首页 > 最新文献

電腦學刊最新文献

英文 中文
An Analysis of Online Learner Types Applicable to Lifelong Learning Environments 适用于终身学习环境的在线学习者类型分析
Pub Date : 2023-08-01 DOI: 10.53106/199115992023083404020
Shiow-Lin Hwu Shiow-Lin Hwu, Sheng-Lung Peng Shiow-Lin Hwu
Based on the perspective of Sustainable Development Goals (SDGs) Quality Education and lifelong learning, it is necessary to respect the learning opportunities and quality for all individuals. Online learning can provide more opportunities for lifelong learning, but due to the significant differences in students’ backgrounds and characteristics, personalized and timely support becomes more crucial. Learning analytics (LA) in online learning environment is a way to facilitate understanding of the potential meaningful information and relationships of students. One of the main functions of LA is to monitor the learning performance and identify potential learning problems early. In this study, 𝑘-means clustering is performed to determine the types of learning in lifelong online learning environments, based on students’ personal traits (background factors), learning behavior paths, and interactive perspectives on learning performance. Moreover, statistical analysis is used to further evaluate the linear correlation coefficients as well as the characteristics of each group of students, who ranged in age from 18 to 73, with a total of 2386 participants from five courses, in the interactive perspective. The result shows a significant correlation between learning performance and persistence across the three learning clusters, with a tendency towards continuous learning, thus providing educators an understanding of the learning behavior characteristics of those types of online learners. 
基于可持续发展目标(SDGs)优质教育和终身学习的视角,必须尊重每个人的学习机会和质量。在线学习可以为终身学习提供更多的机会,但由于学生背景和特点的显著差异,个性化和及时的支持变得更加重要。在线学习环境中的学习分析(LA)是一种促进理解学生潜在的有意义的信息和关系的方法。学习行为分析的主要功能之一是监测学习表现,及早发现潜在的学习问题。在本研究中,基于学生的个人特征(背景因素)、学习行为路径和学习绩效的互动视角,通过𝑘-means聚类来确定终身在线学习环境中的学习类型。并采用统计分析的方法进一步评价每组学生的线性相关系数和特征。每组学生年龄从18岁到73岁不等,共2386人,来自5个课程。研究结果显示,在三个学习集群中,学习表现与持久性之间存在显著的相关性,并具有持续学习的倾向,从而为教育工作者提供了对这类在线学习者学习行为特征的理解。
{"title":"An Analysis of Online Learner Types Applicable to Lifelong Learning Environments","authors":"Shiow-Lin Hwu Shiow-Lin Hwu, Sheng-Lung Peng Shiow-Lin Hwu","doi":"10.53106/199115992023083404020","DOIUrl":"https://doi.org/10.53106/199115992023083404020","url":null,"abstract":"\u0000 Based on the perspective of Sustainable Development Goals (SDGs) Quality Education and lifelong learning, it is necessary to respect the learning opportunities and quality for all individuals. Online learning can provide more opportunities for lifelong learning, but due to the significant differences in students’ backgrounds and characteristics, personalized and timely support becomes more crucial. Learning analytics (LA) in online learning environment is a way to facilitate understanding of the potential meaningful information and relationships of students. One of the main functions of LA is to monitor the learning performance and identify potential learning problems early. In this study, 𝑘-means clustering is performed to determine the types of learning in lifelong online learning environments, based on students’ personal traits (background factors), learning behavior paths, and interactive perspectives on learning performance. Moreover, statistical analysis is used to further evaluate the linear correlation coefficients as well as the characteristics of each group of students, who ranged in age from 18 to 73, with a total of 2386 participants from five courses, in the interactive perspective. The result shows a significant correlation between learning performance and persistence across the three learning clusters, with a tendency towards continuous learning, thus providing educators an understanding of the learning behavior characteristics of those types of online learners.\u0000 \u0000","PeriodicalId":345067,"journal":{"name":"電腦學刊","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124343917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Formal Analysis and Improvement of Z-Wave Protocol Z-Wave协议的形式化分析与改进
Pub Date : 2023-08-01 DOI: 10.53106/199115992023083404003
Jin-Ze Du Jin-Ze Du, Jun-Wei Liu Jin-Ze Du, Tao Feng Jun-Wei Liu, Zhan-Ting Yuan Tao Feng
In order to verify the security of the Z-Wave communication protocol, the possible attacks in the protocol are analyzed to reduce user privacy security vulnerabilities. For the communication process and key exchange process between the controller and the node, this paper uses CPN tools to model the Z-Wave S2 protocol, and introduces the Dolev-Yao attack model to verify the security behavior of the protocol. The results show that there is a man-in-the-middle attack when using S2 authentication for device inclusion. In response to this vulnerability, we propose a lightweight static authentication scheme based on HKDF function and XOR operation, which performs authentication between Z-Wave controller and slave device. Secondly, we formally verify the security objectives of the improved scheme, and prove that the optimization scheme can effectively prevent man-in-the-middle attacks in the S2 security mode.  
