首页 > 最新文献

2021 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)最新文献

英文 中文
Energy Management Systems and Smart Phones: A Systematic Literature Survey 能源管理系统和智能手机:一个系统的文献调查
Youssef Mansour, Hamdan Hammad, O. A. Waraga, M. A. Talib
Smartphones are a crucial necessity in people’s lives nowadays. Many smartphone hardware components (i.e., CPU, Wi-Fi, etc…) are in rapid development, improving their performance. However, battery technology has not been able to keep up with this pace of development where battery life becomes shorter and shorter with every new update. Therefore, smartphone energy management has become very important and has been studied by many researchers. In this research paper, we conducted a Systematic Literature Review (SLR) to review the research contribution made in the field of smartphone Energy Management Systems (EMS). We analyzed 72 relevant papers and grouped them into two categories: 1) energy management techniques that reduce or limit energy consumption, and 2) smartphone energy assessments that focus on analyzing energy consumption by smartphone components. Then, we found that mobile application was the most studied smartphone module followed by network and operating system. Around 29 studies built their solution on Android which shows the importance of open source. Finally, the study highlights the research gap in power management for closed source systems and drivers as well as specific hardware modules.
智能手机是当今人们生活中至关重要的必需品。许多智能手机硬件组件(如CPU、Wi-Fi等)正在快速发展,其性能也在不断提高。然而,电池技术已经无法跟上这种发展的步伐,电池的寿命随着每一次新的更新而变得越来越短。因此,智能手机的能量管理变得非常重要,并得到了许多研究者的研究。在这篇研究论文中,我们进行了系统文献综述(SLR)来回顾在智能手机能量管理系统(EMS)领域的研究贡献。我们分析了72篇相关论文,并将其分为两类:1)减少或限制能源消耗的能源管理技术,以及2)专注于分析智能手机组件能耗的智能手机能源评估。然后,我们发现移动应用程序是研究最多的智能手机模块,其次是网络和操作系统。大约有29项研究在Android上构建了他们的解决方案,这显示了开源的重要性。最后,该研究强调了封闭源系统和驱动程序以及特定硬件模块的电源管理方面的研究差距。
{"title":"Energy Management Systems and Smart Phones: A Systematic Literature Survey","authors":"Youssef Mansour, Hamdan Hammad, O. A. Waraga, M. A. Talib","doi":"10.1109/CCCI52664.2021.9583184","DOIUrl":"https://doi.org/10.1109/CCCI52664.2021.9583184","url":null,"abstract":"Smartphones are a crucial necessity in people’s lives nowadays. Many smartphone hardware components (i.e., CPU, Wi-Fi, etc…) are in rapid development, improving their performance. However, battery technology has not been able to keep up with this pace of development where battery life becomes shorter and shorter with every new update. Therefore, smartphone energy management has become very important and has been studied by many researchers. In this research paper, we conducted a Systematic Literature Review (SLR) to review the research contribution made in the field of smartphone Energy Management Systems (EMS). We analyzed 72 relevant papers and grouped them into two categories: 1) energy management techniques that reduce or limit energy consumption, and 2) smartphone energy assessments that focus on analyzing energy consumption by smartphone components. Then, we found that mobile application was the most studied smartphone module followed by network and operating system. Around 29 studies built their solution on Android which shows the importance of open source. Finally, the study highlights the research gap in power management for closed source systems and drivers as well as specific hardware modules.","PeriodicalId":136382,"journal":{"name":"2021 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115455825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Code-based Computation Offloading in Vehicular Fog Networks 基于代码的车辆雾网络计算卸载
Fangzhe Chen, Zhibin Gao, Zhang Liu, Lianfeng Huang, Yuliang Tang
With the number of in-vehicle infotainment applications exponentially increasing, offloading several subtasks divided from computation-intensive application to different fog nodes is convinced as a promising paradigm to satisfy the offloading requirements. However, failure transmission of subtask in any fog node will increase execution latency and energy consumption in Vehicular Fog Networks (VeFNs). In this paper, we leverage the code technology to produce extra subtasks and exchange the redundancy of computing resources for reliability, which improve the robustness of vehicle to vehicle (V2V) communication and decrease the overhead of computation offloading. Furthermore, we adopt a code-based computation offloading algorithm based on simulated annealing (CBSA) that finds the optimal coding scheme and resources allocation strategy. The numerical results are illustrated to demonstrate effectiveness of proposed algorithm.
