首页 > 最新文献

2022 19th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)最新文献

英文 中文
Pixel-Level Feature Clustering Learning for Image Anomaly Detection and Localization 图像异常检测与定位的像素级特征聚类学习
Huang Chao
Image anomaly detection and localization not only need to provide image-level anomaly judgment but also need to locate pixel-level anomaly areas. This paper proposes a model named pixelAD, which builds an end-to-end network through pixel- level feature clustering learning to solve this problem. The normal prototype is obtained during training by clustering the normal pixel-level features. We generate pixel-level cluster labels of normal samples according to the prototypes, which guide the model to update parameters by calculating the assignment loss. For inference, pixelAD directly outputs the pixel-level anomaly score end-to-end. The experimental results of the real industrial dataset MVTecAD show that PixelAD has an excellent performance in anomaly detection and anomaly localization.
图像异常检测与定位不仅需要提供图像级的异常判断,还需要定位像素级的异常区域。本文提出了一个名为pixelAD的模型,该模型通过像素级特征聚类学习构建端到端网络来解决这一问题。在训练过程中,通过对正常像素级特征聚类得到正常原型。我们根据原型生成正常样本的像素级聚类标签,通过计算分配损失来指导模型更新参数。对于推理,pixelAD直接端到端输出像素级异常评分。在真实工业数据集MVTecAD上的实验结果表明,PixelAD在异常检测和异常定位方面具有优异的性能。
{"title":"Pixel-Level Feature Clustering Learning for Image Anomaly Detection and Localization","authors":"Huang Chao","doi":"10.1109/ICCWAMTIP56608.2022.10016612","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP56608.2022.10016612","url":null,"abstract":"Image anomaly detection and localization not only need to provide image-level anomaly judgment but also need to locate pixel-level anomaly areas. This paper proposes a model named pixelAD, which builds an end-to-end network through pixel- level feature clustering learning to solve this problem. The normal prototype is obtained during training by clustering the normal pixel-level features. We generate pixel-level cluster labels of normal samples according to the prototypes, which guide the model to update parameters by calculating the assignment loss. For inference, pixelAD directly outputs the pixel-level anomaly score end-to-end. The experimental results of the real industrial dataset MVTecAD show that PixelAD has an excellent performance in anomaly detection and anomaly localization.","PeriodicalId":159508,"journal":{"name":"2022 19th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132336032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recommender Algorithms: From Matrix Factorization to Neural Network 推荐算法:从矩阵分解到神经网络
Xiang Li, Laixiang Qiu, Yujun Yang, Wang Zhou
With the rapid development of the Internet, the amount of global data shows an explosive growth, and the phenomenon of information overload has become more and more serious. How to obtain the information that users really care about has become one of the problems that people need to overcome. In this background, many recommendation algorithms have been widely used in all walks of life. This paper combs the background and future development trend of several recommendation algorithms.
随着互联网的飞速发展,全球数据量呈现爆发式增长,信息过载的现象越来越严重。如何获取用户真正关心的信息已经成为人们需要克服的问题之一。在这样的背景下,许多推荐算法在各行各业得到了广泛的应用。本文对几种推荐算法的研究背景和未来发展趋势进行了梳理。
{"title":"Recommender Algorithms: From Matrix Factorization to Neural Network","authors":"Xiang Li, Laixiang Qiu, Yujun Yang, Wang Zhou","doi":"10.1109/ICCWAMTIP56608.2022.10016603","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP56608.2022.10016603","url":null,"abstract":"With the rapid development of the Internet, the amount of global data shows an explosive growth, and the phenomenon of information overload has become more and more serious. How to obtain the information that users really care about has become one of the problems that people need to overcome. In this background, many recommendation algorithms have been widely used in all walks of life. This paper combs the background and future development trend of several recommendation algorithms.","PeriodicalId":159508,"journal":{"name":"2022 19th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127243273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing the Adversarial Transferability of Vision Transformers Through Perturbation Invariance 利用摄动不变性增强视觉变形器的对抗可转移性
Zeng Boheng
Vision Transformers (ViTs) have recently made great improvements in numerous vision tasks. To safely deploy in real life, it is crucial to investigate the vulnerability of ViTs. Model augmentation is an effective way to improve cross-model transferability. However, recent works mainly focus on deep neural networks (DNNs) but present a low transferability to ViTs due to the lack of usage of their properties. Inspired by the fact that ViTs are insensitive to spatial structure, we conduct experiments and demonstrated that ViTs have similar cross entropy for disrupted images, which we called perturbation invariance. Therefore, we propose our perturbation invariance method to improve transferability. Specifically, we craft transformed images by randomly shuffling the input image patches, and average the gradients of these transformed images each iteration. Besides, we also add Gaussian noise in the iterative process to further boost attack. Extensive experiments prove the effectiveness of our method. In particular, our method obtains a 79.5% attack success rate on average when against four types of ViTs, which outperforms other state-ofthe-art methods by 3.8%.