为了验证Z-Wave通信协议的安全性,分析了协议中可能存在的攻击,以减少用户隐私安全漏洞。针对控制器与节点之间的通信过程和密钥交换过程,本文采用CPN工具对Z-Wave S2协议进行建模,并引入Dolev-Yao攻击模型对协议的安全行为进行验证。结果表明,采用S2认证进行设备包含时存在中间人攻击。针对这一漏洞,我们提出了一种基于HKDF函数和异或操作的轻量级静态认证方案,在Z-Wave控制器和从设备之间进行认证。其次,我们正式验证了改进方案的安全目标,并证明了优化方案在S2安全模式下可以有效防止中间人攻击。
{"title":"Formal Analysis and Improvement of Z-Wave Protocol","authors":"Jin-Ze Du Jin-Ze Du, Jun-Wei Liu Jin-Ze Du, Tao Feng Jun-Wei Liu, Zhan-Ting Yuan Tao Feng","doi":"10.53106/199115992023083404003","DOIUrl":"https://doi.org/10.53106/199115992023083404003","url":null,"abstract":"\u0000 In order to verify the security of the Z-Wave communication protocol, the possible attacks in the protocol are analyzed to reduce user privacy security vulnerabilities. For the communication process and key exchange process between the controller and the node, this paper uses CPN tools to model the Z-Wave S2 protocol, and introduces the Dolev-Yao attack model to verify the security behavior of the protocol. The results show that there is a man-in-the-middle attack when using S2 authentication for device inclusion. In response to this vulnerability, we propose a lightweight static authentication scheme based on HKDF function and XOR operation, which performs authentication between Z-Wave controller and slave device. Secondly, we formally verify the security objectives of the improved scheme, and prove that the optimization scheme can effectively prevent man-in-the-middle attacks in the S2 security mode. \u0000 \u0000","PeriodicalId":345067,"journal":{"name":"電腦學刊","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132676430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computer Vision Aided Pantograph Fault Identification Method for Multiple Units 计算机视觉辅助受电弓多单元故障识别方法
Pub Date : 2023-08-01 DOI: 10.53106/199115992023083404012
Peng-Jie Du Peng-Jie Du, Mu-Zhuo Zhang Peng-Jie Du
In order to solve the technical requirements for automatic recognition and judgment of pantograph wear degree of Multiple Units, this paper designs a network structure based on Mask R-CNN structure. At the same time, in order to improve the ability of image feature extraction in the network, the original backbone network is replaced with ResNet-50, a residual network with more prominent feature extraction ability. Secondly, in order to improve the ability to search for targets in the image, the detection head is reconstructed, to improve the recognition ability of targets. Finally, the effectiveness of the algorithm and its ability to identify pantograph faults were verified through simulation experiments. 
