首页 > 最新文献

2022 3rd Asia Conference on Computers and Communications (ACCC)最新文献

英文 中文
SVC-based and Flow Assignment Strategy for Multi-path Concurrent Video Transmission with Low-Latency 基于svc的低延迟多路径并发视频传输流分配策略
Pub Date : 2022-12-01 DOI: 10.1109/ACCC58361.2022.00025
Jiling Cai, F. Chen, Daoping Zhu, Pingping Chen
The most conventional approaches for multi-path concurrent video transmission with H264/AVC coding are considering the distribution strategy to improve the video transmission quality under strict delay constraints. However, guaranteeing the smooth playback of real-time video is a challenge for conventional solutions due to the fluctuating status and scarce resources of wireless networks and subject to stringent end-to-end latency and packet loss. In order to address these critical issues, this paper leverages the properties of Scalable Video Coding (SVC) coding and joints flow assignment strategies to improve video transmission performance. It effectively aggregates the channel resources in heterogeneous networks and determines different SVC layer streams delivered upon different communication path statuses. In addition, the SVC base layer resources reservation scheme is proposed to reserve sufficient resources for subsequent SVC base layer streams as the current SVC streams are allocated. The semi-physical experiment results show that the proposed algorithm achieves 4–8 dB higher PSNR transmission quality than the conventional schemes with the influence of network time-varying characteristics.
基于H264/AVC编码的多路径并发视频传输的传统方法是在严格的延迟约束下考虑分配策略以提高视频传输质量。然而,由于无线网络的状态波动和资源稀缺,以及严格的端到端延迟和丢包,保证实时视频的流畅播放对传统解决方案来说是一个挑战。为了解决这些关键问题,本文利用可扩展视频编码(SVC)编码的特性和关节流分配策略来提高视频传输性能。它有效地聚合了异构网络中的信道资源,并确定了在不同通信路径状态下交付的不同SVC层流。此外,提出SVC基础层资源预留方案,在当前SVC流分配的同时,为后续SVC基础层流预留足够的资源。半物理实验结果表明,在网络时变特性的影响下,该算法比传统方案的PSNR传输质量提高了4 ~ 8 dB。
{"title":"SVC-based and Flow Assignment Strategy for Multi-path Concurrent Video Transmission with Low-Latency","authors":"Jiling Cai, F. Chen, Daoping Zhu, Pingping Chen","doi":"10.1109/ACCC58361.2022.00025","DOIUrl":"https://doi.org/10.1109/ACCC58361.2022.00025","url":null,"abstract":"The most conventional approaches for multi-path concurrent video transmission with H264/AVC coding are considering the distribution strategy to improve the video transmission quality under strict delay constraints. However, guaranteeing the smooth playback of real-time video is a challenge for conventional solutions due to the fluctuating status and scarce resources of wireless networks and subject to stringent end-to-end latency and packet loss. In order to address these critical issues, this paper leverages the properties of Scalable Video Coding (SVC) coding and joints flow assignment strategies to improve video transmission performance. It effectively aggregates the channel resources in heterogeneous networks and determines different SVC layer streams delivered upon different communication path statuses. In addition, the SVC base layer resources reservation scheme is proposed to reserve sufficient resources for subsequent SVC base layer streams as the current SVC streams are allocated. The semi-physical experiment results show that the proposed algorithm achieves 4–8 dB higher PSNR transmission quality than the conventional schemes with the influence of network time-varying characteristics.","PeriodicalId":285531,"journal":{"name":"2022 3rd Asia Conference on Computers and Communications (ACCC)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129276444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on A Three-Dimensional Attention Module 三维注意模块的研究
Pub Date : 2022-12-01 DOI: 10.1109/ACCC58361.2022.00017
Yance Fang, Yucheng Xie, Peishun Liu
Most of the current attention algorithms focus on one-dimensional channel attention or two-dimensional positional attention, and the processed images are three-dimensional, so these attention modules often cannot focus on all the areas that need attention, resulting in some key information missing. The three-dimensional attention module is designed in this paper. it can obtain a three-dimensional image attention weight matrix by combining one-dimensional channel attention and two-dimensional position attention module, and can obtain a new image with attention allocation after calculation. this paper uses deep learning technology, combines the channel attention module and the position attention module, and designs a three-dimensional attention module. The three-dimensional attention module has good results in a variety of visual tasks. Compared with SENet, in Cifar100 dataset, ResNet50 as the main network added attention has a 1.12% improvement. On the PKU VehicleID dataset, it has an average 2% improvement over SENet.
