首页 > 最新文献

2022 IEEE 5th International Conference on Computer and Communication Engineering Technology (CCET)最新文献

英文 中文
A Lung Cancer Detection and Recognition Method Combining Convolutional Neural Network and Morphological Features 一种结合卷积神经网络和形态学特征的肺癌检测与识别方法
Yongmei Zhang, Bin Dai, Minghui Dong, Hao Chen, Mengyang Zhou
Lung cancer is the malignant tumor with the highest morbidity and mortality, and it is a great threat to human health. With the increasing refinement of lung cancer images, it provides a lot of useful information for the analysis and identification of lung cancer, and an important help to assist doctors in making accurate diagnosis. A considerable part of lung cancer manifests as nodules in the early stage. Pulmonary nodules are round or irregular lesions in the lungs, about 34% are lung cancers, and the rest are benign lesions. Therefore, the detection of pulmonary nodules is very important for the detection of early lung cancer. In this paper, some Computed Tomography (CT) images of the Lung Image Database Consortium (LIDC) dataset are adopted as training and testing data, data preprocessing is completed by intercepting pixels, normalization and other methods, data enhancement is realized such as rotation and scaling methods, and the pulmonary nodule sample library is expanded. Utilizing the constructed lung nodule sample library, train the Convolutional Neural Network (CNN) model, complete the detection and segmentation of pulmonary nodules, and exact the regions of pulmonary nodules. The size and regularity features of pulmonary nodules are extracted, and lung cancer recognition is realized according to the size and shape of pulmonary nodules. The experiment results show the lung cancer detection and identification method based on convolutional neural network with morphological features has higher accuracy.
肺癌是世界上发病率和死亡率最高的恶性肿瘤,严重威胁着人类的健康。随着肺癌图像的不断细化,它为肺癌的分析和鉴别提供了很多有用的信息,是辅助医生准确诊断的重要帮助。相当一部分肺癌在早期表现为结节。肺结节是肺内圆形或不规则的病变,约34%为肺癌,其余为良性病变。因此,肺结节的检测对于早期肺癌的发现是非常重要的。本文采用肺图像数据库联盟(LIDC)数据集的部分CT图像作为训练和测试数据,通过截取像素、归一化等方法完成数据预处理,通过旋转、缩放等方法实现数据增强,扩展肺结节样本库。利用构建的肺结节样本库,训练卷积神经网络(CNN)模型,完成肺结节的检测和分割,精确肺结节的区域。提取肺结节的大小和规律性特征,根据肺结节的大小和形状实现肺癌的识别。实验结果表明,基于形态学特征的卷积神经网络的肺癌检测识别方法具有较高的准确率。
{"title":"A Lung Cancer Detection and Recognition Method Combining Convolutional Neural Network and Morphological Features","authors":"Yongmei Zhang, Bin Dai, Minghui Dong, Hao Chen, Mengyang Zhou","doi":"10.1109/CCET55412.2022.9906329","DOIUrl":"https://doi.org/10.1109/CCET55412.2022.9906329","url":null,"abstract":"Lung cancer is the malignant tumor with the highest morbidity and mortality, and it is a great threat to human health. With the increasing refinement of lung cancer images, it provides a lot of useful information for the analysis and identification of lung cancer, and an important help to assist doctors in making accurate diagnosis. A considerable part of lung cancer manifests as nodules in the early stage. Pulmonary nodules are round or irregular lesions in the lungs, about 34% are lung cancers, and the rest are benign lesions. Therefore, the detection of pulmonary nodules is very important for the detection of early lung cancer. In this paper, some Computed Tomography (CT) images of the Lung Image Database Consortium (LIDC) dataset are adopted as training and testing data, data preprocessing is completed by intercepting pixels, normalization and other methods, data enhancement is realized such as rotation and scaling methods, and the pulmonary nodule sample library is expanded. Utilizing the constructed lung nodule sample library, train the Convolutional Neural Network (CNN) model, complete the detection and segmentation of pulmonary nodules, and exact the regions of pulmonary nodules. The size and regularity features of pulmonary nodules are extracted, and lung cancer recognition is realized according to the size and shape of pulmonary nodules. The experiment results show the lung cancer detection and identification method based on convolutional neural network with morphological features has higher accuracy.","PeriodicalId":329327,"journal":{"name":"2022 IEEE 5th International Conference on Computer and Communication Engineering Technology (CCET)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125276416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Mask-Wearing Face Recognition Method Based on Low-Level Features and Deep Residual Networks 基于低层次特征和深度残差网络的戴面具人脸识别方法