为了解决多单元受电弓磨损程度自动识别判断的技术要求,本文设计了一种基于Mask R-CNN结构的网络结构。同时,为了提高网络中图像特征提取的能力,将原有骨干网替换为特征提取能力更突出的残差网络ResNet-50。其次,为了提高对图像中目标的搜索能力,对检测头进行重构,以提高对目标的识别能力。最后,通过仿真实验验证了该算法的有效性和对受电弓故障的识别能力。
{"title":"Computer Vision Aided Pantograph Fault Identification Method for Multiple Units","authors":"Peng-Jie Du Peng-Jie Du, Mu-Zhuo Zhang Peng-Jie Du","doi":"10.53106/199115992023083404012","DOIUrl":"https://doi.org/10.53106/199115992023083404012","url":null,"abstract":"\u0000 In order to solve the technical requirements for automatic recognition and judgment of pantograph wear degree of Multiple Units, this paper designs a network structure based on Mask R-CNN structure. At the same time, in order to improve the ability of image feature extraction in the network, the original backbone network is replaced with ResNet-50, a residual network with more prominent feature extraction ability. Secondly, in order to improve the ability to search for targets in the image, the detection head is reconstructed, to improve the recognition ability of targets. Finally, the effectiveness of the algorithm and its ability to identify pantograph faults were verified through simulation experiments.\u0000 \u0000","PeriodicalId":345067,"journal":{"name":"電腦學刊","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123997306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Structure and Analysis of the Smart Court Construction Evaluation Index Based on Principal Component Analysis for Different Regions 基于主成分分析的不同区域智能球场建设评价指标结构与分析
Pub Date : 2023-08-01 DOI: 10.53106/199115992023083404009
dan Zhang dan ZHANG, Ting-Jie Lu Dan Zhang, Chen-Xing Yang Ting-Jie Lu, Xue-Yan Wang Chen-Xing Yang
In this paper, the principal component analysis method is mainly used to analyze that the construction level of Smart Court in different regions. The construction level of Smart Court consists of three main components. The result of Smart Court construction level in different regions is calculated. It is concluded that the construction level of Smart Court varies in different regions. It is necessary to make great efforts to solve the problem of unbalanced regional development. It is suggested that the construction of Smart Court in the future should focus on the publicity business such as online cases. And more and more new generation information technology such as artificial intelligence should be applied. 
本文主要采用主成分分析法对不同地区智慧法院的建设水平进行分析。智慧法院的建设水平主要由三个部分组成。计算了不同地区智能法院建设水平的结果。结果表明,不同地区智能法院的建设水平存在差异。要大力解决区域发展不平衡的问题。建议未来智慧法院的建设应以网络案件等宣传业务为主。越来越多的新一代信息技术,如人工智能的应用。
{"title":"Structure and Analysis of the Smart Court Construction Evaluation Index Based on Principal Component Analysis for Different Regions","authors":"dan Zhang dan ZHANG, Ting-Jie Lu Dan Zhang, Chen-Xing Yang Ting-Jie Lu, Xue-Yan Wang Chen-Xing Yang","doi":"10.53106/199115992023083404009","DOIUrl":"https://doi.org/10.53106/199115992023083404009","url":null,"abstract":"\u0000 In this paper, the principal component analysis method is mainly used to analyze that the construction level of Smart Court in different regions. The construction level of Smart Court consists of three main components. The result of Smart Court construction level in different regions is calculated. It is concluded that the construction level of Smart Court varies in different regions. It is necessary to make great efforts to solve the problem of unbalanced regional development. It is suggested that the construction of Smart Court in the future should focus on the publicity business such as online cases. And more and more new generation information technology such as artificial intelligence should be applied.\u0000 \u0000","PeriodicalId":345067,"journal":{"name":"電腦學刊","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125820724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Dynamic and Fine-Grained User Trust Evaluation Model for Micro-Segmentation Cloud Computing Environment 微分割云计算环境下动态细粒度用户信任评估模型
Pub Date : 2023-08-01 DOI: 10.53106/199115992023083404019
Chaoqun Kang Chaoqun Kang, Erxia Li Chaoqun Kang, Dongxiao Liu Erxia Li, Xinhong You Dongxiao Liu, Xiaoyong Li Xinhong You
With the diversity and complexity of user access behaviors in the “micro-segmentation” cloud computing environment, it is no longer possible to control unauthorized access of authorized users by only relying on user identity login authentication to control user access to cloud resources. The existing trust evaluation methods can not cope with the characteristics of “micro-isolated” cloud environment, which is characterized by high granularity of resources, increasing number of users’ access requests and rapid changes. Based on the zero-trust principle of “Never trust, al-ways verify”, we propose a dynamic, fine-grained user trust evaluation model for micro-segmentation cloud computing environment, which combines multiple user trust attributes and leverages the subjective-objective approach to assign weights to trust attribute indicators to achieve dynamic scoring of users’ real-time behaviors. To capture the characteristics of users’ intrinsic behaviors, we use correlation analysis to identify the correlation between users’ current and historical behaviors, and combine sliding windows and penalty functions to optimize the model. The massive simulation experiments demonstrate the effectiveness of the proposed dynamic and fine-grained method, which can effectively combine the intrinsic correlation of users’ own access behavior and the difference of access behavior among different users. 
