首页 > 最新文献

Vision最新文献

英文 中文
A Novel Deep Convolution Neural Network Model for CT Image Classification Based on COVID-19 基于COVID-19的CT图像分类新深度卷积神经网络模型
Pub Date : 2022-05-20 DOI: 10.1109/cvidliccea56201.2022.9824838
Jingrong Wang, Limeng Lu, Zixiang Zhang, Nady Slam
Since the outbreak of novel coronavirus pneumonia (COVID-19) in 2019, normal learning and living have been severely affected, and human life and health have been seriously threatened. Therefore, it is crucial to diagnose the novel coronavirus pneumonia rapidly and efficiently. In this study, based on the classical image classification neural network model, a novel deep convolutional neural network model based on the attention mechanism is proposed and named the LACNN_CBAM model. The accuracy Acc, precision Pre, recall Rec and F-1 scores of the model in the public dataset collated from published papers are 0.989, 0.992, 0.992, and 0.992, which are respectively higher than existing learning models. The model determines whether a patient has COVID-19 and community-acquired pneumonia by patient’s CT images. The effectiveness of the model was demonstrated by experimental results on a clinical dataset. We believe that the model proposed in this paper can help physicians to diagnose COVID-19 and community-acquired pneumonia efficiently and accurately in reality.
2019年新型冠状病毒肺炎(COVID-19)疫情爆发以来,正常的学习生活受到严重影响,人类生命健康受到严重威胁。因此,快速有效地诊断新型冠状病毒肺炎至关重要。本研究在经典图像分类神经网络模型的基础上,提出了一种新的基于注意机制的深度卷积神经网络模型,命名为LACNN_CBAM模型。该模型在公开数据集中的准确率Acc、精度Pre、召回率Rec和F-1得分分别为0.989、0.992、0.992和0.992,均高于现有的学习模型。该模型通过患者的CT图像判断患者是否患有COVID-19和社区获得性肺炎。在临床数据集上的实验结果验证了该模型的有效性。我们认为,本文提出的模型可以帮助医生在现实中高效准确地诊断COVID-19和社区获得性肺炎。
{"title":"A Novel Deep Convolution Neural Network Model for CT Image Classification Based on COVID-19","authors":"Jingrong Wang, Limeng Lu, Zixiang Zhang, Nady Slam","doi":"10.1109/cvidliccea56201.2022.9824838","DOIUrl":"https://doi.org/10.1109/cvidliccea56201.2022.9824838","url":null,"abstract":"Since the outbreak of novel coronavirus pneumonia (COVID-19) in 2019, normal learning and living have been severely affected, and human life and health have been seriously threatened. Therefore, it is crucial to diagnose the novel coronavirus pneumonia rapidly and efficiently. In this study, based on the classical image classification neural network model, a novel deep convolutional neural network model based on the attention mechanism is proposed and named the LACNN_CBAM model. The accuracy Acc, precision Pre, recall Rec and F-1 scores of the model in the public dataset collated from published papers are 0.989, 0.992, 0.992, and 0.992, which are respectively higher than existing learning models. The model determines whether a patient has COVID-19 and community-acquired pneumonia by patient’s CT images. The effectiveness of the model was demonstrated by experimental results on a clinical dataset. We believe that the model proposed in this paper can help physicians to diagnose COVID-19 and community-acquired pneumonia efficiently and accurately in reality.","PeriodicalId":23649,"journal":{"name":"Vision","volume":"105 1","pages":"15-20"},"PeriodicalIF":0.0,"publicationDate":"2022-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88989723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research of the 51% attack based on blockchain 基于区块链的51%攻击研究
Pub Date : 2022-05-20 DOI: 10.1109/cvidliccea56201.2022.9824528
Yuechen Hao
With the explosion of Nakamoto’s paper, blockchain technology has developed rapidly, but at the same time, security problems are emerging one after another. As a potential security hazard in the payment field, 51% attack brings huge risks to the normal operation of the blockchain system. Miners with great computing power have the ability to monopolize the generation of blocks and modify the generated blocks. Therefore, it is necessary to do research of this kind of attacks. This article cites both Nakamoto model and Rosenfeld model to illustrate relationship between computing power and attack success rate. Through a series of mining experiments, this paper preliminarily introduces the operation principles of blockchain based on Ethereum, including proof of stake, smart contracts etc. Models show that for rational attackers who pursue interests, they lack the motivation to launch 51% attacks. For attackers who only destroy the bitcoin system, they need to master huge financial resources to launch 51% of attacks, and even need financial support at the national level, which is very difficult. It can be said that 51% attacks against bitcoin are only theoretically possible, but users still need to pay enough attention. As an emerging technology, blockchain technology is currently in the research and exploration stage. While it is applied in the financial field, it is also expanding to other fields. In the future, blockchain technology will not only be used to solve the trust and security problems in the centralized service architecture, but also appear in more decentralized service scenarios. So, the research on blockchain security is particularly important.
