首页 > 最新文献

2022 IEEE 5th International Conference on Computer and Communication Engineering Technology (CCET)最新文献

英文 中文
Large-Scale Distance Matrix Calculation Method Based on Contraction Hierarchies 基于收缩层次的大规模距离矩阵计算方法
Weijun Wang, Haixia Pan, Yefan Cao
With the rapid development and popularization of mobile positioning devices such as mobile phones, location-based services play an increasingly important role in people’s production and life, which makes high-performance large-scale distance matrix calculation a key part of the optimization of many business scenarios. The distance matrix is used to calculate the shortest road distance of a group of starting and ending points in batches. Based on the Contraction Hierarchies algorithm, this paper proposes a method to quickly calculate the distance matrix between source nodes s and target nodes t, where the source nodes s $in$ S and target nodes t $in$ T. Under the scale of the road network in mainland China, take $|mathrm{S}|=|mathbf{T}|=10000$, the average solution time of the algorithm is only 7.2 minutes, which can meet the needs of various application scenarios.
随着手机等移动定位设备的快速发展和普及,基于位置的服务在人们的生产和生活中发挥着越来越重要的作用,这使得高性能的大规模距离矩阵计算成为许多业务场景优化的关键部分。距离矩阵用于批量计算一组起点和终点的最短道路距离。本文基于收缩层次算法,提出了一种快速计算源节点s与目标节点t之间距离矩阵的方法,其中源节点s $in$ s,目标节点t $in$ t。在中国大陆道路网络规模下,取$| mathm {s}|=|mathbf{t}|=10000$,算法的平均求解时间仅为7.2分钟,可以满足各种应用场景的需求。
{"title":"Large-Scale Distance Matrix Calculation Method Based on Contraction Hierarchies","authors":"Weijun Wang, Haixia Pan, Yefan Cao","doi":"10.1109/CCET55412.2022.9906326","DOIUrl":"https://doi.org/10.1109/CCET55412.2022.9906326","url":null,"abstract":"With the rapid development and popularization of mobile positioning devices such as mobile phones, location-based services play an increasingly important role in people’s production and life, which makes high-performance large-scale distance matrix calculation a key part of the optimization of many business scenarios. The distance matrix is used to calculate the shortest road distance of a group of starting and ending points in batches. Based on the Contraction Hierarchies algorithm, this paper proposes a method to quickly calculate the distance matrix between source nodes s and target nodes t, where the source nodes s $in$ S and target nodes t $in$ T. Under the scale of the road network in mainland China, take $|mathrm{S}|=|mathbf{T}|=10000$, the average solution time of the algorithm is only 7.2 minutes, which can meet the needs of various application scenarios.","PeriodicalId":329327,"journal":{"name":"2022 IEEE 5th International Conference on Computer and Communication Engineering Technology (CCET)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134090056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vision Transformer Based on Knowledge Distillation in TCM Image Classification 基于知识升华的中医图像分类视觉变换
Ge Yuyao, Cheng Yiting, Wang Jia, zhou Hanlin, Chen Lizhe
In order to improve the ViT model accuracy of image classification task in Chinese medicine, this paper proposes a sharpening image preprocessing method of coupling residual algorithm, the image preprocessing method can make deep learning network makes it easier to extract the image edge character. In this paper, through a series of experiments to compare the algorithm under different parameters in traditional Chinese medicine classification accuracy of the data sets. Improved the vision Transformer structure of knowledge distillation and proposed the way of overlapping image blocks in PatchEmbeding operation to extract more information of the original image. A series of experiments were carried out on the traditional Chinese medicine data set. It is proved that the accuracy of the model is about 2% higher than that of the original knowledge distillation ViT structure.