目前的关注算法大多集中在一维通道关注或二维位置关注,处理后的图像是三维的,因此这些关注模块往往不能关注到所有需要关注的区域,从而导致一些关键信息的缺失。本文设计了三维注意力模块。将一维通道注意力与二维位置注意力模块相结合,得到三维图像注意力权重矩阵,计算后得到具有注意力分配的新图像。本文采用深度学习技术,将通道注意模块和位置注意模块相结合,设计了一个立体的注意模块。三维注意模块在各种视觉任务中都有很好的效果。与SENet相比,在Cifar100数据集中,ResNet50作为主网络增加注意力的效率提高了1.12%。在北京大学车辆id数据集上,它比SENet平均提高了2%。
{"title":"Research on A Three-Dimensional Attention Module","authors":"Yance Fang, Yucheng Xie, Peishun Liu","doi":"10.1109/ACCC58361.2022.00017","DOIUrl":"https://doi.org/10.1109/ACCC58361.2022.00017","url":null,"abstract":"Most of the current attention algorithms focus on one-dimensional channel attention or two-dimensional positional attention, and the processed images are three-dimensional, so these attention modules often cannot focus on all the areas that need attention, resulting in some key information missing. The three-dimensional attention module is designed in this paper. it can obtain a three-dimensional image attention weight matrix by combining one-dimensional channel attention and two-dimensional position attention module, and can obtain a new image with attention allocation after calculation. this paper uses deep learning technology, combines the channel attention module and the position attention module, and designs a three-dimensional attention module. The three-dimensional attention module has good results in a variety of visual tasks. Compared with SENet, in Cifar100 dataset, ResNet50 as the main network added attention has a 1.12% improvement. On the PKU VehicleID dataset, it has an average 2% improvement over SENet.","PeriodicalId":285531,"journal":{"name":"2022 3rd Asia Conference on Computers and Communications (ACCC)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126433236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Classification of Diabetic Retinopathy via Vascular Removal 糖尿病视网膜病变的血管切除分类
Pub Date : 2022-12-01 DOI: 10.1109/ACCC58361.2022.00023
Yingao Duan, Shi-Sheng Wang, Hui Chen
Diabetic retinopathy is one of the disabling complications of diabetes mellitus that causes the loss of central vision if not recognized and cured at the earlier stage. Existing classification models cannot accurately distinguish early diabetic retinopathy due to the influence of vascular venation. We proposed an image enhancement method for removing blood vessels: use multiple reduced even convolution kernels for mean filtering to blur and shift the vascular features at different levels in the original image. Further, we use convolution block attention module and generative adversarial network in the model, so that the model can weigh the pathological feature weights of different channels in the feature map and has larger feature space. We evaluate the proposed method on EyePACS dataset. It could effectively improve the accuracy of model as compared to use the images without removing blood vessels. The experimental results show that this method can solve the classification difficulty of normal, mild and moderate non-proliferative diabetic retinopathy to some extent.
