首页 > 最新文献

Proceedings of the 3rd International Conference on Advanced Information Science and System最新文献

英文 中文
A Robust Multi-Sphere SVC Algorithm Based on Parameter Estimation 一种基于参数估计的鲁棒多球SVC算法
Kexin Jia, Yuxia Xin, Ting Cheng
To improve the robustness to noise, outliers and arbitrary cluster boundaries, a robust multi-sphere support vector clustering (SVC) algorithm is proposed in this paper. The proposed algorithm can automatically estimate a suitable kernel parameter, and determine the cluster number. The Gaussian kernel parameter is firstly estimated through a kernel parameter estimation algorithm which is based on support vector domain description (SVDD) and original local variance (LV) algorithm. Based on the estimated kernel parameter, the SVC algorithm classifies the given data points into different clusters and then the SVDD algorithm is performed several times for each cluster. At last, the membership is computed and the final clustering result is obtained based on these computed memberships. Several simulations verify the effectiveness of the proposed algorithm.
为了提高对噪声、离群点和任意聚类边界的鲁棒性,提出了一种鲁棒的多球支持向量聚类算法。该算法可以自动估计合适的核参数,并确定聚类数。首先通过基于支持向量域描述(SVDD)和原始局部方差(LV)算法的核参数估计算法估计高斯核参数;基于估计的核参数,SVC算法将给定的数据点分类到不同的聚类中,然后对每个聚类执行多次SVDD算法。最后,计算隶属度,并根据这些隶属度得到最终的聚类结果。仿真结果验证了该算法的有效性。
{"title":"A Robust Multi-Sphere SVC Algorithm Based on Parameter Estimation","authors":"Kexin Jia, Yuxia Xin, Ting Cheng","doi":"10.1145/3503047.3503112","DOIUrl":"https://doi.org/10.1145/3503047.3503112","url":null,"abstract":"To improve the robustness to noise, outliers and arbitrary cluster boundaries, a robust multi-sphere support vector clustering (SVC) algorithm is proposed in this paper. The proposed algorithm can automatically estimate a suitable kernel parameter, and determine the cluster number. The Gaussian kernel parameter is firstly estimated through a kernel parameter estimation algorithm which is based on support vector domain description (SVDD) and original local variance (LV) algorithm. Based on the estimated kernel parameter, the SVC algorithm classifies the given data points into different clusters and then the SVDD algorithm is performed several times for each cluster. At last, the membership is computed and the final clustering result is obtained based on these computed memberships. Several simulations verify the effectiveness of the proposed algorithm.","PeriodicalId":190604,"journal":{"name":"Proceedings of the 3rd International Conference on Advanced Information Science and System","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124895476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Tibetan-Chinese Neural Machine Translation Integrating Syntactic Information 集成句法信息的藏汉神经机器翻译研究
Maoxian Zhou, Secha Jia, Rangjia Cai
In recent years, Neural Networks have gradually replaced other methods in the field of Machine Translation and become the mainstream which have excellent performance in many languages. However, the performance of Neural Machine Translation mainly relies on large-scale parallel corpora, which is not ideal for low-resource languages, especially Tibetan-Chinese Machine Translation. In order to obtain the best translation performance with more external information on the basis of limited corpus, this paper introduces syntactic information, that is, adding part-of-speech(POS) tags as input features in the training process. Experiments verify the effectiveness of this method, which can improve the translation performance to a certain extent.