为了提高中医图像分类任务中ViT模型的准确率,本文提出了一种锐化图像预处理方法的耦合残差算法,该图像预处理方法可以使深度学习网络更容易提取图像边缘特征。本文通过一系列实验比较了算法在不同参数下对数据集的中医分类准确率。改进了知识蒸馏的视觉Transformer结构,提出了在PatchEmbeding操作中图像块重叠的方法,以提取更多的原始图像信息。在中药数据集上进行了一系列实验。结果表明,该模型的精度比原知识蒸馏ViT结构的精度提高了2%左右。
{"title":"Vision Transformer Based on Knowledge Distillation in TCM Image Classification","authors":"Ge Yuyao, Cheng Yiting, Wang Jia, zhou Hanlin, Chen Lizhe","doi":"10.1109/CCET55412.2022.9906332","DOIUrl":"https://doi.org/10.1109/CCET55412.2022.9906332","url":null,"abstract":"In order to improve the ViT model accuracy of image classification task in Chinese medicine, this paper proposes a sharpening image preprocessing method of coupling residual algorithm, the image preprocessing method can make deep learning network makes it easier to extract the image edge character. In this paper, through a series of experiments to compare the algorithm under different parameters in traditional Chinese medicine classification accuracy of the data sets. Improved the vision Transformer structure of knowledge distillation and proposed the way of overlapping image blocks in PatchEmbeding operation to extract more information of the original image. A series of experiments were carried out on the traditional Chinese medicine data set. It is proved that the accuracy of the model is about 2% higher than that of the original knowledge distillation ViT structure.","PeriodicalId":329327,"journal":{"name":"2022 IEEE 5th International Conference on Computer and Communication Engineering Technology (CCET)","volume":"165 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114870753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Driver Identification with Time and Frequency Features Derived from Vehicular Acceleration Data 基于车辆加速度数据的时频特征驾驶员识别
Sheng-Kai Lin
With the increase of the related facilities and services around the driver, the driver’s identity becomes more and more important, so the research on the driver’s identification is also increasing gradually. Since the emergence of the online car-hailing platform represented by Uber, people’s travel has become more and more convenient, but there have also been many problems surrounding the identity of the driver. For example, the actual information of the driver does not match the information registered on the platform, which increase safety risk for passengers. In this paper, we propose a novel driver identification scheme that first converts the raw data of the x and y axes of the accelerometer into feature vectors by a novel data transformation method which adds frequency domain perspective on the basis of time domain perspective, adopts sliding window and fast Fourier transform and then uses these feature vectors as the input of neural network. Finally, we identify the driver through our designed driver identification algorithm, which accepts as input the probability distribution of the network output. In our experiments, we experiment with 10 drivers and use accuracy, precision, and recall as outcome metrics. Experimental results show that the performance based on time and frequency features is better than that of time or frequency features alone.
随着驾驶员周围相关设施和服务的增加,驾驶员身份变得越来越重要,因此对驾驶员身份的研究也逐渐增多。自从以Uber为代表的网约车平台出现以来,人们的出行变得越来越方便,但是围绕司机的身份也出现了很多问题。例如,司机的实际信息与平台上登记的信息不匹配,增加了乘客的安全风险。本文提出了一种新的驾驶员识别方案,该方案首先采用一种新颖的数据变换方法,在时域透视的基础上增加频域透视,并采用滑动窗口和快速傅立叶变换,将加速度计x轴和y轴的原始数据转换为特征向量,然后将这些特征向量作为神经网络的输入。最后,我们通过我们设计的驱动识别算法来识别驱动,该算法接受网络输出的概率分布作为输入。在我们的实验中,我们实验了10个驱动程序,并使用准确性,精度和召回率作为结果指标。实验结果表明,基于时间和频率的特征比单独使用时间或频率特征的性能更好。
{"title":"Driver Identification with Time and Frequency Features Derived from Vehicular Acceleration Data","authors":"Sheng-Kai Lin","doi":"10.1109/CCET55412.2022.9906391","DOIUrl":"https://doi.org/10.1109/CCET55412.2022.9906391","url":null,"abstract":"With the increase of the related facilities and services around the driver, the driver’s identity becomes more and more important, so the research on the driver’s identification is also increasing gradually. Since the emergence of the online car-hailing platform represented by Uber, people’s travel has become more and more convenient, but there have also been many problems surrounding the identity of the driver. For example, the actual information of the driver does not match the information registered on the platform, which increase safety risk for passengers. In this paper, we propose a novel driver identification scheme that first converts the raw data of the x and y axes of the accelerometer into feature vectors by a novel data transformation method which adds frequency domain perspective on the basis of time domain perspective, adopts sliding window and fast Fourier transform and then uses these feature vectors as the input of neural network. Finally, we