首页 > 最新文献

Third International Seminar on Artificial Intelligence, Networking, and Information Technology最新文献

英文 中文
An optimized hybrid evolutionary algorithm for accelerating automatic code optimization 一种加速代码自动优化的优化混合进化算法
Yasong Zhang, Yu'e Li, Xiaolin Wang
The deployments of deep learning models must be highly optimized by experts or hardware suppliers before being used in practice, and it has always been a long-term goal for the compiler community to enable compilers to automatically optimize code. However, there is no feasible solution in practice as running a program costs a considerable amount of optimization time to obtain a desired latency. Aiming at making up for the deficiency of long optimization time of TVM compiler, a novel optimized hybrid aging evolutionary algorithm is proposed to predict the running time of the code and accelerate automatic code optimization for Ansor, an auto-tuning framework for TVM. The algorithm alternately removes the worst and oldest individuals in the population during the evolution process. Unlike previous evolutionary algorithm, if an individual seeks to survive in the evolving population for a long time, it must have excellent scalability and flexibility, not just the individual's own adaptability. In this way, this algorithm not only ensures a strong search capability, but also improves the convergence speed and accuracy, significantly reducing the optimization time of tensor programs for deep learning inference. Experimental results show that the algorithm can accelerate convergence speed. For the same task, our algorithm provides 9% to 16% shorter optimization time on average while achieving similar or better optimization quality (i.e., inference time).
深度学习模型的部署必须经过专家或硬件供应商的高度优化才能投入实际使用,让编译器能够自动优化代码一直是编译器社区的长期目标。然而,在实践中没有可行的解决方案,因为运行程序需要花费相当多的优化时间才能获得所需的延迟。针对TVM编译器优化时间过长的不足,提出了一种新的优化混合老化进化算法,用于预测代码运行时间,加快TVM自动调优框架Ansor的代码自动优化速度。该算法在进化过程中交替去除种群中最差和最老的个体。与以往的进化算法不同,如果一个个体想要在不断进化的种群中长期生存,它必须具有出色的可扩展性和灵活性,而不仅仅是个体自身的适应性。这样,该算法不仅保证了强大的搜索能力,而且提高了收敛速度和精度,显著减少了深度学习推理张量程序的优化时间。实验结果表明,该算法可以加快收敛速度。对于相同的任务,我们的算法在实现相似或更好的优化质量(即推理时间)的同时,平均缩短了9%到16%的优化时间。
{"title":"An optimized hybrid evolutionary algorithm for accelerating automatic code optimization","authors":"Yasong Zhang, Yu'e Li, Xiaolin Wang","doi":"10.1117/12.2667392","DOIUrl":"https://doi.org/10.1117/12.2667392","url":null,"abstract":"The deployments of deep learning models must be highly optimized by experts or hardware suppliers before being used in practice, and it has always been a long-term goal for the compiler community to enable compilers to automatically optimize code. However, there is no feasible solution in practice as running a program costs a considerable amount of optimization time to obtain a desired latency. Aiming at making up for the deficiency of long optimization time of TVM compiler, a novel optimized hybrid aging evolutionary algorithm is proposed to predict the running time of the code and accelerate automatic code optimization for Ansor, an auto-tuning framework for TVM. The algorithm alternately removes the worst and oldest individuals in the population during the evolution process. Unlike previous evolutionary algorithm, if an individual seeks to survive in the evolving population for a long time, it must have excellent scalability and flexibility, not just the individual's own adaptability. In this way, this algorithm not only ensures a strong search capability, but also improves the convergence speed and accuracy, significantly reducing the optimization time of tensor programs for deep learning inference. Experimental results show that the algorithm can accelerate convergence speed. For the same task, our algorithm provides 9% to 16% shorter optimization time on average while achieving similar or better optimization quality (i.e., inference time).","PeriodicalId":128051,"journal":{"name":"Third International Seminar on Artificial Intelligence, Networking, and Information Technology","volume":"60 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124316906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on multimodal online learning status evaluation based on video camera 基于摄像机的多模态在线学习状态评价研究
Hui Xu, Xu Zhao, Yifan Wu, Huirong Wang
A person's state is reflected in many aspects, such as emotions and body movements. Online teaching makes it difficult for teachers to accurately understand the learning status of students due to the separation of space between teachers and students. This paper extracts images from video cameras, from which identifies the learner's emotion, head posture and fatigue, and evaluates the learner's learning state by synthesizing the three-sided information. The seven emotions were divided into three categories: negative, positive and natural. Head posture is defined by Euler angles, and fatigue is determined by blinking frequency. Hierarchical decision-making method is used in the model for information fusion. The learning state assessment method proposed in this paper integrates the performance of both internal and external aspects of psychology and behavior, and has high reliability. Real-time understanding of students' learning status can help improve the effectiveness of teaching.
