首页 > 最新文献

Proceedings of the 2023 3rd International Conference on Artificial Intelligence, Automation and Algorithms最新文献

英文 中文
Entropy-based Time-series Financial Distress Model Based on Attribute Selection and MetaCost Methods for Imbalance Class 基于失衡类别属性选择和元成本方法的基于熵的时间序列财务困境模型
Chia-Pang Chan, Jun-He Yang, Wei-Hsiung Chang
Financial distress prediction is an important and challenging issue in the financial field. Now, many methods have been proposed to forecast company bankruptcy and financial crisis, and many studies show that artificial intelligence is better than traditional statistical methods in prediction capacity. To overcome the imbalance class, this study employs the MetaCost algorithm to add cost-sensitive classification in the training of base classifiers, then establishes a financial crisis prediction model. In a time series and non-stationary problems, this study proposes a novel time-series financial distress model based on artificial intelligence (including attribute selection and classifiers) to predict the financial distress of a company. All in all, the proposed model has several advantages: (1) utilize the MetaCost algorithm to handle the imbalance class; (2) the proposed model is a seasonal time-series model; (3) employ attribute selection to find the core attributes and reduce data dimension; (4) the research results can be provided to investors and decision makers as reference. At last, the results show that the proposed method is better than the listed classifiers and the MetaCost algorithm is superior to the general classifier method, and the MetaCost method raises a little sensitivity, it lifts to identify the companies’ financial health when the companies are actually healthy; and type II errors are reduced by 21.6%, it denotes that the proposed method can raise the correct classification of financial distress.
财务困境预测是金融领域的一个重要而富有挑战性的问题。现在,人们提出了许多预测公司破产和金融危机的方法,许多研究表明,人工智能在预测能力上优于传统的统计方法。为了克服不平衡类,本研究采用MetaCost算法在基分类器的训练中加入代价敏感分类,建立金融危机预测模型。针对时间序列和非平稳问题,本文提出了一种新的基于人工智能(包括属性选择和分类器)的时间序列财务困境模型来预测公司的财务困境。总而言之,该模型具有以下优点:(1)利用MetaCost算法处理不平衡类;(2)模型为季节性时间序列模型;(3)利用属性选择找到核心属性,降低数据维数;(4)研究结果可为投资者和决策者提供参考。最后,研究结果表明:本文提出的方法优于上市分类器,MetaCost算法优于一般分类器方法,并且MetaCost方法提高了一些敏感性,当公司实际健康时,它提高了对公司财务健康状况的识别能力;第二类误差降低了21.6%,表明本文提出的方法能够提高对财务困境的正确分类。
{"title":"Entropy-based Time-series Financial Distress Model Based on Attribute Selection and MetaCost Methods for Imbalance Class","authors":"Chia-Pang Chan, Jun-He Yang, Wei-Hsiung Chang","doi":"10.1145/3611450.3611471","DOIUrl":"https://doi.org/10.1145/3611450.3611471","url":null,"abstract":"Financial distress prediction is an important and challenging issue in the financial field. Now, many methods have been proposed to forecast company bankruptcy and financial crisis, and many studies show that artificial intelligence is better than traditional statistical methods in prediction capacity. To overcome the imbalance class, this study employs the MetaCost algorithm to add cost-sensitive classification in the training of base classifiers, then establishes a financial crisis prediction model. In a time series and non-stationary problems, this study proposes a novel time-series financial distress model based on artificial intelligence (including attribute selection and classifiers) to predict the financial distress of a company. All in all, the proposed model has several advantages: (1) utilize the MetaCost algorithm to handle the imbalance class; (2) the proposed model is a seasonal time-series model; (3) employ attribute selection to find the core attributes and reduce data dimension; (4) the research results can be provided to investors and decision makers as reference. At last, the results show that the proposed method is better than the listed classifiers and the MetaCost algorithm is superior to the general classifier method, and the MetaCost method raises a little sensitivity, it lifts to identify the companies’ financial health when the companies are actually healthy; and type II errors are reduced by 21.6%, it denotes that the proposed method can raise the correct classification of financial distress.","PeriodicalId":289906,"journal":{"name":"Proceedings of the 2023 3rd International Conference on Artificial Intelligence, Automation and Algorithms","volume":"27 17","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113984074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unseen Codec Spoof Speech Detection Based on Channel-Robust Feature 基于信道鲁棒性的未见编解码器欺骗语音检测
Yupeng Zhu, Zuxing Zhao, Fan Li, Yanxiang Chen
For speech anti-spoofing, the ability of countermeasures (CMs) to cope with unseen attacks has been under scrutiny. Since the previous LA attack was mainly for ASV, which required that the spoofed speech be clean enough to be parsed properly by the ASV and that the unseen scenario be limited to the types of synthesis algorithms. With the development of DeepFake, spoofed speech is more often used to spread fake information so that the unseen codecs channel effects needs to be considered. Based on this, we propose a channel-robust spoof detection method based on the wav2vec2.0 and a channel augmentation adversarial (AUG-ADV) strategy. Our method was experimented on the FMFCC-A dataset and achieves the best results with several evaluation metrics.
