2022 IEEE 5th International Conference on Computer and Communication Engineering Technology (CCET)最新文献

筛选
英文 中文
CFAR-Based Point Cloud Extraction Method for Circular Scanning Ground-Based SAR 3D Image 基于cfar的圆形扫描地基SAR三维图像点云提取方法
Yanping Wang, Jie Zhi, Wenjie Shen, Yun Lin, Y. Li
{"title":"CFAR-Based Point Cloud Extraction Method for Circular Scanning Ground-Based SAR 3D Image","authors":"Yanping Wang, Jie Zhi, Wenjie Shen, Yun Lin, Y. Li","doi":"10.1109/CCET55412.2022.9906372","DOIUrl":"https://doi.org/10.1109/CCET55412.2022.9906372","url":null,"abstract":"Ground-based SAR (GBSAR) has the advantage of all-day and all-weather high-resolution imaging and has been widely used in urban infrastructure monitoring, such as bridge and building monitoring. However, the traditional linear track GBSAR can only obtain two-dimensional (2D) images, and cannot obtain three-dimensional (3D) information of the target. Therefore, the development of GBSAR system with 3D imaging capability has become a new research hotspot. The circular scanning GBSAR studied in this paper is a new GBSAR mode with 3D imaging capability, and the data are obtained by rotating around the center of the circle on the vertical plane. However, due to the observation geometry of the circular scanning curve, there are a large number of sidelobes in the 3D image which leads to the problem of unable to accurately extract the point cloud. This paper first introduces NCUT self-developed circular scanning GBSAR, and then proposes a 3D point cloud extraction method based on constant false alarm rate (CFAR) algorithm. The feasibility of this method is verified by real data experiments.","PeriodicalId":329327,"journal":{"name":"2022 IEEE 5th International Conference on Computer and Communication Engineering Technology (CCET)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122639664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Sound Source Localization Based on Convolutional Neural Network 基于卷积神经网络的声源定位
Chen Peng, Niu Changliu
{"title":"Sound Source Localization Based on Convolutional Neural Network","authors":"Chen Peng, Niu Changliu","doi":"10.1109/CCET55412.2022.9906394","DOIUrl":"https://doi.org/10.1109/CCET55412.2022.9906394","url":null,"abstract":"As one of the important ways to transmit and receive information, sound contains a lot of information, and the application scope of sound covers all aspects of life, because the transmission of sound has directionality. In this paper, a room impulse response (RIR) model is established based on the Mono and Multichannel Recording Database (SMARD), and the sound features are extracted using the generalized cross-correlation phase transformation (GCC-PHAT) algorithm. Based on this model, the sound source localization based on convolutional neural network (CNN) is studied. With the help of the microphone array, the system collects randomly generated sound source signals in confined space, and then transmits the collected sound source signals to the CNN model for training. Classify the signal using a well-trained model and finally get the location of the sound source. Experimental results show that the CNN-based sound source localization algorithm has high positioning accuracy under different reverberation conditions and different signal-to-noise ratio environments.","PeriodicalId":329327,"journal":{"name":"2022 IEEE 5th International Conference on Computer and Communication Engineering Technology (CCET)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125248288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
5G Enabling Streaming Media Architecture with Edge Intelligence Gateway in Smart Grids 基于智能电网边缘智能网关的5G流媒体架构
Chao Ma, Xianchun Wang, Rui Xin, Chenjun Sun, Xiaolong Yang, Tian He, Tao Yao
{"title":"5G Enabling Streaming Media Architecture with Edge Intelligence Gateway in Smart Grids","authors":"Chao Ma, Xianchun Wang, Rui Xin, Chenjun Sun, Xiaolong Yang, Tian He, Tao Yao","doi":"10.1109/CCET55412.2022.9906370","DOIUrl":"https://doi.org/10.1109/CCET55412.2022.9906370","url":null,"abstract":"Smart Grids is now blending with sophisticated information and communications technology by virtue of orchestrated 5G network to potentially minimize power system accident and provide intelligent and large-scale power management. In this work, we propose a novel streaming media architecture over 5G network with intelligent edge for differentiated QoS requirements. Our proposed design spans a modular surveillance system architecture including the point-to-multipoint MEC gateway (MEC-GW), cloud media server, 5G network. The proposed system leverages the local data acquired at the edge GW to control multipoint video streams access in synergic optimization way, and alleviate traffic congestion near a specific base station (BS). MEC-GW schedulers with advanced adapter properties can adjust the priority state for differentiated QoS requirements and improve the efficiency in the 5G access network. Moreover, the joint 5G MEC-GWs deployment and resource allocation optimization strategy was formulated to maximize system energy efficiency (EE) taking stringent bandwidth and Qos constraints into account. By introducing Charnes-Cooper transform, a non-convex relaxation optimization is proposed to obtain the optimal solution. Real measurement and simulation results show that proposed strategy is scalable and robust, and also offer supplementary and energy-efficient room for improvement with respect to existing approaches.","PeriodicalId":329327,"journal":{"name":"2022 IEEE 5th International Conference on Computer and Communication Engineering Technology (CCET)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113935327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