随着“微分段”云计算环境下用户访问行为的多样性和复杂性,仅仅依靠用户身份登录认证来控制用户对云资源的访问,已经无法控制授权用户的非法访问。现有的信任评估方法无法应对“微隔离”云环境资源粒度高、用户访问请求增多、变化快的特点。基于“永不信任,永远验证”的零信任原则,提出了一种微分割云计算环境下的动态、细粒度用户信任评估模型,该模型结合多个用户信任属性,利用主客观方法对信任属性指标赋值权重,实现对用户实时行为的动态评分。为了捕捉用户内在行为的特征,我们使用相关性分析来识别用户当前和历史行为之间的相关性,并结合滑动窗口和惩罚函数对模型进行优化。大量仿真实验验证了所提出的动态细粒度方法的有效性,该方法能够有效地将用户自身访问行为的内在相关性与不同用户之间访问行为的差异性结合起来。
{"title":"A Dynamic and Fine-Grained User Trust Evaluation Model for Micro-Segmentation Cloud Computing Environment","authors":"Chaoqun Kang Chaoqun Kang, Erxia Li Chaoqun Kang, Dongxiao Liu Erxia Li, Xinhong You Dongxiao Liu, Xiaoyong Li Xinhong You","doi":"10.53106/199115992023083404019","DOIUrl":"https://doi.org/10.53106/199115992023083404019","url":null,"abstract":"\u0000 With the diversity and complexity of user access behaviors in the “micro-segmentation” cloud computing environment, it is no longer possible to control unauthorized access of authorized users by only relying on user identity login authentication to control user access to cloud resources. The existing trust evaluation methods can not cope with the characteristics of “micro-isolated” cloud environment, which is characterized by high granularity of resources, increasing number of users’ access requests and rapid changes. Based on the zero-trust principle of “Never trust, al-ways verify”, we propose a dynamic, fine-grained user trust evaluation model for micro-segmentation cloud computing environment, which combines multiple user trust attributes and leverages the subjective-objective approach to assign weights to trust attribute indicators to achieve dynamic scoring of users’ real-time behaviors. To capture the characteristics of users’ intrinsic behaviors, we use correlation analysis to identify the correlation between users’ current and historical behaviors, and combine sliding windows and penalty functions to optimize the model. The massive simulation experiments demonstrate the effectiveness of the proposed dynamic and fine-grained method, which can effectively combine the intrinsic correlation of users’ own access behavior and the difference of access behavior among different users.\u0000 \u0000","PeriodicalId":345067,"journal":{"name":"電腦學刊","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121422717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Face Recognition Method Based on Lightweight Network SE-ShuffleNet V2 基于轻量级网络SE-ShuffleNet V2的人脸识别方法
Pub Date : 2023-08-01 DOI: 10.53106/199115992023083404002
Hong-Rong Jing Hong-Rong Jing, Guo-Jun Lin Hong-Rong Jing, Zhong-Ling Liu Guo-Jun Lin, Jing-Li Zhong-Ling Liu, Jing-Li He Li, Xuan-Han Li Li He, Hong-Jie Zhang Xuan-Han Li, Shun-Yong Zhou Hong-Jie Zhang
We develop a more efficient lightweight network based on SE-ShuffleNet V2 to address the issues of large parameter sizes and sluggish feature extraction rates in large networks in the field of face recognition. First, to increase the network’s accuracy and inference speed, the ReLU activation function of the original ShuffleNet V2 basic unit is swapped out for a segmented linear activation function. Second, the SE attention mechanism is added to the lightweight network ShuffleNet V2, which may improve the effective feature weights and decrease the invalid feature weights, and the SE attention causes the network to focus on more helpful features. Finally, the addition of the Arcface loss function enhances the face recognition network’s capacity for categorization. Experiments indicate that the SE-ShuffleNet V2 network that we created achieves superior performance under the parameters of position and age. Particularly, the LFW accuracy is 99.38%. The algorithm presented in this research significantly increases face recognition accuracy when compared to the original ShuffleNet V2 network, therefore the additional parameters and longer inference times can be disregarded. To match the accuracy of substantial convolutional networks, we developed the lightweight SE-ShuffleNet V2. 