随着中本聪论文的爆款,区块链技术得到了飞速发展,但同时,安全问题也层出不穷。51%攻击作为支付领域的潜在安全隐患,给区块链系统的正常运行带来巨大风险。拥有强大计算能力的矿工具有垄断区块生成和修改生成区块的能力。因此,有必要对这类攻击进行研究。本文引用了Nakamoto模型和Rosenfeld模型来说明计算能力和攻击成功率之间的关系。本文通过一系列的挖矿实验,初步介绍了基于以太坊的区块链的运行原理,包括权益证明、智能合约等。模型表明,对于追求利益的理性攻击者来说,他们缺乏发起51%攻击的动机。对于只破坏比特币系统的攻击者来说,他们需要掌握庞大的财力来发动51%的攻击,甚至需要国家层面的资金支持,难度非常大。可以说,针对比特币的51%攻击只是理论上的可能,但用户仍然需要给予足够的重视。区块链技术作为一项新兴技术,目前处于研究和探索阶段。它在应用于金融领域的同时,也在向其他领域扩展。未来,区块链技术不仅会用于解决中心化服务架构中的信任和安全问题,还会出现在更加去中心化的服务场景中。因此,对区块链安全性的研究就显得尤为重要。
{"title":"Research of the 51% attack based on blockchain","authors":"Yuechen Hao","doi":"10.1109/cvidliccea56201.2022.9824528","DOIUrl":"https://doi.org/10.1109/cvidliccea56201.2022.9824528","url":null,"abstract":"With the explosion of Nakamoto’s paper, blockchain technology has developed rapidly, but at the same time, security problems are emerging one after another. As a potential security hazard in the payment field, 51% attack brings huge risks to the normal operation of the blockchain system. Miners with great computing power have the ability to monopolize the generation of blocks and modify the generated blocks. Therefore, it is necessary to do research of this kind of attacks. This article cites both Nakamoto model and Rosenfeld model to illustrate relationship between computing power and attack success rate. Through a series of mining experiments, this paper preliminarily introduces the operation principles of blockchain based on Ethereum, including proof of stake, smart contracts etc. Models show that for rational attackers who pursue interests, they lack the motivation to launch 51% attacks. For attackers who only destroy the bitcoin system, they need to master huge financial resources to launch 51% of attacks, and even need financial support at the national level, which is very difficult. It can be said that 51% attacks against bitcoin are only theoretically possible, but users still need to pay enough attention. As an emerging technology, blockchain technology is currently in the research and exploration stage. While it is applied in the financial field, it is also expanding to other fields. In the future, blockchain technology will not only be used to solve the trust and security problems in the centralized service architecture, but also appear in more decentralized service scenarios. So, the research on blockchain security is particularly important.","PeriodicalId":23649,"journal":{"name":"Vision","volume":"09 1","pages":"278-283"},"PeriodicalIF":0.0,"publicationDate":"2022-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86502960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
FYCFNet: Vehicle and Pedestrian Detection Network based on Multi-model Fusion FYCFNet:基于多模型融合的车辆行人检测网络
Pub Date : 2022-05-20 DOI: 10.1109/cvidliccea56201.2022.9825072
Pnegyu Dai
Vision-based solutions for target detection in autonomous driving are very much about the accuracy of detection. A correct or incorrect detection may cause or avoid a traffic accident. Therefore, in this paper, to further improve the detection accuracy of vision schemes, we propose a multi-model fusion network: Fusion Network with YoloV5 and CBNEet Faster-RCNN (FYCFNet) that fuses a one-stage target detection model and a two-stage model, which consists of three parts: the first part is a single-stage YOLOV5 [1] detection model, the second part is a Faster-RCNN [2] with CBNet-V2 [3] as the backbone, and the third part is the post-fusion head of weighted boxes fusion. We tested the performance of this network and compared it with other mainstream networks, and verified that the network achieves a very impressive accuracy improvement.