随着车载信息娱乐应用数量呈指数级增长,将从计算密集型应用中划分出来的若干子任务卸载到不同的雾节点上被认为是满足卸载需求的一种很有前途的范式。然而,在任何雾节点上子任务的失败传输都会增加车辆雾网络(VeFNs)的执行延迟和能耗。在本文中,我们利用代码技术产生额外的子任务,并以计算资源的冗余交换可靠性,从而提高了车对车(V2V)通信的鲁棒性,减少了计算卸载的开销。此外,我们采用了基于模拟退火(CBSA)的基于码的计算卸载算法,找到最优的编码方案和资源分配策略。数值结果验证了算法的有效性。
{"title":"Code-based Computation Offloading in Vehicular Fog Networks","authors":"Fangzhe Chen, Zhibin Gao, Zhang Liu, Lianfeng Huang, Yuliang Tang","doi":"10.1109/CCCI52664.2021.9583208","DOIUrl":"https://doi.org/10.1109/CCCI52664.2021.9583208","url":null,"abstract":"With the number of in-vehicle infotainment applications exponentially increasing, offloading several subtasks divided from computation-intensive application to different fog nodes is convinced as a promising paradigm to satisfy the offloading requirements. However, failure transmission of subtask in any fog node will increase execution latency and energy consumption in Vehicular Fog Networks (VeFNs). In this paper, we leverage the code technology to produce extra subtasks and exchange the redundancy of computing resources for reliability, which improve the robustness of vehicle to vehicle (V2V) communication and decrease the overhead of computation offloading. Furthermore, we adopt a code-based computation offloading algorithm based on simulated annealing (CBSA) that finds the optimal coding scheme and resources allocation strategy. The numerical results are illustrated to demonstrate effectiveness of proposed algorithm.","PeriodicalId":136382,"journal":{"name":"2021 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126033371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimization Method of Pneumonia Image Classification Model Based on Deep Transfer Learning 基于深度迁移学习的肺炎图像分类模型优化方法
Shanyin Peng, Ning Wang
Pneumonia is one of the most common infectious diseases in clinic. X-ray chest is an important basis for early diagnosis of pneumonia. With the development of computer vision technology, using convolutional neural network to train pneumonia image classification model has been gradually applied to the process of medical clinical diagnosis. However, there are many problems in the process of using convolutional neural network to train pneumonia image classification model, such as too long model training time, over fitting and low accuracy due to too small training dataset. To solve these problems, this paper proposes an optimization method of pneumonia image classification model based on transfer learning and feature fusion, which is called Transfer Fusion. The Transfer Fusion optimization method will transplant the trained source model parameters to the target model, and add a specific feature fusion classification layer, so as to significantly shorten the training time of the new model, improve the accuracy and prevent over fitting. In this paper, Transfer Fusion optimization method is applied to three common convolutional neural network models: Google InceptionNetV3, MobileNetV2 and ResNet50. Through a large number of experiments, the performance of the three models has been significantly improved and improved.
