首页 > 最新文献

2022 IEEE 5th International Conference on Computer and Communication Engineering Technology (CCET)最新文献

英文 中文
Large-Scale Distance Matrix Calculation Method Based on Contraction Hierarchies 基于收缩层次的大规模距离矩阵计算方法
Weijun Wang, Haixia Pan, Yefan Cao
With the rapid development and popularization of mobile positioning devices such as mobile phones, location-based services play an increasingly important role in people’s production and life, which makes high-performance large-scale distance matrix calculation a key part of the optimization of many business scenarios. The distance matrix is used to calculate the shortest road distance of a group of starting and ending points in batches. Based on the Contraction Hierarchies algorithm, this paper proposes a method to quickly calculate the distance matrix between source nodes s and target nodes t, where the source nodes s $in$ S and target nodes t $in$ T. Under the scale of the road network in mainland China, take $|mathrm{S}|=|mathbf{T}|=10000$, the average solution time of the algorithm is only 7.2 minutes, which can meet the needs of various application scenarios.
随着手机等移动定位设备的快速发展和普及,基于位置的服务在人们的生产和生活中发挥着越来越重要的作用,这使得高性能的大规模距离矩阵计算成为许多业务场景优化的关键部分。距离矩阵用于批量计算一组起点和终点的最短道路距离。本文基于收缩层次算法,提出了一种快速计算源节点s与目标节点t之间距离矩阵的方法,其中源节点s $in$ s,目标节点t $in$ t。在中国大陆道路网络规模下,取$| mathm {s}|=|mathbf{t}|=10000$,算法的平均求解时间仅为7.2分钟,可以满足各种应用场景的需求。
{"title":"Large-Scale Distance Matrix Calculation Method Based on Contraction Hierarchies","authors":"Weijun Wang, Haixia Pan, Yefan Cao","doi":"10.1109/CCET55412.2022.9906326","DOIUrl":"https://doi.org/10.1109/CCET55412.2022.9906326","url":null,"abstract":"With the rapid development and popularization of mobile positioning devices such as mobile phones, location-based services play an increasingly important role in people’s production and life, which makes high-performance large-scale distance matrix calculation a key part of the optimization of many business scenarios. The distance matrix is used to calculate the shortest road distance of a group of starting and ending points in batches. Based on the Contraction Hierarchies algorithm, this paper proposes a method to quickly calculate the distance matrix between source nodes s and target nodes t, where the source nodes s $in$ S and target nodes t $in$ T. Under the scale of the road network in mainland China, take $|mathrm{S}|=|mathbf{T}|=10000$, the average solution time of the algorithm is only 7.2 minutes, which can meet the needs of various application scenarios.","PeriodicalId":329327,"journal":{"name":"2022 IEEE 5th International Conference on Computer and Communication Engineering Technology (CCET)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134090056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Similarity Computation of Heterogeneous Ontology Based on Graph Attention Network 基于图注意网络的异构本体相似度计算
Kun Yu
Ontologies are crucial for data integration and information sharing. However, due to the different knowledge backgrounds of domain and ontology developers, the heterogeneity problem of multi-source ontology existence is more prominent, and ontology mapping is an important way to solve the ontology heterogeneity problem. However, the ontology similarity calculation methods among them still need to be improved in terms of accuracy or stability. In this paper, we propose an ontology similarity calculation method based on graph attention networks, which models ontologies as heterogeneous graph networks and uses the graph attention network model to introduce an attention mechanism to dynamically consider the influence of edge weights to achieve neighbor aggregation and perform similarity calculation. The experimental results show that this method has higher accuracy than the existing ontology similarity calculation methods.