自动驾驶中基于视觉的目标检测解决方案非常注重检测的准确性。正确或错误的检测可能导致或避免交通事故。因此,为了进一步提高视觉方案的检测精度,本文提出了一种多模型融合网络:YoloV5和CBNEet Faster-RCNN融合网络(FYCFNet),它融合了一种单阶段目标检测模型和两阶段模型,由三部分组成:第一部分是单阶段YoloV5[1]检测模型,第二部分是以CBNet-V2[3]为骨架的Faster-RCNN[2],第三部分是加权盒融合的融合后头部。我们测试了该网络的性能,并将其与其他主流网络进行了比较,并验证了该网络实现了非常令人印象深刻的准确性提高。
{"title":"FYCFNet: Vehicle and Pedestrian Detection Network based on Multi-model Fusion","authors":"Pnegyu Dai","doi":"10.1109/cvidliccea56201.2022.9825072","DOIUrl":"https://doi.org/10.1109/cvidliccea56201.2022.9825072","url":null,"abstract":"Vision-based solutions for target detection in autonomous driving are very much about the accuracy of detection. A correct or incorrect detection may cause or avoid a traffic accident. Therefore, in this paper, to further improve the detection accuracy of vision schemes, we propose a multi-model fusion network: Fusion Network with YoloV5 and CBNEet Faster-RCNN (FYCFNet) that fuses a one-stage target detection model and a two-stage model, which consists of three parts: the first part is a single-stage YOLOV5 [1] detection model, the second part is a Faster-RCNN [2] with CBNet-V2 [3] as the backbone, and the third part is the post-fusion head of weighted boxes fusion. We tested the performance of this network and compared it with other mainstream networks, and verified that the network achieves a very impressive accuracy improvement.","PeriodicalId":23649,"journal":{"name":"Vision","volume":"31 1","pages":"230-236"},"PeriodicalIF":0.0,"publicationDate":"2022-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84995626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-Object Tracking with Spatial-Temporal Correlation Memory Networks 基于时空相关记忆网络的多目标跟踪
Pub Date : 2022-05-20 DOI: 10.1109/cvidliccea56201.2022.9825193
Ming Xin, Wenjie Sun, Kaifang Li, Guancheng Hui
Resistance to object appearance deformation and local occlusion is still one of the challenges of multi-object tracking algorithms. Most popular algorithms rely on time-consuming numerical optimization and complex manual design strategies to integrate object appearance information and motion information, so as to alleviate the adverse effects of object appearance deformation and local occlusion on the trajectory updating. This paper proposes a Spatial-Temporal Correlation Memory (STCM) module which can adaptively aggregate useful information from rich historical information in memory. By mining the time dimension information, the STCM module can guide the backbone network to extract the current frame effectively, and adapt to the change in the object’s appearance in the tracking process. Specifically, the STCM module can record the foreground-background information in the history frames and direct the backbone network to focus on the useful information in the current frame. Experiments on the MOT17 data set show that our method outperforms the baseline method and current advanced method in index MOTA and IDFI.
