首页 > 最新文献

2022 IEEE 8th International Conference on Computer and Communications (ICCC)最新文献

英文 中文
People-Aware mmWave Point Cloud Processing Algorithm 感知人的毫米波点云处理算法
Pub Date : 2022-12-09 DOI: 10.1109/ICCC56324.2022.10065710
Yiming Shi, Zhen Meng, Xianling Zeng, Anfu Zhou
People-aware is a way of perceiving a person's iden-tity through their biometrics. Currently, it plays a very important role in identity verification in application scenarios such as smart homes and security checks. Compared to traditional person identification technologies, mm Wave based person sensing has the unique advantages of being non-contact, not affected by the environment, and highly private and confidential. The current direct output of person point cloud results from TI packaged sensors suffers from small quantities and unclear target contours, limiting various point cloud data recognition applications such as gait recognition, status recognition, etc. In this paper, we collect mm Wave datasets of people walking and propose an Optimise-CFAR target detection optimisation algorithm based on the signal processing process, which can effectively remove the number of edge noise points and thus improve the quality of the point cloud output, and process the point cloud data of people into time series with the help of a person identification model. After experimental analysis, we found that the optimised point cloud data was able to improve the average accuracy of person classification by 93%.
“人意识”是一种通过生物特征识别一个人身份的方法。目前,在智能家居、安全检查等应用场景中,它在身份验证中扮演着非常重要的角色。与传统的人识别技术相比,基于毫米波的人感具有非接触、不受环境影响、高度私密性和保密性等独特优势。目前TI封装传感器直接输出的人点云结果存在量小、目标轮廓不清晰等问题,限制了步态识别、状态识别等各种点云数据识别应用。本文通过采集人行走的毫米波数据集,提出了一种基于信号处理过程的optimize - cfar目标检测优化算法,该算法可以有效去除边缘噪声点的数量,从而提高点云输出的质量,并借助人识别模型将人的点云数据处理成时间序列。经过实验分析,我们发现优化后的点云数据能够将人物分类的平均准确率提高93%。
{"title":"People-Aware mmWave Point Cloud Processing Algorithm","authors":"Yiming Shi, Zhen Meng, Xianling Zeng, Anfu Zhou","doi":"10.1109/ICCC56324.2022.10065710","DOIUrl":"https://doi.org/10.1109/ICCC56324.2022.10065710","url":null,"abstract":"People-aware is a way of perceiving a person's iden-tity through their biometrics. Currently, it plays a very important role in identity verification in application scenarios such as smart homes and security checks. Compared to traditional person identification technologies, mm Wave based person sensing has the unique advantages of being non-contact, not affected by the environment, and highly private and confidential. The current direct output of person point cloud results from TI packaged sensors suffers from small quantities and unclear target contours, limiting various point cloud data recognition applications such as gait recognition, status recognition, etc. In this paper, we collect mm Wave datasets of people walking and propose an Optimise-CFAR target detection optimisation algorithm based on the signal processing process, which can effectively remove the number of edge noise points and thus improve the quality of the point cloud output, and process the point cloud data of people into time series with the help of a person identification model. After experimental analysis, we found that the optimised point cloud data was able to improve the average accuracy of person classification by 93%.","PeriodicalId":263098,"journal":{"name":"2022 IEEE 8th International Conference on Computer and Communications (ICCC)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121542921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study of Non-Orthogonal Multiple Access Technology for Satellite Communications 卫星通信非正交多址技术研究
Pub Date : 2022-12-09 DOI: 10.1109/ICCC56324.2022.10065661
Shengwu Wu, Shuai Zhang, Qiyishu Li, Zhikun Xu
In this paper, the availability of the non-orthogonal multiple access (NOMA) to the satellite communication system is verified firstly by analyzing the distribution of the absolute value of any two satellite users' signal-to-noise ratio (SNR) gap. Then, the uplink and downlink NOMA schemes which are suitable for the satellite communications are studied. Finally, the link-level simulation is carried out under the satellite channel. The simulation results show that compared with the orthogonal multiple access (OMA), NOMA performs better in the satellite communication systems.
