ISSN:2349-2058
S.No. | Title & Authors | Page No | View | ||
1 |
Title : Speech Perceptual Hash Algorithm Based on Dual Features Authors : Ning Zhang
Abstract :
A speech aware hash authentication algorithm with dual perceptual features is proposed. The method is composed of five sub methods. Each sub method is mapped into a hash bit. First, the line spectrum frequency coefficients (LSFs) and dual tree complex wavelet transform (DT-CWT) coefficients of each audio frame are extracted, and the norm, coefficient of variation and probability density estimates of the LSFs are calculated respectively. Then, the mean difference of the coefficients of the DT-CWT is calculated, and the DT-CWT are converted into the values of the matrix after singular value decomposition, Finally, each calculation result is mapped to a hash value. Simulation results show that the method is robust and discriminative to common voice content retention operations, and can detect whether the audio has been tampered with. |
1-6 | |||
2 |
Title : Research on Data Sharing and Privacy Protection Mechanism in Federated Learning Based on Blockchain Authors : Yi Liu
Abstract :
With the development of the times, how to share data safely on the basis of protecting users' privacy has attracted extensive attention. As a new machine learning technology, federated learning can use the local data set of nodes for distributed model training, and only share the model without uploading the original training data during the training update process, so as to achieve the safe sharing of the model. However, the data provider will not share the local data out of concern about the risk of data security and privacy disclosure, resulting in data sharing failure; There may be malicious workers in federal learning that will destroy learning, affect the overall model, and lead to unreliable data sharing; In the process of model updating, intermediate parameters may be stolen by attackers, leading to the privacy disclosure of data providers.To address the above issues, this paper introduces blockchain technology to further study data sharing and privacy protection in federated learning. |
7-10 | |||
3 |
Title : Blockchain-based Big Data Transaction Pricing Mechanism Authors : Huimin Liu
Abstract :
With the rapid development of information technology, the amount of data traffic on the network is increasing day by day, and big data transactions have emerged as a new business model. However, at present, there is little historical data on big data transactions, and the transaction mechanism is not perfect, and the traditional big data transaction pricing scheme shows many problems, such as: unfairness of the pricing mechanism, collusion and third-party hidden dangers, which cause poor circulation of data resources and the inability to maximize the value of data. In order to solve the above problems, this paper studies and designs a blockchain-based big data transaction pricing mechanism (BDPM) based on the sealed auction theory, combined with blockchain technology, SGX technology and IPFS. |
11-14 | |||
4 |
Title : Research on Data trading Mechanism based on quality inspection and negotiated pricing Authors : Wenqiang Li
Abstract :
With the rapid development of new technologies such as the Internet of Things, artificial intelligence and cloud computing, human beings have entered the era of big data, and with it comes the explosive growth of data. By using new technologies to analyze and process data, the hidden values in the data can be unearthed. Therefore, it is essential to establish a fair and secure data trading bridge between the generation and use of data. Currently, most of the data trading platforms are based on centralized institutions, but centralized trading platforms have problems such as single point of failure, privacy disclosure, transaction opacity, data resale and so on.Blockchain, as an emerging technology in recent years, provides new ideas for data trading due to its decentralized, traceable and tamper-proof technical characteristics. Relevant scholars propose blockchain-based data trading scheme, and although it solves some problems in centralized data trading, the existing scheme still suffers from unguaranteed data quality, privacy leakage, unreasonable data pricing, etc.A data trading model based on quality detection and negotiated pricing is proposed to solve the problems of single point of failure, leakage of user privacy, unguaranteed data quality, and unreasonable data pricing in existing data trading schemes. The model combines smart contracts, cryptography, trusted hardware and other technologies to accomplish fair data transactions while protecting user privacy. By building a test environment to verify the feasibility and performance analysis of the model, the experimental results show that the model not only solves the above problems, but also ensures the fairness and security of the whole transaction process. |
15-19 | |||
5 |
Title : Mobile-Yolo, A Lightweight Neural Network Based On YOLOv4-tiny Authors : Minhao Gu
Abstract :
In recent years, with the continuous development of deep learning, the depth of network models becomes deeper and deeper, which brings the number of parameters and computation of network models becomes more and more huge. Unlike cloud devices, edge devices or embedded devices often have power and computational limitations, which pose a significant challenge to deploy neural network models on edge devices. How to deploy neural network models to edge devices with little loss of accuracy? The problem of how to smoothly deploy the network models to edge devices and perform fast inference with little loss of accuracy becomes a non-negligible problem. In this paper, based on the YOLOv4-tiny network, we replace the backbone feature extraction network of YOLOv4-tiny with mobilenet to build a new lightweight network mobile-yolo, and the experimental results show that our mobile-yolo has good results. |
20-23 | |||
6 |
Title : Study on Blasting Vibration Reduction Construction Technology of Multi-Arch Tunnel without Central Wall in Rear Tunnel Authors : Xu Lizhong, Wang Bizhen, Zhang Zequn
Abstract :
In this paper, the test data and analysis results are used to guide the correction of late blasting parameters, adjust the scope of static excavation area and determine the blasting vibration velocity standard. The rock mass in the static excavation area becomes loose due to vibration after the excavation face blasting operation of the rear tunnel. The hydraulic crushing hammer is used to chisel out the surrounding rock in the static excavation area faster, which has little influence on the construction progress. At the same time, the static excavation method with excavator and crushing hammer has high controllability, which ensures that the excavation of the rear tunnel does not invade the initial support contour of the first tunnel, and reduces the construction disturbance to the initial support of the adjacent position of the first tunnel. Avoid the construction of the rear tunnel leading to the first hole lining structure cracking and instability, reduce the amount of the first hole lining cracks, improve the safety of the construction process, to ensure the project duration and quality requirements. |
24-28 | |||
7 |
Title : Research on Deployment and Acceleration Optimization based on tvm Authors : Yilin An
Abstract :
In recent years, with the continuous development and progress of machine learning, the field of deep learning has achieved a series of unprecedented successes, and deep learning algorithms have also been applied to all walks of life. But as the scale of the network becomes huge, there is a huge demand for computing power. Most deep learning frameworks, such as Tensorflow, MXNet, Pytorch, etc., only provide some server-level optimization. As a result, it is difficult to deploy deep neural network effectively on some devices with insufficient resources. Therefore, in the embedded field, relevant researches have been carried out one after another. As an important branch of deep learning, deep neural network has become more and more difficult to deploy because of its increasing computation. Based on the open source framework of TVM, this paper proposes a method to optimize the network computation diagram to accelerate the execution of neural network computation. This article uses YOLOV4-tTiny deployed on Jeston Nano, which is 13 times faster with ansor technology. |
29-32 | |||
8 |
Title : Application of BIM Technology in Construction Management of Prefabricated Buildings Authors : Zhu Jianqin, Lin Fengying, Zhang Xueli, Chen Jinfeng, Xiong Mijun, Xiao Mingyi, Yin Zongliang, Liu Huachang, Wang Xiaoyong, Mao Fei
Abstract :
With the rapid development of the construction industry in China, people have higher and higher requirements for the sustainable development of the environment. As a new building form, prefabricated buildings have the characteristics of standardization, industrialization and efficiency, and have been widely used in the process of engineering construction. The application of BIM technology in the construction management of prefabricated building projects can realize the information integration management of the whole process of prefabricated building construction, improve the cooperative work efficiency of all participants, and give full play to the advantages of prefabricated buildings. This paper expounds the application of BIM technology in the construction management of prefabricated buildings, and discusses the importance of BIM technology. |
33-36 |