out the relevance between them in the balanced case. But beyond that, in the pursuit of tradeoff performance, power allocation tends to depend on the threshold value. In other words, it provides a new method optimizing total power to the source and the relay by the threshold value. The results are obtained from analysis, confirmed by simulation, and predicted by artificial neural networks (ANNs), which is trained with back propagation (BP) algorithm, and thus the feasibility of the proposed method is verified.","PeriodicalId":266384,"journal":{"name":"2020 2nd International Conference on Advances in Computer Technology, Information Science and Communications (CTISC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122076460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Web Masquerade Based on the MAC Addresses : How to change the web contents without changing the corresponding uniform resource locators 基于MAC地址的Web伪装:在不改变对应的统一资源定位符的情况下,改变Web内容
Shigeo Akashi, Yao Tong
{"title":"Web Masquerade Based on the MAC Addresses : How to change the web contents without changing the corresponding uniform resource locators","authors":"Shigeo Akashi, Yao Tong","doi":"10.1109/CTISC49998.2020.00024","DOIUrl":"https://doi.org/10.1109/CTISC49998.2020.00024","url":null,"abstract":"Web masquerade is defined as the network skill enabling to display various kinds of web contents on the monitors without changing URLs which are input into the web browsers. It is well known that there is a method of web masquerade which can change the web contents according to a change of the switchport to which a personal computer is directly connected. In this paper, we introduce another method of web masquerade which can change the web contents according to a change of the MAC address attached to a personal computer. In other words, we introduce the new system playing the role at the datalink layer which is analogous to the role being played by the vlan membership policy system at the network layer.","PeriodicalId":266384,"journal":{"name":"2020 2nd International Conference on Advances in Computer Technology, Information Science and Communications (CTISC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129487713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improved Blockchain Consensus Mechanism Based on PBFT Algorithm 基于PBFT算法的改进区块链共识机制
Ge Yu, Bin Wu, Xinxin Niu
{"title":"Improved Blockchain Consensus Mechanism Based on PBFT Algorithm","authors":"Ge Yu, Bin Wu, Xinxin Niu","doi":"10.1109/CTISC49998.2020.00009","DOIUrl":"https://doi.org/10.1109/CTISC49998.2020.00009","url":null,"abstract":"Practical Byzantine Fault Tolerance (PBFT) is a blockchain consensus mechanism that is widely used at present, but the confidence of blockchain node in PBFT cannot be guaranteed, and a large amount of communication resources will be consumed in the process of reaching consensus. The paper proposes a new consensus mechanism, namely the Dynamic Grouping Byzantine Fault Tolerance Mechanism (DGBFT) based on confidence. The principles of DGBFT are as follows: 1) By extending the node’s attributes with the confidence, and designing a mechanism to evaluate the node’s confidence, therefore, the confidence adjustment and grouping adjustment can be performed on the nodes in the system. By grouping the confidence nodes by the confidence group, the communication complexity is greatly reduced, and the malicious nodes can be effectively excluded. Finally, the experimental results show that the blockchain applying the improved mechanism can significantly improve the communication efficiency of the system and the overall confidence of the system.","PeriodicalId":266384,"journal":{"name":"2020 2nd International Conference on Advances in Computer Technology, Information Science and Communications (CTISC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117262755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
CTISC 2020 Committees 中国科协2020委员会
S. Hsieh, Shigeo Akashi, Ping Guo, Xiaochen Yuan, Bo-Hao Chen, Yuan Ze, Jiankang Ren
{"title":"CTISC 2020 Committees","authors":"S. Hsieh, Shigeo Akashi, Ping Guo, Xiaochen Yuan, Bo-Hao Chen, Yuan Ze, Jiankang Ren","doi":"10.1109/ctisc49998.2020.00006","DOIUrl":"https://doi.org/10.1109/ctisc49998.2020.00006","url":null,"abstract":"International Technical Program Committees William (Michael) Pace, Texas A&M University, USA Francesco Colace, University of Salerno, Itlay Bok-Min Goi (SMIEEE), Universiti Tunku Abdul Rahman (UTAR), Malaysia Emanuel S. Grant, University of North Dakota, US Hosam El-Ocla (SMIEEE), Lakehead University, Canada Yung-Hui Li, National Central University, Taiwan Wai Lam Hoo, University of Malaya, Malaysia Jain-shing Liu, Providence University, Taiwan Xin Lou, Advanced Digital Sciences Center, Singapore Muhammad Roil Bilad, Universiti Teknologi Petronas, Malaysia Hussain Al-Aqrabi, University of Huddersfield, UK Bohumil Brtník, University of Pardubice, Czech Republic Zainb Dawod, Brunel University London, UK Cathryn Peoples, The Open University, UK Ahmad El-Banna, Benha University, Egypt Zakariya Chabani, Istanbul University, Turkey Seppo Sirkemaa, University of Turku, Finland Juryon Paik, Pyeongtaek University, South Korea Anas M.R. AlSobeh, Yarmouk University, Jordan Shamsul Jamel Elias, Universiti Teknologi MARA, Malaysia Syed Farooq Ali, University of Management and Technology, Pakistan Hadi Sutopo, Kalbis Institute, Indonesia Turi, Michael, California State University, Fullerton, USA Anastasia Anagnostou, Brunel University London, UK","PeriodicalId":266384,"journal":{"name":"2020 2nd International Conference on Advances in Computer Technology, Information Science and Communications (CTISC)","volume":"347 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124278773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LFTag: A Scalable Visual Fiducial System with Low Spatial Frequency LFTag:一种可扩展的低空间频率视觉基准系统
Ben Wang
