In view of the bandwidth consumption caused by data stream transmission in video analysis system and the demand for accurate online real-time analysis of massive data, this paper proposes a deep learning model framework for face recognition employed in the embedded system. Through data collaboration, the cloud could build a more complex data set with a small amount of uploaded data gathered by the end devices. And the framework collaboration makes sure that the fully-trained cloud model directly download or distillate knowledge to the end devices. Experiments show that the deep model not only realizes the real-time response and the accurate response of the cloud system, but also greatly reduces the bandwidth consumption caused by sample data transmission in the model training process.
{"title":"Distributed Deep Learning System for Efficient Face Recognition in Surveillance System","authors":"Jinjin Liu, Zhifeng Chen, Xiaonan Li, Tongxin Wei","doi":"10.1145/3503047.3503130","DOIUrl":"https://doi.org/10.1145/3503047.3503130","url":null,"abstract":"In view of the bandwidth consumption caused by data stream transmission in video analysis system and the demand for accurate online real-time analysis of massive data, this paper proposes a deep learning model framework for face recognition employed in the embedded system. Through data collaboration, the cloud could build a more complex data set with a small amount of uploaded data gathered by the end devices. And the framework collaboration makes sure that the fully-trained cloud model directly download or distillate knowledge to the end devices. Experiments show that the deep model not only realizes the real-time response and the accurate response of the cloud system, but also greatly reduces the bandwidth consumption caused by sample data transmission in the model training process.","PeriodicalId":190604,"journal":{"name":"Proceedings of the 3rd International Conference on Advanced Information Science and System","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126662021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
To address the unsatisfactory recognition of distorted text in images with complicated background, a neural-network-based approach was proposed to detect and recognize text. For detection of distorted text, the improved CRAFT model was applied, and deformable convolution was introduced to replace conventional convolution to sufficiently extract the features with irregular background. On this basis, the CRAFT-DCN text detection model was proposed to improve the accuracy of text detection. In order to reduce the interference of distorted text on the recognition model, images of separated texts were tailored according to the coordinates obtained by the detection model. Meanwhile, the Dense-CRNN model was designed, and the dense convolutional layer was introduced in the text recognition model to enhance the reuse of the features, thereby reducing interference of complicated background and recognizing separated distorted text correctly. The experiment results show that, compared with traditional approaches, the improved method introduced in this paper has better detection and recognition rates. And specifically, its text detection accuracy and the text recognition accuracy in actual scenario reach 86.3% and 95.3% respectively.
{"title":"Neural-network-based Approach to Detect and Recognize Distorted Text in Images with Complicated Background","authors":"Yuanyuan Qu, Wenxue Wei, Jiajia Jiang, Yufeng Liang","doi":"10.1145/3503047.3503118","DOIUrl":"https://doi.org/10.1145/3503047.3503118","url":null,"abstract":"To address the unsatisfactory recognition of distorted text in images with complicated background, a neural-network-based approach was proposed to detect and recognize text. For detection of distorted text, the improved CRAFT model was applied, and deformable convolution was introduced to replace conventional convolution to sufficiently extract the features with irregular background. On this basis, the CRAFT-DCN text detection model was proposed to improve the accuracy of text detection. In order to reduce the interference of distorted text on the recognition model, images of separated texts were tailored according to the coordinates obtained by the detection model. Meanwhile, the Dense-CRNN model was designed, and the dense convolutional layer was introduced in the text recognition model to enhance the reuse of the features, thereby reducing interference of complicated background and recognizing separated distorted text correctly. The experiment results show that, compared with traditional approaches, the improved method introduced in this paper has better detection and recognition rates. And specifically, its text detection accuracy and the text recognition accuracy in actual scenario reach 86.3% and 95.3% respectively.","PeriodicalId":190604,"journal":{"name":"Proceedings of the 3rd International Conference on Advanced Information Science and System","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130050530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the popularization of higher education in my country and the number of college students increasing year by year, the number of students in colleges and universities that need to be subsidized is also increasing day by day. At present, colleges and universities mostly use offline material collection and manual operation. Not only the workload and the amount of tasks are heavy, but also the current situation of irregular funding management is prone to cause unnecessary troubles to the funding work. There is an urgent need to establish a complete management system for student assistance. This paper presents a design method for the information management system of the financial aid for poor students in colleges and universities based on the Web platform. This method is based on the construction of campus network and adds data analysis modules to realize an efficient informatization management of university funding work.