本文首先通过分析任意两个卫星用户信噪比(SNR)差绝对值的分布,验证了卫星通信系统非正交多址(NOMA)的有效性。然后,研究了适用于卫星通信的上行和下行NOMA方案。最后,在卫星信道下进行链路级仿真。仿真结果表明,与正交多址(OMA)相比,NOMA在卫星通信系统中具有更好的性能。
{"title":"Study of Non-Orthogonal Multiple Access Technology for Satellite Communications","authors":"Shengwu Wu, Shuai Zhang, Qiyishu Li, Zhikun Xu","doi":"10.1109/ICCC56324.2022.10065661","DOIUrl":"https://doi.org/10.1109/ICCC56324.2022.10065661","url":null,"abstract":"In this paper, the availability of the non-orthogonal multiple access (NOMA) to the satellite communication system is verified firstly by analyzing the distribution of the absolute value of any two satellite users' signal-to-noise ratio (SNR) gap. Then, the uplink and downlink NOMA schemes which are suitable for the satellite communications are studied. Finally, the link-level simulation is carried out under the satellite channel. The simulation results show that compared with the orthogonal multiple access (OMA), NOMA performs better in the satellite communication systems.","PeriodicalId":263098,"journal":{"name":"2022 IEEE 8th International Conference on Computer and Communications (ICCC)","volume":"9 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114001197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pilot Design with Low Overhead in Spread-Spectrum-Based FBMC/OQAM Systems 扩频FBMC/OQAM系统的低开销导频设计
Pub Date : 2022-12-09 DOI: 10.1109/ICCC56324.2022.10066052
Kaiwen Huang, Zhongnian Li, Hongbo Xu, Guoping Zhang
Direct sequence spread spectrum technology can improve the bit error rate performance in the application of filter bank based multicarrier system. Aiming at a communication system that combines the spread spectrum technology and the offset quadrature amplitude modulation based filter bank multi-carrier (FBMC/OQAM), this paper proposes a pilot frequency design scheme. The traditional pre-pilot design scheme does not consider the problems of high overhead and low power efficiency, therefore the channel estimation result is inaccurate. The proposed method in this paper combines the symmetry of the spread-spectrum signal and the imaginary interference factor, reduces other overheads except for the pilot, and improves the power of the pilot symbol. The experimental results show that the proposed method has a better bit error rate performance and lower mean square error than the auxiliary pilot method which results in no overhead of additional symbol positions around the pilot. In addition, this study analyzed the spectral efficiency, power efficiency and residual imaginary interference of the pilot design scheme.
在基于滤波器组的多载波系统应用中,直接序列扩频技术可以提高误码率性能。针对扩频技术与基于偏置正交调幅的滤波器组多载波(FBMC/OQAM)相结合的通信系统,提出了一种导频设计方案。传统的导频预设计方案没有考虑高开销和低功耗的问题,导致信道估计结果不准确。本文提出的方法结合了扩频信号的对称性和虚干扰因子,减少了除导频外的其他开销,提高了导频符号的功率。实验结果表明,与辅助导频方法相比,该方法具有更好的误码率性能和更低的均方误差,并且不会增加导频周围额外符号位置的开销。此外,本研究还分析了中试设计方案的频谱效率、功率效率和剩余虚干扰。
{"title":"Pilot Design with Low Overhead in Spread-Spectrum-Based FBMC/OQAM Systems","authors":"Kaiwen Huang, Zhongnian Li, Hongbo Xu, Guoping Zhang","doi":"10.1109/ICCC56324.2022.10066052","DOIUrl":"https://doi.org/10.1109/ICCC56324.2022.10066052","url":null,"abstract":"Direct sequence spread spectrum technology can improve the bit error rate performance in the application of filter bank based multicarrier system. Aiming at a communication system that combines the spread spectrum technology and the offset quadrature amplitude modulation based filter bank multi-carrier (FBMC/OQAM), this paper proposes a pilot frequency design scheme. The traditional pre-pilot design scheme does not consider the problems of high overhead and low power efficiency, therefore the channel estimation result is inaccurate. The proposed method in this paper combines the symmetry of the spread-spectrum signal and the imaginary interference factor, reduces other overheads except for the pilot, and improves the power of the pilot symbol. The experimental results show that the proposed method has a better bit error rate performance and lower mean square error than the auxiliary pilot method which results in no overhead of additional symbol positions around the pilot. In addition, this study analyzed the spectral efficiency, power efficiency and residual imaginary interference of the pilot design scheme.","PeriodicalId":263098,"journal":{"name":"2022 IEEE 8th International Conference on Computer and Communications (ICCC)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124494978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SC-Net: Network Intrusion Detection with Deep Supervised Contrastive Learning and Normalized Classifier 基于深度监督对比学习和归一化分类器的网络入侵检测
