首页 > 最新文献

2021 IEEE International Conference on Progress in Informatics and Computing (PIC)最新文献

英文 中文
Towards Engineering Fair Ontologies: Unbiasing a Surveillance Ontology 走向工程公平本体:无偏见的监视本体
Pub Date : 2021-12-17 DOI: 10.1109/PIC53636.2021.9687030
Evangelos Paparidis, Konstantinos I. Kotis
Capturing knowledge in ontology-based AI applications may significantly propagate technical/statistical, cultural/social, cognitive/psychological, or other types of bias, to un-fair AI models and to their generated decisions. Biased ontologies (and consequently, knowledge graphs) engineered for intelligent surveillance applications can introduce technical barriers in fair capture of offenders, thus it must be researched as a first priority problem and a constant concern for explicit actions to be taken in the era of a more secure and fair world. In this paper we report preliminary research conducted on the novel topic of engineering fair ontologies and present first experiments with a prototype ontology and knowledge graph in the surveillance domain. Engineering fair ontologies is a quite new research topic, thus, the related work is at early stages. Having said that, in this paper we already highlight a recommended methodological approach for unbiasing ontologies, demonstrated in the surveillance domain, and we identify specific key research issues and challenges for further investigation by the ontology engineering community.
在基于本体的人工智能应用中获取知识可能会显著地传播技术/统计、文化/社会、认知/心理或其他类型的偏见,从而导致不公平的人工智能模型及其生成的决策。为智能监控应用而设计的有偏见的本体论(以及知识图谱)可能会在公平捕获罪犯方面引入技术障碍,因此必须将其作为首要问题进行研究,并在一个更安全和公平的世界时代采取明确的行动。在本文中,我们报告了对工程公平本体这一新课题的初步研究,并在监视领域中首次提出了原型本体和知识图的实验。工程公平本体是一个较新的研究课题,相关工作尚处于起步阶段。话虽如此,在本文中,我们已经强调了一种推荐的无偏见本体的方法方法,在监视领域得到了证明,我们确定了本体工程社区进一步研究的具体关键研究问题和挑战。
{"title":"Towards Engineering Fair Ontologies: Unbiasing a Surveillance Ontology","authors":"Evangelos Paparidis, Konstantinos I. Kotis","doi":"10.1109/PIC53636.2021.9687030","DOIUrl":"https://doi.org/10.1109/PIC53636.2021.9687030","url":null,"abstract":"Capturing knowledge in ontology-based AI applications may significantly propagate technical/statistical, cultural/social, cognitive/psychological, or other types of bias, to un-fair AI models and to their generated decisions. Biased ontologies (and consequently, knowledge graphs) engineered for intelligent surveillance applications can introduce technical barriers in fair capture of offenders, thus it must be researched as a first priority problem and a constant concern for explicit actions to be taken in the era of a more secure and fair world. In this paper we report preliminary research conducted on the novel topic of engineering fair ontologies and present first experiments with a prototype ontology and knowledge graph in the surveillance domain. Engineering fair ontologies is a quite new research topic, thus, the related work is at early stages. Having said that, in this paper we already highlight a recommended methodological approach for unbiasing ontologies, demonstrated in the surveillance domain, and we identify specific key research issues and challenges for further investigation by the ontology engineering community.","PeriodicalId":297239,"journal":{"name":"2021 IEEE International Conference on Progress in Informatics and Computing (PIC)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132393225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Bytecode Service Composition Engine for Embedded Services 嵌入式服务的字节码服务组合引擎
Pub Date : 2021-12-17 DOI: 10.1109/PIC53636.2021.9687016
Siao-Ting Wang, Chenglie Du, Jinchao Chen, Zuo Zhao, Ying Zhang
With the development of embedded systems, people tend to abstract the capacity of an embedded equipment as a service in order to simplify the development, deployment, management and maintenance of the embedded software. By aggregating abilities of individual embedded devices via service composition, people can easily build a more reliable and efficient system. Although the service composition problem has been extensively studied in the field of Web, the adoptation of service composition technique to embedded devices stumps due to the resource limitation and platform heterogeneity of embedded systems. To address these problems, this paper builds a service composition engine for embedded systems that comprises three main works: First, this paper provides a uniform method to represent the embedded service composition problem. Second, this paper designs a compiling method based on topological sorting to convert the unified composition information into the service composition file that represents the way to implement the composite service. Third, this paper devises a bytecode virtual machine to execute the service composition file, and implements the composite service in a resource-friendly way. At last, a carefully devised experiment is conducted, and the result shows our devised engine provides a lightweight, reliable and well-performed way to realize the service composition technique on embedded devices.
