期刊文献+
共找到9篇文章
< 1 >
每页显示 20 50 100
Design and Implementation of Control Model in Video Conference System for Large Enterprise
1
作者 Bing Wu Zhou Yuan +3 位作者 Zhidong Wu Yinchang Zhang Jinjing Gao Yixi Yang 《Journal of Electronic Research and Application》 2018年第5期1-6,共6页
To improve conference management and realize self-served control by users,this paper proposes a specific design of tablet-based control software on video conference,incorporating demands of video conference systems in... To improve conference management and realize self-served control by users,this paper proposes a specific design of tablet-based control software on video conference,incorporating demands of video conference systems in State Grid Corporation of China.The software has been designed and implemented with studies on the system structure and key technologies as the bedrock.With in-depth analysis on various operations’frequencies,streamlined interface,and exquisite designs,the software enables users to independently control regular conferences without on-site professional technicians.Moreover,it meets different demands for different scenarios such as for public conference room and normalized management. 展开更多
关键词 VIDEO CONFERENCE system CONFERENCE CONTROL CONFERENCE TERMINAL self-served
下载PDF
Research on a multi‑dimensional image information fusion algorithm based on NSCT transform
2
作者 Yuxiang Su Xi Liang +3 位作者 Danhua Cao Zhenyu Yang Yuanlong Peng Ming Zhao 《Frontiers of Optoelectronics》 EI CSCD 2024年第1期29-44,共16页
Traditional inspection cameras determine targets and detect defects by capturing images of their light intensity,but in complex environments,the accuracy of inspection may decrease.Information based on polarization of... Traditional inspection cameras determine targets and detect defects by capturing images of their light intensity,but in complex environments,the accuracy of inspection may decrease.Information based on polarization of light can characterize various features of a material,such as the roughness,texture,and refractive index,thus improving classification and recognition of targets.This paper uses a method based on noise template threshold matching to denoise and preprocess polarized images.It also reports on design of an image fusion algorithm,based on NSCT transform,to fuse light intensity images and polarized images.The results show that the fused image improves both subjective and objective evaluation indicators,relative to the source image,and can better preserve edge information and help to improve the accuracy of target recognition.This study provides a reference for the comprehensive application of multi-dimensional optical information in power inspection. 展开更多
关键词 Power inspection Object detection Polarization imaging Image fusion Image denoising
原文传递
Uplink NOMA signal transmission with convolutional neural networks approach 被引量:1
3
作者 LIN Chuan CHANG Qing LI Xianxu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2020年第5期890-898,共9页
Non-orthogonal multiple access(NOMA), featuring high spectrum efficiency, massive connectivity and low latency, holds immense potential to be a novel multi-access technique in fifth-generation(5G) communication. Succe... Non-orthogonal multiple access(NOMA), featuring high spectrum efficiency, massive connectivity and low latency, holds immense potential to be a novel multi-access technique in fifth-generation(5G) communication. Successive interference cancellation(SIC) is proved to be an effective method to detect the NOMA signal by ordering the power of received signals and then decoding them. However, the error accumulation effect referred to as error propagation is an inevitable problem. In this paper,we propose a convolutional neural networks(CNNs) approach to restore the desired signal impaired by the multiple input multiple output(MIMO) channel. Especially in the uplink NOMA scenario,the proposed method can decode multiple users' information in a cluster instantaneously without any traditional communication signal processing steps. Simulation experiments are conducted in the Rayleigh channel and the results demonstrate that the error performance of the proposed learning system outperforms that of the classic SIC detection. Consequently, deep learning has disruptive potential to replace the conventional signal detection method. 展开更多
关键词 non-orthogonal multiple access(NOMA) deep learning(DL) convolutional neural networks(CNNs) signal detection
下载PDF
Encrypted traffic classification based on fusion of vision transformer and temporal features
4
作者 Wang Lanting Hu Wei +4 位作者 Liu Jianyi Pang Jin Gao Yating Xue Jingyao Zhang Jie 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2023年第2期73-82,共10页
