Deep learning methods for multi-parametric MRI hold the greatest promise for automated computer-aided diagnosis of prostate cancer, including classification and segmentation. In this work, we propose a new model (MC-DSCN) for classification and segmentation simultaneously. MC-DSCN contains three components: the coarse segmentation component based on the residual U-net with attention blocks, the classification component based on the stacked residual blocks and multi-parametric fusion mechanism, and the fine segmentation component that incorporates the information about lesion location (cancer response map, CRM) arising from the classification component. Extensive experiments are performed to demonstrate that the proposed method could effectively transfer mutual information between segmentation and classification components and facilitate each other in a bootstrapping way, thus outperforming the methods designed to perform only one task.
{"title":"A mutual communicated model based on multi-parametric MRI for automated prostate segmentation and prostate cancer classification","authors":"Piqiang Li, Kewen Liu, Zhao Li, Weida Xie, Q. Bao, Chaoyang Liu","doi":"10.1117/12.2639215","DOIUrl":"https://doi.org/10.1117/12.2639215","url":null,"abstract":"Deep learning methods for multi-parametric MRI hold the greatest promise for automated computer-aided diagnosis of prostate cancer, including classification and segmentation. In this work, we propose a new model (MC-DSCN) for classification and segmentation simultaneously. MC-DSCN contains three components: the coarse segmentation component based on the residual U-net with attention blocks, the classification component based on the stacked residual blocks and multi-parametric fusion mechanism, and the fine segmentation component that incorporates the information about lesion location (cancer response map, CRM) arising from the classification component. Extensive experiments are performed to demonstrate that the proposed method could effectively transfer mutual information between segmentation and classification components and facilitate each other in a bootstrapping way, thus outperforming the methods designed to perform only one task.","PeriodicalId":336892,"journal":{"name":"Neural Networks, Information and Communication Engineering","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121234238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Packing technology is commonly used in malicious software. With the increasing awareness of software publishers on their own intellectual property protection, the phenomenon of packing benign software is becoming more and more common. This phenomenon leads to a high false positive rate in traditional machine learning-based malware identification results. Traditional researches on malware detection based on machine learning focus on improving the identification accuracy of malware, and there are few researches on reducing the false positive rate. This article focuses on this issue. We select the data set that labels whether benign software is packed or not, and use a variety of machine learning algorithms to conduct experiments. Finally, we obtain the method with the lowest false positive rate. The experimental results show that the comprehensive index of the Extra-Trees algorithm is optimal.
{"title":"A static detection method for malware with low false positive rate for packed benign software","authors":"Jikai He, Jianguo Yu, Zheng Song","doi":"10.1117/12.2639229","DOIUrl":"https://doi.org/10.1117/12.2639229","url":null,"abstract":"Packing technology is commonly used in malicious software. With the increasing awareness of software publishers on their own intellectual property protection, the phenomenon of packing benign software is becoming more and more common. This phenomenon leads to a high false positive rate in traditional machine learning-based malware identification results. Traditional researches on malware detection based on machine learning focus on improving the identification accuracy of malware, and there are few researches on reducing the false positive rate. This article focuses on this issue. We select the data set that labels whether benign software is packed or not, and use a variety of machine learning algorithms to conduct experiments. Finally, we obtain the method with the lowest false positive rate. The experimental results show that the comprehensive index of the Extra-Trees algorithm is optimal.","PeriodicalId":336892,"journal":{"name":"Neural Networks, Information and Communication Engineering","volume":"205 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133292619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
For the purpose of better measuring the influence of musicians and exploring the similarities and characteristics of various genres, we need to optimize the Musician Influence Model properly and represent musical features in an appropriate way. The previous model was established based on the correction of followers’ and influencers’ number of each musician and the correction of total number of actual musicians according to genre proportion, which did not take the change of genre proportion over time and indirect influence of musician into consideration. To better optimize it, I innovatively introduced “direct number”, “indirect number” and “strong number” of followers and influencers, and all of them was corrected by proper functions. Through the standardization of data and the frequent use of entropy weight method, the relationship between the data became more accurate and reliable. The advantages a musician should have to be more influential can be assumed after obtaining the ranking table with Bob Dylan, The Beatles, Radiohead, Avril Lavigne and Alan Jackson being the top five. Besides, I selected six parameters - danceability, energy, valence, Tempo, acousticness and instrumentalness, to characterize the music. And I selected 6 representative genres based on the analysis of the proportion, musician number and average popularity of all genres. We draw some conclusions by analyzing the musical characteristics radar map of each genre.