identify the driver through our designed driver identification algorithm, which accepts as input the probability distribution of the network output. In our experiments, we experiment with 10 drivers and use accuracy, precision, and recall as outcome metrics. Experimental results show that the performance based on time and frequency features is better than that of time or frequency features alone.","PeriodicalId":329327,"journal":{"name":"2022 IEEE 5th International Conference on Computer and Communication Engineering Technology (CCET)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124132502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Similarity Computation of Heterogeneous Ontology Based on Graph Attention Network 基于图注意网络的异构本体相似度计算
Kun Yu
Ontologies are crucial for data integration and information sharing. However, due to the different knowledge backgrounds of domain and ontology developers, the heterogeneity problem of multi-source ontology existence is more prominent, and ontology mapping is an important way to solve the ontology heterogeneity problem. However, the ontology similarity calculation methods among them still need to be improved in terms of accuracy or stability. In this paper, we propose an ontology similarity calculation method based on graph attention networks, which models ontologies as heterogeneous graph networks and uses the graph attention network model to introduce an attention mechanism to dynamically consider the influence of edge weights to achieve neighbor aggregation and perform similarity calculation. The experimental results show that this method has higher accuracy than the existing ontology similarity calculation methods.
本体对于数据集成和信息共享至关重要。然而,由于领域和本体开发者的知识背景不同,多源本体存在的异构问题更加突出,而本体映射是解决本体异构问题的重要途径。然而,其中的本体相似度计算方法在准确性和稳定性方面还有待提高。本文提出了一种基于图注意网络的本体相似度计算方法,该方法将本体建模为异构图网络,利用图注意网络模型引入注意机制,动态考虑边缘权值的影响,实现邻居聚合并进行相似度计算。实验结果表明,该方法比现有的本体相似度计算方法具有更高的准确性。
{"title":"Similarity Computation of Heterogeneous Ontology Based on Graph Attention Network","authors":"Kun Yu","doi":"10.1109/CCET55412.2022.9906374","DOIUrl":"https://doi.org/10.1109/CCET55412.2022.9906374","url":null,"abstract":"Ontologies are crucial for data integration and information sharing. However, due to the different knowledge backgrounds of domain and ontology developers, the heterogeneity problem of multi-source ontology existence is more prominent, and ontology mapping is an important way to solve the ontology heterogeneity problem. However, the ontology similarity calculation methods among them still need to be improved in terms of accuracy or stability. In this paper, we propose an ontology similarity calculation method based on graph attention networks, which models ontologies as heterogeneous graph networks and uses the graph attention network model to introduce an attention mechanism to dynamically consider the influence of edge weights to achieve neighbor aggregation and perform similarity calculation. The experimental results show that this method has higher accuracy than the existing ontology similarity calculation methods.","PeriodicalId":329327,"journal":{"name":"2022 IEEE 5th International Conference on Computer and Communication Engineering Technology (CCET)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124223894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trusted Management Infrastructure with Blockchain for Edge Device in Smart City 基于区块链的智慧城市边缘设备可信管理基础设施
Xiao-qiang Wang, Chen Zhang, Xiao Chang
As smart cities continue to be developed, network traffic surges. Although edge computing improves the quality of service by shifting computing tasks from cloud computing centers to locations closer to the edge through a multi-layer distributed computing model, there are security risks in the face of central node failures and internal malicious attacks, which make it difficult to provide stable and reliable services. In this paper, we design a trusted management model of edge device in smart city with blockchain, introducing blockchain technology into the research of smart city construction. It uses the blockchain distributed architecture and decentralization idea to realize the trusted collection and storage of sensory data. And based on this architecture, a new reputation-based PoW consensus algorithm is proposed to provide a trust mechanism for IoT devices. The algorithm greatly increases the cost of malicious attacks launched by the IoT device, effectively prevents malicious attacks on devices, and achieves trusted management of edge device behavior. The smart city application based on the proposed method verifies its feasibility, effectively prevents malicious attacks from nodes, and enhances the information security of the system.