为了解决人脸识别领域中大型网络中参数大小大、特征提取速度慢的问题,我们基于SE-ShuffleNet V2开发了一种更高效的轻量级网络。首先,为了提高网络的准确率和推理速度,将原有ShuffleNet V2基本单元的ReLU激活函数替换为分段线性激活函数。其次,在轻量级网络ShuffleNet V2中加入SE关注机制,可以提高有效特征权值,减少无效特征权值,SE关注使网络关注更多有用的特征。最后,加入Arcface损失函数,增强了人脸识别网络的分类能力。实验表明,我们构建的SE-ShuffleNet V2网络在位置和年龄参数下都具有较好的性能。其中LFW准确率为99.38%。与原来的ShuffleNet V2网络相比,本研究提出的算法显著提高了人脸识别的准确率,因此可以忽略额外的参数和较长的推理时间。为了匹配大量卷积网络的准确性,我们开发了轻量级的SE-ShuffleNet V2。
{"title":"Face Recognition Method Based on Lightweight Network SE-ShuffleNet V2","authors":"Hong-Rong Jing Hong-Rong Jing, Guo-Jun Lin Hong-Rong Jing, Zhong-Ling Liu Guo-Jun Lin, Jing-Li Zhong-Ling Liu, Jing-Li He Li, Xuan-Han Li Li He, Hong-Jie Zhang Xuan-Han Li, Shun-Yong Zhou Hong-Jie Zhang","doi":"10.53106/199115992023083404002","DOIUrl":"https://doi.org/10.53106/199115992023083404002","url":null,"abstract":"\u0000 We develop a more efficient lightweight network based on SE-ShuffleNet V2 to address the issues of large parameter sizes and sluggish feature extraction rates in large networks in the field of face recognition. First, to increase the network’s accuracy and inference speed, the ReLU activation function of the original ShuffleNet V2 basic unit is swapped out for a segmented linear activation function. Second, the SE attention mechanism is added to the lightweight network ShuffleNet V2, which may improve the effective feature weights and decrease the invalid feature weights, and the SE attention causes the network to focus on more helpful features. Finally, the addition of the Arcface loss function enhances the face recognition network’s capacity for categorization. Experiments indicate that the SE-ShuffleNet V2 network that we created achieves superior performance under the parameters of position and age. Particularly, the LFW accuracy is 99.38%. The algorithm presented in this research significantly increases face recognition accuracy when compared to the original ShuffleNet V2 network, therefore the additional parameters and longer inference times can be disregarded. To match the accuracy of substantial convolutional networks, we developed the lightweight SE-ShuffleNet V2.\u0000 \u0000","PeriodicalId":345067,"journal":{"name":"電腦學刊","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115023139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Animal Vocal Recognition-Based Breeding Tracking and Disease Warning 基于动物声音识别的育种跟踪与疾病预警
Pub Date : 2023-08-01 DOI: 10.53106/199115992023083404011
Yinggang Xie Yinggang Xie, Yangpeng Xiao Yinggang Xie, Xuewei Peng Yangpeng Xiao, Qijia Liu Xuewei Peng
In this study, we investigate the application of a deep learning framework for the recognition of pig vocalizations. This innovative approach aims to actively monitor and evaluate the diverse states of pigs, with an overarching objective to improve the efficiency of pig farming through prompt identification and resolution of issues. In our comprehensive data collection effort, we carefully gathered a vast assortment of vocal samples from 50 pigs, representative of four distinct states: normal, frightened, coughing, and sneezing. We then meticulously analyzed this vocal data using Mel Frequency Cepstral Coefficients (MFCC). For accurate recognition of pig vocalizations, we devised a fusion model that combines the strengths of Residual Networks (ResNet) and Long Short-Term Memory Networks (LSTM). This model was subsequently tailored, trained, and optimized to meet our specific requirements. Upon rigorous evaluation, we found our model to exhibit exceptional performance in pig vocal recognition tasks, thereby reinforcing the potential of deep learning methodologies in revolutionizing the livestock industry. This research notably underscores the potential of deploying efficient real-time health monitoring systems, offering a promising avenue towards modernizing livestock management practices. 