Yongmei Zhang, Chenyang Sun, Mengyang Zhou, Haoxing Chen, Minghui Dong
Masks will invalidate the original face recognition algorithm model and make the computer unable to recognize faces. In addition, there are many types of masks, and the degree of occlusion is different, which increases the difficulty of face recognition. This paper combines the traditional feature extraction method with deep learning, and proposes a face recognition method with masks based on low-level features and deep residual network. The method of face segmentation based on feature points is used to extract the local features of the face, using the Holistically-nested Edge Detection (HED) algorithm to extract the overall contour features of the face, fusion of local features, overall contour features and pre-processed images into a deep residual network model, realize face recognition with masks, and evaluate the face recognition method with accuracy. The experiment results show this method improves the recognition accuracy compared with Principal Component Analysis (PCA) and convolutional neural network (CNN).
口罩会使原有的人脸识别算法模型失效,使计算机无法识别人脸。此外,口罩种类繁多,遮挡程度不一,增加了人脸识别的难度。本文将传统的特征提取方法与深度学习相结合,提出了一种基于底层特征和深度残差网络的掩模人脸识别方法。采用基于特征点的人脸分割方法提取人脸的局部特征,采用整体嵌套边缘检测(HED)算法提取人脸的整体轮廓特征,将局部特征、整体轮廓特征和预处理后的图像融合成深度残差网络模型,实现带mask的人脸识别,并对人脸识别方法的准确性进行评价。实验结果表明,与主成分分析(PCA)和卷积神经网络(CNN)相比,该方法提高了识别精度。
{"title":"A Mask-Wearing Face Recognition Method Based on Low-Level Features and Deep Residual Networks","authors":"Yongmei Zhang, Chenyang Sun, Mengyang Zhou, Haoxing Chen, Minghui Dong","doi":"10.1109/CCET55412.2022.9906328","DOIUrl":"https://doi.org/10.1109/CCET55412.2022.9906328","url":null,"abstract":"Masks will invalidate the original face recognition algorithm model and make the computer unable to recognize faces. In addition, there are many types of masks, and the degree of occlusion is different, which increases the difficulty of face recognition. This paper combines the traditional feature extraction method with deep learning, and proposes a face recognition method with masks based on low-level features and deep residual network. The method of face segmentation based on feature points is used to extract the local features of the face, using the Holistically-nested Edge Detection (HED) algorithm to extract the overall contour features of the face, fusion of local features, overall contour features and pre-processed images into a deep residual network model, realize face recognition with masks, and evaluate the face recognition method with accuracy. The experiment results show this method improves the recognition accuracy compared with Principal Component Analysis (PCA) and convolutional neural network (CNN).","PeriodicalId":329327,"journal":{"name":"2022 IEEE 5th International Conference on Computer and Communication Engineering Technology (CCET)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131047472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fault Alarm Communication Scheduling Architecture and Method for Power System 电力系统故障报警通信调度体系结构与方法
Xiangjv Sun, Wenhao Zhan, Y. Li
Today, operation and maintenance security has become a key factor for the stable development of enterprises. The flexible alarm information communication scheduling structure and intelligent fault alarm method are of great significance to improve the accuracy of alarm judgment, which can greatly realize the safe production of power enterprises and effectively ensure their steady and healthy development. Therefore, this paper proposes a modular structure. The alarm information communication scheduling architecture of the system uses unsupervised machine learning algorithms to predict fault information, analyze the correlation between faults, and at the same time achieve a high degree of coordination between modules, thereby providing an efficient and stable alarm method.