对于语音反欺骗,对抗措施(CMs)应对看不见的攻击的能力一直在审查之中。由于以前的LA攻击主要是针对ASV的,这就要求被欺骗的语音足够干净,可以被ASV正确解析,并且不可见的场景仅限于合成算法的类型。随着DeepFake的发展,欺骗语音越来越多地被用来传播虚假信息,因此需要考虑看不见的编解码器信道效应。在此基础上,我们提出了一种基于wav2vec2.0的信道鲁棒欺骗检测方法和信道增强对抗(augaugadv)策略。我们的方法在FMFCC-A数据集上进行了实验,并在多个评价指标下获得了最佳结果。
{"title":"Unseen Codec Spoof Speech Detection Based on Channel-Robust Feature","authors":"Yupeng Zhu, Zuxing Zhao, Fan Li, Yanxiang Chen","doi":"10.1145/3611450.3611452","DOIUrl":"https://doi.org/10.1145/3611450.3611452","url":null,"abstract":"For speech anti-spoofing, the ability of countermeasures (CMs) to cope with unseen attacks has been under scrutiny. Since the previous LA attack was mainly for ASV, which required that the spoofed speech be clean enough to be parsed properly by the ASV and that the unseen scenario be limited to the types of synthesis algorithms. With the development of DeepFake, spoofed speech is more often used to spread fake information so that the unseen codecs channel effects needs to be considered. Based on this, we propose a channel-robust spoof detection method based on the wav2vec2.0 and a channel augmentation adversarial (AUG-ADV) strategy. Our method was experimented on the FMFCC-A dataset and achieves the best results with several evaluation metrics.","PeriodicalId":289906,"journal":{"name":"Proceedings of the 2023 3rd International Conference on Artificial Intelligence, Automation and Algorithms","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124054077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pipeline-based Optimization Method for Large-Scale End-to-End Inference 基于管道的大规模端到端推理优化方法
Caili Gao, Y. Dou, P. Qiao
Enhancing the utilization of computing resources is a crucial technical challenge within the realm of deep learning model deployment and application. It holds significant importance in effectively leveraging various deep learning models. However, when it comes to actual deployment and operation, deep learning models face an urgent task—processing large-scale data. This processing flow is an end-to-end procedure that typically involves three essential steps: preprocessing, model inference, and postprocessing. Presently, existing research mainly focuses on the optimization of deep learning model algorithms, and rarely considers the coordinated utilization of CPU and accelerator resources after model deployment, resulting in low resource utilization and execution efficiency. In order to solve this problem, in this study, we comprehensively analyzed the demand for computing resources and the mutual adaptation relationship between the end-to-end processing flow in the model application and designed a general algorithm based on the pipeline idea to Realize the overlapping of CPU processing and accelerator operation process. Through this scheme, the serial execution flow of the end-to-end processing can be performed in parallel, resulting in a significant reduction in accelerator latency. We extensively conducted experiments on two specific tasks, and the outcomes demonstrated that our proposed method considerably enhances the accelerator’s utilization rate and program execution efficiency. Specifically, the utilization rate of the accelerator surged from 26% to over 97%, while the program’s execution efficiency witnessed a remarkable improvement of 3.41 to 5.54 times.