{"title":"The optimization of musician influence model and the trait analysis of music in different genres","authors":"Qiming Tian","doi":"10.1117/12.2639283","DOIUrl":"https://doi.org/10.1117/12.2639283","url":null,"abstract":"For the purpose of better measuring the influence of musicians and exploring the similarities and characteristics of various genres, we need to optimize the Musician Influence Model properly and represent musical features in an appropriate way. The previous model was established based on the correction of followers’ and influencers’ number of each musician and the correction of total number of actual musicians according to genre proportion, which did not take the change of genre proportion over time and indirect influence of musician into consideration. To better optimize it, I innovatively introduced “direct number”, “indirect number” and “strong number” of followers and influencers, and all of them was corrected by proper functions. Through the standardization of data and the frequent use of entropy weight method, the relationship between the data became more accurate and reliable. The advantages a musician should have to be more influential can be assumed after obtaining the ranking table with Bob Dylan, The Beatles, Radiohead, Avril Lavigne and Alan Jackson being the top five. Besides, I selected six parameters - danceability, energy, valence, Tempo, acousticness and instrumentalness, to characterize the music. And I selected 6 representative genres based on the analysis of the proportion, musician number and average popularity of all genres. We draw some conclusions by analyzing the musical characteristics radar map of each genre.","PeriodicalId":336892,"journal":{"name":"Neural Networks, Information and Communication Engineering","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131383899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aiming at the problem that traditional ViBe algorithm is prone to appear ghost area in the process of moving target detection, an improved ViBe algorithm was proposed. In the background model initialization stage, a time background model is added for each pixel, which uses the temporal characteristics of the pixel; at the same time, the original background model is improved, and the image used for modeling is determined by comparing the Hamming distance between frames. The coexistence of dual-background models is realized. In the foreground detection stage, the decision mechanism of the foreground detection is improved, that is, the Euclidean distance between the current pixel and the median of the temporal background model sample is used to supplement the decision; Finally, a cross-updating strategy is designed to rapidly update the dual-background model in the background model updating stage. Experiments show that compared with the traditional ViBe algorithm, the algorithm in this paper has a better effect on ghost suppression.
{"title":"An improved vibe algorithm of dual background model for quickly suppressing ghost images","authors":"Baoyu Song, Botao Wang","doi":"10.1117/12.2639141","DOIUrl":"https://doi.org/10.1117/12.2639141","url":null,"abstract":"Aiming at the problem that traditional ViBe algorithm is prone to appear ghost area in the process of moving target detection, an improved ViBe algorithm was proposed. In the background model initialization stage, a time background model is added for each pixel, which uses the temporal characteristics of the pixel; at the same time, the original background model is improved, and the image used for modeling is determined by comparing the Hamming distance between frames. The coexistence of dual-background models is realized. In the foreground detection stage, the decision mechanism of the foreground detection is improved, that is, the Euclidean distance between the current pixel and the median of the temporal background model sample is used to supplement the decision; Finally, a cross-updating strategy is designed to rapidly update the dual-background model in the background model updating stage. Experiments show that compared with the traditional ViBe algorithm, the algorithm in this paper has a better effect on ghost suppression.","PeriodicalId":336892,"journal":{"name":"Neural Networks, Information and Communication Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131073363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Changwei Shi, H. Zeng, Xiaoping Fu, Yibin Luo, Jifu Wang
This research builds a time synchronization demand model, a clock network model and a hierarchical distributed architecture for low-carbon Operation Services in smart campus (cluster) , combined with the existing time synchronization network, beidou time service, 5G network time service, multi-source heterogeneous communication protocol time service and local time service multi-source synchronization, breakthrough precise remote time tracing technology, it can provide high-adaptability and high-precision synchronous time tracing source for new low-carbon optimized operation of Smart Park (cluster) carbon measurement, electric carbon fusion, carbon emission, carbon footprint monitoring, electric spot market and so on.
