{"title":"MetaHuman Creator The starting point of the metaverse","authors":"Zhixin Fang, Libai Cai, Gang Wang","doi":"10.1109/ISCTIS51085.2021.00040","DOIUrl":"https://doi.org/10.1109/ISCTIS51085.2021.00040","url":null,"abstract":"February 11, 2021, Epic Games revealed a first look at MetaHuman Creator, a new browser-based app that will empower anyone to create a bespoke photorealistic digital human, fully rigged and complete with hair and clothing, in a matter of minutes. Metahuman Creator makes the digital avatars through an intuitive workflow, which means the Cyborg era is on the horizon.","PeriodicalId":403102,"journal":{"name":"2021 International Symposium on Computer Technology and Information Science (ISCTIS)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121192684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DOA Estimation Method Based On Improved Variable-Step-Size LMS Algorithm","authors":"Y. Qin, Simin Li, Zhiling Tang","doi":"10.1109/ISCTIS51085.2021.00018","DOIUrl":"https://doi.org/10.1109/ISCTIS51085.2021.00018","url":null,"abstract":"As an important branch of array signal processing, the beamforming algorithm can form gain in the direction of the desired signal and null in the direction of the interference signal, which can effectively suppress the interference of multipath signals. To address the problem that the classical spatial spectrum estimation algorithm does not have high resolution for the estimation of coherent sources, a DOA estimation method based on the Witch function and normalization of variable-step-size LMS algorithm is proposed in this paper. By defining the reciprocal of the array pattern as the spatial spectrum, the proposed method regards the DOA estimation as a peak search. The simulation results show that the proposed method can effectively suppress the interference of multipath signals. And it has similar performance with the classical spatial spectrum estimation method. Compared with other beamforming methods, the proposed method has convergence speed and better stead-state performance.","PeriodicalId":403102,"journal":{"name":"2021 International Symposium on Computer Technology and Information Science (ISCTIS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127085388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analytical instrument data format analysis method and application on marine power system","authors":"Zhou Jianhui, S. Feng, Shi-feng Hao, Liu Jie","doi":"10.1109/ISCTIS51085.2021.00044","DOIUrl":"https://doi.org/10.1109/ISCTIS51085.2021.00044","url":null,"abstract":"In the process of condition monitoring and fault diagnosis of Marine power system, it is necessary to use the special software of oil analyzer to extract the fault features of oil.To simplify the work, a method is proposed, which searches binary data and converts it to floating point number, and then compares it with the search value to determine the position of floating point number in the file. Thus, a set of auxiliary format parsing tools based on API function to automatically obtain eigenvalue are designed.This tool has been used to test the data of real ship oil spectrum instrument of ship power system. Results show that the algorithm is feasible and can automatically obtain the corresponding position, floating-point type instrument data correctly the separating equipment data storage format, get rid of the limitation of the instrument special built-in software, can be used to implement from instrument data file automatically obtain the content of the need to save or make use of integration analysis.","PeriodicalId":403102,"journal":{"name":"2021 International Symposium on Computer Technology and Information Science (ISCTIS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130459746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel sub ADC architecture for time interleaved","authors":"Weikun Cai, Chunwu Liu","doi":"10.1109/ISCTIS51085.2021.00034","DOIUrl":"https://doi.org/10.1109/ISCTIS51085.2021.00034","url":null,"abstract":"This paper studies the sub ADC of time interleaved architecture commonly used in ultra-high speed ADC. Aiming at the shortcomings of pipeline ADC and successive approximation ADC, a two-stage sub ADC architecture combining pipeline ADC and successive approximation ADC is proposed. The rationality of the architecture is verified by Simulink modeling. This architecture combines the advantages of the two kinds of ADC, and improves the performance of single sub ADC and provides a new direction for the selection of sub ADC in time interleaved architecture.","PeriodicalId":403102,"journal":{"name":"2021 International Symposium on Computer Technology and Information Science (ISCTIS)","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133803103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hao Lu, Donghao Zhao, Zhiwei Li, Leiping Xi, Qiong Li