肺炎是临床上最常见的传染病之一。胸部x线片是肺炎早期诊断的重要依据。随着计算机视觉技术的发展,利用卷积神经网络训练肺炎图像分类模型已逐渐应用到医学临床诊断过程中。然而,在使用卷积神经网络训练肺炎图像分类模型的过程中存在许多问题,如模型训练时间过长、训练数据集过小导致的过度拟合和准确率低。针对这些问题,本文提出了一种基于迁移学习和特征融合的肺炎图像分类模型优化方法,称为迁移融合。Transfer Fusion优化方法将训练好的源模型参数移植到目标模型中,并添加特定的特征融合分类层,从而显著缩短新模型的训练时间,提高准确率,防止过拟合。本文将Transfer Fusion优化方法应用于三种常见的卷积神经网络模型:Google InceptionNetV3、MobileNetV2和ResNet50。通过大量的实验,三种模型的性能都有了明显的提高和提高。
{"title":"Optimization Method of Pneumonia Image Classification Model Based on Deep Transfer Learning","authors":"Shanyin Peng, Ning Wang","doi":"10.1109/CCCI52664.2021.9583196","DOIUrl":"https://doi.org/10.1109/CCCI52664.2021.9583196","url":null,"abstract":"Pneumonia is one of the most common infectious diseases in clinic. X-ray chest is an important basis for early diagnosis of pneumonia. With the development of computer vision technology, using convolutional neural network to train pneumonia image classification model has been gradually applied to the process of medical clinical diagnosis. However, there are many problems in the process of using convolutional neural network to train pneumonia image classification model, such as too long model training time, over fitting and low accuracy due to too small training dataset. To solve these problems, this paper proposes an optimization method of pneumonia image classification model based on transfer learning and feature fusion, which is called Transfer Fusion. The Transfer Fusion optimization method will transplant the trained source model parameters to the target model, and add a specific feature fusion classification layer, so as to significantly shorten the training time of the new model, improve the accuracy and prevent over fitting. In this paper, Transfer Fusion optimization method is applied to three common convolutional neural network models: Google InceptionNetV3, MobileNetV2 and ResNet50. Through a large number of experiments, the performance of the three models has been significantly improved and improved.","PeriodicalId":136382,"journal":{"name":"2021 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)","volume":"177 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114380547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Effective Fair Off-Line Electronic Cash Protocol using Extended Chaotic Maps with Anonymity Revoking Trustee 具有匿名撤销受托人的扩展混沌映射的有效公平离线电子现金协议
C. Meshram, M. Obaidat, K. Hsiao, A. Imoize, A. Meshram
Along with the proliferation of cyberspace and the beginning of electronic trade, many electronic cash protocols were suggested. Electronic cash allows digital coins to be exchanged with value guaranteed by the signature of the financial institution and the hidden identity of the client. A client can withdraw money from the financial institution in an electronic cash protocol and then anonymously and unlinkably spend each coin. The present article suggests a practical, fair offline electronic cash protocol using extended chaotic maps capable of coin locating and seller locating. Under certain conditions, the protocol’s anonymity perchance was revoked from an offline trusted third party. The trustworthy third party verifies the financial institution’s e-coin signature in our protocol and then logs the location of data that isn’t part of the normal electronic cash protocol.
随着网络空间的扩散和电子交易的开始,许多电子现金协议被提出。电子现金允许数字货币进行交换,其价值由金融机构的签名和客户的隐藏身份保证。客户可以通过电子现金协议从金融机构取钱,然后匿名地、不可链接地花掉每一枚硬币。本文提出了一种实用的、公平的离线电子现金协议,该协议使用了能够定位硬币和定位卖家的扩展混沌地图。在某些条件下,协议的匿名性可能会从离线可信第三方处被撤销。值得信赖的第三方在我们的协议中验证金融机构的电子货币签名,然后记录不属于正常电子现金协议的数据的位置。
{"title":"An Effective Fair Off-Line Electronic Cash Protocol using Extended Chaotic Maps with Anonymity Revoking Trustee","authors":"C. Meshram, M. Obaidat, K. Hsiao, A. Imoize, A. Meshram","doi":"10.1109/CCCI52664.2021.9583217","DOIUrl":"https://doi.org/10.1109/CCCI52664.2021.9583217","url":null,"abstract":"Along with the proliferation of cyberspace and the beginning of electronic trade, many electronic cash protocols were suggested. Electronic cash allows digital coins to be exchanged with value guaranteed by the signature of the financial institution and the hidden identity of the client. A client can withdraw money from the financial