{"title":"Research on the communication network synchronization and time traceability technology for low-carbon operation of smart parks","authors":"Changwei Shi, H. Zeng, Xiaoping Fu, Yibin Luo, Jifu Wang","doi":"10.1117/12.2639250","DOIUrl":"https://doi.org/10.1117/12.2639250","url":null,"abstract":"This research builds a time synchronization demand model, a clock network model and a hierarchical distributed architecture for low-carbon Operation Services in smart campus (cluster) , combined with the existing time synchronization network, beidou time service, 5G network time service, multi-source heterogeneous communication protocol time service and local time service multi-source synchronization, breakthrough precise remote time tracing technology, it can provide high-adaptability and high-precision synchronous time tracing source for new low-carbon optimized operation of Smart Park (cluster) carbon measurement, electric carbon fusion, carbon emission, carbon footprint monitoring, electric spot market and so on.","PeriodicalId":336892,"journal":{"name":"Neural Networks, Information and Communication Engineering","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124229463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this design, a 0.35um BCD process is used to design a high power supply rejection ratio LDO with feed-forward ripple elimination. By analyzing the power supply noise interference, a feed-forward ripple elimination circuit is used to reduce the power supply noise on the output. In order to ensure that the LDO has a high power supply rejection ratio in a wide load range, the output voltage of the LDO is 1.8V, the input voltage range is 2.5V to 5V, the load current range is 0 to 20mA, and the quiescent current is less than 80μA. The simulation results show that when the input voltage is 5V, the PSRR at low frequency at no load is 114dB, and the PSRR at 10 kHz is 77dB; when the load is 20mA, the PSRR at low frequency is 104dB, and the PSRR at 10 kHz is 72dB.
{"title":"A high power supply rejection LDO with feed-forward ripple cancellation","authors":"Zhichao Lu, Shengming Huang, Q. Duan","doi":"10.1117/12.2639114","DOIUrl":"https://doi.org/10.1117/12.2639114","url":null,"abstract":"In this design, a 0.35um BCD process is used to design a high power supply rejection ratio LDO with feed-forward ripple elimination. By analyzing the power supply noise interference, a feed-forward ripple elimination circuit is used to reduce the power supply noise on the output. In order to ensure that the LDO has a high power supply rejection ratio in a wide load range, the output voltage of the LDO is 1.8V, the input voltage range is 2.5V to 5V, the load current range is 0 to 20mA, and the quiescent current is less than 80μA. The simulation results show that when the input voltage is 5V, the PSRR at low frequency at no load is 114dB, and the PSRR at 10 kHz is 77dB; when the load is 20mA, the PSRR at low frequency is 104dB, and the PSRR at 10 kHz is 72dB.","PeriodicalId":336892,"journal":{"name":"Neural Networks, Information and Communication Engineering","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121175169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shengyuan Wu, Xianghong Zhang, Gang Peng, Huipeng Chen, T. Guo
Synaptic devices are progressing towards large-scale integration, but artificial neuron device research is still in its infancy. NbOx is an artificial neuron core material, but the Vth, Vhold of the threshold shift of NbOx will shift within a certain range, which will be unfavorable for making oscillating neurons.In this paper, We explore the Vth and Vhold shift and electrical properties of NbOx volatile memristor in different temperatures. The results indicate that the window of I-V behaves more stable at low temperatures, and higher temperatures would make the window stochastic increasing and more prone to failure. Furthermore, this suggests that the reduction of the high resistance state of the volatile NbOx memristor is due to the reduction of the Schottky barrier.
{"title":"Effect of temperature on electrical characteristics of NbOx volatile memristor","authors":"Shengyuan Wu, Xianghong Zhang, Gang Peng, Huipeng Chen, T. Guo","doi":"10.1117/12.2639342","DOIUrl":"https://doi.org/10.1117/12.2639342","url":null,"abstract":"Synaptic devices are progressing towards large-scale integration, but artificial neuron device research is still in its infancy. NbOx is an artificial neuron core material, but the Vth, Vhold of the threshold shift of NbOx will shift within a certain range, which will be unfavorable for making oscillating neurons.In this paper, We explore the Vth and Vhold shift and electrical properties of NbOx volatile memristor in different temperatures. The results indicate that the window of I-V behaves more stable at low temperatures, and higher temperatures would make the window stochastic increasing and more prone to failure. Furthermore, this suggests that the reduction of the high resistance state of the volatile NbOx memristor is due to the reduction of the Schottky barrier.","PeriodicalId":336892,"journal":{"name":"Neural Networks, Information and Communication Engineering","volume":"228 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122946460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A new round of technological revolution and industrial revolution with artificial intelligence as the core is affecting all fields of society. However, grid generation is still a great challenge for computational fluid dynamics (CFD) simulations over complex geometries even though CFD researchers have made great progress in this field after decades of effort. In order to improve the traditional advancing front method of unstructured grid generation, scholars at home and abroad have carried out many beneficial attempts and explorations in finite element mesh generation using artificial intelligence. Firstly, this paper reviews the development history and present situation of artificial intelligence technology. Then, the application status of artificial intelligence in grid generation, size field prediction and grid optimization under the background of the big data era is discussed, and the advantages and disadvantages of various methods are pointed out. Finally, the development trend of artificial intelligence for grid generation is described.
