{"title":"Cordic-based Softmax Acceleration Method of Convolution Neural Network on FPGA","authors":"Yongxiang Cao, Wan'ang Xiao, Jingdun Jia, Dehua Wu, Weixin Zhou","doi":"10.1109/ICAIIS49377.2020.9194894","DOIUrl":"https://doi.org/10.1109/ICAIIS49377.2020.9194894","url":null,"abstract":"With the vigorous development of computing power, Convolutional Neural Network (CNN) is developing rapidly, and new CNN structures with more layers and better performance continue to appear. Field Programmable Gate Array(FPGA) has gradually become the best choice for people to deploy and accelerate CNNs as a current research hotspot. This paper has studied the hardware acceleration method of FPGA to implement and simulate the Softmax layer of Alexnet on Vivado 2018.1. Combined with the features of FPGA, the Cordic algorithm is used to implement basic operations such as division and exponential functions, instead of consuming floating-point arithmetic resources. The paper proposes a method to shrink the convergence domain and analyzes the errors generated by the different digits of data after quantization and fixed-point inputs. The relative error of the Softmax layer exponential function is controlled below 0.0146% by reducing the bit width which satisfied the design requirements and saved resources. This method can complete the calculation and classification of the Softmax layer in 66.5 cycles without processing the layer data at fixed points, which greatly improves the calculation speed of the Softmax layer.","PeriodicalId":416002,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Information Systems (ICAIIS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124058692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MaskS R-CNN Text Detector","authors":"P. Duan, Jiahao Pan, Wenbi Rao","doi":"10.1109/ICAIIS49377.2020.9194911","DOIUrl":"https://doi.org/10.1109/ICAIIS49377.2020.9194911","url":null,"abstract":"Scene text detection and scene text recognition are important components of scene text recognition system. Scene text detection, the initial stage of scene text recognition, aims to find out text area in the picture. Recently the target detection method Mask R-CNN has been employed scene text detection and achieved good performance. In this paper, we set forth a model, MaskS R-CNN text detector, based on Mask R-CNN, which attempts to detect scene text. In this model, a network block of Mask Scoring R-CNN is introduced to learn the high quality of the predicted instance mask scores. The mask scoring mechanism correct the inconformity between mask quality and mask score, at the same time improves instance segmentation performance by attaching great importance to more accurate mask predictions. The method put forward in this paper can achieve multi-directional and multi-language natural scene text detection. Compared with some existing traditional location methods based on edge, color and texture and some location methods based on deep learning, it is a relatively innovative method.","PeriodicalId":416002,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Information Systems (ICAIIS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130339114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection and recognition of hand abnormal state based on deep learning algorithm","authors":"Xiaoping Yu, Lin Zhu, Lanxu Jia","doi":"10.1109/ICAIIS49377.2020.9194919","DOIUrl":"https://doi.org/10.1109/ICAIIS49377.2020.9194919","url":null,"abstract":"The system collects and detects hand information of relevant persons in a specific area, and transmits the data to the server for calculation and processing. In response to the abnormal state of the hand, the result picture is fed back to the staff in real time through the mobile app. This paper proposes a method for detecting and recognizing abnormal hand states based on the improved yolov3 algorithm. The system collects real-time pictures of the hand through the camera to determine whether the hand is carrying ring, bandages, and whether there are bleeding points. After optimizing the network and preprocessing the data, the algorithm accuracy can reach 99.7%. In addition, the simplified processing of the model can reduce the burden on the hardware system.","PeriodicalId":416002,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Information Systems (ICAIIS)","volume":"189 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128934783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cossi Blaise Avoussoukpo, Chunxiang Xu, Marius Tchenagnon
