Zhenjiang Wang, Shangshou Wang, Lei Wang, Qiushi Yao
{"title":"An Instruction Extension Based SHA-3 Algorithm Co-Processor Design Scheme","authors":"Zhenjiang Wang, Shangshou Wang, Lei Wang, Qiushi Yao","doi":"10.1109/ISCTIS58954.2023.10213096","DOIUrl":"https://doi.org/10.1109/ISCTIS58954.2023.10213096","url":null,"abstract":"Cryptography is the cornerstone of securing information, and the traditional way of deploying cryptographic algorithms has the problems of slow computation speed and low flexibility. In this paper, we first analyze the principle and computation process of SHA-3 hash algorithm, propose a cryptographic instruction extension method to solve the problems in the traditional cryptographic algorithm deployment method according to the characteristics of the hash algorithm, and develop a cryptographic instruction extension scheme combined with Hummingbird E203 processor, carry out the design of co-processor hardware unit, build a behavior-level simulation and FPGA board-level verification environment, and carry out The correctness of the coprocessor function is verified and the performance is analyzed and compared. The experimental results show that the designed cryptographic instruction scheme can reduce the number of instructions and cycles by more than 90% with less than 8% increase in hardware resources and 9mW power consumption, which achieves a more obvious performance improvement and is suitable for resource-constrained scenarios.","PeriodicalId":334790,"journal":{"name":"2023 3rd International Symposium on Computer Technology and Information Science (ISCTIS)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116889077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Swin Transformer-based Time-Frequency Image Classification of Frequency Hopping Modulated Signals","authors":"Zhanxiong Li, Xuehong Sun, Mingyu Zhao, Jiangjie Yin, Hongshun Liu, Xi-Ping Mu, Tong Li","doi":"10.1109/ISCTIS58954.2023.10213184","DOIUrl":"https://doi.org/10.1109/ISCTIS58954.2023.10213184","url":null,"abstract":"Frequency hopping technology is a kind of spread spectrum communication, the signal frequency will be randomly hopped in a relatively wide band during the communication process, so as to avoid interference and interception by the enemy, and due to its secrecy performance and anti-multipath fading performance and other characteristics make it is widely used in the field of military communications. The identification of the modulation type of the intercepted frequency hopping signals in electronic information warfare is very important for the subsequent study and processing of the signals. In this paper, the Transformer algorithm is introduced into the field of modulation recognition, and the average recognition rate is 1.82% higher than ResNet50 by experimental comparison. For the interference of pre-processing cropping and patch merging in Swin Transformer on the clarity of time-frequency images, this paper adds Fast-NLM denoising to improve the average recognition rate by 0.8%. In addition, for the problem of attention scattering in Swin Transformer, this paper adopts a variable attention model, and the key sampling points around the reference points on the feature map are moved closer to the feature area by the calculation of offset, so that the feature representation can be better obtained. The experimental results show that the recognition rate of the improved model is 2.35% higher than that of the original model, the perception ability of some modulated signals is enhanced, and the addition of denoising can improve another 0.840%.","PeriodicalId":334790,"journal":{"name":"2023 3rd International Symposium on Computer Technology and Information Science (ISCTIS)","volume":"159 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132577556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Fault Diagnosis of Uninsulated Track Circuit Based on Stacked AutoEncoder","authors":"Liang Ren, Bohong Liu, Wenchen Zhu, Yalong Wang","doi":"10.1109/ISCTIS58954.2023.10213008","DOIUrl":"https://doi.org/10.1109/ISCTIS58954.2023.10213008","url":null,"abstract":"Aiming at the complexity and randomness of uninsulated track circuit fault diagnosis, a model for fault detection based on the Least Squares Support Vector Machine (LSSVM) improved by Stacked AutoEncoder (SAE) combined with Pelican Optimization Algorithm (POA) was proposed. Firstly, the feature extraction capability of SAE was used to mine the deep distribution characteristics of track circuit fault data. The fault characteristic values were sent into the POA-optimized LSSVM for fault identification, and the identification results were compared with the original tags to complete the reverse tuning of SAE network. Experimental findings demonstrate that the accuracy of SAE-POA-LSSVM model fault identification reaches 98.33%, which proves that this method is feasible.","PeriodicalId":334790,"journal":{"name":"2023 3rd International Symposium on Computer Technology and Information Science (ISCTIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132829314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deep reinforcement learning based multi-agent