视觉变压器(ViTs)最近在许多视觉任务中取得了很大的进步。为了在现实生活中安全部署,研究vit的脆弱性至关重要。模型扩充是提高跨模型可移植性的有效途径。然而,最近的工作主要集中在深度神经网络(dnn)上,但由于缺乏对其特性的利用,其可移植性较低。受vit对空间结构不敏感这一事实的启发,我们进行了实验,并证明了vit对中断图像具有相似的交叉熵,我们称之为摄动不变性。因此,我们提出了微扰不变性方法来提高可转移性。具体来说,我们通过随机变换输入图像块来制作变换后的图像,并在每次迭代中平均这些变换后的图像的梯度。此外,我们还在迭代过程中加入高斯噪声来进一步增强攻击。大量的实验证明了该方法的有效性。特别是,我们的方法在对抗四种类型的vit时平均获得79.5%的攻击成功率,比其他最先进的方法高出3.8%。
{"title":"Enhancing the Adversarial Transferability of Vision Transformers Through Perturbation Invariance","authors":"Zeng Boheng","doi":"10.1109/ICCWAMTIP56608.2022.10016482","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP56608.2022.10016482","url":null,"abstract":"Vision Transformers (ViTs) have recently made great improvements in numerous vision tasks. To safely deploy in real life, it is crucial to investigate the vulnerability of ViTs. Model augmentation is an effective way to improve cross-model transferability. However, recent works mainly focus on deep neural networks (DNNs) but present a low transferability to ViTs due to the lack of usage of their properties. Inspired by the fact that ViTs are insensitive to spatial structure, we conduct experiments and demonstrated that ViTs have similar cross entropy for disrupted images, which we called perturbation invariance. Therefore, we propose our perturbation invariance method to improve transferability. Specifically, we craft transformed images by randomly shuffling the input image patches, and average the gradients of these transformed images each iteration. Besides, we also add Gaussian noise in the iterative process to further boost attack. Extensive experiments prove the effectiveness of our method. In particular, our method obtains a 79.5% attack success rate on average when against four types of ViTs, which outperforms other state-ofthe-art methods by 3.8%.","PeriodicalId":159508,"journal":{"name":"2022 19th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127807132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust Graph Embedding via Self-Supervised Graph Denoising 基于自监督图去噪的鲁棒图嵌入
Wang Han
Graph embedding has attracted increasing attention in the past few years. Graph neural network is the most popular type of algorithm to provide high-quality graph embedding. It brings stunning success but causes an important and easy-to-be-ignored problem, i.e., vulnerability, which makes the embedding quality dramatically degrade and affects the performance of downstream tasks like node classification. In this paper, we propose an algorithm for robust graph embedding via self-supervised graph denoising (SSGD). The key idea is to learn normal patterns about how a graph is organized and apply the patterns to reorganize the structure and remove noisy edges in the graph. Since the vulnerability is mainly caused by noisy edges, graph neural networks are supposed to work well on denoised graphs. In experiments, we introduce 6 state-of-the-art algorithms and 3 real-world datasets to demonstrate the superiority of our algorithm.
