首页 > 最新文献

2022 IEEE 8th International Conference on Computer and Communications (ICCC)最新文献

英文 中文
MMES: Improved Mayfly Algorithm Based on Electrostatic Optimization Algorithm 基于静电优化算法的改进Mayfly算法
Pub Date : 2022-12-09 DOI: 10.1109/ICCC56324.2022.10065995
Shaojie He, Bihui Yu, Jingxuan Wei, Liping Bu
Cloud computing divides a huge program into countless subtasks through the network, which are calculated and analyzed by multiple servers, and then the results are returned to users. Therefore, the strategy of task scheduling is very important for computing performance. Aiming at the essence of cloud computing task scheduling and the optimization problem of seeking solutions, this paper proposes a hybrid algorithm called MMES algorithm (MA-MIX-ESDA). This algorithm not only guarantees the search space of electrostatic discharge algorithm (ESDA), but also accelerates its convergence speed, and solves the problem that mayfly algorithm (MA) is easy to fall into local optimization. Latin hypercube sampling is used for population initialization, exploration and development are balanced by the direction of the balance vector, and the step size control factor is added to jump out of local optimization. In order to evaluate the performance of the algorithm, 23 groups of test functions commonly used by CEC and 30 benchmark functions of CEC2014 are used to test the global search and local development functions of the algorithm, and the results are compared with the improved algorithm and classical algorithm. Experimental results show that the proposed MMES algorithm is more superior in search space and convergence speed.
云计算通过网络将一个庞大的程序划分为无数个子任务,由多台服务器进行计算和分析,然后将结果返回给用户。因此,任务调度策略对计算性能至关重要。针对云计算任务调度的本质和寻解的优化问题,本文提出了一种称为MMES算法(MA-MIX-ESDA)的混合算法。该算法既保证了静电放电算法(ESDA)的搜索空间,又加快了其收敛速度,解决了蜉蝣算法(MA)容易陷入局部寻优的问题。采用拉丁超立方体采样进行种群初始化,通过平衡向量的方向平衡勘探与开发,并加入步长控制因子跳出局部优化。为了评价算法的性能,利用CEC常用的23组测试函数和CEC2014的30个基准函数对算法的全局搜索和局部开发函数进行了测试,并将结果与改进算法和经典算法进行了比较。实验结果表明,该算法在搜索空间和收敛速度上具有更大的优势。
{"title":"MMES: Improved Mayfly Algorithm Based on Electrostatic Optimization Algorithm","authors":"Shaojie He, Bihui Yu, Jingxuan Wei, Liping Bu","doi":"10.1109/ICCC56324.2022.10065995","DOIUrl":"https://doi.org/10.1109/ICCC56324.2022.10065995","url":null,"abstract":"Cloud computing divides a huge program into countless subtasks through the network, which are calculated and analyzed by multiple servers, and then the results are returned to users. Therefore, the strategy of task scheduling is very important for computing performance. Aiming at the essence of cloud computing task scheduling and the optimization problem of seeking solutions, this paper proposes a hybrid algorithm called MMES algorithm (MA-MIX-ESDA). This algorithm not only guarantees the search space of electrostatic discharge algorithm (ESDA), but also accelerates its convergence speed, and solves the problem that mayfly algorithm (MA) is easy to fall into local optimization. Latin hypercube sampling is used for population initialization, exploration and development are balanced by the direction of the balance vector, and the step size control factor is added to jump out of local optimization. In order to evaluate the performance of the algorithm, 23 groups of test functions commonly used by CEC and 30 benchmark functions of CEC2014 are used to test the global search and local development functions of the algorithm, and the results are compared with the improved algorithm and classical algorithm. Experimental results show that the proposed MMES algorithm is more superior in search space and convergence speed.","PeriodicalId":263098,"journal":{"name":"2022 IEEE 8th International Conference on Computer and Communications (ICCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129795394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Group-Correlated Privacy Protection Trajectory Publishing Method Based on Differential Privacy 基于差分隐私的组相关隐私保护轨迹发布方法
Pub Date : 2022-12-09 DOI: 10.1109/ICCC56324.2022.10066004
Xinjian Zhao, Fei Xia, Guoquan Yuan, Shi Chen, Hu Song
The group relationship (Community Relation) contained in the trajectory data can be used for hot spot exploration, community governance, and traffic diversion, which has broad application prospects. Trajectory group association privacy refers to the user relationship with a similar movement mode in the trajectory data. Publishing trajectory data to analysts without protection will cause the leakage of such privacy. Recently, trajectory correlation privacy has attracted the attention of researchers, proposing solutions based on differential privacy. Still, existing methods are limited to protecting the motion patterns of two users and cannot be used in multi-user scenarios. Moreover, existing methods use heuristic strategies to reconstruct trajectories, which have excessive noise increase and large loss of published trajectory availability. Because of the above problems, we design a probability differentiation tree (PDT) structure to describe the user's movement pattern, then define the probability differentiation tree similarity function. A noise probability differentiation tree generation algorithm (NPDT) is proposed to realize the trajectory of user-associated privacy protection by adding Laplace noise to the probability value of PDT. We also propose the trajectory reconstruction algorithm (TRA) to reconstruct each user trajectory through the noise probability differentiation tree, noise trajectory number distribution, and noise trajectory length distribution to form the final published trajectory data set. Theoretical analysis and experimental results show that the proposed privacy protection method effectively maintains the availability of trajectory data while improving the privacy protection intensity of group association.