本体对于数据集成和信息共享至关重要。然而,由于领域和本体开发者的知识背景不同,多源本体存在的异构问题更加突出,而本体映射是解决本体异构问题的重要途径。然而,其中的本体相似度计算方法在准确性和稳定性方面还有待提高。本文提出了一种基于图注意网络的本体相似度计算方法,该方法将本体建模为异构图网络,利用图注意网络模型引入注意机制,动态考虑边缘权值的影响,实现邻居聚合并进行相似度计算。实验结果表明,该方法比现有的本体相似度计算方法具有更高的准确性。
{"title":"Similarity Computation of Heterogeneous Ontology Based on Graph Attention Network","authors":"Kun Yu","doi":"10.1109/CCET55412.2022.9906374","DOIUrl":"https://doi.org/10.1109/CCET55412.2022.9906374","url":null,"abstract":"Ontologies are crucial for data integration and information sharing. However, due to the different knowledge backgrounds of domain and ontology developers, the heterogeneity problem of multi-source ontology existence is more prominent, and ontology mapping is an important way to solve the ontology heterogeneity problem. However, the ontology similarity calculation methods among them still need to be improved in terms of accuracy or stability. In this paper, we propose an ontology similarity calculation method based on graph attention networks, which models ontologies as heterogeneous graph networks and uses the graph attention network model to introduce an attention mechanism to dynamically consider the influence of edge weights to achieve neighbor aggregation and perform similarity calculation. The experimental results show that this method has higher accuracy than the existing ontology similarity calculation methods.","PeriodicalId":329327,"journal":{"name":"2022 IEEE 5th International Conference on Computer and Communication Engineering Technology (CCET)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124223894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Small Target Detection Method Based on Feature Enhancement and Positioning Optimization 基于特征增强和定位优化的小目标检测方法
Qingshu Li, Xiǎohóng Shí, Qi Xu, Wei Huang, Peng Yang
Feature Pyramid Network (FPN) is a basic but important component in target detection system. Together with target detection algorithms, such as SSD, Faster R-CNN and YOLO series, they have achieved good detection results for large targets with high resolutions, but the performance is less effective when it comes to detect small targets that contain relatively little semantic information. And small target detection is quite common in daily life, such as face recognition at long distances, traffic sign detection in automatic driving, etc. That means it is significant to break the bottleneck of target detection and get better accuracy performance. In this article, based on the FPN, we propose an improved network structure (IMFPN) from two aspects to get a better accuracy result in small target detection task. In the first aspect, we improve the feature map pyramid structure for feature enhancement, reduce the problem of information loss during feature map fusion and get the semantic information of multiscale feature maps. In the second aspect, we concentrate on the problem of information loss in the pooling process of feature maps, we propose an improved version of the PRRoI pooling method that combines RoI Pooling and RoI Align Pooling. And we also optimize the positioning of the frame through a new IoU calculation standard. Based on these above ideas and methods, we propose a small target detection method based on feature enhancement and positioning optimization.
特征金字塔网络(FPN)是目标检测系统中一个基本而重要的组成部分。它们与SSD、Faster R-CNN、YOLO系列等目标检测算法一起,对高分辨率的大目标都取得了很好的检测效果,但对语义信息相对较少的小目标检测效果不佳。而小目标检测在日常生活中是相当普遍的,比如远距离的人脸识别,自动驾驶中的交通标志检测等。这意味着突破目标检测瓶颈,获得更好的精度性能具有重要意义。本文在FPN的基础上,从两个方面提出了一种改进的网络结构(IMFPN),以在小目标检测任务中获得更好的精度结果。首先,改进特征图金字塔结构进行特征增强,减少特征图融合过程中的信息丢失问题,获得多尺度特征图的语义信息;第二方面,针对特征图池化过程中的信息丢失问题,提出了一种改进的PRRoI池化方法,该方法将RoI池化和RoI Align池化相结合。并通过新的IoU计算标准对车架的定位进行了优化。基于上述思想和方法,我们提出了一种基于特征增强和定位优化的小目标检测方法。
{"title":"A Small Target Detection Method Based on Feature Enhancement and Positioning Optimization","authors":"Qingshu Li, Xiǎohóng Shí, Qi Xu, Wei Huang, Peng Yang","doi":"10.1109/CCET55412.2022.9906335","DOIUrl":"https://doi.org/10.1109/CCET55412.2022.9906335","url":null,"abstract":"Feature Pyramid Network (FPN) is a basic but important component in target detection system. Together with target detection algorithms, such as SSD, Faster R-CNN and YOLO series, they have achieved good detection results for large targets with high resolutions, but the performance is less effective when it comes to detect small targets that contain relatively little semantic information. And small target detection is quite common in daily life, such as face recognition at long distances, traffic sign detection in automatic driving, etc. That means it is significant to break the bottleneck of target detection and get better accuracy performance. In this article, based on the FPN, we propose an improved network structure (IMFPN) from two aspects to get a better accuracy result in small target detection task. In the first aspect, we improve the feature map pyramid structure for feature