JITeCS Journal of Information Technology and Computer Science最新文献

筛选
英文 中文
On-orbit maintenance and reconfiguration of DSP based on FPGA 基于FPGA的DSP在轨维护与重构
JITeCS Journal of Information Technology and Computer Science Pub Date : 2022-12-08 DOI: 10.1117/12.2653605
Hongxuan Ren, Han Liu, Qiang Xue, Xiao-qing Ma, Tao Jiang, Baohua Sun
{"title":"On-orbit maintenance and reconfiguration of DSP based on FPGA","authors":"Hongxuan Ren, Han Liu, Qiang Xue, Xiao-qing Ma, Tao Jiang, Baohua Sun","doi":"10.1117/12.2653605","DOIUrl":"https://doi.org/10.1117/12.2653605","url":null,"abstract":"FPGA+DSP architecture is widely used in satellite digital processing systems. The satellite is in an environment where there is a lot of particle radiation and collisions. In order to avoid changes in stored code data brought by SEU (Single Event Upset), improve the system reliability, at the same time meet the current requirements of software on-orbit reconfiguration, the FPGA and DSP in the space-borne core processor need to have the ability of error correction and reconfiguration. To do this, FPGA and DSP programs need to be stored in external, writable memory. Nor Flash, with its high capacity and reliability, is often chosen as the memory for storing code. At present, the on-orbit maintenance of FPGA is usually realized by using Actel FPGA to conduct TMR (Triple Modular Redundancy), refresh and other processing on the FPGA code stored in Flash. Based on this idea, a T-shaped structure is constructed among FPGA, DSP and Flash for the architecture of the space-borne processor. As the master, FPGA controls Flash to complete TMR, error correction and on-orbit reconfiguration of DSP code. This method reduces hardware redundancy, gives consideration to autonomous maintenance and on-orbit reconfiguration, and increases system robustness. This method has been applied and fully verified in orbit.","PeriodicalId":32903,"journal":{"name":"JITeCS Journal of Information Technology and Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80217456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and implementation of ice and snow tourism based on virtual reality technology 基于虚拟现实技术的冰雪旅游设计与实现
JITeCS Journal of Information Technology and Computer Science Pub Date : 2022-12-08 DOI: 10.1117/12.2653752
Lidong Zhang, Dongming Liu, J. Zhang, Xin Pu
{"title":"Design and implementation of ice and snow tourism based on virtual reality technology","authors":"Lidong Zhang, Dongming Liu, J. Zhang, Xin Pu","doi":"10.1117/12.2653752","DOIUrl":"https://doi.org/10.1117/12.2653752","url":null,"abstract":"With the development of science and technology, virtual reality technology has gradually matured. The traditional method of promoting tourist attractions with the help of video cannot meet people's needs, so we build an ice and snow tourism system based on virtual reality technology. By software unity3D, build scenes, add characters, animals, snow scenes, etc. the virtual ice and snow world is present perfectly, provide people with a virtual space, strengthen people's perception of the ice and snow world by means of human-computer interaction, and let people experience ice and snow travel.","PeriodicalId":32903,"journal":{"name":"JITeCS Journal of Information Technology and Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89260689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on network traffic prediction based on spatial feature fusion 基于空间特征融合的网络流量预测研究
JITeCS Journal of Information Technology and Computer Science Pub Date : 2022-12-08 DOI: 10.1117/12.2653683
Junbo Li, Jianxin Zhou, Ning Zhou
{"title":"Research on network traffic prediction based on spatial feature fusion","authors":"Junbo Li, Jianxin Zhou, Ning Zhou","doi":"10.1117/12.2653683","DOIUrl":"https://doi.org/10.1117/12.2653683","url":null,"abstract":"Forecasting network traffic is critical to operators' daily network operating and maintenance decisions. However, nonlinearity, burst, and periodicity of network traffic, as well as the considerable geographical correlation among network nodes, pose significant hurdles to reliable network traffic forecast. Most existing traffic prediction methods use pre-defined graph or node embedding to extract spatial correlation between network nodes. However, neither of these methods may be able to extract this spatial correlation completely. Furthermore, while utilizing LSTM to extract temporal features, intermediate time step output is ignored, resulting in the loss of some temporal features. The network model in the article extracts the spatial correlation by the dual graphic attention module and extracts temporal features by the LSTM-Attention and TCN modules, which can extract spatial and temporal features from the network traffic data better. The network model is trained and predicted on the Abilene data set. The results demonstrate that the prediction performance is significantly improved.","PeriodicalId":32903,"journal":{"name":"JITeCS Journal of Information Technology and Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85823793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Construction of "three elements four dimensions" collaborative education model for accounting majors based on digital intelligence technology 基于数字智能技术的会计专业“三要素四维度”协同教育模式构建
JITeCS Journal of Information Technology and Computer Science Pub Date : 2022-12-08 DOI: 10.1117/12.2653572
Hua Feng, Fengyang Wang