Pub Date : 2022-12-09 DOI: 10.1109/ICCC56324.2022.10065890
Xinjian Zhao, Fei Xia, Guoquan Yuan, Shi Chen, Song Zhang
Network intrusion detection (NID) has attracted much attention as it is essential in preventing security threats and protecting networks from attacks. However, existing methods face the following challenges: (1) poor feature extraction capability; (2) not well-designed to address the class imbalance problem; (3) failure to take full use of label information and learn classification-oriented features, degrading the NID performance. To this end, we proposed SC-Net, a two-stage training model with deep supervised learning and a normalized classifier, to overcome the abovementioned challenges. During the pretraining stage, the learned embedding will be optimized by both a supervised contrastive loss and a classification loss, so that the embedding with the same label will be more compact in the feature space. After that, in the finetuning stage, the weight of the classifier will be normalized for catering to classification tasks in scenarios of a class imbalance dataset. The experiment shows that SC-Net outperforms all comparative models in four metrics.
网络入侵检测(NID)作为防范安全威胁和保护网络免受攻击的重要手段而备受关注。然而,现有方法面临以下挑战:(1)特征提取能力差;(2)没有很好地解决班级失衡问题;(3)不能充分利用标签信息和学习面向分类的特征,降低了NID的性能。为此,我们提出了一种具有深度监督学习和归一化分类器的两阶段训练模型SC-Net来克服上述挑战。在预训练阶段,学习后的嵌入将通过监督对比损失和分类损失进行优化,使具有相同标签的嵌入在特征空间上更加紧凑。之后,在调优阶段,分类器的权重将被归一化,以适应类不平衡数据集场景下的分类任务。实验表明,SC-Net在四个指标上优于所有比较模型。
{"title":"SC-Net: Network Intrusion Detection with Deep Supervised Contrastive Learning and Normalized Classifier","authors":"Xinjian Zhao, Fei Xia, Guoquan Yuan, Shi Chen, Song Zhang","doi":"10.1109/ICCC56324.2022.10065890","DOIUrl":"https://doi.org/10.1109/ICCC56324.2022.10065890","url":null,"abstract":"Network intrusion detection (NID) has attracted much attention as it is essential in preventing security threats and protecting networks from attacks. However, existing methods face the following challenges: (1) poor feature extraction capability; (2) not well-designed to address the class imbalance problem; (3) failure to take full use of label information and learn classification-oriented features, degrading the NID performance. To this end, we proposed SC-Net, a two-stage training model with deep supervised learning and a normalized classifier, to overcome the abovementioned challenges. During the pretraining stage, the learned embedding will be optimized by both a supervised contrastive loss and a classification loss, so that the embedding with the same label will be more compact in the feature space. After that, in the finetuning stage, the weight of the classifier will be normalized for catering to classification tasks in scenarios of a class imbalance dataset. The experiment shows that SC-Net outperforms all comparative models in four metrics.","PeriodicalId":263098,"journal":{"name":"2022 IEEE 8th International Conference on Computer and Communications (ICCC)","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132481734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-Based Security Check Framework in the State of the COVID-19 Epidemic 新型冠状病毒疫情下基于区块链的安全检查框架
Pub Date : 2022-12-09 DOI: 10.1109/ICCC56324.2022.10065828
Yuan Zhang
At present, one of the effective ways to deal with the widespread of COVID-19 is to control the source of infection. As the gate of population flow in various places, the security inspection department plays a vital role in screening positive patients in the population; To solve the problems of credibility and lack of human resources, this paper establishes a security check framework based on the blockchain and combines machine learning with the blockchain: the blockchain records the abnormal results of COVID-19 nucleic acid detection and the abnormal conditions detected by the security inspection system (such as no mask, high temperature); Use machine learning to realize mask recognition and other functions. The architecture, data flow, and key elements are presented and discussed. The study findings could solve the security problem under the epidemic and provide relevant enlightenment for the effective combination and application of machine learning and blockchain.