institution in an electronic cash protocol and then anonymously and unlinkably spend each coin. The present article suggests a practical, fair offline electronic cash protocol using extended chaotic maps capable of coin locating and seller locating. Under certain conditions, the protocol’s anonymity perchance was revoked from an offline trusted third party. The trustworthy third party verifies the financial institution’s e-coin signature in our protocol and then logs the location of data that isn’t part of the normal electronic cash protocol.","PeriodicalId":136382,"journal":{"name":"2021 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128370036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
System Level simulation for 5G Ultra-Reliable Low-Latency Communication 5G超可靠低延迟通信的系统级仿真
Lianfeng Huang, Tao Chen, Zhibin Gao, Manman Luo, Zhang Liu
Ultra-Reliable Low-Latency Communication (URLLC) as one of the three fifth-generation (5G) typical application scenarios in the future, which requires extreme reliability and low latency. The 3rd Generation Partnership Project (3GPP) expects the transmission of 32-byte packets with the user plane latency of less than 1 ms and 99.999% reliability. With the aim to evaluate the performance of 5G URLLC network, performing system level simulations is a crucial and effective method. In this paper, we modify and expand the Vienna 5G System Level Simulator to support the 5G URLLC scenario, and finally study the impact of three different scheduling algorithms on throughput, Signal to Interference plus Noise Ratio (SINR), latency and reliability of URLLC network.
超可靠低时延通信(URLLC)是未来5G三大典型应用场景之一,对可靠性和低时延有着极高的要求。第三代合作伙伴计划(3GPP)期望传输32字节的数据包,用户面延迟小于1ms,可靠性为99.999%。为了评估5G URLLC网络的性能,进行系统级仿真是一种重要而有效的方法。本文对维也纳5G系统级模拟器进行了改进和扩展,以支持5G URLLC场景,最后研究了三种不同调度算法对URLLC网络吞吐量、信噪比、时延和可靠性的影响。
{"title":"System Level simulation for 5G Ultra-Reliable Low-Latency Communication","authors":"Lianfeng Huang, Tao Chen, Zhibin Gao, Manman Luo, Zhang Liu","doi":"10.1109/CCCI52664.2021.9583197","DOIUrl":"https://doi.org/10.1109/CCCI52664.2021.9583197","url":null,"abstract":"Ultra-Reliable Low-Latency Communication (URLLC) as one of the three fifth-generation (5G) typical application scenarios in the future, which requires extreme reliability and low latency. The 3rd Generation Partnership Project (3GPP) expects the transmission of 32-byte packets with the user plane latency of less than 1 ms and 99.999% reliability. With the aim to evaluate the performance of 5G URLLC network, performing system level simulations is a crucial and effective method. In this paper, we modify and expand the Vienna 5G System Level Simulator to support the 5G URLLC scenario, and finally study the impact of three different scheduling algorithms on throughput, Signal to Interference plus Noise Ratio (SINR), latency and reliability of URLLC network.","PeriodicalId":136382,"journal":{"name":"2021 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116182302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Cross-modal Retrieval of Archives based on Principal Affinity Representation 基于主关联表示的档案跨模态检索
Xiaoqing Yang, Yuelong Zhu, Jun Feng, Jiamin Lu
The development of information technology has resulted in an exponential increase of archive information. Using cross-modal retrieval can achieve mutual retrieval of data like image and text. Aside from the former progresses, it is still challenging to mine both inter-modal connection and the intrinsic semantic associations of cross-modal data. In this paper, we propose a method to achieve an accurate and effective cross-modal retrieval. It uniformly represents heterogeneous data through the principal affinity representation algorithm based on a hybrid kernel function. To improve the accuracy of retrieval, we first employ an adaptive nearest neighbor search method to dynamically decide the retrieval radius. The search method is then combined with the existing tree structure-based retrieval algorithm to find the nearest neighbor points efficiently. The experimental results show our algorithms have a certain improvement in efficiency and accuracy of cross-modal retrieval.