{"title":"Construction of \"three elements four dimensions\" collaborative education model for accounting majors based on digital intelligence technology","authors":"Hua Feng, Fengyang Wang","doi":"10.1117/12.2653572","DOIUrl":"https://doi.org/10.1117/12.2653572","url":null,"abstract":"The development of digital intelligence technology drives the reconstruction of accounting functions and processes, which also puts forward new requirements and challenges for the training of accounting professionals. By analyzing the shortcomings of accounting majors in the context of the development of digital intelligence technology, and through the linkage of schools, industries and enterprises, this paper explores to build a new model of talent training reform driven by digital intelligence technologies such as Big data, artificial intelligence (AI) and blockchain, so as to promote the accounting education chain and talent chain to organically connect with the industrial chain and innovation chain, and meet the needs of the training and transformation of accounting professionals in the digital intelligence era.","PeriodicalId":32903,"journal":{"name":"JITeCS Journal of Information Technology and Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80990957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
X-band multi-layer phase gradient metasurface for high efficiency far field subwavelength imaging 高效远场亚波长成像的x波段多层相位梯度超表面
JITeCS Journal of Information Technology and Computer Science Pub Date : 2022-12-08 DOI: 10.1117/12.2653455
Jinyu Wang, Yaoliang Song, J. Mao, R. Chen
{"title":"X-band multi-layer phase gradient metasurface for high efficiency far field subwavelength imaging","authors":"Jinyu Wang, Yaoliang Song, J. Mao, R. Chen","doi":"10.1117/12.2653455","DOIUrl":"https://doi.org/10.1117/12.2653455","url":null,"abstract":"The evanescent wave that can only exist on the surface of the objects is the main reason for diffraction limit, which limits the subwavelength details of the objects to the near field. This paper designs a multi-layer phase gradient metasurface with 10°/mm increment and 69% transmission efficiency in X-band. Evanescent wave can be converted into propagation wave and transmitted to the far field with the help of this metasurface. Through Fourier transform and spectrum analysis, two targets with 10mm subwavelength distance are successfully resolved and imaged around 10GHz.","PeriodicalId":32903,"journal":{"name":"JITeCS Journal of Information Technology and Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81178491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Acoustic experimental analysis of Yushu Tibetan affricate 玉树藏舌音的声学实验分析
JITeCS Journal of Information Technology and Computer Science Pub Date : 2022-12-08 DOI: 10.1117/12.2653832
Lingzhen Li, Yonghong Li
{"title":"Acoustic experimental analysis of Yushu Tibetan affricate","authors":"Lingzhen Li, Yonghong Li","doi":"10.1117/12.2653832","DOIUrl":"https://doi.org/10.1117/12.2653832","url":null,"abstract":"This paper takes the affricate of Tibetan Yushu dialect as the research object, and uses the acoustic experimental method to extract, analyze and summarize the acoustic parameters such as duration, center of gravity and dispersion, so as to describe the acoustic characteristics of the affricate of Yushu dialect. Firstly, the experiment uses the recording software Audition3.0 single channel adopts voice signal; Secondly, Matlab voice cutting program is used to generate a voice signal corresponding to a single name and voice; Then Praat is used to extract and analyze the parameters. It is concluded that the mean value of voice onset time can clearly distinguish the aspirated and unaspirated affricate of Yushu dialect; The more backward the pronunciation position is, the smaller the voice onset time duration is; The voice onset time value range of voiced affricate is larger than that of unvoiced affricate, and the voice onset time value range decreases with the back of the pronunciation part; The farther back the pronunciation part is, the longer the affricate time is; Compared with the unvoiced affricate, the center of gravity and dispersion of the voiced fricative spectrum are larger.","PeriodicalId":32903,"journal":{"name":"JITeCS Journal of Information Technology and Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83350727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Long-term tracking algorithm of soccer player based on kernelized correlation filter 基于核相关滤波的足球运动员长期跟踪算法
JITeCS Journal of Information Technology and Computer Science Pub Date : 2022-12-08 DOI: 10.1117/12.2653524
Hongke Chen, Liang Lei
{"title":"Long-term tracking algorithm of soccer player based on kernelized correlation filter","authors":"Hongke Chen, Liang Lei","doi":"10.1117/12.2653524","DOIUrl":"https://doi.org/10.1117/12.2653524","url":null,"abstract":"The performance of player object tracking in soccer match video is seriously affected by challenges like occlusion, out-of-view, similarity interference, low resolution, etc. To solve this problem, we propose a long-term tracking algorithm based on kernelized correlation filter. Firstly, the algorithm fuses shape, color and grayscale features to enhance the object representation ability and introduces scale filter to realize real-time scale estimation to improve the tracking accuracy and robustness. Secondly, the algorithm monitors tracking status in real time by the tracking result evaluation function. If the status judged good, the multi-peak re-detection of response map is used to review the tracking result. Otherwise, the object is re-detected through sliding windows to realize long-term tracking. The experimental results tested on Benchmark for Soccer Player Tracking (BSPT) demonstrate that the proposed tracker can achieve an accurate, real-time and long-term visual tracking for soccer player while runs at speed near 80 FPS.","PeriodicalId":32903,"journal":{"name":"JITeCS Journal of Information Technology and Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83825806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A stacked ensemble learning model using heterogeneous base-leaners for information security intrusion detection 基于异构基础学习器的信息安全入侵检测的堆叠集成学习模型