提高计算资源的利用率是深度学习模型部署和应用领域的关键技术挑战。它对于有效利用各种深度学习模型具有重要意义。然而,当涉及到实际的部署和操作时,深度学习模型面临着一个紧迫的任务——处理大规模数据。这个处理流是一个端到端过程,通常包括三个基本步骤:预处理、模型推理和后处理。目前,现有的研究主要集中在深度学习模型算法的优化上,很少考虑模型部署后CPU和加速器资源的协调利用,导致资源利用率和执行效率较低。为了解决这一问题,本研究综合分析了模型应用中对计算资源的需求以及端到端处理流程之间的相互适应关系,设计了一种基于流水线思想的通用算法,实现了CPU处理与加速器操作流程的重叠。通过该方案,端到端处理的串行执行流可以并行执行,从而显著降低了加速器延迟。我们在两个特定的任务上进行了广泛的实验,结果表明我们提出的方法大大提高了加速器的利用率和程序执行效率。其中,加速器的利用率从26%提高到97%以上,程序的执行效率从3.41倍提高到5.54倍。
{"title":"Pipeline-based Optimization Method for Large-Scale End-to-End Inference","authors":"Caili Gao, Y. Dou, P. Qiao","doi":"10.1145/3611450.3611463","DOIUrl":"https://doi.org/10.1145/3611450.3611463","url":null,"abstract":"Enhancing the utilization of computing resources is a crucial technical challenge within the realm of deep learning model deployment and application. It holds significant importance in effectively leveraging various deep learning models. However, when it comes to actual deployment and operation, deep learning models face an urgent task—processing large-scale data. This processing flow is an end-to-end procedure that typically involves three essential steps: preprocessing, model inference, and postprocessing. Presently, existing research mainly focuses on the optimization of deep learning model algorithms, and rarely considers the coordinated utilization of CPU and accelerator resources after model deployment, resulting in low resource utilization and execution efficiency. In order to solve this problem, in this study, we comprehensively analyzed the demand for computing resources and the mutual adaptation relationship between the end-to-end processing flow in the model application and designed a general algorithm based on the pipeline idea to Realize the overlapping of CPU processing and accelerator operation process. Through this scheme, the serial execution flow of the end-to-end processing can be performed in parallel, resulting in a significant reduction in accelerator latency. We extensively conducted experiments on two specific tasks, and the outcomes demonstrated that our proposed method considerably enhances the accelerator’s utilization rate and program execution efficiency. Specifically, the utilization rate of the accelerator surged from 26% to over 97%, while the program’s execution efficiency witnessed a remarkable improvement of 3.41 to 5.54 times.","PeriodicalId":289906,"journal":{"name":"Proceedings of the 2023 3rd International Conference on Artificial Intelligence, Automation and Algorithms","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125704923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Gravitational clustering algorithm based on mutual K-nearest neighbors 基于相互k近邻的引力聚类算法
Zhenming Ma, Jiaqi Xu, Ruixi Li, Jinpeng Chen
To address the problems of difficulty in determining the truncation distance, single definition of local density and low robustness of non-centroid assignment strategy and chain reaction in density peaking clustering algorithm (DPC), this paper proposes a gravitational clustering algorithm (GMNN) based on mutual K nearest neighbors. The algorithm redefines the similarity metric and local density using the mutual K-nearest neighbor approach. Based on the local gravity model, a two-step clustering strategy is designed to isolate the chain reaction to complete the clustering through the mutual gravity between points and clusters. It is marked by simulation experiments that DG-DPC algorithm is effective for both synthetic dataset and UCI dataset, and the accuracy rate is improved by 31.07%, 45.60%, 50.20%, and 35.5% on average relative to RE-DPC algorithm, DPC algorithm, GAP-DPC algorithm, and DG-DPC algorithm, respectively.