目前,应对新冠肺炎疫情蔓延的有效途径之一是控制传染源。安检部门作为各地人流的大门,在人群中筛查阳性患者起着至关重要的作用;为解决公信力和人力资源缺乏的问题,本文建立了基于区块链的安全检查框架,并将机器学习与区块链相结合:区块链记录新冠病毒核酸检测的异常结果和安全检查系统检测到的异常情况(如无口罩、高温);利用机器学习实现掩码识别等功能。介绍并讨论了体系结构、数据流和关键元素。研究结果可以解决疫情下的安全问题,为机器学习与区块链的有效结合和应用提供相关启示。
{"title":"Blockchain-Based Security Check Framework in the State of the COVID-19 Epidemic","authors":"Yuan Zhang","doi":"10.1109/ICCC56324.2022.10065828","DOIUrl":"https://doi.org/10.1109/ICCC56324.2022.10065828","url":null,"abstract":"At present, one of the effective ways to deal with the widespread of COVID-19 is to control the source of infection. As the gate of population flow in various places, the security inspection department plays a vital role in screening positive patients in the population; To solve the problems of credibility and lack of human resources, this paper establishes a security check framework based on the blockchain and combines machine learning with the blockchain: the blockchain records the abnormal results of COVID-19 nucleic acid detection and the abnormal conditions detected by the security inspection system (such as no mask, high temperature); Use machine learning to realize mask recognition and other functions. The architecture, data flow, and key elements are presented and discussed. The study findings could solve the security problem under the epidemic and provide relevant enlightenment for the effective combination and application of machine learning and blockchain.","PeriodicalId":263098,"journal":{"name":"2022 IEEE 8th International Conference on Computer and Communications (ICCC)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130037572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enterprise-Oriented Policy Push Algorithm 面向企业的策略推送算法
Pub Date : 2022-12-09 DOI: 10.1109/ICCC56324.2022.10065764
Bai Yuxuan, Huang Junfei, Lin Zhaowen
In the traditional collaborative filtering recommendation algorithm, the similarity calculation of users is only based on cosine similarity; in the rating prediction link, only the direct neighbors of users are used for prediction. Therefore, under the circumstance that the rating matrix of enterprises on policies is highly sparse, traditional collaborative filtering has the problem that it cannot accurately predict the attitudes of enterprises towards policies and implement policies to corresponding enterprises in a timely manner. This paper proposes an enterprise-oriented policy push algorithm, which incorporates the extreme attitudes and characteristics of enterprises into the similarity calculation process. When the rating matrix is highly sparse and cannot be predicted accurately by relying on direct neighbors, iterative prediction is performed by referring to indirect neighbors and using z-score to eliminate rating bias. The experiments are carried out on the enterprise-policy dataset collected in the article and the film-trust dataset commonly used in recommender systems. The experimental results show that the algorithm reduces the mean absolute error by 5.67% and 1.54% respectively compared with the iterative rating prediction algorithm, which shows that the algorithm has achieved good optimization in the recommendation accuracy.