随着嵌入式系统的发展,人们倾向于将嵌入式设备的能力抽象为服务,以简化嵌入式软件的开发、部署、管理和维护。通过服务组合将单个嵌入式设备的能力聚合起来,人们可以轻松地构建一个更可靠、更高效的系统。尽管服务组合问题在Web领域得到了广泛的研究,但由于嵌入式系统的资源限制和平台异构性,将服务组合技术应用到嵌入式设备中很难实现。为了解决这些问题,本文构建了一个嵌入式系统的服务组合引擎,主要包括三个方面的工作:首先,本文提供了一个统一的方法来表示嵌入式服务组合问题。其次,设计了一种基于拓扑排序的编译方法,将统一的组合信息转换成代表组合服务实现方式的服务组合文件。第三,设计了一个字节码虚拟机来执行服务组合文件,并以一种资源友好的方式实现了组合服务。最后,进行了精心设计的实验,结果表明所设计的引擎为实现嵌入式设备上的服务组合技术提供了一种轻量级、可靠和性能良好的方法。
{"title":"A Bytecode Service Composition Engine for Embedded Services","authors":"Siao-Ting Wang, Chenglie Du, Jinchao Chen, Zuo Zhao, Ying Zhang","doi":"10.1109/PIC53636.2021.9687016","DOIUrl":"https://doi.org/10.1109/PIC53636.2021.9687016","url":null,"abstract":"With the development of embedded systems, people tend to abstract the capacity of an embedded equipment as a service in order to simplify the development, deployment, management and maintenance of the embedded software. By aggregating abilities of individual embedded devices via service composition, people can easily build a more reliable and efficient system. Although the service composition problem has been extensively studied in the field of Web, the adoptation of service composition technique to embedded devices stumps due to the resource limitation and platform heterogeneity of embedded systems. To address these problems, this paper builds a service composition engine for embedded systems that comprises three main works: First, this paper provides a uniform method to represent the embedded service composition problem. Second, this paper designs a compiling method based on topological sorting to convert the unified composition information into the service composition file that represents the way to implement the composite service. Third, this paper devises a bytecode virtual machine to execute the service composition file, and implements the composite service in a resource-friendly way. At last, a carefully devised experiment is conducted, and the result shows our devised engine provides a lightweight, reliable and well-performed way to realize the service composition technique on embedded devices.","PeriodicalId":297239,"journal":{"name":"2021 IEEE International Conference on Progress in Informatics and Computing (PIC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134235266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A YOLOv3 and ODIN Based State Detection Method for High-speed Railway Catenary Dropper 基于YOLOv3和ODIN的高速铁路接触网滴管状态检测方法
Pub Date : 2021-12-17 DOI: 10.1109/PIC53636.2021.9687060
Man Zhang, Wei-dong Jin, Peng Tang, Liang Li
The dropper is one of the core equipment of high-speed railway catenary, and its working state affects the power supply stability of pantograph catenary system. In this paper, we propose an effective detection method of catenary dropper state based on target detection algorithm You Only Look Once (YOLOv3) and Out-of-Distribution Detector for Neural Networks (ODIN). This method uses YOLOv3 as dropper locating network to detect the dropper area in catenary. The designed dropper state classification model based on ODIN is trained by augmented dropper area images of various states, and then is applied to analyze the specific state of dropper area from the location area images which is output by dropper location network. The extensive experimental results show that YOLOv3 can accurately detect dropper. The ODIN can effectively eliminate the interference of locating errors on the classification of dropper state, and the detection performance of the dropper state classification model is significantly improved by data augmentation. On the testing set, the accuracy of dropper locating network is more than 94.1%, and the precision of dropper state classification model achieve 97.97%.
