首页 > 最新文献

Proceedings of the 2020 6th International Conference on Computing and Artificial Intelligence最新文献

英文 中文
An Automatic Design of Camouflage Patterns Based on CNNs 基于cnn的伪装图案自动设计
Xinjian Wei, Kaidi Wang, Guangxu Li, Hyoungseop Kim
In order to get with the environmental changes of battlefield quickly, the military camouflage should be changeable. If the camouflage patterns of the clothes and vehicles like tanks are different from the environment, it's very easy for cameras of enemies to find. As we all know that the same patterns is used in the most of current military all over the world. In this paper, we propose a novel feature-extraction method from an image using convolutional neural networks. Then the pattern will be combined with the environmental style pattern. The composite image is mapped onto the surface of the actual 3D clothes and vehicles finally. In this paper, the Eye-Movement equipment is applied to evaluate the results for better comparison. We can produce the proper pattern even the different and complicated environment.
为了快速适应战场环境的变化,军用迷彩必须具有变异性。如果衣服和坦克等车辆的伪装图案与环境不同,敌人的摄像机就很容易发现。我们都知道,同样的模式被用于当今世界上大多数的军事。本文提出了一种基于卷积神经网络的图像特征提取方法。然后将图案与环境风格图案相结合。最后将合成图像映射到实际的3D服装和车辆表面。本文采用眼动仪对结果进行评价,以便更好地进行比较。即使在不同复杂的环境中,我们也能做出合适的图案。
{"title":"An Automatic Design of Camouflage Patterns Based on CNNs","authors":"Xinjian Wei, Kaidi Wang, Guangxu Li, Hyoungseop Kim","doi":"10.1145/3404555.3404637","DOIUrl":"https://doi.org/10.1145/3404555.3404637","url":null,"abstract":"In order to get with the environmental changes of battlefield quickly, the military camouflage should be changeable. If the camouflage patterns of the clothes and vehicles like tanks are different from the environment, it's very easy for cameras of enemies to find. As we all know that the same patterns is used in the most of current military all over the world. In this paper, we propose a novel feature-extraction method from an image using convolutional neural networks. Then the pattern will be combined with the environmental style pattern. The composite image is mapped onto the surface of the actual 3D clothes and vehicles finally. In this paper, the Eye-Movement equipment is applied to evaluate the results for better comparison. We can produce the proper pattern even the different and complicated environment.","PeriodicalId":220526,"journal":{"name":"Proceedings of the 2020 6th International Conference on Computing and Artificial Intelligence","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123223605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Self-Matching Moving Target Detection Algorithm Based On Gaussian Mixture Model And CSIFT 基于高斯混合模型和CSIFT的自匹配运动目标检测算法
Qiang Wu, Jiaxiang Zhao, Xin Zheng
With the development of unmanned aerial vehicle (UAV) technology, more and more unmanned aerial vehicles have entered various fields, including the aspect of moving target detection. Due to the characteristics of the drone, the captured video does not have a fixed background, which makes the traditional moving target detection algorithm unusable. Herein, this paper proposes a self-matching detection algorithm based on Gaussian mixture model and CSIFT. This algorithm is applied to unmanned On board, under the background of moving targets, the target can be identified when there is relative movement between the target and the background.