JITeCS Journal of Information Technology and Computer Science Pub Date : 2022-12-08 DOI: 10.1117/12.2653422
Chen Chen, Yajiang Qi, Xiaoyan Ye, Guanghua Wang, Lintao Yang, Haiyue Ji
{"title":"A stacked ensemble learning model using heterogeneous base-leaners for information security intrusion detection","authors":"Chen Chen, Yajiang Qi, Xiaoyan Ye, Guanghua Wang, Lintao Yang, Haiyue Ji","doi":"10.1117/12.2653422","DOIUrl":"https://doi.org/10.1117/12.2653422","url":null,"abstract":"In network intrusion detection, using a machine learning method alone has blind spots and low detection accuracy. A stacked ensemble learning model using heterogeneous base-leaners for information security intrusion detection is proposed. Firstly, the convolution neural network is used to extract the deep information in the original data set, which is normalized as the input of the model. In constructing base classifiers, different heterogeneous model combinations are used to enhance the diversity of base classifiers. Experiments on NSL-KDD dataset show that the proposed model can comprehensively improve the detection accuracy, accuracy, recall and F1-score.","PeriodicalId":32903,"journal":{"name":"JITeCS Journal of Information Technology and Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83030904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network digital media refactoring resource dynamic allocation method 网络数字媒体重构资源动态分配方法
JITeCS Journal of Information Technology and Computer Science Pub Date : 2022-12-08 DOI: 10.1117/12.2653712
Hongyan Ren, Yan Yang
{"title":"Network digital media refactoring resource dynamic allocation method","authors":"Hongyan Ren, Yan Yang","doi":"10.1117/12.2653712","DOIUrl":"https://doi.org/10.1117/12.2653712","url":null,"abstract":"With the continuous development of new media and network information technology, more and more reconfigurable resources of network digital media are needed to build a reconfigurable resource allocation model in network space. The dynamic allocation method of network digital media reconfigurable resources based on multi-source feature fusion cluster analysis is feasible to a certain extent. Combined with the result of feature extraction, the dynamic allocation of reconfigurable resources is realized. Research on the reconfigurable resource allocation method of network digital media is of great significance in improving the utilization capacity of network resources. Traditional method, the dynamic network reconfigurable digital media resources allocation methods mainly include dynamic allocation method based on the characteristics of correlation analysis, PCA principal component analysis method of dynamic allocation and dynamic allocation of fusion k-means clustering method and so on, USES the statistical features extraction and autocorrelation detection, realize reconfigurable dynamic allocation of resources, However, the traditional method of resource allocation has poor fitness and weak feature identification ability, so it needs to be changed. This paper mainly describes the dynamic allocation method of reconfigurable resources of network digital media, aiming at strengthening the allocation of network digital media resources, so as to further improve the dynamic allocation ability of reconfigurable resources and speed up the application of network digital media.","PeriodicalId":32903,"journal":{"name":"JITeCS Journal of Information Technology and Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83191974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Source location privacy protection mechanism against global attackers 针对全局攻击者的源位置隐私保护机制
JITeCS Journal of Information Technology and Computer Science Pub Date : 2022-12-08 DOI: 10.1117/12.2653558
Ruiqi Ma, Ziyong Li, Yuxiang Hu, Jinchuan Pei
{"title":"Source location privacy protection mechanism against global attackers","authors":"Ruiqi Ma, Ziyong Li, Yuxiang Hu, Jinchuan Pei","doi":"10.1117/12.2653558","DOIUrl":"https://doi.org/10.1117/12.2653558","url":null,"abstract":"For global attackers with stronger attack capabilities, this paper proposes a source location privacy protection (FS-SLP) mechanism based on pseudo-source nodes. The mechanism uses the global view information of the network and the location information of the current source node to dynamically generate multiple evenly distributed pseudo-source nodes in the network. The pseudo-source node transmits fake data to the sink node when the source node transmits real data packets to the sink node. packets, which greatly increases the difficulty of traffic analysis for attackers; to further enhance the security of the source node, this mechanism generates a dynamically adjustable filtering confusion ring near the sink node, and the nodes in the filtering confusion ring reduce the transmission path. At the same time, the transmission path of true and false data packets is confused, which reduces the energy consumption of nodes near the sink node and further increases the analysis difficulty of the attacker. Simulation experiments show that, compared with the existing scheme, this mechanism greatly prolongs the security period of the network on the premise of increasing a small amount of energy consumption.","PeriodicalId":32903,"journal":{"name":"JITeCS Journal of Information Technology and Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88297747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信