{"title":"A Jamming Situation Generation Method for Space-Air Network Based on Newton's Law of Cooling","authors":"Hao Lu, Donghao Zhao, Zhiwei Li, Leiping Xi, Qiong Li","doi":"10.1109/ISCTIS51085.2021.00030","DOIUrl":"https://doi.org/10.1109/ISCTIS51085.2021.00030","url":null,"abstract":"Jamming situation generation is very important for space-air networks to respond to jamming attacks and improve communication quality. The traditional jamming situation generation method does not work well when the sampling points are sparse and the sample size is small. When the space-air platform moves at a high speed and the jamming source moves at a high speed, the sampled data has the problem of incompatibility of temporal and spatial characteristics. In order to solve these problems, this paper proposes a method of generating jamming situation based on Newton's law of cooling. Using this method, situation information in different time domains and different airspaces can be superimposed, and the jamming situation generation capability of the space-air network composed of relay satellites and drone clusters can be significantly improved. Through simulation experiments, the method proposed in this paper has obvious advantages in sensing range and sensing accuracy compared with traditional jamming situation generation methods.","PeriodicalId":403102,"journal":{"name":"2021 International Symposium on Computer Technology and Information Science (ISCTIS)","volume":" 31","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113950902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on PowerShell Obfuscation Technology Based on Abstract Syntax Tree Transformation","authors":"Xiaomeng Xu, S. Liu, Pu Yu, Yuntian Zhao","doi":"10.1109/ISCTIS51085.2021.00032","DOIUrl":"https://doi.org/10.1109/ISCTIS51085.2021.00032","url":null,"abstract":"In recent years, PowerShell scripts can be easily obfuscated and widely used due to its usability and flexibility. However, anti-obfuscation tools such as PowerShellProfiler and CyberChef also developed rapidly. In order to improve the security of scripts, this paper proposes a PowerShell obfuscation technology based on abstract syntax tree transformation. Firstly, this technology performs the equivalent replacement of the grammatical structure in the script. In addition, it also changes the sequence of the child nodes of the abstract syntax tree. Finally,it obfuscates the PSToken in the script. Thus, this technology can make up for the defects of the traditional obfuscation technology, and hide the program logic better to improve the concealment of the script. The experimental results show that the use of this technology proposed in this paper can improve the strength of obfuscation over 82.7% on average, which is 16% higher than traditional obfuscation technology. Moreover, this method is more effective against anti-obfuscation tools.","PeriodicalId":403102,"journal":{"name":"2021 International Symposium on Computer Technology and Information Science (ISCTIS)","volume":"41 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114045214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Long Range Wireless Alarm System Based on LoRa and TOF LiDAR","authors":"Weifeng Wu, Feng-ying Huang","doi":"10.1109/ISCTIS51085.2021.00020","DOIUrl":"https://doi.org/10.1109/ISCTIS51085.2021.00020","url":null,"abstract":"This paper presents preliminary design of a long-range wireless alarm system. It discusses two schemes for long-range wireless network in different situations, then shows the hardware design of the alarm system. The system designed with Espressif ESP32-WROOM-32 microcontroller and Ai-Thinker Ra-02 LoRa module based on Semtech SX1278, which is separate into sender side and receiver side. In sender side, a TOF Lidar distance sensor is used to calculating the real-time distance at high speed. Once an object approaches and the distance calculated by TOF Lidar below the alarm threshold, the sender side will distribute a specific LoRa packet. In the meanwhile, the receiver recognizes the packet to trigger the alarm module.","PeriodicalId":403102,"journal":{"name":"2021 International Symposium on Computer Technology and Information Science (ISCTIS)","volume":"198 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122494966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of an Intelligent Window and Research on Its Key Technology","authors":"Q. Wan, Zheng