一个人的状态反映在很多方面,比如情绪和身体动作。网络教学由于师生空间的分离,使得教师难以准确了解学生的学习状况。本文从摄像机中提取图像,从中识别学习者的情绪、头部姿势和疲劳,并综合三面信息来评估学习者的学习状态。这七种情绪被分为三类:消极、积极和自然。头部姿态由欧拉角定义,疲劳程度由眨眼频率确定。模型采用层次决策方法进行信息融合。本文提出的学习状态评估方法综合了心理和行为内外两方面的表现,具有较高的信度。实时了解学生的学习状况有助于提高教学的有效性。
{"title":"Research on multimodal online learning status evaluation based on video camera","authors":"Hui Xu, Xu Zhao, Yifan Wu, Huirong Wang","doi":"10.1117/12.2667460","DOIUrl":"https://doi.org/10.1117/12.2667460","url":null,"abstract":"A person's state is reflected in many aspects, such as emotions and body movements. Online teaching makes it difficult for teachers to accurately understand the learning status of students due to the separation of space between teachers and students. This paper extracts images from video cameras, from which identifies the learner's emotion, head posture and fatigue, and evaluates the learner's learning state by synthesizing the three-sided information. The seven emotions were divided into three categories: negative, positive and natural. Head posture is defined by Euler angles, and fatigue is determined by blinking frequency. Hierarchical decision-making method is used in the model for information fusion. The learning state assessment method proposed in this paper integrates the performance of both internal and external aspects of psychology and behavior, and has high reliability. Real-time understanding of students' learning status can help improve the effectiveness of teaching.","PeriodicalId":128051,"journal":{"name":"Third International Seminar on Artificial Intelligence, Networking, and Information Technology","volume":"104 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120907562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis and prediction of network connection behavior anomaly based on knowledge graph features 基于知识图特征的网络连接行为异常分析与预测
Liqiong Deng, Xuesi Xu, Yuan Ren
More and more complex and diverse network security problems bring great challenges to the analysis of abnormal network behavior. In order to detect the abnormal connection behavior of the network more accurately, this paper first uses the knowledge graph technology to extract the graph feature parameters that can reflect the node and the overall situation of the network, and then proposes a two-stage unsupervised anomaly analysis method for the abnormal changes of the feature parameters. In the first stage, the anomaly analysis of the whole network graph features is carried out based on clustering technology, so the rough positioning is carried out. In the second stage, the abnormal trend analysis is performed on the graph features of important nodes to determine the category of abnormal connection behavior. On this basis, the time series prediction method is used to predict the node graph features, so as to provide early warning for network security. The experimental results show that the method can effectively extract the network abnormal behavior and predict the development trend of the network in the future, and provide a good support for the understanding of network security situation.