Aiming at the problem that the current encrypted traffic classification methods only use the single network framework such as convolutional neural network(CNN),recurrent neural network(RNN),and stacked autoencoder(SAE... Aiming at the problem that the current encrypted traffic classification methods only use the single network framework such as convolutional neural network(CNN),recurrent neural network(RNN),and stacked autoencoder(SAE),and only construct a shallow network to extract features,which leads to the low accuracy of encrypted traffic classification,an encrypted traffic classification framework based on the fusion of vision transformer and temporal features was proposed.Bottleneck transformer network(BoTNet)was used to extract spatial features and bi-directional long short-term memory(BiLSTM)was used to extract temporal features.After the two sub-networks are parallelized,the feature fusion method of early fusion was used in the framework to perform feature fusion.Finally,the encrypted traffic was identified through the fused features.The experimental results show that the BiLSTM and BoTNet fusion transformer(BTFT)model can enhance the performance of encrypted traffic classification by fusing multi-dimensional features.The accuracy rate of a virtual private network(VPN)and non-VPN binary classification is 99.9%,and the accuracy rate of fine-grained encrypted traffic twelve-classification can also reach 97%. 展开更多
关键词 encrypted traffic classification vision transformer temporal feature
原文传递
Heuristic multistep attack scenarios construction based on kill chain
5
作者 Cheng Jie Zhang Ru +4 位作者 Wei Jiahui Lu Chen Lü Zhishuai Lin Bingjie Xia Ang 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2023年第5期61-71,共11页
Network attacks evolved from single-step and simple attacks to complex multistep attacks.Current methods of multistep attack detection usually match multistep attacks from intrusion detection systems(IDS)alarms based ... Network attacks evolved from single-step and simple attacks to complex multistep attacks.Current methods of multistep attack detection usually match multistep attacks from intrusion detection systems(IDS)alarms based on the correlation between attack steps.However,IDS has false negatives and false positives,which leads to incomplete or incorrect multistep attacks.Association based on simple similarity is difficult to obtain an accurate attack cluster,while association based on prior knowledge such as attack graphs is difficult to guarantee a complete attack knowledge base.To solve the above problems,a heuristic multistep attack scenarios construction method based on the kill chain(HMASCKC)model was proposed.The attack model graph can be obtained from dual data sources and heuristic multistep attack scenarios can be obtained through graph matching.The model graph of the attack and the predicted value of the next attack are obtained by calculating the matching value.And according to the purpose of the multistep attack,the kill chain model is used to define the initial multistep attack model,which is used as the initial graph for graph matching.Experimental results show that HMASCKC model can better fit the multistep attack behavior,the effect has some advantages over the longest common subsequence(LCS)algorithm,which can close to or match the prediction error of judge evaluation of attack intension(JEAN)system.The method can make multistep attack model matching for unknown attacks,so it has some advantages in practical application. 展开更多
关键词 multistep attack scenario kill chain graph matching attack prediction
原文传递
Liveness detection of occluded face based on dual-modality convolutional neural network
6
作者 Ming Yue Li Wenmin +4 位作者 Xu Siya Gao Lifang Zhang Hua Shao Sujie Yang Huifeng 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2021年第4期1-12,共12页
Facial recognition has become the most common identity authentication technologies. However, problems such as uneven light and occluded faces have increased the hardness of liveness detection. Nevertheless, there are ... Facial recognition has become the most common identity authentication technologies. However, problems such as uneven light and occluded faces have increased the hardness of liveness detection. Nevertheless, there are a few pieces of research on face liveness detection under occlusion conditions. This paper designs a face recognition technique suitable for different degrees of facial occlusion, which employs the facial datasets of near-infrared(NIR) images and visible(VIS) light images to examine the single-modality detection accuracy rate(experimental control group) and the corresponding high-dimensional features through the residual network(ResNet). Based on the idea of data fusion, we propose two feature fusion methods. The two methods extract and fuse the data of one and two convolutional layers from two single-modality detectors respectively. The fusion of high-dimensional features apply a new ResNet to get the dual-modality detection accuracy. And then, a new ResNet is applied to test the accuracy of dual-modality detection. The experimental results show that the dual-modality face liveness detection model improves face live detection accuracy and robustness compared with the single-modality. The fusion of two-layer features from the single-modality detector can also improve face detection accuracy by utilizing the above-mentioned dual-modality detector, and it doesn’t increase the algorithm’s complexity. 展开更多
关键词 face deception face occlusion near-infrared image residual network feature fusion
原文传递
Active Anomaly Detection Technology Based on Ensemble Learning
7
作者 Weiwei Liu Shuya Lei +3 位作者 Liangying Peng Jun Feng Sichen Pan Meng Gao 《国际计算机前沿大会会议论文集》 2022年第1期53-66,共14页