enhancement, reduce the problem of information loss during feature map fusion and get the semantic information of multiscale feature maps. In the second aspect, we concentrate on the problem of information loss in the pooling process of feature maps, we propose an improved version of the PRRoI pooling method that combines RoI Pooling and RoI Align Pooling. And we also optimize the positioning of the frame through a new IoU calculation standard. Based on these above ideas and methods, we propose a small target detection method based on feature enhancement and positioning optimization.","PeriodicalId":329327,"journal":{"name":"2022 IEEE 5th International Conference on Computer and Communication Engineering Technology (CCET)","volume":"974 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116203658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vision Transformer Based on Knowledge Distillation in TCM Image Classification 基于知识升华的中医图像分类视觉变换
Ge Yuyao, Cheng Yiting, Wang Jia, zhou Hanlin, Chen Lizhe
In order to improve the ViT model accuracy of image classification task in Chinese medicine, this paper proposes a sharpening image preprocessing method of coupling residual algorithm, the image preprocessing method can make deep learning network makes it easier to extract the image edge character. In this paper, through a series of experiments to compare the algorithm under different parameters in traditional Chinese medicine classification accuracy of the data sets. Improved the vision Transformer structure of knowledge distillation and proposed the way of overlapping image blocks in PatchEmbeding operation to extract more information of the original image. A series of experiments were carried out on the traditional Chinese medicine data set. It is proved that the accuracy of the model is about 2% higher than that of the original knowledge distillation ViT structure.
为了提高中医图像分类任务中ViT模型的准确率,本文提出了一种锐化图像预处理方法的耦合残差算法,该图像预处理方法可以使深度学习网络更容易提取图像边缘特征。本文通过一系列实验比较了算法在不同参数下对数据集的中医分类准确率。改进了知识蒸馏的视觉Transformer结构,提出了在PatchEmbeding操作中图像块重叠的方法,以提取更多的原始图像信息。在中药数据集上进行了一系列实验。结果表明,该模型的精度比原知识蒸馏ViT结构的精度提高了2%左右。
{"title":"Vision Transformer Based on Knowledge Distillation in TCM Image Classification","authors":"Ge Yuyao, Cheng Yiting, Wang Jia, zhou Hanlin, Chen Lizhe","doi":"10.1109/CCET55412.2022.9906332","DOIUrl":"https://doi.org/10.1109/CCET55412.2022.9906332","url":null,"abstract":"In order to improve the ViT model accuracy of image classification task in Chinese medicine, this paper proposes a sharpening image preprocessing method of coupling residual algorithm, the image preprocessing method can make deep learning network makes it easier to extract the image edge character. In this paper, through a series of experiments to compare the algorithm under different parameters in traditional Chinese medicine classification accuracy of the data sets. Improved the vision Transformer structure of knowledge distillation and proposed the way of overlapping image blocks in PatchEmbeding operation to extract more information of the original image. A series of experiments were carried out on the traditional Chinese medicine data set. It is proved that the accuracy of the model is about 2% higher than that of the original knowledge distillation ViT structure.","PeriodicalId":329327,"journal":{"name":"2022 IEEE 5th International Conference on Computer and Communication Engineering Technology (CCET)","volume":"165 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114870753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Improved Clock Cycle Measurement Method for High-Speed Serial Signal with Duty-Cycle-Distortion Jitter 含占空比失真抖动的高速串行信号时钟周期测量方法的改进
Tong Wu, K. Song, Hongwei Zhao
Software clock data recovery (CDR) is a critical component of a high-speed serial link that recovers the reference clock from a serial signal, which are generally used in real-time sampling oscilloscopes and electronic design automation software. The common method for calculating the period of the reference clock is to extract the rising and falling edges of the signal, and then calculate the difference between adjacent transition edges, so that a pulse width sequence is obtained. By performing statistics on this sequence, it can be found that the value of the position of the first peak of the statistical histogram is the period of the reference clock, the position of the second peak is twice the period of the clock, etc. The period of the clock can be calculated by weighted average. However, high-speed serial signals inevitably have duty-cycle-distortion (DCD) jitter, and DCD seriously affect the determination of the position of the peak of the above statistical histogram, there are many spurious peaks near the actual peak. This article proposes an improved method of calculating the clock period, which can eliminate the influence of DCD and to obtain an accurate clock period.
