JITeCS Journal of Information Technology and Computer Science最新文献

筛选
英文 中文
A new visual odometry algorithm based on multi-path deep fully convolutional neural networks 一种基于多路径深度全卷积神经网络的视觉里程计算法
JITeCS Journal of Information Technology and Computer Science Pub Date : 2022-12-08 DOI: 10.1117/12.2653846
Bo Chen, Kun Yan, Rongchuan Cao, Tianqi Zhang, Xiaoli Zhang
{"title":"A new visual odometry algorithm based on multi-path deep fully convolutional neural networks","authors":"Bo Chen, Kun Yan, Rongchuan Cao, Tianqi Zhang, Xiaoli Zhang","doi":"10.1117/12.2653846","DOIUrl":"https://doi.org/10.1117/12.2653846","url":null,"abstract":"Visual odometry is one of the key core technologies in the field of autonomous driving. However, images captured in lowlight or unevenly-illuminated scenes still cannot guarantee good performance due to low image contrast and lack of detail features. Therefore, we propose an end-to-end visual odometry method based on image fusion and FCNN-LSTM in the paper. The brightness image of the source image sequence is obtained by gray-scale transformation, and an image fusion algorithm based on spectral residual theory is designed to combine the image sequence and its brightness image to enhance the contrast of the image and provide more detailed information. In order to improve the accuracy of image feature extraction and reduce the error in the pose estimation process, we design a feature extraction algorithm based on skipfusion-FCNN. The traditional fully convolutional neural network (FCNN) is improved, a skip-fusion-FCNN network model is proposed, and three different paths are constructed for feature extraction. In each path, the prediction results of different depths are fused by downsampling to obtain a feature map. Merge three different feature maps to obtain feature fusion information, taking into account the structural information and detail information of the image. Experiments show that this algorithm is superior to the state-of-the-art algorithms.","PeriodicalId":32903,"journal":{"name":"JITeCS Journal of Information Technology and Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77354997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new way to extract the abnormal response of complex resistivity based on GEMTIP model 基于GEMTIP模型的复电阻率异常响应提取新方法
JITeCS Journal of Information Technology and Computer Science Pub Date : 2022-12-08 DOI: 10.1117/12.2653587
Yanqun Cui, Jing Zhang, Jing Yin, Chun-yan Liu, Hongyi Zhai, X. Pu
{"title":"A new way to extract the abnormal response of complex resistivity based on GEMTIP model","authors":"Yanqun Cui, Jing Zhang, Jing Yin, Chun-yan Liu, Hongyi Zhai, X. Pu","doi":"10.1117/12.2653587","DOIUrl":"https://doi.org/10.1117/12.2653587","url":null,"abstract":"Spectrum induced polarization method is mainly used for geological survey according to the difference of conductivity and polarization of medium. Combined with the needs of national strategic development, this paper studies the three-dimensional finite element numerical simulation method of complex resistivity based on generalized equivalent dielectric induced polarization (GEMTIP) model. This method has been widely used in resource exploration, engineering geology and other fields. First, the GEMTIP model and the complex resistivity variation characteristics of GEMTIP model under the influence of different parameters was introduced. Then, the variation equations were established for two-point sources of 3D modeling of complex resistivity method. The computing area was divided into hexahedral elements. The complex potential and the complex conductivity of rocks within each triangular lattice were described by a linear interpolation to create a linear equations system from the variation equation. The BICGSTAB (Bi-conjugate gradient stabilized method) algorithm with incomplete LU decomposition for preconditioning was used to solve the system linear equation to calculate the anomalous complex potential of all nodes and the apparent complex resistivity on the surface. Finally, this approach was verified through the calculations of a two layered model. Two typical geoelectric models were designed to test the correctness and efficiency of the algorithm. The results show that it provides new way to further study the induced polarization effect of rock and ore on the acroscopic scale.","PeriodicalId":32903,"journal":{"name":"JITeCS Journal of Information Technology and Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73293568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel pedestrian re-identification algorithm framework based on deep learning 基于深度学习的行人再识别算法框架
JITeCS Journal of Information Technology and Computer Science Pub Date : 2022-12-08 DOI: 10.1117/12.2653790
Huawei Wang, Yijing Guo
{"title":"A novel pedestrian re-identification algorithm framework based on deep learning","authors":"Huawei Wang, Yijing Guo","doi":"10.1117/12.2653790","DOIUrl":"https://doi.org/10.1117/12.2653790","url":null,"abstract":"To further promote the improvement of pedestrian re-identification performance, this paper studies the reid framework based on \"reid-strong-baseline\", and uses different optimization schemes to improve the network performance. Firstly, the study tests three kinds of loss: Softmax, triplet hard, and Softmax + triplet hard, to verify the Rank-1 performance obtained and which can achieve the best performance. Secondly, based on the prototype network obtained by applying Softmax + triplet hard loss, we utilize several optimization methods including data enhancement, learning rate optimization, sampling method, and Label smoothing. Then we study the effectiveness of these optimizations on the performance of the Baseline model and the degree of improvement. Finally, this paper studies the efficiency of different Backbone and network depths on the performance of pedestrian re-identification.","PeriodicalId":32903,"journal":{"name":"JITeCS Journal of Information Technology and Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80099488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and implementation of building crack detection system based convolutional neural network 基于卷积神经网络的建筑裂缝检测系统的设计与实现