近年来,神经网络在机器翻译领域逐渐取代了其他方法,并在许多语言中表现优异,成为主流。然而,神经网络机器翻译的性能主要依赖于大规模的平行语料库,这对于低资源语言,特别是藏汉机器翻译来说并不理想。为了在有限语料库的基础上获得更多外部信息的最佳翻译性能,本文引入了句法信息,即在训练过程中加入词性标签作为输入特征。实验验证了该方法的有效性,可以在一定程度上提高翻译性能。
{"title":"Research on Tibetan-Chinese Neural Machine Translation Integrating Syntactic Information","authors":"Maoxian Zhou, Secha Jia, Rangjia Cai","doi":"10.1145/3503047.3503120","DOIUrl":"https://doi.org/10.1145/3503047.3503120","url":null,"abstract":"In recent years, Neural Networks have gradually replaced other methods in the field of Machine Translation and become the mainstream which have excellent performance in many languages. However, the performance of Neural Machine Translation mainly relies on large-scale parallel corpora, which is not ideal for low-resource languages, especially Tibetan-Chinese Machine Translation. In order to obtain the best translation performance with more external information on the basis of limited corpus, this paper introduces syntactic information, that is, adding part-of-speech(POS) tags as input features in the training process. Experiments verify the effectiveness of this method, which can improve the translation performance to a certain extent.","PeriodicalId":190604,"journal":{"name":"Proceedings of the 3rd International Conference on Advanced Information Science and System","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129148651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Framework of Darknet Forensics 暗网取证框架
Tao Leng, Aimin Yu
The dark web market is full of illegal and criminal activities such as the sale of sensitive personal information, guns, drugs, and terrorist videos. Cybercriminals use The Onion Router(TOR) browser to enter the dark web for information publishing and trading. Because the onion router browser provides privacy protection and anonymity, it is widely used. This privacy protection mode has brought great challenges to network investigators. This article aims to detect the use of the latest Tor browser, compare and analyze the evidence information contained in the registry, memory images, hard disk files, and network data packets through forensic experiments. At the same time, it compares and analyzes the different access modes of the Tor browser, and collects and uses Tor browsing. Evidence of cybercrime committed by a device is helpful to the development of electronic data forensics analysis.
暗网市场充斥着出售敏感个人信息、枪支、毒品、恐怖视频等非法犯罪活动。网络犯罪分子利用洋葱路由器(TOR)浏览器进入暗网进行信息发布和交易。由于洋葱路由器浏览器提供了隐私保护和匿名性,因此被广泛使用。这种隐私保护模式给网络调查员带来了极大的挑战。本文旨在检测最新Tor浏览器的使用情况,通过取证实验对注册表、内存映像、硬盘文件、网络数据包中包含的证据信息进行对比分析。同时对Tor浏览器的不同访问方式进行了比较和分析,并对Tor浏览进行了收集和使用。通过设备实施的网络犯罪证据有助于电子数据取证分析的发展。
{"title":"A Framework of Darknet Forensics","authors":"Tao Leng, Aimin Yu","doi":"10.1145/3503047.3503082","DOIUrl":"https://doi.org/10.1145/3503047.3503082","url":null,"abstract":"The dark web market is full of illegal and criminal activities such as the sale of sensitive personal information, guns, drugs, and terrorist videos. Cybercriminals use The Onion Router(TOR) browser to enter the dark web for information publishing and trading. Because the onion router browser provides privacy protection and anonymity, it is widely used. This privacy protection mode has brought great challenges to network investigators. This article aims to detect the use of the latest Tor browser, compare and analyze the evidence information contained in the registry, memory images, hard disk files, and network data packets through forensic experiments. At the same time, it compares and analyzes the different access modes of the Tor browser, and collects and uses Tor browsing. Evidence of cybercrime committed by a device is helpful to the development of electronic data forensics analysis.","PeriodicalId":190604,"journal":{"name":"Proceedings of the 3rd International Conference on Advanced Information Science and System","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127904046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research on the Optimal Methods for Graph Edit Distance 图编辑距离优化方法研究
Xuan Wang, Ziyang Chen