non-cooperative game strategy approach","authors":"Jianan Wang","doi":"10.1109/ISCTIS58954.2023.10213127","DOIUrl":"https://doi.org/10.1109/ISCTIS58954.2023.10213127","url":null,"abstract":"To address the problem of deep learning of multi-agent evolution based on cooperative equilibrium strategies without considering non-cooperative interactive self-learning games and evolution, this paper introduces non-cooperative game evolution into the interactive self-learning framework based on the MADDPG algorithm and designs a multi-agent interactive self-learning game evolution method. The experimental results show that the training curve tends to stabilize and reach non-cooperative equilibrium after the training of this method. The visualized experimental results are obtained by reproducing the experimental environment on Ubuntu. It is finally demonstrated that the MADDPG method based on the noncooperative equilibrium strategy has significant learning ability in terms of multi-agent.","PeriodicalId":334790,"journal":{"name":"2023 3rd International Symposium on Computer Technology and Information Science (ISCTIS)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133210872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy-Saving Method in SDN Networks Based on Deployment Location and Link Traffic","authors":"Hangyu Wang","doi":"10.1109/ISCTIS58954.2023.10213119","DOIUrl":"https://doi.org/10.1109/ISCTIS58954.2023.10213119","url":null,"abstract":"Facing the challenge of how to select suitable hybrid Software-Defined Networking (SDN) devices and optimize their performance and energy efficiency, this paper proposes a lightweight hybrid SDN network device selection and energy-saving scheme, known as Nlucs. This approach thoroughly takes into account link traffic information, node degrees, and node costs to identify the IP network nodes that need replacement. The newly introduced link optimization model achieves energy savings by dynamically turning off high link utilization links. The Nlucs algorithm not only avoids the issue of lengthy iterative solution times found in existing genetic algorithms, but also ensures a balance between network performance and energy-saving effects. The Nlucs algorithm was compared experimentally with other classic hybrid SDN network energy-saving algorithms. The results show that, whether in terms of energy-saving efficiency or stability, the Nlucs algorithm demonstrates significant advantages, especially in large-scale networks where it can save energy more effectively and reduce network operation costs. This research provides a new direction and implementation plan for device selection and energy-saving strategies in hybrid SDN networks.","PeriodicalId":334790,"journal":{"name":"2023 3rd International Symposium on Computer Technology and Information Science (ISCTIS)","volume":"530 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123037802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lihua Zhao, Tingting Wen, Hejian Wang, Weiwei Pang
{"title":"Research on smart contract evaluation method for open source blockchain","authors":"Lihua Zhao, Tingting Wen, Hejian Wang, Weiwei Pang","doi":"10.1109/ISCTIS58954.2023.10213088","DOIUrl":"https://doi.org/10.1109/ISCTIS58954.2023.10213088","url":null,"abstract":"The smart contract can complete the agreement by automatic execution between the parties of the blockchain network. It provides the basis for various distributed application services. In recent years, the security loopholes of smart contracts have exploded frequently, caused huge economic losses. The research on its security inspection has become a hot topic and a key scientific problem that needs to be solved urgently in the field of blockchain security. In the paper, firstly, gives the vulnerability of open blockchain system smart contract, investigates the mainstream smart contract vulnerability detection methods; then proposes the vulnerability detection model of smart contract based on gated graph neural network, and tests its performance. Finally, draws a conclusion that graph neural network technology can improve the accuracy of smart contracts mainstream vulnerability testing, and plans the future research direction.","PeriodicalId":334790,"journal":{"name":"2023 3rd International Symposium on Computer Technology and Information Science (ISCTIS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123883252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DiffLIE: Low-Light Image Enhancment based on Deep Diffusion Model","authors":"Guanyu Wu, Cheng Jin","doi":"10.1109/ISCTIS58954.2023.10213153","DOIUrl":"https://doi.org/10.1109/ISCTIS58954.2023.10213153","url":null,"abstract":"Low-light Image Enhancement (LIE) has received significant attention in the field of computer vision low-level tasks in recent years. Previous work mainly treated LIE as a lighting enhancement work based on the Retinex theory. In this paper, we propose a new approach that utilizes the powerful generative network, the deep diffusion model, to regard LIE as a task of generating normal illumination images from pure black images. We modeled the enhancement process of low-light images based on the