软件时钟数据恢复(CDR)是高速串行链路中从串行信号中恢复参考时钟的关键部件,通常用于实时采样示波器和电子设计自动化软件中。计算参考时钟周期的常用方法是提取信号的上升沿和下降沿,然后计算相邻过渡沿之间的差,从而得到脉宽序列。通过对该序列进行统计,可以发现统计直方图的第一个峰的位置值为参考时钟的周期,第二个峰的位置值为参考时钟周期的两倍,等等。时钟的周期可以通过加权平均来计算。然而,高速串行信号不可避免地存在占空比失真(DCD)抖动,并且DCD严重影响上述统计直方图峰值位置的确定,在实际峰值附近存在许多伪峰。本文提出了一种改进的时钟周期计算方法,可以消除DCD的影响,得到准确的时钟周期。
{"title":"An Improved Clock Cycle Measurement Method for High-Speed Serial Signal with Duty-Cycle-Distortion Jitter","authors":"Tong Wu, K. Song, Hongwei Zhao","doi":"10.1109/CCET55412.2022.9906325","DOIUrl":"https://doi.org/10.1109/CCET55412.2022.9906325","url":null,"abstract":"Software clock data recovery (CDR) is a critical component of a high-speed serial link that recovers the reference clock from a serial signal, which are generally used in real-time sampling oscilloscopes and electronic design automation software. The common method for calculating the period of the reference clock is to extract the rising and falling edges of the signal, and then calculate the difference between adjacent transition edges, so that a pulse width sequence is obtained. By performing statistics on this sequence, it can be found that the value of the position of the first peak of the statistical histogram is the period of the reference clock, the position of the second peak is twice the period of the clock, etc. The period of the clock can be calculated by weighted average. However, high-speed serial signals inevitably have duty-cycle-distortion (DCD) jitter, and DCD seriously affect the determination of the position of the peak of the above statistical histogram, there are many spurious peaks near the actual peak. This article proposes an improved method of calculating the clock period, which can eliminate the influence of DCD and to obtain an accurate clock period.","PeriodicalId":329327,"journal":{"name":"2022 IEEE 5th International Conference on Computer and Communication Engineering Technology (CCET)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114166681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trusted Management Infrastructure with Blockchain for Edge Device in Smart City 基于区块链的智慧城市边缘设备可信管理基础设施
Xiao-qiang Wang, Chen Zhang, Xiao Chang
As smart cities continue to be developed, network traffic surges. Although edge computing improves the quality of service by shifting computing tasks from cloud computing centers to locations closer to the edge through a multi-layer distributed computing model, there are security risks in the face of central node failures and internal malicious attacks, which make it difficult to provide stable and reliable services. In this paper, we design a trusted management model of edge device in smart city with blockchain, introducing blockchain technology into the research of smart city construction. It uses the blockchain distributed architecture and decentralization idea to realize the trusted collection and storage of sensory data. And based on this architecture, a new reputation-based PoW consensus algorithm is proposed to provide a trust mechanism for IoT devices. The algorithm greatly increases the cost of malicious attacks launched by the IoT device, effectively prevents malicious attacks on devices, and achieves trusted management of edge device behavior. The smart city application based on the proposed method verifies its feasibility, effectively prevents malicious attacks from nodes, and enhances the information security of the system.