图嵌入在过去几年中引起了越来越多的关注。图神经网络是提供高质量图嵌入的最流行的算法。它带来了惊人的成功,但同时也带来了一个重要且容易被忽视的问题,即漏洞,这使得嵌入质量急剧下降,并影响节点分类等下游任务的性能。本文提出了一种基于自监督图去噪(SSGD)的鲁棒图嵌入算法。关键思想是学习关于图如何组织的正常模式,并应用这些模式来重组图中的结构和去除图中的噪声边缘。由于脆弱性主要是由有噪声的边缘引起的,所以图神经网络应该能很好地处理去噪的图。在实验中,我们引入了6种最先进的算法和3个真实数据集来证明我们算法的优越性。
{"title":"Robust Graph Embedding via Self-Supervised Graph Denoising","authors":"Wang Han","doi":"10.1109/ICCWAMTIP56608.2022.10016546","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP56608.2022.10016546","url":null,"abstract":"Graph embedding has attracted increasing attention in the past few years. Graph neural network is the most popular type of algorithm to provide high-quality graph embedding. It brings stunning success but causes an important and easy-to-be-ignored problem, i.e., vulnerability, which makes the embedding quality dramatically degrade and affects the performance of downstream tasks like node classification. In this paper, we propose an algorithm for robust graph embedding via self-supervised graph denoising (SSGD). The key idea is to learn normal patterns about how a graph is organized and apply the patterns to reorganize the structure and remove noisy edges in the graph. Since the vulnerability is mainly caused by noisy edges, graph neural networks are supposed to work well on denoised graphs. In experiments, we introduce 6 state-of-the-art algorithms and 3 real-world datasets to demonstrate the superiority of our algorithm.","PeriodicalId":159508,"journal":{"name":"2022 19th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128485572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Security Technology of Sensing Terminal of Internet of Things 物联网传感终端安全技术研究
Li Xianli, Pan Wei, Wang Yisheng, Li Ming, Liu Guosong
The Internet of Things is widely used in industry, agriculture, health, urban management and other fields, the sensing terminal is an important part of IoT system, the security of sensing terminal directly affects the whole security of IoT system. This paper proposes the corresponding security measures of the sensing terminal of IoT system, such as physical security, access security, communication security, equipment security, data security, furthermore, we have verified it with experiments. It is of great significance for the selection, deployment, operation and maintenance the sensing terminal of IoT system, and has important application value for designing and producing the sensing terminal of IoT system.
物联网广泛应用于工业、农业、卫生、城市管理等领域,传感终端是物联网系统的重要组成部分,传感终端的安全与否直接影响到整个物联网系统的安全。本文提出了物联网系统传感终端的物理安全、接入安全、通信安全、设备安全、数据安全等相应的安全措施,并通过实验进行了验证。对物联网系统传感终端的选择、部署、运维具有重要意义,对物联网系统传感终端的设计和生产具有重要的应用价值。
{"title":"Research on Security Technology of Sensing Terminal of Internet of Things","authors":"Li Xianli, Pan Wei, Wang Yisheng, Li Ming, Liu Guosong","doi":"10.1109/ICCWAMTIP56608.2022.10016500","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP56608.2022.10016500","url":null,"abstract":"The Internet of Things is widely used in industry, agriculture, health, urban management and other fields, the sensing terminal is an important part of IoT system, the security of sensing terminal directly affects the whole security of IoT system. This paper proposes the corresponding security measures of the sensing terminal of IoT system, such as physical security, access security, communication security, equipment security, data security, furthermore, we have verified it with experiments. It is of great significance for the selection, deployment, operation and maintenance the sensing terminal of IoT system, and has important application value for designing and producing the sensing terminal of IoT system.","PeriodicalId":159508,"journal":{"name":"2022 19th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131678434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Deep Learning Techniques for Breast Cancer Mitotic Cell Detection 乳腺癌有丝分裂细胞检测的深度学习技术
Jiquan Li, Laixiang Qiu, Yujun Yang, Wang Zhou
Breast cancer is one of the highest incidence in women's cancer, The pathological diagnosis of breast cancer can be used to evaluate the invasion of tumors and provide important information for accurate diagnosis and treatment. Statistics the number of mitosis cells in breast cancer is one of the important indicators of breast cancer division. In this paper, we summarized the current mainstream methods of mitosis cells detection. These methods are mainly implemented based on deep learning, and discussing the results of some of the methods, comparison and evaluation. At last, through the review of the research methods in this field, the existing breast cancer research methods have been summarized, and the future developments are prospected.