信息技术的发展使档案信息呈指数级增长。使用跨模态检索可以实现图像和文本等数据的相互检索。除了前者的进展之外,挖掘跨模态连接和跨模态数据的内在语义关联仍然是一个挑战。本文提出了一种准确有效的跨模态检索方法。它通过基于混合核函数的主亲和表示算法对异构数据进行统一表示。为了提高检索精度,首先采用自适应最近邻搜索方法动态确定检索半径;然后将该搜索方法与现有的基于树结构的检索算法相结合,有效地找到最近邻点。实验结果表明,该算法在跨模态检索的效率和准确性上有一定的提高。
{"title":"Cross-modal Retrieval of Archives based on Principal Affinity Representation","authors":"Xiaoqing Yang, Yuelong Zhu, Jun Feng, Jiamin Lu","doi":"10.1109/CCCI52664.2021.9583202","DOIUrl":"https://doi.org/10.1109/CCCI52664.2021.9583202","url":null,"abstract":"The development of information technology has resulted in an exponential increase of archive information. Using cross-modal retrieval can achieve mutual retrieval of data like image and text. Aside from the former progresses, it is still challenging to mine both inter-modal connection and the intrinsic semantic associations of cross-modal data. In this paper, we propose a method to achieve an accurate and effective cross-modal retrieval. It uniformly represents heterogeneous data through the principal affinity representation algorithm based on a hybrid kernel function. To improve the accuracy of retrieval, we first employ an adaptive nearest neighbor search method to dynamically decide the retrieval radius. The search method is then combined with the existing tree structure-based retrieval algorithm to find the nearest neighbor points efficiently. The experimental results show our algorithms have a certain improvement in efficiency and accuracy of cross-modal retrieval.","PeriodicalId":136382,"journal":{"name":"2021 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115851079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Gibbs Free-energy Prediction Method for Iron-base Alloy Materials Based on Deep Learning* 基于深度学习的铁基合金材料Gibbs自由能预测方法*
Yabin Xu, Shengjie Sun, Zhuang Wu
In order to speed up the development of new iron-base alloy materials and reduce the consumption of time and resources caused by a large number of experiments, a prediction method for Gibbs free energy of iron-base alloy materials was proposed based on the theory of material genetic engineering. Firstly, the collected data were preprocessed by splicing, filling, normalization and one-hot coding to adapt to the training of the model. Then, based on the DeepFM model, a fusion model based on Factorization Machine (FM), bitwise self-attention mechanism and Bi-directional Long Short-term Memory Network (Bi-LSTM) was proposed to predict the Gibbs free energy of iron-base alloy materials. It can not only extract the low-order and high-order features of the data effectively, but also the weight coefficients of each data feature can be reasonably optimized and the correlation between the data can be fully considered. The comparative experimental results show that the Gibbs free energy prediction method based on deep learning has a good prediction effect. It provides a new method to predict the Gibbs free energy of iron-base alloys.