Graph edit distance is an important way to measure the similarity of pairwise graphs and has been widely used to bioinformatics, chemistry, social networks, etc. However, the expensive computation of graph edit distance poses serious algorithmic challenges. One of recent methodologies to obtain graph edit distance is to search the vertex mapping. In existing methods, A-Star heuristic search and pruning are used to improve the performance, but they still suffer huge temporal-spatial consumption and loose lower bound. In this paper, based on the heuristic A-Star search methods, three optimal methods are proposed to improve the mapping search strategy. First, a pruning strategy based on Symmertry-Breaking is proposed which defines the concept of mapping-equivalence, and prunes before the equivalence mappings are extended. Second, a pruning strategy based on upper bound is proposed to filter invalid mappings in the priority queue to speed up the search time, which uses Hungarial algorithm to obtain the upper bound. Third, the dequeued order is specified for the mappings in the priority queue with the same lower bound of the edit cost. Experiments on real datasets show that our methods have significant temporal-spatial optimal results
图编辑距离是衡量两两图相似度的一种重要方法,已广泛应用于生物信息学、化学、社交网络等领域。然而,图形编辑距离的计算量很大,给算法带来了严峻的挑战。获取图编辑距离的最新方法之一是搜索顶点映射。在现有的方法中,采用A-Star启发式搜索和剪枝来提高性能,但它们仍然存在巨大的时空消耗和松散的下界。本文在启发式A-Star搜索方法的基础上,提出了三种优化方法来改进映射搜索策略。首先,提出了一种基于对称破缺的剪枝策略,该策略定义了映射-等价的概念,并在等价映射扩展之前进行剪枝。其次,提出了一种基于上界的剪枝策略来过滤优先级队列中的无效映射,以加快搜索速度,该策略使用匈牙利算法获得上界;第三,为具有相同编辑开销下界的优先级队列中的映射指定出队列顺序。在实际数据集上的实验表明,我们的方法具有明显的时空优化效果
{"title":"Research on the Optimal Methods for Graph Edit Distance","authors":"Xuan Wang, Ziyang Chen","doi":"10.1145/3503047.3503062","DOIUrl":"https://doi.org/10.1145/3503047.3503062","url":null,"abstract":"Graph edit distance is an important way to measure the similarity of pairwise graphs and has been widely used to bioinformatics, chemistry, social networks, etc. However, the expensive computation of graph edit distance poses serious algorithmic challenges. One of recent methodologies to obtain graph edit distance is to search the vertex mapping. In existing methods, A-Star heuristic search and pruning are used to improve the performance, but they still suffer huge temporal-spatial consumption and loose lower bound. In this paper, based on the heuristic A-Star search methods, three optimal methods are proposed to improve the mapping search strategy. First, a pruning strategy based on Symmertry-Breaking is proposed which defines the concept of mapping-equivalence, and prunes before the equivalence mappings are extended. Second, a pruning strategy based on upper bound is proposed to filter invalid mappings in the priority queue to speed up the search time, which uses Hungarial algorithm to obtain the upper bound. Third, the dequeued order is specified for the mappings in the priority queue with the same lower bound of the edit cost. Experiments on real datasets show that our methods have significant temporal-spatial optimal results","PeriodicalId":190604,"journal":{"name":"Proceedings of the 3rd International Conference on Advanced Information Science and System","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121104694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel WiFi Gesture Recognition Method Based on CNN-LSTM and Channel Attention 一种基于CNN-LSTM和信道关注的WiFi手势识别方法
Yu Gu, Jiang Li
With the rapid development of wireless sensing, intelligent human-computer interaction, and other fields, gesture recognition based on WiFi has become an important research field. Gesture recognition based on WiFi has the advantages of non-contact and privacy protection. In addition, the use of home WiFi makes the technology have a broad application scenario. At present, most gesture recognition models based on WiFi can only achieve good results in a specific domain. When changing the environment or the orientation of gesture action, the performance of the model becomes very poor. This paper proposes a gesture recognition system based on the channel attention mechanism and CNN-LSTM fusion model. On the one hand, the channel attention mechanism can consider the importance of different channel characteristics; On the other hand, the CNN-LSTM fusion model can extract richer features in the time domain and space domain. The system has achieved good classification results in multiple domains of the public data set widar3.0.