随着无人机技术的发展,越来越多的无人机进入了包括运动目标检测在内的各个领域。由于无人机的特点,捕获的视频没有固定的背景,这使得传统的运动目标检测算法无法使用。本文提出了一种基于高斯混合模型和CSIFT的自匹配检测算法。该算法应用于无人机载,在运动目标背景下,当目标与背景之间存在相对运动时,即可识别出目标。
{"title":"Self-Matching Moving Target Detection Algorithm Based On Gaussian Mixture Model And CSIFT","authors":"Qiang Wu, Jiaxiang Zhao, Xin Zheng","doi":"10.1145/3404555.3404648","DOIUrl":"https://doi.org/10.1145/3404555.3404648","url":null,"abstract":"With the development of unmanned aerial vehicle (UAV) technology, more and more unmanned aerial vehicles have entered various fields, including the aspect of moving target detection. Due to the characteristics of the drone, the captured video does not have a fixed background, which makes the traditional moving target detection algorithm unusable. Herein, this paper proposes a self-matching detection algorithm based on Gaussian mixture model and CSIFT. This algorithm is applied to unmanned On board, under the background of moving targets, the target can be identified when there is relative movement between the target and the background.","PeriodicalId":220526,"journal":{"name":"Proceedings of the 2020 6th International Conference on Computing and Artificial Intelligence","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124949733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Fingerprint Enhancement and Second-Order Markov Chain Based Malicious Encrypted Traffic Identification Scheme 基于指纹增强和二阶马尔可夫链的恶意加密流量识别方案
Daichong Chao
Malicious encrypted traffic poses great threat to cyber security owing to encryption and the ability to bypass traditional traffic detection schemes. Malicious encrypted traffic identification is a challenging task and has attracted researchers' attention nowadays. Existing research way mainly extracts various statistical features of data-flow, which relies artificial experience heavily. To round the above problem. a fingerprint enhancement and second-order Markov chain based scheme is proposed in this paper, obtaining features more easily. Fingerprint enhancement is done to replace SSL fingerprint by refining data-flow's behavior. Then enhanced fingerprint is fed to second-order Markov chain to obtain dominating feature for identification model. To our best knowledge, this paper is the first one focusing on using fingerprint and second order Markov chain to simplify feature extraction. Finally, the proposed scheme is verified based on public dataset Stratosphere IPS.
恶意加密流量由于其加密特性和绕过传统流量检测方案的能力,对网络安全构成极大威胁。恶意加密流量识别是一项具有挑战性的研究课题,近年来一直受到研究人员的关注。现有的研究方法主要是提取数据流的各种统计特征,严重依赖人工经验。将上述问题四舍五入。本文提出了一种基于二阶马尔可夫链的指纹增强方案,该方案更容易获得指纹特征。指纹增强是通过改进数据流的行为来取代SSL指纹。然后将增强指纹送入二阶马尔可夫链,得到识别模型的主导特征。据我们所知,本文是第一个关注使用指纹和二阶马尔可夫链来简化特征提取的论文。最后,基于公共数据集Stratosphere IPS对该方案进行了验证。
{"title":"A Fingerprint Enhancement and Second-Order Markov Chain Based Malicious Encrypted Traffic Identification Scheme","authors":"Daichong Chao","doi":"10.1145/3404555.3404590","DOIUrl":"https://doi.org/10.1145/3404555.3404590","url":null,"abstract":"Malicious encrypted traffic poses great threat to cyber security owing to encryption and the ability to bypass traditional traffic detection schemes. Malicious encrypted traffic identification is a challenging task and has attracted researchers' attention nowadays. Existing research way mainly extracts various statistical features of data-flow, which relies artificial experience heavily. To round the above problem. a fingerprint enhancement and second-order Markov chain based scheme is proposed in this paper, obtaining features more easily. Fingerprint enhancement is done to replace SSL fingerprint by refining data-flow's behavior. Then enhanced fingerprint is fed to second-order Markov chain to obtain dominating feature for identification model. To our best knowledge, this paper is the first one focusing on using fingerprint and second order Markov chain to simplify feature extraction. Finally, the proposed scheme is verified based on public dataset Stratosphere IPS.","PeriodicalId":220526,"journal":{"name":"Proceedings of the 2020 6th International Conference on Computing and Artificial Intelligence","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129631450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Offloading Strategy for Edge Computing Tasks Based on Cache Mechanism 基于缓存机制的边缘计算任务卸载策略
Juan Fang, Wenzheng Zeng
Aiming at the task offloading in edge computing, this paper proposes a task offloading algorithm that utilizes the cache function of the edge server. When a task is uploaded to the edge server, it is determined whether this type of task is uploaded to the edge server for the first time. If it is determined to be yes, then the corresponding task content is cached on this server, and each task is set to have been cached the same. The execution delay and energy consumption of computing nodes of type content will be reduced. When a task that has cached the same type of content is uploaded to the edge server, the pre-set evaluation parameters take into account factors such as delay and energy consumption to calculate the optimal processing position for the task, so that each uploaded task can be executed in the least costly manner, thereby achieving the purpose of reducing the operating cost of the entire system. We use iFogSim simulator for simulation experiments. Simulation results show that this strategy can effectively reduce the latency and energy consumption of edge systems. In the ideal case, the task latency and energy consumption are reduced by 15% and 18% respectively compared to the original algorithm.
