{"title":"Detection of Threat Situation for UAV Collision Avoidance Based on Sliding Window Polynomial Fitting Prediction Method","authors":"Xusheng Gan, Hong Qu, Pingni Liu, Qian Wang","doi":"10.1109/ICICAS48597.2019.00056","DOIUrl":"https://doi.org/10.1109/ICICAS48597.2019.00056","url":null,"abstract":"The detection of air threat situation is the key to the early warning for UAV flight collision avoidance. For this reason, a detection method of air threat situation based on sliding window polynomial fitting prediction is proposed. Firstly, the sliding window polynomial fitting method is used to dynamically predict the track of the intruder. Then, on the basis of the track prediction, using the flight information of UAV and intruder, the detection and alarm for flight conflict trend between UAV and intruder is carried out in a specific flight scenario. Simulation validates the effectiveness of the proposed method and the feasibility of application in the early warning for UAV flight collision avoidance.","PeriodicalId":409693,"journal":{"name":"2019 International Conference on Intelligent Computing, Automation and Systems (ICICAS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127950481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Physical Layer Authentication Method Based on Exponential Average Data Enhancement","authors":"Baifeng Ning, Xinchen Xu, Wei Wang, Zhonghang Li, Zhihan Zhang, Feiyi Xie, H. Wen","doi":"10.1109/ICICAS48597.2019.00184","DOIUrl":"https://doi.org/10.1109/ICICAS48597.2019.00184","url":null,"abstract":"Edge computing can achieve faster network service response due to its nearby access characteristics. In the process of massive heterogeneous terminals accessing the network through edge devices, achieving fast and reliable authentication is extremely challenging. The physical layer authentication technology uses channel characteristics for authentication. It is lightweight and can well adapt to the authentication scenario of massive heterogeneous terminal access. The asymmetric resources provided by edge computing are especially suitable for access authentication of physical layer technology. Based on the background of edge computing, this article proposes a physical layer authentication method with exponential average enhancement.","PeriodicalId":409693,"journal":{"name":"2019 International Conference on Intelligent Computing, Automation and Systems (ICICAS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129652918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Uncertainty Property on Intelligent Resource Provision in Complex Cloud Environment","authors":"Hang Zhou, Xinying Zhu, Jian Wang","doi":"10.1109/ICICAS48597.2019.00043","DOIUrl":"https://doi.org/10.1109/ICICAS48597.2019.00043","url":null,"abstract":"Resource provision is one of the key issues for multiple objective optimizations in cloud data center. This paper emphasizes the fluctuation of workload and investigates the uncertainty property in complex cloud environment especially in software-defined cloud. By leveraging the uncertainty theory, the resource demand value from workload in each dimension is defined as uncertain variable while the uncertain distribution is applied to quantify the variable. The experimental simulation in this paper shows that the uncertain property has great potential in the combinational resource provision.","PeriodicalId":409693,"journal":{"name":"2019 International Conference on Intelligent Computing, Automation and Systems (ICICAS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124461427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lin Qian, Jun Yu, Guangxin Zhu, Feng Mei, Wenda Lu, Bingyu Ge, Lin Wang, Zhu Mei, Hengmao Pang, Mingjie Xu, Haiyang Chen
{"title":"A Duplication Reduction Approach for Unstructured Data Using Machine Learning Method","authors":"Lin Qian, Jun Yu, Guangxin Zhu, Feng Mei, Wenda Lu, Bingyu Ge, Lin Wang, Zhu Mei, Hengmao Pang, Mingjie Xu, Haiyang Chen","doi":"10.1109/ICICAS48597.2019.00113","DOIUrl":"https://doi.org/10.1109/ICICAS48597.2019.00113","url":null,"abstract":"With the development of the Internet technology, the data becomes more and more large, and occupy more and more storage space. Although the price of storage is becoming much cheaper than before, the physical space and the electric power consuming is still large, making much load when operating. In this paper, we propose a new method for duplicated unstructured data reduction. Firstly, we compute the features for all of our unstructured data, and then compare the them with other files in the filesystem. We remove the files with the high similarity and only leave one file. In this way, we can reduce many of duplicate files. We conduct experiments on real-world data. The results suggest the effectiveness of our method.","PeriodicalId":409693,"journal":{"name":"2019 