首页 > 最新文献

Fifth International Conference on Computer Information Science and Artificial Intelligence最新文献

英文 中文
Research on vehicle tracking technology in expressway cross-monitoring area based on radar and video fusion 基于雷达与视频融合的高速公路交叉监控区域车辆跟踪技术研究
Jianzhen Liu, B. Feng
It is an important way to improve expressway monitoring management level to realize continuous real-time tracking and monitoring of abnormal driving vehicles such as overspeed, long time and low speed occupation of overtaking lane, continuous lane change, and dangerous goods transportation vehicles under different cameras. This article through studies the expressway ray regard convergence across monitoring area joint tracking technology, build the camera comprehensive control, camera control balance compensation and the monitoring area based on target motion continuity principle joint track model, such as through the accurate control of radar to detect vehicle more monitor cameras, solves the continuous tracking target vehicle monitoring technical problems. It has been successfully applied in Yanchong expressway, providing more convenient monitoring services for the expressway management department, and providing strong support for the decision-making of the expressway management department, which has high application value.
实现对超速、长时间低速占用超车道、连续变道、危险品运输等异常行驶车辆在不同摄像头下的连续实时跟踪监控,是提高高速公路监控管理水平的重要途径。本文通过研究高速公路射线视界跨监控区域的联合跟踪技术,建立了摄像机综合控制、摄像机控制平衡补偿和基于目标运动连续性原理的监控区域联合跟踪模型,如通过雷达的精确控制来检测车辆多台监控摄像机,解决了车辆连续跟踪目标的监控技术难题。该系统已成功应用于延充高速公路,为高速公路管理部门提供了更加便捷的监控服务,为高速公路管理部门的决策提供了有力的支持,具有较高的应用价值。
{"title":"Research on vehicle tracking technology in expressway cross-monitoring area based on radar and video fusion","authors":"Jianzhen Liu, B. Feng","doi":"10.1117/12.2667372","DOIUrl":"https://doi.org/10.1117/12.2667372","url":null,"abstract":"It is an important way to improve expressway monitoring management level to realize continuous real-time tracking and monitoring of abnormal driving vehicles such as overspeed, long time and low speed occupation of overtaking lane, continuous lane change, and dangerous goods transportation vehicles under different cameras. This article through studies the expressway ray regard convergence across monitoring area joint tracking technology, build the camera comprehensive control, camera control balance compensation and the monitoring area based on target motion continuity principle joint track model, such as through the accurate control of radar to detect vehicle more monitor cameras, solves the continuous tracking target vehicle monitoring technical problems. It has been successfully applied in Yanchong expressway, providing more convenient monitoring services for the expressway management department, and providing strong support for the decision-making of the expressway management department, which has high application value.","PeriodicalId":345723,"journal":{"name":"Fifth International Conference on Computer Information Science and Artificial Intelligence","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127197639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Government and enterprise data security sharing method based on differential privacy protection 基于差分隐私保护的政企数据安全共享方法
Xiaomin Xu, Zhenglei Zhu, Jiange Liu, Xin Liu, Qingxuan Guo
The security of government and enterprise data sharing is very important and critical. To increase the number of data sharing, create a more stable transmission and processing environment, and reduce network threats, this paper studies the security sharing method of government and enterprise data based on differential privacy protection. Firstly, the government and enterprise data encryption are described, and the Tendermint differential overlapping interactive sharing nodes are deployed in the preset area. Then, based on this, the interactive differential privacy protection data sharing model is designed, and the threat identification method is used to achieve data security sharing. The experimental results show that compared with the traditional proxy encryption data security sharing test group and the traditional CP-ABE data security sharing test group, the differential privacy protection sharing test group designed in this paper achieves relatively more times of one-way data security sharing, which indicates that the proposed method has a small error and fast speed in the actual data transmission process. The data processing in the region has less restrictive conditions and has practical application value.