针对边缘计算中的任务卸载问题,提出了一种利用边缘服务器缓存功能的任务卸载算法。当任务上传到边缘服务器时,判断该任务类型是否为第一次上传到边缘服务器。如果确定为yes,则将相应的任务内容缓存在此服务器上,并且将每个任务设置为已缓存相同的内容。降低了内容类型计算节点的执行延迟和能耗。在将缓存了相同类型内容的任务上传到边缘服务器时,预置的评估参数考虑了延迟、能耗等因素,计算出该任务的最优处理位置,使每一个上传的任务都能以成本最低的方式执行,从而达到降低整个系统运行成本的目的。我们使用iFogSim模拟器进行仿真实验。仿真结果表明,该策略能有效降低边缘系统的时延和能耗。在理想情况下,与原始算法相比,任务延迟和能耗分别降低了15%和18%。
{"title":"Offloading Strategy for Edge Computing Tasks Based on Cache Mechanism","authors":"Juan Fang, Wenzheng Zeng","doi":"10.1145/3404555.3404575","DOIUrl":"https://doi.org/10.1145/3404555.3404575","url":null,"abstract":"Aiming at the task offloading in edge computing, this paper proposes a task offloading algorithm that utilizes the cache function of the edge server. When a task is uploaded to the edge server, it is determined whether this type of task is uploaded to the edge server for the first time. If it is determined to be yes, then the corresponding task content is cached on this server, and each task is set to have been cached the same. The execution delay and energy consumption of computing nodes of type content will be reduced. When a task that has cached the same type of content is uploaded to the edge server, the pre-set evaluation parameters take into account factors such as delay and energy consumption to calculate the optimal processing position for the task, so that each uploaded task can be executed in the least costly manner, thereby achieving the purpose of reducing the operating cost of the entire system. We use iFogSim simulator for simulation experiments. Simulation results show that this strategy can effectively reduce the latency and energy consumption of edge systems. In the ideal case, the task latency and energy consumption are reduced by 15% and 18% respectively compared to the original algorithm.","PeriodicalId":220526,"journal":{"name":"Proceedings of the 2020 6th International Conference on Computing and Artificial Intelligence","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129193363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Research on Prediction Model of College Students' Growth Based on Mobile Location Data Mining: Take Hunan Mass Media College as an example 基于移动位置数据挖掘的大学生成长预测模型研究——以湖南传媒学院为例
Yanshu Liu, Can Yi
With the rapid development of mobile internet technology, mobile terminal APP is closely related to the daily life of contemporary university students. This paper analyzes the algorithm of location data by obtaining the location data samples of university student terminal APP and defines the positions in semantics by obtaining the trajectory route of students' behavior. Analyze the daily behavior habits, social relationship, personal interests and hobbies and so on of university students by characteristics of university students' daily behaviors and the data of their moving tracks. In order to build a computational model for similarity of university students' user behavior to analyze the behavior of university students and induce four user types of university students with similar behaviors according to the classification of user behavior of university students by similarity calculation model. In order to carry out corresponding learning career planning guidance for different types of university students to establish a prediction model for the growth of university students which has been verified that it has a practical guiding significance by tests.