International Conference on Intelligent Computing, Automation and Systems (ICICAS)","volume":"42 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122985242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TagNet: Tag Out the Value Sequence of SQL Statement","authors":"Yujie Zhong, Liutong Xu","doi":"10.1109/ICICAS48597.2019.00173","DOIUrl":"https://doi.org/10.1109/ICICAS48597.2019.00173","url":null,"abstract":"In order to assist person who doesn't know how to write SQL to access the data in a relation database, using a deep neural architecture to translate the natural language to SQL has recently been extensively studied. Previous work suffers from the complexity of where clause, since the number of conditions is totally random and predicting the value of condition is a sequence-to-sequence problem. We follow the slot filling idea, and introduce a model called TagNet. First of all, we innovatively propose a task attention mechanism. It takes the relativity of tasks into consideration for attention mechanism. Secondly, we use type embedding of each token of question and each column to enhance the representation for value prediction. Thirdly, in the task of predicting WHERE VALUE, we propose a tag decoder. It output a sequence of equal length compared with input. It consists of two tokens:, , indicating the corresponding token of input is whether or not a value token. We evaluate out model on WikiSQL, and compared to our baseline-SQLNet, we gain an absolute 7.6% increase on logic form accuracy and 6.3% increase on execution accuracy.","PeriodicalId":409693,"journal":{"name":"2019 International Conference on Intelligent Computing, Automation and Systems (ICICAS)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132476160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Canghong Jin, Ting Tao, Tao Ruan, Lei Xu, Xianzhe Luo, Rui Li
{"title":"A Novel Spatial-Temporal Fusion Framework Based on Object Trajectories","authors":"Canghong Jin, Ting Tao, Tao Ruan, Lei Xu, Xianzhe Luo, Rui Li","doi":"10.1109/ICICAS48597.2019.00139","DOIUrl":"https://doi.org/10.1109/ICICAS48597.2019.00139","url":null,"abstract":"With the development of information technology, the traces of residents could be caught by sensors all over the city, from which to identify specific people such as suspects, has become the focus of public security departments in recent years. Although there are some advantages of the mass of Spatio-temporal records, the activity records contain both temporal and spatial context is high-order and sparse. Therefore, it is difficult to identify users, especially for those small groups of individuals. In this paper, we propose a framework to identify users by fuzzed Spatio-temporal traces, in which we first extract the features from several perspectives and generate the TSGH (Time-slice Geohash) model and STPS (Spatio-temporal Proportion and Similarity) model. All these features are combined with classical classification models to distinguish users. We set up a real-life dataset and evaluate performance effectiveness with precision and recall measures. The final results show that the fuzzy operations could describe the characteristic of traces better and improve the prediction performance","PeriodicalId":409693,"journal":{"name":"2019 International Conference on Intelligent Computing, Automation and Systems (ICICAS)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132553056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Agility Measurement of Agile Supply Chain Network Based on Complex Network Theory","authors":"Yunxia Yao, Lin Li","doi":"10.1109/ICICAS48597.2019.00163","DOIUrl":"https://doi.org/10.1109/ICICAS48597.2019.00163","url":null,"abstract":"With the development of information technology, the supply chain has developed into a new stage of intelligent supply chain which is deeply integrated with the Internet and the Internet of Objects. In order to give full play to the characteristics of innovation, collaboration, win-win, openness and greenness in supply chain, and to build a smart supply chain system with big data support, network sharing and intelligent collaboration, the agility measurement of supply chain has become an urgent and important topic. This paper presents an agile metric based on complex network theory for agile supply chain network. Firstly, the mathematical expression of agile supply chain network and its agility measurement method are defined, and the constraints of complex network theory are also defined. Secondly, to facilitate the calculation of agility metrics, complex network theory is introduced into agile supply chain network. In addition, a large number of experiments have been designed and implemented to verify the accuracy of the proposed complex network theory in agile supply chain network measurement. At the same