政府和企业数据共享的安全性是非常重要和关键的。为了增加数据共享的数量,创造更稳定的传输和处理环境,减少网络威胁,本文研究了基于差分隐私保护的政企数据安全共享方法。首先,对政企数据加密进行了描述,并在预设区域部署了Tendermint差分重叠交互共享节点;在此基础上,设计了交互式差分隐私保护数据共享模型,并采用威胁识别方法实现数据安全共享。实验结果表明,与传统的代理加密数据安全共享测试组和传统的CP-ABE数据安全共享测试组相比,本文设计的差分隐私保护共享测试组实现了相对较多的单向数据安全共享次数,表明本文方法在实际数据传输过程中误差小,速度快。该区域的数据处理限制条件较少,具有实际应用价值。
{"title":"Government and enterprise data security sharing method based on differential privacy protection","authors":"Xiaomin Xu, Zhenglei Zhu, Jiange Liu, Xin Liu, Qingxuan Guo","doi":"10.1117/12.2668452","DOIUrl":"https://doi.org/10.1117/12.2668452","url":null,"abstract":"The security of government and enterprise data sharing is very important and critical. To increase the number of data sharing, create a more stable transmission and processing environment, and reduce network threats, this paper studies the security sharing method of government and enterprise data based on differential privacy protection. Firstly, the government and enterprise data encryption are described, and the Tendermint differential overlapping interactive sharing nodes are deployed in the preset area. Then, based on this, the interactive differential privacy protection data sharing model is designed, and the threat identification method is used to achieve data security sharing. The experimental results show that compared with the traditional proxy encryption data security sharing test group and the traditional CP-ABE data security sharing test group, the differential privacy protection sharing test group designed in this paper achieves relatively more times of one-way data security sharing, which indicates that the proposed method has a small error and fast speed in the actual data transmission process. The data processing in the region has less restrictive conditions and has practical application value.","PeriodicalId":345723,"journal":{"name":"Fifth International Conference on Computer Information Science and Artificial Intelligence","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124852588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Determining efficient placement of electric vehicles charging stations using integer linear programming 利用整数线性规划确定电动汽车充电站的有效布局
Yuan Ma, Guheng Pan, Jiong Xu
This paper proposes an approach for a company to determine the choice of electric stations for its respective electric vehicles so that it would minimize its cost on this process. This approach can not only be applied in this problem but also can be utilized for other scenarios. The core of this method is using integer linear programming to represent “to choose” or “not to choose”. The result will give the corresponding value so that we could identify the orientation for each car. In the thesis, we abstract the problem into dealing with 5 cars going to 5 stations among 7 stations. One car will go to one of the 7 stations and no more than one car can go to the same station. The input data is achieved by calculating the distance from each station to each car. Programming is embodied in investigation to solve the integer linear programming optimization. The chosen region is formulated into a coordinate. The cost is in proportional to distance between cars and stations, so a cost function is demonstrated. Finally, the formula of cost is the product of a matrix and an unknown matrix. In order to minimize the cost, this unknown matrix which represent the choice for each car can be solved. After getting the result, the situation that one station will have different capacity, which will allow people to have more option available will be analyzed. Further evaluation of this type of problem will be discussed to analyze why the outcome of the program will all be zero and one.