糖尿病视网膜病变是糖尿病致残性并发症之一,如不及早发现和治疗,可导致中心视力丧失。现有的分类模型受脉管的影响,不能准确区分早期糖尿病视网膜病变。我们提出了一种去除血管的图像增强方法:使用多个降偶卷积核进行均值滤波,对原始图像中不同层次的血管特征进行模糊和移位。进一步,我们在模型中使用了卷积块注意模块和生成对抗网络,使模型能够权衡特征映射中不同通道的病态特征权重,具有更大的特征空间。我们在EyePACS数据集上对该方法进行了评估。与不去除血管的图像相比,可以有效提高模型的准确性。实验结果表明,该方法在一定程度上解决了正常、轻度和中度非增殖性糖尿病视网膜病变的分类困难。
{"title":"Classification of Diabetic Retinopathy via Vascular Removal","authors":"Yingao Duan, Shi-Sheng Wang, Hui Chen","doi":"10.1109/ACCC58361.2022.00023","DOIUrl":"https://doi.org/10.1109/ACCC58361.2022.00023","url":null,"abstract":"Diabetic retinopathy is one of the disabling complications of diabetes mellitus that causes the loss of central vision if not recognized and cured at the earlier stage. Existing classification models cannot accurately distinguish early diabetic retinopathy due to the influence of vascular venation. We proposed an image enhancement method for removing blood vessels: use multiple reduced even convolution kernels for mean filtering to blur and shift the vascular features at different levels in the original image. Further, we use convolution block attention module and generative adversarial network in the model, so that the model can weigh the pathological feature weights of different channels in the feature map and has larger feature space. We evaluate the proposed method on EyePACS dataset. It could effectively improve the accuracy of model as compared to use the images without removing blood vessels. The experimental results show that this method can solve the classification difficulty of normal, mild and moderate non-proliferative diabetic retinopathy to some extent.","PeriodicalId":285531,"journal":{"name":"2022 3rd Asia Conference on Computers and Communications (ACCC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129978081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid Number Systems: Application for Calculations in Galois Fields 混合数系统:伽罗瓦场计算的应用
Pub Date : 2022-12-01 DOI: 10.1109/ACCC58361.2022.00028
I. Suleimenov, Y. Vitulyova, A. Bakirov
Hybrid-base numbering systems are proposed; each digit of a number recorded in the system corresponds to some prime number. Subdivisions using for recording of a number in the frames of proposed approach correspond to specific Galois fields that correspond to the prime numbers that form the base of the coding system. Division of a digit into subunits is based on the theory of algebraic rings, which allows the number to be represented as a linear combination of idempotent elements with coefficients corresponding to the elements of the Galois fields. A specific example of binary-ternary logic where operations are performed in a number system with a base equal to six is considered. It is shown that operations in the decimal number system can similarly be reduced to operations in binary-ternary logic. The issues of practical use of algorithms based on hybrid number systems are discussed. In particular, a scheme of an adder operating with binary-ternary logic is proposed. The advantages of the proposed approach in terms of the possibility of its use in computing machinery on innovative element base are discussed.
提出了混合基编号系统;系统中记录的数字的每一位都对应一个素数。在建议的方法框架中用于记录数字的细分对应于与构成编码系统基础的素数对应的特定伽罗瓦域。将一个数字划分为子单位是基于代数环理论,它允许将数字表示为幂等元素的线性组合,其系数对应于伽罗瓦场的元素。考虑在基数等于6的数字系统中执行操作的二进制-三元逻辑的具体示例。证明了十进制数系统中的运算可以类似地简化为二进制-三进制逻辑中的运算。讨论了基于混合数系统的算法的实际应用问题。特别地,提出了一种二元-三元逻辑加法器的运算方案。讨论了该方法在创新元件基础上应用于计算机的可能性方面的优点。
{"title":"Hybrid Number Systems: Application for Calculations in Galois Fields","authors":"I. Suleimenov, Y. Vitulyova, A. Bakirov","doi":"10.1109/ACCC58361.2022.00028","DOIUrl":"https://doi.org/10.1109/ACCC58361.2022.00028","url":null,"abstract":"Hybrid-base numbering systems are proposed; each digit of a number recorded in the system corresponds to some prime number. Subdivisions using for recording of a number in the frames of proposed approach correspond to specific Galois fields that correspond to the prime numbers that form the base of the coding system. Division of a digit into subunits is based on the theory of algebraic rings, which allows the number to be represented as a linear combination of idempotent elements with coefficients corresponding to the elements of the Galois fields. A specific example of binary-ternary logic where operations are performed in a number system with a base equal to six is considered. It is shown that operations in the decimal number system can similarly be reduced to operations in binary-ternary logic. The issues of practical use of algorithms based on hybrid number systems are discussed. In particular, a scheme of an adder operating with binary-ternary logic is proposed. The advantages of the proposed approach in terms of the possibility of its use in computing machinery on innovative element base are discussed.","PeriodicalId":285531,"journal":{"name":"2022 3rd Asia Conference on Computers and Communications (ACCC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126392332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Semantic Segmentation Algorithm for Night Traffic Scene Based on Visible and Infrared Images 基于可见光和红外图像的夜间交通场景语义分割算法
Pub Date : 2022-12-01 DOI: 10.1109/ACCC58361.2022.00024
Xiaona Xie, Zhiyong Xu, Jiang Tao, Jianying Yuan, Sidong Wu
At present, there are many semantic segmentation algorithms with excellent performance for intelligent driving vehicles, but most of them are only work well on scenes with good illumination. In order to solve the problem of scene segmentation under low illumination, this paper proposes a novel semantic segmentation algorithm which combines visible and infrared images. In this algorithm, two parallel encoders are designed as the input of the image, and the decoder divides the fused image output from the encoder. The model is based on ResNet algorithm, and the residual attention module is used in each branch to mine and enhance the spatial features of multilevel channels to extract image information. Experiments are carried out on publicly available thermal infrared and visible data sets. The results show that the algorithm proposed in this paper is superior to the algorithm using only visible images in semantic segmentation of traffic environment.