{"title":"Method design based on the national scholarship system","authors":"D. Shi, Jun-Xian Ji","doi":"10.1145/3503047.3503137","DOIUrl":"https://doi.org/10.1145/3503047.3503137","url":null,"abstract":"With the popularization of higher education in my country and the number of college students increasing year by year, the number of students in colleges and universities that need to be subsidized is also increasing day by day. At present, colleges and universities mostly use offline material collection and manual operation. Not only the workload and the amount of tasks are heavy, but also the current situation of irregular funding management is prone to cause unnecessary troubles to the funding work. There is an urgent need to establish a complete management system for student assistance. This paper presents a design method for the information management system of the financial aid for poor students in colleges and universities based on the Web platform. This method is based on the construction of campus network and adds data analysis modules to realize an efficient informatization management of university funding work.","PeriodicalId":190604,"journal":{"name":"Proceedings of the 3rd International Conference on Advanced Information Science and System","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134352091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
∗An anonymous communication system is an overlay network that hides the address of the destination server through multiple relay routing communications. As communication entities are difficult to track and locate, a large number of harmful social security activities such as leakage of personal information, drug dealings, and terrorist activities have occurred. Traffic recognition technology can locate illegal activities from anonymous user communications and help law enforcement agencies investigate criminal activities on the darknet. Currently, the existing research mainly focuses on traditional traffic classification, encrypted traffic analysis, and tor traffic identification, but there is a lack of comprehensive research and investigation on darknet traffic identification. This paper summarizes darknet traffic classification methods based on deep learning and machine learning, reviews common public data sets, and discusses open problems and challenges in this field.
{"title":"A Survey on Anonymous Communication Systems Traffic Identification and Classification","authors":"Ruonan Wang, Yuefeng Zhao","doi":"10.1145/3503047.3503087","DOIUrl":"https://doi.org/10.1145/3503047.3503087","url":null,"abstract":"∗An anonymous communication system is an overlay network that hides the address of the destination server through multiple relay routing communications. As communication entities are difficult to track and locate, a large number of harmful social security activities such as leakage of personal information, drug dealings, and terrorist activities have occurred. Traffic recognition technology can locate illegal activities from anonymous user communications and help law enforcement agencies investigate criminal activities on the darknet. Currently, the existing research mainly focuses on traditional traffic classification, encrypted traffic analysis, and tor traffic identification, but there is a lack of comprehensive research and investigation on darknet traffic identification. This paper summarizes darknet traffic classification methods based on deep learning and machine learning, reviews common public data sets, and discusses open problems and challenges in this field.","PeriodicalId":190604,"journal":{"name":"Proceedings of the 3rd International Conference on Advanced Information Science and System","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129062578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Modeling the process of information dissemination in online social networks is an important task that helps understand the information diffusion mechanism and analyze the influencing factors. However, most of the existing models focus on the diffusion process of general information, rumors or public sentiments, instead of concerning specific information such as sports news. In this paper, we analyze the diffusion characteristics of sports news in Sina-Weibo. An information dissemination model for sports news is constructed based on the SEIR epidemic model, and the node transition probabilities are set dynamically according to three information factors and user interest attenuation. The experimental results show that the proposed model accurately reflects the dissemination mechanism of sports news. Among four influencing factors, the information value and the published time obviously affect the speed and the range of the diffusion process.
{"title":"Modeling of Sports News Information Dissemination in Social Networks","authors":"Yujia Fu, Jingling Wang","doi":"10.1145/3503047.3503065","DOIUrl":"https://doi.org/10.1145/3503047.3503065","url":null,"abstract":"Modeling the process of information dissemination in online social networks is an important task that helps understand the information diffusion mechanism and analyze the influencing factors. However, most of the existing models focus on the diffusion process of general information, rumors or public sentiments, instead of concerning specific information such as sports news. In this paper, we analyze the diffusion characteristics of sports news in Sina-Weibo. An information dissemination model for sports news is constructed based on the SEIR epidemic model, and the node transition probabilities are set dynamically according to three information factors and user interest attenuation. The experimental results show that the proposed model accurately reflects the dissemination mechanism of sports news. Among four influencing factors, the information value and the published time obviously affect the speed and the range of the diffusion process.","PeriodicalId":190604,"journal":{"name":"Proceedings of the 3rd International Conference on Advanced Information Science and System","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134478422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The concept of architecture is put forward by the US Army, which refers to the composition structure of the system and its mutual relationship, as well as the principles and guidelines guiding the design and development of the system. Architecture design technology and its reference resources have important theoretical and technical support for the top-level design of information system. Based on the analysis of architecture technology and function, this paper systematically studies the connotation and development history of the architecture design framework of the US army, and sorts out the main reference resources of the architecture design of the US army, such as the common joint task list, information system interoperability level model, joint technology architecture. It provides useful reference for the theoretical and technical research of information system top-level design.