在这项研究中,我们研究了深度学习框架在猪发声识别中的应用。这种创新的方法旨在积极监测和评估猪的不同状态,其总体目标是通过及时发现和解决问题来提高养猪效率。在我们全面的数据收集工作中,我们仔细收集了来自50头猪的各种各样的声音样本,代表了四种不同的状态:正常,受惊,咳嗽和打喷嚏。然后,我们使用Mel频率倒谱系数(MFCC)仔细分析了这些声音数据。为了准确识别猪的发声,我们设计了一个融合了残余网络(ResNet)和长短期记忆网络(LSTM)优势的融合模型。这个模型随后被裁剪、训练和优化,以满足我们的具体要求。经过严格的评估,我们发现我们的模型在猪的声音识别任务中表现出色,从而增强了深度学习方法在畜牧业革命中的潜力。这项研究特别强调了部署有效的实时健康监测系统的潜力,为牲畜管理实践的现代化提供了一条有希望的途径。
{"title":"Animal Vocal Recognition-Based Breeding Tracking and Disease Warning","authors":"Yinggang Xie Yinggang Xie, Yangpeng Xiao Yinggang Xie, Xuewei Peng Yangpeng Xiao, Qijia Liu Xuewei Peng","doi":"10.53106/199115992023083404011","DOIUrl":"https://doi.org/10.53106/199115992023083404011","url":null,"abstract":"\u0000 In this study, we investigate the application of a deep learning framework for the recognition of pig vocalizations. This innovative approach aims to actively monitor and evaluate the diverse states of pigs, with an overarching objective to improve the efficiency of pig farming through prompt identification and resolution of issues. In our comprehensive data collection effort, we carefully gathered a vast assortment of vocal samples from 50 pigs, representative of four distinct states: normal, frightened, coughing, and sneezing. We then meticulously analyzed this vocal data using Mel Frequency Cepstral Coefficients (MFCC). For accurate recognition of pig vocalizations, we devised a fusion model that combines the strengths of Residual Networks (ResNet) and Long Short-Term Memory Networks (LSTM). This model was subsequently tailored, trained, and optimized to meet our specific requirements. Upon rigorous evaluation, we found our model to exhibit exceptional performance in pig vocal recognition tasks, thereby reinforcing the potential of deep learning methodologies in revolutionizing the livestock industry. This research notably underscores the potential of deploying efficient real-time health monitoring systems, offering a promising avenue towards modernizing livestock management practices.\u0000 \u0000","PeriodicalId":345067,"journal":{"name":"電腦學刊","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127660425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine Vision Based Defect Detection Method for Electronic Component Solder Pads 基于机器视觉的电子元件焊盘缺陷检测方法
Pub Date : 2023-08-01 DOI: 10.53106/199115992023083404015
Xiaoning Bo Xiaoning Bo, Jin Wang Xiaoning Bo, Honglan Li Jin Wang, Guoqin Li Honglan Li, Feng Lu Guoqin Li
This paper proposes a machine vision based solder pad detection method to improve the detection accuracy and efficiency of PCB solder pad defects in electronic components due to missed detection and low detection efficiency. Firstly, preprocess the electronic component pad images collected by the visual system, then use threshold segmentation method to perform preliminary segmentation of the pad images. Then, the coarse segmented images are finely segmented using mean clustering method, and the fine segmented images are pixel edge extracted. Finally, the matrix subpixel edge detection method is used to improve the edge detection accuracy. Simulation experiments have shown that the proposed method can significantly improve the accuracy and speed of defect recognition. 