为了加快铁基合金新材料的开发,减少大量实验造成的时间和资源消耗,基于材料基因工程理论,提出了铁基合金材料吉布斯自由能的预测方法。首先对采集到的数据进行拼接、填充、归一化、单热编码等预处理,以适应模型的训练;然后,在DeepFM模型的基础上,提出了一种基于分解机(FM)、位自注意机制和双向长短期记忆网络(Bi-LSTM)的融合模型来预测铁基合金材料的吉布斯自由能。它不仅可以有效地提取数据的低阶和高阶特征,而且可以合理优化各数据特征的权重系数,充分考虑数据之间的相关性。对比实验结果表明,基于深度学习的Gibbs自由能预测方法具有良好的预测效果。为预测铁基合金的吉布斯自由能提供了一种新的方法。
{"title":"Gibbs Free-energy Prediction Method for Iron-base Alloy Materials Based on Deep Learning*","authors":"Yabin Xu, Shengjie Sun, Zhuang Wu","doi":"10.1109/CCCI52664.2021.9583189","DOIUrl":"https://doi.org/10.1109/CCCI52664.2021.9583189","url":null,"abstract":"In order to speed up the development of new iron-base alloy materials and reduce the consumption of time and resources caused by a large number of experiments, a prediction method for Gibbs free energy of iron-base alloy materials was proposed based on the theory of material genetic engineering. Firstly, the collected data were preprocessed by splicing, filling, normalization and one-hot coding to adapt to the training of the model. Then, based on the DeepFM model, a fusion model based on Factorization Machine (FM), bitwise self-attention mechanism and Bi-directional Long Short-term Memory Network (Bi-LSTM) was proposed to predict the Gibbs free energy of iron-base alloy materials. It can not only extract the low-order and high-order features of the data effectively, but also the weight coefficients of each data feature can be reasonably optimized and the correlation between the data can be fully considered. The comparative experimental results show that the Gibbs free energy prediction method based on deep learning has a good prediction effect. It provides a new method to predict the Gibbs free energy of iron-base alloys.","PeriodicalId":136382,"journal":{"name":"2021 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)","volume":"313 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132340931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Legal and Regulation Retrieval System Based on Hierarchical Retrieval 基于分层检索的法律法规检索系统
Yue Chen, Yu Guo, Yuanyan Xie, Zhenqiang Mi
With the advent of big data, the number of web pages and information are increasing exponentially. Much of the information we retrieve is mixed and redundant, which affects the effectiveness of retrieval. Therefore, information retrieval has become an indispensable technology. Compared with ordinary retrieval, the retrieval of laws and regulations needs higher relevance and accuracy. Aiming at the poor retrieval effect and unreasonable results in terms of legal retrieval, this paper proposes a legal and regulation retrieval system, our work is establishing a high-quality database, removing the stop word, and increasing hierarchical retrieval. Experimental results show that the proposed method in terms of legal retrieval is more effective than general legal search systems and wide-area search systems. In the end, we complete the design and visual display of the whole retrieval system to ensure the accuracy of retrieval results and the conciseness of retrieval contents.
随着大数据的出现,网页和信息的数量呈指数级增长。我们检索到的许多信息是混合的和冗余的,这影响了检索的有效性。因此,信息检索已成为一项不可或缺的技术。与普通检索相比,法律法规检索需要更高的相关性和准确性。针对法律检索中检索效果差,检索结果不合理的问题,本文提出了一种法律法规检索系统,我们的工作是建立高质量的数据库,去除停止词,增加检索层次。实验结果表明,该方法在法律检索方面比一般法律检索系统和广域检索系统更有效。最后,我们完成了整个检索系统的设计和可视化显示,保证了检索结果的准确性和检索内容的简洁性。
{"title":"Legal and Regulation Retrieval System Based on Hierarchical Retrieval","authors":"Yue Chen, Yu Guo, Yuanyan Xie, Zhenqiang Mi","doi":"10.1109/CCCI52664.2021.9583204","DOIUrl":"https://doi.org/10.1109/CCCI52664.2021.9583204","url":null,"abstract":"With the advent of big data, the number of web pages and information are increasing exponentially. Much of the information we retrieve is mixed and redundant, which affects the effectiveness of retrieval. Therefore, information retrieval has become an indispensable technology. Compared with ordinary retrieval, the retrieval of laws and regulations needs higher relevance and accuracy. Aiming at the poor retrieval effect and unreasonable results in terms of legal retrieval, this paper proposes a legal and regulation retrieval system, our work is establishing a high-quality database, removing the stop word, and increasing hierarchical retrieval. Experimental results show that the proposed method in terms of legal retrieval is more effective than general legal search systems and wide-area search systems. In the end, we complete the design and visual display of the whole retrieval system to ensure the accuracy of retrieval results and the conciseness of retrieval contents.","PeriodicalId":136382,"journal":{"name":"2021 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130131422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
