首页 > 最新文献

2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)最新文献

英文 中文
Deep Learning Approach for COVID-19 Identification COVID-19识别的深度学习方法
Amin Ul Haq, J. Li, R. U. Khan, C. Mawuli, B. L. Y. Agbley, Mordecai F. Raj, Wang Zhou, Jalaluddin Khan, Abdul Haq, Abdus Saboor, Faiza Habib, Zafar Khan
Accurate diagnostic system is significantly important for timely COVID-19 identification. Diagnosing COVID-19 from chest x-ray images employing the CNN model is recommended for accurate recognition of COVID-19. The existing diagnosis techniques of COVID-19 still lack high accuracy. To handle this problem in this work, we have proposed accurate detection method for COVID-19. In the proposed method, a CNN is incorporated for the diagnosis of COVID-19 using chest x-ray images data. The experimental results illustrate that our technique is good for COVID-19 accurate diagnosis and can be easily implemented in health care systems.
准确的诊断系统对于及时识别COVID-19至关重要。为了准确识别COVID-19,建议使用CNN模型从胸部x线图像中诊断COVID-19。现有的新冠肺炎诊断技术仍缺乏较高的准确性。针对这一问题,我们提出了精准的COVID-19检测方法。在该方法中,利用胸部x线图像数据将CNN纳入COVID-19的诊断中。实验结果表明,我们的技术可以很好地准确诊断COVID-19,并且可以很容易地在卫生保健系统中实施。
{"title":"Deep Learning Approach for COVID-19 Identification","authors":"Amin Ul Haq, J. Li, R. U. Khan, C. Mawuli, B. L. Y. Agbley, Mordecai F. Raj, Wang Zhou, Jalaluddin Khan, Abdul Haq, Abdus Saboor, Faiza Habib, Zafar Khan","doi":"10.1109/ICCWAMTIP53232.2021.9674079","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674079","url":null,"abstract":"Accurate diagnostic system is significantly important for timely COVID-19 identification. Diagnosing COVID-19 from chest x-ray images employing the CNN model is recommended for accurate recognition of COVID-19. The existing diagnosis techniques of COVID-19 still lack high accuracy. To handle this problem in this work, we have proposed accurate detection method for COVID-19. In the proposed method, a CNN is incorporated for the diagnosis of COVID-19 using chest x-ray images data. The experimental results illustrate that our technique is good for COVID-19 accurate diagnosis and can be easily implemented in health care systems.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127167141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Positioning Optimization Approach Towards UWB 一种新的超宽带定位优化方法
T. Yi, Li Min, Zhou Yinghai, Tang Dingyong, Wen Zepeng, YunChang Cheng
This paper studies the optimization algorithm for Ultra Wide Band(UWB) high-precision positioning technology. By observing and analyzing the characteristics of the measurement data set in the real experimental scene, we study the data fluctuation characteristics under signal interference, and make it clear that the UWB precise positioning problem under signal interference belongs to a typical error optimization problem. To solve this problem, we first use an anomaly detection algorithm and clustering algorithm to clean the experimental data set and retain more effective data features. For the optimization algorithm of precise positioning, our innovation is to give priority to the study of the spatial coordinate conversion formula with more physical meaning and the numerical distribution characteristics of various offset differences, and establish an optimization algorithm to achieve centimeter accuracy by using only one offset to correct the original distance.
研究了超宽带(UWB)高精度定位技术的优化算法。通过对真实实验场景下测量数据集特性的观察和分析,研究信号干扰下的数据波动特性,明确信号干扰下的UWB精确定位问题属于典型的误差优化问题。为了解决这个问题,我们首先使用异常检测算法和聚类算法来清理实验数据集,保留更多有效的数据特征。对于精确定位的优化算法,我们的创新点在于重点研究更具有物理意义的空间坐标转换公式和各种偏移量差异的数值分布特征,建立一种仅用一个偏移量对原始距离进行校正就能达到厘米级精度的优化算法。
{"title":"A Novel Positioning Optimization Approach Towards UWB","authors":"T. Yi, Li Min, Zhou Yinghai, Tang Dingyong, Wen Zepeng, YunChang Cheng","doi":"10.1109/ICCWAMTIP53232.2021.9674130","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674130","url":null,"abstract":"This paper studies the optimization algorithm for Ultra Wide Band(UWB) high-precision positioning technology. By observing and analyzing the characteristics of the measurement data set in the real experimental scene, we study the data fluctuation characteristics under signal interference, and make it clear that the UWB precise positioning problem under signal interference belongs to a typical error optimization problem. To solve this problem, we first use an anomaly detection algorithm and clustering algorithm to clean the experimental data set and retain more effective data features. For the optimization algorithm of precise positioning, our innovation is to give priority to the study of the spatial coordinate conversion formula with more physical meaning and the numerical distribution characteristics of various offset differences, and establish an optimization algorithm to achieve centimeter accuracy by using only one offset to correct the original distance.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123680737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Adam Optimized Pruning Method for Few-Shot Learning with GAN Data Augmentation 基于GAN数据增强的少镜头学习Adam优化剪枝方法
Shi Qirui, Chen Hongle, Chen Juan, Wen Quan
Weight pruning is widely used for model compression and acceleration. In this work, a novel Adam optimization method for few-shot learning with GAN data augmentation is proposed. The first-order Taylor series is implemented to evaluate parameters' importance toward the loss function. And with the given compression ratio, parameters with importance above the threshold are updated by the Adam optimizer with momentum-accelerated weight decay, while others have negative updates as the penalization. After continuous iterations, the model enables to achieve corresponding sparsity ratio, with the influence of the redundant parameters reducing to a low extent. Experiments demonstrate that this method is effective on ResNet with CUB and ISIC-2018 datasets. Note that CUB and ISIC-2018 are datasets about birds and skin deceases, respectively, which represents the generalization of our method on cross-domain classification issues. As a result, the pruned model is able to retain the accuracy with high model sparse ratios. And in some specific compress ratio, like 10× for CUB dataset and 3 × for ISIC-2018 dataset, the pruned model even outperforms the origin model by 3.15% and 1.16%, respectively.