Xiong, Suhua Wang","doi":"10.1109/ISCTIS51085.2021.00068","DOIUrl":"https://doi.org/10.1109/ISCTIS51085.2021.00068","url":null,"abstract":"Most of the intelligent windows sold on the market are simple windows that can only be opened and closed by remote control, or windows that can be linked with curtains and exhaust fans to achieve other functions. Their functions are relatively single, which can not fully reflect the advantages of “intelligence”, and they are not real intelligent windows. Therefore, in view of this problem, a new type of intelligent window was designed. The design of the window includes the structure design and the control system design based on STM32 MCU. At the same time, the key technology of tracking the sun light and reflecting the sunlight into the room was studied. The angle relationships between the outgoing light and the rotation axis of the mirror louver, the plane of the louver, the incident light and the outgoing light were determined. According to these relationships, the angle of the louver was controlled and adjusted, so as to reflect the outdoor sunlight into the room. Finally, it can realize four functions, such as opening and closing automatically, rain proof, inducing wind and improving indoor lighting, so that it can become a real intelligent window.","PeriodicalId":403102,"journal":{"name":"2021 International Symposium on Computer Technology and Information Science (ISCTIS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117197637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. He, Y. Lit, Shaohua Dong, Cui Li, Y. Wang, Rui Jin, J. Wu
{"title":"The Simulation of Increasing Robustness of High Voltage Fast Recovery Diode used in VSC-HVDC Equipments","authors":"F. He, Y. Lit, Shaohua Dong, Cui Li, Y. Wang, Rui Jin, J. Wu","doi":"10.1109/ISCTIS51085.2021.00062","DOIUrl":"https://doi.org/10.1109/ISCTIS51085.2021.00062","url":null,"abstract":"The transition region, which is the transition from the active region of the fast recovery diode chip to the terminal region, is the weakness of the fast recovery diode during reverse recovery and need to be optimized. Especially when used in VSC-HVDC equipments, FRD chips need to be operated at high current change rate. Hence, an optimization scheme for the high resistance zone is proposed in this paper. By setting up three simulation models, the effects of high resistance zone width and doping concentration on reverse recovery performance of FRDs are studied. The high resistance zone structure effectively enhances the toleration of FRD chip to voltage stress, current stress and di/dt stress during reverse recovery. The maximum junction temperature of optimized FRD with high resistance zone increases only 188K, under the condition of 2500 V, 400A, 2500A/µs, which is better than that of conventional FRD. And the RRSOA limit is improved to 2900V, 450A, 3000A/µs. The 3.3kV FRD chips are prepared according to the optimized simulation model. After 12 chips are packaged in parallel, the reverse recovery test of 2800 V, 3200A, 7348A/µs conditions is passed, and the robustness of the FRD device is greatly improved. The actually prepared fast recovery diodes have an outstanding improvement to the reverse recovery safe operation area, and the theoretical simulation and the practical test are unified.","PeriodicalId":403102,"journal":{"name":"2021 International Symposium on Computer Technology and Information Science (ISCTIS)","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131737433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Control of Computer Room Personnel Based on OpenCV","authors":"Wenzhi Wu, Ying Wei","doi":"10.1109/ISCTIS51085.2021.00009","DOIUrl":"https://doi.org/10.1109/ISCTIS51085.2021.00009","url":null,"abstract":"As one of the commonly used techniques of identity authentication, face recognition has great application value in computer room monitoring. Taking Raspberry Pi as the system carrier, the project adopts OpenCV image recognition library Haar feature and Face Recognition Library for the detection and recognition of the personnel entering the computer room, classifies the detection results, and optimizes the results by using the error optimization algorithm. As indicated by the final results, the OpenCV-based computer room personnel control system has an accuracy rate of 99.09%, which can be applied in actual computer room inspection system.","PeriodicalId":403102,"journal":{"name":"2021 International Symposium on Computer Technology and Information Science (ISCTIS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130429571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}