目前,针对智能驾驶车辆的语义分割算法有很多,但大多只适用于光照条件好的场景。为了解决低照度下的场景分割问题,提出了一种结合可见光和红外图像的语义分割算法。该算法设计了两个并行编码器作为图像的输入,解码器将融合后的图像输出与编码器进行分割。该模型基于ResNet算法,在每个分支中使用残差关注模块对多层通道的空间特征进行挖掘和增强,提取图像信息。实验是在公开的热红外和可见光数据集上进行的。结果表明,本文提出的算法在交通环境的语义分割中优于仅使用可见图像的算法。
{"title":"Semantic Segmentation Algorithm for Night Traffic Scene Based on Visible and Infrared Images","authors":"Xiaona Xie, Zhiyong Xu, Jiang Tao, Jianying Yuan, Sidong Wu","doi":"10.1109/ACCC58361.2022.00024","DOIUrl":"https://doi.org/10.1109/ACCC58361.2022.00024","url":null,"abstract":"At present, there are many semantic segmentation algorithms with excellent performance for intelligent driving vehicles, but most of them are only work well on scenes with good illumination. In order to solve the problem of scene segmentation under low illumination, this paper proposes a novel semantic segmentation algorithm which combines visible and infrared images. In this algorithm, two parallel encoders are designed as the input of the image, and the decoder divides the fused image output from the encoder. The model is based on ResNet algorithm, and the residual attention module is used in each branch to mine and enhance the spatial features of multilevel channels to extract image information. Experiments are carried out on publicly available thermal infrared and visible data sets. The results show that the algorithm proposed in this paper is superior to the algorithm using only visible images in semantic segmentation of traffic environment.","PeriodicalId":285531,"journal":{"name":"2022 3rd Asia Conference on Computers and Communications (ACCC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114171704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Access Middleware for Sensor Traffic Control 一种传感器流量控制的接入中间件
Pub Date : 2022-12-01 DOI: 10.1109/ACCC58361.2022.00026
Xuejun Liang, Yunfeng Bian, Tingting Lin, Gang Liu
Since Ubiquitous Sensor Network (USN) has the feature that sensor nodes frequently send small amount of data. The access network shall support small data transmission with minimal network impact. This paper proposes an access middleware for sensor traffic processing with much less complexity and thus much higher transmission efficiency. It helps fixed access network to save the bandwidth and reduce the complexity of network protocol stack. For downstream traffic, a network address mapping approach is presented to facilitate the package transmission to the non-IP/local-IP sensor nodes. In contrast with current solution, the destination information is not encapsulated in the application layer and more bandwidth can be saved especially when large amount of sensor nodes accessing to the telecom network. Our solution has no impact on the implementation of current applications while bringing the advantages of low complexity, low cost and high transmission efficiency to the access network.