随着智慧城市的不断发展,网络流量激增。虽然边缘计算通过多层分布式计算模型,将计算任务从云计算中心转移到更靠近边缘的位置,提高了服务质量,但面对中心节点故障和内部恶意攻击,存在安全风险,难以提供稳定可靠的服务。本文采用区块链技术设计了智慧城市边缘设备可信管理模型,将区块链技术引入智慧城市建设的研究中。它采用区块链分布式架构和去中心化思想,实现了感知数据的可信采集和存储。在此基础上,提出了一种新的基于信誉的PoW共识算法,为物联网设备提供信任机制。该算法大大提高了物联网设备发起恶意攻击的成本,有效防止了对设备的恶意攻击,实现了对边缘设备行为的可信管理。基于该方法的智慧城市应用验证了其可行性,有效地防止了节点的恶意攻击,增强了系统的信息安全性。
{"title":"Trusted Management Infrastructure with Blockchain for Edge Device in Smart City","authors":"Xiao-qiang Wang, Chen Zhang, Xiao Chang","doi":"10.1109/CCET55412.2022.9906373","DOIUrl":"https://doi.org/10.1109/CCET55412.2022.9906373","url":null,"abstract":"As smart cities continue to be developed, network traffic surges. Although edge computing improves the quality of service by shifting computing tasks from cloud computing centers to locations closer to the edge through a multi-layer distributed computing model, there are security risks in the face of central node failures and internal malicious attacks, which make it difficult to provide stable and reliable services. In this paper, we design a trusted management model of edge device in smart city with blockchain, introducing blockchain technology into the research of smart city construction. It uses the blockchain distributed architecture and decentralization idea to realize the trusted collection and storage of sensory data. And based on this architecture, a new reputation-based PoW consensus algorithm is proposed to provide a trust mechanism for IoT devices. The algorithm greatly increases the cost of malicious attacks launched by the IoT device, effectively prevents malicious attacks on devices, and achieves trusted management of edge device behavior. The smart city application based on the proposed method verifies its feasibility, effectively prevents malicious attacks from nodes, and enhances the information security of the system.","PeriodicalId":329327,"journal":{"name":"2022 IEEE 5th International Conference on Computer and Communication Engineering Technology (CCET)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124051915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Small Target Detection Method Based on Feature Enhancement and Positioning Optimization 基于特征增强和定位优化的小目标检测方法
Qingshu Li, Xiǎohóng Shí, Qi Xu, Wei Huang, Peng Yang
Feature Pyramid Network (FPN) is a basic but important component in target detection system. Together with target detection algorithms, such as SSD, Faster R-CNN and YOLO series, they have achieved good detection results for large targets with high resolutions, but the performance is less effective when it comes to detect small targets that contain relatively little semantic information. And small target detection is quite common in daily life, such as face recognition at long distances, traffic sign detection in automatic driving, etc. That means it is significant to break the bottleneck of target detection and get better accuracy performance. In this article, based on the FPN, we propose an improved network structure (IMFPN) from two aspects to get a better accuracy result in small target detection task. In the first aspect, we improve the feature map pyramid structure for feature enhancement, reduce the problem of information loss during feature map fusion and get the semantic information of multiscale feature maps. In the second aspect, we concentrate on the problem of information loss in the pooling process of feature maps, we propose an improved version of the PRRoI pooling method that combines RoI Pooling and RoI Align Pooling. And we also optimize the positioning of the frame through a new IoU calculation standard. Based on these above ideas and methods, we propose a small target detection method based on feature enhancement and positioning optimization.