Anomaly detection is an important problem in various research and application fields.Researchers design reliable schemes to provide solutions for effectively detecting anomaly points.Most of the existing anomaly detec... Anomaly detection is an important problem in various research and application fields.Researchers design reliable schemes to provide solutions for effectively detecting anomaly points.Most of the existing anomaly detection schemes are unsupervised methods,such as anomaly detection methods based on density,distance and clustering.In total,unsupervised anomaly detection methods have many limitations.For example,they cannot be well combined with prior knowledge in some anomaly detection tasks.For some nonlinear anomaly detection tasks,the modeling is complex and faces dimensional disasters,which are greatly affected by noise.Sometimes it is difficult to find abnormal events that users are interested in,and users need to customize model parameters before detection.With the wide application of deep learning technology,it has a good modeling ability to solve linear and nonlinear data relationships,but the application of deep learning technology in the field of anomaly detection has many challenges.If we regard exceptions as a supervised problem,exceptions are a few,and we usually face the problem of too few labels.To obtain a model that performs well in the anomaly detection task,it requires a high initial training set.Therefore,to solve the above problems,this paper proposes a supervised learning method with manual participation.We introduce the integrated learning model and train a supervised anomaly detection model with strong stability and high accuracy through active learning technology.In addition,this paper adopts certain strategies to maximize the accuracy of anomaly detection and minimize the cost of manual labeling.In the experimental link,we will show that our method is better than some traditional anomaly detection algorithms. 展开更多
关键词 Anomaly detection Ensemble learning Artificial anomaly detection Methods to reduce labor cost Model self-training
原文传递
Anomaly Detection of Multivariate Time Series Based on Metric Learning
8
作者 Hongkai Wang Jun Feng +3 位作者 Liangying Peng Sichen Pan Shuai Zhao Helin Jin 《国际计算机前沿大会会议论文集》 2022年第1期94-110,共17页
Most of the current methods for anomaly detection in time series are unsupervised.However,unsupervised learning assumes the distribution of the data and cannot obtain satisfactory results in some scenarios.In this pap... Most of the current methods for anomaly detection in time series are unsupervised.However,unsupervised learning assumes the distribution of the data and cannot obtain satisfactory results in some scenarios.In this paper,we design a semisupervised time series anomaly detection algorithm based on metric learning.The algorithm model mines the features in the time series from the perspectives of the time domain and frequency domain.Furthermore,we design a loss function for anomaly detection.Different from the two-class loss function,in the scenario of the loss function we designed,the normal data will be clustered and distributed in the embedding space,and the abnormal data will be far from the normal data distribution.Furthermore,we extend our designed metric learning model to a semisupervised learning model,extending the labeled dataset with the unlabeled dataset by setting different confidence levels.We conduct experiments on different public datasets and compare them with commonly used time series anomaly detection algorithms.The results show that our model has a good effect.At the same time the semisupervised setting does improve the accuracy of model detection. 展开更多
关键词 FUNCTION assume ALGORITHM
原文传递
CIRS:A Confidence Interval Radius Slope Method for Time Series Points Based on Unsupervised Learning
9
作者 Shuya Lei Weiwei Liu +6 位作者 Xudong Zhang Xiaogang Gong Jianping Huang Yidan Wang Jiansong Zhang Helin Jin Shengjian Yu 《国际计算机前沿大会会议论文集》 2022年第1期310-325,共16页
The rise of big data has brought various challenges and revolutions to many fields.Even though its development in many industries has gradually become perfect or even mature,its application and development in complex ... The rise of big data has brought various challenges and revolutions to many fields.Even though its development in many industries has gradually become perfect or even mature,its application and development in complex industrial scenarios is still in its infancy.We run research on single-dimensional time series point anomaly detection based on unsupervised learning:Unlike periodic time series,aperiodic or weakly periodic time series in industrial scenarios are more common.Considering the need for online real-time monitoring,we need to solve the problem of point anomaly detection of oil chromatographic characteristic gases.Thus,we propose a sliding window-based method for the unsupervised single-dimensional time series point anomaly detection problem called the confidence interval radius slope method(CIRS).CIRS is a fusion of knowledge-driven and data-driven methods to realize online real-time monitoring of possible data quality problems.From the experimental results,CIRS has obtained higher PR values than other unsupervised methods by the subject data. 展开更多
关键词 RADIUS SLOPE CONFIDENCE
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部