RW-HAZE: A REAL-WORLD BENCHMARK DATASET TO EVALUATE QUANTITATIVELY DEHAZING ALGORITHMS
作者:
Chen, Jiyou;Wang, Shengchun;Liu, Xin;Yang, Gaobo
作者机构:
[Chen, Jiyou; Yang, Gaobo] Hunan Univ, Sch Comp Sci & Elect Engn, Changsha 410082, Peoples R China.;[Chen, Jiyou] Hengyang Normal Univ, Sch Phys & Elect Engn, Hengyang 421008, Peoples R China.;[Wang, Shengchun] Hunan Normal Univ, Sch Informat Sci & Engn, Changsha 410081, Peoples R China.;[Liu, Xin] Hunan Appl Technol Univ, Changde 415100, Peoples R China.
会议名称:
IEEE International Conference on Image Processing (ICIP)
会议时间:
OCT 16-19, 2022
会议地点:
Bordeaux, FRANCE
会议主办单位:
[Chen, Jiyou;Yang, Gaobo] Hunan Univ, Sch Comp Sci & Elect Engn, Changsha 410082, Peoples R China.^[Chen, Jiyou] Hengyang Normal Univ, Sch Phys & Elect Engn, Hengyang 421008, Peoples R China.^[Wang, Shengchun] Hunan Normal Univ, Sch Informat Sci & Engn, Changsha 410081, Peoples R China.^[Liu, Xin] Hunan Appl Technol Univ, Changde 415100, Peoples R China.
会议论文集名称:
IEEE International Conference on Image Processing ICIP
关键词:
image dehazing;benchmark dataset;performance evaluation
摘要:
Most existing image dehazing approaches are able to achieve desirable results whose differences are too subtle for people to qualitatively judge. Therefore, it is important to adopt quantitative assessment on real-world hazy images. However, many dehazing works have not been quantitatively evaluated on real-world hazy images due to the lack of appropriate real-world datasets. In this work, we attempt to address the issue and present a well-aligned real-world benchmark dataset, namely RW-Haze, for image dehazing evaluation, which had been lacking for a long period of time. It contains 210 pairs of well-aligned haze-free images and hazy images with distinct haze densities, which were captured from six cities in China by fixed cameras. To the best of our knowledge, RW-Haze is the first real-world dataset that is made up of well-aligned image pairs of haze-free and hazy images with diverse haze levels. We select 13 state-of-the-art single image dehazing works for making comprehensive evaluations among them on RW-Haze dataset. Experimental results show that there still exist rich rooms for image dehazing research to improve its robustness on natural hazy images, especially dense haze scenes. © 2022 IEEE.
语种:
英文
展开
Preface
作者:
Liu Q.;Liu X.;Li L.;Zhou H.;Zhao H.-H.
作者机构:
[Liu Q.] School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing, Jiangsu, China;[Liu X.] School of Computing, Edinburgh Napier University, Edinburgh, United Kingdom;[Li L.; Zhao H.-H.] College of Computer Science and Technology, Hengyang Normal University, Hengyang, Hunan, China;[Zhou H.] Department of Informatics, University of Leicester, Leicester, United Kingdom
会议名称:
9th International Conference on Computer Engineering and Networks, CENet2019
会议时间:
18 October 2019 through 20 October 2019
语种:
英文
展开
Constant-Weight Group Coded Bloom Filter for Multiple-Set Membership Queries
作者:
Xiaomei Tian,;Huihuang Zhao,
作者机构:
College of Computer Science and Technology, Hengyang Normal University, Hengyang, 421002, China;Hunan Provincial Key Laboratory of Intelligent Information Processing and Application, Hengyang, 421002, China;[Tian X.; Zhao H.] College of Computer Science and Technology, Hengyang Normal University, Hengyang, 421002, China, Hunan Provincial Key Laboratory of Intelligent Information Processing and Application, Hengyang, 421002, China
会议名称:
The 10th International Conference on Computer Engineering and Networks(CENet2020)
会议时间:
2020-10-16
会议地点:
中国陕西西安
会议论文集名称:
Proceedings of the 10th International Conference on Computer Engineering and Networks(CENet2020)
关键词:
Constant-weight group coded bloom filter;Data center;Multiple-set membership query
摘要:
Multiple-set membership query problem plays a very important role in many network systems, including packet forwarding architectures in big data centers, routing switching devices and internet firewall systems. Many solutions to multiple-set membership query problem are based on Bloom filters. And each of these solutions has its own merits. Some have high query speed and some have good accuracy. But generally, they cannot have both at the same time. In this paper, we propose a probabilistic data structure named constant-weight group coded Bloom Filter (CWGCBF) for fast and accurate multi-set membership query. The key technique in CWGCBF is encoding each element’s set ID to constant weight code, and directly recording this constant-weight code in the bloom filter vector. Experimental results show that in terms of false positive ratio, CWGCBF, Shifting Bloom Filter and Combinatorial Bloom Filter have great advantages to the other compared Bloom filters, and in terms of time efficiency, CWGCBF and ID Bloom Filter are several times faster than the others. © 2021, The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
语种:
中文
展开
Research on Face Recognition Algorithms and Application Based on PCA Dimension Reduction and LBP
作者:
Kangman Li;Ruihua Nie
期刊:
Advances in Intelligent Systems and Computing ,2021年1143:461-470 ISSN:2194-5357
通讯作者:
Li, K.