特征金字塔网络(FPN)是目标检测系统中一个基本而重要的组成部分。它们与SSD、Faster R-CNN、YOLO系列等目标检测算法一起,对高分辨率的大目标都取得了很好的检测效果,但对语义信息相对较少的小目标检测效果不佳。而小目标检测在日常生活中是相当普遍的,比如远距离的人脸识别,自动驾驶中的交通标志检测等。这意味着突破目标检测瓶颈,获得更好的精度性能具有重要意义。本文在FPN的基础上,从两个方面提出了一种改进的网络结构(IMFPN),以在小目标检测任务中获得更好的精度结果。首先,改进特征图金字塔结构进行特征增强,减少特征图融合过程中的信息丢失问题,获得多尺度特征图的语义信息;第二方面,针对特征图池化过程中的信息丢失问题,提出了一种改进的PRRoI池化方法,该方法将RoI池化和RoI Align池化相结合。并通过新的IoU计算标准对车架的定位进行了优化。基于上述思想和方法,我们提出了一种基于特征增强和定位优化的小目标检测方法。
{"title":"A Small Target Detection Method Based on Feature Enhancement and Positioning Optimization","authors":"Qingshu Li, Xiǎohóng Shí, Qi Xu, Wei Huang, Peng Yang","doi":"10.1109/CCET55412.2022.9906335","DOIUrl":"https://doi.org/10.1109/CCET55412.2022.9906335","url":null,"abstract":"Feature Pyramid Network (FPN) is a basic but important component in target detection system. Together with target detection algorithms, such as SSD, Faster R-CNN and YOLO series, they have achieved good detection results for large targets with high resolutions, but the performance is less effective when it comes to detect small targets that contain relatively little semantic information. And small target detection is quite common in daily life, such as face recognition at long distances, traffic sign detection in automatic driving, etc. That means it is significant to break the bottleneck of target detection and get better accuracy performance. In this article, based on the FPN, we propose an improved network structure (IMFPN) from two aspects to get a better accuracy result in small target detection task. In the first aspect, we improve the feature map pyramid structure for feature enhancement, reduce the problem of information loss during feature map fusion and get the semantic information of multiscale feature maps. In the second aspect, we concentrate on the problem of information loss in the pooling process of feature maps, we propose an improved version of the PRRoI pooling method that combines RoI Pooling and RoI Align Pooling. And we also optimize the positioning of the frame through a new IoU calculation standard. Based on these above ideas and methods, we propose a small target detection method based on feature enhancement and positioning optimization.","PeriodicalId":329327,"journal":{"name":"2022 IEEE 5th International Conference on Computer and Communication Engineering Technology (CCET)","volume":"974 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116203658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint optimization of Task Offloading and Computing Resource Allocation in MEC-D2D Network MEC-D2D网络中任务卸载与计算资源分配的联合优化
Zhaoyuan Liu, Jingyi Fan, S. Geng, Peng Qin, Xiongwen Zhao
In mobile edge computing (MEC) network, computing offloading can alleviate resource constraints and improve service quality effectively. Meanwhile data transmission in Device-to-Device (D2D) communication can realize resource sharing and balance among different users, in order to improve system spectrum utilization and reduce communication delay. Aiming at minimizing the task delay and terminal energy consumption in MEC network, a joint optimization problem considering task offloading and computing resource allocation is formulated in D2D-assisted MEC network by building cost optimization model with multi-objective constraints. Moreover, the original problem is decoupled as two sub-problems which are solved by discrete ternary particle swarm optimization (DTPSO) algorithm and Lagrange multiplier method, respectively. Simulation results show that compared with three other typical methods, the proposed scheme in this work can effectively reduce task execution delay and terminal energy consumption.