如今,运维安全已成为企业稳定发展的关键因素。灵活的报警信息通信调度结构和智能化的故障报警方法对提高报警判断的准确性具有重要意义,可以极大地实现电力企业的安全生产,有效地保证电力企业的平稳健康发展。因此,本文提出了模块化结构。系统的报警信息通信调度架构采用无监督机器学习算法预测故障信息,分析故障之间的相关性,同时实现模块之间的高度协调,从而提供一种高效稳定的报警方法。
{"title":"Fault Alarm Communication Scheduling Architecture and Method for Power System","authors":"Xiangjv Sun, Wenhao Zhan, Y. Li","doi":"10.1109/CCET55412.2022.9906350","DOIUrl":"https://doi.org/10.1109/CCET55412.2022.9906350","url":null,"abstract":"Today, operation and maintenance security has become a key factor for the stable development of enterprises. The flexible alarm information communication scheduling structure and intelligent fault alarm method are of great significance to improve the accuracy of alarm judgment, which can greatly realize the safe production of power enterprises and effectively ensure their steady and healthy development. Therefore, this paper proposes a modular structure. The alarm information communication scheduling architecture of the system uses unsupervised machine learning algorithms to predict fault information, analyze the correlation between faults, and at the same time achieve a high degree of coordination between modules, thereby providing an efficient and stable alarm method.","PeriodicalId":329327,"journal":{"name":"2022 IEEE 5th International Conference on Computer and Communication Engineering Technology (CCET)","volume":"114 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132567219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CCET 2022 Cover Page CCET 2022封面页
{"title":"CCET 2022 Cover Page","authors":"","doi":"10.1109/ccet55412.2022.9906327","DOIUrl":"https://doi.org/10.1109/ccet55412.2022.9906327","url":null,"abstract":"","PeriodicalId":329327,"journal":{"name":"2022 IEEE 5th International Conference on Computer and Communication Engineering Technology (CCET)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128436563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-modal Graph Attention Network for Video Recommendation 视频推荐的多模态图关注网络
Huizhi Liu, Chen Li, Lihua Tian
In view of the problems of cold start and data interaction in recommendation systems, and most current recommendation algorithms ignore the diversity of data types, the combination of multimodal data and knowledge graph is bound to improve the pertinence of video recommendation. In this paper, we propose Multi-modal Knowledge Graph Attention Network (MMKGV) model, and all the entity nodes of the knowledge graph are innovatively introduced into multimodal information. The high-order recursive node information dissemination and information aggregation are carried out on the multimodal knowledge graph through the graph attention network. In the model, the triplet function of the knowledge graph is used to construct the triplet inference relationship, and the vector representation generated by the final aggregation is used for recommendation. Through extensive experiments on two public datasets TikTok and Kwai, the results show that the MMKGV can effectively improve the effect of video recommendation compared with other comparison algorithms.
针对推荐系统中存在的冷启动和数据交互问题,以及目前大多数推荐算法忽视数据类型的多样性,多模态数据与知识图的结合必然会提高视频推荐的针对性。本文提出了多模态知识图注意网络(MMKGV)模型,并将知识图的所有实体节点创新性地引入到多模态信息中。通过图关注网络对多模态知识图进行高阶递归节点信息传播和信息聚合。在该模型中,利用知识图的三元组函数构建三元组推理关系,并利用最终聚合生成的向量表示进行推荐。通过在TikTok和Kwai两个公共数据集上的大量实验,结果表明MMKGV与其他比较算法相比,可以有效地提高视频推荐的效果。
{"title":"Multi-modal Graph Attention Network for Video Recommendation","authors":"Huizhi Liu, Chen Li, Lihua Tian","doi":"10.1109/CCET55412.2022.9906399","DOIUrl":"https://doi.org/10.1109/CCET55412.2022.9906399","url":null,"abstract":"In view of the problems of cold start and data interaction in recommendation systems, and most current recommendation algorithms ignore the diversity of data types, the combination of multimodal data and knowledge graph is bound to improve the pertinence of video recommendation. In this paper, we propose Multi-modal Knowledge Graph Attention Network (MMKGV) model, and all the entity nodes of the knowledge graph are innovatively introduced into multimodal information. The high-order recursive node information dissemination and information aggregation are carried out on the multimodal knowledge graph through the graph attention network. In the model, the triplet function of the knowledge graph is used to construct the triplet inference relationship, and the vector representation generated by the final aggregation is used for recommendation. Through extensive experiments on two public datasets TikTok and Kwai, the results show that the MMKGV can effectively improve the effect of video recommendation compared with other comparison algorithms.","PeriodicalId":329327,"journal":{"name":"2022 IEEE 5th International Conference on Computer and Communication Engineering Technology (CCET)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130605369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Self-Attentive Interest Retrieval Recommender 一个自关注兴趣检索推荐器