针对密度峰值聚类算法(DPC)中存在截断距离难以确定、局部密度定义单一、非质心分配策略鲁棒性低等问题,提出了一种基于互K近邻的引力聚类算法(GMNN)。该算法利用互k近邻法重新定义了相似度度量和局部密度。在局部引力模型的基础上,设计了两步聚类策略,隔离链式反应,通过点与簇之间的相互引力完成聚类。仿真实验表明,DG-DPC算法对合成数据集和UCI数据集都是有效的,相对于RE-DPC算法、DPC算法、GAP-DPC算法和DG-DPC算法,准确率平均分别提高了31.07%、45.60%、50.20%和35.5%。
{"title":"Gravitational clustering algorithm based on mutual K-nearest neighbors","authors":"Zhenming Ma, Jiaqi Xu, Ruixi Li, Jinpeng Chen","doi":"10.1145/3611450.3611462","DOIUrl":"https://doi.org/10.1145/3611450.3611462","url":null,"abstract":"To address the problems of difficulty in determining the truncation distance, single definition of local density and low robustness of non-centroid assignment strategy and chain reaction in density peaking clustering algorithm (DPC), this paper proposes a gravitational clustering algorithm (GMNN) based on mutual K nearest neighbors. The algorithm redefines the similarity metric and local density using the mutual K-nearest neighbor approach. Based on the local gravity model, a two-step clustering strategy is designed to isolate the chain reaction to complete the clustering through the mutual gravity between points and clusters. It is marked by simulation experiments that DG-DPC algorithm is effective for both synthetic dataset and UCI dataset, and the accuracy rate is improved by 31.07%, 45.60%, 50.20%, and 35.5% on average relative to RE-DPC algorithm, DPC algorithm, GAP-DPC algorithm, and DG-DPC algorithm, respectively.","PeriodicalId":289906,"journal":{"name":"Proceedings of the 2023 3rd International Conference on Artificial Intelligence, Automation and Algorithms","volume":"255 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126050366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluating and Alleviating Multidimensional Poverty among Older People in Rural China Based on Big Data 基于大数据的中国农村老年人多维贫困评估与缓解
Yan Zhang, W. Fan, Siyu Pan
China has made great progress in poverty alleviation in past 40 years. However, older Chinese rural residents, who have been identified as a doubly vulnerable group, still experience much different kinds of deprivations. This study firstly evaluated the multiple deprivations and multidimensional poverty experienced by Chinese rural older people with the Alkire and Foster (AF) measure. It then discusses the poverty alleviation based on big data. It finds that integrated multidimensional poverty declined in four components of deprivation among the aged population, but this trend was limited in a broad sense in terms of the mean poverty intensity and the poverty severity index. Although there was a 6.2 percentage point decrease in poverty incidence, the poverty intensity increased 0.7 percentage points. Deprivations in the financial insecurity, health and loneliness dimensions also increased. Based on big data, this study gives the poverty monitoring and poverty reduction path based. Also, the principles and the data collection paths will be discussed.