tCLD-Net: A Transfer Learning Internet Encrypted Traffic Classification Scheme Based on Convolution Neural Network and Long Short-Term Memory Network tCLD-Net:一个基于卷积神经网络和长短期记忆网络的迁移学习互联网加密流量分类方案
Xinyi Hu, Chunxiang Gu, Yihang Chen, Fushan Wei
The Internet is about to enter the era of full encryption. Traditional traffic classification methods only work well in non-encrypted environments. How to identify the specific types of network encrypted traffic in an encrypted environment without decryption is one of the foundations for maintaining cyberspace security. Traffic classification based on machine learning relies heavily on the prior knowledge of experts to construct feature sets. Although traffic classification based on deep learning can reduce human intervention, it requires a large amount of labeled data for parameter determination. This paper proposes a tCLD-Net model that combines transfer learning and deep learning. It can be trained on a small amount of labeled data to distinguish network encrypted traffic with a high accuracy. It pre-trains a CLD-Net model in the source domain data set, and fixes the parameters of the convolutional neural network module in it, and trains and tests it in the target domain data set. In order to verify the effectiveness of the tCLD-Net model, we use the ISCX public data set to conduct experiments. The results show that our proposed model can complete 100 epoches training in 208 seconds when the training set only occupies 20% of the target domain. And achieve a classification accuracy rate about 86%. This is 4% higher than the model without pre-training, and the training time is only one third of the model without pre-training.
互联网即将进入完全加密的时代。传统的流量分类方法只适用于非加密环境。如何在不解密的加密环境下识别特定类型的网络加密流量,是维护网络空间安全的基础之一。基于机器学习的流量分类很大程度上依赖于专家的先验知识来构建特征集。虽然基于深度学习的流量分类可以减少人为干预,但它需要大量的标记数据来确定参数。本文提出了一种结合迁移学习和深度学习的tCLD-Net模型。它可以在少量的标记数据上进行训练,以较高的准确率区分网络加密流量。该方法在源域数据集中对CLD-Net模型进行预训练,确定其中卷积神经网络模块的参数,并在目标域数据集中对其进行训练和测试。为了验证tCLD-Net模型的有效性,我们使用ISCX公共数据集进行实验。结果表明,当训练集仅占目标域的20%时,该模型可在208秒内完成100次epoch训练。并实现了约86%的分类准确率。这比未进行预训练的模型高4%,而训练时间仅为未进行预训练模型的三分之一。
{"title":"tCLD-Net: A Transfer Learning Internet Encrypted Traffic Classification Scheme Based on Convolution Neural Network and Long Short-Term Memory Network","authors":"Xinyi Hu, Chunxiang Gu, Yihang Chen, Fushan Wei","doi":"10.1109/CCCI52664.2021.9583214","DOIUrl":"https://doi.org/10.1109/CCCI52664.2021.9583214","url":null,"abstract":"The Internet is about to enter the era of full encryption. Traditional traffic classification methods only work well in non-encrypted environments. How to identify the specific types of network encrypted traffic in an encrypted environment without decryption is one of the foundations for maintaining cyberspace security. Traffic classification based on machine learning relies heavily on the prior knowledge of experts to construct feature sets. Although traffic classification based on deep learning can reduce human intervention, it requires a large amount of labeled data for parameter determination. This paper proposes a tCLD-Net model that combines transfer learning and deep learning. It can be trained on a small amount of labeled data to distinguish network encrypted traffic with a high accuracy. It pre-trains a CLD-Net model in the source domain data set, and fixes the parameters of the convolutional neural network module in it, and trains and tests it in the target domain data set. In order to verify the effectiveness of the tCLD-Net model, we use the ISCX public data set to conduct experiments. The results show that our proposed model can complete 100 epoches training in 208 seconds when the training set only occupies 20% of the target domain. And achieve a classification accuracy rate about 86%. This is 4% higher than the model without pre-training, and the training time is only one third of the model without pre-training.","PeriodicalId":136382,"journal":{"name":"2021 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132395791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detection of Coastal Green Macroalgae based on SLIC, CNN and SVM 基于SLIC、CNN和SVM的海岸绿藻检测