滴管是高速铁路接触网的核心设备之一,其工作状态直接影响受电弓接触网系统的供电稳定性。本文提出了一种基于目标检测算法You Only Look Once (YOLOv3)和out - distribution Detector for Neural Networks (ODIN)的有效悬链线滴管状态检测方法。该方法采用YOLOv3作为滴管定位网络,对悬链线上的滴管区域进行检测。设计的基于ODIN的滴管状态分类模型通过增强各种状态的滴管区域图像进行训练,然后利用滴管定位网络输出的位置区域图像对滴管区域的具体状态进行分析。大量的实验结果表明,YOLOv3可以准确地检测滴管。ODIN可以有效消除定位误差对液滴状态分类的干扰,通过数据增强,显著提高液滴状态分类模型的检测性能。在测试集上,液滴定位网络的精度达到94.1%以上,液滴状态分类模型的精度达到97.97%。
{"title":"A YOLOv3 and ODIN Based State Detection Method for High-speed Railway Catenary Dropper","authors":"Man Zhang, Wei-dong Jin, Peng Tang, Liang Li","doi":"10.1109/PIC53636.2021.9687060","DOIUrl":"https://doi.org/10.1109/PIC53636.2021.9687060","url":null,"abstract":"The dropper is one of the core equipment of high-speed railway catenary, and its working state affects the power supply stability of pantograph catenary system. In this paper, we propose an effective detection method of catenary dropper state based on target detection algorithm You Only Look Once (YOLOv3) and Out-of-Distribution Detector for Neural Networks (ODIN). This method uses YOLOv3 as dropper locating network to detect the dropper area in catenary. The designed dropper state classification model based on ODIN is trained by augmented dropper area images of various states, and then is applied to analyze the specific state of dropper area from the location area images which is output by dropper location network. The extensive experimental results show that YOLOv3 can accurately detect dropper. The ODIN can effectively eliminate the interference of locating errors on the classification of dropper state, and the detection performance of the dropper state classification model is significantly improved by data augmentation. On the testing set, the accuracy of dropper locating network is more than 94.1%, and the precision of dropper state classification model achieve 97.97%.","PeriodicalId":297239,"journal":{"name":"2021 IEEE International Conference on Progress in Informatics and Computing (PIC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134031405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Distributed HALS Algorithm for NMF based on Simple Average Consensus Algorithm 基于简单平均一致性算法的NMF分布式HALS算法
Pub Date : 2021-12-17 DOI: 10.1109/PIC53636.2021.9687076
Keiju Hayashi, T. Migita, Norikazu Takahashi
Nonnegative Matrix Factorization (NMF) is an efficient dimensionality reduction method for nonnegative data. Recently, a distributed algorithm has been proposed for multiple agents in a network to execute the hierarchical alternating least squares algorithm, which is well known as a fast computation method for NMF. However, the average consensus algorithm used there requires each agent to store the entire history of the values of its variables until the complete average consensus is reached, which increases the memory usage and computational cost. In this paper, we propose to replace the complicated average consensus algorithm with a simple one, and show through simulations that this replacement does not degrade the quality of the result if the values of the hyper-parameters are properly chosen.
非负矩阵分解(NMF)是一种有效的非负数据降维方法。近年来,针对网络中的多个智能体,提出了一种分布式算法来执行分层交替最小二乘算法,该算法被认为是NMF的一种快速计算方法。然而,这里使用的平均共识算法要求每个代理存储其变量值的整个历史记录,直到达到完整的平均共识,这增加了内存使用和计算成本。在本文中,我们提出用简单的平均一致性算法取代复杂的平均一致性算法,并通过仿真表明,如果超参数的值选择得当,这种替换不会降低结果的质量。
{"title":"Distributed HALS Algorithm for NMF based on Simple Average Consensus Algorithm","authors":"Keiju Hayashi, T. Migita, Norikazu Takahashi","doi":"10.1109/PIC53636.2021.9687076","DOIUrl":"https://doi.org/10.1109/PIC53636.2021.9687076","url":null,"abstract":"Nonnegative Matrix Factorization (NMF) is an efficient dimensionality reduction method for nonnegative data. Recently, a distributed algorithm has been proposed for multiple agents in a network to execute the hierarchical alternating least squares algorithm, which is well known as a fast computation method for NMF. However, the average consensus algorithm used there requires each agent to store the entire history of the values of its variables until the complete average consensus is reached, which increases the memory usage and computational cost. In this paper, we propose to replace the complicated average consensus algorithm with a simple one, and show through simulations that this replacement does not degrade the quality of the result if the values of the hyper-parameters are properly chosen.","PeriodicalId":297239,"journal":{"name":"2021 IEEE International Conference on Progress in Informatics and Computing (PIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116566500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cross-Site Scripting (XSS) and SQL Injection Attacks Multi-classification Using Bidirectional LSTM Recurrent Neural Network 基于双向LSTM递归神经网络的跨站脚本攻击和SQL注入攻击
Pub Date : 2021-12-17 DOI: 10.1109/PIC53636.2021.9687064
Abdulgbar A. R. Farea, Chengliang Wang, Ebraheem Farea, Abdulfattah E. Ba Alawi