越来越复杂多样的网络安全问题给网络异常行为分析带来了巨大的挑战。为了更准确地检测网络的异常连接行为,本文首先利用知识图技术提取能够反映节点和网络整体情况的图特征参数,然后针对特征参数的异常变化提出一种两阶段无监督异常分析方法。第一阶段,基于聚类技术对全网图特征进行异常分析,进行粗定位;第二阶段,对重要节点的图特征进行异常趋势分析,确定异常连接行为的类别。在此基础上,采用时间序列预测方法对节点图特征进行预测,为网络安全提供预警。实验结果表明,该方法可以有效地提取网络异常行为,预测网络未来的发展趋势,为了解网络安全形势提供了良好的支持。
{"title":"Analysis and prediction of network connection behavior anomaly based on knowledge graph features","authors":"Liqiong Deng, Xuesi Xu, Yuan Ren","doi":"10.1117/12.2667439","DOIUrl":"https://doi.org/10.1117/12.2667439","url":null,"abstract":"More and more complex and diverse network security problems bring great challenges to the analysis of abnormal network behavior. In order to detect the abnormal connection behavior of the network more accurately, this paper first uses the knowledge graph technology to extract the graph feature parameters that can reflect the node and the overall situation of the network, and then proposes a two-stage unsupervised anomaly analysis method for the abnormal changes of the feature parameters. In the first stage, the anomaly analysis of the whole network graph features is carried out based on clustering technology, so the rough positioning is carried out. In the second stage, the abnormal trend analysis is performed on the graph features of important nodes to determine the category of abnormal connection behavior. On this basis, the time series prediction method is used to predict the node graph features, so as to provide early warning for network security. The experimental results show that the method can effectively extract the network abnormal behavior and predict the development trend of the network in the future, and provide a good support for the understanding of network security situation.","PeriodicalId":128051,"journal":{"name":"Third International Seminar on Artificial Intelligence, Networking, and Information Technology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125178828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on the layout of electromagnetic radiation measurement points for explosion of energetic materials 含能物质爆炸电磁辐射测点布置研究
Yuanbo Cui, Hang Zhou
The adaptability of an electromagnetic radiation measurement system in the explosive field environment of energetic materials is studied, the installation method of the instrument is demonstrated, and the measurement point layout is studied. The effective measurement area of the explosion field is determined from the radiation source field area, the antenna measurement field area, the radius of the explosion fireball, the sensitivity of the data acquisition instrument, etc. The number of layouts at the same distance is determined and the dislocation arrangement is adopted to achieve omnidirectional coverage of the measurement range, finally a complete electromagnetic radiation measurement system has been established.
研究了一种电磁辐射测量系统在含能物质爆炸场环境中的适应性,论证了仪器的安装方法,研究了测点布置。爆炸场的有效测量面积由辐射源场面积、天线测量场面积、爆炸火球半径、数据采集仪的灵敏度等因素确定。确定相同距离的布局数,采用位错布置,实现测量范围的全向覆盖,最终建立了完整的电磁辐射测量系统。
{"title":"Research on the layout of electromagnetic radiation measurement points for explosion of energetic materials","authors":"Yuanbo Cui, Hang Zhou","doi":"10.1117/12.2667241","DOIUrl":"https://doi.org/10.1117/12.2667241","url":null,"abstract":"The adaptability of an electromagnetic radiation measurement system in the explosive field environment of energetic materials is studied, the installation method of the instrument is demonstrated, and the measurement point layout is studied. The effective measurement area of the explosion field is determined from the radiation source field area, the antenna measurement field area, the radius of the explosion fireball, the sensitivity of the data acquisition instrument, etc. The number of layouts at the same distance is determined and the dislocation arrangement is adopted to achieve omnidirectional coverage of the measurement range, finally a complete electromagnetic radiation measurement system has been established.","PeriodicalId":128051,"journal":{"name":"Third International Seminar on Artificial Intelligence, Networking, and Information Technology","volume":"165 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113983424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Dormancy strategy for temporal-spatial correlated nodes in wireless sensor networks 无线传感器网络时空相关节点的休眠策略
Jiang Yu, Yu Meng, Xingchuan Liu, Yongjie Nie
Reducing network power consumption plays an important role in the research of wireless sensor networks. This paper focuses on energy efficiency in environmental data collection scenarios. The data collected in this scenario are usually redundant due to spatial and temporal correlation. Consequently, selecting some nodes for dormancy can reduce power consumption. It is the key issue that how to select dormant nodes, and existing research mainly focuses on uniform clustering and optimal routing algorithms. However, the algorithms cannot guide the selection of dormant nodes because of their less consideration of attribute characteristics. Therefore, this paper proposes a node dormancy strategy for temporal-spatial correlated nodes in wireless sensor networks. The temporal-spatial correlation of the data is firstly verified; then the attributes combined with the location information are provided for FCM clustering; after, dormant node selection and head node selection are performed according to the clustering. Experiments on real temperature datasets demonstrate that using this paper's strategy, data accuracy can still be maintained at more than 95% of what no dormant node perform when 50% of nodes are dormant and around 90% when 80% of nodes are dormant. The improvement even reaches at most 80% against the traditional strategy with the same percentage of dormancy.