本文提出了一种方法,为公司确定其各自的电动汽车的电站选择,使其在此过程中的成本最小化。该方法不仅适用于该问题,也可用于其他场景。该方法的核心是用整数线性规划来表示“选择”或“不选择”。结果将给出相应的值,以便我们可以识别每辆车的方向。在本文中,我们将问题抽象为处理7个站点中的5个站点的5辆车。一辆车可以去7个车站中的一个,不能有超过一辆车可以去同一个车站。输入数据是通过计算从每个车站到每辆车的距离来实现的。规划体现在对整数线性规划优化问题的研究中。所选区域被表示成一个坐标。成本与汽车与车站之间的距离成正比,因此演示了成本函数。最后,成本公式是一个矩阵和一个未知矩阵的乘积。为了使成本最小化,这个表示每辆车的选择的未知矩阵可以求解。得到结果后,分析一个车站将有不同容量的情况,这将使人们有更多的选择。对这类问题的进一步评估将被讨论,以分析为什么程序的结果都是0和1。
{"title":"Determining efficient placement of electric vehicles charging stations using integer linear programming","authors":"Yuan Ma, Guheng Pan, Jiong Xu","doi":"10.1117/12.2669163","DOIUrl":"https://doi.org/10.1117/12.2669163","url":null,"abstract":"This paper proposes an approach for a company to determine the choice of electric stations for its respective electric vehicles so that it would minimize its cost on this process. This approach can not only be applied in this problem but also can be utilized for other scenarios. The core of this method is using integer linear programming to represent “to choose” or “not to choose”. The result will give the corresponding value so that we could identify the orientation for each car. In the thesis, we abstract the problem into dealing with 5 cars going to 5 stations among 7 stations. One car will go to one of the 7 stations and no more than one car can go to the same station. The input data is achieved by calculating the distance from each station to each car. Programming is embodied in investigation to solve the integer linear programming optimization. The chosen region is formulated into a coordinate. The cost is in proportional to distance between cars and stations, so a cost function is demonstrated. Finally, the formula of cost is the product of a matrix and an unknown matrix. In order to minimize the cost, this unknown matrix which represent the choice for each car can be solved. After getting the result, the situation that one station will have different capacity, which will allow people to have more option available will be analyzed. Further evaluation of this type of problem will be discussed to analyze why the outcome of the program will all be zero and one.","PeriodicalId":345723,"journal":{"name":"Fifth International Conference on Computer Information Science and Artificial Intelligence","volume":"19 811 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122661140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real-time detection of railway cracks based on improved YOLOX-Nano 基于改进YOLOX-Nano的铁路裂缝实时检测
Chong Du, X. Zao, Xiaoliang Wu
Cracks in the rails will lead to great safety hazards in railway transportation. Aiming at the problems of low detection accuracy and inconspicuous part of cracks in crack detection, an improved model based on YOLOX-Nano is proposed. The SA-NET lightweight combined attention mechanism is added to the model to generate a feature map with channel attention and spatial attention, which strengthens the model's attention to target features and location information. Secondly, use Alpha-CIoU Loss to replace IoU Loss to increase the accuracy of the model's prediction box. The comparison experiment was carried out on the self-built data set, and the mAP of the improved YOLOX-Nano model reached 77.58%, the detection speed reached 42.2FPS, and the calculation amount and parameter amount of the model were only 0.508G and 3.5MB respectively, and the overall performance was better than other models.
钢轨裂缝会给铁路运输带来很大的安全隐患。针对裂纹检测中存在的检测精度低、部分裂纹不明显等问题,提出了一种基于YOLOX-Nano的改进模型。在模型中加入了SA-NET轻量级组合注意机制,生成具有通道注意和空间注意的特征图,增强了模型对目标特征和位置信息的注意。其次,用Alpha-CIoU Loss代替IoU Loss,提高模型预测框的精度。在自建数据集上进行对比实验,改进后的YOLOX-Nano模型mAP达到77.58%,检测速度达到42.2FPS,模型计算量和参数量分别仅为0.508G和3.5MB,整体性能优于其他模型。
{"title":"Real-time detection of railway cracks based on improved YOLOX-Nano","authors":"Chong Du, X. Zao, Xiaoliang Wu","doi":"10.1117/12.2667626","DOIUrl":"https://doi.org/10.1117/12.2667626","url":null,"abstract":"Cracks in the rails will lead to great safety hazards in railway transportation. Aiming at the problems of low detection accuracy and inconspicuous part of cracks in crack detection, an improved model based on YOLOX-Nano is proposed. The SA-NET lightweight combined attention mechanism is added to the model to generate a feature map with channel attention and spatial attention, which strengthens the model's attention to target features and location information. Secondly, use Alpha-CIoU Loss to replace IoU Loss to increase the accuracy of the model's prediction box. The comparison experiment was carried out on the self-built data set, and the mAP of the improved YOLOX-Nano model reached 77.58%, the detection speed reached 42.2FPS, and the calculation amount and parameter amount of the model were only 0.508G and 3.5MB respectively, and the overall performance was better than other models.","PeriodicalId":345723,"journal":{"name":"Fifth International Conference on Computer Information Science and Artificial Intelligence","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121537925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on LSTM multi-factor quantitative stock selection strategy based on attention mechanism 基于注意机制的LSTM多因素定量选股策略研究
Zezhong Li
In this paper, monthly frequency multi-factor data on valuation, momentum, turnover rate and technology of A-share listed companies in Shanghai and Shenzhen markets from January 2012 to July 2022 are selected and input to LSTM and LSTM model with fused attention mechanism respectively for training after data pre-processing. The sector-neutral layered-portfolios and the sector-neutral stock selection portfolios were constructed based on the model output, respectively. In the model evaluation section, it is confirmed that the Attention-LSTM model outperforms the LSTM model in predicting stock ups and downs. The single-factor layered back test under monthly position adjustment and stock selection strategy back test confirmed that the Attention-LSTM model significantly outperformed the LSTM model in terms of annualized return, sharpe ratio, and maximum retracement, and also significantly outperformed the CSI 300 and CSI 500.