随着移动互联网技术的飞速发展,移动端APP与当代大学生的日常生活息息相关。本文通过获取大学生终端APP的位置数据样本,分析位置数据的算法,并通过获取学生行为的轨迹路径,在语义上定义位置。通过大学生日常行为的特点和运动轨迹的数据,分析大学生的日常行为习惯、社会关系、个人兴趣爱好等。为了构建大学生用户行为相似度的计算模型,对大学生的行为进行分析,根据相似度计算模型对大学生用户行为进行分类,归纳出四种行为相似的大学生用户类型。为了对不同类型的大学生进行相应的学习生涯规划指导,建立了大学生成长预测模型,并通过测试验证了该模型具有实际的指导意义。
{"title":"Research on Prediction Model of College Students' Growth Based on Mobile Location Data Mining: Take Hunan Mass Media College as an example","authors":"Yanshu Liu, Can Yi","doi":"10.1145/3404555.3404580","DOIUrl":"https://doi.org/10.1145/3404555.3404580","url":null,"abstract":"With the rapid development of mobile internet technology, mobile terminal APP is closely related to the daily life of contemporary university students. This paper analyzes the algorithm of location data by obtaining the location data samples of university student terminal APP and defines the positions in semantics by obtaining the trajectory route of students' behavior. Analyze the daily behavior habits, social relationship, personal interests and hobbies and so on of university students by characteristics of university students' daily behaviors and the data of their moving tracks. In order to build a computational model for similarity of university students' user behavior to analyze the behavior of university students and induce four user types of university students with similar behaviors according to the classification of user behavior of university students by similarity calculation model. In order to carry out corresponding learning career planning guidance for different types of university students to establish a prediction model for the growth of university students which has been verified that it has a practical guiding significance by tests.","PeriodicalId":220526,"journal":{"name":"Proceedings of the 2020 6th International Conference on Computing and Artificial Intelligence","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130009189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Distributed Anomaly Filtering Algorithm for Heterogeneous Data Based on City Computing 基于城市计算的异构数据分布式异常过滤算法
Shiwei Wang, Yangyang Li, Xiaobin Xu, Guijie Yue
In modern cities, numerous urban perception devices collect and release urban data all the time, but urban data may become abnormal due to environmental interference or artificial tampering. In view of the problem that urban data will face data anomalies, this paper designs a distributed gauss membership anomaly data filtering algorithm, and defines a set of extraction protocols suitable for heterogeneous data. Simulation results show that this algorithm can filter abnormal data in real time, improve the efficiency of urban computing and reduce the cost of network.
在现代城市中,无数的城市感知设备无时无刻不在收集和发布城市数据,但城市数据可能会因环境干扰或人为篡改而出现异常。针对城市数据将面临的数据异常问题,设计了一种分布式高斯隶属度异常数据过滤算法,并定义了一套适用于异构数据的提取协议。仿真结果表明,该算法能够实时过滤异常数据,提高城市计算效率,降低网络成本。
{"title":"A Distributed Anomaly Filtering Algorithm for Heterogeneous Data Based on City Computing","authors":"Shiwei Wang, Yangyang Li, Xiaobin Xu, Guijie Yue","doi":"10.1145/3404555.3404636","DOIUrl":"https://doi.org/10.1145/3404555.3404636","url":null,"abstract":"In modern cities, numerous urban perception devices collect and release urban data all the time, but urban data may become abnormal due to environmental interference or artificial tampering. In view of the problem that urban data will face data anomalies, this paper designs a distributed gauss membership anomaly data filtering algorithm, and defines a set of extraction protocols suitable for heterogeneous data. Simulation results show that this algorithm can filter abnormal data in real time, improve the efficiency of urban computing and reduce the cost of network.","PeriodicalId":220526,"journal":{"name":"Proceedings of the 2020 6th International Conference on Computing and Artificial Intelligence","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126388519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive Spatial Clustering for Multi-Dimensional Data and Its Cloud Model Representation 多维数据的自适应空间聚类及其云模型表示
Bin Gao, Xinhai Zhang, Xiaobin Xu, Yifeng Liu
In view of the problem that the number of clusters need to be set manually, it is difficult to process the multi-dimensional data effectively, and the clustering results are not described effectively when the multi-dimensional data need to be clustered. This paper proposes a method of adaptive spatial clustering and its cloud model representation for the multi-dimensional data. This method can be used to cluster multi-dimensional spatial data, form qualitative description of clustering results, and realize the reconstruction and verification of qualitative description features. Through simulation experiments, this method can cluster data adaptively without the need to set the number of clusters. At the same time, it has a good ability to abstract and reconstruct digital features.