Jinghu Li, Lili Wang, Q. Xing
Video surveillance is an important method to obtain the dynamic changes of green macroalgae along the coast. The paper proposes a coastal green macroalgae extraction method based on the SLIC superpixel segmentation, CNN and SVM to realize the automated recognition of green macroalgae from lots of high-resolution RGB video data collected by unmanned aerial vehicle (UAV) and handheld devices. Firstly, SLIC algorithm is used to generate the multi-scale patches on the original high-resolution image. Then, three classification CNN is used to divide the multi-scale patches into three types: green macroalgae, background and mixing. Finally, SVM algorithm is used to extract the green macroalgae to improve the accuracy at the pixel level in the mixed patches. In order to evaluate the performance of the proposed method, experiments are conducted on our coastal green macroalgae image dataset. Compared with the method of RGB vegetation indices (such as ExR, RGBVI, NGBDI), the overall accuracy (OA), F1 score, and Kappa of the green macroalgae extraction with the method proposed in this paper are up to 95.23%, 0.9612, 0.9436, respectively. The results show that our method is significantly better than that of RGB vegetation indices since it effectively reduces the influence of sea waves and light on the recognition results. The automated extraction method for coastal green macroalgae proposed in this paper can provide a reference for the automatic monitoring of coastal green macroalgae with high precision.
视频监控是获取沿海绿藻动态变化的重要手段。本文提出了一种基于SLIC超像素分割、CNN和SVM的沿海绿藻提取方法,从无人机和手持设备采集的大量高分辨率RGB视频数据中实现对绿藻的自动识别。首先,利用SLIC算法在原始高分辨率图像上生成多尺度补丁;然后,使用三分类CNN将多尺度斑块划分为绿色巨藻、背景和混合三种类型。最后,利用支持向量机算法对大绿藻进行提取,提高混合斑块像素级的精度。为了评估该方法的性能,在我们的沿海绿色大藻类图像数据集上进行了实验。与RGB植被指数ExR、RGBVI、NGBDI等方法相比,本文方法提取的绿藻总体精度(OA)、F1得分、Kappa分别达到95.23%、0.9612、0.9436。结果表明,该方法有效地降低了海浪和光照对识别结果的影响,显著优于RGB植被指数。本文提出的海岸带绿藻自动提取方法可为海岸带绿藻高精度自动监测提供参考。
{"title":"Detection of Coastal Green Macroalgae based on SLIC, CNN and SVM","authors":"Jinghu Li, Lili Wang, Q. Xing","doi":"10.1109/CCCI52664.2021.9583195","DOIUrl":"https://doi.org/10.1109/CCCI52664.2021.9583195","url":null,"abstract":"Video surveillance is an important method to obtain the dynamic changes of green macroalgae along the coast. The paper proposes a coastal green macroalgae extraction method based on the SLIC superpixel segmentation, CNN and SVM to realize the automated recognition of green macroalgae from lots of high-resolution RGB video data collected by unmanned aerial vehicle (UAV) and handheld devices. Firstly, SLIC algorithm is used to generate the multi-scale patches on the original high-resolution image. Then, three classification CNN is used to divide the multi-scale patches into three types: green macroalgae, background and mixing. Finally, SVM algorithm is used to extract the green macroalgae to improve the accuracy at the pixel level in the mixed patches. In order to evaluate the performance of the proposed method, experiments are conducted on our coastal green macroalgae image dataset. Compared with the method of RGB vegetation indices (such as ExR, RGBVI, NGBDI), the overall accuracy (OA), F1 score, and Kappa of the green macroalgae extraction with the method proposed in this paper are up to 95.23%, 0.9612, 0.9436, respectively. The results show that our method is significantly better than that of RGB vegetation indices since it effectively reduces the influence of sea waves and light on the recognition results. The automated extraction method for coastal green macroalgae proposed in this paper can provide a reference for the automatic monitoring of coastal green macroalgae with high precision.","PeriodicalId":136382,"journal":{"name":"2021 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126208547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2021 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1