抵抗物体外观变形和局部遮挡仍然是多目标跟踪算法面临的挑战之一。目前流行的算法大多依靠耗时的数值优化和复杂的人工设计策略来整合物体外观信息和运动信息,以减轻物体外观变形和局部遮挡对轨迹更新的不利影响。本文提出了一种时空相关记忆(STCM)模块,该模块可以自适应地从存储器中丰富的历史信息中聚合有用的信息。通过挖掘时间维度信息,STCM模块可以引导骨干网络有效提取当前帧,并适应跟踪过程中目标外观的变化。具体来说,STCM模块可以记录历史帧中的前景和背景信息,并指导骨干网关注当前帧中的有用信息。在MOT17数据集上的实验表明,该方法在索引MOTA和IDFI方面优于基线方法和目前的先进方法。
{"title":"Multi-Object Tracking with Spatial-Temporal Correlation Memory Networks","authors":"Ming Xin, Wenjie Sun, Kaifang Li, Guancheng Hui","doi":"10.1109/cvidliccea56201.2022.9825193","DOIUrl":"https://doi.org/10.1109/cvidliccea56201.2022.9825193","url":null,"abstract":"Resistance to object appearance deformation and local occlusion is still one of the challenges of multi-object tracking algorithms. Most popular algorithms rely on time-consuming numerical optimization and complex manual design strategies to integrate object appearance information and motion information, so as to alleviate the adverse effects of object appearance deformation and local occlusion on the trajectory updating. This paper proposes a Spatial-Temporal Correlation Memory (STCM) module which can adaptively aggregate useful information from rich historical information in memory. By mining the time dimension information, the STCM module can guide the backbone network to extract the current frame effectively, and adapt to the change in the object’s appearance in the tracking process. Specifically, the STCM module can record the foreground-background information in the history frames and direct the backbone network to focus on the useful information in the current frame. Experiments on the MOT17 data set show that our method outperforms the baseline method and current advanced method in index MOTA and IDFI.","PeriodicalId":23649,"journal":{"name":"Vision","volume":"32 1","pages":"616-619"},"PeriodicalIF":0.0,"publicationDate":"2022-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89327953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design and implementation of improved CNN activation function 改进的CNN激活函数的设计与实现
Pub Date : 2022-05-20 DOI: 10.1109/cvidliccea56201.2022.9824061
Yihang Tang, Lu Tian, Yichen Liu, YuJieEr Wen, Keyi Kang, Xiyan Zhao
Convolutional neural network has powerful feature learning capabilities and are widely used in the field of image classification. In this paper, an image classification method with improved CNN activation function is proposed. By analyzing the shallow convolutional neural network, a CIFAR-10 image classification model is constructed. In the process of data preprocessing, the digital standardization of the images is completed and the sample labels are one-hot encoded. The model network structure proposed in this paper adopts the ReLU nonlinear activation function and maximum pooling. The training results show the accuracy of the classification model is significantly improved. At the end of this paper, the accuracy rates of the four activation functions of Sigmoid, Tanh, ReLU, and T-ReLU are compared, and the advantages of the unsaturated nonlinear activation function are pointed out. The model is improved by using the T-ReLU activation function, with the accuracy rate increasing from 62% to 76.52%.
卷积神经网络具有强大的特征学习能力,广泛应用于图像分类领域。本文提出了一种改进CNN激活函数的图像分类方法。通过对浅卷积神经网络的分析,构建了CIFAR-10图像分类模型。在数据预处理过程中,完成图像的数字化标准化,对样本标签进行一次性编码。本文提出的模型网络结构采用ReLU非线性激活函数和最大池化。训练结果表明,分类模型的准确率明显提高。最后比较了Sigmoid、Tanh、ReLU和T-ReLU四种激活函数的正确率,指出了非饱和非线性激活函数的优势。利用T-ReLU激活函数对模型进行改进,准确率由62%提高到76.52%。