随着智慧城市的不断发展,网络流量激增。虽然边缘计算通过多层分布式计算模型,将计算任务从云计算中心转移到更靠近边缘的位置,提高了服务质量,但面对中心节点故障和内部恶意攻击,存在安全风险,难以提供稳定可靠的服务。本文采用区块链技术设计了智慧城市边缘设备可信管理模型,将区块链技术引入智慧城市建设的研究中。它采用区块链分布式架构和去中心化思想,实现了感知数据的可信采集和存储。在此基础上,提出了一种新的基于信誉的PoW共识算法,为物联网设备提供信任机制。该算法大大提高了物联网设备发起恶意攻击的成本,有效防止了对设备的恶意攻击,实现了对边缘设备行为的可信管理。基于该方法的智慧城市应用验证了其可行性,有效地防止了节点的恶意攻击,增强了系统的信息安全性。
{"title":"Trusted Management Infrastructure with Blockchain for Edge Device in Smart City","authors":"Xiao-qiang Wang, Chen Zhang, Xiao Chang","doi":"10.1109/CCET55412.2022.9906373","DOIUrl":"https://doi.org/10.1109/CCET55412.2022.9906373","url":null,"abstract":"As smart cities continue to be developed, network traffic surges. Although edge computing improves the quality of service by shifting computing tasks from cloud computing centers to locations closer to the edge through a multi-layer distributed computing model, there are security risks in the face of central node failures and internal malicious attacks, which make it difficult to provide stable and reliable services. In this paper, we design a trusted management model of edge device in smart city with blockchain, introducing blockchain technology into the research of smart city construction. It uses the blockchain distributed architecture and decentralization idea to realize the trusted collection and storage of sensory data. And based on this architecture, a new reputation-based PoW consensus algorithm is proposed to provide a trust mechanism for IoT devices. The algorithm greatly increases the cost of malicious attacks launched by the IoT device, effectively prevents malicious attacks on devices, and achieves trusted management of edge device behavior. The smart city application based on the proposed method verifies its feasibility, effectively prevents malicious attacks from nodes, and enhances the information security of the system.","PeriodicalId":329327,"journal":{"name":"2022 IEEE 5th International Conference on Computer and Communication Engineering Technology (CCET)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124051915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Driver Identification with Time and Frequency Features Derived from Vehicular Acceleration Data 基于车辆加速度数据的时频特征驾驶员识别
Sheng-Kai Lin
With the increase of the related facilities and services around the driver, the driver’s identity becomes more and more important, so the research on the driver’s identification is also increasing gradually. Since the emergence of the online car-hailing platform represented by Uber, people’s travel has become more and more convenient, but there have also been many problems surrounding the identity of the driver. For example, the actual information of the driver does not match the information registered on the platform, which increase safety risk for passengers. In this paper, we propose a novel driver identification scheme that first converts the raw data of the x and y axes of the accelerometer into feature vectors by a novel data transformation method which adds frequency domain perspective on the basis of time domain perspective, adopts sliding window and fast Fourier transform and then uses these feature vectors as the input of neural network. Finally, we identify the driver through our designed driver identification algorithm, which accepts as input the probability distribution of the network output. In our experiments, we experiment with 10 drivers and use accuracy, precision, and recall as outcome metrics. Experimental results show that the performance based on time and frequency features is better than that of time or frequency features alone.