E-commerce, ticket booking, banking, and other web-based applications that deal with sensitive information, such as passwords, payment information, and financial information, are widespread. Some web developers may have different levels of understanding about securing an online application. The two vulnerabilities identified by the Open Web Application Security Project (OWASP) for its 2017 Top Ten List are SQL injection and Cross-site Scripting (XSS). Because of these two vulnerabilities, an attacker can take advantage of these flaws and launch harmful web-based actions. Many published articles concentrated on a binary classification for these attacks. This article developed a new approach for detecting SQL injection and XSS attacks using deep learning. SQL injection and XSS payloads datasets are combined into a single dataset. The word-embedding technique is utilized to convert the word’s text into a vector. Our model used BiLSTM to auto feature extraction, training, and testing the payloads dataset. BiLSTM classified the payloads into three classes: XSS, SQL injection attacks, and normal. The results showed great results in classifying payloads into three classes: XSS attacks, injection attacks, and non-malicious payloads. BiLSTM showed high performance reached 99.26% in terms of accuracy.
电子商务、机票预订、银行和其他处理敏感信息(如密码、支付信息和财务信息)的基于web的应用程序非常普遍。一些web开发人员可能对保护在线应用程序有不同程度的理解。开放Web应用程序安全项目(OWASP)在其2017年十大漏洞列表中确定的两个漏洞是SQL注入和跨站脚本(XSS)。由于这两个漏洞,攻击者可以利用这些缺陷并发起有害的基于web的操作。许多已发表的文章都集中在这些攻击的二进制分类上。本文开发了一种使用深度学习检测SQL注入和XSS攻击的新方法。SQL注入和XSS有效负载数据集被组合成一个数据集。利用词嵌入技术将词的文本转换为向量。我们的模型使用BiLSTM对有效载荷数据集进行自动特征提取、训练和测试。BiLSTM将有效载荷分为三类:XSS、SQL注入攻击和正常攻击。结果显示,将有效负载分为三类:XSS攻击、注入攻击和非恶意有效负载。BiLSTM的准确率达到了99.26%。
{"title":"Cross-Site Scripting (XSS) and SQL Injection Attacks Multi-classification Using Bidirectional LSTM Recurrent Neural Network","authors":"Abdulgbar A. R. Farea, Chengliang Wang, Ebraheem Farea, Abdulfattah E. Ba Alawi","doi":"10.1109/PIC53636.2021.9687064","DOIUrl":"https://doi.org/10.1109/PIC53636.2021.9687064","url":null,"abstract":"E-commerce, ticket booking, banking, and other web-based applications that deal with sensitive information, such as passwords, payment information, and financial information, are widespread. Some web developers may have different levels of understanding about securing an online application. The two vulnerabilities identified by the Open Web Application Security Project (OWASP) for its 2017 Top Ten List are SQL injection and Cross-site Scripting (XSS). Because of these two vulnerabilities, an attacker can take advantage of these flaws and launch harmful web-based actions. Many published articles concentrated on a binary classification for these attacks. This article developed a new approach for detecting SQL injection and XSS attacks using deep learning. SQL injection and XSS payloads datasets are combined into a single dataset. The word-embedding technique is utilized to convert the word’s text into a vector. Our model used BiLSTM to auto feature extraction, training, and testing the payloads dataset. BiLSTM classified the payloads into three classes: XSS, SQL injection attacks, and normal. The results showed great results in classifying payloads into three classes: XSS attacks, injection attacks, and non-malicious payloads. BiLSTM showed high performance reached 99.26% in terms of accuracy.","PeriodicalId":297239,"journal":{"name":"2021 IEEE International Conference on Progress in Informatics and Computing (PIC)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127814483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Research on Mixed Transaction Analytical Data Management Oriented to Data Middle Platform 面向数据中间平台的混合事务分析数据管理研究
Pub Date : 2021-12-17 DOI: 10.1109/PIC53636.2021.9687022
Aihua Zhou, Li-Peng Zhu, Meng Xu, Sen Pan, Junfeng Qiao, Hongyan Qiu, Song Deng
To solve the problem of non-synchronization between enterprise application development and data development, this paper puts forward the concept of data middle platform, which combines the two data processing mechanisms of online analytical processing (OLAP) and online transaction processing (OLTP), so that faster and better data services can be provided to the foreground business. On this basis, this paper summarizes the research status of the related technologies of the data middle platform, including the architecture of the data middle platform and the key technologies of constructing the data middle platform. In-depth analysis of the business scale and business characteristics of OLTP and OLAP in various application scenarios, focusing on the technical difficulties in the application process of OLTP and OLAP in the application scenario. Finally, it summarizes the challenges faced by the basic research from three aspects: the construction of data middle platform, data quality assurance, and the application of mixed-thing analytical data management.