{"title":"Design and implementation of improved CNN activation function","authors":"Yihang Tang, Lu Tian, Yichen Liu, YuJieEr Wen, Keyi Kang, Xiyan Zhao","doi":"10.1109/cvidliccea56201.2022.9824061","DOIUrl":"https://doi.org/10.1109/cvidliccea56201.2022.9824061","url":null,"abstract":"Convolutional neural network has powerful feature learning capabilities and are widely used in the field of image classification. In this paper, an image classification method with improved CNN activation function is proposed. By analyzing the shallow convolutional neural network, a CIFAR-10 image classification model is constructed. In the process of data preprocessing, the digital standardization of the images is completed and the sample labels are one-hot encoded. The model network structure proposed in this paper adopts the ReLU nonlinear activation function and maximum pooling. The training results show the accuracy of the classification model is significantly improved. At the end of this paper, the accuracy rates of the four activation functions of Sigmoid, Tanh, ReLU, and T-ReLU are compared, and the advantages of the unsaturated nonlinear activation function are pointed out. The model is improved by using the T-ReLU activation function, with the accuracy rate increasing from 62% to 76.52%.","PeriodicalId":23649,"journal":{"name":"Vision","volume":"33 1","pages":"1166-1170"},"PeriodicalIF":0.0,"publicationDate":"2022-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84267952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on the Development of Programable Packet Scheduling 可编程分组调度的发展研究
Pub Date : 2022-05-20 DOI: 10.1109/cvidliccea56201.2022.9825157
Y. Lin
The packet scheduling problem is a classical multidimensional decision problem that requires rational decisions on the inbound as well as the outbound timing of a huge number of packets. With the advent of programmable scheduling, the deployment of packet scheduling algorithms on switches is easier, and multiple scheduling algorithms can be implemented without changing the hardware architecture. The advent of programmable scheduling simplifies the testing and deployment of new scheduling algorithms and can make the application of packet scheduling algorithms much easier to implement.
数据包调度问题是一个经典的多维决策问题,它需要对大量数据包的入站和出站时间进行合理的决策。随着可编程调度的出现,分组调度算法在交换机上的部署变得更加容易,并且可以在不改变硬件架构的情况下实现多种调度算法。可编程调度的出现简化了新调度算法的测试和部署,并使分组调度算法的应用更容易实现。
{"title":"Research on the Development of Programable Packet Scheduling","authors":"Y. Lin","doi":"10.1109/cvidliccea56201.2022.9825157","DOIUrl":"https://doi.org/10.1109/cvidliccea56201.2022.9825157","url":null,"abstract":"The packet scheduling problem is a classical multidimensional decision problem that requires rational decisions on the inbound as well as the outbound timing of a huge number of packets. With the advent of programmable scheduling, the deployment of packet scheduling algorithms on switches is easier, and multiple scheduling algorithms can be implemented without changing the hardware architecture. The advent of programmable scheduling simplifies the testing and deployment of new scheduling algorithms and can make the application of packet scheduling algorithms much easier to implement.","PeriodicalId":23649,"journal":{"name":"Vision","volume":"16 1","pages":"1098-1101"},"PeriodicalIF":0.0,"publicationDate":"2022-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84333132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Dual Knowledge Aggregation Network for Cross-Domain Sentiment Analysis 面向跨领域情感分析的双知识聚合网络
Pub Date : 2022-05-20 DOI: 10.1109/cvidliccea56201.2022.9825235
Pengfei Ji, Dandan Song
Cross-domain sentiment analysis (CDSA) is an essential subtask of sentiment analysis. It aims to utilize rich source domain data to conquer the data-hungry problem on target domain. Most existing approaches depending on deep learning mainly concentrate on common features or pivots. However, few of them consider the effect of external Knowledge Graph (KG). In this paper, we propose a Dual Knowledge Aggregation Network for Cross-Domain Sentiment Analysis (DKAN), which leverages prior knowledge from two external KGs. Specifically, DKAN comprises two main parts. One is extracting sentence representation features. The other aims to introduce external knowledge better. Also, we use SenticNet to avoid noise from KG by selecting top-n words and inserting special tokens in sentences. We also conduct empirical analyses on the effectiveness of our model on the Amazon reviews dataset. DKAN achieves promising performance compared with other methods.