本文选取2012年1月至2022年7月沪深两市a股上市公司估值、动量、换手率和技术的月频多因素数据,经过数据预处理后分别输入到LSTM和融合关注机制的LSTM模型中进行训练。基于模型输出,分别构建了行业中性的分层投资组合和行业中性的选股投资组合。在模型评价部分,证实了Attention-LSTM模型在预测股票涨跌方面优于LSTM模型。月度仓位调整下的单因素分层回验和选股策略回验证实,注意-LSTM模型在年化收益率、利率和最大回调方面均显著优于LSTM模型,且显著优于沪深300和沪深500。
{"title":"Research on LSTM multi-factor quantitative stock selection strategy based on attention mechanism","authors":"Zezhong Li","doi":"10.1117/12.2668783","DOIUrl":"https://doi.org/10.1117/12.2668783","url":null,"abstract":"In this paper, monthly frequency multi-factor data on valuation, momentum, turnover rate and technology of A-share listed companies in Shanghai and Shenzhen markets from January 2012 to July 2022 are selected and input to LSTM and LSTM model with fused attention mechanism respectively for training after data pre-processing. The sector-neutral layered-portfolios and the sector-neutral stock selection portfolios were constructed based on the model output, respectively. In the model evaluation section, it is confirmed that the Attention-LSTM model outperforms the LSTM model in predicting stock ups and downs. The single-factor layered back test under monthly position adjustment and stock selection strategy back test confirmed that the Attention-LSTM model significantly outperformed the LSTM model in terms of annualized return, sharpe ratio, and maximum retracement, and also significantly outperformed the CSI 300 and CSI 500.","PeriodicalId":345723,"journal":{"name":"Fifth International Conference on Computer Information Science and Artificial Intelligence","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122112397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blind image super-resolution reconstruction based on dual regression network 基于对偶回归网络的图像超分辨率盲重建
Hongpeng Tian, ShengZhou Jiang
Existing deep learning-based Super Resolution (SR) reconstruction algorithms achieve remarkable performance on images with known degradation. Most of the degradation models exists problems in self-adaptations when facing with the deviation of the degradation model of the image of the real scene, and the effect is not good. Therefore, this paper proposes a blind image super-resolution reconstruction algorithm based on dual regression, which aims to solve the problem of poor performance of super-resolution networks in real scenes. Firstly, the closed-loop network is used to constrain the mapping space, and the optimal reconstruction function is found to improve the network reconstruction performance. Secondly, the attention mechanism is adopted into the residual block of feature extraction to expand the receptive field of the feature map, improve the reuse of features, and strengthen the reconstruction of high-frequency information. Finally, the frequency-domain blur kernel map estimates the down sampling kernel and reconstructs the low-resolution image, adaptively extracts the feature expression, enhances the ability to restore texture details, and reconstructs the real-world image better.