为了解决企业应用开发与数据开发不同步的问题,本文提出了数据中间平台的概念,将联机分析处理(online analytical processing, OLAP)和联机事务处理(online transaction processing, OLTP)两种数据处理机制结合起来,为前台业务提供更快更好的数据服务。在此基础上,本文总结了数据中间平台相关技术的研究现状,包括数据中间平台的体系结构和构建数据中间平台的关键技术。深入分析OLTP和OLAP在各种应用场景下的业务规模和业务特点,重点分析OLTP和OLAP在应用场景下应用过程中的技术难点。最后,从数据中间平台建设、数据质量保障、混合物分析数据管理应用三个方面总结了基础研究面临的挑战。
{"title":"Research on Mixed Transaction Analytical Data Management Oriented to Data Middle Platform","authors":"Aihua Zhou, Li-Peng Zhu, Meng Xu, Sen Pan, Junfeng Qiao, Hongyan Qiu, Song Deng","doi":"10.1109/PIC53636.2021.9687022","DOIUrl":"https://doi.org/10.1109/PIC53636.2021.9687022","url":null,"abstract":"To solve the problem of non-synchronization between enterprise application development and data development, this paper puts forward the concept of data middle platform, which combines the two data processing mechanisms of online analytical processing (OLAP) and online transaction processing (OLTP), so that faster and better data services can be provided to the foreground business. On this basis, this paper summarizes the research status of the related technologies of the data middle platform, including the architecture of the data middle platform and the key technologies of constructing the data middle platform. In-depth analysis of the business scale and business characteristics of OLTP and OLAP in various application scenarios, focusing on the technical difficulties in the application process of OLTP and OLAP in the application scenario. Finally, it summarizes the challenges faced by the basic research from three aspects: the construction of data middle platform, data quality assurance, and the application of mixed-thing analytical data management.","PeriodicalId":297239,"journal":{"name":"2021 IEEE International Conference on Progress in Informatics and Computing (PIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128816207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Dual Attention Based Uncertainty-aware Mean Teacher Model for Semi-supervised Cardiac Image Segmentation 基于双注意的不确定性感知均值教师模型半监督心脏图像分割
Pub Date : 2021-12-17 DOI: 10.1109/PIC53636.2021.9687054
An Xu, Shaoyu Wang, Jingyi Fan, Xiujin Shi, Qiang Chen
Recently, many fully supervised deep learning based methods have been proposed for automatic cardiac segmentation. However, it is very expensive and time-consuming to annotate data for the task. In this paper, we present a novel dual attention based uncertainty-aware mean teacher semi-supervised framework (DA-UAMT) for cardiac image segmentation. The framework consists of a teacher model and a student model with the same structure and the student model learns from the teacher model by minimizing a segmentation loss generated from labeled images and a consistency loss generated from unlabeled images with respect to the targets of the teacher model. To enable the student model learn from more reliable targets, we introduce the Monte Carlo Dropout which estimates target uncertainty, and a novel dual attention mechanism which helps the network to focus on information in shape and channel dimension. To evaluate the proposed method, we conducted experiments on MICCAI 2017 Automated Cardiac Diagnosis Challenge (ACDC) dataset. Experiments show that our proposed DA-UAMT model is effective in utilizing unlabeled data to obtain considerably better segmentation of cardiac.