VPN Traffic Identification Based on Tunneling Protocol Characteristics 基于隧道协议特征的VPN流量识别
Yu Li, Fei Wang, Shuhui Chen
{"title":"VPN Traffic Identification Based on Tunneling Protocol Characteristics","authors":"Yu Li, Fei Wang, Shuhui Chen","doi":"10.1109/CCET55412.2022.9906397","DOIUrl":"https://doi.org/10.1109/CCET55412.2022.9906397","url":null,"abstract":"Virtual Private Network (VPN) provides a secure, encrypted, and anonymous communication between remote networks. More and more people are inclined to use, with the raising network security and privacy protection awareness. However, VPNs are also widely abused by malicious pursuers, and thereby distinguishing VPN traffic for father judgment is of the utmost importance for network supervision. In this paper, we focus on the characteristics of VPN tunneling protocols, and then extract four categories of traffic features, including two novel entropy features, for VPN traffic identification. Feature evaluation upon real-world VPN traffic demonstrates, that all these features can notably embody differences between VPN and Non-VPN traffic, and the entropy features work still well even when applications traffic is mixed. Finally, the proposed VPN traffic identification method achieves the accuracy of 99.02% and 95.32% respectively on self-gathered and public VPN datasets, remarkably higher than the existing research.","PeriodicalId":329327,"journal":{"name":"2022 IEEE 5th International Conference on Computer and Communication Engineering Technology (CCET)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114090331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Trusted BID Document Upchain Method Based on Blockchain Infrastructure and Facility 一种基于区块链基础设施的可信投标文件上链方法
Tongtong Cheng, Yang Liu, Cheng Chi, Yuwen Zhang
{"title":"A Trusted BID Document Upchain Method Based on Blockchain Infrastructure and Facility","authors":"Tongtong Cheng, Yang Liu, Cheng Chi, Yuwen Zhang","doi":"10.1109/CCET55412.2022.9906340","DOIUrl":"https://doi.org/10.1109/CCET55412.2022.9906340","url":null,"abstract":"With the continuous maturity of technical theory, the enhanced support of communication network and the industrialization of sensing terminal and data acquisition equipment, the Internet of Things (IoT) has been deployed and applied on a large scale in many fields such as manufacturing, agriculture, transportation, medical treatment and so on. In order to uniquely identify items, many different identification coding schemes have been designed and proposed. However, most of them have been difficult to satisfy the requirements of security, storage, and efficiency. Blockchain can provide a decentralized storage method to release the impact of security. Therefore, this paper proposed a trust blockchain-based Identifier (BID) uplink method. Frist, BID code scheme is given to realize unique identification. Second, BID document is designed to store recognizable digital object data on blockchain. Third, BID document resolution method is proposed to obtain BID document from blockchain. Finally, based on the above elements, the BID upchain method is implemented to manage identification on blockchain infrastructure and facility.","PeriodicalId":329327,"journal":{"name":"2022 IEEE 5th International Conference on Computer and Communication Engineering Technology (CCET)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125010918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on a User Context Model Based on Data Mining 基于数据挖掘的用户上下文模型研究
Jinhai Li, Lihang Ling, Yue Wu
{"title":"Research on a User Context Model Based on Data Mining","authors":"Jinhai Li, Lihang Ling, Yue Wu","doi":"10.1109/CCET55412.2022.9906375","DOIUrl":"https://doi.org/10.1109/CCET55412.2022.9906375","url":null,"abstract":"With the popularity of the Internet and under the rising number of online shoppers, e-commerce platforms are facing increasing challenges in personalizing their descriptions and information services to users. Therefore, in this paper, the context factors that have an impact on users' decisions are counted through questionnaires and derived by way of statistical analysis. Based on the coarse-grained context conclusions drawn from the statistical analysis through SPSS, a web crawler was used to crawl the Taobao users' context and behavioral dataset as the experimental dataset. The crawled data was then analyzed by K-Means. Finally, the K-Means clustering model analysis is used to propose the construction of a user context model, which is used to promote the correct understanding of personalized information needs on the platform, thereby increasing user loyalty.","PeriodicalId":329327,"journal":{"name":"2022 IEEE 5th International Conference on Computer and Communication Engineering Technology (CCET)","volume":"3 22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129112280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A-pillar Blind Spot Display Algorithm Based on Line of Sight 基于视线的a柱盲点显示算法
Shi-Xian Sui, Tianjun Li, Shengyong Chen