针对需要手动设置聚类个数的问题,难以对多维数据进行有效的处理,在对多维数据进行聚类时,聚类结果不能得到有效的描述。提出了一种多维数据的自适应空间聚类及其云模型表示方法。该方法可以对多维空间数据进行聚类,对聚类结果形成定性描述,实现定性描述特征的重构与验证。通过仿真实验,该方法可以在不需要设置聚类个数的情况下自适应聚类数据。同时,它具有较好的数字特征抽象和重构能力。
{"title":"Adaptive Spatial Clustering for Multi-Dimensional Data and Its Cloud Model Representation","authors":"Bin Gao, Xinhai Zhang, Xiaobin Xu, Yifeng Liu","doi":"10.1145/3404555.3404634","DOIUrl":"https://doi.org/10.1145/3404555.3404634","url":null,"abstract":"In view of the problem that the number of clusters need to be set manually, it is difficult to process the multi-dimensional data effectively, and the clustering results are not described effectively when the multi-dimensional data need to be clustered. This paper proposes a method of adaptive spatial clustering and its cloud model representation for the multi-dimensional data. This method can be used to cluster multi-dimensional spatial data, form qualitative description of clustering results, and realize the reconstruction and verification of qualitative description features. Through simulation experiments, this method can cluster data adaptively without the need to set the number of clusters. At the same time, it has a good ability to abstract and reconstruct digital features.","PeriodicalId":220526,"journal":{"name":"Proceedings of the 2020 6th International Conference on Computing and Artificial Intelligence","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126398498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Maven Loss with AGW-Net for Biomedical Image Segmentation 基于AGW-Net的Maven损失生物医学图像分割
Yuze Li, Kaijun Wang, Hehui Gu
Traditionally, the dice loss compares the similarity of boundaries between ground truths and predictions. However, the result can be unauthentic when it comes to the situation that both ground truth and predictions are too small. The focal Tversky loss is proposed to address the imbalance between positive and negative samples as well as to contribute a better trade-off between precision and recall. In this paper, we introduce a novel loss function named 'Maven Loss' by considering 'specificity' to handle the issue of data disequilibrium and to help achieve weighing both abilities to correctly segment lesion and non-lesion areas. To evaluate our loss function, we also propose an AGW-Net based on the attention U-Net and W-Net by injecting self-reinforced skip connections. Experiment on ISIC 2018 dataset in which lesions occupy 21.4% on average of the whole images shows that maven loss function and the new network architecture improved IOU and F1-score by 4.9% and 3% compared to the standard attention U-Net, respectively.