在过去的40年里,中国在扶贫方面取得了巨大进展。然而,被认定为双重弱势群体的中国老年农村居民,仍然经历着许多不同形式的剥夺。本研究首次采用Alkire and Foster (AF)测度对中国农村老年人的多重剥夺和多维贫困进行了评价。然后讨论了基于大数据的扶贫。研究发现,老年人口贫困的四个组成部分的综合多维贫困率有所下降,但就平均贫困强度和贫困严重程度指数而言,这种趋势在广义上是有限的。虽然贫困发生率下降了6.2个百分点,但贫困强度却增加了0.7个百分点。在经济不安全、健康和孤独方面的匮乏也有所增加。本研究基于大数据,给出了基于贫困监测和减贫的路径。此外,还将讨论原理和数据收集路径。
{"title":"Evaluating and Alleviating Multidimensional Poverty among Older People in Rural China Based on Big Data","authors":"Yan Zhang, W. Fan, Siyu Pan","doi":"10.1145/3611450.3611466","DOIUrl":"https://doi.org/10.1145/3611450.3611466","url":null,"abstract":"China has made great progress in poverty alleviation in past 40 years. However, older Chinese rural residents, who have been identified as a doubly vulnerable group, still experience much different kinds of deprivations. This study firstly evaluated the multiple deprivations and multidimensional poverty experienced by Chinese rural older people with the Alkire and Foster (AF) measure. It then discusses the poverty alleviation based on big data. It finds that integrated multidimensional poverty declined in four components of deprivation among the aged population, but this trend was limited in a broad sense in terms of the mean poverty intensity and the poverty severity index. Although there was a 6.2 percentage point decrease in poverty incidence, the poverty intensity increased 0.7 percentage points. Deprivations in the financial insecurity, health and loneliness dimensions also increased. Based on big data, this study gives the poverty monitoring and poverty reduction path based. Also, the principles and the data collection paths will be discussed.","PeriodicalId":289906,"journal":{"name":"Proceedings of the 2023 3rd International Conference on Artificial Intelligence, Automation and Algorithms","volume":"103 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131746443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Unsupervised Network Anomaly Detection Model and Implementation 一种无监督网络异常检测模型与实现
Yingdan Zhang, Kun Wen, Xingyu Wang
Anomaly detection for network attacks has always been a very important part of intrusion detection. The current research focus is anomaly detection based on deep learning, which has two main problems. One is the lack of a large amount of labeled data in model training, and the other is difficult to detect unknown network attacks or variant attacks. To solve the above problems, an unsupervised anomaly detection model is constructed in this paper. The automatic encoder is used to learn normal traffic characteristics and detect abnormal traffic. Meanwhile, time correlation features and hierarchical clustering algorithm are used for data preprocessing to reduce time and space complexity, so as to further improve the efficiency of model detection. Due to the serious lack of verification data sets for unsupervised anomaly detection, this paper collects and organizes a large amount of data and designs four types of network attack data, including new attack means, worms, system vulnerabilities and botnets. The experimental results showed that the detection accuracy of worms and system vulnerabilities reached 98%, the detection accuracy of botnets reached 89%, and the attacks of the new OriginLogger software were detected.
网络攻击异常检测一直是入侵检测的重要组成部分。目前的研究重点是基于深度学习的异常检测,主要存在两个问题。一是模型训练中缺乏大量的标记数据,二是难以检测未知网络攻击或变体攻击。为了解决上述问题,本文构建了一种无监督异常检测模型。自动编码器用于学习正常流量特征和检测异常流量。同时,利用时间相关特征和分层聚类算法对数据进行预处理,降低时间和空间复杂度,进一步提高模型检测效率。由于严重缺乏无监督异常检测的验证数据集,本文收集并整理了大量数据,设计了新型攻击手段、蠕虫、系统漏洞和僵尸网络四类网络攻击数据。实验结果表明,对蠕虫和系统漏洞的检测准确率达到98%,对僵尸网络的检测准确率达到89%,检测出了新型OriginLogger软件的攻击。
{"title":"An Unsupervised Network Anomaly Detection Model and Implementation","authors":"Yingdan Zhang, Kun Wen, Xingyu Wang","doi":"10.1145/3611450.3611468","DOIUrl":"https://doi.org/10.1145/3611450.3611468","url":null,"abstract":"Anomaly detection for network attacks has always been a very important part of intrusion detection. The current research focus is anomaly detection based on deep learning, which has two main problems. One is the lack of a large amount of labeled data in model training, and the other is difficult to detect unknown network attacks or variant attacks. To solve the above problems, an unsupervised anomaly detection model is constructed in this paper. The automatic encoder is used to learn normal traffic characteristics and detect abnormal traffic. Meanwhile, time correlation features and hierarchical clustering algorithm are used for data preprocessing to reduce time and space complexity, so as to further improve the efficiency of model detection. Due to the serious lack of verification data sets for unsupervised anomaly detection, this paper collects and organizes a large amount of data and designs four types of network attack data, including new attack means, worms, system vulnerabilities and botnets. The experimental results showed that the detection accuracy of worms and system vulnerabilities reached 98%, the detection accuracy of botnets reached 89%, and the attacks of the new OriginLogger software were detected.","PeriodicalId":289906,"journal":{"name":"Proceedings of the 2023 3rd International Conference on Artificial Intelligence, Automation and Algorithms","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133769767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Single-Anchor Visible Light Positioning System Based on Fingerprinting and Deep Learning 基于指纹识别和深度学习的单锚可见光定位系统