轨迹数据中包含的群体关系(Community Relation)可用于热点探索、社区治理和交通疏导,具有广阔的应用前景。轨迹组关联隐私是指轨迹数据中具有相似运动模式的用户关系。将轨迹数据在没有保护的情况下发布给分析人员,会导致这种隐私的泄露。近年来,轨迹相关隐私引起了研究者的关注,并提出了基于差分隐私的解决方案。然而,现有的方法仅限于保护两个用户的运动模式,不能用于多用户场景。此外,现有的方法采用启发式策略重建轨迹,存在噪声增加过大和已发布轨迹可用性损失大的问题。针对上述问题,设计了一种概率微分树(PDT)结构来描述用户的运动模式,并定义了概率微分树相似度函数。提出了一种噪声概率微分树生成算法(NPDT),通过在PDT的概率值中加入拉普拉斯噪声来实现用户关联隐私保护的轨迹。我们还提出了轨迹重建算法(TRA),通过噪声概率分化树、噪声轨迹数分布和噪声轨迹长度分布来重建每个用户的轨迹,形成最终发布的轨迹数据集。理论分析和实验结果表明,所提出的隐私保护方法在提高群关联隐私保护强度的同时,有效地保持了轨迹数据的可用性。
{"title":"A Group-Correlated Privacy Protection Trajectory Publishing Method Based on Differential Privacy","authors":"Xinjian Zhao, Fei Xia, Guoquan Yuan, Shi Chen, Hu Song","doi":"10.1109/ICCC56324.2022.10066004","DOIUrl":"https://doi.org/10.1109/ICCC56324.2022.10066004","url":null,"abstract":"The group relationship (Community Relation) contained in the trajectory data can be used for hot spot exploration, community governance, and traffic diversion, which has broad application prospects. Trajectory group association privacy refers to the user relationship with a similar movement mode in the trajectory data. Publishing trajectory data to analysts without protection will cause the leakage of such privacy. Recently, trajectory correlation privacy has attracted the attention of researchers, proposing solutions based on differential privacy. Still, existing methods are limited to protecting the motion patterns of two users and cannot be used in multi-user scenarios. Moreover, existing methods use heuristic strategies to reconstruct trajectories, which have excessive noise increase and large loss of published trajectory availability. Because of the above problems, we design a probability differentiation tree (PDT) structure to describe the user's movement pattern, then define the probability differentiation tree similarity function. A noise probability differentiation tree generation algorithm (NPDT) is proposed to realize the trajectory of user-associated privacy protection by adding Laplace noise to the probability value of PDT. We also propose the trajectory reconstruction algorithm (TRA) to reconstruct each user trajectory through the noise probability differentiation tree, noise trajectory number distribution, and noise trajectory length distribution to form the final published trajectory data set. Theoretical analysis and experimental results show that the proposed privacy protection method effectively maintains the availability of trajectory data while improving the privacy protection intensity of group association.","PeriodicalId":263098,"journal":{"name":"2022 IEEE 8th International Conference on Computer and Communications (ICCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129633604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Power Optimization for Intelligent Reconfigurable Surfaces in Indoor Environment Using Discrete Phase and Amplitude Shifts 基于离散相移和幅移的室内环境智能可重构曲面功率优化
Pub Date : 2022-12-09 DOI: 10.1109/ICCC56324.2022.10065691
Emad Naji, Bin Dai
Reconfigurable Intelligent Surfaces (RISs) have the ability to make the concept of smart radio environments a reality, by utilizing the special characteristics of meta-surfaces. In this paper, we discuss how an IRS-assisted enhance link quality and coverage between an access point (AP) located on a wall and an antenna user in an indoor environment. specifically, we formulate and solve a non-convex constraint issue to minimize transmit power at the antenna of the transmitter and maximize the received power at user-end by optimizing both phase/amplitude shifts, as well as maximizing Energy Efficiency (EE) by proposing an Optimizing Alternating (OA) technique to solve that issue. The result of simulation show that IRS helps the indoor environment to gain a strong signal and make a virtual link between the AP and USER. Moreover, it is verified that the IRS by joint amplitude/phase shifts and OA are able to make a significant improvement of about 10 dBm by maximizing both discrete phase/amplitude shifts. Also, the IRS be able to create “signal hot-spots” in some points between the IRS and USER to deliver a strong signal and produce 30% improvement as well as maximizing the energy efficiency and keep it highest until 30 dB of (signal to noise ratio) SNR. In this paper, we assume that the user is in a bad situation and not be able to receive a good signal from the base station in which by helping RIS the user receives a higher SNR. Finally, we compare our work with a reference system that only uses non-direct NLOS transmission.