随着无线传感、智能人机交互等领域的快速发展,基于WiFi的手势识别已成为一个重要的研究领域。基于WiFi的手势识别具有非接触和隐私保护的优点。此外,家庭WiFi的使用使得该技术具有广泛的应用场景。目前,大多数基于WiFi的手势识别模型只能在特定领域取得较好的效果。当改变环境或手势动作的方向时,模型的性能会变得很差。本文提出了一种基于信道注意机制和CNN-LSTM融合模型的手势识别系统。渠道注意机制一方面可以考虑不同渠道特征的重要性;另一方面,CNN-LSTM融合模型可以在时间域和空间域提取更丰富的特征。该系统在公共数据集widar3.0的多个领域中取得了较好的分类效果。
{"title":"A Novel WiFi Gesture Recognition Method Based on CNN-LSTM and Channel Attention","authors":"Yu Gu, Jiang Li","doi":"10.1145/3503047.3503148","DOIUrl":"https://doi.org/10.1145/3503047.3503148","url":null,"abstract":"With the rapid development of wireless sensing, intelligent human-computer interaction, and other fields, gesture recognition based on WiFi has become an important research field. Gesture recognition based on WiFi has the advantages of non-contact and privacy protection. In addition, the use of home WiFi makes the technology have a broad application scenario. At present, most gesture recognition models based on WiFi can only achieve good results in a specific domain. When changing the environment or the orientation of gesture action, the performance of the model becomes very poor. This paper proposes a gesture recognition system based on the channel attention mechanism and CNN-LSTM fusion model. On the one hand, the channel attention mechanism can consider the importance of different channel characteristics; On the other hand, the CNN-LSTM fusion model can extract richer features in the time domain and space domain. The system has achieved good classification results in multiple domains of the public data set widar3.0.","PeriodicalId":190604,"journal":{"name":"Proceedings of the 3rd International Conference on Advanced Information Science and System","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127334456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
SAR-GPA: SAR Generation Perturbation Algorithm SAR- gpa: SAR生成摄动算法
Zhe Liu, Weijie Xia, Yongzhen Lei
The deep learning is widely used in optical image and synthetic aperture radar (SAR) image. Current academic research shows that adversarial perturbation can effectively attack the deep learning network in optical image. However, in SAR image target recognition network, the existence of universal perturbations and generation approach needs to be further explored. Here, this article firstly proposes a systematic SAR generation perturbation algorithm (SAR-GPA) for target recognition network. The modulation phase sequences of the jamming points can vary casually by using the state-of-the-art electromagnetic metasurface technology. Therefore, when it acts on the SAR deceptive jamming system, it can produce artificial controllable perturbations. First, we take the imperceptible perturbations from universal adversarial perturbations (UAP) as reference to construct a unconstrained minimum optimization problem to find the specific sequences. Then, we solve this issue by adaptive moment estimation (Adam) optimizer.Thus, the SAR adversarial examples can be quickly and flexibly generated through our system. Finally, We design a series of simulation and experiment to verify the effectiveness of the adversarial examples and also the modulation sequences. According to the results, different from the traditional SAR blanket jamming methods, our approach can quickly generate imperceptible jamming, which can effectively attack three classical recognition models.
深度学习在光学图像和合成孔径雷达(SAR)图像中得到了广泛的应用。目前的学术研究表明,对抗性摄动可以有效地攻击光学图像中的深度学习网络。然而,在SAR图像目标识别网络中,普遍摄动的存在及其生成方法有待进一步探讨。本文首先针对目标识别网络提出了一种系统SAR生成摄动算法(SAR- gpa)。利用最先进的电磁超表面技术,干扰点的调制相序可以随意变化。因此,当它作用于SAR欺骗干扰系统时,可以产生人为可控扰动。首先,以通用对抗扰动(UAP)中的不可察觉扰动为参考,构造无约束最小优化问题来寻找特定序列。然后,我们采用自适应矩估计(Adam)优化器来解决这个问题。因此,通过我们的系统可以快速灵活地生成SAR对抗样例。最后,我们设计了一系列的仿真和实验来验证对抗样例和调制序列的有效性。结果表明,与传统的地毯式干扰方法不同,该方法能快速产生难以察觉的干扰,并能有效地攻击三种经典识别模型。
{"title":"SAR-GPA: SAR Generation Perturbation Algorithm","authors":"Zhe Liu, Weijie Xia, Yongzhen Lei","doi":"10.1145/3503047.3503136","DOIUrl":"https://doi.org/10.1145/3503047.3503136","url":null,"abstract":"The deep learning is widely used in optical image and synthetic aperture radar (SAR) image. Current academic research shows that adversarial perturbation can effectively attack the deep learning network in optical image. However, in SAR image target recognition network, the existence of universal perturbations and generation approach needs to be further explored. Here, this article firstly proposes a systematic SAR generation perturbation algorithm (SAR-GPA) for target recognition network. The modulation phase sequences of the jamming points can vary casually by using the state-of-the-art electromagnetic metasurface technology. Therefore, when it acts on the SAR deceptive jamming system, it can produce artificial controllable perturbations. First, we take the imperceptible perturbations from universal adversarial perturbations (UAP) as reference to construct a unconstrained minimum optimization problem to