Jiale Jiang, K. Zhao, Jiasheng Zhou, X. Cao, Zhuang Yuan
Due to severe signal obstruction, the global navigation satellite system is unable to work indoors. Visible light positioning, as an alternative technology for indoor positioning, has gained widespread attention in recent years due to its low cost and environmental friendliness. Among these, the visible light single anchor positioning method based on light-emitting diode arrays has shown great potential as it can simultaneously provide lighting and positioning. The rise of artificial intelligence has provided new methods for indoor positioning.This article focuses on the single anchor visible light fingerprinting-based positioning technology and uses a multi-layer perceptron-based method to maximize its performance. In addition, in terms of hardware design, we focus on improving the receiver's integration, making it applicable to a wider range of scenarios through size reduction and cost control. Finally, the designed hardware and the proposed method are evaluated in the space range of 320 cm* 560 cm* 270 cm. When compared with the traditional nearest neighbor, k-nearest neighbor, and weighted k-nearest neighbor methods, the experimental results show that the proposed method exhibits significant advantages in performance. The average positioning accuracy in the real scene can reach 34cm.
由于严重的信号阻塞,全球卫星导航系统无法在室内工作。可见光定位作为室内定位的一种替代技术,由于其成本低、环境友好等优点,近年来受到了广泛的关注。其中,基于发光二极管阵列的可见光单锚定位方法由于能够同时提供照明和定位而显示出巨大的潜力。人工智能的兴起为室内定位提供了新的方法。本文主要研究基于单锚点可见光指纹的定位技术,并采用基于多层感知器的方法使其性能最大化。此外,在硬件设计方面,我们注重提高接收机的集成度,通过减小尺寸和控制成本,使其适用于更广泛的场景。最后,在320 cm* 560 cm* 270 cm的空间范围内对所设计的硬件和所提出的方法进行了评估。实验结果表明,与传统的最近邻、k近邻和加权k近邻方法相比,该方法具有显著的性能优势。真实场景平均定位精度可达34cm。
{"title":"A Single-Anchor Visible Light Positioning System Based on Fingerprinting and Deep Learning","authors":"Jiale Jiang, K. Zhao, Jiasheng Zhou, X. Cao, Zhuang Yuan","doi":"10.1145/3611450.3611475","DOIUrl":"https://doi.org/10.1145/3611450.3611475","url":null,"abstract":"Due to severe signal obstruction, the global navigation satellite system is unable to work indoors. Visible light positioning, as an alternative technology for indoor positioning, has gained widespread attention in recent years due to its low cost and environmental friendliness. Among these, the visible light single anchor positioning method based on light-emitting diode arrays has shown great potential as it can simultaneously provide lighting and positioning. The rise of artificial intelligence has provided new methods for indoor positioning.This article focuses on the single anchor visible light fingerprinting-based positioning technology and uses a multi-layer perceptron-based method to maximize its performance. In addition, in terms of hardware design, we focus on improving the receiver's integration, making it applicable to a wider range of scenarios through size reduction and cost control. Finally, the designed hardware and the proposed method are evaluated in the space range of 320 cm* 560 cm* 270 cm. When compared with the traditional nearest neighbor, k-nearest neighbor, and weighted k-nearest neighbor methods, the experimental results show that the proposed method exhibits significant advantages in performance. The average positioning accuracy in the real scene can reach 34cm.","PeriodicalId":289906,"journal":{"name":"Proceedings of the 2023 3rd International Conference on Artificial Intelligence, Automation and Algorithms","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134500442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recognition of Beat-Motion Gestures of Orchestra Conductor using DTW and Nearest Neighbor Method 用DTW和最近邻法识别乐队指挥的节拍动作
Gen-Fang Chen
The conductor is responsible for controlling speed, emotion, instruments, and other musical information in music performances. Using hand gestures, facial expressions, and body movements, the conductor communicates with each member of the band; the conductor primarily uses hand movements to reflect the different beats of different music pieces. In this study, Kinect was used to capture the gestural trajectory of the conductor. Additionally, the three-dimensional spatial data of the obtained motion trajectory were adaptively smoothed. The motion timing data were subsequently segmented, and a dynamic time-warping algorithm was used to match the timing data of the template library with the to-be-classified data.