{"title":"Research on the information System architecture design framework and reference resources of American Army","authors":"Ping Jian","doi":"10.1145/3503047.3503094","DOIUrl":"https://doi.org/10.1145/3503047.3503094","url":null,"abstract":"The concept of architecture is put forward by the US Army, which refers to the composition structure of the system and its mutual relationship, as well as the principles and guidelines guiding the design and development of the system. Architecture design technology and its reference resources have important theoretical and technical support for the top-level design of information system. Based on the analysis of architecture technology and function, this paper systematically studies the connotation and development history of the architecture design framework of the US army, and sorts out the main reference resources of the architecture design of the US army, such as the common joint task list, information system interoperability level model, joint technology architecture. It provides useful reference for the theoretical and technical research of information system top-level design.","PeriodicalId":190604,"journal":{"name":"Proceedings of the 3rd International Conference on Advanced Information Science and System","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114581831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aiming at the problem that it is difficult to recognize the working mode of multi-functional radar without prior information, this paper proposes a radar working mode recognition method based on complex network analysis. Use the simulated reconnaissance data of the same type of radar to build a complex network, by analyzing the importance of network nodes, the radar phrases in search and non-search working modes are recognized. And Gephi is used as a visualization platform to show the regular features of radar phrases in different working modes. On this basis, the functional state of the radar system is analyzed by calculating the network density of the complex network.
{"title":"Radar Working Mode Recognition Method Based on Complex Network Analysis","authors":"Liu Yang, Yan-Lou He, Shouye Lv, Jianfeng Ma","doi":"10.1145/3503047.3503051","DOIUrl":"https://doi.org/10.1145/3503047.3503051","url":null,"abstract":"Aiming at the problem that it is difficult to recognize the working mode of multi-functional radar without prior information, this paper proposes a radar working mode recognition method based on complex network analysis. Use the simulated reconnaissance data of the same type of radar to build a complex network, by analyzing the importance of network nodes, the radar phrases in search and non-search working modes are recognized. And Gephi is used as a visualization platform to show the regular features of radar phrases in different working modes. On this basis, the functional state of the radar system is analyzed by calculating the network density of the complex network.","PeriodicalId":190604,"journal":{"name":"Proceedings of the 3rd International Conference on Advanced Information Science and System","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114250066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The shortest linear program has been proved to be a NP-hard problem. In order to obtain the better approximate solution, a frequency-first heuristic method is proposed, which can optimize the number of XOR gates required by linear components while ensuring the stability of the algorithm. Firstly, we combine the pre-emptive gate strategy with frequency-first (FQCY) in the selection stage to reduce the increase of time complexity caused by exhaustive search, so that the high-density matrix can obtain the optimal result within a reasonable time. Secondly, minimization of vector and appropriate randomization are added to deal with the tie, so as to give full play to the advantages of cancellation-allowed circuit and increase the possibility of obtaining the optimal solution. Finally, compared with Paar, BP, RNBP, RSDF algorithms on random matrices of various sizes and densities, it is proved that the probability of obtaining the optimal solution of the proposed algorithm in circuit depth is more than 30% higher than RNBP and RSDF. In terms of the number of XOR gates, especially for larger matrix, the probability of obtaining the optimal solution increases by more than 10%. The stability of the optimal circuit generated by this algorithm is about 90%.
{"title":"A Frequency-first Heuristic for Shortest Linear Programs","authors":"Hua Jiang, Heng Zhang, Huijiao Wang, Xin Wang","doi":"10.1145/3503047.3503069","DOIUrl":"https://doi.org/10.1145/3503047.3503069","url":null,"abstract":"The shortest linear program has been proved to be a NP-hard problem. In order to obtain the better approximate solution, a frequency-first heuristic method is proposed, which can optimize the number of XOR gates required by linear components while ensuring the stability of the algorithm. Firstly, we combine the pre-emptive gate strategy with frequency-first (FQCY) in the selection stage to reduce the increase of time complexity caused by exhaustive search, so that the high-density matrix can obtain the optimal result within a reasonable time. Secondly, minimization of vector and appropriate randomization are added to deal with the tie, so as to give full play to the advantages of cancellation-allowed circuit and increase the possibility of obtaining the optimal solution. Finally, compared with Paar, BP, RNBP, RSDF algorithms on random matrices of various sizes and densities, it is proved that the probability of obtaining the optimal solution of the proposed algorithm in circuit depth is more than 30% higher than RNBP and RSDF. In terms of the number of XOR gates, especially for larger matrix, the probability of obtaining the optimal solution increases by more than 10%. The stability of the optimal circuit generated by this algorithm is about 90%.","PeriodicalId":190604,"journal":{"name":"Proceedings of the 3rd International Conference on Advanced Information Science and System","volume":"287 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124571831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Malware classification is a major challenge as they have multiple families and its type has been ever increasing. With the involvement of deep learning and the availability of massive data, neural networks can easily address this problem. This experimental work focuses on classifying the malware that are in the form of grayscale images into their respective families with high accuracy and low loss. We used transfer learning in a pretrained VGG16 model obtaining an accuracy of 88.40% of accuracy. Additionally, upon experimenting with the ResNet-18, InceptionV3 model to classify the malware images into their families didn't give better results as compared to our custom model. The custom model based on convolution neural network achieved better accuracy and was able to classify malware with 98.7% validation accuracy. Upon comparing our custom model with VGG16, ResNet-18, InceptionV3 the custom model gave better accuracy with a better f1 score of 0.99. But improper tuning of VGG16 yielded low accuracy and high parameter loss. In overall the approach of classifying malware by converting them into images and classifying thus obtained images makes the malware classification problem easier.