跨域情感分析(CDSA)是情感分析的重要子任务。它旨在利用丰富的源域数据来克服目标域的数据饥渴问题。大多数现有的基于深度学习的方法主要集中在共同特征或支点上。然而,很少有人考虑到外部知识图(KG)的影响。在本文中,我们提出了一个双知识聚合网络用于跨领域情感分析(DKAN),该网络利用了来自两个外部KGs的先验知识,DKAN主要由两个部分组成。一是提取句子表征特征。另一个目的是更好地引入外部知识。此外,我们使用SenticNet通过选择前n个单词并在句子中插入特殊标记来避免KG的噪声。我们还对我们的模型在亚马逊评论数据集上的有效性进行了实证分析。与其他方法相比,DKAN具有良好的性能。
{"title":"A Dual Knowledge Aggregation Network for Cross-Domain Sentiment Analysis","authors":"Pengfei Ji, Dandan Song","doi":"10.1109/cvidliccea56201.2022.9825235","DOIUrl":"https://doi.org/10.1109/cvidliccea56201.2022.9825235","url":null,"abstract":"Cross-domain sentiment analysis (CDSA) is an essential subtask of sentiment analysis. It aims to utilize rich source domain data to conquer the data-hungry problem on target domain. Most existing approaches depending on deep learning mainly concentrate on common features or pivots. However, few of them consider the effect of external Knowledge Graph (KG). In this paper, we propose a Dual Knowledge Aggregation Network for Cross-Domain Sentiment Analysis (DKAN), which leverages prior knowledge from two external KGs. Specifically, DKAN comprises two main parts. One is extracting sentence representation features. The other aims to introduce external knowledge better. Also, we use SenticNet to avoid noise from KG by selecting top-n words and inserting special tokens in sentences. We also conduct empirical analyses on the effectiveness of our model on the Amazon reviews dataset. DKAN achieves promising performance compared with other methods.","PeriodicalId":23649,"journal":{"name":"Vision","volume":"1995 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2022-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88106068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Shadow Removal Based on 2Cycles-GAN 基于2Cycles-GAN的阴影去除
Pub Date : 2022-05-20 DOI: 10.1109/cvidliccea56201.2022.9824776
Haijia Chen, Dongliang Guan
Shadow removal and restoration of the image content in the shadowed regions by using shadow removal has become more and more popular in computer vision. But almost all current shadow-removal approaches use shadow-free images for training. Recently, an innovative approach that trains samples without this requirement due to this method crops patches with and without shadows from shadow images. However, it is insufficient to directly learn the essential relationships between shadow and shadow-free domains using adversarial learning and cycle-consistency constraints. Moreover, constructing many of these unpaired patches is still time-consuming and laborious. In our paper, we propose a new method named 2Cycles-G2R-ShadowNet. A shadow mask is used in our framework. We use the mask to guide the shadow generation to reformulate cycle-consistency constraints. To weakly-supervised shadow removal, we train shadow images and corresponding masks to leverage shadow generation. In our 2Cycles-G2R-ShadowNet, three subnetworks are used for shadow generation, shadow removal, and image post-processing, and we jointly train and test them end-to-end. Our method can optimize the performance by simultaneously learning to produce shadow masks and remove shadows. Extensive experiments on the ISTD dataset show that 2Cycles-G2R-ShadowNet achieves competitive performances and outperforms the current state of arts and patch-based shadow-removal method.