指挥在音乐表演中负责控制速度、情绪、乐器和其他音乐信息。通过手势、面部表情和身体动作,指挥与乐队的每个成员进行交流;指挥家主要用手的动作来反映不同音乐作品的不同节拍。在这项研究中,Kinect被用来捕捉指挥的手势轨迹。此外,对得到的运动轨迹三维空间数据进行了自适应平滑处理。随后对运动时序数据进行分割,并采用动态时间规整算法将模板库的时序数据与待分类数据进行匹配。
{"title":"Recognition of Beat-Motion Gestures of Orchestra Conductor using DTW and Nearest Neighbor Method","authors":"Gen-Fang Chen","doi":"10.1145/3611450.3611459","DOIUrl":"https://doi.org/10.1145/3611450.3611459","url":null,"abstract":"The conductor is responsible for controlling speed, emotion, instruments, and other musical information in music performances. Using hand gestures, facial expressions, and body movements, the conductor communicates with each member of the band; the conductor primarily uses hand movements to reflect the different beats of different music pieces. In this study, Kinect was used to capture the gestural trajectory of the conductor. Additionally, the three-dimensional spatial data of the obtained motion trajectory were adaptively smoothed. The motion timing data were subsequently segmented, and a dynamic time-warping algorithm was used to match the timing data of the template library with the to-be-classified data.","PeriodicalId":289906,"journal":{"name":"Proceedings of the 2023 3rd International Conference on Artificial Intelligence, Automation and Algorithms","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124924898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DMPNN-Bert: a deep learning architecture for molecular property prediction DMPNN-Bert:用于分子性质预测的深度学习架构
Mengmeng Fan, Qing Liu, Zeyu Cui, Hao Wang, Mingkai Chen, Dakuo He, Yue Hou
Abstract: Molecular property prediction is a fundamental research problem in the fields of drug discovery, chemical synthesis prediction. To establish a universal molecular property prediction model, this study proposed six molecular properties prediction models. For capture molecular features, this study combines the representational ability of molecular graphs and the advantage of attention mechanism. Based on three different molecular graph representation of MPNN, DMPNN, dyMPN, to combine two different kinds of deep learning algorithm with the attention mechanism of Transformer and Bert. The results were compared with MPNN and DMPNN. The evaluation indexes of ROC-AUC, RMSE and MAE are applied in this paper. Ten benchmark datasets were used to test the performance of eight models. The results based on the proposed DMPNN combine Bert (DMPNN-Bert) achieves in seven of ten benchmark datasets, which illustrate that the prediction performance of the proposed model.