可重构智能表面(RISs)能够利用元表面的特殊特性,使智能无线电环境的概念成为现实。在本文中,我们讨论了irs辅助如何提高位于墙壁上的接入点(AP)与室内环境中的天线用户之间的链路质量和覆盖范围。具体而言,我们制定并解决了一个非凸约束问题,通过优化相位/幅度位移来最小化发射机天线的发射功率并最大化用户端的接收功率,并通过提出优化交替(OA)技术来最大化能源效率(EE)来解决该问题。仿真结果表明,IRS有助于室内环境获得强信号,并在AP和用户之间建立虚拟链路。此外,还验证了由振幅/相移和OA联合产生的IRS能够通过最大限度地提高离散相/幅移来实现约10 dBm的显著改进。此外,IRS能够在IRS和用户之间的某些点上创建“信号热点”,以提供强信号并产生30%的改进,同时最大限度地提高能源效率,并保持最高的SNR直到30 dB(信噪比)。在本文中,我们假设用户处于恶劣的情况,无法从基站接收到良好的信号,通过帮助RIS,用户接收到更高的信噪比。最后,我们将我们的工作与仅使用非直接NLOS传输的参考系统进行了比较。
{"title":"Power Optimization for Intelligent Reconfigurable Surfaces in Indoor Environment Using Discrete Phase and Amplitude Shifts","authors":"Emad Naji, Bin Dai","doi":"10.1109/ICCC56324.2022.10065691","DOIUrl":"https://doi.org/10.1109/ICCC56324.2022.10065691","url":null,"abstract":"Reconfigurable Intelligent Surfaces (RISs) have the ability to make the concept of smart radio environments a reality, by utilizing the special characteristics of meta-surfaces. In this paper, we discuss how an IRS-assisted enhance link quality and coverage between an access point (AP) located on a wall and an antenna user in an indoor environment. specifically, we formulate and solve a non-convex constraint issue to minimize transmit power at the antenna of the transmitter and maximize the received power at user-end by optimizing both phase/amplitude shifts, as well as maximizing Energy Efficiency (EE) by proposing an Optimizing Alternating (OA) technique to solve that issue. The result of simulation show that IRS helps the indoor environment to gain a strong signal and make a virtual link between the AP and USER. Moreover, it is verified that the IRS by joint amplitude/phase shifts and OA are able to make a significant improvement of about 10 dBm by maximizing both discrete phase/amplitude shifts. Also, the IRS be able to create “signal hot-spots” in some points between the IRS and USER to deliver a strong signal and produce 30% improvement as well as maximizing the energy efficiency and keep it highest until 30 dB of (signal to noise ratio) SNR. In this paper, we assume that the user is in a bad situation and not be able to receive a good signal from the base station in which by helping RIS the user receives a higher SNR. Finally, we compare our work with a reference system that only uses non-direct NLOS transmission.","PeriodicalId":263098,"journal":{"name":"2022 IEEE 8th International Conference on Computer and Communications (ICCC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127206930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ontology-Based Knowledge Graph Construction and Application for Large Workpiece Forging 基于本体的大工件锻造知识图谱构建及应用
Pub Date : 2022-12-09 DOI: 10.1109/ICCC56324.2022.10065699
YiYan Duan, Yong Liu
Due to the advent of the big data era and the redundancy of industrial data, people use a series of information technologies to continuously promote the transformation of traditional industry, and the development of industry is bound to move into the era of intelligence. The article carries out the construction of process knowledge mapping on the existing industrial process design scheme, constructs a process ontology model through industrial specifications, starts from acquiring data from industrial archives, identification of industrial entities, extraction of relationships between industrial entities and fusion of process knowledge, and constructs a process assembly knowledge mapping in the forging field by storing the acquired process data into the graph database, and finally The visualization display of data storage based on database Neo4j is realized. The experimental results have verified the feasibility of the designed diagram.