{"title":"Polyvalent Wireless Communication System (PWCS); A Potentially Useful Technology for Opportunistic Networks","authors":"Cossi Blaise Avoussoukpo, Chunxiang Xu, Marius Tchenagnon","doi":"10.1109/ICAIIS49377.2020.9194809","DOIUrl":"https://doi.org/10.1109/ICAIIS49377.2020.9194809","url":null,"abstract":"The concept of the Internet of things is a paradigm that is supposed to integrate several complex technologies. Opportunistic Networks due to its nature, do share common characteristics with the Internet of Things. Thus, the study of opportunistic Networks could greatly benefit the Internet of Things area of research. The Opportunistic Networks aim to use the altruism of mobile or immobile things to achieve specific tasks. However, among other challenges to solve for the Opportunistic Networks to work appropriately is the lack of a flexible, low-cost, and polyvalent communication system. Thankfully, the Polyvalent(Multipurpose) Wireless Communication System (PWCS) appears as a serious candidate to solve that challenge. This paper aims to show the correlation between an existing but unexplored technology; the PWCS, and Opportunistic Networks providing four main contributions. First, this paper clarifies the concept of opportunistic networks. Second, it points out the key differences between OppNets and some communications models that emerged from Mobile Ad hoc Networks research. Third, it presents the PWCS. Finally, it provides the correlation between OppNets and the PWCS and also discusses the limitations of the PWCS. The PWCS, if given unbiased attention, may add value to the communication field.","PeriodicalId":416002,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Information Systems (ICAIIS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127604702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RLM: a new mask countermeasure to resist HO-CPA for GIFT","authors":"Yueqing Li, Shihui Zheng","doi":"10.1109/ICAIIS49377.2020.9194867","DOIUrl":"https://doi.org/10.1109/ICAIIS49377.2020.9194867","url":null,"abstract":"As a further development of the side channel technique, the security of crypto-chips has received extensive attention from researchers. A mask scheme based on a random number generator is usually used to protect crypto-chips, but it will result in extra memory and time consumption. How to balance the security of crypto-chips and the memory consumption has always been the research focus. In this paper, we use a random number generator to design a random loop mask scheme (RLM) for GIFT algorithm. The binary value of a random number is used to set the position and value of masks. In addition, the rotating S-box of the RSM scheme is combined with the small generation mask of a fixed mask scheme to make the RLM more secure. The experimental results show that the RLM scheme protects the intermediate values from being leaked. Compared to other common schemes, our RLM scheme could resist not only correlation power analysis (CPA) attacks but also higher-order correlation power analysis (HO-CP A) attacks. In addition, the RAM consumption was 49% less than that of the global mask scheme.","PeriodicalId":416002,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Information Systems (ICAIIS)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127850504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Echoda, S. Z. Farooq, Hong Xuebao, J. Chukwuma, Dongkai Yang
{"title":"Multipath Mitigation Analysis using Hatch Filter and DTW in Single Frequency RTK","authors":"N. Echoda, S. Z. Farooq, Hong Xuebao, J. Chukwuma, Dongkai Yang","doi":"10.1109/ICAIIS49377.2020.9194831","DOIUrl":"https://doi.org/10.1109/ICAIIS49377.2020.9194831","url":null,"abstract":"Multipath being a stochastic GNSS error is hard to eliminate. For two receivers operating in differential GNSS mode with a short baseline (below 10 km in this case), it is possible to mitigate geographically common errors to both receivers but not multipath. Real Time Kinematic (RTK) uses carrier-phase observations to form differences in real time. The single frequency (SF) code observations for receivers functioning in RTK are filtered through code-carrier combination of observations. The Hatch filter algorithm is often utilized in SF-GNSS based applications to detect cycle slips and also to mitigate multipath. However, choosing an effective smoothing window is important to ensure that the Hatch filtered output matches closely to that of the input raw signal. Dynamic Time Warping (DTW) was used to get appropriate smoothing constant value for the Hatch filter by measuring the squared Euclidean distances of corresponding points of the two signals. Using dynamic data collected for 906 epochs from two receivers configured in RTK mode, a bespoke SF-RTK software was used to compare the positioning results of the Hatch filtered output to that of the widely used RTKLIB software. The results showed that the standard deviation of the differences of the ECEF coordinates between the two software are within centimetre levels.","PeriodicalId":416002,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Information Systems (ICAIIS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122719627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on the optimal coordinated control strategy of ‘source-grid-load-storage’ including electric vehicle and distributed power supply","authors":"Guang-bin Huang, Hao Ma, Xi Chen, Binrong Zhang, Chang Liu, Jing Zhang","doi":"10.1109/ICAIIS49377.2020.9194707","DOIUrl":"https://doi.org/10.1109/ICAIIS49377.2020.9194707","url":null,"abstract":"Because