在传统的协同过滤推荐算法中,用户的相似度计算仅基于余弦相似度;在评级预测链路中,只使用用户的直接邻居进行预测。因此,在企业对政策的评价矩阵高度稀疏的情况下,传统协同过滤存在无法准确预测企业对政策的态度,无法及时对相应企业实施政策的问题。本文提出了一种面向企业的政策推送算法,该算法将企业的极端态度和特征纳入相似度计算过程。当评级矩阵高度稀疏,无法依靠直接邻居进行准确预测时,参考间接邻居进行迭代预测,并使用z-score消除评级偏差。在本文收集的企业政策数据集和推荐系统中常用的电影信任数据集上进行了实验。实验结果表明,与迭代评级预测算法相比,该算法的平均绝对误差分别降低了5.67%和1.54%,表明该算法在推荐精度上取得了较好的优化效果。
{"title":"Enterprise-Oriented Policy Push Algorithm","authors":"Bai Yuxuan, Huang Junfei, Lin Zhaowen","doi":"10.1109/ICCC56324.2022.10065764","DOIUrl":"https://doi.org/10.1109/ICCC56324.2022.10065764","url":null,"abstract":"In the traditional collaborative filtering recommendation algorithm, the similarity calculation of users is only based on cosine similarity; in the rating prediction link, only the direct neighbors of users are used for prediction. Therefore, under the circumstance that the rating matrix of enterprises on policies is highly sparse, traditional collaborative filtering has the problem that it cannot accurately predict the attitudes of enterprises towards policies and implement policies to corresponding enterprises in a timely manner. This paper proposes an enterprise-oriented policy push algorithm, which incorporates the extreme attitudes and characteristics of enterprises into the similarity calculation process. When the rating matrix is highly sparse and cannot be predicted accurately by relying on direct neighbors, iterative prediction is performed by referring to indirect neighbors and using z-score to eliminate rating bias. The experiments are carried out on the enterprise-policy dataset collected in the article and the film-trust dataset commonly used in recommender systems. The experimental results show that the algorithm reduces the mean absolute error by 5.67% and 1.54% respectively compared with the iterative rating prediction algorithm, which shows that the algorithm has achieved good optimization in the recommendation accuracy.","PeriodicalId":263098,"journal":{"name":"2022 IEEE 8th International Conference on Computer and Communications (ICCC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130131108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Artificial Intelligence in Mobile Communication Network 移动通信网络中的人工智能
Pub Date : 2022-12-09 DOI: 10.1109/ICCC56324.2022.10065735
Hua Zhang, Sen Xu, Jincan Xin, S. Xiong
With continuous development of the three driving forces of Artificial Intelligence (AI), e.g., ecomputing power, algorithms and data related technologies, AI is setting off a new round of technological revolution in human society. With the development of AI/ML technology, the wireless communication system is also developing rapidly. This paper summarizes the AI/ML based systems in mobile communication networks, and through researches for network AI of various international standards organizations, the existing AI/ML research purpose and progress of core networks, network management and wireless networks are introduced respectively. Besides, the relevant signaling procedures for one of the typical AI/ML radio network use cases, e.g., AI/ML mobility optimization is introduced and more potential ideas for AI/ML technology to enable wireless networks are provided.
