期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
SESPnet:a lightweight network with attentionmechanism for spacecraft pose estimation
1
作者 Chao Chen Zhongliang Jing +4 位作者 Han Pan Xiangming Dun Jianzhe Huang Hailei Wu Shuqing Cao 《Aerospace Systems》 2024年第1期1-10,共10页
Spacecraft pose estimation plays an important role in an increasing number of on-orbit services:rendezvous and docking,formation flights,debris removal,and so on.Current solutions achieve excellent performance at the ... Spacecraft pose estimation plays an important role in an increasing number of on-orbit services:rendezvous and docking,formation flights,debris removal,and so on.Current solutions achieve excellent performance at the cost of a huge number of model parameters and are not applicable in space environments where computational resources are limited.In this paper,we present the Squeeze-and-Excitation based Spacecraft Pose Network(SESPNet).Our primary objective is to make a tradeoff between minimizing model parameters and preserving performance to be more applicable to edge computing in space environments.Our contributions are primarily manifested in three aspects:first,we adapt the lightweight PeleeNet as the backbone network;second,we incorporate the SE attentionmechanism to bolster the network’s feature extraction capabilities;third,we adopt the Smooth L1 loss function for position regression,which significantly enhances the accuracy of position estimation. 展开更多
关键词 Convolutional neural network Spacecraft pose estimation embedded application Attention mechanism
在线阅读 下载PDF
A Private User Data Protection Mechanism in TrustZone Architecture Based on Identity Authentication 被引量:4
2
作者 Bo Zhao Yu Xiao +1 位作者 Yuqing Huang Xiaoyu Cui 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2017年第2期218-225,共8页
In Trust Zone architecture, the Trusted Application(TA) in the secure world does not certify the identity of Client Applications(CA) in the normal world that request data access, which represents a user data leaka... In Trust Zone architecture, the Trusted Application(TA) in the secure world does not certify the identity of Client Applications(CA) in the normal world that request data access, which represents a user data leakage risk. This paper proposes a private user data protection mechanism in Trust Zone to avoid such risks. We add corresponding modules to both the secure world and the normal world and authenticate the identity of CA to prevent illegal access to private user data. Then we analyze the system security, and perform validity and performance tests.The results show that this method can perform effective identity recognition and control of CA to protect the security of private user data. After adding authentication modules, the data operation time of system increases by about0.16 s, an acceptable price to pay for the improved security. 展开更多
关键词 embedded system TrustZone Trusted Application(TA) identity authentication private data protection
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部