Min Wu, Chen Li, Lihua Tian
Thanks to the attention mechanism, self-attention networks (SANs) have been widely used in sequential recommendation. However, most existing SANs approaches still follow an old fashion generating one single embedding as final representation, which constraints model’s capacity. To enrich this kind of representation, sequential recommender uses metadata such as item category to capture user’s multi-interests. But this method will not reach its expectation due to item’s long-tail property. This property will result a large constant of category cannot be effectively activated by the lack of interaction records. Another drawback is that may also lead to over-parameterization caused by the massive categories. Particularly, we propose a Self-Attentive Interest Retrieval network (SAIR) to explore a context-aware representation from user’s behaviors while not fall into over-parameterization. SAIR works in a typical SANs manner, encode the behavior sequence using self-attention, and we propose an interest retrieval module to project the sequences to an interest relevance distribution adaptively. And we leverage an interest-to-interest interaction to generate several context-aware interests embeddings. Then we fuse multi-interest embeddings as final output. Extensive experiments are carried out on three real-world datasets, the results demonstrate that SAIR outperforms other SANs methods and other state-of-the-art algorithms in multiple evaluation metrics.
由于注意机制的存在,自注意网络在序贯推荐中得到了广泛的应用。然而,大多数现有的san方法仍然遵循生成单个嵌入作为最终表示的旧方式,这限制了模型的容量。为了丰富这种表示,顺序推荐使用诸如项目类别之类的元数据来捕获用户的多重兴趣。但是由于项目的长尾属性,该方法不会达到预期。此属性将导致由于缺乏交互记录而无法有效激活大类常量。另一个缺点是,这也可能导致由大量类别引起的过度参数化。特别地,我们提出了一个自关注兴趣检索网络(SAIR)来探索用户行为的上下文感知表示,而不会陷入过度参数化。SAIR以典型的SANs方式工作,利用自关注对行为序列进行编码,并提出了一个兴趣检索模块,将序列自适应地投影到兴趣相关分布中。我们利用兴趣到兴趣的交互来生成几个上下文感知的兴趣嵌入。然后我们融合多兴趣嵌入作为最终输出。在三个真实数据集上进行了大量实验,结果表明SAIR在多个评估指标上优于其他SANs方法和其他最先进的算法。
{"title":"A Self-Attentive Interest Retrieval Recommender","authors":"Min Wu, Chen Li, Lihua Tian","doi":"10.1109/CCET55412.2022.9906367","DOIUrl":"https://doi.org/10.1109/CCET55412.2022.9906367","url":null,"abstract":"Thanks to the attention mechanism, self-attention networks (SANs) have been widely used in sequential recommendation. However, most existing SANs approaches still follow an old fashion generating one single embedding as final representation, which constraints model’s capacity. To enrich this kind of representation, sequential recommender uses metadata such as item category to capture user’s multi-interests. But this method will not reach its expectation due to item’s long-tail property. This property will result a large constant of category cannot be effectively activated by the lack of interaction records. Another drawback is that may also lead to over-parameterization caused by the massive categories. Particularly, we propose a Self-Attentive Interest Retrieval network (SAIR) to explore a context-aware representation from user’s behaviors while not fall into over-parameterization. SAIR works in a typical SANs manner, encode the behavior sequence using self-attention, and we propose an interest retrieval module to project the sequences to an interest relevance distribution adaptively. And we leverage an interest-to-interest interaction to generate several context-aware interests embeddings. Then we fuse multi-interest embeddings as final output. Extensive experiments are carried out on three real-world datasets, the results demonstrate that SAIR outperforms other SANs methods and other state-of-the-art algorithms in multiple evaluation metrics.","PeriodicalId":329327,"journal":{"name":"2022 IEEE 5th International Conference on Computer and Communication Engineering Technology (CCET)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121544177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Construction of Narrative Text Component Recognition Corpus 叙事文本成分识别语料库的构建
Feng Zhang, Yingqi Han, Jiong Wang, Jie Liu
Textual structure analysis is an important part of Automatic Essay Score (AES), and is also one of the important research directions in Natural Language Processing. At present, there are still deficiencies in the research of narrative textual structure in China, one of the main reasons is the lack of data available for research. To solve this problem, this paper proposes and constructs a corpus for the textual component identification of narrative essay. This paper divides the text structure of narrative essay, and forms a corpus for the narrative essay component identification. The paper finally annotated 3024 articles with 21128 sentences in total. This paper combines manual annotation and the automatic annotation of the model to build corpus, and conducts statistical analysis on the distribution of the corpus content and the consistency of the corpus annotation. The experiment shows text component recognition performance achieves 80.75% F 1 score. The work provided basic data for the research of AES.