作者机构:
[Nie R.; Li K.] College of Computer Science and Technology, Hengyang Normal University, Hengyang, Hunan 421002, China
通讯机构:
[Li, K.] C;College of Computer Science and Technology, China
会议名称:
9th International Conference on Computer Engineering and Networks, CENet2019
会议时间:
18 October 2019 through 20 October 2019
会议论文集名称:
Proceedings of the 9th International Conference on Computer Engineering and Networks
关键词:
Face recognition;Local binary patterns;PCA
摘要:
In the face recognition system on campus, the influence of time and age change on face features can be neglected. This paper proposes a dimension reduction algorithm based on principal component analysis (PCA) algorithm and local binary patterns (LBP), and it is applied to campus face recognition APP. It is proved that the algorithm can significantly improve the speed and ensure its recognition accuracy in the application of small changes in the face and has certain reference value for practical application. © 2021, Springer Nature Singapore Pte Ltd.
语种:
英文
展开
ZigBee-Based Architecture Design of Imperceptible Smart Home System
作者:
Kuang J.;Li L.
作者机构:
[Li L.; Kuang J.] College of Computer Science and Technology, Hengyang Normal University, Hengyang, 421002, China
会议名称:
9th International Conference on Computer Engineering and Networks, CENet2019
会议时间:
18 October 2019 through 20 October 2019
关键词:
CBS algorithm;Imperception;Smart home;ZigBee
摘要:
The smart home has been an emerging industry which combines wireless sensor technology and computer technology. In order to meet the current requirements of ‘automation, comfortableness, energy saving, and safety’ in intelligent home life, we introduce the conception of imperceptibility into smart home system and design the architecture model based on ZigBee’s imperceptible smart home system which based on the ZigBee protocol and the basic architecture of ‘Sea-Net-Cloud.’ The ‘Sea’ means that it has a huge number of terminal applications and we design it by combining perception terminal and a mobile terminal in this paper. The ‘Net’ is a data transmission channel, and this paper focuses on imperceptible network scheme based on ZigBee. The ‘Cloud’ is for cloud data processing. Users’ data are processed through CBS algorithm of private cloud to gradually optimize the users’ habits model, and the system could adjust itself according to the users’ habits to provide service initiatively and make smart home finally smart. © 2021, Springer Nature Singapore Pte Ltd.
语种:
英文
展开
Modeling RNA Secondary Structures Based on Stochastic Tree Adjoining Grammars
作者:
Tang S.;Zhao H.;Jiang J.
