2021 3rd International Conference on Advances in Computer Technology, Information Science and Communication (CTISC)最新文献

筛选
英文 中文
A Recognition Algorithm for Signal Modulation Modes of Tactical Data Link 一种战术数据链信号调制模式识别算法
Qi Liu, Yuwen Wang, Juan Guo, Xintong Yao, Shuo Jin, Yujie Chen
{"title":"A Recognition Algorithm for Signal Modulation Modes of Tactical Data Link","authors":"Qi Liu, Yuwen Wang, Juan Guo, Xintong Yao, Shuo Jin, Yujie Chen","doi":"10.1109/CTISC52352.2021.00047","DOIUrl":"https://doi.org/10.1109/CTISC52352.2021.00047","url":null,"abstract":"The identification of the modulation mode is the key to the identification and differentiation of data link signals. In view of this, for the modulation modes (π/4-DQPSK, MSK, QPSK, 8PSK, BPSK, OQPSK) of the U.S. military Link-11, Link-16, Link-22 and CDL tactical data link signals, this paper proposes a tactical data link signal modulation recognition algorithm based on joint features. It mainly studies the extraction of four feature parameters of each modulated signal under Gaussian channels : high-order cumulant, square spectrum, fourth-order spectrum and high-order cumulant of differential signals. After that, several common tactical data link modulated signals are identified and classified by the decision tree. Finally, the simulation experiments shows that the algorithm has low computational complexity and high recognition rate, and has strong reliability and accuracy.","PeriodicalId":268378,"journal":{"name":"2021 3rd International Conference on Advances in Computer Technology, Information Science and Communication (CTISC)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123061294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Community Detection Algorithm for Heterogeneous Networks Based on Central Node and Seed Community Extension 基于中心节点和种子社区扩展的异构网络社区检测算法
Qichao Peng, Kebin Chen, Qi Liu, Yaofeng Su, Yunjun Lu
{"title":"Community Detection Algorithm for Heterogeneous Networks Based on Central Node and Seed Community Extension","authors":"Qichao Peng, Kebin Chen, Qi Liu, Yaofeng Su, Yunjun Lu","doi":"10.1109/CTISC52352.2021.00040","DOIUrl":"https://doi.org/10.1109/CTISC52352.2021.00040","url":null,"abstract":"In reality, most complex networks are heterogeneous and large-scale, they contain a variety of entity types and entity relationships, and their community structure often has the characteristics of overlap, complexity and diversity. The existing community detection algorithms do not fully consider the above characteristics, and the algorithm has low accuracy and large time complexity. In this paper, we study the community detection problem of large-scale heterogeneous complex networks based on general topology. We propose a multi-dimensional community detection algorithm Hete_M based on the community of central node, which can accurately detect the overlapping and heterogeneous communities of complex networks from multiple dimensions, has low time complexity and is suitable for large-scale heterogeneous complex networks.","PeriodicalId":268378,"journal":{"name":"2021 3rd International Conference on Advances in Computer Technology, Information Science and Communication (CTISC)","volume":"312 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115556557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Product click-through rate prediction model integrating self-attention mechanism 整合自关注机制的产品点击率预测模型
Tong Zhu, Shuqin Li, Chunquan Liang, B. Liu, Xiaopeng Li
{"title":"Product click-through rate prediction model integrating self-attention mechanism","authors":"Tong Zhu, Shuqin Li, Chunquan Liang, B. Liu, Xiaopeng Li","doi":"10.1109/CTISC52352.2021.00056","DOIUrl":"https://doi.org/10.1109/CTISC52352.2021.00056","url":null,"abstract":"In the commodity click-through rate prediction task, existing deep learning models implicitly construct combinatorial features and cannot know the optimal order of the combinatorial features that can be learned; at the same time, the intrinsic correlation between features is ignored, and invalid feature combinations will bring unnecessary noise to the model. To address these problems, a product click-through prediction model (ACDeepFM) incorporating a self-attentive mechanism is proposed, which first uses the self-attentive mechanism to mine the intrinsic connections among input features and adaptively models the weights of input features. Then a compressed interaction network is added to precisely mine the effect of different order combinations of features on the model prediction results. Then deep neural networks are added to fit complex interaction scenarios between users and items. Finally, the information extracted from the self-attentive mechanism module, the deep neural network module and the compressed interaction network module are fed into the subsequent multilayer perceptron layer to further learn meaningful combinatorial features. Experimental results on two publicly available datasets show that the proposed model achieves higher AUC values and lower Logloss values relative to FM, DNN, DeepFM and xDeepFM models, validating the effectiveness of the ACDeepFM model.","PeriodicalId":268378,"journal":{"name":"2021 3rd International Conference on Advances in Computer Technology, Information Science and Communication (CTISC)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129762942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Shannon Capacity under Relative Motion 相对运动下的香农容量
Xu Tang, Nanzhou Hu, Hongzhi Zhao
