2021 International Symposium on Computer Technology and Information Science (ISCTIS)最新文献

筛选
英文 中文
Dynamic Flow Entry Timeouts Based Packet Nonuniform Sampling for Elephant Flow Detection 大象流检测中基于动态流入口超时的数据包非均匀采样
2021 International Symposium on Computer Technology and Information Science (ISCTIS) Pub Date : 2021-06-01 DOI: 10.1109/ISCTIS51085.2021.00091
Ling Xia Liao, Xiaohang Ma, Zhi Li, Han-Chieh Chao
{"title":"Dynamic Flow Entry Timeouts Based Packet Nonuniform Sampling for Elephant Flow Detection","authors":"Ling Xia Liao, Xiaohang Ma, Zhi Li, Han-Chieh Chao","doi":"10.1109/ISCTIS51085.2021.00091","DOIUrl":"https://doi.org/10.1109/ISCTIS51085.2021.00091","url":null,"abstract":"This paper proposes a controller-based elephant detection approach based on packet statistics sampled by dynamic timeouts of flow entries. It avoids transporting statistics generated at switches to controllers by directly counting statistics using the packets forwarded to controllers for the installation and reactivation of entries. By initializing entries with hard timeout of 0.008s, and keeping doubling it whenever the entries timed out until flows are detected as elephants or out of life spans (the timeouts of flow entries of flows that have been detected as elephants are switched to idle timeout of 5s), the approach achieves a detection accuracy around 90% while reducing the bandwidth usage to less than 30% of the original over packet traces caught from the same network. By giving various initial timeout adjustment strategy to TCP and UDP flows, the approach can maintain the same high detection accuracy and low bandwidth usage over various networks.","PeriodicalId":403102,"journal":{"name":"2021 International Symposium on Computer Technology and Information Science (ISCTIS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133716270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Electrolytic Aluminum Pot Tending Machine Scheduling Based on Improved Greedy Algorithm 基于改进贪心算法的电解铝罐机调度研究
2021 International Symposium on Computer Technology and Information Science (ISCTIS) Pub Date : 2021-06-01 DOI: 10.1109/ISCTIS51085.2021.00069
Chengguo Su, Jiarui Cui, Xiangquan Li, Qun Yan, Bin Cao, Ruoyu Huang, Hui Lu
{"title":"Research on Electrolytic Aluminum Pot Tending Machine Scheduling Based on Improved Greedy Algorithm","authors":"Chengguo Su, Jiarui Cui, Xiangquan Li, Qun Yan, Bin Cao, Ruoyu Huang, Hui Lu","doi":"10.1109/ISCTIS51085.2021.00069","DOIUrl":"https://doi.org/10.1109/ISCTIS51085.2021.00069","url":null,"abstract":"A scheduling method based on an improved greedy algorithm is proposed, and it aims to improve the working efficiency of the pot tending machine (PTM) in the aluminum electrolysis production process. First, the PTM temporary scheduling tasks are screened out by considering the constraints and the production process, in the situation of meet the actual production needs. Second, use the shortest time slice as the time benchmark for the greedy algorithm through analysis tasks. Third, an improved greedy algorithm- the depth-first search algorithm is combined with the greedy algorithm is proposed, it not only improves the efficiency of PTM allocation and scheduling, but also solves the problem of repeated search in the traditional algorithm. Finally, simulation verification the proposed scheduling algorithm.","PeriodicalId":403102,"journal":{"name":"2021 International Symposium on Computer Technology and Information Science (ISCTIS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131771216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Charge Density Model of Silicon-nanowire GAA MOSFET Incoroperating the Source-drian Tunneling Effect for IC Design 集成电路设计中考虑源驱动隧道效应的硅-纳米线GAA MOSFET电荷密度模型
2021 International Symposium on Computer Technology and Information Science (ISCTIS) Pub Date : 2021-06-01 DOI: 10.1109/ISCTIS51085.2021.00078
He Cheng, Chao Zhang, Tiefeng Liu, C. Xie, Zhjia Yang, Zhipeng Zhang
{"title":"A Charge Density Model of Silicon-nanowire GAA MOSFET Incoroperating the Source-drian Tunneling Effect for IC Design","authors":"He Cheng, Chao Zhang, Tiefeng Liu, C. Xie, Zhjia Yang, Zhipeng Zhang","doi":"10.1109/ISCTIS51085.2021.00078","DOIUrl":"https://doi.org/10.1109/ISCTIS51085.2021.00078","url":null,"abstract":"One numerical compact model for one-dimensional electron charge density of n-type silicon ballistic nanowire gate-all-around metal-oxide-semiconductor field-effect transistors with ultra-short channel incorporating the source-drain tunneling is proposed. When establishing the AC model in practical device applications, compact models describing transient analysis of the carrier behaviors in the device channel are needed. When focusing on the charge density of carriers within GAA MOSFET devices, carriers transporting along the channel direction induced by the source-drain tunneling effect should also be taken into account in the subthreshold region. In this study, transmission coefficients of the source-drain tunneling effect are evaluated through expressing energy level of the lowest subband with bringing in the exact boundary conditions and using the Wentzel-Kramers-Brillouin approximation. Then, the carrier density can be derived from the charge profile in the channel using quantum statistics theory. Finally, comparisons of the calculations of the carrier densities between the source-drain tunneling and the thermionic modes in ballistic transport are demonstrated.","PeriodicalId":403102,"journal":{"name":"2021 International Symposium on Computer Technology and Information Science (ISCTIS)","volume":"31 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131811018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Stored Grain Pests Monitoring System Based on Raspberry Pi 基于树莓派的储粮害虫监测系统