作者机构:
[Tang S.; Zhao H.; Jiang J.] College of Computer Science and Technology, Hengyang Normal University, Hengyang, 421002, China
会议名称:
10th International Conference on Computer Engineering and Networks, CENet 2020
会议时间:
16 October 2020 through 18 October 2020
关键词:
RNA;Structure prediction;Tree Adjoining Grammars
摘要:
This paper presents a new method for modeling RNA secondary structures based on stochastic tree adjoining grammars. In order to get better predict results, we shows using Stochastic Tree Adjoining Grammars to inference RNA secondary structures. firstly, we expound the tree adjoining grammars and stochasitc model and the operations of TAG tree. Secondly, discusses the key problems for RNA secondary structure prediction using tree adjoining grammars modeling, finally we design a tree adjoining grammars model to predict RNA structure, The experiment choose 8 species sequence from EMBL database, and experimental verification of the validity of the model, the experimental results shows that the tree adjoining grammars in the prediction of RNA sequence structure has long-range correlation, can improve the prediction accuracy. © 2021, The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
语种:
英文
展开
普鲁士蓝类似物的合成及电传感性能研究
作者:
李俊华;陆雨桐;肖敏芝;钱东
作者机构:
衡阳师范学院化学与材料科学学院,湖南衡阳,421008;中南大学化学化工学院,湖南长沙,410083
会议名称:
2019第二十次全国电化学大会
会议时间:
20191025
会议地点:
长沙
会议论文集名称:
2019第二十次全国电化学大会论文集
语种:
中文
展开
Constructions of Lightweight MDS Diffusion Layers from Hankel Matrices
作者:
Li Q.;Li L.;Zhang J.;Zhao J.;Li K.
作者机构:
[Li K.; Li Q.; Zhang J.; Zhao J.] Hengyang Normal University, Hengyang, 421002, China;Hunan Provincial Key Laboratory of Intelligent Information Processing and Application, Hengyang, 421002, China;[Li L.] Hengyang Normal University, Hengyang, 421002, China, Hunan Provincial Key Laboratory of Intelligent Information Processing and Application, Hengyang, 421002, China
会议名称:
9th International Conference on Computer Engineering and Networks, CENet2019
会议时间:
18 October 2019 through 20 October 2019
关键词:
Diffusion layer;Hankel matrix;Lightweight MDS matrix
摘要:
Maximal distance separable (MDS) matrices are used as optimal diffusion layers in many block ciphers and hash functions. Recently, the designers paid more attention to the lightweight MDS matrices because it can reduce the hardware resource. In this paper, we give a new method to construct the lightweight MDS matrices. We provide some theoretical results and two kinds of 4×4 lightweight Hankel MDS matrices. We also prove that the 2s×2s involution Hankel MDS matrix does not exist in finite field. Furthermore, we searched the 4×4 Hankel MDS matrices over GL(4, F2) and GL(8, F2) that have the better s-XOR counts until now. © 2021, Springer Nature Singapore Pte Ltd.
语种:
英文
展开
Research on Differential Power Analysis of Lightweight Block Cipher LED
作者:
Zou Y.;Li L.;Zhao H.-H.;Jiao G.
作者机构:
[Jiao G.] College of Computer Science and Technology, Hengyang Normal University, Hengyang, 421002, China;Human Provincial Key Laboratory of Intelligent Information Processing and Application, Hengyang, 421002, China;[Zou Y.; Zhao H.-H.; Li L.] College of Computer Science and Technology, Hengyang Normal University, Hengyang, 421002, China, Human Provincial Key Laboratory of Intelligent Information Processing and Application, Hengyang, 421002, China
会议名称:
10th International Conference on Computer Engineering and Networks, CENet 2020
会议时间:
16 October 2020 through 18 October 2020
关键词:
Differential power analysis;LED;Lightweight block cipher
摘要:
LED algorithm is a new lightweight encryption algorithm proposed in CHES 2011, which is used for IOT to protect the communication security of RFID tags and smart cards. It has been found that it is possible to retrieve secret key of algorithm by appropriate analysis of the devices’s power consumption, and the differential power analysis is the most powerful attack. This paper proposed a method of differential power analysis on LED algorithm. Combined with hardware circuit, it designed and implemented differential power analysis of the LED encryption system. The experimental results show that method which is proposed in this paper was cracked the 64 bits key of LED. Thus, without protection, the cipher LED would be difficult to resist differential power analysis. and according this, We provide a general analysis method of differential power analysis on other lightweight cryptographic algorithms. © 2021, The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
语种:
英文
展开
Prediction of RNA Structures with Pseudoknots Using Convolutional Neural Network
作者:
Sixin Tang;Shiting Li;Jing Chen
期刊:
Advances in Intelligent Systems and Computing ,2021年1143:311-319 ISSN:2194-5357
通讯作者:
Tang, S.