本文提出了一种基于机器视觉的焊盘检测方法,以提高电子元器件中PCB焊盘缺陷因漏检和检测效率低的检测精度和效率。首先对视觉系统采集到的电子元器件pad图像进行预处理,然后利用阈值分割方法对pad图像进行初步分割。然后,利用均值聚类方法对粗分割图像进行精细分割,提取精细分割图像的像素边缘;最后,采用矩阵亚像素边缘检测方法提高边缘检测精度。仿真实验表明,该方法能显著提高缺陷识别的精度和速度。
{"title":"Machine Vision Based Defect Detection Method for Electronic Component Solder Pads","authors":"Xiaoning Bo Xiaoning Bo, Jin Wang Xiaoning Bo, Honglan Li Jin Wang, Guoqin Li Honglan Li, Feng Lu Guoqin Li","doi":"10.53106/199115992023083404015","DOIUrl":"https://doi.org/10.53106/199115992023083404015","url":null,"abstract":"\u0000 This paper proposes a machine vision based solder pad detection method to improve the detection accuracy and efficiency of PCB solder pad defects in electronic components due to missed detection and low detection efficiency. Firstly, preprocess the electronic component pad images collected by the visual system, then use threshold segmentation method to perform preliminary segmentation of the pad images. Then, the coarse segmented images are finely segmented using mean clustering method, and the fine segmented images are pixel edge extracted. Finally, the matrix subpixel edge detection method is used to improve the edge detection accuracy. Simulation experiments have shown that the proposed method can significantly improve the accuracy and speed of defect recognition.\u0000 \u0000","PeriodicalId":345067,"journal":{"name":"電腦學刊","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116655811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Influence of Distributed Energy Accessing Power Grid System Based on Integral Projection Algorithm 基于积分投影算法的分布式能源接入电网系统影响研究
Pub Date : 2023-06-01 DOI: 10.53106/199115992023063403012
Yonggang Dong Yonggang Dong, Shichao Cao Yonggang Dong, Haoliang Yang Shichao Cao
A large number of distributed energy sources connected to the grid will cause certain disturbances to the stability of the grid system. We consider the random characteristics and establish a dynamic simulation framework for the active power distribution system suitable for the integral projection algorithm. The article uses an internal integrator to solve the fast dynamic process with explicit and implicit Euler methods in small steps. In the calculation process, this method can effectively consider the influence of events such as fault disturbance on the grid connection of the distributed power grid. Numerical analysis and simulation tests verify the effectiveness of this algorithm. 