在移动边缘计算(MEC)网络中,计算卸载可以有效缓解资源约束,提高服务质量。同时,设备到设备(Device-to-Device, D2D)通信中的数据传输可以实现不同用户之间的资源共享和平衡,从而提高系统频谱利用率,降低通信延迟。以最小化MEC网络中的任务延迟和终端能耗为目标,通过建立多目标约束的成本优化模型,在d2d辅助MEC网络中构建了一个考虑任务卸载和计算资源分配的联合优化问题。将原问题解耦为两个子问题,分别用离散三元粒子群优化算法和拉格朗日乘子法求解。仿真结果表明,与其他三种典型方法相比,本文提出的方案能有效降低任务执行延迟和终端能耗。
{"title":"Joint optimization of Task Offloading and Computing Resource Allocation in MEC-D2D Network","authors":"Zhaoyuan Liu, Jingyi Fan, S. Geng, Peng Qin, Xiongwen Zhao","doi":"10.1109/CCET55412.2022.9906362","DOIUrl":"https://doi.org/10.1109/CCET55412.2022.9906362","url":null,"abstract":"In mobile edge computing (MEC) network, computing offloading can alleviate resource constraints and improve service quality effectively. Meanwhile data transmission in Device-to-Device (D2D) communication can realize resource sharing and balance among different users, in order to improve system spectrum utilization and reduce communication delay. Aiming at minimizing the task delay and terminal energy consumption in MEC network, a joint optimization problem considering task offloading and computing resource allocation is formulated in D2D-assisted MEC network by building cost optimization model with multi-objective constraints. Moreover, the original problem is decoupled as two sub-problems which are solved by discrete ternary particle swarm optimization (DTPSO) algorithm and Lagrange multiplier method, respectively. Simulation results show that compared with three other typical methods, the proposed scheme in this work can effectively reduce task execution delay and terminal energy consumption.","PeriodicalId":329327,"journal":{"name":"2022 IEEE 5th International Conference on Computer and Communication Engineering Technology (CCET)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126591449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Improved Clock Cycle Measurement Method for High-Speed Serial Signal with Duty-Cycle-Distortion Jitter 含占空比失真抖动的高速串行信号时钟周期测量方法的改进
Tong Wu, K. Song, Hongwei Zhao
Software clock data recovery (CDR) is a critical component of a high-speed serial link that recovers the reference clock from a serial signal, which are generally used in real-time sampling oscilloscopes and electronic design automation software. The common method for calculating the period of the reference clock is to extract the rising and falling edges of the signal, and then calculate the difference between adjacent transition edges, so that a pulse width sequence is obtained. By performing statistics on this sequence, it can be found that the value of the position of the first peak of the statistical histogram is the period of the reference clock, the position of the second peak is twice the period of the clock, etc. The period of the clock can be calculated by weighted average. However, high-speed serial signals inevitably have duty-cycle-distortion (DCD) jitter, and DCD seriously affect the determination of the position of the peak of the above statistical histogram, there are many spurious peaks near the actual peak. This article proposes an improved method of calculating the clock period, which can eliminate the influence of DCD and to obtain an accurate clock period.