现有的基于深度学习的超分辨率(SR)重建算法在已知退化的图像上取得了显著的性能。大多数退化模型在面对真实场景图像的退化模型偏差时存在自适应问题,效果不佳。因此,本文提出了一种基于对偶回归的盲图像超分辨率重建算法,旨在解决超分辨率网络在真实场景中表现不佳的问题。首先利用闭环网络约束映射空间,寻找最优重构函数,提高网络重构性能;其次,在特征提取的残差块中引入注意机制,扩大特征图的接受域,提高特征的可重用性,加强高频信息的重构;最后,频域模糊核映射估计下采样核重构低分辨率图像,自适应提取特征表达式,增强纹理细节恢复能力,更好地重建真实图像。
{"title":"Blind image super-resolution reconstruction based on dual regression network","authors":"Hongpeng Tian, ShengZhou Jiang","doi":"10.1117/12.2667901","DOIUrl":"https://doi.org/10.1117/12.2667901","url":null,"abstract":"Existing deep learning-based Super Resolution (SR) reconstruction algorithms achieve remarkable performance on images with known degradation. Most of the degradation models exists problems in self-adaptations when facing with the deviation of the degradation model of the image of the real scene, and the effect is not good. Therefore, this paper proposes a blind image super-resolution reconstruction algorithm based on dual regression, which aims to solve the problem of poor performance of super-resolution networks in real scenes. Firstly, the closed-loop network is used to constrain the mapping space, and the optimal reconstruction function is found to improve the network reconstruction performance. Secondly, the attention mechanism is adopted into the residual block of feature extraction to expand the receptive field of the feature map, improve the reuse of features, and strengthen the reconstruction of high-frequency information. Finally, the frequency-domain blur kernel map estimates the down sampling kernel and reconstructs the low-resolution image, adaptively extracts the feature expression, enhances the ability to restore texture details, and reconstructs the real-world image better.","PeriodicalId":345723,"journal":{"name":"Fifth International Conference on Computer Information Science and Artificial Intelligence","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130601094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Wild animal recognition based on effective-class-balanced softmax loss 基于有效类平衡软最大损失的野生动物识别
Wen Chen, Qianzhou Cai, Jin Hou, Jindong Zhang, Bochuan Zheng
Wild animal recognition is important for wild animal protection. Because the number of different wild animals is different in the wild. The wild animal image dataset collected in field by using camera trap is a typical long tail dataset. This paper proposes an Effective-Class-Balanced Softmax Loss (ECBSL) to solve the long tail problem of self-built wild animal dataset. Firstly, a new cross entropy loss function is obtained by using pointwise mutual information instead of conditional probability for modeling. Then the improved effective number of samples calculation method is used to approximately calculate the prior probability distribution of different animal species. Finally, the effectiveness of ECBSL is proved by experiments. Experiments on the self-built wild animal dataset show that the proposed method improves the recognition accuracy of the tail classes and the whole dataset. The comparison experiments with other methods show that the proposed method is superior to other methods.
野生动物识别对野生动物保护具有重要意义。因为不同野生动物的数量在野外是不同的。利用相机陷阱在野外采集的野生动物图像数据集是典型的长尾数据集。针对自建野生动物数据集的长尾问题,提出了一种有效类平衡的Softmax Loss (ECBSL)算法。首先,利用点互信息代替条件概率进行建模,得到新的交叉熵损失函数;然后采用改进的有效样本数计算方法,近似计算不同动物物种的先验概率分布。最后,通过实验验证了ECBSL的有效性。在自建野生动物数据集上的实验表明,该方法提高了尾类和整个数据集的识别精度。与其他方法的对比实验表明,该方法优于其他方法。
{"title":"Wild animal recognition based on effective-class-balanced softmax loss","authors":"Wen Chen, Qianzhou Cai, Jin Hou, Jindong Zhang, Bochuan Zheng","doi":"10.1117/12.2667361","DOIUrl":"https://doi.org/10.1117/12.2667361","url":null,"abstract":"Wild animal recognition is important for wild animal protection. Because the number of different wild animals is different in the wild. The wild animal image dataset collected in field by using camera trap is a typical long tail dataset. This paper proposes an Effective-Class-Balanced Softmax Loss (ECBSL) to solve the long tail problem of self-built wild animal dataset. Firstly, a new cross entropy loss function is obtained by using pointwise mutual information instead of conditional probability for modeling. Then the improved effective number of samples calculation method is used to approximately calculate the prior probability