由于无处不在的传感器网络(USN)具有传感器节点频繁发送少量数据的特点。接入网应支持对网络影响最小的小数据传输。本文提出了一种低复杂度、高传输效率的传感器流量处理接入中间件。它有助于固定接入网节省带宽,降低网络协议栈的复杂性。对于下行流量,提出了一种网络地址映射方法,以方便数据包传输到非ip /local-IP传感器节点。与现有方案相比,该方案没有将目的信息封装在应用层中,特别是当大量传感器节点接入电信网络时,可以节省更多的带宽。我们的方案在不影响现有应用实现的同时,为接入网带来了低复杂度、低成本、高传输效率的优点。
{"title":"An Access Middleware for Sensor Traffic Control","authors":"Xuejun Liang, Yunfeng Bian, Tingting Lin, Gang Liu","doi":"10.1109/ACCC58361.2022.00026","DOIUrl":"https://doi.org/10.1109/ACCC58361.2022.00026","url":null,"abstract":"Since Ubiquitous Sensor Network (USN) has the feature that sensor nodes frequently send small amount of data. The access network shall support small data transmission with minimal network impact. This paper proposes an access middleware for sensor traffic processing with much less complexity and thus much higher transmission efficiency. It helps fixed access network to save the bandwidth and reduce the complexity of network protocol stack. For downstream traffic, a network address mapping approach is presented to facilitate the package transmission to the non-IP/local-IP sensor nodes. In contrast with current solution, the destination information is not encapsulated in the application layer and more bandwidth can be saved especially when large amount of sensor nodes accessing to the telecom network. Our solution has no impact on the implementation of current applications while bringing the advantages of low complexity, low cost and high transmission efficiency to the access network.","PeriodicalId":285531,"journal":{"name":"2022 3rd Asia Conference on Computers and Communications (ACCC)","volume":"1175 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114170963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mobile Application SDK Version Detection and Security Alert Based on Multi-partition LSH 基于多分区LSH的移动应用SDK版本检测与安全预警
Pub Date : 2022-12-01 DOI: 10.1109/ACCC58361.2022.00008
Siyu Gao, Yu Xiao, Ye He, Jianfeng Wen
Android mobile applications integrate a large number of third-party libraries (SDKs) to improve the efficiency of development and enhance the functionality of mobile applications, some SDKs have security vulnerabilities and misuse of access rights, which can cause security and privacy hazards to mobile applications. SDK version detection and vulnerability detection are the basis of mobile application security analysis, this paper proposes an LSH-based SDK version identification method. The method does SDK detection based on class hierarchy, extracts SDK source code fine-grained features using multipartition box LSH, and achieves SDK version detection by multi-feature fusion. On the basis of version identification, it does vulnerability warning and recommendation for insecure SDK versions. Collected more than 70 types and 1100 different versions of popular SDK data to build SDK information database, vulnerability database and scoring database. Verified and analyzed for 453 APPs, and the detection tool is better than other tools in the same category.
Android移动应用集成了大量的第三方sdk(第三方库),以提高开发效率和增强移动应用的功能,但部分sdk存在安全漏洞和访问权限滥用,可能会给移动应用带来安全和隐私隐患。SDK版本检测和漏洞检测是移动应用安全分析的基础,本文提出了一种基于lsh的SDK版本识别方法。该方法基于类层次进行SDK检测,利用多分区盒LSH提取SDK源代码细粒度特征,通过多特征融合实现SDK版本检测。在版本识别的基础上,对不安全的SDK版本进行漏洞警告和推荐。收集70余种1100多个不同版本的流行SDK数据,构建SDK信息库、漏洞库和评分库。对453款app进行了验证分析,检测工具优于同类工具。
{"title":"Mobile Application SDK Version Detection and Security Alert Based on Multi-partition LSH","authors":"Siyu Gao, Yu Xiao, Ye He, Jianfeng Wen","doi":"10.1109/ACCC58361.2022.00008","DOIUrl":"https://doi.org/10.1109/ACCC58361.2022.00008","url":null,"abstract":"Android mobile applications integrate a large number of third-party libraries (SDKs) to improve the efficiency of development and enhance the functionality of mobile applications, some SDKs have security vulnerabilities and misuse of access rights, which can cause security and privacy hazards to mobile applications. SDK version detection and vulnerability detection are the basis of mobile application security analysis, this paper proposes an LSH-based SDK version identification method. The method does SDK detection based on class hierarchy, extracts SDK source code fine-grained features using multipartition box LSH, and achieves SDK version detection by multi-feature fusion. On the basis of version identification, it does vulnerability warning and recommendation for insecure SDK versions. Collected more than 70 types and 1100 different versions of popular SDK data to build SDK information database, vulnerability database and scoring database. Verified and analyzed for 453 APPs, and the detection tool is better than other tools in the same category.","PeriodicalId":285531,"journal":{"name":"2022 3rd Asia Conference on Computers and Communications (ACCC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121205149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using the Relationship between the Theory of Algebraic Fields and Number Theory for Developing Promising Methods of Digital Signal Processing 利用代数场理论与数论的关系发展有前途的数字信号处理方法
Pub Date : 2022-12-01 DOI: 10.1109/ACCC58361.2022.00027
I. Suleimenov, D. Matrassulova
An analogue of the Dirac δ-function is proposed, constructed for the case of Galois fields, and providing the possibility of conveniently reducing operations of multivalued logics to algebraic ones, including for the purposes of digital signal processing. It is shown that this function admits a convenient representation in the form of a binomial polynomial, whose coefficients take a constant value equal to one. The verification of the obtained results is carried out by the method of comparison with the proof of Wilson's theorem obtained using the theory of algebraic fields. An analogue of Wilson's theorem is obtained for the case of the binomial coefficients mentioned above and its visual illustration is given using an analogue of Pascal's triangle constructed for the case of simple Galois fields.