JITeCS Journal of Information Technology and Computer Science Pub Date : 2022-12-08 DOI: 10.1117/12.2653463
Hedan Liu, Xulei Zhao
{"title":"Design and implementation of building crack detection system based convolutional neural network","authors":"Hedan Liu, Xulei Zhao","doi":"10.1117/12.2653463","DOIUrl":"https://doi.org/10.1117/12.2653463","url":null,"abstract":"Buildings are commonly found as important facilities in today's society. How to detect building cracks safely and effectively is a necessary measure to ensure the safety of people's lives and properties. With the emergence of deep learning algorithms, various target detection methods based on convolutional neural network (CNN) models have gradually replaced conventional manual detection methods. In this paper, we design a crack recognition system based on convolutional neural network model for building images collected by UAVs. The experimental structure shows that the system has a good performance and can be further promoted to be applied in the field of safety assessment in the construction industry.","PeriodicalId":32903,"journal":{"name":"JITeCS Journal of Information Technology and Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84505289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of multimedia vocal music learning system based on Visual C++ 基于Visual c++的多媒体声乐学习系统设计
JITeCS Journal of Information Technology and Computer Science Pub Date : 2022-12-08 DOI: 10.1117/12.2653402
Siwei Zhu, Lulu C. H. Sun
{"title":"Design of multimedia vocal music learning system based on Visual C++","authors":"Siwei Zhu, Lulu C. H. Sun","doi":"10.1117/12.2653402","DOIUrl":"https://doi.org/10.1117/12.2653402","url":null,"abstract":"With the continuous development of digital multimedia technology, digital multimedia technology has realized the integration with medical treatment, education, traditional scientific research and other fields, and become the trend of future development. The application of digital multimedia technology to reform vocal music performance teaching is an important means of innovative vocal music teaching, but also an inevitable choice to promote the development of vocal music teaching. Digital multimedia technology will be one of the irreplaceable important carriers in vocal music performance teaching. In the application of digital media, many new teaching modes have appeared in the design of vocal music learning system in colleges and universities. Digital multimedia technology has effectively broken the limitations of traditional vocal music teaching and provided new possibilities for the informatization and modernization of vocal music performance teaching and learning. This paper mainly describes the design of multimedia vocal music learning system based on Visual C++, according to the current problems in multimedia vocal music teaching, and put forward their own solutions, the purpose is to speed up the design process of multimedia vocal music learning system, improve the progress of students learning.","PeriodicalId":32903,"journal":{"name":"JITeCS Journal of Information Technology and Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87844023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Realtime replacement mechanism of internal and external memory in limited resources system applicating 5G communication module in distributed grid terminal 在分布式电网终端中应用5G通信模块的有限资源系统内外部存储器实时替换机制
JITeCS Journal of Information Technology and Computer Science Pub Date : 2022-12-08 DOI: 10.1117/12.2653791
Lei Chen, S. An
{"title":"Realtime replacement mechanism of internal and external memory in limited resources system applicating 5G communication module in distributed grid terminal","authors":"Lei Chen, S. An","doi":"10.1117/12.2653791","DOIUrl":"https://doi.org/10.1117/12.2653791","url":null,"abstract":"System level software need read and write hardware memory, and some hardware system with limited resources such as 5G communication terminal in distributed grid application could not provide enough memory space for specified system application minimum demand. Some current method such as hardware expansion or software compression, to some extent, take effect, but could not solve the problem. Base on contrast between internal and external memory and single task independence, this article propose a realtime replacement mechanism to face on the situation and solve the problem met in high speeding data transfer distribute gird function as usual between running memory and limited resources. Experiment show that it could support limited resources system to run memory-needing task, and running efficiency is 90.2% about to hardware expansion.","PeriodicalId":32903,"journal":{"name":"JITeCS Journal of Information Technology and Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72843335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A curve fitting method for sharp feature preservation 一种锐利特征保存的曲线拟合方法
JITeCS Journal of Information Technology and Computer Science Pub Date : 2022-12-08 DOI: 10.1117/12.2653867
Feng Jin, Shuyu Zhang, Wei Chen