摘要:分子性质预测是药物发现、化学合成预测等领域的基础研究问题。为了建立一个通用的分子性质预测模型,本研究提出了6种分子性质预测模型。为了捕获分子特征,本研究结合了分子图的表征能力和注意机制的优势。基于三种不同分子图表示的MPNN, DMPNN, dyMPN,将两种不同的深度学习算法与Transformer和Bert的注意机制相结合。将结果与MPNN和DMPNN进行比较。本文采用ROC-AUC、RMSE和MAE等评价指标。使用10个基准数据集来测试8个模型的性能。基于所提出的DMPNN组合Bert (DMPNN-Bert)的预测结果在10个基准数据集中的7个达到了预期,说明了所提出模型的预测性能。
{"title":"DMPNN-Bert: a deep learning architecture for molecular property prediction","authors":"Mengmeng Fan, Qing Liu, Zeyu Cui, Hao Wang, Mingkai Chen, Dakuo He, Yue Hou","doi":"10.1145/3611450.3611472","DOIUrl":"https://doi.org/10.1145/3611450.3611472","url":null,"abstract":"Abstract: Molecular property prediction is a fundamental research problem in the fields of drug discovery, chemical synthesis prediction. To establish a universal molecular property prediction model, this study proposed six molecular properties prediction models. For capture molecular features, this study combines the representational ability of molecular graphs and the advantage of attention mechanism. Based on three different molecular graph representation of MPNN, DMPNN, dyMPN, to combine two different kinds of deep learning algorithm with the attention mechanism of Transformer and Bert. The results were compared with MPNN and DMPNN. The evaluation indexes of ROC-AUC, RMSE and MAE are applied in this paper. Ten benchmark datasets were used to test the performance of eight models. The results based on the proposed DMPNN combine Bert (DMPNN-Bert) achieves in seven of ten benchmark datasets, which illustrate that the prediction performance of the proposed model.","PeriodicalId":289906,"journal":{"name":"Proceedings of the 2023 3rd International Conference on Artificial Intelligence, Automation and Algorithms","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131976944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RHC Method Based 2D-equal-step Path Generation for UAV Swarm Online Cooperative Path Planning in Dynamic Mission Environment 基于RHC方法的动态任务环境下无人机群在线协同路径规划二维等步路径生成
Yue Shen, Guoliang Fan
This paper first mathematically models the UAV swarm online cooperative path planning problem based on the prerequisite assumptions of transparent posture and dynamic mission environment. Then the receding horizon control (RHC) and 2D-equal-step path generation method are briefly introduced and combined with the improved firefly optimization algorithm to solve the UAV swarm online cooperative path planning problem modeled in the previous. Simulations show that the improved firefly algorithm combining the RHC and 2D-equal-step path generation methods can be used to optimally solve the UAV swarm online cooperative path planning problem for moving mission targets in dynamic environments, and the improved firefly algorithm is more powerful and more efficient than the original algorithm in this process of application.
本文首先基于透明姿态和动态任务环境的前提假设,对无人机群在线协同路径规划问题进行数学建模。然后简要介绍了后退地平线控制(RHC)和二维等步路径生成方法,并结合改进的萤火虫优化算法解决了前面建模的无人机群在线协同路径规划问题。仿真结果表明,结合RHC和2d等步路径生成方法的改进萤火虫算法可以最优地解决动态环境下移动任务目标的无人机群在线协同路径规划问题,改进萤火虫算法在应用过程中比原算法更强大、更高效。
{"title":"RHC Method Based 2D-equal-step Path Generation for UAV Swarm Online Cooperative Path Planning in Dynamic Mission Environment","authors":"Yue Shen, Guoliang Fan","doi":"10.1145/3611450.3611451","DOIUrl":"https://doi.org/10.1145/3611450.3611451","url":null,"abstract":"This paper first mathematically models the UAV swarm online cooperative path planning problem based on the prerequisite assumptions of transparent posture and dynamic mission environment. Then the receding horizon control (RHC) and 2D-equal-step path generation method are briefly introduced and combined with the improved firefly optimization algorithm to solve the UAV swarm online cooperative path planning problem modeled in the previous. Simulations show that the improved firefly algorithm combining the RHC and 2D-equal-step path generation methods can be used to optimally solve the UAV swarm online cooperative path planning problem for moving mission targets in dynamic environments, and the improved firefly algorithm is more powerful and more efficient than the original algorithm in this process of application.","PeriodicalId":289906,"journal":{"name":"Proceedings of the 2023 3rd International Conference on Artificial Intelligence, Automation and Algorithms","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116693711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the 2023 3rd International Conference on Artificial Intelligence, Automation and Algorithms
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1