在伽罗瓦场的情况下,提出了狄拉克δ函数的类比,并提供了方便地将多值逻辑的运算简化为代数运算的可能性,包括用于数字信号处理的目的。结果表明,该函数可以方便地表示为二项式多项式,其系数取常数为1。用与利用代数场理论得到的威尔逊定理的证明相比较的方法对所得结果进行了验证。在上述二项式系数的情况下,得到了威尔逊定理的一个类似的例子,并用简单伽罗瓦场情况下的帕斯卡三角形的一个类似的例子作了直观的说明。
{"title":"Using the Relationship between the Theory of Algebraic Fields and Number Theory for Developing Promising Methods of Digital Signal Processing","authors":"I. Suleimenov, D. Matrassulova","doi":"10.1109/ACCC58361.2022.00027","DOIUrl":"https://doi.org/10.1109/ACCC58361.2022.00027","url":null,"abstract":"An analogue of the Dirac δ-function is proposed, constructed for the case of Galois fields, and providing the possibility of conveniently reducing operations of multivalued logics to algebraic ones, including for the purposes of digital signal processing. It is shown that this function admits a convenient representation in the form of a binomial polynomial, whose coefficients take a constant value equal to one. The verification of the obtained results is carried out by the method of comparison with the proof of Wilson's theorem obtained using the theory of algebraic fields. An analogue of Wilson's theorem is obtained for the case of the binomial coefficients mentioned above and its visual illustration is given using an analogue of Pascal's triangle constructed for the case of simple Galois fields.","PeriodicalId":285531,"journal":{"name":"2022 3rd Asia Conference on Computers and Communications (ACCC)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114351263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BiLSTM-CNN Text Emotion Analysis Based on Self Attention Mechanism and Dense Connection 基于自注意机制和密集连接的BiLSTM-CNN文本情感分析
Pub Date : 2022-12-01 DOI: 10.1109/ACCC58361.2022.00016
Jianjun Sun
In order to improve the accuracy of sentiment analysis, this paper presents a new method for sentiment analysis of BiLSTM-cnn text based on self attention mechanism and dense connection. Methods BiLSTM-CNN-Attmodel was established. Firstly, BiLSTM was introduced to extract context words. Then, the convolutional neural network(CNN) is used to extract local semantic features. Combined with DenseNet dense connection module, the memory strength of the whole model is improved, and the utilization rate of weight information is enhanced. Finally, Self-attention mechanism is used to improve the ability of model mining information. This paper selects the data sets of chndenticorp and CCF2012 to train the optimal value of the DenseNet feature mapping matrix. The optimal value is brought into the model contrast experiment. In the experiment, the accuracy rate, recall rate and F value of this method are all greater than 91%, which is the highest among the models. It effectively improves the accuracy of text sentiment analysis, and has high research and practical value.