{"title":"A curve fitting method for sharp feature preservation","authors":"Feng Jin, Shuyu Zhang, Wei Chen","doi":"10.1117/12.2653867","DOIUrl":"https://doi.org/10.1117/12.2653867","url":null,"abstract":"To address the fact that the traditional curve fitting method based on B-spline basis functions cannot preserve the sharp features in the original data well, a curve fitting method based on a class of orthogonal piecewise polynomial function Vsystem is proposed in this research. Firstly, different types of feature points from the original data are extracted by using the feature extraction algorithm; secondly, the feature points are reparametrized to the locations of different knots in the V-system; finally, the fitting curve is obtained by solving least-squares linear equations with constraints. Different features in the original data can be captured since the V-system contains basis functions with different smoothness. Numerical experimental results show that the proposed method in this research creates a fitted curve reflecting the global shape of the original data and can accurately represent sharp features.","PeriodicalId":32903,"journal":{"name":"JITeCS Journal of Information Technology and Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90159031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis method of scientific instrument data file format based on clustering idea 基于聚类思想的科学仪器数据文件格式分析方法
JITeCS Journal of Information Technology and Computer Science Pub Date : 2022-12-08 DOI: 10.1117/12.2653568
Jianhui Zhou, Feng Sun, Hao Shi, Shuai Shen
{"title":"Analysis method of scientific instrument data file format based on clustering idea","authors":"Jianhui Zhou, Feng Sun, Hao Shi, Shuai Shen","doi":"10.1117/12.2653568","DOIUrl":"https://doi.org/10.1117/12.2653568","url":null,"abstract":"Aiming at the problem of low analytical efficiency in the current analysis methods of data file format of scientific instruments, a data file format analysis method based on clustering was proposed to improve the efficiency of file format analysis. According to the file storage structure and the characteristics of cluster distribution, the selection principle of file samples in cluster analysis is formulated. At the same time, the corresponding format analysis auxiliary tool software is developed, which can automatically judge the rationality of the selected files and automatically group them, simplifying the corresponding format analysis process. The method and the developed tool are used to analyze the format of MS data generated by a mass spectrometry model. The experimental results show that the format of MS data obtained by this method is accurate and the efficiency is significantly improved. This method can effectively promote the sharing of data resources of large-scale scientific instruments and improve the utilization rate of data resources.","PeriodicalId":32903,"journal":{"name":"JITeCS Journal of Information Technology and Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78231656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Getting insights from news data mining: a case of BBC's counter-terrorism news text analysis 从新闻数据挖掘中获得启示:以BBC反恐新闻文本分析为例
JITeCS Journal of Information Technology and Computer Science Pub Date : 2022-12-08 DOI: 10.1117/12.2653824
Jia Li, Miao Jia, Qian Liu, Yong Fu, Qiuyi Chen
{"title":"Getting insights from news data mining: a case of BBC's counter-terrorism news text analysis","authors":"Jia Li, Miao Jia, Qian Liu, Yong Fu, Qiuyi Chen","doi":"10.1117/12.2653824","DOIUrl":"https://doi.org/10.1117/12.2653824","url":null,"abstract":"Data mining plays an important role in getting insights from news text. This study collected 695,051 English-language news reports on terrorism and counter-terrorism from March 2017 to March 2018 in BBC news and conducted a text analysis with LDA topic modeling. 20 topics and five themes were classified, and it was disclosed that major themes include that: (1) BBC focused on constructing local discourse structure, (2) Comparing the news reports at home and abroad, and (3) Historical origins, the development in ancient and modern times and a trial of strength between different countries.","PeriodicalId":32903,"journal":{"name":"JITeCS Journal of Information Technology and Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85831964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security analysis of SM2 signature algorithm based on fault attack 基于故障攻击的SM2签名算法安全性分析
JITeCS Journal of Information Technology and Computer Science Pub Date : 2022-12-08 DOI: 10.1117/12.2653740
ChuiSheng Qian, Yan Wang, Minghua Wang, Ziqi Zhao
{"title":"Security analysis of SM2 signature algorithm based on fault attack","authors":"ChuiSheng Qian, Yan Wang, Minghua Wang, Ziqi Zhao","doi":"10.1117/12.2653740","DOIUrl":"https://doi.org/10.1117/12.2653740","url":null,"abstract":"SM2 digital signature algorithm (SM2-DSA) is the Chinese version of the elliptic curve digital signature algorithm (ECDSA), which has become one of the international standards of elliptic curve cryptography. Despite its solid theoretical security, SM2-DSA is still prone to a variety of physical attacks. Hence, it is important to research the security of the SM2- DSA implementation. In this paper, we propose a fault attack model for the SM2-DSA based on the weak elliptic curve. Experimental results show that the proposed model can directly calculate the parameters of the fault curve by using the fault signature pair, and if the fault injection location is correct, we only need an error signature pair to recover the 256-bit signature private key within 3 minutes. Compared with the general weak elliptic curve attack, our model is more practical and 20% more efficient in recovering the private key.","PeriodicalId":32903,"journal":{"name":"JITeCS Journal of Information Technology and Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85044670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信