T R A C K       P A P E R
Close

Login Panel

Close tab

Password Meter

Volume 12 Issue 04 (April 2025)

S.No. Title & Authors Page No View
1

Title : Application of Internet of Things (IoT) Technology in Smart Compaction System

Authors : LIU Junlong, HONG Tao, XU Yifu, LIN Jian, LI Zhaohua, OU Jianliang, WU Yingxiong, LE Duoqian

Click Here For Abstract

Download Certificate
Abstract :

This paper introduces the application of IoT technology in the smart compaction system and its utilization in water conservancy construction projects. By equipping essential compaction equipment with information control panels, automatic positioning modules, and corresponding IoT sensors, the system enables comprehensive monitoring of the entire dam compaction process, ensuring construction quality and safety. By integrating the latest IoT, computer technology, and dam compaction construction techniques, the system realizes unmanned compaction construction, effectively enhancing construction quality and accelerating the construction progress

1-3
2

Title : A Cryptography-Domain Relation Extraction Method Based on Retrieval Augmentation and Chain of Thought

Authors : Leer Bao, Wei Zhang

Click Here For Abstract

Download Certificate
Abstract :

Relation extraction is a crucial task in natural language processing, aimed at identifying entities and their relationships from text, and holds particular significance in the cryptography domain due to its involvement with complex multi-entity interactions. This paper addresses the challenges of relation extraction in cryptography, such as intricate terminology, implicit relationships, data scarcity, and the demand for high precision, by proposing a method based on retrieval augmentation and chain-of-thought optimization. By integrating chain-of-thought prompt optimization, example retrieval enhancement, and dependency analysis techniques, this approach significantly improves extraction performance in low-resource environments. Additionally, a high-quality cryptography-domain dataset containing 24 entity relationship categories is constructed, providing robust support for related research.

Tailored to the unique characteristics of the cryptography domain, this paper first designs a chain-of-thought-based prompt template with a self-checking mechanism to guide the model through step-by-step reasoning, enhancing the accuracy of extracting complex relationships. Second, it employs S-BERT embeddings along with a weighted ranking strategy using cosine similarity and the DICE coefficient to dynamically retrieve and inject the most relevant examples into the prompt template, improving the model’s adaptability in data-scarce scenarios. Then, a rule-based retrieval method precisely injects necessary background knowledge. Finally, StanfordCoreNLP is utilized to extract dependency relationships as structured knowledge, further optimizing the model’s understanding of implicit relationships.

Experimental results demonstrate that this method, implemented on the ChatGLM4-Plus model, achieves an F1-score of 70.62%, significantly outperforming traditional methods and unoptimized large language model baselines. Ablation studies confirm the effectiveness of each module and their synergistic contributions, underscoring the method’s value in enhancing the precision and robustness of relation extraction in the cryptography domain. This approach not only provides an efficient tool for knowledge graph construction and information retrieval in cryptography but also offers a replicable optimization strategy for relation extraction tasks in other highly specialized domains.et

4-13
3

Title : Fusion Attention and Physics Correction Long Short-Term Memory Network model

Authors : Linlin Lang

Click Here For Abstract

Download Certificate
Abstract :

In order to accurately and rationally predict the future trajectories of vehicles, a Fusion Attention and Physics Correction Long Short-Term Memory Network (FAPC-LSTM) model is proposed. It can improve the accuracy and stability of self-driving car trajectory prediction. Traditional methods based on physical models rely on complex parameters and are difficult to adapt to complex scenarios. And purely data-driven models (e.g., LSTM) may output predictions that violate physical laws. FAPC-LSTM integrates vehicle state information through an encoding-decoding structure, utilizes an attention mechanism to capture key timing features, and dynamically constrains the prediction results through a physical correction layer. The experiments are based on the nuScenes dataset and compare the performance of the purely physical model, traditional LSTM and FAPC-LSTM. The results show that FAPC-LSTM significantly outperforms the comparison model in both speed and position prediction. Especially, it exhibits lower cumulative error and higher stability in long-term prediction, which verifies its effectiveness in practical complex driving scenarios.