大量的分布式能源并网会对电网系统的稳定性造成一定的干扰。考虑了有功配电系统的随机特性,建立了适用于积分投影算法的有功配电系统动态仿真框架。本文采用内积分器,用显式和隐式欧拉方法小步求解快速动态过程。在计算过程中,该方法可以有效地考虑故障扰动等事件对分布式电网并网的影响。数值分析和仿真试验验证了该算法的有效性。
{"title":"Research on Influence of Distributed Energy Accessing Power Grid System Based on Integral Projection Algorithm","authors":"Yonggang Dong Yonggang Dong, Shichao Cao Yonggang Dong, Haoliang Yang Shichao Cao","doi":"10.53106/199115992023063403012","DOIUrl":"https://doi.org/10.53106/199115992023063403012","url":null,"abstract":"\u0000 A large number of distributed energy sources connected to the grid will cause certain disturbances to the stability of the grid system. We consider the random characteristics and establish a dynamic simulation framework for the active power distribution system suitable for the integral projection algorithm. The article uses an internal integrator to solve the fast dynamic process with explicit and implicit Euler methods in small steps. In the calculation process, this method can effectively consider the influence of events such as fault disturbance on the grid connection of the distributed power grid. Numerical analysis and simulation tests verify the effectiveness of this algorithm.\u0000 \u0000","PeriodicalId":345067,"journal":{"name":"電腦學刊","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127456215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Traffic Sign Detection Based on Improved YOLOv5 基于改进YOLOv5的交通标志检测
Pub Date : 2023-06-01 DOI: 10.53106/199115992023063403005
Hua-Ping Zhou Hua-Ping Zhou, Chen-Chen Xu Hua-Ping Zhou, Ke-Lei Sun Chen-Chen Xu
As a popular research direction in the field of intelligent transportation, various scholars have widely concerned themselves with traffic sign detection However, there are still some key issues that need to be further solved in order to thoroughly apply related technologies to real scenarios, such as the feature extraction scheme of traffic sign images, and the optimal selection of detection methods. For the purpose of overcoming these difficulties. This paper proposes a YOLO-based traffic sign detection framework. Firstly, a lightweight convolution attention mechanism is embedded into the backbone network to obtain the information of space and channel; Secondly, the multi-scale awareness module is used to replace large convolution with 3×3 convolution superposition to improve the receptive field area of the object in the model and enhance the feature fusion performance of the model; Finally, CIoU is used as the loss function of the bounding box to locate the experimental object with high precision. The experimental results show that on the CCTSDB data set, the MAP of this method reaches 91.0%, which is 3.5% higher than the original YOLOv5. Compared with other mainstream object detection algorithms, it has a certain degree of improvement, which proves the effectiveness of this method. 
交通标志检测作为智能交通领域的一个热门研究方向,受到了众多学者的广泛关注。然而,为了将相关技术深入应用于真实场景,仍有一些关键问题需要进一步解决,如交通标志图像的特征提取方案、检测方法的优化选择等。为了克服这些困难。提出了一种基于yolo的交通标志检测框架。首先,在主干网中嵌入轻量级卷积关注机制,获取空间和信道信息;其次,利用多尺度感知模块用3×3卷积叠加代替大卷积,提高模型中目标的感受野面积,增强模型的特征融合性能;最后,利用CIoU作为边界盒的损失函数,对实验目标进行高精度定位。实验结果表明,在CCTSDB数据集上,该方法的MAP达到了91.0%,比原来的YOLOv5提高了3.5%。与其他主流目标检测算法相比,有一定程度的改进,证明了该方法的有效性。
{"title":"Traffic Sign Detection Based on Improved YOLOv5","authors":"Hua-Ping Zhou Hua-Ping Zhou, Chen-Chen Xu Hua-Ping Zhou, Ke-Lei Sun Chen-Chen Xu","doi":"10.53106/199115992023063403005","DOIUrl":"https://doi.org/10.53106/199115992023063403005","url":null,"abstract":"\u0000 As a popular research direction in the field of intelligent transportation, various scholars have widely concerned themselves with traffic sign detection However, there are still some key issues that need to be further solved in order to thoroughly apply related technologies to real scenarios, such as the feature extraction scheme of traffic sign images, and the optimal selection of detection methods. For the purpose of overcoming these difficulties. This paper proposes a YOLO-based traffic sign detection framework. Firstly, a lightweight convolution attention mechanism is embedded into the backbone network to obtain the information of space and channel; Secondly, the multi-scale awareness module is used to replace large convolution with 3×3 convolution superposition to improve the receptive field area of the object in the model and enhance the feature fusion performance of the model; Finally, CIoU is used as the loss function of the bounding box to locate the experimental object with high precision. The experimental results show that on the CCTSDB data set, the MAP of this method reaches 91.0%, which is 3.5% higher than the original YOLOv5. Compared with other mainstream object detection algorithms, it has a certain degree of improvement, which proves the effectiveness of this method.\u0000 \u0000","PeriodicalId":345067,"journal":{"name":"電腦學刊","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125509414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
電腦學刊
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1