find the specific sequences. Then, we solve this issue by adaptive moment estimation (Adam) optimizer.Thus, the SAR adversarial examples can be quickly and flexibly generated through our system. Finally, We design a series of simulation and experiment to verify the effectiveness of the adversarial examples and also the modulation sequences. According to the results, different from the traditional SAR blanket jamming methods, our approach can quickly generate imperceptible jamming, which can effectively attack three classical recognition models.","PeriodicalId":190604,"journal":{"name":"Proceedings of the 3rd International Conference on Advanced Information Science and System","volume":"61 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133719307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Target detection of remote sensing images based on deep learning method and system 基于深度学习的遥感图像目标检测方法与系统
Su-jun Wang, Y. Ping, Gang Chen, Li Yang, Wei Wen, Changzhi Xu, Ying-zhao Shao
Abstract: With the rapid growth of remote sensing image data, it is very important to find a way to extract and recognize the target quickly and accurately from the massive remote sensing data. In recent years, the development of deep learning has provided an effective way for target detection of remote sensing images. This paper applies deep learning technology to target detection of remote sensing images, and constructs a target detection system software which integrates sample labeling, data set construction, pretreatment of training sample, training algorithm, migration learning, target recognition and post processing. It provides technical support to the tasks of classification, information extraction and change detection of remote sensing image. The experimental results show that the target recognition system of remote sensing images has high precision in the scene classification and specific target detection of high-resolution remote sensing images.
摘要:随着遥感图像数据的快速增长,如何从海量遥感数据中快速准确地提取和识别目标显得尤为重要。近年来,深度学习的发展为遥感图像的目标检测提供了有效途径。本文将深度学习技术应用于遥感图像的目标检测,构建了集样本标注、数据集构建、训练样本预处理、训练算法、迁移学习、目标识别和后处理为一体的目标检测系统软件。它为遥感图像的分类、信息提取和变化检测等任务提供了技术支持。实验结果表明,该遥感图像目标识别系统在高分辨率遥感图像的场景分类和特定目标检测方面具有较高的精度。
{"title":"Target detection of remote sensing images based on deep learning method and system","authors":"Su-jun Wang, Y. Ping, Gang Chen, Li Yang, Wei Wen, Changzhi Xu, Ying-zhao Shao","doi":"10.1145/3503047.3503116","DOIUrl":"https://doi.org/10.1145/3503047.3503116","url":null,"abstract":"Abstract: With the rapid growth of remote sensing image data, it is very important to find a way to extract and recognize the target quickly and accurately from the massive remote sensing data. In recent years, the development of deep learning has provided an effective way for target detection of remote sensing images. This paper applies deep learning technology to target detection of remote sensing images, and constructs a target detection system software which integrates sample labeling, data set construction, pretreatment of training sample, training algorithm, migration learning, target recognition and post processing. It provides technical support to the tasks of classification, information extraction and change detection of remote sensing image. The experimental results show that the target recognition system of remote sensing images has high precision in the scene classification and specific target detection of high-resolution remote sensing images.","PeriodicalId":190604,"journal":{"name":"Proceedings of the 3rd International Conference on Advanced Information Science and System","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124457312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
UAV-enabled Edge Computing for Virtual Reality 支持无人机的虚拟现实边缘计算
Shengjie Ding, Juan Liu, Lingfu Xie
5G communication promotes the development of VR (Virtual Reality) applications, providing users with immersive experiences. To accomplish VR tasks with large computation and low delay demands, an unmanned aerial vehicle (UAV)-enabled MEC (Mobile Edge Computing) method is proposed to assist VR devices in the rendering process. Under the constraints imposed by the VR characteristics and the device energy, the UAV flight trajectory and the VR rendering mode are jointly optimized to maximize the rendering completion rate of the VR tasks. This problem is modeled as a Markov decision process. To find the optimal policy, a UAV aided rendering algorithm is proposed in the framework of deep reinforcement learning. Specifically, the TD3 (Twin Delayed Deep Deterministic Policy Gradient) algorithm is applied to schedule the UAV trajectory and VR rendering mode to meet the requirements of the randomly arriving VR tasks as much as possible. Simulation results show that the proposed method outperforms baseline strategies in both the rendering completion rate and the convergence speed.