传统上,骰子损失比较的是基本事实和预测之间边界的相似性。然而,当实际情况和预测都太小时,结果可能是不真实的。焦点Tversky损失的提出是为了解决正负样本之间的不平衡,以及在精度和召回率之间做出更好的权衡。在本文中,我们引入了一种新的损失函数“Maven loss”,通过考虑“特异性”来处理数据不平衡问题,并帮助实现对正确分割病变和非病变区域的能力的权衡。为了评估我们的损失函数,我们还提出了一个基于注意力U-Net和W-Net的AGW-Net,通过注入自增强跳跃连接。在病变平均占整个图像21.4%的ISIC 2018数据集上进行的实验表明,与标准注意力U-Net相比,maven损失函数和新网络架构分别将IOU和f1评分提高了4.9%和3%。
{"title":"Maven Loss with AGW-Net for Biomedical Image Segmentation","authors":"Yuze Li, Kaijun Wang, Hehui Gu","doi":"10.1145/3404555.3404561","DOIUrl":"https://doi.org/10.1145/3404555.3404561","url":null,"abstract":"Traditionally, the dice loss compares the similarity of boundaries between ground truths and predictions. However, the result can be unauthentic when it comes to the situation that both ground truth and predictions are too small. The focal Tversky loss is proposed to address the imbalance between positive and negative samples as well as to contribute a better trade-off between precision and recall. In this paper, we introduce a novel loss function named 'Maven Loss' by considering 'specificity' to handle the issue of data disequilibrium and to help achieve weighing both abilities to correctly segment lesion and non-lesion areas. To evaluate our loss function, we also propose an AGW-Net based on the attention U-Net and W-Net by injecting self-reinforced skip connections. Experiment on ISIC 2018 dataset in which lesions occupy 21.4% on average of the whole images shows that maven loss function and the new network architecture improved IOU and F1-score by 4.9% and 3% compared to the standard attention U-Net, respectively.","PeriodicalId":220526,"journal":{"name":"Proceedings of the 2020 6th International Conference on Computing and Artificial Intelligence","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132713591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Uncertainty Management in Situation Awareness for Cyber-Physical Systems: State of the Art and Challenge 信息物理系统态势感知中的不确定性管理:现状与挑战
Xin Tao, Didem Gürdür Broo, Martin Törngren, De-Jiu Chen
Cyber-Physical Systems (CPS) are a result of highly cross-disciplinary processes and are evolving to perform increasingly challenging tasks in dynamically changing environments. This leads to an increasing CPS complexity and therefore the management of uncertainty to ensure the trustworthiness of these systems is needed. Our paper focuses on uncertainty management (UM) both in general and more specifically in the context of CPS situation awareness (SA). The motivation behind this is the important role of SA and its many inherent uncertainties. To this end, firstly, a literature review is conducted to acquire the state of the art of UM. Later, we present findings and observations from the literature review, with two main challenges identified - inconsistent understanding and terminology among a multitude of uncertainty perspectives, and a lack of collaboration among different communities. On this basis, lastly, two case studies are conducted to exemplify the challenges and provide brief ideas on how to deal with them. The whole investigation in the paper suggests an urgent strengthening of common understanding through enhanced collaboration and regulations.
信息物理系统(CPS)是高度跨学科过程的结果,并且正在发展以在动态变化的环境中执行越来越具有挑战性的任务。这导致了CPS复杂性的增加,因此需要对不确定性进行管理,以确保这些系统的可信度。我们的论文主要关注不确定性管理(UM)在一般和更具体的CPS情境感知(SA)的背景下。这背后的动机是SA的重要作用及其许多固有的不确定性。为此,首先,进行了文献综述,以获得UM的艺术状态。随后,我们提出了文献综述中的发现和观察结果,并确定了两个主要挑战-在众多不确定性观点中不一致的理解和术语,以及不同社区之间缺乏合作。在此基础上,最后进行了两个案例研究,以说明所面临的挑战,并就如何应对这些挑战提供了简要的思路。本文的整个调查表明,迫切需要通过加强合作和监管来加强共识。
{"title":"Uncertainty Management in Situation Awareness for Cyber-Physical Systems: State of the Art and Challenge","authors":"Xin Tao, Didem Gürdür Broo, Martin Törngren, De-Jiu Chen","doi":"10.1145/3404555.3404558","DOIUrl":"https://doi.org/10.1145/3404555.3404558","url":null,"abstract":"Cyber-Physical Systems (CPS) are a result of highly cross-disciplinary processes and are evolving to perform increasingly challenging tasks in dynamically changing environments. This leads to an increasing CPS complexity and therefore the management of uncertainty to ensure the trustworthiness of these systems is needed. Our paper focuses on uncertainty management (UM) both in general and more specifically in the context of CPS situation awareness (SA). The motivation