14-18
4

Title : Experimental Research on Certificate less Fault-Tolerant Aggregate Signature Scheme in Internet of Vehicles

Authors : Jiashuo Cheng, Bingxu Han, Shutong Li, Mengyao Li

Click Here For Abstract

Download Certificate
Abstract :

As a key component of intelligent transportation systems, Vehicular Ad Hoc Network (VANET) has been widely used to improve traffic congestion, optimize driving paths, improve driving safety, and provide diverse entertainment services. However, due to its open communication architecture, the Internet of Vehicles faces many security challenges in message transmission and user identity protection. First, when vehicles communicate with other vehicles (Vehicle-to-Vehicle, V2V) or infrastructure (Vehicle-to-Infrastructure, V2I), information is vulnerable to security threats such as forgery, eavesdropping, message replay, and denial of service attacks. This may lead to driver misjudgment and safety accidents. Secondly, the Internet of Vehicles also faces problems in user privacy protection, such as location privacy leaks and identity information abuse. Compared with existing PKI and identity-based schemes, the certificateless architecture proposed in this paper has significant advantages and benefits in the following aspects: efficiency, fault tolerance, privacy protection, scalability, and security. Through security analysis and performance evaluation, the results show that this solution is superior to existing methods in terms of computing efficiency, storage requirements, communication overhead, etc., and on the basis of ensuring privacy protection and data integrity, it achieves high-dynamic environment Secure authentication and efficient communication.

19-26
5

Title : Study on Formation Deformation Caused by Leakage of Buried Pipeline

Authors : Zhongchang Wang, Jinrui Wu

Click Here For Abstract

Download Certificate
Abstract :

In this paper, FLAC3D software is used to build a 3D fluid-solid coupling numerical model to study the formation deformation induced by buried pipeline leakage. Firstly, the frequent occurrence of underground pipeline accidents, especially the formation collapse caused by leakage, is analyzed. Secondly, the influence of leakage area, infiltration velocity, leakage position and buried depth on leakage diffusion range and surface settlement is discussed. The results show that leakage area and infiltration velocity are the key factors affecting leakage diffusion range and settlement, leakage location significantly affects spatial distribution characteristics of settlement, and pipeline buried depth has inhibition effect on local settlement, but it is necessary to pay attention to the cumulative effect of long-term low-magnitude deformation. The research results provide theoretical basis and technical support for the safe operation and maintenance of urban underground pipe network, and suggest that the dynamic assessment model of leakage risk should be constructed in combination with machine learning algorithm in the future to promote the intelligent development of urban geological disaster prevention and control.

27-33
6

Title : A Hybrid Path Planning Framework for Mobile Robot with Efficient Search and Shorter, Continuously Smooth Path

Authors : Ying Zhang, Xiaohui An

Click Here For Abstract

Download Certificate
Abstract :

Path planning is a critical problem in robotics, aimed at generating efficient and smooth trajectories for robots. However, traditional algorithms like A* often suffer from low search efficiency, redundant nodes, and discontinuities in velocity and acceleration at path corners. To address these issues, this paper presents a path planning framework that combines the Optimized Bidirectional A* algorithm, the Critical Node Retention algorithm, and the Minimum Snap algorithm. The framework enhances the path planning process in three stages: First, the Bidirectional A* search is optimized by utilizing a weighted heuristic function to improve search efficiency and reduce unnecessary node expansions. Second, the Critical Node Retention algorithm refines the path by retaining only critical nodes, reducing redundancy and shortening the path length. Finally, the Minimum Snap algorithm smooths the path, ensuring continuous velocity and acceleration, thereby generating safer and smoother trajectories. Simulation experiments on grid maps of various sizes demonstrate that the proposed framework effectively reduces path length, improves search efficiency, and generates smooth, safe trajectories, providing an efficient solution to path planning.