5G通信推动VR (Virtual Reality)应用的发展,为用户提供身临其境的体验。为了完成计算量大、延迟要求低的VR任务,提出了一种支持无人机(UAV)的MEC (Mobile Edge Computing)方法来辅助VR设备进行渲染过程。在虚拟现实特性和设备能量约束下,联合优化无人机飞行轨迹和虚拟现实渲染模式,使虚拟现实任务的渲染完成率最大化。这个问题被建模为一个马尔可夫决策过程。为了找到最优策略,提出了一种基于深度强化学习框架的无人机辅助绘制算法。具体而言,采用TD3 (Twin Delayed Deep Deterministic Policy Gradient,双延迟深度确定性策略梯度)算法对无人机轨迹和VR渲染模式进行调度,以尽可能满足随机到达的VR任务的要求。仿真结果表明,该方法在绘制完成率和收敛速度上都优于基线策略。
{"title":"UAV-enabled Edge Computing for Virtual Reality","authors":"Shengjie Ding, Juan Liu, Lingfu Xie","doi":"10.1145/3503047.3503128","DOIUrl":"https://doi.org/10.1145/3503047.3503128","url":null,"abstract":"5G communication promotes the development of VR (Virtual Reality) applications, providing users with immersive experiences. To accomplish VR tasks with large computation and low delay demands, an unmanned aerial vehicle (UAV)-enabled MEC (Mobile Edge Computing) method is proposed to assist VR devices in the rendering process. Under the constraints imposed by the VR characteristics and the device energy, the UAV flight trajectory and the VR rendering mode are jointly optimized to maximize the rendering completion rate of the VR tasks. This problem is modeled as a Markov decision process. To find the optimal policy, a UAV aided rendering algorithm is proposed in the framework of deep reinforcement learning. Specifically, the TD3 (Twin Delayed Deep Deterministic Policy Gradient) algorithm is applied to schedule the UAV trajectory and VR rendering mode to meet the requirements of the randomly arriving VR tasks as much as possible. Simulation results show that the proposed method outperforms baseline strategies in both the rendering completion rate and the convergence speed.","PeriodicalId":190604,"journal":{"name":"Proceedings of the 3rd International Conference on Advanced Information Science and System","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116117618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Life Expectancy Estimation based on Machine Learning and Structured Predictors 基于机器学习和结构化预测器的预期寿命估计
Khulood Faisal, Dareen Alomari, Hind Alasmari, H. Alghamdi, Kawther A. Saeedi
ACM Reference Format: Khulood, K.K.F, Faisal, Dareen, D.J.A, Alomari, Hind, H.M.A, Alasmari, Hanan, H.S.A, Alghamdi, and Kawther, K.A.S, Saeedi. 2021. Life Expectancy Estimation based on Machine Learning and Structured Predictors. In 2021 3rd International Conference on Advanced Information Science and System (AISS 2021) (AISS 2021), November 26–28, 2021, Sanya, China. ACM, New York, NY, USA, 8 pages. https://doi.org/10.1145/3503047.3503122
ACM参考格式:Khulood, K.K.F, Faisal, Dareen, D.J.A, Alomari, Hind, H.M.A, Alasmari, Hanan, H.S.A, Alghamdi和kather, K.A.S, Saeedi。2021。基于机器学习和结构化预测器的预期寿命估计。2021第三届先进信息科学与系统国际会议(AISS 2021) (AISS 2021), 2021年11月26-28日,中国三亚。ACM,纽约,美国,8页。https://doi.org/10.1145/3503047.3503122