降低网络功耗是无线传感器网络研究的重要内容。本文主要研究环境数据收集场景中的能效问题。由于空间和时间的相关性,在这种情况下收集的数据通常是冗余的。因此,选择一些节点休眠可以降低功耗。休眠节点的选择是关键问题,现有的研究主要集中在均匀聚类和最优路由算法上。然而,由于算法对属性特征考虑较少,无法指导休眠节点的选择。为此,本文提出了一种无线传感器网络时空相关节点的节点休眠策略。首先验证了数据的时空相关性;然后结合位置信息提供属性进行FCM聚类;然后根据聚类进行休眠节点选择和头节点选择。在实际温度数据集上的实验表明,使用本文的策略,当50%的节点处于休眠状态时,数据精度仍然可以保持在未休眠节点的95%以上,当80%的节点处于休眠状态时,数据精度仍然可以保持在90%左右。在相同休眠比例的情况下,与传统策略相比,改进最多达到80%。
{"title":"Dormancy strategy for temporal-spatial correlated nodes in wireless sensor networks","authors":"Jiang Yu, Yu Meng, Xingchuan Liu, Yongjie Nie","doi":"10.1117/12.2667233","DOIUrl":"https://doi.org/10.1117/12.2667233","url":null,"abstract":"Reducing network power consumption plays an important role in the research of wireless sensor networks. This paper focuses on energy efficiency in environmental data collection scenarios. The data collected in this scenario are usually redundant due to spatial and temporal correlation. Consequently, selecting some nodes for dormancy can reduce power consumption. It is the key issue that how to select dormant nodes, and existing research mainly focuses on uniform clustering and optimal routing algorithms. However, the algorithms cannot guide the selection of dormant nodes because of their less consideration of attribute characteristics. Therefore, this paper proposes a node dormancy strategy for temporal-spatial correlated nodes in wireless sensor networks. The temporal-spatial correlation of the data is firstly verified; then the attributes combined with the location information are provided for FCM clustering; after, dormant node selection and head node selection are performed according to the clustering. Experiments on real temperature datasets demonstrate that using this paper's strategy, data accuracy can still be maintained at more than 95% of what no dormant node perform when 50% of nodes are dormant and around 90% when 80% of nodes are dormant. The improvement even reaches at most 80% against the traditional strategy with the same percentage of dormancy.","PeriodicalId":128051,"journal":{"name":"Third International Seminar on Artificial Intelligence, Networking, and Information Technology","volume":"152 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122858112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of the compressed sensing theory in the IR-UWB system channel estimation 压缩感知理论在IR-UWB系统信道估计中的应用
Xuan Dong, Lihui Pan, Rui Pan, Wei Shan
The channel estimation of IR-UWB ultra wideband wireless communication system realized by using compressed sensing theory. Firstly, sparse signal, observation matrix and reconstruction algorithm of compressed sensing theory were discussed. Secondly, discussed the composition of IR-UWB wireless communication system. The IEEE802.15.SG3a channel model was adopted for UWB multipath channel. According to the matrix calculation method of cyclic convolution, the compressed sensing model for channel estimation of IR-UWB system was derived, and GOMP algorithm was used to reconstruct the channel parameters of IR-UWB system. With the help of Matlab software, the simulation results showed that GOMP algorithm can reconstruct the channel parameters of IR-UWB system well.