作者机构:
[Tang S.; Li S.; Chen J.] College of Computer Science and Technology, Hengyang Normal University, Hengyang, 421002, China
通讯机构:
[Tang, S.] C;College of Computer Science and Technology, China
会议名称:
9th International Conference on Computer Engineering and Networks, CENet2019
会议时间:
18 October 2019 through 20 October 2019
会议论文集名称:
Proceedings of the 9th International Conference on Computer Engineering and Networks
关键词:
Convolution neural network;RNA;Structure prediction
摘要:
To get better predicted results, we show using convolution neural network inference RNA structure with pseudoknots. First, we expound the deep learning and convolution model and algorithm of the neural network theory, then discuss the key problems for RNA secondary structure prediction using convolution neural network modeling, finally, we design a convolutional neural network to predict RNA structure prediction model and experimental verification of the validity of the model, and the experimental results show that the convolution neural network in the prediction of RNA sequence structure has long-range correlation, can improve the prediction accuracy, especially when RNA sequences with pseudoknots structure. © 2021, Springer Nature Singapore Pte Ltd.
语种:
英文
展开
Improved UAV Scene Matching Algorithm Based on CenSurE Features and FREAK Descriptor
作者:
Chenglong Wang;Tangle Peng;Longzhi Hu;Guanjun Liu
期刊:
Advances in Intelligent Systems and Computing ,2021年 1274: 158-167 ISSN:2194-5357
通讯作者:
Wang, C.
作者机构:
[Peng T.; Liu G.; Wang C.] College of Computer Science and Technology, Hengyang Normal University, Hengyang, 421002, China;[Hu L.] Zhongxing Telecommunication Equipment Corporation, Shenzhen, 518000, China
通讯机构:
[Wang, C.] C;College of Computer Science and Technology, China
会议名称:
10th International Conference on Computer Engineering and Networks, CENet 2020
会议时间:
16 October 2020 through 18 October 2020
会议论文集名称:
The 10th International Conference on Computer Engineering and Networks
关键词:
CenSurE features;FREAK descriptor;Unmanned aerial vehicle scene matching algorithm
摘要:
The traditional local invariant features scene matching algorithms have many redundant points, poor real-time and Low anti-geometric transformation. So we propose an unmanned aerial vehicle scene matching algorithm based on CenSurE features and FREAK descriptor. Steps of the algorithm are as follows: use the CenSurE-star operator to extract the feature points, calculate feature vectors by FREAK descriptors, then complete matching process through KNN ratio method, finally use RANSAC location model to get image transform relations, latitude and longitude. Experiments show that: compared with SIFT, SURF, ORB algorithms, this algorithm not only has better robustness for various transformation, but also greatly shorten the processing time of about 86ms. The positioning error within 0.6 pixel, scale error within 0.02 times, rotation Angle error within 0.04°. © 2021, The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
语种:
英文
展开
Research on Algorithms for Setting up Advertising Platform Based on Minimum Weighted Vertex Covering
作者:
Ying Wang;Yaqi Sun;Qinyun Liu
期刊:
Advances in Intelligent Systems and Computing ,2021年1143:471-479 ISSN:2194-5357
通讯作者:
Wang, Y.
作者机构:
[Wang Y.; Liu Q.; Sun Y.] College of Computer Science and Technology, Hengyang Normal University, Hengyang, 421008, China
通讯机构:
[Wang, Y.] C;College of Computer Science and Technology, China
会议名称:
9th International Conference on Computer Engineering and Networks, CENet2019
会议时间:
18 October 2019 through 20 October 2019
会议论文集名称:
Proceedings of the 9th International Conference on Computer Engineering and Networks
关键词:
Advertising platform;Minimum weighted vertex covering;Random fuzzy theory;Uncertain environment
摘要:
A classical problem in combinatorial optimization is the minimum weighted vertex covering problem. In practical applications, the weights on vertices are usually composed of some uncertain factors. This paper combines the stochastic fuzzy theory, uses the backtracking method to search subset tree to solve the minimum weighted vertex covering, and finally obtains the key points of setting up the advertising platform and solves the problem of how to set up the advertising platform reasonably under the stochastic fuzzy uncertain environment. © 2021, Springer Nature Singapore Pte Ltd.