{"title":"Life Expectancy Estimation based on Machine Learning and Structured Predictors","authors":"Khulood Faisal, Dareen Alomari, Hind Alasmari, H. Alghamdi, Kawther A. Saeedi","doi":"10.1145/3503047.3503122","DOIUrl":"https://doi.org/10.1145/3503047.3503122","url":null,"abstract":"ACM Reference Format: Khulood, K.K.F, Faisal, Dareen, D.J.A, Alomari, Hind, H.M.A, Alasmari, Hanan, H.S.A, Alghamdi, and Kawther, K.A.S, Saeedi. 2021. Life Expectancy Estimation based on Machine Learning and Structured Predictors. In 2021 3rd International Conference on Advanced Information Science and System (AISS 2021) (AISS 2021), November 26–28, 2021, Sanya, China. ACM, New York, NY, USA, 8 pages. https://doi.org/10.1145/3503047.3503122","PeriodicalId":190604,"journal":{"name":"Proceedings of the 3rd International Conference on Advanced Information Science and System","volume":"576 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116538968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Survey of Trust Management on Mission-oriented Internet of Things 任务型物联网信任管理研究
Youna Jung, Noah Goldsmith, John Barker
The Internet of Things (IoT) enables us to use diverse sensing data and control IoT devices, sometimes, networks remotely. This technology makes our lives easier and more comfortable. However, the services currently provided by IoT systems are limited within pre-defined sets of devices and it hinders the development of large-scale and complicated IoT services that could be provided through dynamic collaboration between IoT devices across networks. To realize the mission-oriented IoT (MIoT) systems, we must address the security issues of the MIoT systems. Among various security issues, in this paper, we focus on trust management on MIoT. We analyze existing work on trust management to see if they are suitable for the MIoT systems. Then, we identify potential issues and discuss challenges for the trust management on MIoT.
物联网(IoT)使我们能够使用各种传感数据并控制物联网设备,有时甚至远程控制网络。这项技术使我们的生活更轻松、更舒适。然而,目前物联网系统提供的服务仅限于预定义的设备集合,这阻碍了大规模和复杂的物联网服务的发展,这些服务可以通过跨网络的物联网设备之间的动态协作来提供。要实现面向任务的物联网系统,必须解决物联网系统的安全问题。在众多安全问题中,本文重点研究了物联网的信任管理问题。我们分析了现有的信任管理工作,看看它们是否适合于工业物联网系统。然后,我们确定了潜在的问题,并讨论了物联网信任管理面临的挑战。
{"title":"Survey of Trust Management on Mission-oriented Internet of Things","authors":"Youna Jung, Noah Goldsmith, John Barker","doi":"10.1145/3503047.3503076","DOIUrl":"https://doi.org/10.1145/3503047.3503076","url":null,"abstract":"The Internet of Things (IoT) enables us to use diverse sensing data and control IoT devices, sometimes, networks remotely. This technology makes our lives easier and more comfortable. However, the services currently provided by IoT systems are limited within pre-defined sets of devices and it hinders the development of large-scale and complicated IoT services that could be provided through dynamic collaboration between IoT devices across networks. To realize the mission-oriented IoT (MIoT) systems, we must address the security issues of the MIoT systems. Among various security issues, in this paper, we focus on trust management on MIoT. We analyze existing work on trust management to see if they are suitable for the MIoT systems. Then, we identify potential issues and discuss challenges for the trust management on MIoT.","PeriodicalId":190604,"journal":{"name":"Proceedings of the 3rd International Conference on Advanced Information Science and System","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116539012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the 3rd International Conference on Advanced Information Science and System
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1