首页 > 最新文献

2021 International Conference on Computer Technology and Media Convergence Design (CTMCD)最新文献

英文 中文
A smart health data acquisition mobile application based on heart rate and blood oxygen module 基于心率和血氧模块的智能健康数据采集移动应用
Haoran Wang, Jing Shen, Ran Zhang, Haoen He, Yuanqiang Song, Zhuo Shi
In the fast-paced social environment, the public work stress, fast pace of life, increased mental and physical burden. Most people often neglect their mental and physical health while focusing on their physical condition. The purpose of this project is to promote and cultivate public awareness of health management. This project is mainly divided into three parts. Health data synchronization application is used to obtain the physical conditions that cannot be perceived by sensors and provide psychological test questionnaires. The data measurement application is mainly used to receive the user’s health data, step number, and location information sent by the hardware, and then carry out step number screening and send the information to the health data synchronization application. The hardware part takes STM32 MCU as the core and drives various sensors(like heart rate and blood oxygen module) to realize the collection of various physiological information. By increasing the frequency of data collection, this project improves the accuracy of information collection and achieves the purpose of rapid detection of user status changes. This project records the user’s physical condition and monitors the user’s mental health condition, thus realizing the user’s health’s multi-directional monitoring.
在快节奏的社会环境中,公众工作压力大,生活节奏快,精神和身体负担加重。大多数人往往忽视了他们的心理和身体健康,而专注于他们的身体状况。该项目的目的是促进和培养公众的健康管理意识。本项目主要分为三个部分。健康数据同步应用获取传感器无法感知的身体状况,提供心理测试问卷。数据测量应用主要用于接收硬件发送给用户的健康数据、步数、位置信息,然后进行步数筛选,将信息发送给健康数据同步应用。硬件部分以STM32单片机为核心,驱动各种传感器(如心率、血氧模块)实现各种生理信息的采集。本项目通过增加数据采集的频率,提高信息采集的准确性,达到快速检测用户状态变化的目的。本项目记录用户的身体状况,监测用户的心理健康状况,实现对用户健康的多方位监测。
{"title":"A smart health data acquisition mobile application based on heart rate and blood oxygen module","authors":"Haoran Wang, Jing Shen, Ran Zhang, Haoen He, Yuanqiang Song, Zhuo Shi","doi":"10.1109/CTMCD53128.2021.00058","DOIUrl":"https://doi.org/10.1109/CTMCD53128.2021.00058","url":null,"abstract":"In the fast-paced social environment, the public work stress, fast pace of life, increased mental and physical burden. Most people often neglect their mental and physical health while focusing on their physical condition. The purpose of this project is to promote and cultivate public awareness of health management. This project is mainly divided into three parts. Health data synchronization application is used to obtain the physical conditions that cannot be perceived by sensors and provide psychological test questionnaires. The data measurement application is mainly used to receive the user’s health data, step number, and location information sent by the hardware, and then carry out step number screening and send the information to the health data synchronization application. The hardware part takes STM32 MCU as the core and drives various sensors(like heart rate and blood oxygen module) to realize the collection of various physiological information. By increasing the frequency of data collection, this project improves the accuracy of information collection and achieves the purpose of rapid detection of user status changes. This project records the user’s physical condition and monitors the user’s mental health condition, thus realizing the user’s health’s multi-directional monitoring.","PeriodicalId":298084,"journal":{"name":"2021 International Conference on Computer Technology and Media Convergence Design (CTMCD)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130314626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
U2-Net for Image Forgery Detection and Localization 基于u2net的图像伪造检测与定位
Tang Zecheng, Wen Xinyuan, Yang Hongli, Zuo Yansong
Until now, image forgery has caused great harm in many aspects, such as certificate falsification, fake news, Internet rumors. As a result, the algorithm for image forensics is of great importance. Existing image forensics algorithms are mature in image forgery detection. Nevertheless, there is still room for improvement when it comes to image forgery localization. This paper modified and migrated U2-Net to image forensics, and conducted several experiments to demonstrate the effectiveness of U2-Net in contrast to ManTra-Net. The experimental results demonstrate that U2-Net is not only capable of image forgery detection but also image forgery localization and that in some cases U2-Net is even more powerful than ManTra-Net in image forgery localization.