随着驾驶员周围相关设施和服务的增加,驾驶员身份变得越来越重要,因此对驾驶员身份的研究也逐渐增多。自从以Uber为代表的网约车平台出现以来,人们的出行变得越来越方便,但是围绕司机的身份也出现了很多问题。例如,司机的实际信息与平台上登记的信息不匹配,增加了乘客的安全风险。本文提出了一种新的驾驶员识别方案,该方案首先采用一种新颖的数据变换方法,在时域透视的基础上增加频域透视,并采用滑动窗口和快速傅立叶变换,将加速度计x轴和y轴的原始数据转换为特征向量,然后将这些特征向量作为神经网络的输入。最后,我们通过我们设计的驱动识别算法来识别驱动,该算法接受网络输出的概率分布作为输入。在我们的实验中,我们实验了10个驱动程序,并使用准确性,精度和召回率作为结果指标。实验结果表明,基于时间和频率的特征比单独使用时间或频率特征的性能更好。
{"title":"Driver Identification with Time and Frequency Features Derived from Vehicular Acceleration Data","authors":"Sheng-Kai Lin","doi":"10.1109/CCET55412.2022.9906391","DOIUrl":"https://doi.org/10.1109/CCET55412.2022.9906391","url":null,"abstract":"With the increase of the related facilities and services around the driver, the driver’s identity becomes more and more important, so the research on the driver’s identification is also increasing gradually. Since the emergence of the online car-hailing platform represented by Uber, people’s travel has become more and more convenient, but there have also been many problems surrounding the identity of the driver. For example, the actual information of the driver does not match the information registered on the platform, which increase safety risk for passengers. In this paper, we propose a novel driver identification scheme that first converts the raw data of the x and y axes of the accelerometer into feature vectors by a novel data transformation method which adds frequency domain perspective on the basis of time domain perspective, adopts sliding window and fast Fourier transform and then uses these feature vectors as the input of neural network. Finally, we identify the driver through our designed driver identification algorithm, which accepts as input the probability distribution of the network output. In our experiments, we experiment with 10 drivers and use accuracy, precision, and recall as outcome metrics. Experimental results show that the performance based on time and frequency features is better than that of time or frequency features alone.","PeriodicalId":329327,"journal":{"name":"2022 IEEE 5th International Conference on Computer and Communication Engineering Technology (CCET)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124132502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint optimization of Task Offloading and Computing Resource Allocation in MEC-D2D Network MEC-D2D网络中任务卸载与计算资源分配的联合优化
Zhaoyuan Liu, Jingyi Fan, S. Geng, Peng Qin, Xiongwen Zhao
In mobile edge computing (MEC) network, computing offloading can alleviate resource constraints and improve service quality effectively. Meanwhile data transmission in Device-to-Device (D2D) communication can realize resource sharing and balance among different users, in order to improve system spectrum utilization and reduce communication delay. Aiming at minimizing the task delay and terminal energy consumption in MEC network, a joint optimization problem considering task offloading and computing resource allocation is formulated in D2D-assisted MEC network by building cost optimization model with multi-objective constraints. Moreover, the original problem is decoupled as two sub-problems which are solved by discrete ternary particle swarm optimization (DTPSO) algorithm and Lagrange multiplier method, respectively. Simulation results show that compared with three other typical methods, the proposed scheme in this work can effectively reduce task execution delay and terminal energy consumption.