Markov assumption of conditional probability and constructed a controllable illumination enhancement model with diversified outputs. The experimental results achieved excellent visual effects and PSNR indicators on various synthetic datasets and real datasets.","PeriodicalId":334790,"journal":{"name":"2023 3rd International Symposium on Computer Technology and Information Science (ISCTIS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124554165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved Spectral Subtraction Based on Second-Order Differential Array and Phase Spectrum Compensation","authors":"Jieye Liang, Qingning Zeng","doi":"10.1109/ISCTIS58954.2023.10212993","DOIUrl":"https://doi.org/10.1109/ISCTIS58954.2023.10212993","url":null,"abstract":"Traditional spectral subtraction speech enhancement algorithm is inaccurate in noise estimation in complex environments, and often employ noisy phase while reconstructing the enhanced signal. In this paper, an improved spectral subtraction algorithm based on second-order differential microphone array and phase spectrum compensation is proposed. The method uses second-order differential microphone array beamforming to extract the speech signal and noise signal from the collected array speech and process them accordingly. If the signal-to-noise ratio of the current frame is greater than the preset threshold, the power spectrum subtraction is performed to reduce the impact of noise; conversely, the noise is attenuated directly. Then, phase spectrum compensation is used to obtain more accurate phase information for speech reconstruction. Experimental results demonstrate that the proposed algorithm effectively suppresses various types of noise and outperforms the comparison algorithms in terms of denoising performance and speech intelligibility.","PeriodicalId":334790,"journal":{"name":"2023 3rd International Symposium on Computer Technology and Information Science (ISCTIS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129165567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Localization of Pallets in Narrow Aisles for Unmanned Forklifts","authors":"Peng Sun, Wei Ding, Mingchang Lian, Hao Chen","doi":"10.1109/ISCTIS58954.2023.10212995","DOIUrl":"https://doi.org/10.1109/ISCTIS58954.2023.10212995","url":null,"abstract":"As the application of unmanned forklifts becomes more and more widespread, logistics scenarios are constantly evolving. This paper focuses on a scenario where the pick-up of pallets perpendicular to forklift in narrow aisles is required. The narrow aisles only allow the forklift to complete the turning, performing pallet localization in front of it will be difficult. We proposes a method for localizing pallets in narrow aisles for unmanned forklifts. By installing the camera at an oblique angle above the pallet, the collected images are uploaded to the image processing system. The YOLOv5 is used to detect the pallet and extract the bounding boxes of the pallet class. Based on the bounding box coordinates, the original image is cropped. Convert the cropped image to grayscale for Canny edge detection, and then perform Hough line detection to extract the right edge of the pallet. This right edge will be compared with the reference pallet edge to obtain the relative localization between the pallet and the unmanned forklift.","PeriodicalId":334790,"journal":{"name":"2023 3rd International Symposium on Computer Technology and Information Science (ISCTIS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114185595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Traffic Demand Forecast and Analysis for the Area Around Zhongshan Road","authors":"Haoran Xiong","doi":"10.1109/ISCTIS58954.2023.10213162","DOIUrl":"https://doi.org/10.1109/ISCTIS58954.2023.10213162","url":null,"abstract":"In recent years, with the development of social economy, urban roads have also been under gradually increasing pressure. Traffic planning is the fundamental measure to solve the existing traffic problems. Many urban road congestion problems are not caused by inadequate traffic organization and management, but by defects at the planning level. The study area of this paper is located on Zhongshan Road in Dalian, which spans three administrative districts and connects financial, cultural, political, and commercial centers into one. The data used are from the 2019 survey of relevant personnel, the OD inversion using TransCAD, the occurrence and attraction of traffic, the traffic distribution, and finally the traffic flow prediction. In the traffic distribution prediction for 2022, 2024 and 2026 respectively using exponential growth method and gravity model method. The final analysis of Anshan Road, Huanghe Road and Shengli Road become the key remediation objects, remediation methods such as limited number driving, development of public transportation, optimization of intersections, planning the corresponding tidal lanes.","PeriodicalId":334790,"journal":{"name":"2023 3rd International Symposium on Computer Technology and Information Science (ISCTIS)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115775110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}