由于大数据时代的到来和工业数据的冗余,人们利用一系列信息技术不断推动传统工业的转型,工业的发展必然会进入智能化时代。本文在现有工业流程设计方案上进行流程知识映射的构建,通过工业规范构建流程本体模型,从获取工业档案数据、识别工业实体、提取工业实体之间的关系、融合工艺知识等方面入手,通过将采集到的工艺数据存储到图形数据库中,构建锻造领域的工艺装配知识图谱,最后实现了基于数据库Neo4j的数据存储可视化显示。实验结果验证了设计方案的可行性。
{"title":"Ontology-Based Knowledge Graph Construction and Application for Large Workpiece Forging","authors":"YiYan Duan, Yong Liu","doi":"10.1109/ICCC56324.2022.10065699","DOIUrl":"https://doi.org/10.1109/ICCC56324.2022.10065699","url":null,"abstract":"Due to the advent of the big data era and the redundancy of industrial data, people use a series of information technologies to continuously promote the transformation of traditional industry, and the development of industry is bound to move into the era of intelligence. The article carries out the construction of process knowledge mapping on the existing industrial process design scheme, constructs a process ontology model through industrial specifications, starts from acquiring data from industrial archives, identification of industrial entities, extraction of relationships between industrial entities and fusion of process knowledge, and constructs a process assembly knowledge mapping in the forging field by storing the acquired process data into the graph database, and finally The visualization display of data storage based on database Neo4j is realized. The experimental results have verified the feasibility of the designed diagram.","PeriodicalId":263098,"journal":{"name":"2022 IEEE 8th International Conference on Computer and Communications (ICCC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127293171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Offensive Language Identification Based on Deep Semantic Feature Fusion 基于深度语义特征融合的攻击性语言识别
Pub Date : 2022-12-09 DOI: 10.1109/ICCC56324.2022.10066011
Xiang Li, Zhi Zeng, Mingmin Wu, Zhongqiang Huang, Ying Sha, Lei Shi
Various forms of social interactions are often char-acterized by toxic or offensive words that can be collectively referred to as offensive languages, which has become a unique linguistic phenomenon in social media platforms. How to detect and identify these offensive languages in social media platforms has become one of the important research in the field of natural language processing. Existing methods utilize machine learning algorithms or text representation models based on deep learning to learn the features of offensive languages and identify them, which have achieved good performances. However, traditional machine learning-based methods mainly rely on keyword identi-fication and blocking, deep learning-based methods do not ade-quately explore the fused deep semantic features of the content by combining word-level embeddings and sentence-level deep semantic feature representations of sentences, which cannot ef-fectively identify offensive languages that do not contain common offensive words but indicate offensive meanings. In this research, we propose a novel offensive language identification model based on deep semantic feature fusion, which uses the pre-trained model Bert to obtain word-level embedding representations of offensive languages, and then integrates the RCNN that combines with the attention mechanism to extract the fused deep semantic feature representations of offensive languages, and label encoder and offensive predictor to improve the identification accuracy and generalization ability of the model so that the performances of the model do not rely on the offensive language lexicon entirely and can identify offensive languages that do not contain common offensive words but indicate offensive meanings. Experimental results on Wikipedia and Twitter comment datasets show that our proposed model can better understand the context and discover potential offensive meanings, and outperforms existing methods.
在各种形式的社交互动中,往往会出现有毒或冒犯性的词语,这些词语可以统称为冒犯性语言,这已经成为社交媒体平台上一种独特的语言现象。如何在社交媒体平台上检测和识别这些攻击性语言已经成为自然语言处理领域的重要研究之一。现有方法利用机器学习算法或基于深度学习的文本表示模型来学习攻击性语言的特征并进行识别,已经取得了较好的效果。然而,传统的基于机器学习的方法主要依赖于关键词识别和拦截,而基于深度学习的方法并没有通过结合词级嵌入和句子级深度语义特征表示来充分挖掘内容融合的深度语义特征,无法有效识别不包含常见攻击性词汇但表示攻击性含义的攻击性语言。在本研究中,我们提出了一种新的基于深度语义特征融合的攻击性语言识别模型,该模型使用预训练的Bert模型获得攻击性语言的词级嵌入表征,然后集成与注意机制相结合的RCNN提取融合的攻击性语言的深度语义特征表征。并通过标签编码器和攻击性预测器来提高模型的识别精度和泛化能力,使模型的性能不完全依赖于攻击性语言词汇,能够识别不包含常见攻击性词汇但表示攻击性含义的攻击性语言。在维基百科和Twitter评论数据集上的实验结果表明,我们提出的模型可以更好地理解上下文并发现潜在的冒犯性含义,并且优于现有的方法。
{"title":"An Offensive Language Identification Based on Deep Semantic Feature Fusion","authors":"Xiang Li, Zhi Zeng, Mingmin Wu, Zhongqiang Huang, Ying Sha, Lei Shi","doi":"10.1109/ICCC56324.2022.10066011","DOIUrl":"https://doi.org/10.1109/ICCC56324.2022.10066011","url":null,"abstract":"Various forms of social interactions are often char-acterized by toxic or offensive words that can be collectively referred to as offensive languages, which has become a unique linguistic phenomenon in social media platforms. How to detect and identify these offensive languages in social media platforms has become one of the important research in the field of natural language processing. Existing methods utilize machine learning algorithms or text representation models based on deep learning to learn the features of offensive languages and identify them, which have achieved good performances. However, traditional machine learning-based methods mainly rely on keyword identi-fication and blocking, deep learning-based methods do not ade-quately explore the fused deep semantic features of the content by combining word-level embeddings and sentence-level deep semantic feature representations of sentences, which