{"title":"Shannon Capacity under Relative Motion","authors":"Xu Tang, Nanzhou Hu, Hongzhi Zhao","doi":"10.1109/CTISC52352.2021.00014","DOIUrl":"https://doi.org/10.1109/CTISC52352.2021.00014","url":null,"abstract":"The classical form of Shannon capacity describes the quasi-static capacity, i.e., the movement of receivers or transmitters is negligible compared with the signal propagation speed (SPS). When the speed of relative motion (SRM) between transmitters and receivers is comparable with SPS, the capacity may deviate from the classical form. This study takes a different perspective on the Shannon capacity and extends the classical form of capacity with constraints of SRM and SPS. The special theory of relativity is used to analyze the capacity when SRM approaches the speed of light. Results imply the threshold below in which we can neglect the capacity deviating from the classical form for wireless radios. While for low SPS which is far less than light speed, modifying factors should be particularly added to the classical capacity form.","PeriodicalId":268378,"journal":{"name":"2021 3rd International Conference on Advances in Computer Technology, Information Science and Communication (CTISC)","volume":"1569 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129136113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of Structured-light 3D Reconstruction in Virtual Assembly 结构光三维重建在虚拟装配中的应用
Youteng Wan, Ang Cai, Qi Wei, Jing Liu, Xiangjia Chen, Jiaming Feng, Zhan Song, Juan Zhao
{"title":"Application of Structured-light 3D Reconstruction in Virtual Assembly","authors":"Youteng Wan, Ang Cai, Qi Wei, Jing Liu, Xiangjia Chen, Jiaming Feng, Zhan Song, Juan Zhao","doi":"10.1109/CTISC52352.2021.00077","DOIUrl":"https://doi.org/10.1109/CTISC52352.2021.00077","url":null,"abstract":"3D modeling is a time-consuming and laborious work in virtual assembly. How to reconstruct parts with various shapes quickly and accurately is an important topic in the field of reverse engineering. In this paper, a popgun and its special-shaped parts are reconstructed by using a self-developed surface structured light scanning system and a commercial line structured light scanning system, with an accuracy less than 0.1mm. And the virtual assembly of the popgun is completed according to the high-precision 3D solid models.","PeriodicalId":268378,"journal":{"name":"2021 3rd International Conference on Advances in Computer Technology, Information Science and Communication (CTISC)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124489191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Prosody-Enhanced Mandarin Text-to-Speech System 韵律增强的普通话文本转语音系统
Fangfang Niu, Wushour Silamu
{"title":"Prosody-Enhanced Mandarin Text-to-Speech System","authors":"Fangfang Niu, Wushour Silamu","doi":"10.1109/CTISC52352.2021.00020","DOIUrl":"https://doi.org/10.1109/CTISC52352.2021.00020","url":null,"abstract":"The end-to-end Text-to-Speech (TTS), which can generate speech directly from a given sequence of graphemes or phonemes, has shown superior performance over the conventional TTS. It has been able to generate high-quality speech, but it is still unable to control the local prosody such as word-level emphasis. Although the prominence of synthesized speech can be adjusted by explicit prosody tags, the acquisition of such tags is often time-consuming and laborious. This paper focuses on a deep neural prominence prediction module, using Continuous Wavelet Transform (CWT) to analyze the prosodic signal of input data, get the corresponding continuous prominence values of Chinese characters in the text to guide the training of a prominence prediction network, so that it can realize the mapping from the input text to the corresponding prominence value of each Chinese character in the text. The proposed method does not need to label the training data manually, so a fully automatic prosody control system is realized. Experiments show that the proposed system can generate more natural and expressive speech.","PeriodicalId":268378,"journal":{"name":"2021 3rd International Conference on Advances in Computer Technology, Information Science and Communication (CTISC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121998102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Conditional GAN with Effective Attention for SAR-to-Optical Image Translation 有效关注sar到光学图像转换的条件GAN
Tianzhu Yu, Jiexin Zhang, Jianjiang Zhou
{"title":"Conditional GAN with Effective Attention for SAR-to-Optical Image Translation","authors":"Tianzhu Yu, Jiexin Zhang, Jianjiang Zhou","doi":"10.1109/CTISC52352.2021.00009","DOIUrl":"https://doi.org/10.1109/CTISC52352.2021.00009","url":null,"abstract":"Synthetic aperture radar (SAR) is an effective observation technology, which is widely used in industry and agriculture. However, SAR images have speckle noise because of its imaging mechanism, so it is difficult to obtain useful information from them directly. Generative adversarial networks (GANs) have great performance in image translation with the development of deep learning, SAR images can be translated into optical images. However, due to the complex scene, low resolution and speckle noise, the generated images obtained by the existing methods are not satisfactory. In this paper, we propose a method based on conditional GAN (CGAN) for image translation from SAR images to optical images. We use the attention mechanism, which means that the network attaches importance to useful features and ignores unimportant ones. We apply discrete cosine transform (DCT) as loss function to extract the low frequency features in the image. Our experiments show that the quality of the images generated by our method is better than that of some famous methods.","PeriodicalId":268378,"journal":{"name":"2021 3rd International Conference on Advances in Computer Technology, Information Science and Communication (CTISC)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132020657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Algorithm of Handwritten String Segmentation Based on Recursive Rraining in Background Domain 基于背景域递归训练的手写字符串分割算法