迄今为止,图像伪造已经在许多方面造成了巨大的危害,如证书伪造、假新闻、网络谣言等。因此,该算法在图像取证中具有重要的意义。现有的图像取证算法在图像伪造检测方面较为成熟。尽管如此,在图像伪造定位方面仍有改进的空间。本文将U2-Net改进并迁移到图像取证中,并进行了几次实验,以证明U2-Net与ManTra-Net相比的有效性。实验结果表明,u2net不仅具有图像伪造检测的能力,而且具有图像伪造定位的能力,在某些情况下,u2net在图像伪造定位方面甚至比ManTra-Net更强大。
{"title":"U2-Net for Image Forgery Detection and Localization","authors":"Tang Zecheng, Wen Xinyuan, Yang Hongli, Zuo Yansong","doi":"10.1109/CTMCD53128.2021.00042","DOIUrl":"https://doi.org/10.1109/CTMCD53128.2021.00042","url":null,"abstract":"Until now, image forgery has caused great harm in many aspects, such as certificate falsification, fake news, Internet rumors. As a result, the algorithm for image forensics is of great importance. Existing image forensics algorithms are mature in image forgery detection. Nevertheless, there is still room for improvement when it comes to image forgery localization. This paper modified and migrated U2-Net to image forensics, and conducted several experiments to demonstrate the effectiveness of U2-Net in contrast to ManTra-Net. The experimental results demonstrate that U2-Net is not only capable of image forgery detection but also image forgery localization and that in some cases U2-Net is even more powerful than ManTra-Net in image forgery localization.","PeriodicalId":298084,"journal":{"name":"2021 International Conference on Computer Technology and Media Convergence Design (CTMCD)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128753172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Visual analysis of "UCD" based on bibliometrics 基于文献计量学的UCD可视化分析
Zhang Mingzhu
To systematically understand the global characteristics of "User-Centered Design" (UCD) research in the international scope, and explore the research hotspots and future frontier trends of user-centered design. Taking the data of the core collection of Web of Science as the analysis sample, VOSviewer is used to generate a visual knowledge map of the content of the research topic, such as the amount of literature published, cooperation between countries and organizations, keywords, core authors, which is combined with relevant parameters for comprehensive analysis and interpretation. The results showed that the yield of literature in the search area increased year by year. The literature output of developed countries such as North America and Northern Europe is at the forefront in this field. The current situation of institutional cooperation shows that the research cooperation within the region is close and the cross-region is relatively scattered. Keyword clustering presents four research hotspots, which are digital health, user experience, and usability, human-computer interaction, and user involvement. Clustering presents a transition from the traditional focus on the product itself to the focus on people and constitutes a closed-loop flow of the UCD design method.
系统了解国际范围内“以用户为中心的设计”(User-Centered Design, UCD)研究的全球特征,探索以用户为中心设计的研究热点和未来前沿趋势。以Web of Science核心馆藏数据为分析样本,利用VOSviewer生成研究课题内容的可视化知识图谱,如文献发表量、国家与组织合作、关键词、核心作者等,并结合相关参数进行综合分析和解读。结果表明,检索区文献产量呈逐年上升趋势。北美、北欧等发达国家的文献输出在这一领域走在前列。从机构合作的现状来看,区域内的研究合作较为紧密,跨区域的研究合作相对分散。关键词聚类呈现出数字健康、用户体验与可用性、人机交互和用户参与四个研究热点。聚类实现了从传统的以产品本身为中心到以人为中心的转变,构成了UCD设计方法的闭环流程。
{"title":"Visual analysis of \"UCD\" based on bibliometrics","authors":"Zhang Mingzhu","doi":"10.1109/CTMCD53128.2021.00055","DOIUrl":"https://doi.org/10.1109/CTMCD53128.2021.00055","url":null,"abstract":"To systematically understand the global characteristics of \"User-Centered Design\" (UCD) research in the international scope, and explore the research hotspots and future frontier trends of user-centered design. Taking the data of the core collection of Web of Science as the analysis sample, VOSviewer is used to generate a visual knowledge map of the content of the research topic, such as the amount of literature published, cooperation between countries and organizations, keywords, core authors, which is combined with relevant parameters for comprehensive analysis and interpretation. The results showed that the yield of literature in the search area increased year by year. The literature output of developed countries such as North America and Northern Europe is at the forefront in this field. The current situation of institutional cooperation shows that the research cooperation within the region is close and the cross-region is relatively