{"title":"LFTag: A Scalable Visual Fiducial System with Low Spatial Frequency","authors":"Ben Wang","doi":"10.1109/CTISC49998.2020.00030","DOIUrl":"https://doi.org/10.1109/CTISC49998.2020.00030","url":null,"abstract":"Visual fiducial systems are a key component of many robotics and AR/VR applications for 6-DOF monocular relative pose estimation and target identification. This paper presents LFTag, a visual fiducial system based on topological detection and relative position data encoding which optimizes data density within spatial frequency constraints. The marker is constructed to resolve rotational ambiguity, which combined with the robust geometric and topological false positive rejection, allows all marker bits to be used for data.When compared to existing state-of-the-art square binary markers (AprilTag) and topological markers (TopoTag) in simulation, the proposed fiducial system (LFTag) offers significant advances in dictionary size and range. LFTag 3×3 achieves 546 times the dictionary size of AprilTag 25h9 and LFTag 4×4 achieves 126 thousand times the dictionary size of AprilTag 41h12 while simultaneously achieving longer detection range. LFTag 3×3 also achieves more than twice the detection range of TopoTag 4×4 at the same dictionary size.","PeriodicalId":266384,"journal":{"name":"2020 2nd International Conference on Advances in Computer Technology, Information Science and Communications (CTISC)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124299244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Parameter Estimation of Sinusoid Frequency Modulation Signal in Heavy-tailed Noise 重尾噪声下正弦波调频信号的参数估计
Xing Yongchang, Hong Wei, Zhang Heng, Ding Youfeng, Sun Bin, Hu Wankun
{"title":"Parameter Estimation of Sinusoid Frequency Modulation Signal in Heavy-tailed Noise","authors":"Xing Yongchang, Hong Wei, Zhang Heng, Ding Youfeng, Sun Bin, Hu Wankun","doi":"10.1109/CTISC49998.2020.00014","DOIUrl":"https://doi.org/10.1109/CTISC49998.2020.00014","url":null,"abstract":"In this paper, we proposed a novel algorithm based on the generalized cyclic stationary characteristics for estimating sinusoidal frequency-modulated (SFM) signals in the presence of heavy-tailed noise. The properties of the cyclic autocorrelation function for parameter estimation are first investigated. Then, the modulation frequency of the SFM signal is estimated based on the generalized cyclic stationary characteristics. Finally, the carrier frequency and modulation index are achieved by constructing the reference signal. Theoretical analysis and numerical simulation indicate that the proposed method can significantly improve the performance of parameters estimation of SFM signals in the presence of heavy-tailed noise.","PeriodicalId":266384,"journal":{"name":"2020 2nd International Conference on Advances in Computer Technology, Information Science and Communications (CTISC)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122891049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Low-altitude UAV Detection Method Based on One-staged Detection Framework 基于一级检测框架的低空无人机检测方法
Wenchao Zhao, Qiang Zhang, Haihan Li, Bin Li, Jiaohao Zhang
{"title":"Low-altitude UAV Detection Method Based on One-staged Detection Framework","authors":"Wenchao Zhao, Qiang Zhang, Haihan Li, Bin Li, Jiaohao Zhang","doi":"10.1109/CTISC49998.2020.00026","DOIUrl":"https://doi.org/10.1109/CTISC49998.2020.00026","url":null,"abstract":"Illegal flight of unmanned aerial vehicles (UAVs) poses serious threats to the public and national security. With the characteristics of small size and low flight height, UAVs are difficult for the traditional air-defense system to detect. Therefore, to deal with the illegal UAV flight, this paper proposed a state-of-the art low-altitude UAV detection method. Firstly, a large-scale UAV data set including multiple kinds of UAVs is collected and constructed. Then, based on one stage detection framework, the UAV detection (UAVDet) network is presented with the improvement of more detection scales, utilization of focal loss and specific data augmentation. Experiment results show that the proposed UAV detection method has significant improvement on UAV detection performance, and it is competent to achieve real-time and effective UAV detection.","PeriodicalId":266384,"journal":{"name":"2020 2nd International Conference on Advances in Computer Technology, Information Science and Communications (CTISC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129362425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Research on Spectrum Sensing System Based on Composite Neural Network 基于复合神经网络的频谱传感系统研究
Long Zhang, Min Zhao, Cheng Tan, Gang Li, Chunying Lv
{"title":"Research on Spectrum Sensing System Based on Composite Neural Network","authors":"Long Zhang, Min Zhao, Cheng Tan, Gang Li, Chunying Lv","doi":"10.1109/CTISC49998.2020.00010","DOIUrl":"https://doi.org/10.1109/CTISC49998.2020.00010","url":null,"abstract":"Electromagnetic spectrum sensing is an important component of electromagnetic spectrum capability. With the development of spectrum sensing technology, there are still many problems and challenges in practical applications. For example, though the spectrum sensing field has diversified, the system is still based on manual operation; there are massive and diverse data, but the depth and breadth of data mining are insufficient; there is a large amount of historical data, multiple heterogeneous and unlabeled data types, and multidimensional non fusion platforms. The above difficulties hinder the construction of electromagnetic spectrum sensing ability and efficiency. Therefore, we propose a spectrum sensing system based on composite neural network architecture, the overall architecture includes three layers; spectrum sensing layer, data processing layer and situation analysis layer, which realizes the bottom data processing and high-dimensional spectrum sensing analysis. With the development of artificial intelligence technology [1], the above problems can be further improved and the development from artificial to intelligent can be realized gradually by using deep learning algorithm framework and exploring the advanced artificial intelligence technology. Finally, a three-dimensional electromagnetic situation map is formed from the time dimension, space dimension and spectrum dimension, so as to realize intelligence.","PeriodicalId":266384,"journal":{"name":"2020 2nd International Conference on Advances in Computer Technology, Information Science and Communications (CTISC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122727355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信