近年来,人们提出了许多基于全监督深度学习的自动心脏分割方法。然而,为任务注释数据是非常昂贵和耗时的。在本文中,我们提出了一种新的基于双注意的不确定性感知平均教师半监督框架(DA-UAMT)用于心脏图像分割。该框架由具有相同结构的教师模型和学生模型组成,学生模型通过最小化从标记图像生成的分割损失和从相对于教师模型的目标未标记图像生成的一致性损失来学习教师模型。为了使学生模型能够从更可靠的目标中学习,我们引入了蒙特卡罗Dropout来估计目标的不确定性,并引入了一种新的双注意机制来帮助网络关注形状和通道维度的信息。为了评估所提出的方法,我们在MICCAI 2017自动心脏诊断挑战(ACDC)数据集上进行了实验。实验表明,我们提出的DA-UAMT模型可以有效地利用未标记的数据获得更好的心脏分割。
{"title":"Dual Attention Based Uncertainty-aware Mean Teacher Model for Semi-supervised Cardiac Image Segmentation","authors":"An Xu, Shaoyu Wang, Jingyi Fan, Xiujin Shi, Qiang Chen","doi":"10.1109/PIC53636.2021.9687054","DOIUrl":"https://doi.org/10.1109/PIC53636.2021.9687054","url":null,"abstract":"Recently, many fully supervised deep learning based methods have been proposed for automatic cardiac segmentation. However, it is very expensive and time-consuming to annotate data for the task. In this paper, we present a novel dual attention based uncertainty-aware mean teacher semi-supervised framework (DA-UAMT) for cardiac image segmentation. The framework consists of a teacher model and a student model with the same structure and the student model learns from the teacher model by minimizing a segmentation loss generated from labeled images and a consistency loss generated from unlabeled images with respect to the targets of the teacher model. To enable the student model learn from more reliable targets, we introduce the Monte Carlo Dropout which estimates target uncertainty, and a novel dual attention mechanism which helps the network to focus on information in shape and channel dimension. To evaluate the proposed method, we conducted experiments on MICCAI 2017 Automated Cardiac Diagnosis Challenge (ACDC) dataset. Experiments show that our proposed DA-UAMT model is effective in utilizing unlabeled data to obtain considerably better segmentation of cardiac.","PeriodicalId":297239,"journal":{"name":"2021 IEEE International Conference on Progress in Informatics and Computing (PIC)","volume":"349 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124301204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Olfactory Affective Computation Based on EEG Signal Data 基于脑电信号数据的嗅觉情感计算
Pub Date : 2021-12-17 DOI: 10.1109/PIC53636.2021.9687068
Weihui Dai, Xinyue Li, Ziqing Xia, Jintian Zhou, Lijuan Song, H. Mao, Yan Kang
It is well known that the sense of smell has significant impacts on human moods, therefore olfactory effects have been widely applied to psychological adjustment as well as clinical treatment. Unlike other senses, smell works through the molecules of olfactory stimuli acting on the human nervous system to elicit psychological effects, which is difficult to be accurately described and measured. This makes the commonly used methods hardly applicable to olfactory affective computation. Through analysis of the neural mechanism of human emotions evoked by olfactory sense, this paper specifically designed an EEG experiment to obtain the neural activity data of olfactory stimuli, and compares the clustering characteristics of neural feature data with self-reported scores in PAD emotional space. Thereout, the LS-SVR estimator based on the feature parameters extracted from EEG signal data is proposed for olfactory affective computation. It shows better distinguishing performance and potential reliability than self-reported data, and thus provides an enlightening exploration of this issue.