随着计算能力、算法和数据相关技术这三大人工智能驱动力的不断发展,人工智能正在掀起人类社会新一轮的技术革命。随着AI/ML技术的发展,无线通信系统也在飞速发展。本文总结了移动通信网络中基于AI/ML的系统,并通过各国际标准组织对网络AI的研究,分别介绍了核心网、网络管理和无线网络的现有AI/ML研究目的和进展。此外,介绍了典型的AI/ML无线网络用例(如AI/ML移动性优化)的相关信令流程,并提供了AI/ML技术实现无线网络的更多潜在思路。
{"title":"Artificial Intelligence in Mobile Communication Network","authors":"Hua Zhang, Sen Xu, Jincan Xin, S. Xiong","doi":"10.1109/ICCC56324.2022.10065735","DOIUrl":"https://doi.org/10.1109/ICCC56324.2022.10065735","url":null,"abstract":"With continuous development of the three driving forces of Artificial Intelligence (AI), e.g., ecomputing power, algorithms and data related technologies, AI is setting off a new round of technological revolution in human society. With the development of AI/ML technology, the wireless communication system is also developing rapidly. This paper summarizes the AI/ML based systems in mobile communication networks, and through researches for network AI of various international standards organizations, the existing AI/ML research purpose and progress of core networks, network management and wireless networks are introduced respectively. Besides, the relevant signaling procedures for one of the typical AI/ML radio network use cases, e.g., AI/ML mobility optimization is introduced and more potential ideas for AI/ML technology to enable wireless networks are provided.","PeriodicalId":263098,"journal":{"name":"2022 IEEE 8th International Conference on Computer and Communications (ICCC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134295254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real-Time Sperm Detection Using Lightweight YOLOv5 使用轻量级的YOLOv5实时精子检测
Pub Date : 2022-12-09 DOI: 10.1109/ICCC56324.2022.10065602
Zebin Zhang, Bolin Qi, Shimin Ou, Chenjian Shi
Malformed sperm is an important cause of male infertility, and sperm morphology analysis (SMA) is an effective means to diagnose sperm morphology. Deep learning assists to enhance performance on precise SMA; however, existing deep learning based SMA methods mostly focus on single cell scale, which presents a challenge for obtaining single-sperm-image datasets (one sperm cell per image). It is also challenging to integrate current object detection models on low-performance devices. This paper presents a lightweight model for sperm detection. By removing 50% of convolutional kernels cutting the large-object-detecting head from YOLOv5s, our model got a similar precision to the original YOLOv3 (mAP.5 of 0.957 and 0.947, respectively), but with a model size of only 2.8 MB (123.6 MB of YOLOv3). There is a slight loss in precision compared to YOLOv5s (mAP.5:.95 of 0.604 with 14.4MB model size); however, our model still shows a significant advantage in reducing the number of parameters. Experimental results also indicated that MS COCO pre-training is helpful in sperm detection tasks, and the mosaic augmentation strongly enhances the precision for all YOLO models.
畸形精子是男性不育的重要原因,而精子形态分析(SMA)是诊断精子形态的有效手段。深度学习有助于提高精确SMA的性能;然而,现有的基于深度学习的SMA方法主要集中在单细胞尺度上,这对获得单精子图像数据集(每张图像一个精子细胞)提出了挑战。在低性能设备上集成当前的目标检测模型也具有挑战性。本文提出了一种用于精子检测的轻量级模型。通过从yolov5中去除50%的卷积核切割大目标检测头,我们的模型获得了与原始YOLOv3 (mAP)相似的精度。5(分别为0.957和0.947),但模型大小仅为2.8 MB (YOLOv3为123.6 MB)。与YOLOv5s(图5)相比,精度略有下降。0.604的95 (14.4MB模型大小);然而,我们的模型在减少参数数量方面仍然显示出显著的优势。实验结果还表明,MS COCO预训练有助于精子检测任务,并且马赛克增强对所有YOLO模型的精度都有很强的提高。
{"title":"Real-Time Sperm Detection Using Lightweight YOLOv5","authors":"Zebin Zhang, Bolin Qi, Shimin Ou, Chenjian Shi","doi":"10.1109/ICCC56324.2022.10065602","DOIUrl":"https://doi.org/10.1109/ICCC56324.2022.10065602","url":null,"abstract":"Malformed sperm is an important cause of male infertility, and sperm morphology analysis (SMA) is an effective means to diagnose sperm morphology. Deep learning assists to enhance performance on precise SMA; however, existing deep learning based SMA methods mostly focus on single cell scale, which presents a challenge for obtaining single-sperm-image datasets (one sperm cell per image). It is also challenging to integrate current object detection models on low-performance devices. This paper