2021 International Symposium on Computer Technology and Information Science (ISCTIS) Pub Date : 2021-06-01 DOI: 10.1109/ISCTIS51085.2021.00021
Tian–xing Xu, Huang Feng-ying
{"title":"Stored Grain Pests Monitoring System Based on Raspberry Pi","authors":"Tian–xing Xu, Huang Feng-ying","doi":"10.1109/ISCTIS51085.2021.00021","DOIUrl":"https://doi.org/10.1109/ISCTIS51085.2021.00021","url":null,"abstract":"In order to solve the problem of pests in stored grain and try to reduce the loss rate of grain storage, a stored grain pests monitoring system is proposed in this paper. This system is based on Raspberry Pi, can monitor the situation in the grain pile in real-time. It uses sensors to monitor the temperature, humidity, and oxygen concentration in the granary, use cameras to capture the pests in the grain pile, and take photo of the pests. Users can view sensors' data through Web or App and receive warning information from the system to achieve the purpose of real-time monitoring and warning. This design has good practical value and development prospect.","PeriodicalId":403102,"journal":{"name":"2021 International Symposium on Computer Technology and Information Science (ISCTIS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114554005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research on the MAX038 Simulation Model for Electromagnetic Inspection MAX038电磁检测仿真模型的研究
2021 International Symposium on Computer Technology and Information Science (ISCTIS) Pub Date : 2021-06-01 DOI: 10.1109/ISCTIS51085.2021.00086
Guo Qing, Hongbo Zhang, Hongzhi Hu, Qin Chang
{"title":"Research on the MAX038 Simulation Model for Electromagnetic Inspection","authors":"Guo Qing, Hongbo Zhang, Hongzhi Hu, Qin Chang","doi":"10.1109/ISCTIS51085.2021.00086","DOIUrl":"https://doi.org/10.1109/ISCTIS51085.2021.00086","url":null,"abstract":"The high-frequency signal generator MAX038 is particularly suitable for RF signal sources of electromagnetic nondestructive testing, but the lack of finite element simulation model impedes the application of MAX038 in physical field simulation analysis. In this paper, we study the internal structure and principle of MAX038, divide its equivalent circuit architecture into different function modules, and then create and package its simulation model with modularization method. Based on the MAX038 simulation model, the RF excitation signal generator is designed and fabricated by using MSP430 processor, and an optimized detection algorithm is proposed to verify the simulation model. The test results of the MAX038 model and RF signal generator show that the MAX038 model proposed in this paper matches the real chip performance, it can also meet the requirements of simulation analysis for the parameter coupling relationship between electromagnetic field and defects.","PeriodicalId":403102,"journal":{"name":"2021 International Symposium on Computer Technology and Information Science (ISCTIS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121587524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
[Copyright notice] (版权)
2021 International Symposium on Computer Technology and Information Science (ISCTIS) Pub Date : 2021-06-01 DOI: 10.1109/isctis51085.2021.00003
{"title":"[Copyright notice]","authors":"","doi":"10.1109/isctis51085.2021.00003","DOIUrl":"https://doi.org/10.1109/isctis51085.2021.00003","url":null,"abstract":"","PeriodicalId":403102,"journal":{"name":"2021 International Symposium on Computer Technology and Information Science (ISCTIS)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122497563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ballistic Target Signal Separation Based on Fast Independent Component Analysis Algorithm 基于快速独立分量分析算法的弹道目标信号分离
2021 International Symposium on Computer Technology and Information Science (ISCTIS) Pub Date : 2021-06-01 DOI: 10.1109/ISCTIS51085.2021.00072
Yuxi Li, Peng Li
{"title":"Ballistic Target Signal Separation Based on Fast Independent Component Analysis Algorithm","authors":"Yuxi Li, Peng Li","doi":"10.1109/ISCTIS51085.2021.00072","DOIUrl":"https://doi.org/10.1109/ISCTIS51085.2021.00072","url":null,"abstract":"In the process of modern anti-missile warfare, accurate identification of ballistic targets is crucial, and achieving the separation of target micro-Doppler curves is a key step for accurate identification. Aiming at this problem, this paper proposes a Fast-ICA algorithm to separate the micro-Doppler curves of the scattering points. According to the results of the simulation experiment, the signal is separated well, which verifies the effectiveness of the proposed algorithm.","PeriodicalId":403102,"journal":{"name":"2021 International Symposium on Computer Technology and Information Science (ISCTIS)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125554046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Vulnerability Detection Algorithm of Lightweight Linux Internet of Things Application with Symbolic Execution Method 基于符号执行的轻量级Linux物联网应用漏洞检测算法