利用压缩感知理论实现了超宽带无线通信系统的信道估计。首先讨论了压缩感知理论中的稀疏信号、观测矩阵和重构算法;其次,讨论了IR-UWB无线通信系统的组成。IEEE802.15。UWB多径信道采用SG3a信道模型。根据循环卷积矩阵计算方法,推导了红外-超宽带系统信道估计的压缩感知模型,并利用GOMP算法重构了红外-超宽带系统的信道参数。在Matlab软件的帮助下,仿真结果表明,GOMP算法可以很好地重建IR-UWB系统的信道参数。
{"title":"Application of the compressed sensing theory in the IR-UWB system channel estimation","authors":"Xuan Dong, Lihui Pan, Rui Pan, Wei Shan","doi":"10.1117/12.2667442","DOIUrl":"https://doi.org/10.1117/12.2667442","url":null,"abstract":"The channel estimation of IR-UWB ultra wideband wireless communication system realized by using compressed sensing theory. Firstly, sparse signal, observation matrix and reconstruction algorithm of compressed sensing theory were discussed. Secondly, discussed the composition of IR-UWB wireless communication system. The IEEE802.15.SG3a channel model was adopted for UWB multipath channel. According to the matrix calculation method of cyclic convolution, the compressed sensing model for channel estimation of IR-UWB system was derived, and GOMP algorithm was used to reconstruct the channel parameters of IR-UWB system. With the help of Matlab software, the simulation results showed that GOMP algorithm can reconstruct the channel parameters of IR-UWB system well.","PeriodicalId":128051,"journal":{"name":"Third International Seminar on Artificial Intelligence, Networking, and Information Technology","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127715617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
UAV path planning algorithm based on improved RRT 基于改进RRT的无人机路径规划算法
Yu Liu, Zi-lv Gu, Cheng Li, Bao-guo Wang, Henglin Wu, Wen-jing Liu
Aiming at the problems of traditional Rapidly Exploring Random Tree (RRT) algorithm in route planning, such as slow speed, poor route quality and low flightability, a route planning algorithm based on integrated improvement of RRT was proposed. Firstly, in the selection of nodes to be expanded, the minimum sum of the distance between nodes and the target and the random sampling point is taken as the selection basis instead of the original method of determining nodes only according to random sampling points, so as to increase the probability of nodes near the target in the random tree being selected as nodes to be expanded. Secondly, in the process of node expansion, the reachable region of the next waypoint was determined according to the UAV dynamic constraints, and then multiple alternative nodes were randomly generated in this region. Then the route cost function is designed and the comprehensive generation value of the route formed by the alternative nodes is taken as the judgment criterion for node addition. Finally, B-spline curve smoothing is carried out to further improve the route quality. The simulation results show that the improved algorithm has obvious advantages in improving the planning speed and air route quality, and the obtained air route satisfies the UAV dynamic constraints and has high flightability.
针对传统快速探索随机树(RRT)算法在航路规划中存在的航路速度慢、航路质量差、可飞性低等问题,提出了一种基于RRT综合改进的航路规划算法。首先,在选择待扩展节点时,将节点与目标点之间的距离与随机采样点之间的距离的最小和作为选择依据,而不是原先只根据随机采样点确定节点的方法,从而增加了随机树中靠近目标的节点被选择为待扩展节点的概率。其次,在节点展开过程中,根据无人机的动态约束确定下一个航点的可达区域,并在该区域随机生成多个备选节点;然后设计路线成本函数,以备选节点形成的路线综合生成值作为节点添加的判断标准。最后对b样条曲线进行平滑处理,进一步提高路径质量。仿真结果表明,改进算法在提高规划速度和航路质量方面具有明显优势,得到的航路满足无人机动态约束,具有较高的可飞性。
{"title":"UAV path planning algorithm based on improved RRT","authors":"Yu Liu, Zi-lv Gu, Cheng Li, Bao-guo Wang, Henglin Wu, Wen-jing Liu","doi":"10.1117/12.2667637","DOIUrl":"https://doi.org/10.1117/12.2667637","url":null,"abstract":"Aiming at the problems of traditional Rapidly Exploring Random Tree (RRT) algorithm in route planning, such as slow speed, poor route quality and low flightability, a route planning algorithm based on integrated improvement of RRT was proposed. Firstly, in the selection of nodes to be expanded, the minimum sum of the distance between nodes and the target and the random sampling point is taken as the selection basis instead of the original method of determining nodes only according to random sampling points, so as to increase the probability of nodes near the target in the random tree being selected as nodes to be expanded. Secondly, in the process of node expansion, the reachable region of the next waypoint was determined according to the UAV dynamic constraints, and then multiple alternative nodes were randomly generated in this region. Then the route cost function is designed and the comprehensive generation value of the route formed by the alternative nodes is taken as the judgment criterion for node addition. Finally, B-spline curve smoothing is carried out to further improve the route quality. The simulation results show that the improved algorithm has obvious advantages in improving the planning speed and air route quality, and the obtained air route satisfies the UAV dynamic constraints and has high flightability.","PeriodicalId":128051,"journal":{"name":"Third International Seminar on Artificial Intelligence, Networking, and Information Technology","volume":"167 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132117467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Bayesian deep learning method for credit card fraud detection with uncertainty quantification 基于贝叶斯深度学习的不确定量化信用卡欺诈检测方法
Qiming Yu, Qizhi Zhang, Xihan Cao, Tianlin Zhang, Jiawei He, Ruimin Wang, Zhengyi Ma
With the changes of people’s consuming attitudes and the popularization of mobile payment, credit card seems increasingly indispensable in life. However, as the number of issued credit cards and credit lines is increasing, there emerges more and more fraud cases involving credit cards. Due to the rapid development of the Internet industry, the channels for capital flow have become unprecedentedly smooth, making it very difficult to prevent credit card fraud cases. If that continues, the development of banks and other financial institutions in the credit card field would be restricted, which might affect people's daily consumption and even the normal running of the society. The Bayesian Deep Learning method is used to quantify the uncertainty of credit card fraud prediction in this essay. Through experimental analysis, the accuracy of the model is over 99%. Compared with conventional classification models, this model has superior performance.