behind this is the important role of SA and its many inherent uncertainties. To this end, firstly, a literature review is conducted to acquire the state of the art of UM. Later, we present findings and observations from the literature review, with two main challenges identified - inconsistent understanding and terminology among a multitude of uncertainty perspectives, and a lack of collaboration among different communities. On this basis, lastly, two case studies are conducted to exemplify the challenges and provide brief ideas on how to deal with them. The whole investigation in the paper suggests an urgent strengthening of common understanding through enhanced collaboration and regulations.","PeriodicalId":220526,"journal":{"name":"Proceedings of the 2020 6th International Conference on Computing and Artificial Intelligence","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133674486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Voice Conversion towards Arbitrary Speakers With Limited Data 有限数据下任意说话人的语音转换
Ying Zhang, Wenjun Zhang, Dandan Song
Voice conversion towards a specific speaker requires a large number of target speaker's utterances, which is expensive in practice. This paper proposes a speaker-adaptive voice conversion (SAVC) system, which accomplishes voice conversion towards arbitrary speakers with limited data. First, a multi-speaker voice conversion (MSVC) model is trained to learn the shared information between speakers and build a speaker latent space. Second, utterances of a new target speaker are used to fine tune the MSVC model aiming to learn the voice of the target speaker. In the two steps, phonetic posteriorgrams (PPGs), a speaker-independent linguistic feature, and speaker embeddings such as i-vector or x-vector are encoded to train the model. In order to achieve better results, two different adaptive approaches are explored: adaptation on the whole MSVC model or additional linear-hidden layers (AHL). As the results show, both adaptive approaches significantly outperform the MSVC model without adaptation. Besides, the whole adapted model based on x-vector gets a higher similarity to target speaker within 10 utterances.
对特定说话人的语音转换需要大量的目标说话人的话语,这在实践中是昂贵的。本文提出了一种说话人自适应语音转换(SAVC)系统,该系统可以在有限的数据条件下实现对任意说话人的语音转换。首先,训练多说话人语音转换(MSVC)模型,学习说话人之间的共享信息,建立说话人潜在空间;其次,利用新目标说话人的话语对MSVC模型进行微调,以学习目标说话人的声音。在这两个步骤中,语音后图(ppg),一个独立于说话人的语言特征,和说话人嵌入,如i向量或x向量被编码来训练模型。为了达到更好的效果,研究了两种不同的自适应方法:对整个MSVC模型进行自适应或附加线性隐藏层(AHL)自适应。结果表明,两种自适应方法均显著优于不自适应的MSVC模型。此外,整个基于x向量的自适应模型在10个话语内与目标说话人的相似度更高。
{"title":"Voice Conversion towards Arbitrary Speakers With Limited Data","authors":"Ying Zhang, Wenjun Zhang, Dandan Song","doi":"10.1145/3404555.3404627","DOIUrl":"https://doi.org/10.1145/3404555.3404627","url":null,"abstract":"Voice conversion towards a specific speaker requires a large number of target speaker's utterances, which is expensive in practice. This paper proposes a speaker-adaptive voice conversion (SAVC) system, which accomplishes voice conversion towards arbitrary speakers with limited data. First, a multi-speaker voice conversion (MSVC) model is trained to learn the shared information between speakers and build a speaker latent space. Second, utterances of a new target speaker are used to fine tune the MSVC model aiming to learn the voice of the target speaker. In the two steps, phonetic posteriorgrams (PPGs), a speaker-independent linguistic feature, and speaker embeddings such as i-vector or x-vector are encoded to train the model. In order to achieve better results, two different adaptive approaches are explored: adaptation on the whole MSVC model or additional linear-hidden layers (AHL). As the results show, both adaptive approaches significantly outperform the MSVC model without adaptation. Besides, the whole adapted model based on x-vector gets a higher similarity to target speaker within 10 utterances.","PeriodicalId":220526,"journal":{"name":"Proceedings of the 2020 6th International Conference on Computing and Artificial Intelligence","volume":"225 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133846013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the 2020 6th International Conference on Computing and Artificial Intelligence
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1