在计算机视觉中,利用去阴影技术对阴影区域的图像内容进行去阴影和恢复已经成为一种越来越流行的方法。但目前几乎所有的去影方法都是使用无影图像进行训练。最近,一种创新的方法可以在没有这种要求的情况下训练样本,因为这种方法可以从阴影图像中提取有阴影和没有阴影的斑块。然而,使用对抗学习和循环一致性约束来直接学习阴影域和无阴影域之间的本质关系是不够的。此外,构建许多这些未配对的补丁仍然是费时费力的。在本文中,我们提出了一种名为2Cycles-G2R-ShadowNet的新方法。在我们的框架中使用了阴影蒙版。我们使用遮罩来指导阴影生成,以重新制定循环一致性约束。为了弱监督阴影去除,我们训练阴影图像和相应的蒙版来利用阴影生成。在我们的2Cycles-G2R-ShadowNet中,我们使用三个子网进行阴影生成、阴影去除和图像后处理,并对它们进行端到端联合训练和测试。我们的方法可以通过同时学习生成阴影遮罩和去除阴影来优化性能。在ISTD数据集上的大量实验表明,2Cycles-G2R-ShadowNet达到了具有竞争力的性能,并且优于当前的基于补丁的阴影去除方法。
{"title":"Shadow Removal Based on 2Cycles-GAN","authors":"Haijia Chen, Dongliang Guan","doi":"10.1109/cvidliccea56201.2022.9824776","DOIUrl":"https://doi.org/10.1109/cvidliccea56201.2022.9824776","url":null,"abstract":"Shadow removal and restoration of the image content in the shadowed regions by using shadow removal has become more and more popular in computer vision. But almost all current shadow-removal approaches use shadow-free images for training. Recently, an innovative approach that trains samples without this requirement due to this method crops patches with and without shadows from shadow images. However, it is insufficient to directly learn the essential relationships between shadow and shadow-free domains using adversarial learning and cycle-consistency constraints. Moreover, constructing many of these unpaired patches is still time-consuming and laborious. In our paper, we propose a new method named 2Cycles-G2R-ShadowNet. A shadow mask is used in our framework. We use the mask to guide the shadow generation to reformulate cycle-consistency constraints. To weakly-supervised shadow removal, we train shadow images and corresponding masks to leverage shadow generation. In our 2Cycles-G2R-ShadowNet, three subnetworks are used for shadow generation, shadow removal, and image post-processing, and we jointly train and test them end-to-end. Our method can optimize the performance by simultaneously learning to produce shadow masks and remove shadows. Extensive experiments on the ISTD dataset show that 2Cycles-G2R-ShadowNet achieves competitive performances and outperforms the current state of arts and patch-based shadow-removal method.","PeriodicalId":23649,"journal":{"name":"Vision","volume":"39 1","pages":"552-558"},"PeriodicalIF":0.0,"publicationDate":"2022-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88353242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain and IoT based traceability system for agricultural products 区块链和基于物联网的农产品可追溯系统
Pub Date : 2022-05-20 DOI: 10.1109/cvidliccea56201.2022.9824731
Teng Wang, Xinyu Liu, Songming Guo, Baishuo Han, Wenhui Yang
With the arrival of digital agriculture,tens of billions agricultural IoT devices are connected to the IoT, and the accompanying problems such as data information of the whole industrial chain of products being vulnerable to tampering. In this paper, based on the problems of low efficiency and poor security of traditional traceability systems, we design an agricultural product traceability framework based on blockchain and IoT.And complete the deployment of blockchain under the open source distributed leger Hyperledger Fabric.Finally, we carry out web application development through Springboot framework to realize the agricultural product traceability system. In addition,we also conducted efficiency as well as performance analysis in the Caliper performance testing framework, and the results showed that the system improved the efficiency of agricultural product information transmission and data security, and had a significant effect on solving the problems of low efficiency and poor security of traditional traceability systems, meeting the needs of practical applications.
随着数字农业的到来,数百亿农业物联网设备接入物联网,随之而来的是产品全产业链数据信息易被篡改等问题。本文针对传统溯源系统效率低、安全性差的问题,设计了一种基于区块链和物联网的农产品溯源框架。并在开源分布式账本Hyperledger Fabric下完成区块链的部署。最后,通过Springboot框架进行web应用程序开发,实现农产品溯源系统。此外,我们还在Caliper性能测试框架中进行了效率和性能分析,结果表明,该系统提高了农产品信息传输效率和数据安全,对解决传统溯源系统效率低、安全性差的问题效果显著,满足了实际应用的需要。