随着人们消费观念的改变和移动支付的普及,信用卡在生活中似乎越来越不可或缺。然而,随着信用卡发行数量和信用额度的不断增加,涉及信用卡的诈骗案件也越来越多。由于互联网行业的快速发展,资金流动的渠道变得前所未有的畅通,使得信用卡诈骗案件的防范变得非常困难。如果这种情况持续下去,银行和其他金融机构在信用卡领域的发展将受到限制,这可能会影响人们的日常消费,甚至影响社会的正常运行。本文采用贝叶斯深度学习方法对信用卡欺诈预测的不确定性进行量化。通过实验分析,该模型的准确率在99%以上。与传统的分类模型相比,该模型具有更好的性能。
{"title":"A Bayesian deep learning method for credit card fraud detection with uncertainty quantification","authors":"Qiming Yu, Qizhi Zhang, Xihan Cao, Tianlin Zhang, Jiawei He, Ruimin Wang, Zhengyi Ma","doi":"10.1117/12.2667363","DOIUrl":"https://doi.org/10.1117/12.2667363","url":null,"abstract":"With the changes of people’s consuming attitudes and the popularization of mobile payment, credit card seems increasingly indispensable in life. However, as the number of issued credit cards and credit lines is increasing, there emerges more and more fraud cases involving credit cards. Due to the rapid development of the Internet industry, the channels for capital flow have become unprecedentedly smooth, making it very difficult to prevent credit card fraud cases. If that continues, the development of banks and other financial institutions in the credit card field would be restricted, which might affect people's daily consumption and even the normal running of the society. The Bayesian Deep Learning method is used to quantify the uncertainty of credit card fraud prediction in this essay. Through experimental analysis, the accuracy of the model is over 99%. Compared with conventional classification models, this model has superior performance.","PeriodicalId":128051,"journal":{"name":"Third International Seminar on Artificial Intelligence, Networking, and Information Technology","volume":"19 16","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134447108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Face and gesture recognition system based on OpenCV 基于OpenCV的人脸和手势识别系统
Yiping Liu, Wei Wang, W. Zeng
This paper mainly discusses processing the video stream obtained from the network camera by using OpenCV image processing function to detect the face. Face recognition classifier uses OpenCV comes with the face classifier that trains by HAAR characteristics , which draw out of the face part with a blue box. Secondly, we identify the meaning of gesture. The recognition of gesture uses the classifier which uses Haar characteristics to extract the target feature to make the classifier. And also the use of pattern matching method become the second choice. Finally we use JNA to call the Windows API, to make the Windows platform browser switch to the web page. Also we use JavaFX to create the GUI, to take pictures, set the value of HSV, and display the meaning of gestures. Key words-OpenCV; Gesture Recognition; Pattern Matching; Face Recognition
本文主要讨论了利用OpenCV图像处理功能对网络摄像机获取的视频流进行人脸检测。人脸识别分类器使用OpenCV自带的人脸分类器,该分类器通过HAAR特征进行训练,HAAR特征用蓝框绘制出人脸部分。其次,我们识别手势的意义。手势识别使用分类器,该分类器利用哈尔特征提取目标特征进行分类。而模式匹配方法的使用也成为第二选择。最后使用JNA调用Windows API,实现Windows平台浏览器切换到web页面。我们还使用JavaFX创建GUI,拍照,设置HSV值,并显示手势的含义。关键words-OpenCV;手势识别;模式匹配;人脸识别
{"title":"Face and gesture recognition system based on OpenCV","authors":"Yiping Liu, Wei Wang, W. Zeng","doi":"10.1117/12.2667539","DOIUrl":"https://doi.org/10.1117/12.2667539","url":null,"abstract":"This paper mainly discusses processing the video stream obtained from the network camera by using OpenCV image processing function to detect the face. Face recognition classifier uses OpenCV comes with the face classifier that trains by HAAR characteristics , which draw out of the face part with a blue box. Secondly, we identify the meaning of gesture. The recognition of gesture uses the classifier which uses Haar characteristics to extract the target feature to make the