语种:
英文
展开
Security Count Query and Integrity Verification Based on Encrypted Genomic Data
作者:
Jing Chen;Zhiping Chen;Linai Kuang,;Xianyou Zhu;Sai Zou,;...
作者机构:
[Chen Z.] Changsha University, Changsha, China;[Xuan Z.; Chen J.] Xiangtan University, Xiangtan, China;[Zhu X.] Hengyang Normal University, Hengyang, China;Chongqing College of Electronic and Engineering, Chongqing, China;[Zou S.] Hengyang Normal University, Hengyang, China, Chongqing College of Electronic and Engineering, Chongqing, China
会议名称:
The 9th International Conference on Computer Engineering and Networks(CENet2019)
会议时间:
2019-10-18
会议地点:
中国湖南长沙
会议论文集名称:
Proceedings of the 9th International Conference on Computer Engineering and Networks(CENet2019)
关键词:
Cryptography;Data sharing;Genomics;Privacy
摘要:
Biomedical research is increasingly dependent on a large number of genomic and clinical data, and in order to protect sensitive information from being exposed to multiple partners, these data are often encrypted before being outsourced to third-party cloud service providers with abundant storage and computing resources. However, these third parties will become potential targets to be violated. Hence, in this paper, a novel method is proposed for secure sharing and management of genomic and clinical data on an untruthful cloud server firstly, in which the Hamming codes and HashMap are adopted to ensure the privacy and integrity of biomedical data during counting queries. And then, the performance of our newly proposed method is evaluated on the basis of the existing single-nucleotide polymorphism (SNP) sequence database, and simulation results show that the new method has good encryption efficiency and realizability, and can guarantee the privacy and integrity of biomedical data effectively while being implemented in counting queries. © 2021, Springer Nature Singapore Pte Ltd.
语种:
中文
展开
Thinking on the Cultivation of Innovative Talents in Computer Majors Facing Big Data Applications
作者:
Jiao, Ge;Li, Lang;Deng, Hongwei;Zheng, Guangyong;Zou, Yi;...
作者机构:
[Jiao, Ge; Li, Lang; Deng, Hongwei; Zheng, Guangyong; Zou, Yi; Zhao, Junxia] College of Computer Science and Technology, Hengyang Normal University, China
会议名称:
13th International Conference on Education Technology and Computers, ICETC 2021
会议时间:
October 22, 2021 - October 25, 2021
会议地点:
Virtual, Online, China
摘要:
In order to solve the problems in the training of big data talents in colleges and universities, such as unclear training objectives, not close combination of practical teaching and industrial enterprises, and low training quality, this paper proposes a training mode of innovative computer talents oriented to the application of big data. The mode to train applied talents as the goal, USES the OBE's education idea, through the revision of the talent training scheme, optimizing curriculum system, reforming teaching methods, practical teaching system construction, improve teachers' skills, reform the assessment content and ways to improve the quality of talent training, meet the social demand for big data and technical personnel. © 2021 ACM.
语种:
英文
展开
Design and Implementation of Handwritten Digit Recognition Based on K-Nearest Neighbor Algorithm
作者:
Wang Y.;Liu Q.;Sun Y.;Zhang F.;Zhu Y.
作者机构:
[Zhu Y.] College of Computer Science and Technology, Hengyang Normal University, Hengyang, 421002, China;Hunan Provincial Key Laboratory of Intelligent Information Processing and Application, Hengyang, 421002, China;[Liu Q.; Zhang F.; Sun Y.; Wang Y.] College of Computer Science and Technology, Hengyang Normal University, Hengyang, 421002, China, Hunan Provincial Key Laboratory of Intelligent Information Processing and Application, Hengyang, 421002, China
会议名称:
10th International Conference on Computer Engineering and Networks, CENet 2020
会议时间:
16 October 2020 through 18 October 2020
关键词:
Handwritten digit recognition;Image preprocessing;K-nearest neighbor algorithm
摘要:
In this paper, a handwritten digit recognition system based on K-nearest neighbor algorithm is designed and implemented. By analyzing the application principle and steps of k-nearest neighbor algorithm in machine learning classifier, we design handwritten digit recognition in Python language. In order to improve the accuracy and accuracy of handwritten character recognition, the method of smooth denoising and character segmentation methods are used to preprocess the data, extract the structure and statistical features. The experiments had shown that the accuracy of the algorithm for handwritten character recognition can reach over 97%. © 2021, The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
语种:
英文
展开
Research on Task Scheduling in Distributed Vulnerability Scanning System
作者:
Jiang J.;Tang S.