Jia Luo, Kai-lin He, Xiaojing Ding
{"title":"Algorithm of Handwritten String Segmentation Based on Recursive Rraining in Background Domain","authors":"Jia Luo, Kai-lin He, Xiaojing Ding","doi":"10.1109/CTISC52352.2021.00026","DOIUrl":"https://doi.org/10.1109/CTISC52352.2021.00026","url":null,"abstract":"How to accurately cut the handwritten string especially the sticky string, has become a key part of recognizing handwritten strings. Aiming at the traditional segmentation algorithm has some problems, such as more complex、the segmentation effect is not good and so on, this paper proposes a segmentation algorithm based on background domain recursive training. This algorithm is a common algorithm for handwritten digit string segmentation and English string segmentation. The principle is the use of handwritten string at the adhesion of the background domain features and recursive neural network RNN fusion of special mechanisms. It completes by modeling, training and implementation of three steps. RNN modeling is the core of the algorithm, it contain two important parts: ①Assignment for the background domain, extracting the eigenvector value of the depression area by the principle of adjacent matching, the connection weights of the RNN input layer are calculated.② Using the minimum area selection principle to modify eigenvector values in the RNN's acceptance layer, the connection weight of the layer are calculated agin. After modeling completion, RNN is training samples、studying and remembering. Finally, use the knowledge that RNN has learned to complete real segmentation, the effect is satisfactory.","PeriodicalId":268378,"journal":{"name":"2021 3rd International Conference on Advances in Computer Technology, Information Science and Communication (CTISC)","volume":"2010 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133829595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hyperspectral and panchromatic image fusion based on CNMF 基于CNMF的高光谱与全色图像融合
Tianyu Mu, Rencan Nie, Chaozhen Ma, Jie Liu
{"title":"Hyperspectral and panchromatic image fusion based on CNMF","authors":"Tianyu Mu, Rencan Nie, Chaozhen Ma, Jie Liu","doi":"10.1109/CTISC52352.2021.00060","DOIUrl":"https://doi.org/10.1109/CTISC52352.2021.00060","url":null,"abstract":"Hyperspectral images contain rich spectral features, but the spatial resolution of hyperspectral images is low, so image fusion technology in the same scene plays an essential role in satellite imaging. The commonly used method now is to transfer the spectral information in the hyperspectral image to the panchromatic image, but many algorithms cannot avoid spectral distortion. Based on the coupled non-negative matrix decomposition (CNMF) algorithm, a spectral constraint regularization term is introduced to avoid spectral distortion and maintain spectral integrity. The experimental results were compared with the other four most advanced methods, this method has obvious advantages in terms of visual effects and evaluation indicators.","PeriodicalId":268378,"journal":{"name":"2021 3rd International Conference on Advances in Computer Technology, Information Science and Communication (CTISC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115430815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Searching for similar binary code based on the influence of basic block vertex 基于基本块顶点影响的相似二进制码搜索
Xiaodong Zhu, Liehui Jiang, Zeng Chen, Lin Yan
{"title":"Searching for similar binary code based on the influence of basic block vertex","authors":"Xiaodong Zhu, Liehui Jiang, Zeng Chen, Lin Yan","doi":"10.1109/CTISC52352.2021.00011","DOIUrl":"https://doi.org/10.1109/CTISC52352.2021.00011","url":null,"abstract":"Binary code similarity detection (BCSD) has many security applications and has attracted a lot of focus. But existing solutions for BCSD problems mainly focus on comparing the similarity between two binary functions and what need to be compared is not always a pair of equal-size binary programs. To solve the problem of searching similar binary code for a small size program in a large size program, in this manuscript, we propose a searching method based on the influence of basic block vertex. Firstly, we formalize the similar code searching problem as a subgraph matching problem and extract the attributed control flow graphs (ACFGs) of the binary programs. Then, we propose a novel metrics to measure the influence of each basic block vertex in query ACFGs and choose the vertex with the largest influence value as the central node. Next, we take the matching nodes of the central node in target ACFG as seed nodes and extending each candidate sub-area from the seed nodes. At last, these candidate sub-areas are further filtered and similar subgraphs are verified in these sub-areas. Experimental results indicate that the proposed method can find similar binary code efficiently.","PeriodicalId":268378,"journal":{"name":"2021 3rd International Conference on Advances in Computer Technology, Information Science and Communication (CTISC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124454422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信