权值剪枝被广泛用于模型压缩和加速。本文提出了一种新的基于GAN数据增强的少镜头学习的Adam优化方法。采用一阶泰勒级数来评价参数对损失函数的重要性。在给定压缩比的情况下,重要性大于阈值的参数由Adam优化器以动量加速的权值衰减更新,而其他参数则以负更新作为惩罚。经过连续迭代,模型能够达到相应的稀疏度比,冗余参数的影响降低到较低程度。实验表明,该方法在具有CUB和ISIC-2018数据集的ResNet上是有效的。请注意,CUB和ISIC-2018分别是关于鸟类和皮肤死亡的数据集,这代表了我们的方法在跨域分类问题上的泛化。结果表明,在模型稀疏率较高的情况下,剪枝后的模型仍能保持精度。在某些特定的压缩比下,如CUB数据集的10倍和ISIC-2018数据集的3倍,修剪后的模型甚至比原始模型分别高出3.15%和1.16%。
{"title":"Adam Optimized Pruning Method for Few-Shot Learning with GAN Data Augmentation","authors":"Shi Qirui, Chen Hongle, Chen Juan, Wen Quan","doi":"10.1109/ICCWAMTIP53232.2021.9674082","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674082","url":null,"abstract":"Weight pruning is widely used for model compression and acceleration. In this work, a novel Adam optimization method for few-shot learning with GAN data augmentation is proposed. The first-order Taylor series is implemented to evaluate parameters' importance toward the loss function. And with the given compression ratio, parameters with importance above the threshold are updated by the Adam optimizer with momentum-accelerated weight decay, while others have negative updates as the penalization. After continuous iterations, the model enables to achieve corresponding sparsity ratio, with the influence of the redundant parameters reducing to a low extent. Experiments demonstrate that this method is effective on ResNet with CUB and ISIC-2018 datasets. Note that CUB and ISIC-2018 are datasets about birds and skin deceases, respectively, which represents the generalization of our method on cross-domain classification issues. As a result, the pruned model is able to retain the accuracy with high model sparse ratios. And in some specific compress ratio, like 10× for CUB dataset and 3 × for ISIC-2018 dataset, the pruned model even outperforms the origin model by 3.15% and 1.16%, respectively.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116579268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multi-Traffic Features Network Intrusion Detection Algorithm Based on C4.5 基于C4.5的多流量特征网络入侵检测算法
Jingwen Zhou, Xinnan Jiang, Changan Liu, Jing Zhang, Lingling Liao, Jiazhong Lu
With more and more network attacks on the Internet, this article uses the C4.5 decision tree classification algorithm to detect 7 types of network attacks from the perspective of network traffic. Firstly, the data is preprocessed, then extract 62 features, finally use our proposed C4.5 divided algorithm for traffic detection. This experiment uses the public data set CSE-CIC-IDS2018 for verification. The experimental results show that the method in this article can effectively detect different types of cyber attacks. The accuracy rate can reach 96.7%, and the false positive rate is only 4.5%.