{"title":"Application of artificial intelligence in unstructured grid generation","authors":"P. Lu, Li-rang Gao, Nianhua Wang, X. Chang, Laiping Zhang, Yadong Wu","doi":"10.1117/12.2639338","DOIUrl":"https://doi.org/10.1117/12.2639338","url":null,"abstract":"A new round of technological revolution and industrial revolution with artificial intelligence as the core is affecting all fields of society. However, grid generation is still a great challenge for computational fluid dynamics (CFD) simulations over complex geometries even though CFD researchers have made great progress in this field after decades of effort. In order to improve the traditional advancing front method of unstructured grid generation, scholars at home and abroad have carried out many beneficial attempts and explorations in finite element mesh generation using artificial intelligence. Firstly, this paper reviews the development history and present situation of artificial intelligence technology. Then, the application status of artificial intelligence in grid generation, size field prediction and grid optimization under the background of the big data era is discussed, and the advantages and disadvantages of various methods are pointed out. Finally, the development trend of artificial intelligence for grid generation is described.","PeriodicalId":336892,"journal":{"name":"Neural Networks, Information and Communication Engineering","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126683181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper builds an OFDM-IM simulation system, analyzes the system bit error rate (BER) and the system signal-to-noise ratio (SNR) changes under different activated sub-carrier values. The conclusion is that when only BER is considered, activating a small number of sub-carriers will get better results. Then it analyzes the change rule of the optimal solution number of activated sub-carriers with the total number of sub-carriers, and obtains a general mathematical formula description, and combines relevant data such as the proportion of the optimal number of activated sub-carriers, and the theoretical transmission speed optimization rate, Compared with the OFDM system, the conclusion is that when the subcarriers carry more information, the addition of the IM system does not significantly improve the performance of the system, but increases the complexity of calculation and coding. In the above case, the optimal number of activated subcarriers is almost equivalent to the total number of sub-carriers, so adding IM modulation at this time does not make much sense.
{"title":"Effect of active sub-carriers' Number on OFDM-IM systems and numerical optimization","authors":"L. Liu, Kaina Zhang","doi":"10.1117/12.2640507","DOIUrl":"https://doi.org/10.1117/12.2640507","url":null,"abstract":"This paper builds an OFDM-IM simulation system, analyzes the system bit error rate (BER) and the system signal-to-noise ratio (SNR) changes under different activated sub-carrier values. The conclusion is that when only BER is considered, activating a small number of sub-carriers will get better results. Then it analyzes the change rule of the optimal solution number of activated sub-carriers with the total number of sub-carriers, and obtains a general mathematical formula description, and combines relevant data such as the proportion of the optimal number of activated sub-carriers, and the theoretical transmission speed optimization rate, Compared with the OFDM system, the conclusion is that when the subcarriers carry more information, the addition of the IM system does not significantly improve the performance of the system, but increases the complexity of calculation and coding. In the above case, the optimal number of activated subcarriers is almost equivalent to the total number of sub-carriers, so adding IM modulation at this time does not make much sense.","PeriodicalId":336892,"journal":{"name":"Neural Networks, Information and Communication Engineering","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125666254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yi-yong Lin, Yang Qiao, Shibin Hu, B. Dong, Xing-yuan Zhang
The characteristics of the ARMA model are analyzed according to the characteristics of the short-term flow data of the local area network in this paper. The time prediction model of network flow is established on the ARMA method. The prediction parameters of the ARMA model are determined and the model is simulated According to the short-term flow prediction. The comparison between the simulation results and the measured data of NetFlow shows that the model can accurately predict the short-term flow behavior trend of the local area network, which can provide reference and reference for the analysis of network traffic behavior.
{"title":"Research on short-term flow prediction of local area network based on ARMA model","authors":"Yi-yong Lin, Yang Qiao, Shibin Hu, B. Dong, Xing-yuan Zhang","doi":"10.1117/12.2640665","DOIUrl":"https://doi.org/10.1117/12.2640665","url":null,"abstract":"The characteristics of the ARMA model are analyzed according to the characteristics of the short-term flow data of the local area network in this paper. The time prediction model of network flow is established on the ARMA method. The prediction parameters of the ARMA model are determined and the model is simulated According to the short-term flow prediction. The comparison between the simulation results and the measured data of NetFlow shows that the model can accurately predict the short-term flow behavior trend of the local area network, which can provide reference and reference for the analysis of network traffic behavior.","PeriodicalId":336892,"journal":{"name":"Neural Networks, Information and Communication Engineering","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117345305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}