presents a lightweight model for sperm detection. By removing 50% of convolutional kernels cutting the large-object-detecting head from YOLOv5s, our model got a similar precision to the original YOLOv3 (mAP.5 of 0.957 and 0.947, respectively), but with a model size of only 2.8 MB (123.6 MB of YOLOv3). There is a slight loss in precision compared to YOLOv5s (mAP.5:.95 of 0.604 with 14.4MB model size); however, our model still shows a significant advantage in reducing the number of parameters. Experimental results also indicated that MS COCO pre-training is helpful in sperm detection tasks, and the mosaic augmentation strongly enhances the precision for all YOLO models.","PeriodicalId":263098,"journal":{"name":"2022 IEEE 8th International Conference on Computer and Communications (ICCC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134388001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Pedestrian Trajectory Extraction Method Based on UAV Video 基于无人机视频的行人轨迹提取方法
Pub Date : 2022-12-09 DOI: 10.1109/ICCC56324.2022.10065641
Peihan Shang, Xuan Zhou, Jinxing Hu
With the development of UAV technology, pedestrian trajectory extraction based on UAV video plays an increasingly prominent role in public safety. Aiming at the problems of small pedestrian targets in UAV video and the effect of pedestrian detection and tracking is easily blocked by obstacles in the scene, this paper analyzes the multi-target tracking algorithm framework based on detection, takes YOLOv5 as the target detection model, and gets a better anchor frame through KMeans++ clustering method. At the same time, CBAM attention module is integrated into YOLOv5 network to realize the effective extraction of small target features; With Deep_SORT is a target tracking model. By calculating the confidence of the trajectory, an improved correlation matching tracking algorithm framework is proposed to solve the problems of trajectory fracture caused by pedestrians being blocked, and provide a strong guarantee for extracting complete and reliable pedestrian trajectory information in UAV video. The mAP of this paper is 49.1 % on the VisDrone2019-DET dataset, and the MOTA is 48.0% on the VisDrone2019-MOT dataset. Experiments show that the pedestrian trajectory extraction method in this paper can extract more stable and continuous pedestrian trajectory.
随着无人机技术的发展,基于无人机视频的行人轨迹提取在公共安全中的作用越来越突出。针对无人机视频中行人目标偏小,行人检测跟踪效果容易被场景中障碍物遮挡的问题,本文分析了基于检测的多目标跟踪算法框架,以YOLOv5为目标检测模型,通过kmemeans ++聚类方法得到较好的锚帧。同时,将CBAM关注模块集成到YOLOv5网络中,实现小目标特征的有效提取;与Deep_SORT是一个目标跟踪模型。通过计算轨迹置信度,提出了一种改进的相关匹配跟踪算法框架,解决了行人被遮挡导致的轨迹断裂问题,为无人机视频中提取完整可靠的行人轨迹信息提供了有力保障。本文的mAP在VisDrone2019-DET数据集上为49.1%,MOTA在VisDrone2019-MOT数据集上为48.0%。实验表明,本文提出的行人轨迹提取方法能够提取出更加稳定、连续的行人轨迹。
{"title":"Pedestrian Trajectory Extraction Method Based on UAV Video","authors":"Peihan Shang, Xuan Zhou, Jinxing Hu","doi":"10.1109/ICCC56324.2022.10065641","DOIUrl":"https://doi.org/10.1109/ICCC56324.2022.10065641","url":null,"abstract":"With the development of UAV technology, pedestrian trajectory extraction based on UAV video plays an increasingly prominent role in public safety. Aiming at the problems of small pedestrian targets in UAV video and the effect of pedestrian detection and tracking is easily blocked by obstacles in the scene, this paper analyzes the multi-target tracking algorithm framework based on detection, takes YOLOv5 as the target detection model, and gets a better anchor frame through KMeans++ clustering method. At the same time, CBAM attention module is integrated into YOLOv5 network to realize the effective extraction of small target features; With Deep_SORT is a target tracking model. By calculating the confidence of the trajectory, an improved correlation matching tracking algorithm framework is proposed to solve the problems of trajectory fracture caused by pedestrians being blocked, and provide a strong guarantee for extracting complete and reliable pedestrian trajectory information in UAV video. The mAP of this paper is 49.1 % on the VisDrone2019-DET dataset, and the MOTA is 48.0% on the VisDrone2019-MOT dataset. Experiments show that the pedestrian trajectory extraction method in this paper can extract more stable and continuous pedestrian trajectory.","PeriodicalId":263098,"journal":{"name":"2022 IEEE 8th International Conference on Computer and Communications (ICCC)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133020711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Resource Allocation Policy for Cloud Edge End Framework by Reinforcement Learning 基于强化学习的云边缘框架高效资源分配策略