文本结构分析是自动作文评分(AES)的重要组成部分,也是自然语言处理的重要研究方向之一。目前,国内对叙事文本结构的研究还存在不足,其中一个主要原因是缺乏可用于研究的数据。为了解决这一问题,本文提出并构建了一个叙事性短文语篇成分识别的语料库。本文对叙事性散文的文本结构进行了划分,形成了叙事性散文成分识别的语料库。论文最终注释了3024篇文章,共计21128个句子。本文将人工标注与模型自动标注相结合构建语料库,并对语料库内容的分布和语料库标注的一致性进行统计分析。实验表明,文本成分识别性能达到80.75%的f1分。该工作为AES的研究提供了基础数据。
{"title":"Construction of Narrative Text Component Recognition Corpus","authors":"Feng Zhang, Yingqi Han, Jiong Wang, Jie Liu","doi":"10.1109/CCET55412.2022.9906339","DOIUrl":"https://doi.org/10.1109/CCET55412.2022.9906339","url":null,"abstract":"Textual structure analysis is an important part of Automatic Essay Score (AES), and is also one of the important research directions in Natural Language Processing. At present, there are still deficiencies in the research of narrative textual structure in China, one of the main reasons is the lack of data available for research. To solve this problem, this paper proposes and constructs a corpus for the textual component identification of narrative essay. This paper divides the text structure of narrative essay, and forms a corpus for the narrative essay component identification. The paper finally annotated 3024 articles with 21128 sentences in total. This paper combines manual annotation and the automatic annotation of the model to build corpus, and conducts statistical analysis on the distribution of the corpus content and the consistency of the corpus annotation. The experiment shows text component recognition performance achieves 80.75% F 1 score. The work provided basic data for the research of AES.","PeriodicalId":329327,"journal":{"name":"2022 IEEE 5th International Conference on Computer and Communication Engineering Technology (CCET)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122680738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Innovation of Financial Digitalization Enhances the Financing Capability of Small and Medium-Sized Enterprises: An Empirical Study 金融数字化创新提升中小企业融资能力的实证研究
Qiwei Huan, B. Bai, Wenbiao Cai, Yundi Chen
In recent years, severe financing constraints restrict the development of SMEs (small and medium-sized enterprises) and the use of digital finance can play a greater role in the financing of SMEs. This paper conducts research through the empirical analysis method. Based on the existing research findings, the financing constraints of SMEs show a strong cash-cash flow sensitivity. So this paper build a cash-flow sensitivity model to measure financing constraints and add digital finance data variables to explore the impact of digital finance on SMEs’ financing constraints. Then Stata 15.0 statistical software was used to carry out descriptive statistics, correlation analysis, regression analysis, and robustness test. The results show that there are financing constraints in SMEs, and the financing constraints of SMEs are alleviated after joining the digital finance system, which shows that the financing constraints of SMEs can be effectively improved by the digital finance system, but the ability to innovate and empower needs to be improved. The development of digital finance can cut through the data islands, reduce moral risk, rich financing channels, and financing costs indirectly reduced.