the electric vehicle load is a complex space-time load with comprehensive influence factors. Therefore, this paper considers the temporal and spatial characteristics of the electric vehicle load and the time sequence characteristics of the distributed generation. It establishes optimization model of distribution network containing the plug-in electric vehicle and distributed generation. To optimize the annual total cost of distribution network, it uses Monte Carlo simulation to get the temporal and spatial characteristics of electric vehicle load. Based on the coordinated control strategy, the model is solved by a hybrid particle swarm optimization algorithm with mutation and crossover operation.","PeriodicalId":416002,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Information Systems (ICAIIS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123091696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yong Wang, Ling Li, Xin Yang, Xinxin Wang, Hui Liu
{"title":"A Camouflaged Object Detection Model Based on Deep Learning","authors":"Yong Wang, Ling Li, Xin Yang, Xinxin Wang, Hui Liu","doi":"10.1109/ICAIIS49377.2020.9194881","DOIUrl":"https://doi.org/10.1109/ICAIIS49377.2020.9194881","url":null,"abstract":"Camouflaged object detection is a hard assignment due to their textures are similar to the background. The main intention of this paper is probe into a problem about the camouflaged object detection, that is, detecting its camouflaged object for a given image. This problem has not been well studied in spite of a large area of potential applications such as camouflage military targets detection and wildlife protection. To address this problem, a camouflage object detection method based on deep learning is proposed. The suggested method can detect camouflaged object which can extract deep features automatically. It can also provide detection probability which reflect camouflage efficiency. Experimental results show that the deep learning measure can effectively detect different scene, representing the camouflage level of low, medium and high respectively.","PeriodicalId":416002,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Information Systems (ICAIIS)","volume":"322 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115771783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sui He, Ding Lei, Wang Shuang, Chunbo Liu, Zhaojun Gu
{"title":"Network Security Analysis of Industrial Control System Based on Attack-Defense Tree","authors":"Sui He, Ding Lei, Wang Shuang, Chunbo Liu, Zhaojun Gu","doi":"10.1109/ICAIIS49377.2020.9194818","DOIUrl":"https://doi.org/10.1109/ICAIIS49377.2020.9194818","url":null,"abstract":"In order to cope with the network attack of industrial control system, this paper proposes a quantifiable attack-defense tree model. In order to reduce the influence of subjective factors on weight calculation and the probability of attack events, the Fuzzy Analytic Hierarchy Process and the Attack-Defense Tree model are combined. First, the model provides a variety of security attributes for attack and defense leaf nodes. Secondly, combining the characteristics of leaf nodes, a fuzzy consistency matrix is constructed to calculate the security attribute weight of leaf nodes, and the probability of attack and defense leaf nodes. Then, the influence of defense node on attack behavior is analyzed. Finally, the network risk assessment of typical airport oil supply automatic control system has been undertaken as a case study using this attack-defense tree model. The result shows that this model can truly reflect the impact of defense measures on the attack behavior, and provide a reference for the network security scheme.","PeriodicalId":416002,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Information Systems (ICAIIS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131193463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of moving target tracking system based on Jetson platform","authors":"Xuejun Wang, Zhiguo Zhou, Yun Li","doi":"10.1109/ICAIIS49377.2020.9194918","DOIUrl":"https://doi.org/10.1109/ICAIIS49377.2020.9194918","url":null,"abstract":"This paper proposes an improved ASMS algorithm for mean shift scale problem, which integrates the ASMS algorithm into the Ross system and transplants it to the Jetsontx2 platform. In this method, the outline rectangle frame of the object to be tracked is drawn on the picture sent back by UAV, and the pixel coordinates of the rectangle frame are encapsulated into Mavlink protocol and sent to Jetsontx2 platform through UDP for tracking algorithm. The experimental results show that the tracking system based on Jetsontx2 platform can overcome the problems of tracking instability, poor imaging effect and low definition.","PeriodicalId":416002,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Information Systems (ICAIIS)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123804976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}