cannot ef-fectively identify offensive languages that do not contain common offensive words but indicate offensive meanings. In this research, we propose a novel offensive language identification model based on deep semantic feature fusion, which uses the pre-trained model Bert to obtain word-level embedding representations of offensive languages, and then integrates the RCNN that combines with the attention mechanism to extract the fused deep semantic feature representations of offensive languages, and label encoder and offensive predictor to improve the identification accuracy and generalization ability of the model so that the performances of the model do not rely on the offensive language lexicon entirely and can identify offensive languages that do not contain common offensive words but indicate offensive meanings. Experimental results on Wikipedia and Twitter comment datasets show that our proposed model can better understand the context and discover potential offensive meanings, and outperforms existing methods.","PeriodicalId":263098,"journal":{"name":"2022 IEEE 8th International Conference on Computer and Communications (ICCC)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130756313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Feature Fusion Using Attention for Small Object Detection 基于注意力增强特征融合的小目标检测
Pub Date : 2022-12-09 DOI: 10.1109/ICCC56324.2022.10066003
Jie Li, Yanxiang Gong, Zheng Ma, M. Xie
At present, object detection performance can meet some routine tasks' requirements. However, the detection performance for small-sized objects is far from satisfactory. Therefore, we propose the feature layer attention module and nonlinear positioning loss penalty based on size to improve small object detection performance. Our work proposes the feature layer attention module, which introduces an attention mechanism in the feature layer to enhance the model's attention to small objects. Through the feature fusion scheme proposed in this paper, we solve the problem of insufficient features of small objects to a certain extent and reduce the difficulty of model training. Besides, we introduce a size-based nonlinear penalty in the loss function, which can enhance the penalty for small object positioning errors. The effectiveness of our method has been demonstrated on small object data sets. On VisDrone2019 dataset, the proposed method improves the detection's AP by 2.2%. On TT100k dataset, the proposed method improves the detection's AP by 1.0%.
目前,目标检测性能可以满足一些常规任务的要求。然而,对于小尺寸物体的检测性能还远远不能令人满意。为此,我们提出了特征层关注模块和基于尺寸的非线性定位损失惩罚来提高小目标检测性能。本文提出了特征层关注模块,在特征层引入关注机制,增强模型对小目标的关注。通过本文提出的特征融合方案,在一定程度上解决了小目标特征不足的问题,降低了模型训练的难度。此外,我们在损失函数中引入了基于尺寸的非线性惩罚,可以增强对小目标定位误差的惩罚。该方法的有效性已在小型对象数据集上得到了验证。在VisDrone2019数据集上,该方法将检测的AP提高了2.2%。在TT100k数据集上,该方法将检测的AP提高了1.0%。
{"title":"Enhancing Feature Fusion Using Attention for Small Object Detection","authors":"Jie Li, Yanxiang Gong, Zheng Ma, M. Xie","doi":"10.1109/ICCC56324.2022.10066003","DOIUrl":"https://doi.org/10.1109/ICCC56324.2022.10066003","url":null,"abstract":"At present, object detection performance can meet some routine tasks' requirements. However, the detection performance for small-sized objects is far from satisfactory. Therefore, we propose the feature layer attention module and nonlinear positioning loss penalty based on size to improve small object detection performance. Our work proposes the feature layer attention module, which introduces an attention mechanism in the feature layer to enhance the model's attention to small objects. Through the feature fusion scheme proposed in this paper, we solve the problem of insufficient features of small objects to a certain extent and reduce the difficulty of model training. Besides, we introduce a size-based nonlinear penalty in the loss function, which can enhance the penalty for small object positioning errors. The effectiveness of our method has been demonstrated on small object data sets. On VisDrone2019 dataset, the proposed method improves the detection's AP by 2.2%. On TT100k dataset, the proposed method improves the detection's AP by 1.0%.","PeriodicalId":263098,"journal":{"name":"2022 IEEE 8th International Conference on Computer and Communications (ICCC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132500495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced Connectivity of Aerial 3D Mesh Network with Directional Antennas 定向天线增强空中三维网格网络的连通性
Pub Date : 2022-12-09 DOI: 10.1109/ICCC56324.2022.10065801
Shenghong Qin, Laixian Peng, Renhui Xu, Bili Wang
This paper considers an Aerial 3D Mesh Network (A3DMN) with unmanned aerial vehicles (UAVs). The spatial distribution of UAVs in A3DMN plays a crucial role in evaluating mutual interference and connectivity performance. This paper analyzes how antenna directionality affects network connectivity under interference constraints without any channel contention or transmission power control. We introduce an intermediate class ß-Ginibre Point Processes (ß-GPP) between the Poisson point process (PPP) and the GPP as a model for the A3DMN when UAVs exhibit repulsion. The closed-form expressions for connection probability and network coverage radius are derived by stochastic-geometry tools. Simulation results show that the derived theoretical expressions accurately reflect the influence of antenna directivity on the performance of the A3DMN. The results indicate that the directionality of transmitter antennas and the regularity of transmitter location distribution help to improve network connectivity.