{"title":"Image-based Malware Classification using Deep Convolutional Neural Network and Transfer Learning","authors":"Dipendra Pant, Rabindra Bista","doi":"10.1145/3503047.3503081","DOIUrl":"https://doi.org/10.1145/3503047.3503081","url":null,"abstract":"Malware classification is a major challenge as they have multiple families and its type has been ever increasing. With the involvement of deep learning and the availability of massive data, neural networks can easily address this problem. This experimental work focuses on classifying the malware that are in the form of grayscale images into their respective families with high accuracy and low loss. We used transfer learning in a pretrained VGG16 model obtaining an accuracy of 88.40% of accuracy. Additionally, upon experimenting with the ResNet-18, InceptionV3 model to classify the malware images into their families didn't give better results as compared to our custom model. The custom model based on convolution neural network achieved better accuracy and was able to classify malware with 98.7% validation accuracy. Upon comparing our custom model with VGG16, ResNet-18, InceptionV3 the custom model gave better accuracy with a better f1 score of 0.99. But improper tuning of VGG16 yielded low accuracy and high parameter loss. In overall the approach of classifying malware by converting them into images and classifying thus obtained images makes the malware classification problem easier.","PeriodicalId":190604,"journal":{"name":"Proceedings of the 3rd International Conference on Advanced Information Science and System","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125109689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Unmanned Aerial Vehicles (UAVs) have been attracting more and more attention in research and education. Specifically, Swarm intelligence is a promising future technology of UAVs and the frontier of multi-agent system research. It has the characteristics of low individual cost, strong system flexibility and robustness, and has great potential in many tasks. However, due to the constraints of research conditions and cost, most of the current researches on large-scale swarm UAVs are carried out in the simulation environment. Building a low-cost open-source software and hardware platform for swarm UAVs is an important basis for promoting researches on swarm UAVs and multi-agent systems. In this paper, we propose a design of a UAV platform with common cost-efficient hardware and a rich open-source software ecosystem, and provide a software solution for swarm robots based on the open-source robot operating system ROS. These software packages support the rapid programming development of swarm behaviors and different communication topology. Experiments have been conducted for typical UAV tasks like flocking and formation, indicating the effectiveness of the proposed platform.
{"title":"A Cost-Efficient Platform Design for Distributed UAV Swarm Research","authors":"Zhongxuan Cai, Xuefeng Chang, Minglong Li","doi":"10.1145/3503047.3503070","DOIUrl":"https://doi.org/10.1145/3503047.3503070","url":null,"abstract":"Unmanned Aerial Vehicles (UAVs) have been attracting more and more attention in research and education. Specifically, Swarm intelligence is a promising future technology of UAVs and the frontier of multi-agent system research. It has the characteristics of low individual cost, strong system flexibility and robustness, and has great potential in many tasks. However, due to the constraints of research conditions and cost, most of the current researches on large-scale swarm UAVs are carried out in the simulation environment. Building a low-cost open-source software and hardware platform for swarm UAVs is an important basis for promoting researches on swarm UAVs and multi-agent systems. In this paper, we propose a design of a UAV platform with common cost-efficient hardware and a rich open-source software ecosystem, and provide a software solution for swarm robots based on the open-source robot operating system ROS. These software packages support the rapid programming development of swarm behaviors and different communication topology. Experiments have been conducted for typical UAV tasks like flocking and formation, indicating the effectiveness of the proposed platform.","PeriodicalId":190604,"journal":{"name":"Proceedings of the 3rd International Conference on Advanced Information Science and System","volume":"219 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116383850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}