2021 International Symposium on Computer Technology and Information Science (ISCTIS) Pub Date : 2021-06-01 DOI: 10.1109/ISCTIS51085.2021.00013
Hongrui Li, Li-li Zhou, Ming-ming Xing, H. Taha
{"title":"Vulnerability Detection Algorithm of Lightweight Linux Internet of Things Application with Symbolic Execution Method","authors":"Hongrui Li, Li-li Zhou, Ming-ming Xing, H. Taha","doi":"10.1109/ISCTIS51085.2021.00013","DOIUrl":"https://doi.org/10.1109/ISCTIS51085.2021.00013","url":null,"abstract":"The security of Internet of Things (IoT) devices has become a matter of great concern in recent years. The existence of security holes in the executable programs in the IoT devices has resulted in difficult to estimate security risks. For a long time, vulnerability detection is mainly completed by manual debugging and analysis, and the detection efficiency is low and the accuracy is difficult to guarantee. In this paper, the mainstream automated vulnerability analysis methods in recent years are studied, and a vulnerability detection algorithm based on symbol execution is presented. The detection algorithm is suitable for lightweight applications in small and medium-sized IoT devices. It realizes three functions: buffer overflow vulnerability detection, encryption reliability detection and protection state detection. The robustness of the detection algorithm was tested in the experiment, and the detection of overflow vulnerability program was completed within 2.75 seconds, and the detection of encryption reliability was completed within 1.79 seconds. Repeating the test with multiple sets of data showed a small difference of less than 6.4 milliseconds. The results show that the symbol execution detection algorithm presented in this paper has high detection efficiency and more robust accuracy and robustness.","PeriodicalId":403102,"journal":{"name":"2021 International Symposium on Computer Technology and Information Science (ISCTIS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116839639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fruit ripeness detection based on miniature spectral sensor 基于微型光谱传感器的水果成熟度检测
2021 International Symposium on Computer Technology and Information Science (ISCTIS) Pub Date : 2021-06-01 DOI: 10.1109/ISCTIS51085.2021.00027
Yvhan Jiao, Qi Zhang, Xinyao Luo, Zhaohua Liang
{"title":"Fruit ripeness detection based on miniature spectral sensor","authors":"Yvhan Jiao, Qi Zhang, Xinyao Luo, Zhaohua Liang","doi":"10.1109/ISCTIS51085.2021.00027","DOIUrl":"https://doi.org/10.1109/ISCTIS51085.2021.00027","url":null,"abstract":"Due to the problems of short shelf life and poor taste of immature fruits, a reasonable judgment of fruit maturity in the process of fruit picking and transportation can not only promote the development of China's fruit industry, but also is very important for China's fruit export trade. This device is a miniature spectrometer designed with C12666MA as the spectral sensor. It can collect and process the spectral signal of fruit surface pigment, communicate with Android smart phone through ESP32, draw on the smart phone APP and analyze the spectral data, so as to achieve the purpose of detecting fruit maturity. In the process of the experiment, the spectral signal of chlorophyll in the epidermis of different fruit varieties was detected. The detector could meet the measurement requirements and realize nondestructive testing. It also has the advantages of easy to carry, low cost and high precision.","PeriodicalId":403102,"journal":{"name":"2021 International Symposium on Computer Technology and Information Science (ISCTIS)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115230400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
General Model-Agnostic Transfer Learning for Natural Degradation Image Enhancement 自然退化图像增强的通用模型不可知迁移学习
2021 International Symposium on Computer Technology and Information Science (ISCTIS) Pub Date : 2021-06-01 DOI: 10.1109/ISCTIS51085.2021.00059
Xiangyu Yin, Jun Ma
{"title":"General Model-Agnostic Transfer Learning for Natural Degradation Image Enhancement","authors":"Xiangyu Yin, Jun Ma","doi":"10.1109/ISCTIS51085.2021.00059","DOIUrl":"https://doi.org/10.1109/ISCTIS51085.2021.00059","url":null,"abstract":"In order to obtain high-quality images in natural conditions, natural degradation image enhancement has been a research hotspot in recent years. In this paper, we present a transfer learning approach for multiple types of natural degradation image enhancement. We propose to create a common source domain for various natural degradations and perform the transfer learning for every specific natural degradation individually. By reusing the general enhancement model, we can circumvent the scarcity of training dataset and the computation-intensive training process for deep learning methods. In the experiment, we transfer the general model to three target tasks: raining image enhancement, snowing image enhancement and underwater image enhancement. With the finetuning of only 5 epochs, the enhancement models have been able to outperform several state-of-the-art methods that designed for specific task.","PeriodicalId":403102,"journal":{"name":"2021 International Symposium on Computer Technology and Information Science (ISCTIS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129645253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信