本文研究了一种无人机空中三维网格网络(A3DMN)。无人机在A3DMN中的空间分布对相互干扰和连通性的评估起着至关重要的作用。本文分析了在无信道争用和传输功率控制的干扰条件下,天线方向性对网络连通性的影响。我们在泊松点过程(PPP)和GPP之间引入了一个中间类ß-Ginibre点过程(ß-GPP),作为无人机表现排斥时A3DMN的模型。利用随机几何工具导出了连接概率和网络覆盖半径的封闭表达式。仿真结果表明,推导的理论表达式准确地反映了天线指向性对A3DMN性能的影响。结果表明,发射机天线的方向性和发射机位置分布的规律性有助于提高网络的连通性。
{"title":"Enhanced Connectivity of Aerial 3D Mesh Network with Directional Antennas","authors":"Shenghong Qin, Laixian Peng, Renhui Xu, Bili Wang","doi":"10.1109/ICCC56324.2022.10065801","DOIUrl":"https://doi.org/10.1109/ICCC56324.2022.10065801","url":null,"abstract":"This paper considers an Aerial 3D Mesh Network (A3DMN) with unmanned aerial vehicles (UAVs). The spatial distribution of UAVs in A3DMN plays a crucial role in evaluating mutual interference and connectivity performance. This paper analyzes how antenna directionality affects network connectivity under interference constraints without any channel contention or transmission power control. We introduce an intermediate class ß-Ginibre Point Processes (ß-GPP) between the Poisson point process (PPP) and the GPP as a model for the A3DMN when UAVs exhibit repulsion. The closed-form expressions for connection probability and network coverage radius are derived by stochastic-geometry tools. Simulation results show that the derived theoretical expressions accurately reflect the influence of antenna directivity on the performance of the A3DMN. The results indicate that the directionality of transmitter antennas and the regularity of transmitter location distribution help to improve network connectivity.","PeriodicalId":263098,"journal":{"name":"2022 IEEE 8th International Conference on Computer and Communications (ICCC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131948990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fraud Call Identification Based on Broad Learning System and Convolutional Neural Networks 基于广义学习系统和卷积神经网络的诈骗呼叫识别
Pub Date : 2022-12-09 DOI: 10.1109/ICCC56324.2022.10065991
Songze Li, Guoliang Xu, Yang Liu
In recent years, fraudulent methods are constantly updated, criminal information is more hidden, and there is a problem of subjectivity of artificial feature design in traditional model feature engineering. To address this problem, a model based on broad learning and dual-channel convolutional neural network is proposed (BLS-DCCNN). First, the broad learning system is transformed from a supervised prediction method to an integrated feature generation method to generate mapped features and enhanced features for the original data. Then, the generated features are reconstructed to integrate the module to reconstruct the data distribution. Finally, a dual-channel convolutional neural network is combined with the shallow and deep layer network structure to extract global and local features, predict the final category labels, and introduce the Focal Loss function is introduced to solve the problem of positive and negative sample imbalance. Experiments and model comparisons are conducted on real telecommunication datasets, and the exper-imental results show that the model has significantly improved both accuracy, recall and F1 scores compared with traditional machine learning models such as support vector machines and random forests, and deep learning models such as long and short term memory networks.