为了提高情感分析的准确性,本文提出了一种基于自注意机制和密集连接的BiLSTM-cnn文本情感分析新方法。方法建立bilstm - cnn - attt模型。首先,引入BiLSTM提取语境词;然后,利用卷积神经网络(CNN)提取局部语义特征;结合DenseNet密集连接模块,提高了整个模型的记忆强度,提高了权重信息的利用率。最后,利用自注意机制提高模型挖掘信息的能力。本文选取chdenticorp和CCF2012的数据集,训练DenseNet特征映射矩阵的最优值。将最优值引入模型对比实验。在实验中,该方法的准确率、召回率和F值均大于91%,是所有模型中最高的。该方法有效地提高了文本情感分析的准确性,具有很高的研究和实用价值。
{"title":"BiLSTM-CNN Text Emotion Analysis Based on Self Attention Mechanism and Dense Connection","authors":"Jianjun Sun","doi":"10.1109/ACCC58361.2022.00016","DOIUrl":"https://doi.org/10.1109/ACCC58361.2022.00016","url":null,"abstract":"In order to improve the accuracy of sentiment analysis, this paper presents a new method for sentiment analysis of BiLSTM-cnn text based on self attention mechanism and dense connection. Methods BiLSTM-CNN-Attmodel was established. Firstly, BiLSTM was introduced to extract context words. Then, the convolutional neural network(CNN) is used to extract local semantic features. Combined with DenseNet dense connection module, the memory strength of the whole model is improved, and the utilization rate of weight information is enhanced. Finally, Self-attention mechanism is used to improve the ability of model mining information. This paper selects the data sets of chndenticorp and CCF2012 to train the optimal value of the DenseNet feature mapping matrix. The optimal value is brought into the model contrast experiment. In the experiment, the accuracy rate, recall rate and F value of this method are all greater than 91%, which is the highest among the models. It effectively improves the accuracy of text sentiment analysis, and has high research and practical value.","PeriodicalId":285531,"journal":{"name":"2022 3rd Asia Conference on Computers and Communications (ACCC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128113206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
AASH: A Lightweight and Efficient Static IoT Malware Detection Technique at Source Code Level AASH:源代码级轻量级高效静态物联网恶意软件检测技术
Pub Date : 2022-12-01 DOI: 10.1109/ACCC58361.2022.00010
Yasir Glani, Luo Ping, Syed Asad Shah
IoT malware applications significantly threaten user privacy and security. Traditionally, IoT developers have focused primarily on hardware, but connectivity requires additional embedded software, usually developed by third-party developers. Unfortunately, third-party code is not always secure and trustworthy, and it frequently contains bugs and malicious code, which leaves IoT devices vulnerable. We propose the AASH technique (IoT Malware Detection) a novel technique that can detect malware at the source code level using the Adler-32 hash function and Fibonacci search. Previously, DROIDMD technique and SQVDT technique have been proposed to detect malware on Android and Linux devices. According to the authors, their schemes are scalable and can be deployed on IoT devices. However, their technique suffers from lower accuracy and takes longer to detect malicious code. The performance measurement shows that our proposed AASH technique is comparatively better than DROIDMD and SQVDT techniques in terms of accuracy and malware detection. AASH is reliable, efficient, and can be deployed on a large-scale level.
物联网恶意软件应用严重威胁用户隐私和安全。传统上,物联网开发人员主要关注硬件,但连接需要额外的嵌入式软件,通常由第三方开发人员开发。不幸的是,第三方代码并不总是安全可靠的,而且它经常包含错误和恶意代码,这使得物联网设备容易受到攻击。我们提出了AASH技术(物联网恶意软件检测),这是一种可以使用Adler-32哈希函数和斐波那契搜索在源代码级别检测恶意软件的新技术。此前,已经提出了DROIDMD技术和SQVDT技术来检测Android和Linux设备上的恶意软件。根据作者的说法,他们的方案是可扩展的,可以部署在物联网设备上。然而,他们的技术精度较低,需要更长的时间来检测恶意代码。性能测试表明,我们提出的AASH技术在准确性和恶意软件检测方面相对优于DROIDMD和SQVDT技术。AASH可靠、高效,可以大规模部署。
{"title":"AASH: A Lightweight and Efficient Static IoT Malware Detection Technique at Source Code Level","authors":"Yasir Glani, Luo Ping, Syed Asad Shah","doi":"10.1109/ACCC58361.2022.00010","DOIUrl":"https://doi.org/10.1109/ACCC58361.2022.00010","url":null,"abstract":"IoT malware applications significantly threaten user privacy and security. Traditionally, IoT developers have focused primarily on hardware, but connectivity requires additional embedded software, usually developed by third-party developers. Unfortunately, third-party code is not always secure and trustworthy, and it frequently contains bugs and malicious code, which leaves IoT devices vulnerable. We propose the AASH technique (IoT Malware Detection) a novel technique that can detect malware at the source code level using the Adler-32 hash function and Fibonacci search. Previously, DROIDMD technique and SQVDT technique have been proposed to detect malware on Android and Linux devices. According to the authors, their schemes are scalable and can be deployed on IoT devices. However, their technique suffers from lower accuracy and takes longer to detect malicious code. The performance measurement shows that our proposed AASH technique is comparatively better than DROIDMD and SQVDT techniques in terms of accuracy and malware detection. AASH is reliable, efficient, and can be deployed on a large-scale level.","PeriodicalId":285531,"journal":{"name":"2022 3rd Asia Conference on Computers and Communications (ACCC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131895524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2022 3rd Asia Conference on Computers and Communications (ACCC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1