作者机构:
College of Computer Science and Technology, Hengyang Normal University, Hengyang, 421002, China;Hunan Provincial Key Laboratory of Intelligent Information Processing and Application, Hengyang, 421002, China;[Tang S.; Jiang J.] College of Computer Science and Technology, Hengyang Normal University, Hengyang, 421002, China, Hunan Provincial Key Laboratory of Intelligent Information Processing and Application, Hengyang, 421002, China
会议名称:
10th International Conference on Computer Engineering and Networks, CENet 2020
会议时间:
16 October 2020 through 18 October 2020
关键词:
Distributed;PSO algorithm;Task scheduling;Vulnerability scanning
摘要:
Network threats caused by system vulnerabilities is increasing gradually, the distributed vulnerability scanning system can scan large-scale and complex networks and report the vulnerability information. Task scheduling is one of the core components in a distributed system. In this paper, we use dynamic optimization algorithms to improve the task scheduling efficiency of distributed vulnerability scanning system, we propose a PSO-based task scheduling scheme and improves the search ability of particles by adjusting algorithm parameters. We compared the time consume when using existing ‘Resource Aware Scheduling algorithm’ (RASA) with the basic particle swarm optimization (PSO) algorithm and the improved particle swarm optimization (IPSO) algorithm. Our results show that IPSO has better performance than other scheduling methods. © 2021, The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
语种:
英文
展开
Portrait Style Transfer with Generative Adversarial Networks
作者:
Qingyun Liu;Feng Zhang;Mugang Lin;Ying Wang
期刊:
Advances in Intelligent Systems and Computing ,2021年 1143: 375-382 ISSN:2194-5357
通讯作者:
Liu, Q.
作者机构:
[Zhang F.; Wang Y.; Liu Q.; Lin M.] College of Computer Science and Technology, Hengyang Normal University, Hengyang, China
通讯机构:
[Liu, Q.] C;College of Computer Science and Technology, China
会议名称:
9th International Conference on Computer Engineering and Networks, CENet2019
会议时间:
18 October 2019 through 20 October 2019
会议论文集名称:
Proceedings of the 9th International Conference on Computer Engineering and Networks
关键词:
GANs;Image style transfer;Loss function;Portrait style transfer
摘要:
Portrait style transfer is a hot and practical direction for in-depth learning. As a deep learning model, Generative Adversarial Networks (GANs) have been widely used in image style conversion. We study Generative Adversarial Networks as a solution to the portrait style transfer problem. Here, we use GANs to recognize facial features. With large training in the conversion from plain to cosmetic drawings, this algorithm can make up the plain faces better intelligently. The experimental results provide the representation of facial image features by GANs and show the ability of character transformation and operation of portrait style. © 2021, Springer Nature Singapore Pte Ltd.
语种:
英文
展开
Outer Synchronization Between Complex Delayed Networks with Both Uncertain Parameters and Unknown Topological Structure
作者:
Zhong Chen;Xiaomei Tian;Tianqi Lei;Junyao Chen
期刊:
Advances in Intelligent Systems and Computing ,2021年1143:135-143 ISSN:2194-5357
通讯作者:
Chen, Z.