distribution of different animal species. Finally, the effectiveness of ECBSL is proved by experiments. Experiments on the self-built wild animal dataset show that the proposed method improves the recognition accuracy of the tail classes and the whole dataset. The comparison experiments with other methods show that the proposed method is superior to other methods.","PeriodicalId":345723,"journal":{"name":"Fifth International Conference on Computer Information Science and Artificial Intelligence","volume":"14 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120864916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Taxi destination prediction based on LSTM with tree memory module 基于树形记忆模块LSTM的出租车目的地预测
Dan Song, Yadong Li, Meng-Yun Zhang, Ting Zhang
Taxi destination prediction can grasp the flow direction of the taxi, facilitate the taxi dispatches. There has always been a long-term dependency problem in taxi trajectory prediction. Although LSTM can solve the long-term dependency problem to a certain extent, it does not have a good ability to deal with the deep correlation between long trajectory sequences. To address the above problem, we propose a taxi destination prediction method based on LSTM with Tree Memory Module (TMM-LSTM). TMM-LSTM stores the state of the input trajectory through an external memory structure. It uses a tree structure to process more historical information and better deal with the long-term relationship between trajectory points. TMM-LSTM can better solve the long-term dependency problem in the taxi trajectory sequence. Experiments demonstrate that the average error distance is 6% lower than traditional LSTM model.
出租车目的地预测可以掌握出租车的流向,方便出租车调度。滑行轨迹预测一直存在长期依赖问题。虽然LSTM可以在一定程度上解决长期依赖问题,但对于长轨迹序列之间的深度相关处理能力不强。为了解决上述问题,我们提出了一种基于树记忆模块LSTM (TMM-LSTM)的出租车目的地预测方法。TMM-LSTM通过外部存储结构存储输入轨迹的状态。它采用树形结构来处理更多的历史信息,更好地处理轨迹点之间的长期关系。TMM-LSTM能较好地解决滑行轨迹序列的长期依赖问题。实验表明,该模型的平均误差距离比传统LSTM模型小6%。
{"title":"Taxi destination prediction based on LSTM with tree memory module","authors":"Dan Song, Yadong Li, Meng-Yun Zhang, Ting Zhang","doi":"10.1117/12.2667488","DOIUrl":"https://doi.org/10.1117/12.2667488","url":null,"abstract":"Taxi destination prediction can grasp the flow direction of the taxi, facilitate the taxi dispatches. There has always been a long-term dependency problem in taxi trajectory prediction. Although LSTM can solve the long-term dependency problem to a certain extent, it does not have a good ability to deal with the deep correlation between long trajectory sequences. To address the above problem, we propose a taxi destination prediction method based on LSTM with Tree Memory Module (TMM-LSTM). TMM-LSTM stores the state of the input trajectory through an external memory structure. It uses a tree structure to process more historical information and better deal with the long-term relationship between trajectory points. TMM-LSTM can better solve the long-term dependency problem in the taxi trajectory sequence. Experiments demonstrate that the average error distance is 6% lower than traditional LSTM model.","PeriodicalId":345723,"journal":{"name":"Fifth International Conference on Computer Information Science and Artificial Intelligence","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123093476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on the main elements of mimic platforms 模拟平台主要组成部分的研究
Bo Zhang, Zesheng Xi, Yu-Na Wang, Chuan He
Cyber Mimic Defense (CMD) is a new generation of active defense technology after firewall, intrusion and other traditional defense technology. It aims to deal with uncertain threats in the network environment with visual uncertainty. This paper briefly introduces the architecture and principle of CMD and defines four main elements of the current simulation platform: system architecture, heterogeneous policy, scheduling policy and voting policy. Combined with examples, the four elements are respectively summarized. The system architecture is divided into C mode and D mode, and the heterogeneous strategy includes implementation mode, implementation method and synchronization mode. Scheduling policies are classified into offline policies and online policies. Voting policies include voting algorithms, voting levels, and delay control.