软件时钟数据恢复(CDR)是高速串行链路中从串行信号中恢复参考时钟的关键部件,通常用于实时采样示波器和电子设计自动化软件中。计算参考时钟周期的常用方法是提取信号的上升沿和下降沿,然后计算相邻过渡沿之间的差,从而得到脉宽序列。通过对该序列进行统计,可以发现统计直方图的第一个峰的位置值为参考时钟的周期,第二个峰的位置值为参考时钟周期的两倍,等等。时钟的周期可以通过加权平均来计算。然而,高速串行信号不可避免地存在占空比失真(DCD)抖动,并且DCD严重影响上述统计直方图峰值位置的确定,在实际峰值附近存在许多伪峰。本文提出了一种改进的时钟周期计算方法,可以消除DCD的影响,得到准确的时钟周期。
{"title":"An Improved Clock Cycle Measurement Method for High-Speed Serial Signal with Duty-Cycle-Distortion Jitter","authors":"Tong Wu, K. Song, Hongwei Zhao","doi":"10.1109/CCET55412.2022.9906325","DOIUrl":"https://doi.org/10.1109/CCET55412.2022.9906325","url":null,"abstract":"Software clock data recovery (CDR) is a critical component of a high-speed serial link that recovers the reference clock from a serial signal, which are generally used in real-time sampling oscilloscopes and electronic design automation software. The common method for calculating the period of the reference clock is to extract the rising and falling edges of the signal, and then calculate the difference between adjacent transition edges, so that a pulse width sequence is obtained. By performing statistics on this sequence, it can be found that the value of the position of the first peak of the statistical histogram is the period of the reference clock, the position of the second peak is twice the period of the clock, etc. The period of the clock can be calculated by weighted average. However, high-speed serial signals inevitably have duty-cycle-distortion (DCD) jitter, and DCD seriously affect the determination of the position of the peak of the above statistical histogram, there are many spurious peaks near the actual peak. This article proposes an improved method of calculating the clock period, which can eliminate the influence of DCD and to obtain an accurate clock period.","PeriodicalId":329327,"journal":{"name":"2022 IEEE 5th International Conference on Computer and Communication Engineering Technology (CCET)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114166681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tibetan Syllable Prediction with Pre-trained Cross-lingual Language Model 基于预训练跨语言模型的藏文音节预测
Zibo Yi, Qingbo Wu, Jie Yu, Yongtao Tang, Xiaodong Liu, Long Peng, Jun Ma
In recent years, with the development of Tibetan language information technologies, the Internet Tibetan data is increasing year by year. Due to the need for the Tibetan input method and Tibetan error correction, Tibetan language prediction has become an urgent problem to be solved. At present, the challenges of Tibetan prediction are that the Tibetan syllable composition is complex, the vocabulary of Tibetan words which is composed of syllables is extremely large, and the Tibetan word separation technology is not mature. To solve the above problems, this paper proposes a Tibetan syllable prediction method based on a pre-trained cross-lingual language model using Tibetan syllables instead of Tibetan words as the token for prediction. The method uses the cross-lingual language model XLM-R and fine-tunes it using Tibetan news texts to make it more suitable for predicting Tibetan in the news domain. We conduct experiments on Tibetan syllable prediction for texts crawled on the Tibetan news website. The experiments show that the precision of our model for Tibetan text prediction is higher than that of the current n-gram methods.
近年来,随着藏文信息技术的发展,互联网藏文数据逐年增加。由于藏文输入法和藏文纠错的需要,藏文预测已成为一个亟待解决的问题。目前,藏文预测面临的挑战是藏文音节组成复杂,由音节组成的藏文词汇量极大,藏文分词技术不成熟。针对上述问题,本文提出了一种基于预训练的跨语言模型的藏语音节预测方法,使用藏语音节代替藏语单词作为预测标记。该方法使用跨语种语言模型XLM-R,并使用藏文新闻文本对其进行微调,使其更适合新闻领域的藏文预测。我们对从藏语新闻网站抓取的文本进行了藏语音节预测实验。实验表明,该模型对藏文文本的预测精度高于现有的n-gram方法。
{"title":"Tibetan Syllable Prediction with Pre-trained Cross-lingual Language Model","authors":"Zibo Yi, Qingbo Wu, Jie Yu, Yongtao Tang, Xiaodong Liu, Long Peng, Jun Ma","doi":"10.1109/CCET55412.2022.9906389","DOIUrl":"https://doi.org/10.1109/CCET55412.2022.9906389","url":null,"abstract":"In recent years, with the development of Tibetan language information technologies, the Internet Tibetan data is increasing year by year. Due to the need for the Tibetan input method and Tibetan error correction, Tibetan language prediction has become an urgent problem to be solved. At present, the challenges of Tibetan prediction are that the Tibetan