scattered. Keyword clustering presents four research hotspots, which are digital health, user experience, and usability, human-computer interaction, and user involvement. Clustering presents a transition from the traditional focus on the product itself to the focus on people and constitutes a closed-loop flow of the UCD design method.","PeriodicalId":298084,"journal":{"name":"2021 International Conference on Computer Technology and Media Convergence Design (CTMCD)","volume":"189 s654","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132226790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study on the Path of Thangka Redesign in the Context of Digitalization 数字化背景下唐卡再设计路径研究
Lin Zhu
Thangka is a unique Chinese art form and a pictorial representation of Tibetan culture and spirit. The development of digitalization is driving a wave of technology-oriented cultural redesign. This paper analyzes the current situation of thangka design and explores the path of redesigning thangka by digital means through rethinking and understanding the concept of redesign, giving full play to the advantages of digital acquisition, design and dissemination, breaking through the limitations of space and time, and providing a new way of thinking for the research and redesign of thangka cultural conservation in the context of digitalization.
唐卡是中国独特的艺术形式,是西藏文化和精神的形象表现。数字化的发展正在推动一股以技术为导向的文化再设计浪潮。本文通过对重新设计概念的重新思考和理解,分析唐卡设计的现状,探索用数字化手段重新设计唐卡的路径,充分发挥数字化获取、设计和传播的优势,突破空间和时间的限制,为数字化背景下唐卡文化保护的研究和再设计提供新的思路。
{"title":"A Study on the Path of Thangka Redesign in the Context of Digitalization","authors":"Lin Zhu","doi":"10.1109/CTMCD53128.2021.00068","DOIUrl":"https://doi.org/10.1109/CTMCD53128.2021.00068","url":null,"abstract":"Thangka is a unique Chinese art form and a pictorial representation of Tibetan culture and spirit. The development of digitalization is driving a wave of technology-oriented cultural redesign. This paper analyzes the current situation of thangka design and explores the path of redesigning thangka by digital means through rethinking and understanding the concept of redesign, giving full play to the advantages of digital acquisition, design and dissemination, breaking through the limitations of space and time, and providing a new way of thinking for the research and redesign of thangka cultural conservation in the context of digitalization.","PeriodicalId":298084,"journal":{"name":"2021 International Conference on Computer Technology and Media Convergence Design (CTMCD)","volume":"01 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128228265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of Digital Technology Hand-drawn Illustrations in Commercial Posters 数字技术手绘插画在商业海报中的应用
Jing Liu
The application of digital hand-drawn illustrations in the commercial poster industry has become more and more extensive. Strengthening the digital hand-drawn illustrations and digital aesthetic effects of Chinese commercial posters is a necessary move to optimize the quality of hand-drawn illustrations. In the development of China’s commercial posters, we must pay full attention to the important guiding role of digital technology hand-painted illustration effects in the creation and processing of hand-painted illustrations, and promote the development of commercial poster digital aesthetics in the direction of standardization, diversification and effectiveness. In order to maximize the effects and results of hand-drawn illustrations of commercial poster digital technology, we should base ourselves on the goal of commercial poster creation process control and digital aesthetics. We should pay more attention to the scientific control of the digital development trend of commercial posters, promote the maturity of the commercial poster industry, and realize the soundness and perfection of hand-painted illustrations and software in the new era of digital technology. This article first discusses the current development status of digital hand-drawn illustrations for commercial posters. Secondly, the author pointed out some of the problems of single content, efficiency of drawing, and boring style of painting. Finally, the author puts forward a strategy to improve the effect of digital hand-drawn illustrations of commercial posters, and continuously optimizes the quality of economic works of creative units in practice.