乳腺癌是女性中发病率最高的癌症之一,乳腺癌的病理诊断可用于评估肿瘤的侵袭情况,为准确诊断和治疗提供重要信息。统计乳腺癌中有丝分裂细胞的数量是乳腺癌分裂的重要指标之一。本文综述了目前有丝分裂细胞检测的主流方法。这些方法主要是基于深度学习实现的,并对一些方法的结果进行了讨论、比较和评价。最后,通过对该领域研究方法的回顾,对现有乳腺癌研究方法进行了总结,并对未来的发展进行了展望。
{"title":"Deep Learning Techniques for Breast Cancer Mitotic Cell Detection","authors":"Jiquan Li, Laixiang Qiu, Yujun Yang, Wang Zhou","doi":"10.1109/ICCWAMTIP56608.2022.10016492","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP56608.2022.10016492","url":null,"abstract":"Breast cancer is one of the highest incidence in women's cancer, The pathological diagnosis of breast cancer can be used to evaluate the invasion of tumors and provide important information for accurate diagnosis and treatment. Statistics the number of mitosis cells in breast cancer is one of the important indicators of breast cancer division. In this paper, we summarized the current mainstream methods of mitosis cells detection. These methods are mainly implemented based on deep learning, and discussing the results of some of the methods, comparison and evaluation. At last, through the review of the research methods in this field, the existing breast cancer research methods have been summarized, and the future developments are prospected.","PeriodicalId":159508,"journal":{"name":"2022 19th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"213 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134439043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Chaos-Based and Ensembled Method for Outlier Detection 一种基于混沌集成的离群点检测方法
Li Wei
With the advent of the Big Data era, anomaly detection has become an important tool for screening the validity of data. Many well-established distance-based or correlation-based anomaly detection methods are widely used for various structured and feature-based datasets with the increasing size of data. However, different method strategies have different focuses, leading to large deviations in anomaly detection results for the same dataset using different methods, which poses a great challenge to anomaly detection research. In this paper, a new strategy is proposed for anomaly detection using integrated methods. By using a two-stage process of the sliding window aggregation method, the strategy uses a multi-model anomaly scoring method and a uniform quantitative criterion filtering to obtain a suitable anomaly scoring.
随着大数据时代的到来,异常检测已经成为筛选数据有效性的重要工具。随着数据量的不断增加,许多基于距离或相关性的成熟异常检测方法被广泛应用于各种结构化和基于特征的数据集。然而,不同的方法策略有不同的侧重点,导致使用不同的方法对同一数据集的异常检测结果存在较大的偏差,这给异常检测研究带来了很大的挑战。本文提出了一种综合方法进行异常检测的新策略。该策略采用滑动窗口聚合法的两阶段过程,采用多模型异常评分方法和统一的定量准则过滤,获得合适的异常评分。
{"title":"A Chaos-Based and Ensembled Method for Outlier Detection","authors":"Li Wei","doi":"10.1109/ICCWAMTIP56608.2022.10016537","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP56608.2022.10016537","url":null,"abstract":"With the advent of the Big Data era, anomaly detection has become an important tool for screening the validity of data. Many well-established distance-based or correlation-based anomaly detection methods are widely used for various structured and feature-based datasets with the increasing size of data. However, different method strategies have different focuses, leading to large deviations in anomaly detection results for the same dataset using different methods, which poses a great challenge to anomaly detection research. In this paper, a new strategy is proposed for anomaly detection using integrated methods. By using a two-stage process of the sliding window aggregation method, the strategy uses a multi-model anomaly scoring method and a uniform quantitative criterion filtering to obtain a suitable anomaly scoring.","PeriodicalId":159508,"journal":{"name":"2022 19th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133973791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Spatio-Temporal Graph-TCN Neural Network for Traffic Flow Prediction 交通流预测的时空图- tcn神经网络
Hongjin Ren, Jinbiao Kang, Kecheng Zhang
Building smart cities in the new era depend heavily on traffic flow analysis, forecast, and management. How to integrate time series and spatial data is a crucial difficulty for anticipating traffic patterns in a smart city. An evident flaw in the existing GCN-based approach is that it is unable to collect non-adjacent but related spatial information because the adjacency matrix only contains the original topological spatial information. In this work, we create a brand-new kind of adjacency matrix that includes both prospective spatial relationships and unique spatial properties using a cutting-edge data-driven methodology. Furthermore, we develop a high-accuracy Spatio-Temporal Graph-TCN Neural Network, called ST-GTNN, for traffic flow prediction. The graph spatial attention layer and the channel attention layer are specifically used to be aware of spatial features, whereas the TCN layer and the temporal attention mechanism are used to fit temporal interactions. Experiment results on two real datasets show that our proposed ST-GTNN outperforms existing methods in terms of prediction accuracy.