time, the agility of the supply chain network is measured, and its changing rules and optimization methods are summarized. The experimental results show that the proposed complex network theory can accurately measure the agility of agile supply chain network. The purpose of this paper is to provide a method to turn agile supply chain system into intelligent information system through mathematical modeling.","PeriodicalId":409693,"journal":{"name":"2019 International Conference on Intelligent Computing, Automation and Systems (ICICAS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114304084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Search and Improvement of DES Algorithm for Data Transmission Security in SCADA","authors":"Xudong Xu, Na Tian","doi":"10.1109/ICICAS48597.2019.00066","DOIUrl":"https://doi.org/10.1109/ICICAS48597.2019.00066","url":null,"abstract":"With the application of SCADA (Supervisory Control and Data Acquisition) is becoming more and more extensive in the national critical infrastructure. At the same time, compared with conventional control system, the data communication of SCADA system becomes more diverse and complex, and the communication system is more likely to be attacked, so improving the level of information security of SCADA system is very important and urgent. However, the wide application of DES has a short key in the world, which cannot meet the demand of the current network security. In this paper, ADES (Advanced Data Encryption Standard) algorithm is proposed and implemented in the C++ language, which is based on the deep research of data encryption methods and DES algorithm particularly. The method extends the length of DES from 64 bits to 128 bits. The function of ADES algorithm is closed to SM4 by experimental result, so the ADES can well meet the requirement of data transmission security.","PeriodicalId":409693,"journal":{"name":"2019 International Conference on Intelligent Computing, Automation and Systems (ICICAS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114399839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Controllable Image Segmentation Method Using the Inverse GAMMA Distribution Function Based on Histogram Specification","authors":"Dhekra Saeed, Huibin Shi, Barakat Ameen","doi":"10.1109/ICICAS48597.2019.00147","DOIUrl":"https://doi.org/10.1109/ICICAS48597.2019.00147","url":null,"abstract":"Image segmentation(IMSEG) is defined as a top of the basic and most significant process of digital image handling which refers to the techniques that used to partitioning and dividing an image into useful and meaningful parts, called segments. It's so important for many applications which difficult and inefficient to process the entire image, such as object recognition or image compression. So, IMSEG aims to segment the image into districts for further operations and processing. There are several techniques for image segmentation which divide the image into many parts regarding to some specific image properties such as the intensity value of pixels, relation between pixels, color, texture and so on. However, most image segmentation techniques have deficient ability to plainly tune the segment sensitivity of the segmented image. In our manuscript we will propose a new technique for image segmentations using the invers GAMMA distribution function based on histogram matching, the proposed technique provides a method to manage the segment sensitivity of segmented image via setting one parameter. Experimental outcomes pretend a superior execution of this created technique","PeriodicalId":409693,"journal":{"name":"2019 International Conference on Intelligent Computing, Automation and Systems (ICICAS)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115059957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Image Segmentation Algorithm Based on the Background Skeleton Feature","authors":"Bing Li, Shuofeng Li, Jin Li","doi":"10.1109/ICICAS48597.2019.00036","DOIUrl":"https://doi.org/10.1109/ICICAS48597.2019.00036","url":null,"abstract":"In order to improve the segmentation accuracy of adhered rice images, an automatic segmentation algorithm for adhered rice images based on background skeleton features is proposed. The experimental results show that the proposed algorithm can adapt well to the adhesion segmentation of different grains under complex condition. Compared with the classic distance transformation watershed algorithm and the improved watershed algorithm, Algorithm accuracy has improved a lot, and the formed grain segmentation boundary is smoother, with less influence on the shape.","PeriodicalId":409693,"journal":{"name":"2019 International Conference on Intelligent Computing, Automation and Systems (ICICAS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123649661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}