{"title":"Blockchain and IoT based traceability system for agricultural products","authors":"Teng Wang, Xinyu Liu, Songming Guo, Baishuo Han, Wenhui Yang","doi":"10.1109/cvidliccea56201.2022.9824731","DOIUrl":"https://doi.org/10.1109/cvidliccea56201.2022.9824731","url":null,"abstract":"With the arrival of digital agriculture,tens of billions agricultural IoT devices are connected to the IoT, and the accompanying problems such as data information of the whole industrial chain of products being vulnerable to tampering. In this paper, based on the problems of low efficiency and poor security of traditional traceability systems, we design an agricultural product traceability framework based on blockchain and IoT.And complete the deployment of blockchain under the open source distributed leger Hyperledger Fabric.Finally, we carry out web application development through Springboot framework to realize the agricultural product traceability system. In addition,we also conducted efficiency as well as performance analysis in the Caliper performance testing framework, and the results showed that the system improved the efficiency of agricultural product information transmission and data security, and had a significant effect on solving the problems of low efficiency and poor security of traditional traceability systems, meeting the needs of practical applications.","PeriodicalId":23649,"journal":{"name":"Vision","volume":"1 1","pages":"316-321"},"PeriodicalIF":0.0,"publicationDate":"2022-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86634784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Individual identification of dairy cows based on Gramian Angular Field and Migrating Convolutional Neural Networks 基于Gramian角场和迁移卷积神经网络的奶牛个体识别
Pub Date : 2022-05-20 DOI: 10.1109/cvidliccea56201.2022.9825352
ShiQi Xi, Chenjie Su, Xiaodong Cheng, Xi Li
The individual identification of dairy cows is of great significance to the development of modern intelligent animal husbandry. It is of great help in remotely monitoring the individual health status of dairy cows and promoting the field of live dairy cattle leasing. Traditional methods of individual identification of dairy cows rely on manual identification, or artificial feature extraction of cow activity data so the accuracy of individual identification of dairy cows cannot be guaranteed. Aiming at this problem, this paper proposes a classification method based on Gramian Angle Field and Migrating Convolutional Neural Networks. By transforming the activity data of 20 cows for 56 days into the Gramian Angle Field and converting it into a three-dimensional image, the time dependence and correlation of the cow activity data are preserved. Combined with the idea of migration learning, a model called MCNN based on VGG16 is proposed. The MCNN model of the generated cow images is classified. The experimental results show that the classification accuracy of this method is about 99.3%, and the classification time is short, which can effectively realize the individual identification of dairy cows.
奶牛个体识别对现代智能畜牧业的发展具有重要意义。这对奶牛个体健康状况的远程监测,促进奶牛活畜租赁领域的发展有很大的帮助。传统的奶牛个体识别方法依赖于人工识别,或者对奶牛活动数据进行人工特征提取,无法保证奶牛个体识别的准确性。针对这一问题,本文提出了一种基于格拉曼角场和迁移卷积神经网络的分类方法。通过将20头奶牛56天的活动数据转换成格拉曼角场,并将其转换成三维图像,保留了奶牛活动数据的时间依赖性和相关性。对生成的奶牛图像进行MCNN模型分类。实验结果表明,该方法的分类准确率约为99.3%,分类时间短,可有效实现奶牛的个体识别。
{"title":"Individual identification of dairy cows based on Gramian Angular Field and Migrating Convolutional Neural Networks","authors":"ShiQi Xi, Chenjie Su, Xiaodong Cheng, Xi Li","doi":"10.1109/cvidliccea56201.2022.9825352","DOIUrl":"https://doi.org/10.1109/cvidliccea56201.2022.9825352","url":null,"abstract":"The individual identification of dairy cows is of great significance to the development of modern intelligent animal husbandry. It is of great help in remotely monitoring the individual health status of dairy cows and promoting the field of live dairy cattle leasing. Traditional methods of individual identification of dairy cows rely on manual identification, or artificial feature extraction of cow activity data so the accuracy of individual identification of dairy cows cannot be guaranteed. Aiming at this problem, this paper proposes a classification method based on Gramian Angle Field and Migrating Convolutional Neural Networks. By transforming the activity data of 20 cows for 56 days into the Gramian Angle Field and converting it into a three-dimensional image, the time dependence and correlation of the cow activity data are preserved. Combined with the idea of migration learning, a model called MCNN based on VGG16 is proposed. The MCNN model of the generated cow images is classified. The experimental results show that the classification accuracy of this method is about 99.3%, and the classification time is short, which can effectively realize the individual identification of dairy cows.","PeriodicalId":23649,"journal":{"name":"Vision","volume":"2015 1","pages":"135-139"},"PeriodicalIF":0.0,"publicationDate":"2022-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86866015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Vision
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1