数字手绘插画在商业海报行业的应用越来越广泛。加强中国商业海报的数字手绘插画和数字美学效果,是优化手绘插画质量的必要举措。在中国商业海报的发展中,必须充分重视数字技术手绘插画效果在手绘插画创作和加工中的重要指导作用,推动商业海报数字美学朝着规范化、多元化、实效性的方向发展。为了最大限度地发挥商业海报数字技术手绘插画的效果和效果,我们应该立足于商业海报创作过程控制和数字美学的目标。我们应该更加重视对商业海报数字化发展趋势的科学控制,促进商业海报行业的成熟,实现手绘插画和软件在数字技术新时代的稳健与完善。本文首先讨论了商业海报数字手绘插画的发展现状。其次,指出了内容单一、绘画效率高、画风枯燥等问题。最后,笔者提出了提高商业海报数字手绘插画效果的策略,并在实践中不断优化创意单位的经济作品质量。
{"title":"Application of Digital Technology Hand-drawn Illustrations in Commercial Posters","authors":"Jing Liu","doi":"10.1109/CTMCD53128.2021.00073","DOIUrl":"https://doi.org/10.1109/CTMCD53128.2021.00073","url":null,"abstract":"The application of digital hand-drawn illustrations in the commercial poster industry has become more and more extensive. Strengthening the digital hand-drawn illustrations and digital aesthetic effects of Chinese commercial posters is a necessary move to optimize the quality of hand-drawn illustrations. In the development of China’s commercial posters, we must pay full attention to the important guiding role of digital technology hand-painted illustration effects in the creation and processing of hand-painted illustrations, and promote the development of commercial poster digital aesthetics in the direction of standardization, diversification and effectiveness. In order to maximize the effects and results of hand-drawn illustrations of commercial poster digital technology, we should base ourselves on the goal of commercial poster creation process control and digital aesthetics. We should pay more attention to the scientific control of the digital development trend of commercial posters, promote the maturity of the commercial poster industry, and realize the soundness and perfection of hand-painted illustrations and software in the new era of digital technology. This article first discusses the current development status of digital hand-drawn illustrations for commercial posters. Secondly, the author pointed out some of the problems of single content, efficiency of drawing, and boring style of painting. Finally, the author puts forward a strategy to improve the effect of digital hand-drawn illustrations of commercial posters, and continuously optimizes the quality of economic works of creative units in practice.","PeriodicalId":298084,"journal":{"name":"2021 International Conference on Computer Technology and Media Convergence Design (CTMCD)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123206127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Generative Adversarial Networks Based on Dual Attention Mechanism to Generate Face Images 基于双注意机制的生成对抗网络生成人脸图像
Yu Yang, Lei Sun, Xiuqing Mao, Leyu Dai, Song Guo, Peiyuan Liu
Traditional Generative Adversarial Networks (GAN) simulates the correlation between different regions through multiple convolution, but correlation between long-distance is relatively small, resulting in unclear details of generated images. To solve this problem, we propose a model based on dual attention mechanism which called DA-GAN. The self-attention mechanism can extract the dependency effectively between the local and global features of images, allowing the network to learn the connections purposefully between the features, thereby generating higher quality images. The channel-attention mechanism obtains the importance degree of each feature’s channel automatically, and improves useful features and suppresses the features that are not useful for the current task according to the importance degree, so as to calculate resources more efficiently. Experiments demonstrate that our method achieves better performance than other method on the CelebA dataset and can produce higher-quality images.