新时代智慧城市的建设在很大程度上依赖于交通流量的分析、预测和管理。如何整合时间序列和空间数据是智能城市交通模式预测的关键难题。现有的基于gcn的方法存在一个明显的缺陷,即邻接矩阵只包含原始拓扑空间信息,无法收集到非相邻但相关的空间信息。在这项工作中,我们使用尖端的数据驱动方法创建了一种全新的邻接矩阵,包括潜在的空间关系和独特的空间属性。此外,我们开发了一个高精度的时空图- tcn神经网络,称为ST-GTNN,用于交通流量预测。图空间注意层和通道注意层专门用于感知空间特征,而TCN层和时间注意机制用于拟合时间交互。在两个真实数据集上的实验结果表明,我们提出的ST-GTNN在预测精度方面优于现有方法。
{"title":"Spatio-Temporal Graph-TCN Neural Network for Traffic Flow Prediction","authors":"Hongjin Ren, Jinbiao Kang, Kecheng Zhang","doi":"10.1109/ICCWAMTIP56608.2022.10016530","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP56608.2022.10016530","url":null,"abstract":"Building smart cities in the new era depend heavily on traffic flow analysis, forecast, and management. How to integrate time series and spatial data is a crucial difficulty for anticipating traffic patterns in a smart city. An evident flaw in the existing GCN-based approach is that it is unable to collect non-adjacent but related spatial information because the adjacency matrix only contains the original topological spatial information. In this work, we create a brand-new kind of adjacency matrix that includes both prospective spatial relationships and unique spatial properties using a cutting-edge data-driven methodology. Furthermore, we develop a high-accuracy Spatio-Temporal Graph-TCN Neural Network, called ST-GTNN, for traffic flow prediction. The graph spatial attention layer and the channel attention layer are specifically used to be aware of spatial features, whereas the TCN layer and the temporal attention mechanism are used to fit temporal interactions. Experiment results on two real datasets show that our proposed ST-GTNN outperforms existing methods in terms of prediction accuracy.","PeriodicalId":159508,"journal":{"name":"2022 19th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123162238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Defect Detection Method of Drainage Pipe Network Based on Deep Learning 基于深度学习的排水管网缺陷检测方法研究
Zhao Zekuan, He Chunlin
In the daily life of the city, the normal operation of underground drainage pipes is a necessary condition to ensure the normal life of residents. However, with the increase of the service life of the drainpipe and the improvement of the function of water transmission and sewage, it is particularly important to evaluate the state of the drainpipe. However, the traditional pipe network detection methods such as CCTV and periscope detection are not only inefficient but also cost high. Nowadays, the Object Detection technology is becoming more and more mature, and the application of image detection technology to the defect detection of drainage pipe network is also a hot research direction. Therefore, an improved YOLOv5 Object Detection method was selected in this paper to realize the defect detection of drainage pipe network. In addition, in order to better complete the detection task in the complex image background of the waterway, the multi-head attention mechanism was incorporated into the backbone network of YOLOv5, and the FPN+PAN structure of YOLOv5 was replaced by BiFPN structure. Finally, through simulation experiments, the Precision(P) of the YOLOv5-TB model used in this paper reached 93.1%, the Recall(R) reached 85.5%, and the Mean Average Precision(mAP) reached 88.4%. Moreover, the mAP increased by 1.1% on the basis of YOLOv5. The simulation results show that the model used in this paper can well complete the task of drainage network defect detection.