众所周知,嗅觉对人的情绪有重要的影响,因此嗅觉效应已广泛应用于心理调节和临床治疗。与其他感官不同,嗅觉是通过嗅觉刺激分子作用于人的神经系统,从而引发心理效应,这种效应很难准确描述和测量。这使得常用的方法很难适用于嗅觉情感计算。本文通过分析嗅觉诱发人类情绪的神经机制,专门设计脑电图实验,获取嗅觉刺激的神经活动数据,并将神经特征数据与PAD情绪空间自述得分的聚类特征进行比较。为此,提出了基于脑电信号数据提取特征参数的LS-SVR估计器用于嗅觉情感计算。它比自我报告的数据表现出更好的区分性能和潜在可靠性,从而为这一问题提供了启发性的探索。
{"title":"Olfactory Affective Computation Based on EEG Signal Data","authors":"Weihui Dai, Xinyue Li, Ziqing Xia, Jintian Zhou, Lijuan Song, H. Mao, Yan Kang","doi":"10.1109/PIC53636.2021.9687068","DOIUrl":"https://doi.org/10.1109/PIC53636.2021.9687068","url":null,"abstract":"It is well known that the sense of smell has significant impacts on human moods, therefore olfactory effects have been widely applied to psychological adjustment as well as clinical treatment. Unlike other senses, smell works through the molecules of olfactory stimuli acting on the human nervous system to elicit psychological effects, which is difficult to be accurately described and measured. This makes the commonly used methods hardly applicable to olfactory affective computation. Through analysis of the neural mechanism of human emotions evoked by olfactory sense, this paper specifically designed an EEG experiment to obtain the neural activity data of olfactory stimuli, and compares the clustering characteristics of neural feature data with self-reported scores in PAD emotional space. Thereout, the LS-SVR estimator based on the feature parameters extracted from EEG signal data is proposed for olfactory affective computation. It shows better distinguishing performance and potential reliability than self-reported data, and thus provides an enlightening exploration of this issue.","PeriodicalId":297239,"journal":{"name":"2021 IEEE International Conference on Progress in Informatics and Computing (PIC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126710481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comparison of Wearable Sensor Configuration Methods for Human Activity Recognition Using CNN 基于CNN的人体活动识别可穿戴传感器配置方法比较
Pub Date : 2021-12-17 DOI: 10.1109/PIC53636.2021.9687056
Lina Tong, Qianzhi Lin, Chuanlei Qin, Liang Peng
The number and location configuration methods of wearable sensors for human activity recognition (HAR) are analytically discussed. Based on the publicly available Daily and Sports Activities data set, a convolutional neural network (CNN) was built to recognize 19 kinds of daily and sports activities, and then the model was optimized for better performance. The results of numerous comparative experiments show that deep learning-based HAR is better than machine learning-based HAR in terms of accuracy, and its improvement in accuracy is not directly related to the increase of sensor quantity. Due to its strong capability of feature extraction, deep learning extracts not only activity-related features but also individual differences, therefore, the location with less individual randomness should be selected according to practical engineering. Moreover, the results are also influenced by the limb symmetry in the data set. Finally, the feasibility of achieving higher accuracy with fewer sensors is proved.
分析讨论了用于人体活动识别的可穿戴传感器的数量和位置配置方法。基于公开的日常和体育活动数据集,构建卷积神经网络(CNN)来识别19种日常和体育活动,并对模型进行优化以获得更好的性能。大量对比实验的结果表明,基于深度学习的HAR在精度上优于基于机器学习的HAR,其精度的提高与传感器数量的增加没有直接关系。由于深度学习具有很强的特征提取能力,它不仅可以提取与活动相关的特征,还可以提取个体差异,因此需要根据工程实际选择个体随机性较小的位置。此外,数据集的肢体对称性也会对结果产生影响。最后,证明了用更少的传感器实现更高精度的可行性。
{"title":"A Comparison of Wearable Sensor Configuration Methods for Human Activity Recognition Using CNN","authors":"Lina Tong, Qianzhi Lin, Chuanlei Qin, Liang Peng","doi":"10.1109/PIC53636.2021.9687056","DOIUrl":"https://doi.org/10.1109/PIC53636.2021.9687056","url":null,"abstract":"The number and location configuration methods of wearable sensors for human activity recognition (HAR) are analytically discussed. Based on the publicly available Daily and Sports Activities data set, a convolutional neural network (CNN) was built to recognize 19 kinds of daily and sports activities, and then the model was optimized for better performance. The results of numerous comparative experiments show that deep learning-based HAR is better than machine learning-based HAR in terms of accuracy, and its improvement in accuracy is not directly related to the increase of sensor quantity. Due to its strong capability of feature extraction, deep learning extracts not only activity-related features but also individual differences, therefore, the location with less individual randomness should be selected according to practical engineering. Moreover, the results are also influenced by the limb symmetry in the data set. Finally, the feasibility of achieving higher accuracy with fewer sensors is proved.","PeriodicalId":297239,"journal":{"name":"2021 IEEE International Conference on Progress in Informatics and Computing (PIC)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121879973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2021 IEEE International Conference on Progress in Informatics and Computing (PIC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1