{"title":"A-pillar Blind Spot Display Algorithm Based on Line of Sight","authors":"Shi-Xian Sui, Tianjun Li, Shengyong Chen","doi":"10.1109/CCET55412.2022.9906348","DOIUrl":"https://doi.org/10.1109/CCET55412.2022.9906348","url":null,"abstract":"The closed load-bearing structure of a car is designed to decrease the injuries to drivers in traffic accidents, however, such a design also results in many blind spots in driving which are the main cause of a number of car crashes. A-pillar blind spots elimination can make for safer driving. Therefore, this paper proposes an algorithm that utilizes a screen mounted on the A-pillar to display its blind spots in real time and uses a wide-angle camera to capture a panoramic view outside the car. We use a binocular vision system detecting facial features to calculate the driver’s head pose and the 3D coordinates of the pupil center. After obtaining the pupil centers and coordinates of the four corners of the A-pillar display screen, the blind spot can be calculated through the angular relationship between the driver’s line of sight and the outside wide-angle camera’s angle of view. Considering the possibility that the pupil center detection may fail when the driver is not looking at the A-pillar, we propose a compensation method to indirectly calculate the pupil center by using the camera above the driver’s head. We carried out a simulation experiment using a display screen replacing the A-pillar, which showed that our algorithm could display the blind spots occluded by the display screen well.","PeriodicalId":329327,"journal":{"name":"2022 IEEE 5th International Conference on Computer and Communication Engineering Technology (CCET)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125408130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Anomaly Detection Algorithm for Multi-dimensional Segmentation Plane Isolation Forest 一种多维分割平面隔离林的异常检测算法
Jiakun Su, Jinhong Li
{"title":"An Anomaly Detection Algorithm for Multi-dimensional Segmentation Plane Isolation Forest","authors":"Jiakun Su, Jinhong Li","doi":"10.1109/CCET55412.2022.9906369","DOIUrl":"https://doi.org/10.1109/CCET55412.2022.9906369","url":null,"abstract":"Traditional anomaly detection is mostly based on single-dimensional data for identification and analysis. The isolated forest algorithm is not a description of normal samples, but a field is divided by isolated anomalies. This paper introduces a multi-dimensional segmentation plane anomaly detection algorithm for isolated forest. By using multi-dimensional plane segmentation in the process of constructing hyperplane segmentation, and controlling the generation process of the isolated tree, the generation process of the isolated forest is optimized. By adding some common datasets for comparative experiments, good results have been achieved","PeriodicalId":329327,"journal":{"name":"2022 IEEE 5th International Conference on Computer and Communication Engineering Technology (CCET)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116474807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Construction of Information Technology in Universities under the New Situation 新形势下高校信息技术建设
Xiao-yong Liu
{"title":"The Construction of Information Technology in Universities under the New Situation","authors":"Xiao-yong Liu","doi":"10.1109/CCET55412.2022.9906376","DOIUrl":"https://doi.org/10.1109/CCET55412.2022.9906376","url":null,"abstract":"From the beginning of information technology entering the campus, the application of information technology has injected new vigor into the study, life and scientific research of university teachers and students, realized the digitized transformation of teaching, improved the ability of university administration, and promoted the overall development of the university. With the rapid development of information technology, information technology in universities has also ushered in a period of change. The original information technology in universities can no longer meet the soaring information needs of teachers and students. In addition, the in-depth mining of “data value” and the wide application of “big data” expose many drawbacks of university information technology in data application. The transformation of university information technology is imminent.","PeriodicalId":329327,"journal":{"name":"2022 IEEE 5th International Conference on Computer and Communication Engineering Technology (CCET)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121607162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Epidemic Data Analysis Based on Data Visualization Technology 基于数据可视化技术的流行病数据分析
Shizuo Jiao
{"title":"Epidemic Data Analysis Based on Data Visualization Technology","authors":"Shizuo Jiao","doi":"10.1109/CCET55412.2022.9906371","DOIUrl":"https://doi.org/10.1109/CCET55412.2022.9906371","url":null,"abstract":"The outbreak of COVID-19 at the end of 2019 has had a heavy impact on countries around the world, and its rapid spread has posed a huge challenge to the prevention and control work of all countries. Through data visualization technology, this paper comprehensively analyzes the epidemic data in China from multiple levels, including comparison analysis based on time span and comparison analysis based on countries. At the same time, this paper also analyzes the significant impact of the epidemic on China’s national economy from the macro and micro levels. Finally, the linear regression model is used to predict the GDP data during the epidemic period, and the comparison between the real and predicted GDP data during the epidemic period is made. It was found that the epidemic had a great impact on China’s national economy in the early stage, but the impact gradually weakened as time went by. Epidemic data analysis based on data visualization technology can provide powerful data support for epidemic prevention and control.","PeriodicalId":329327,"journal":{"name":"2022 IEEE 5th International Conference on Computer and Communication Engineering Technology (CCET)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131407255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信