在移动边缘计算(MEC)网络中,计算卸载可以有效缓解资源约束,提高服务质量。同时,设备到设备(Device-to-Device, D2D)通信中的数据传输可以实现不同用户之间的资源共享和平衡,从而提高系统频谱利用率,降低通信延迟。以最小化MEC网络中的任务延迟和终端能耗为目标,通过建立多目标约束的成本优化模型,在d2d辅助MEC网络中构建了一个考虑任务卸载和计算资源分配的联合优化问题。将原问题解耦为两个子问题,分别用离散三元粒子群优化算法和拉格朗日乘子法求解。仿真结果表明,与其他三种典型方法相比,本文提出的方案能有效降低任务执行延迟和终端能耗。
{"title":"Joint optimization of Task Offloading and Computing Resource Allocation in MEC-D2D Network","authors":"Zhaoyuan Liu, Jingyi Fan, S. Geng, Peng Qin, Xiongwen Zhao","doi":"10.1109/CCET55412.2022.9906362","DOIUrl":"https://doi.org/10.1109/CCET55412.2022.9906362","url":null,"abstract":"In mobile edge computing (MEC) network, computing offloading can alleviate resource constraints and improve service quality effectively. Meanwhile data transmission in Device-to-Device (D2D) communication can realize resource sharing and balance among different users, in order to improve system spectrum utilization and reduce communication delay. Aiming at minimizing the task delay and terminal energy consumption in MEC network, a joint optimization problem considering task offloading and computing resource allocation is formulated in D2D-assisted MEC network by building cost optimization model with multi-objective constraints. Moreover, the original problem is decoupled as two sub-problems which are solved by discrete ternary particle swarm optimization (DTPSO) algorithm and Lagrange multiplier method, respectively. Simulation results show that compared with three other typical methods, the proposed scheme in this work can effectively reduce task execution delay and terminal energy consumption.","PeriodicalId":329327,"journal":{"name":"2022 IEEE 5th International Conference on Computer and Communication Engineering Technology (CCET)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126591449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Marine Predators Algorithm Based on Trigonometric Function 基于三角函数的海洋捕食者算法
Xinyu Zou, Jinhong Li
In the Marine Predators Algorithm (MPA), a set of solutions is randomly generated in a given search space and the optimal solution is searched through an iterative process, although MPA has shown good performance, it has not solved the problem of local optimal solutions and premature convergence caused by insufficient iterations of the search agent, and its optimization performance still has a lot of room for exploration. Therefore, this paper proposes a trigonometric function-based MPA (TF-MPA) algorithm. First, the trigonometric function is used to optimize the position update of the prey matrix; then the cosine function is used to define the inertia weight coefficient; finally, the sine function is used to define the nonlinear step size control parameters. The effectiveness of TF-MPA is tested on nine standard test functions, and the results show that the TF-MPA algorithm has faster convergence speed and higher stability than the traditional MPA algorithm and other improved algorithms. This proves the effectiveness of the algorithm.
在Marine掠食者算法(MPA)中,在给定的搜索空间中随机生成一组解,并通过迭代过程搜索最优解,MPA虽然表现出了较好的性能,但没有解决搜索代理迭代不足导致的局部最优解和过早收敛的问题,其优化性能仍有很大的探索空间。为此,本文提出了一种基于三角函数的MPA (TF-MPA)算法。首先,利用三角函数对猎物矩阵的位置更新进行优化;然后利用余弦函数定义惯性权重系数;最后,利用正弦函数定义非线性步长控制参数。在9个标准测试函数上对TF-MPA算法的有效性进行了测试,结果表明TF-MPA算法比传统的MPA算法和其他改进算法具有更快的收敛速度和更高的稳定性。这证明了算法的有效性。
{"title":"Marine Predators Algorithm Based on Trigonometric Function","authors":"Xinyu Zou, Jinhong Li","doi":"10.1109/CCET55412.2022.9906320","DOIUrl":"https://doi.org/10.1109/CCET55412.2022.9906320","url":null,"abstract":"In the Marine Predators Algorithm (MPA), a set of solutions is randomly generated in a given search space and the optimal solution is searched through an iterative process, although MPA has shown good performance, it has not solved the problem of local optimal solutions and premature convergence caused by insufficient iterations of the search agent, and its optimization performance still has a lot of room for exploration. Therefore, this paper proposes a trigonometric function-based MPA (TF-MPA) algorithm. First, the trigonometric function is used to optimize the position update of the prey matrix; then the cosine function is used to define the inertia weight coefficient; finally, the sine function is used to define the nonlinear step size control parameters. The effectiveness of TF-MPA is tested on nine standard test functions, and the results show that the TF-MPA algorithm has faster convergence speed and higher stability than the traditional MPA algorithm and other improved algorithms. This proves the effectiveness of the algorithm.","PeriodicalId":329327,"journal":{"name":"2022 IEEE 5th International Conference on Computer and Communication Engineering Technology (CCET)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127104757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Banana Leaf Disease Detection Based on the Image Processing Technology 基于图像处理技术的香蕉叶片病害检测研究