传统的生成对抗网络(GAN)通过多次卷积模拟不同区域之间的相关性,但距离之间的相关性相对较小,导致生成的图像细节不清晰。为了解决这一问题,我们提出了一种基于双注意机制的DA-GAN模型。自关注机制可以有效地提取图像局部特征和全局特征之间的依赖关系,使网络有目的地学习特征之间的联系,从而生成更高质量的图像。通道注意机制自动获得每个特征的通道的重要程度,并根据重要程度对有用的特征进行改进,对当前任务无用的特征进行抑制,从而更有效地计算资源。实验表明,我们的方法在CelebA数据集上取得了比其他方法更好的性能,可以产生更高质量的图像。
{"title":"Using Generative Adversarial Networks Based on Dual Attention Mechanism to Generate Face Images","authors":"Yu Yang, Lei Sun, Xiuqing Mao, Leyu Dai, Song Guo, Peiyuan Liu","doi":"10.1109/CTMCD53128.2021.00011","DOIUrl":"https://doi.org/10.1109/CTMCD53128.2021.00011","url":null,"abstract":"Traditional Generative Adversarial Networks (GAN) simulates the correlation between different regions through multiple convolution, but correlation between long-distance is relatively small, resulting in unclear details of generated images. To solve this problem, we propose a model based on dual attention mechanism which called DA-GAN. The self-attention mechanism can extract the dependency effectively between the local and global features of images, allowing the network to learn the connections purposefully between the features, thereby generating higher quality images. The channel-attention mechanism obtains the importance degree of each feature’s channel automatically, and improves useful features and suppresses the features that are not useful for the current task according to the importance degree, so as to calculate resources more efficiently. Experiments demonstrate that our method achieves better performance than other method on the CelebA dataset and can produce higher-quality images.","PeriodicalId":298084,"journal":{"name":"2021 International Conference on Computer Technology and Media Convergence Design (CTMCD)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123318464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
5G Secondary Authentication based on EAP-TLS Protocol 基于EAP-TLS协议的5G二次认证
Qianfang Hao, Lei Sun, Songhui Guo, Ruiyu Dou, Haidong Liu, Dazan Qian
With the development of mobile communication technology, we have now entered the 5G era. At the same time, vertical industries have also made new developments in 5G. Compared with ordinary users, users in vertical industries have more security requirements for their services. While vertical industries are developing in a more digital and networked direction, traditional authentication methods such as VPDN cannot satisfy the new security requirements, which brings greater challenges to the security of vertical industries. In order to satisfy the more security requirements of vertical industries, endogenous secondary authentication is introduced in the 5G network architecture, and the Extensible Authentication Protocol (EAP) is used to satisfy the different security requirements of vertical industries. This paper analyzes three kinds of secondary authentication methods based on the status quo and technological development trends of vertical industries, and proposes a 5G secondary authentication scheme based on 3GPP protocol standards. We use OpenAirInterface (OAI) to build a mobile communication network experimental platform, and realize the secondary authentication between users and authentication servers based on the EAP-TLS protocol by modifying the function of the network element. Experiment results demonstrate that our scheme has high security and reliability. It can provide a reference for the vertical industry to deploy secondary authentication in 5G.
随着移动通信技术的发展,我们已经进入了5G时代。与此同时,垂直行业也在5G方面取得了新的发展。与普通用户相比,垂直行业用户对服务的安全性要求更高。在垂直行业向数字化、网络化方向发展的同时,传统的VPDN等认证方式已经无法满足新的安全需求,这给垂直行业的安全带来了更大的挑战。为了满足垂直行业更多的安全需求,在5G网络架构中引入了内生的二次认证,并采用可扩展认证协议EAP (Extensible authentication Protocol)来满足垂直行业不同的安全需求。本文根据垂直行业的现状和技术发展趋势,分析了三种二次认证方式,提出了一种基于3GPP协议标准的5G二次认证方案。利用OpenAirInterface (OAI)搭建移动通信网络实验平台,通过修改网元的功能,实现基于EAP-TLS协议的用户与认证服务器之间的二次认证。实验结果表明,该方案具有较高的安全性和可靠性。可以为垂直行业在5G环境下部署二次认证提供参考。
{"title":"5G Secondary Authentication based on EAP-TLS Protocol","authors":"Qianfang Hao, Lei Sun, Songhui Guo, Ruiyu Dou, Haidong Liu, Dazan Qian","doi":"10.1109/CTMCD53128.2021.00070","DOIUrl":"https://doi.org/10.1109/CTMCD53128.2021.00070","url":null,"abstract":"With the development of mobile communication technology, we have now entered the 5G era. At the same time, vertical industries have also made new developments in 5G. Compared with ordinary users, users in vertical industries have more security requirements for their services. While vertical industries are developing in a more digital and networked direction, traditional authentication methods such as VPDN cannot satisfy the new security requirements, which brings greater