Pub Date : 2022-12-09 DOI: 10.1109/ICCC56324.2022.10065844
Chun-An Yang, Hongli Xu, Shixiao Fan, Xuan Cheng, Minghui Liu, Xiaomin Wang
Recently, Mobile Edge Cloud Computing (MECC) emerges as a promising partial offloading paradigm to provide computing services. However, the design of computation resource allocation policies for the MECC network inevitably encounters a challenging delay-sensitive two-queue optimization problem. Specifically, the coupled computation resource allocation of edge processing queue and cloud processing queue makes it difficult to guarantee the end-to-end delay requirements. This study investigates this problem with the stochasticity of computation request arrival, service time, and dynamic computation resources. We first model the MECC network as a two-stage tandem queue that consists of two sequential computation processing queues with multiple servers. A Deep Reinforcement Learning (DRL) algorithm, is then applied to learn a computation speed adjusting policy for the tandem queue, which can provide end-to-end delay insurance for multiple mobile applications while preventing the total computation resources of edge servers and cloud servers from overuse. Finally, extensive simulation results demonstrate that our approach can achieve better performance than others in dynamic network environment.
最近,移动边缘云计算(MECC)作为一种有前途的部分卸载模式出现,以提供计算服务。然而,MECC网络的计算资源分配策略设计不可避免地遇到一个具有挑战性的延迟敏感双队列优化问题。具体来说,边缘处理队列和云处理队列的耦合计算资源分配使得端到端延迟需求难以保证。本文从计算请求到达、服务时间和动态计算资源的随机性出发,对该问题进行了研究。我们首先将MECC网络建模为一个两阶段串联队列,该队列由两个具有多个服务器的顺序计算处理队列组成。然后,应用深度强化学习(DRL)算法学习串联队列的计算速度调整策略,该策略可以为多个移动应用提供端到端延迟保障,同时防止边缘服务器和云服务器的总计算资源被过度使用。最后,大量的仿真结果表明,我们的方法在动态网络环境下可以取得比其他方法更好的性能。
{"title":"Efficient Resource Allocation Policy for Cloud Edge End Framework by Reinforcement Learning","authors":"Chun-An Yang, Hongli Xu, Shixiao Fan, Xuan Cheng, Minghui Liu, Xiaomin Wang","doi":"10.1109/ICCC56324.2022.10065844","DOIUrl":"https://doi.org/10.1109/ICCC56324.2022.10065844","url":null,"abstract":"Recently, Mobile Edge Cloud Computing (MECC) emerges as a promising partial offloading paradigm to provide computing services. However, the design of computation resource allocation policies for the MECC network inevitably encounters a challenging delay-sensitive two-queue optimization problem. Specifically, the coupled computation resource allocation of edge processing queue and cloud processing queue makes it difficult to guarantee the end-to-end delay requirements. This study investigates this problem with the stochasticity of computation request arrival, service time, and dynamic computation resources. We first model the MECC network as a two-stage tandem queue that consists of two sequential computation processing queues with multiple servers. A Deep Reinforcement Learning (DRL) algorithm, is then applied to learn a computation speed adjusting policy for the tandem queue, which can provide end-to-end delay insurance for multiple mobile applications while preventing the total computation resources of edge servers and cloud servers from overuse. Finally, extensive simulation results demonstrate that our approach can achieve better performance than others in dynamic network environment.","PeriodicalId":263098,"journal":{"name":"2022 IEEE 8th International Conference on Computer and Communications (ICCC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133504661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 IEEE 8th International Conference on Computer and Communications (ICCC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1