34-41
7

Title : Attitude Tracking Control of Quadcopter Unmanned Aerial Vehicle Based On Adaptive Event Triggering Mechanism

Authors : Xiaohui An, Ying Zhang

Click Here For Abstract

Download Certificate
Abstract :

To address the update frequency of control signals for quadcopter unmanned aerial vehicles, an event triggering mechanism has been designed, which only triggers control updates when the system state deviates from the preset threshold, effectively reducing the update frequency of control signals. This design not only significantly reduces the consumption of computing resources, but also extends the lifespan of actuators, while ensuring the global stability of the system. To solve the attitude tracking problem of quadcopter unmanned aerial vehicles with unknown disturbance boundaries, this study adopts a double-layer nested adaptive gain mechanism, which can dynamically track and adaptively adjust the control gain for unknown disturbances. Through rigorous stability analysis of Lyapunov functions, it has been proven that the proposed method can ensure the global asymptotic stability of closed-loop systems. The effectiveness of the proposed method has been verified through numerical simulation experiments, and the results show that the method significantly reduces the control update frequency while ensuring control performance.

42-46
8

Title : A Comprehensive Survey on Image Aesthetic Caption

Authors : Guanjun Sheng

Click Here For Abstract

Download Certificate
Abstract :

With the continuous development of deep learning in recent years, the field of image aesthetic caption has gradually become a popular research direction, which significantly impacts various applications, such as advanced semantic understanding of images and the promotion of artistic images. Image aesthetic caption generation is a cutting-edge direction for integrating computer vision and natural language processing. Unlike traditional image caption that focuses on outputting basic facts of images, the core goal of image aesthetic caption research is to generate image aesthetic description texts that combine semantic accuracy and artistic expression through deep learning algorithms. In response to the problem that there is no review article in this field, this article systematically reviews the technical development context in the field of image aesthetic caption, focusing on analyzing the technical route of image aesthetic caption based on traditional deep learning architecture, namely convolutional neural networks and recurrent neural networks, and also introduces the technical application of multimodal models in the field of image aesthetic caption in recent years. This article covers the main technical methods, data sets, evaluation indicators, and future development trends in the field of image aesthetic caption and analyzes the challenges and opportunities of current research. We hope that our review can be a reference for future research in the field of image aesthetic caption.

47-51
9

Title : Mapping Based on Manhattan World Constraints

Authors : HuiZhuo Xiao

Click Here For Abstract

Download Certificate
Abstract :

Ultrasonic sensors are widely used in mobile robot navigation due to their low cost and strong anti-interference capability. However, their inherent low resolution, wide beam angle, and sparse point cloud characteristics limit mapping accuracy. Traditional point cloud clustering and fitting-based mapping methods are easily affected by noise, making it difficult to meet the high-precision line feature mapping requirements in structured environments (such as indoor corridors and rooms). The Manhattan World Constraint (MWC) effectively reduces the impact of sensor errors by aligning environmental structures to orthogonal directions. Therefore, this paper proposes a novel MWC-integrated line feature mapping framework that enhances the robustness and accuracy of ultrasonic mapping through dynamic clustering, direction correction, and global optimization.

52-58
10

Title : Low Power Pose Estimation Accelerator for Multiple Scenarios

Authors : Ze Jia

Click Here For Abstract

Download Certificate
Abstract :

Accelerators for pose estimation have a wide range of application scenarios at the edge. However, the complexity and variability of the edge environment and the limited power consumption restrict the application and deployment of conventional devices such as GPUs at the edge. In response, this paper proposes a low-power bit-pose estimation accelerator architecture suitable for application in multiple scenarios, and this design supports the mapping of different pose estimation networks to accelerators. In addition, we also develop an accompanying operator library to support new pose estimation networks. In order to cope with the resource- and power-scarce scenarios at the edge, the number of operators in the library can be flexibly configured before accelerator deployment, and the power consumption can be dynamically adjusted by dynamically adjusting the operating frequency of the accelerators in real applications. Finally, we deployed the proposed architecture on Virtex UltraScale+ VU9P and tested it using PVNet as well as MobileNetV2. The experimental results show that the proposed architecture can achieve performance similar to that of current state-of-the-art dedicated accelerators with lower power consumption and greater versatility while ensuring real-time performance and accuracy.

59-65