classifier. And also the use of pattern matching method become the second choice. Finally we use JNA to call the Windows API, to make the Windows platform browser switch to the web page. Also we use JavaFX to create the GUI, to take pictures, set the value of HSV, and display the meaning of gestures. Key words-OpenCV; Gesture Recognition; Pattern Matching; Face Recognition","PeriodicalId":128051,"journal":{"name":"Third International Seminar on Artificial Intelligence, Networking, and Information Technology","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115631032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An intrusion detection model using smote and ensemble learning 一种使用攻击和集成学习的入侵检测模型
Lingfeng Qiu, Yafei Song
As a security defense technology to protect the network from attack, network intrusion detection system plays a very important role in the field of computer system and network security. Aiming at the multi classification problem of unbalanced data in network intrusion detection, machine learning has been widely used in intrusion detection, which is more intelligent and accurate than traditional methods. The existing multi classification methods of network intrusion detection are improved, and an intrusion detection model using smote and ensemble learning is proposed. The model is mainly divided into two parts: smote oversampling and stacking classifier. The NSL-KDD dataset is used to test the Stacked Ensemble model in this paper. Compared with the other five basic learner models, the Stacked Ensemble has a higher detection rate. Stacked Ensemble has significant advantages in solving the multi classification problem of unbalanced network intrusion detection data. It is a practical and feasible intrusion detection method.
网络入侵检测系统作为一种保护网络不受攻击的安全防御技术,在计算机系统和网络安全领域发挥着非常重要的作用。针对网络入侵检测中不平衡数据的多重分类问题,机器学习在入侵检测中得到了广泛的应用,它比传统的方法更加智能和准确。对现有的多种网络入侵检测分类方法进行了改进,提出了一种基于smote和集成学习的入侵检测模型。该模型主要分为两部分:smote过采样和堆叠分类器。本文使用NSL-KDD数据集对堆叠集成模型进行了测试。与其他五种基本学习器模型相比,堆叠集成具有更高的检测率。堆叠集成在解决不平衡网络入侵检测数据的多分类问题方面具有显著的优势。这是一种实用可行的入侵检测方法。
{"title":"An intrusion detection model using smote and ensemble learning","authors":"Lingfeng Qiu, Yafei Song","doi":"10.1117/12.2667349","DOIUrl":"https://doi.org/10.1117/12.2667349","url":null,"abstract":"As a security defense technology to protect the network from attack, network intrusion detection system plays a very important role in the field of computer system and network security. Aiming at the multi classification problem of unbalanced data in network intrusion detection, machine learning has been widely used in intrusion detection, which is more intelligent and accurate than traditional methods. The existing multi classification methods of network intrusion detection are improved, and an intrusion detection model using smote and ensemble learning is proposed. The model is mainly divided into two parts: smote oversampling and stacking classifier. The NSL-KDD dataset is used to test the Stacked Ensemble model in this paper. Compared with the other five basic learner models, the Stacked Ensemble has a higher detection rate. Stacked Ensemble has significant advantages in solving the multi classification problem of unbalanced network intrusion detection data. It is a practical and feasible intrusion detection method.","PeriodicalId":128051,"journal":{"name":"Third International Seminar on Artificial Intelligence, Networking, and Information Technology","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124953387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Third International Seminar on Artificial Intelligence, Networking, and Information Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1