challenges to the security of vertical industries. In order to satisfy the more security requirements of vertical industries, endogenous secondary authentication is introduced in the 5G network architecture, and the Extensible Authentication Protocol (EAP) is used to satisfy the different security requirements of vertical industries. This paper analyzes three kinds of secondary authentication methods based on the status quo and technological development trends of vertical industries, and proposes a 5G secondary authentication scheme based on 3GPP protocol standards. We use OpenAirInterface (OAI) to build a mobile communication network experimental platform, and realize the secondary authentication between users and authentication servers based on the EAP-TLS protocol by modifying the function of the network element. Experiment results demonstrate that our scheme has high security and reliability. It can provide a reference for the vertical industry to deploy secondary authentication in 5G.","PeriodicalId":298084,"journal":{"name":"2021 International Conference on Computer Technology and Media Convergence Design (CTMCD)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129216125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Learning in Video Violence Detection 视频暴力检测中的深度学习
Minglan Su, Chaoying Zhang, Yingbei Tong, Baolin Liang, Sicong Ma, Jianxiu Wang
In recent years, in order to continuously promote the construction of a safe city, intelligent monitoring equipment has been widely used throughout the country. In the field of intelligent image analysis, behavioral intelligence analysis has received more and more attention. At present, behavior analysis methods focus on detecting simple actions, such as walking, jogging, or jumping; while there is less research on fighting or violent behaviors with complex actions. However, the effective intelligent analysis of violence in video surveillance is essential to maintaining social stability and protecting people's lives and property. Therefore, we summarize the latest methods of violence detection in existing video sequences.
近年来,为了不断推进平安城市建设,智能监控设备在全国范围内得到了广泛的应用。在智能图像分析领域,行为智能分析受到了越来越多的关注。目前,行为分析方法侧重于检测简单的动作,如散步、慢跑或跳跃;而对复杂行为的打斗或暴力行为的研究较少。然而,在视频监控中对暴力事件进行有效的智能分析,对于维护社会稳定、保护人民生命财产安全至关重要。因此,我们总结了现有视频序列中暴力检测的最新方法。
{"title":"Deep Learning in Video Violence Detection","authors":"Minglan Su, Chaoying Zhang, Yingbei Tong, Baolin Liang, Sicong Ma, Jianxiu Wang","doi":"10.1109/CTMCD53128.2021.00064","DOIUrl":"https://doi.org/10.1109/CTMCD53128.2021.00064","url":null,"abstract":"In recent years, in order to continuously promote the construction of a safe city, intelligent monitoring equipment has been widely used throughout the country. In the field of intelligent image analysis, behavioral intelligence analysis has received more and more attention. At present, behavior analysis methods focus on detecting simple actions, such as walking, jogging, or jumping; while there is less research on fighting or violent behaviors with complex actions. However, the effective intelligent analysis of violence in video surveillance is essential to maintaining social stability and protecting people's lives and property. Therefore, we summarize the latest methods of violence detection in existing video sequences.","PeriodicalId":298084,"journal":{"name":"2021 International Conference on Computer Technology and Media Convergence Design (CTMCD)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126193278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
CTMCD 2021 Preface CTMCD 2021前言
{"title":"CTMCD 2021 Preface","authors":"","doi":"10.1109/ctmcd53128.2021.00005","DOIUrl":"https://doi.org/10.1109/ctmcd53128.2021.00005","url":null,"abstract":"","PeriodicalId":298084,"journal":{"name":"2021 International Conference on Computer Technology and Media Convergence Design (CTMCD)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117057829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CTMCD 2021 Organizing Committees CTMCD 2021组委会
{"title":"CTMCD 2021 Organizing Committees","authors":"","doi":"10.1109/ctmcd53128.2021.00006","DOIUrl":"https://doi.org/10.1109/ctmcd53128.2021.00006","url":null,"abstract":"","PeriodicalId":298084,"journal":{"name":"2021 International Conference on Computer Technology and Media Convergence Design (CTMCD)","volume":"309 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129974487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2021 International Conference on Computer Technology and Media Convergence Design (CTMCD)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1