Huang Jianqing, Yuan Qi, Liu Debing, Zhang Jiarong
The banana diseases directly affected banana quality and yield, so a detection method for banana leaf diseases based on image processing is proposed. Firstly, the color segmentation method is used to remove the green background such as healthy leaves, and weed from original banana leaf disease image collected by smart phone. And the segmented image is converted to V component gray image of YUV color space and then the Ostu segmentation which uses the minium intra-cluster or the maximum inter-cluster gray variance to segment the image, and the area threshold method are used to remove the non green background such as soil, and dead grass, thus extracting a complete disease regions. Next, these color features such as the color means, color variances, and color skewnesses of R, G, B, Y, U and V component in the disease regions, are extracted and secleted to construct a set of feature vector of each banana leaf disease with standard image samples. Finally, the minimum euclidean distance classifier is used for banana leaf disease recognition. The results show that the method can effectively segment the disease regions from the original banana leaf disease image and has high recognition rate with 91.7% for gray leaf spot disease and 90% for sigatoka leaf spot disease. Therefore, it is proven that this method has high accuracy and reliability in banana leaf disease recognition, having better promotion and application value.
香蕉病害直接影响香蕉品质和产量,提出了一种基于图像处理的香蕉叶病害检测方法。首先,采用颜色分割的方法,对智能手机采集的原始蕉叶病图像进行健康叶、杂草等绿色背景的去除;将分割后的图像转换为YUV颜色空间的V分量灰度图像,然后采用最小簇内或最大簇间灰度方差的Ostu分割对图像进行分割,并采用面积阈值法去除土壤、枯草等非绿色背景,从而提取出完整的病害区域。接下来,提取并选择患病区域R、G、B、Y、U、V分量的颜色均值、颜色方差、颜色偏度等颜色特征,用标准图像样本构建一组香蕉叶各病害的特征向量。最后,将最小欧氏距离分类器用于蕉叶病害识别。结果表明,该方法能有效地从原始香蕉叶片病害图像中分割出病害区域,对灰色叶斑病的识别率为91.7%,对斑疹叶斑病的识别率为90%。由此证明,该方法在香蕉叶病害识别中具有较高的准确性和可靠性,具有较好的推广应用价值。
{"title":"Research on Banana Leaf Disease Detection Based on the Image Processing Technology","authors":"Huang Jianqing, Yuan Qi, Liu Debing, Zhang Jiarong","doi":"10.1109/CCET55412.2022.9906377","DOIUrl":"https://doi.org/10.1109/CCET55412.2022.9906377","url":null,"abstract":"The banana diseases directly affected banana quality and yield, so a detection method for banana leaf diseases based on image processing is proposed. Firstly, the color segmentation method is used to remove the green background such as healthy leaves, and weed from original banana leaf disease image collected by smart phone. And the segmented image is converted to V component gray image of YUV color space and then the Ostu segmentation which uses the minium intra-cluster or the maximum inter-cluster gray variance to segment the image, and the area threshold method are used to remove the non green background such as soil, and dead grass, thus extracting a complete disease regions. Next, these color features such as the color means, color variances, and color skewnesses of R, G, B, Y, U and V component in the disease regions, are extracted and secleted to construct a set of feature vector of each banana leaf disease with standard image samples. Finally, the minimum euclidean distance classifier is used for banana leaf disease recognition. The results show that the method can effectively segment the disease regions from the original banana leaf disease image and has high recognition rate with 91.7% for gray leaf spot disease and 90% for sigatoka leaf spot disease. Therefore, it is proven that this method has high accuracy and reliability in banana leaf disease recognition, having better promotion and application value.","PeriodicalId":329327,"journal":{"name":"2022 IEEE 5th International Conference on Computer and Communication Engineering Technology (CCET)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114448280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 IEEE 5th International Conference on Computer and Communication Engineering Technology (CCET)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1