近年来,诈骗手段不断更新,犯罪信息更加隐蔽,传统的模型特征工程存在人工特征设计主观性问题。为了解决这一问题,提出了一种基于广义学习和双通道卷积神经网络的模型(BLS-DCCNN)。首先,将广义学习系统从监督预测方法转化为综合特征生成方法,对原始数据生成映射特征和增强特征;然后,对生成的特征进行重构,整合模块重构数据分布。最后,将双通道卷积神经网络与浅层和深层网络结构相结合,提取全局和局部特征,预测最终的类别标签,并引入Focal Loss函数来解决正负样本不平衡问题。在真实的电信数据集上进行了实验和模型比较,实验结果表明,与传统的机器学习模型(如支持向量机和随机森林)以及深度学习模型(如长短期记忆网络)相比,该模型在准确率、召回率和F1分数方面都有显著提高。
{"title":"Fraud Call Identification Based on Broad Learning System and Convolutional Neural Networks","authors":"Songze Li, Guoliang Xu, Yang Liu","doi":"10.1109/ICCC56324.2022.10065991","DOIUrl":"https://doi.org/10.1109/ICCC56324.2022.10065991","url":null,"abstract":"In recent years, fraudulent methods are constantly updated, criminal information is more hidden, and there is a problem of subjectivity of artificial feature design in traditional model feature engineering. To address this problem, a model based on broad learning and dual-channel convolutional neural network is proposed (BLS-DCCNN). First, the broad learning system is transformed from a supervised prediction method to an integrated feature generation method to generate mapped features and enhanced features for the original data. Then, the generated features are reconstructed to integrate the module to reconstruct the data distribution. Finally, a dual-channel convolutional neural network is combined with the shallow and deep layer network structure to extract global and local features, predict the final category labels, and introduce the Focal Loss function is introduced to solve the problem of positive and negative sample imbalance. Experiments and model comparisons are conducted on real telecommunication datasets, and the exper-imental results show that the model has significantly improved both accuracy, recall and F1 scores compared with traditional machine learning models such as support vector machines and random forests, and deep learning models such as long and short term memory networks.","PeriodicalId":263098,"journal":{"name":"2022 IEEE 8th International Conference on Computer and Communications (ICCC)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131014627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fairness-Efficiency Tradeoff Allocation with Meta-Types in Cloud Computing 云计算中基于元类型的公平-效率权衡分配
Pub Date : 2022-12-09 DOI: 10.1109/ICCC56324.2022.10065880
Feng-Qin Zhang, Xingxi Li, Weidong Li, Xuejie Zhang
We study the problem of multiple resource allocation in cloud computing systems. Existing fairness-efficiency scheduling procedures can relax fairness constraints by using a knob to improve efficiency. However, these approaches do not take into account users with special needs, i.e., the same resource (meta-type, e.g., CPU) contains different types (e.g., Intel's CPU, AMD's CPU) and the user can only use a specific type of resources (e.g., Intel's CPU). We propose a new allocation mechanism called Fairness-Efficiency Tradeoff Allocation with Meta-Types (FET-MT), which introduces the concept of meta-types. FET-MT not only meets specific requirements proposed by users but also allows users to flexibly balance fairness and efficiency by adjusting the knob values. Finally, we implemented the FET-MT method using GUROBI, and our experiments show that the running time of FET-MT is reduced by approximately a factor of 7 with respect to Maximum Nash Welfare (MNW) and discrete MNW and that FET-MT can still maintain good running efficiency as the number of users increases. The experimental results also show that FET-MT can obtain nearly twice the social welfare of MNW and DRF-MT, and the utilization of meta-types in the system is close to 100%.
研究了云计算系统中的多资源分配问题。现有的公平效率调度程序可以通过使用旋钮来提高效率,从而放松公平约束。然而,这些方法没有考虑到有特殊需求的用户,即相同的资源(元类型,如CPU)包含不同类型(如Intel的CPU, AMD的CPU),用户只能使用特定类型的资源(如Intel的CPU)。在引入元类型概念的基础上,提出了一种新的分配机制——公平-效率权衡分配(FET-MT)。FET-MT不仅可以满足用户提出的特定要求,还可以通过调节旋钮值来灵活地平衡公平性和效率。最后,我们使用GUROBI实现了FET-MT方法,我们的实验表明,FET-MT的运行时间相对于最大纳什福利(MNW)和离散MNW减少了大约7倍,并且随着用户数量的增加,FET-MT仍然可以保持良好的运行效率。实验结果还表明,FET-MT获得的社会福利是MNW和DRF-MT的近两倍,系统中元类型的利用率接近100%。
{"title":"Fairness-Efficiency Tradeoff Allocation with Meta-Types in Cloud Computing","authors":"Feng-Qin Zhang, Xingxi Li, Weidong Li, Xuejie Zhang","doi":"10.1109/ICCC56324.2022.10065880","DOIUrl":"https://doi.org/10.1109/ICCC56324.2022.10065880","url":null,"abstract":"We study the problem of multiple resource allocation in cloud computing systems. Existing fairness-efficiency scheduling procedures can relax fairness constraints by using a knob to improve efficiency. However, these approaches do not take into account users with special needs, i.e., the same resource (meta-type, e.g., CPU) contains different types (e.g., Intel's CPU, AMD's CPU) and the user can only use a specific type of resources (e.g., Intel's CPU). We propose a new allocation mechanism called Fairness-Efficiency Tradeoff Allocation with Meta-Types (FET-MT), which introduces the concept of meta-types. FET-MT not only meets specific requirements proposed by users but also allows users to flexibly balance fairness and efficiency by adjusting the knob values. Finally, we implemented the FET-MT method using GUROBI, and our experiments show that the running time of FET-MT is reduced by approximately a factor of 7 with respect to Maximum Nash Welfare (MNW) and discrete MNW and that FET-MT can still maintain good running efficiency as the number of users increases. The experimental results also show that FET-MT can obtain nearly twice the social welfare of MNW and DRF-MT, and the utilization of meta-types in the system is close to 100%.","PeriodicalId":263098,"journal":{"name":"2022 IEEE 8th International Conference on Computer and Communications (ICCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131246200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hazardous Entity Recommendation for Safety Production Inspection Based on Multi-task Learning 基于多任务学习的安全生产检查危险实体推荐