syllable composition is complex, the vocabulary of Tibetan words which is composed of syllables is extremely large, and the Tibetan word separation technology is not mature. To solve the above problems, this paper proposes a Tibetan syllable prediction method based on a pre-trained cross-lingual language model using Tibetan syllables instead of Tibetan words as the token for prediction. The method uses the cross-lingual language model XLM-R and fine-tunes it using Tibetan news texts to make it more suitable for predicting Tibetan in the news domain. We conduct experiments on Tibetan syllable prediction for texts crawled on the Tibetan news website. The experiments show that the precision of our model for Tibetan text prediction is higher than that of the current n-gram methods.","PeriodicalId":329327,"journal":{"name":"2022 IEEE 5th International Conference on Computer and Communication Engineering Technology (CCET)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129242287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Arbitrary-Shaped Text Detection with Gaussian Probability Distance Distribution 基于高斯概率距离分布的任意形状文本检测
Li Guo, Zhongyue Chen, Xiaoping Chen
With the development of semantic segmentation, segmentation-based methods have yielded great success in detecting arbitrary-shaped texts. However, many existing text detection methods use binary discrete distributions to predict shrunk text instances, which cannot generate complete and accurate text bounding boxes. In this paper, we propose an arbitrary-shaped scene text detection method based on predicting Gaussian probability distance map of the complete text region, and this map can retain more text boundary information. Then, the boundary pixels are clustered into high-confidence text centers by a learnable post-processing and false positives are filtered out by pixel-level score maps. We also propose an adaptive channel enhancement module to improve the pixel-level segmentation accuracy. Experiments on three standard datasets, including CTW1500, Total-Text, and MSRA-TD500, demonstrate that the proposed method achieves great robustness and performance. The method obtains an F-measure of S2.S% on CTW1500 and S3.0% on MSRA-TD500.
随着语义切分技术的发展,基于切分的方法在检测任意形状文本方面取得了巨大成功。然而,现有的许多文本检测方法使用二进制离散分布来预测收缩文本实例,无法生成完整和准确的文本边界框。本文提出了一种基于预测完整文本区域高斯概率距离图的任意形状场景文本检测方法,该图可以保留更多的文本边界信息。然后,通过可学习的后处理将边界像素聚类到高置信度的文本中心,并通过像素级分数图过滤假阳性。我们还提出了一个自适应信道增强模块来提高像素级分割的精度。在CTW1500、Total-Text和MSRA-TD500三个标准数据集上的实验表明,该方法具有良好的鲁棒性和性能。该方法得到S2的f值。CTW1500和MSRA-TD500分别为3.0%和3.0%。
{"title":"Arbitrary-Shaped Text Detection with Gaussian Probability Distance Distribution","authors":"Li Guo, Zhongyue Chen, Xiaoping Chen","doi":"10.1109/CCET55412.2022.9906393","DOIUrl":"https://doi.org/10.1109/CCET55412.2022.9906393","url":null,"abstract":"With the development of semantic segmentation, segmentation-based methods have yielded great success in detecting arbitrary-shaped texts. However, many existing text detection methods use binary discrete distributions to predict shrunk text instances, which cannot generate complete and accurate text bounding boxes. In this paper, we propose an arbitrary-shaped scene text detection method based on predicting Gaussian probability distance map of the complete text region, and this map can retain more text boundary information. Then, the boundary pixels are clustered into high-confidence text centers by a learnable post-processing and false positives are filtered out by pixel-level score maps. We also propose an adaptive channel enhancement module to improve the pixel-level segmentation accuracy. Experiments on three standard datasets, including CTW1500, Total-Text, and MSRA-TD500, demonstrate that the proposed method achieves great robustness and performance. The method obtains an F-measure of S2.S% on CTW1500 and S3.0% on MSRA-TD500.","PeriodicalId":329327,"journal":{"name":"2022 IEEE 5th International Conference on Computer and Communication Engineering Technology (CCET)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123518508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 IEEE 5th International Conference on Computer and Communication Engineering Technology (CCET)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1