近年来,严重的融资约束制约着中小企业的发展,利用数字金融可以在中小企业的融资中发挥更大的作用。本文通过实证分析的方法进行研究。从已有的研究结果来看,中小企业的融资约束表现出较强的现金流敏感性。因此,本文构建现金流敏感性模型来衡量融资约束,并加入数字金融数据变量,探讨数字金融对中小企业融资约束的影响。采用Stata 15.0统计软件进行描述性统计、相关分析、回归分析和稳健性检验。结果表明,中小企业存在融资约束,加入数字金融体系后,中小企业的融资约束得到缓解,说明数字金融体系可以有效改善中小企业的融资约束,但创新能力和赋能能力有待提高。发展数字金融可以打通数据孤岛,降低道德风险,丰富融资渠道,间接降低融资成本。
{"title":"The Innovation of Financial Digitalization Enhances the Financing Capability of Small and Medium-Sized Enterprises: An Empirical Study","authors":"Qiwei Huan, B. Bai, Wenbiao Cai, Yundi Chen","doi":"10.1109/CCET55412.2022.9906398","DOIUrl":"https://doi.org/10.1109/CCET55412.2022.9906398","url":null,"abstract":"In recent years, severe financing constraints restrict the development of SMEs (small and medium-sized enterprises) and the use of digital finance can play a greater role in the financing of SMEs. This paper conducts research through the empirical analysis method. Based on the existing research findings, the financing constraints of SMEs show a strong cash-cash flow sensitivity. So this paper build a cash-flow sensitivity model to measure financing constraints and add digital finance data variables to explore the impact of digital finance on SMEs’ financing constraints. Then Stata 15.0 statistical software was used to carry out descriptive statistics, correlation analysis, regression analysis, and robustness test. The results show that there are financing constraints in SMEs, and the financing constraints of SMEs are alleviated after joining the digital finance system, which shows that the financing constraints of SMEs can be effectively improved by the digital finance system, but the ability to innovate and empower needs to be improved. The development of digital finance can cut through the data islands, reduce moral risk, rich financing channels, and financing costs indirectly reduced.","PeriodicalId":329327,"journal":{"name":"2022 IEEE 5th International Conference on Computer and Communication Engineering Technology (CCET)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123231662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving Aerospace Big Data Infrastructure and Applications with Distributed File System and Massive Parallel Calculation 基于分布式文件系统和大规模并行计算的航空航天大数据基础设施与应用
Fan Xu, Bin Yin, Ming-Zhu Zhang, Xue Wang
As the aerospace business growing rapidly, data flow and volume has exploded in recent years, bringing chances and challenges to big data infrastructures and applications in this field. In traditional aerospace data and application centers, data is stored in network attached storages(NAS) and processed by sequential or low level parallel programs, which can hardly meet the demand of performance, availability and scalability. In this paper, we provided a big data infrastructure based on HDFS for big data centers, which can improve the availability and scalability remarkably. Besides, we gather a series of typical big data applications in aerospace filed as benchmarks, analyzes their characteristics and accelerates them in MapReduce framework. The experiment result shows that among all the benchmarks, the speedup is 4.98 to the peak and 3.87 on the average.