作者机构:
College of Computer Science and Technology, Hengyang Normal University, Hengyang, 421002, China;Hunan Provincial Key Laboratory of Intelligent Information Processing and Application, Hengyang, 421002, China;[Chen J.] Department of Computer Engineering, Ajou University, Suwon, 16499, South Korea;[Tian X.; Chen Z.; Lei T.] College of Computer Science and Technology, Hengyang Normal University, Hengyang, 421002, China, Hunan Provincial Key Laboratory of Intelligent Information Processing and Application, Hengyang, 421002, China
通讯机构:
[Chen, Z.] C;College of Computer Science and Technology, China
会议名称:
9th International Conference on Computer Engineering and Networks, CENet2019
会议时间:
18 October 2019 through 20 October 2019
会议论文集名称:
Proceedings of the 9th International Conference on Computer Engineering and Networks
关键词:
Adaptive control;Complex networks;Coupling matrix
摘要:
In this paper, synchronization of both non-identical unknown network and identical known network can be considered. Based on Lyapunov stability theory, for the case of non-identical or identical network, synchronization criteria between drive-response networks are obtained, and both the uncertain parameters and unknown coupling configuration matrix are be identified or constructed. Meanwhile, the coupling matrix may be free. The proposed synchronization scheme is simple and easy to realize. Finally, three illustrative examples show the effectiveness of presented control schemes. © 2021, Springer Nature Singapore Pte Ltd.
语种:
英文
展开
Design of a Real-Time and Reliable Multi-machine System
作者:
Zhang J.;Li L.;Li Q.;Zhao J.;Liang X.
作者机构:
[Li Q.; Zhang J.; Liang X.; Zhao J.] College of Computer Science and Technology, Hengyang Normal University, Hengyang, 421002, China;Hunan Provincial Key Laboratory of Intelligent Information Processing and Application, Hengyang, 421002, China;[Li L.] College of Computer Science and Technology, Hengyang Normal University, Hengyang, 421002, China, Hunan Provincial Key Laboratory of Intelligent Information Processing and Application, Hengyang, 421002, China
会议名称:
10th International Conference on Computer Engineering and Networks, CENet 2020
会议时间:
16 October 2020 through 18 October 2020
关键词:
Multi-Machine system;Real-Time;SPI
摘要:
An IoT (Internet of Things) system is a multi-machine system composed of a master controller and multiple slave controllers. In some automatic control systems such as petroleum and electric power, the main control uses UART (Universal Asynchronous Receiver/Transmitter) to communicate with the slave controller. However, the communication rate of the UART interface is limited and the delay time is long, which affects the system’s response to external events. In order to improve the response speed of the system to external events, this paper designs a multi-machine system based on SPI (Serial Peripheral Interface) interface. First, we use the SPI interface of the microcontroller to build a communication network. The circuit structure of the system is simple, and the hardware resource consumption is low. Then, for the problem that the SPI interface cannot detect communication errors and there is no response mechanism, we designed a communication protocol to make up for these defects from the software level. Finally, we use STM32F429IGT6 as the master controller and STM32F103C8T6 as the slave controller to build the experimental platform. The experimental results show that the system is safe and reliable, and can meet the requirements of real-time applications. © 2021, The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
语种:
英文
展开
An Optimized Scheme of Information Hiding-Based Visual Secret Sharing
作者:
Zou Y.;Li L.;Jiao G.
作者机构:
College of Computer Science and Technology, Hengyang Normal University, Hengyang, 421002, China;Hunan Provincial Key Laboratory of Intelligent Information Processing and Application, Hengyang, 421002, China;[Li L.; Jiao G.; Zou Y.] College of Computer Science and Technology, Hengyang Normal University, Hengyang, 421002, China, Hunan Provincial Key Laboratory of Intelligent Information Processing and Application, Hengyang, 421002, China
会议名称:
9th International Conference on Computer Engineering and Networks, CENet2019
会议时间:
18 October 2019 through 20 October 2019
关键词:
IH-VSS;Random position;Reference matrix
摘要:
Information hiding-based visual secret sharing (IH-VSS) uses the information hiding techniques to embed secret data into images. In the IH-VSS scheme, hidden images are divided into n shadows under the guidance and constraints of some predetermined methods, and only a certain number or all of the credible shadows work together to recover hidden information. Based on (2, 2)-threshold IH-VSS scheme, this paper proposes an optimized IH-VSS scheme, it can randomly locate the hidden position of the secret data. We set a random number and use it as the initial hiding position, then combined with the length of the secret data, assigns the address, and completes the hiding of the secret data. The experimental results show that under the same embedding capacity, the peak signal-to-noise ratio (PSNR) of the optimized scheme is higher than other similar schemes, which is high to 55.41dB. Moreover, the difference between the two shadows is very small. © 2021, Springer Nature Singapore Pte Ltd.
语种:
英文
展开