网络模拟防御(CMD)是继防火墙、入侵等传统防御技术之后的新一代主动防御技术。它旨在处理具有视觉不确定性的网络环境中的不确定威胁。本文简要介绍了CMD的体系结构和原理,并定义了当前仿真平台的四个主要元素:系统架构、异构策略、调度策略和投票策略。结合实例,分别总结了这四个要素。系统架构分为C模式和D模式,异构策略包括实现模式、实现方法和同步模式。调度策略分为离线策略和在线策略。投票策略包括投票算法、投票级别和延迟控制。
{"title":"Research on the main elements of mimic platforms","authors":"Bo Zhang, Zesheng Xi, Yu-Na Wang, Chuan He","doi":"10.1117/12.2667434","DOIUrl":"https://doi.org/10.1117/12.2667434","url":null,"abstract":"Cyber Mimic Defense (CMD) is a new generation of active defense technology after firewall, intrusion and other traditional defense technology. It aims to deal with uncertain threats in the network environment with visual uncertainty. This paper briefly introduces the architecture and principle of CMD and defines four main elements of the current simulation platform: system architecture, heterogeneous policy, scheduling policy and voting policy. Combined with examples, the four elements are respectively summarized. The system architecture is divided into C mode and D mode, and the heterogeneous strategy includes implementation mode, implementation method and synchronization mode. Scheduling policies are classified into offline policies and online policies. Voting policies include voting algorithms, voting levels, and delay control.","PeriodicalId":345723,"journal":{"name":"Fifth International Conference on Computer Information Science and Artificial Intelligence","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115077599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-site air quality prediction based on graph convolutional neural network-bi-directional LSTM model 基于图卷积神经网络双向LSTM模型的多站点空气质量预测
Lalao Gao, MingChao Liao, Di Zhang
To address the current problem of single-site prediction and inadequate extraction of spatial features for PM2.5 hourly concentration prediction, a graphical convolutional neural network (GCN) is proposed to obtain the spatial correlation between PM2.5 monitoring stations in Beijing by considering the features of time series in time and space, and assign weights according to the distance between stations to abstract into an undirected topological map. The missing data sequences are complemented by using a long and short-term memory network to extract temporal features on the time-series dataset, which are normalized and then fused with the components extracted by the GCN to make predictions. The experimental results show that GCN-BiLSTM has higher prediction accuracy and better results than single RNN, LSTM, and BiLSTM algorithms.
针对目前PM2.5逐时浓度预测中存在的单站点预测和空间特征提取不足的问题,提出了一种图形卷积神经网络(GCN),通过考虑时间序列在时间和空间上的特征,获取北京市PM2.5监测站之间的空间相关性,并根据站点之间的距离分配权重,抽象成无向拓扑地图。利用长、短时记忆网络对缺失数据序列进行补全,提取时间序列数据集的时间特征,将时间特征归一化后与GCN提取的分量融合进行预测。实验结果表明,与单一RNN、LSTM和BiLSTM算法相比,GCN-BiLSTM具有更高的预测精度和更好的预测效果。
{"title":"Multi-site air quality prediction based on graph convolutional neural network-bi-directional LSTM model","authors":"Lalao Gao, MingChao Liao, Di Zhang","doi":"10.1117/12.2667705","DOIUrl":"https://doi.org/10.1117/12.2667705","url":null,"abstract":"To address the current problem of single-site prediction and inadequate extraction of spatial features for PM2.5 hourly concentration prediction, a graphical convolutional neural network (GCN) is proposed to obtain the spatial correlation between PM2.5 monitoring stations in Beijing by considering the features of time series in time and space, and assign weights according to the distance between stations to abstract into an undirected topological map. The missing data sequences are complemented by using a long and short-term memory network to extract temporal features on the time-series dataset, which are normalized and then fused with the components extracted by the GCN to make predictions. The experimental results show that GCN-BiLSTM has higher prediction accuracy and better results than single RNN, LSTM, and BiLSTM algorithms.","PeriodicalId":345723,"journal":{"name":"Fifth International Conference on Computer Information Science and Artificial Intelligence","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125740697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Fifth International Conference on Computer Information Science and Artificial Intelligence
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1