Pub Date : 2022-12-09 DOI: 10.1109/ICCC56324.2022.10065664
Xinyi Wang, Xinbo Ai, Yaniun Guo, Zhanghui Chen, Yichi Zhang
The large number and wide variety of hazardous entities is contradicted with the limited law enforcement strength of safety production, resulting in duplicate or missed inspections. In order to realize the key entity recommendation for safety production inspection, we introduce recommendation algorithms into this field. Data sparsity and cold start problems are inevitable in traditional recommendations, while knowledge graphs can be added as side information to solve the problems. Due to the strong sparsity of safety inspection data and the severe overfitting of existing models, we adaptively improve the multi-task learning algorithm by dividing the model into high layers and low layers and designing the structures respectively. A recommendation model based on multi-task learning and convolutional structures (CMKR) is proposed in this paper to provide better hazardous entity recommendations for safety production inspection. To solve the serious problem of over-fitting of the original multi-task learning algorithm, the convolutional neural network with the characteristics of sparse connection and weight sharing displaces a fully-connected multi-layer perceptron (MLP). ConvKB, an embedding model using CNN for the knowledge graph completion task is used at the high layers to improve the generalization ability of the model. In click-through rate prediction, ACC reaches 0.7061 and AUC reaches 0.7112 on hazardous entity recommendations of key sites. Compared with previous algorithms, the proposed method effectively controls the overfitting problem and improves the overall performance.
危险单位数量多、种类多,与安全生产执法力度有限相矛盾,造成重复检查或漏查现象。为了实现安全生产检查中的关键实体推荐,我们将推荐算法引入该领域。在传统的推荐中,数据稀疏和冷启动问题是不可避免的,而知识图可以作为辅助信息来解决这些问题。针对安全检测数据的强稀疏性和现有模型严重的过拟合问题,我们对多任务学习算法进行了自适应改进,将模型分为高层和低层,分别进行结构设计。为了更好地为安全生产检查提供危险实体推荐,提出了一种基于多任务学习和卷积结构(CMKR)的推荐模型。为了解决原有多任务学习算法严重的过拟合问题,利用具有稀疏连接和权值共享特性的卷积神经网络取代了全连接多层感知器(MLP)。在高层采用了基于CNN的知识图补全嵌入模型ConvKB,提高了模型的泛化能力。重点站点危险实体推荐的点击率预测ACC达到0.7061,AUC达到0.7112。与以往算法相比,该方法有效地控制了过拟合问题,提高了整体性能。
{"title":"Hazardous Entity Recommendation for Safety Production Inspection Based on Multi-task Learning","authors":"Xinyi Wang, Xinbo Ai, Yaniun Guo, Zhanghui Chen, Yichi Zhang","doi":"10.1109/ICCC56324.2022.10065664","DOIUrl":"https://doi.org/10.1109/ICCC56324.2022.10065664","url":null,"abstract":"The large number and wide variety of hazardous entities is contradicted with the limited law enforcement strength of safety production, resulting in duplicate or missed inspections. In order to realize the key entity recommendation for safety production inspection, we introduce recommendation algorithms into this field. Data sparsity and cold start problems are inevitable in traditional recommendations, while knowledge graphs can be added as side information to solve the problems. Due to the strong sparsity of safety inspection data and the severe overfitting of existing models, we adaptively improve the multi-task learning algorithm by dividing the model into high layers and low layers and designing the structures respectively. A recommendation model based on multi-task learning and convolutional structures (CMKR) is proposed in this paper to provide better hazardous entity recommendations for safety production inspection. To solve the serious problem of over-fitting of the original multi-task learning algorithm, the convolutional neural network with the characteristics of sparse connection and weight sharing displaces a fully-connected multi-layer perceptron (MLP). ConvKB, an embedding model using CNN for the knowledge graph completion task is used at the high layers to improve the generalization ability of the model. In click-through rate prediction, ACC reaches 0.7061 and AUC reaches 0.7112 on hazardous entity recommendations of key sites. Compared with previous algorithms, the proposed method effectively controls the overfitting problem and improves the overall performance.","PeriodicalId":263098,"journal":{"name":"2022 IEEE 8th International Conference on Computer and Communications (ICCC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129030990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2022 IEEE 8th International Conference on Computer and Communications (ICCC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1