在城市的日常生活中,地下排水管道的正常运行是保证居民正常生活的必要条件。然而,随着排水管使用寿命的增加和输水、排污功能的提高,对排水管的状态进行评估就显得尤为重要。然而,传统的管网检测方法,如闭路电视和潜望镜检测,不仅效率低,而且成本高。如今,目标检测技术日趋成熟,将图像检测技术应用于排水管网缺陷检测也是一个热门的研究方向。因此,本文选择一种改进的YOLOv5 Object Detection方法来实现排水管网的缺陷检测。此外,为了更好地完成航道复杂图像背景下的检测任务,在YOLOv5的骨干网中加入了多头注意机制,并将YOLOv5的FPN+PAN结构替换为BiFPN结构。最后,通过仿真实验,本文所采用的YOLOv5-TB模型的Precision(P)达到93.1%,Recall(R)达到85.5%,Mean Average Precision(mAP)达到88.4%。此外,mAP在YOLOv5的基础上增加了1.1%。仿真结果表明,本文所采用的模型能够很好地完成排水管网缺陷检测的任务。
{"title":"Research on Defect Detection Method of Drainage Pipe Network Based on Deep Learning","authors":"Zhao Zekuan, He Chunlin","doi":"10.1109/ICCWAMTIP56608.2022.10016589","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP56608.2022.10016589","url":null,"abstract":"In the daily life of the city, the normal operation of underground drainage pipes is a necessary condition to ensure the normal life of residents. However, with the increase of the service life of the drainpipe and the improvement of the function of water transmission and sewage, it is particularly important to evaluate the state of the drainpipe. However, the traditional pipe network detection methods such as CCTV and periscope detection are not only inefficient but also cost high. Nowadays, the Object Detection technology is becoming more and more mature, and the application of image detection technology to the defect detection of drainage pipe network is also a hot research direction. Therefore, an improved YOLOv5 Object Detection method was selected in this paper to realize the defect detection of drainage pipe network. In addition, in order to better complete the detection task in the complex image background of the waterway, the multi-head attention mechanism was incorporated into the backbone network of YOLOv5, and the FPN+PAN structure of YOLOv5 was replaced by BiFPN structure. Finally, through simulation experiments, the Precision(P) of the YOLOv5-TB model used in this paper reached 93.1%, the Recall(R) reached 85.5%, and the Mean Average Precision(mAP) reached 88.4%. Moreover, the mAP increased by 1.1% on the basis of YOLOv5. The simulation results show that the model used in this paper can well complete the task of drainage network defect detection.","PeriodicalId":159508,"journal":{"name":"2022 19th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125325204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Analytics and Machine Learning for Reliable Energy Management: A Case Study 可靠能源管理的数据分析和机器学习:一个案例研究
M. Ayenew, Hang Lei, Xiaoyu Li, Kulla Kekeba, Maregu Assefa, Abebe Tegene, S. Muhammed, H. Leka
Renewable electric energy with reliable supply contributes to society, the economy, and the environment. Careful management of electric power from the consumers’ side is crucial on top of stable production, transmission, and distribution systems for reliable consumption. Electric power supply and consumption have been problematic in urban areas of Ethiopia, where frequent power interruptions come from overloaded transmission and distribution systems. In this paper, we proposed a focused Demand Side Management approach for improving reliable consumption in Addis Ababa. We used data analytics and machine learning (K-mean and long and short-term memory) approaches to understand the data, identify potential customers, and predict the aggregate substation load. We identified intermediate and supper-peak demand hours and potential customers for price-based demand load shifting management. Further, the analysis shows that an increase in electric prices at peak hours causes a reduction in electric demand. Consequently, it reduces distribution load and improves reliability.
供应可靠的可再生电力对社会、经济和环境做出了贡献。除了稳定的生产、输电和配电系统之外,消费者对电力的精心管理至关重要,以实现可靠的消费。埃塞俄比亚城市地区的电力供应和消费一直存在问题,因为输电和配电系统负荷过重,经常出现电力中断。在本文中,我们提出了一个集中的需求侧管理方法,以改善亚的斯亚贝巴的可靠消费。我们使用数据分析和机器学习(k均值和长期和短期记忆)方法来理解数据,识别潜在客户,并预测变电站的总负荷。我们确定了中间高峰和超级高峰需求时间以及基于价格的需求负荷转移管理的潜在客户。此外,分析表明,高峰时段电价的上涨导致电力需求的减少。从而减少了配电负荷,提高了可靠性。
{"title":"Data Analytics and Machine Learning for Reliable Energy Management: A Case Study","authors":"M. Ayenew, Hang Lei, Xiaoyu Li, Kulla Kekeba, Maregu Assefa, Abebe Tegene, S. Muhammed, H. Leka","doi":"10.1109/ICCWAMTIP56608.2022.10016478","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP56608.2022.10016478","url":null,"abstract":"Renewable electric energy with reliable supply contributes to society, the economy, and the environment. Careful management of electric power from the consumers’ side is crucial on top of stable production, transmission, and distribution systems for reliable consumption. Electric power supply and consumption have been problematic in urban areas of Ethiopia, where frequent power interruptions come from overloaded transmission and distribution systems. In this paper, we proposed a focused Demand Side Management approach for improving reliable consumption in Addis Ababa. We used data analytics and machine learning (K-mean and long and short-term memory) approaches to understand the data, identify potential customers, and predict the aggregate substation load. We identified intermediate and supper-peak demand hours and potential customers for price-based demand load shifting management. Further, the analysis shows that an increase in electric prices at peak hours causes a reduction in electric demand. Consequently, it reduces distribution load and improves reliability.","PeriodicalId":159508,"journal":{"name":"2022 19th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117247716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 19th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1