近年来,随着航空航天业务的快速发展,数据流量和数据量呈爆炸式增长,给航空航天领域的大数据基础设施和应用带来了机遇和挑战。在传统的航空航天数据和应用中心中,数据存储在网络附属存储(NAS)中,通过顺序或低级并行程序进行处理,难以满足性能、可用性和可扩展性的需求。本文为大数据中心提供了一种基于HDFS的大数据基础设施,可以显著提高可用性和可扩展性。此外,我们收集了航空航天领域一系列典型的大数据应用作为标杆,分析了它们的特点,并在MapReduce框架下进行了加速。实验结果表明,在所有基准测试中,峰值加速为4.98,平均加速为3.87。
{"title":"Improving Aerospace Big Data Infrastructure and Applications with Distributed File System and Massive Parallel Calculation","authors":"Fan Xu, Bin Yin, Ming-Zhu Zhang, Xue Wang","doi":"10.1109/CCET55412.2022.9906364","DOIUrl":"https://doi.org/10.1109/CCET55412.2022.9906364","url":null,"abstract":"As the aerospace business growing rapidly, data flow and volume has exploded in recent years, bringing chances and challenges to big data infrastructures and applications in this field. In traditional aerospace data and application centers, data is stored in network attached storages(NAS) and processed by sequential or low level parallel programs, which can hardly meet the demand of performance, availability and scalability. In this paper, we provided a big data infrastructure based on HDFS for big data centers, which can improve the availability and scalability remarkably. Besides, we gather a series of typical big data applications in aerospace filed as benchmarks, analyzes their characteristics and accelerates them in MapReduce framework. The experiment result shows that among all the benchmarks, the speedup is 4.98 to the peak and 3.87 on the average.","PeriodicalId":329327,"journal":{"name":"2022 IEEE 5th International Conference on Computer and Communication Engineering Technology (CCET)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122673515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting Web Application Injection Attacks Using One-Class SVM 一类SVM检测Web应用注入攻击
Luchen Zhou, Tao Lu, X. Hu
As the important component of the Internet, the Web makes it easy for us to access information anytime, anywhere. However, the widespread adoption of web applications has introduced new security risks and expanded existing attack surfaces that many organizations are not effectively protecting. Among the various threats facing the web applications, injection attacks are one of the most dangerous. In this work, we propose to use one-class Support Vector Machine (SVM) for detecting web application injection attacks. We treat the detection of injection attacks as an anomaly detection problem. In the training stage, a number of legitimate HTTP requests are used to train a one-class SVM model. In the testing stage, the trained one-class SVM is used to detect whether an HTTP request is legitimate or malicious. We adopt 2v-gram algorithm (a variant of n-gram) to extract features from HTTP requests. The experimental results show that one-class SVM achieves good performance in detecting web application injection attacks by achieving a detection rate of 94.04% and a false positive rate of 1.62%.
作为互联网的重要组成部分,网络使我们可以随时随地方便地获取信息。然而,web应用程序的广泛采用带来了新的安全风险,并扩大了许多组织无法有效保护的现有攻击面。在web应用程序面临的各种威胁中,注入攻击是最危险的一种。在这项工作中,我们提出使用一类支持向量机(SVM)来检测web应用程序注入攻击。我们将注入攻击的检测视为异常检测问题。在训练阶段,使用大量合法的HTTP请求来训练一类SVM模型。在测试阶段,使用训练好的单类SVM来检测HTTP请求是合法的还是恶意的。我们采用2v-gram算法(n-gram的一种变体)从HTTP请求中提取特征。实验结果表明,单类SVM在检测web应用注入攻击方面具有较好的性能,检测率为94.04%,假阳性率为1.62%。
{"title":"Detecting Web Application Injection Attacks Using One-Class SVM","authors":"Luchen Zhou, Tao Lu, X. Hu","doi":"10.1109/CCET55412.2022.9906382","DOIUrl":"https://doi.org/10.1109/CCET55412.2022.9906382","url":null,"abstract":"As the important component of the Internet, the Web makes it easy for us to access information anytime, anywhere. However, the widespread adoption of web applications has introduced new security risks and expanded existing attack surfaces that many organizations are not effectively protecting. Among the various threats facing the web applications, injection attacks are one of the most dangerous. In this work, we propose to use one-class Support Vector Machine (SVM) for detecting web application injection attacks. We treat the detection of injection attacks as an anomaly detection problem. In the training stage, a number of legitimate HTTP requests are used to train a one-class SVM model. In the testing stage, the trained one-class SVM is used to detect whether an HTTP request is legitimate or malicious. We adopt 2v-gram algorithm (a variant of n-gram) to extract features from HTTP requests. The experimental results show that one-class SVM achieves good performance in detecting web application injection attacks by achieving a detection rate of 94.04% and a false positive rate of 1.62%.","PeriodicalId":329327,"journal":{"name":"2022 IEEE 5th International Conference on Computer and Communication Engineering Technology (CCET)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132517683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 IEEE 5th International Conference on Computer and Communication Engineering Technology (CCET)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1