随着互联网上的网络攻击越来越多,本文采用C4.5决策树分类算法,从网络流量的角度对7种网络攻击进行检测。首先对数据进行预处理,提取出62个特征,最后采用本文提出的C4.5分割算法进行流量检测。本实验使用公共数据集CSE-CIC-IDS2018进行验证。实验结果表明,本文方法能够有效检测不同类型的网络攻击。准确率可达96.7%,假阳性率仅为4.5%。
{"title":"Multi-Traffic Features Network Intrusion Detection Algorithm Based on C4.5","authors":"Jingwen Zhou, Xinnan Jiang, Changan Liu, Jing Zhang, Lingling Liao, Jiazhong Lu","doi":"10.1109/ICCWAMTIP53232.2021.9674129","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674129","url":null,"abstract":"With more and more network attacks on the Internet, this article uses the C4.5 decision tree classification algorithm to detect 7 types of network attacks from the perspective of network traffic. Firstly, the data is preprocessed, then extract 62 features, finally use our proposed C4.5 divided algorithm for traffic detection. This experiment uses the public data set CSE-CIC-IDS2018 for verification. The experimental results show that the method in this article can effectively detect different types of cyber attacks. The accuracy rate can reach 96.7%, and the false positive rate is only 4.5%.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129567806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research On Edge Camber Detection Method Of Hot Rolled Steel Based On Hough Transform 基于霍夫变换的热轧钢边缘弧度检测方法研究
B. Junjie, Zhou Taoqi, Cai Jianfneg, Gao Shuai, Li Jiajie, Bai Junbo
The edge camber detection of hot rolled steel mainly depends on human eyes and sensors, but its accuracy is unsatisfactory and there is a certain delay. Therefore, the scheme of using machine vision to detect the bending of hot rolled steel was explored in this paper. Based on the practical engineering problems of hot-rolled plate bending detection, aiming at improving the imaging identification, effectiveness and industrial applicability, an identification method and some key technologies of edge camber detection image were explored in tins paper. Combined with the real hot-rolled steel bending image, the operators of Gaussian, Sobel and Laplace, and Hough transform were used for image preprocessing and line detection respectively. After defining the bending coefficient, the plate bending degree was divided into five grades. And the experiment shows that the machine vision method explored in this paper can accurately judge whether the hot-rolled steel is bent and grade the bending degree.
热轧钢板边缘弧度检测主要依靠人眼和传感器,但其精度不理想,存在一定的延迟。因此,本文探索了利用机器视觉检测热轧钢板弯曲的方案。基于热轧板弯曲检测的实际工程问题,以提高图像识别、有效性和工业适用性为目标,对边缘弯曲检测图像的识别方法及关键技术进行了探讨。结合实际热轧钢弯曲图像,分别采用高斯算子、索贝尔拉普拉斯算子和霍夫变换算子对图像进行预处理和线检测。在确定弯曲系数后,将板的弯曲程度分为五个等级。实验表明,本文所探索的机器视觉方法能够准确判断热轧钢是否弯曲,并对弯曲程度进行分级。
{"title":"Research On Edge Camber Detection Method Of Hot Rolled Steel Based On Hough Transform","authors":"B. Junjie, Zhou Taoqi, Cai Jianfneg, Gao Shuai, Li Jiajie, Bai Junbo","doi":"10.1109/ICCWAMTIP53232.2021.9674156","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674156","url":null,"abstract":"The edge camber detection of hot rolled steel mainly depends on human eyes and sensors, but its accuracy is unsatisfactory and there is a certain delay. Therefore, the scheme of using machine vision to detect the bending of hot rolled steel was explored in this paper. Based on the practical engineering problems of hot-rolled plate bending detection, aiming at improving the imaging identification, effectiveness and industrial applicability, an identification method and some key technologies of edge camber detection image were explored in tins paper. Combined with the real hot-rolled steel bending image, the operators of Gaussian, Sobel and Laplace, and Hough transform were used for image preprocessing and line detection respectively. After defining the bending coefficient, the plate bending degree was divided into five grades. And the experiment shows that the machine vision method explored in this paper can accurately judge whether the hot-rolled steel is bent and grade the bending degree.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128357847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimized Distributed Linear Block Codes For Single Relay Cooperative Wireless Communications 单中继协同无线通信的优化分布式线性分组码
Gershon Rodor, Yang Fengfan, Stephen Nkyi, Harit Rijal, Enoch Opanin Gyamfi
Cooperative communication strategies have long been touted as a solution to increase performance in wireless networks. We propose a simple form of coded cooperation using block codes and optimized selection at the relay node in this paper. The optimized distributed linear block codes for single relay cooperative technique enhances the performance by extending the maximum free distance of the overall code. MATLAB simulations proved that the proposed scheme outperforms the sub-optimal cooperation where there is no optimized selection at the relay node.
长期以来,协作通信策略一直被吹捧为提高无线网络性能的解决方案。本文提出了一种采用分组编码和中继节点优化选择的简单编码合作形式。优化后的分布式线性分组码通过扩展整体码的最大自由距离来提高单中继协作技术的性能。MATLAB仿真结果表明,该方案优于中继节点无优化选择的次优协作方案。
{"title":"Optimized Distributed Linear Block Codes For Single Relay Cooperative Wireless Communications","authors":"Gershon Rodor, Yang Fengfan, Stephen Nkyi, Harit Rijal, Enoch Opanin Gyamfi","doi":"10.1109/ICCWAMTIP53232.2021.9673710","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9673710","url":null,"abstract":"Cooperative communication strategies have long been touted as a solution to increase performance in wireless networks. We propose a simple form of coded cooperation using block codes and optimized selection at the relay node in this paper. The optimized distributed linear block codes for single relay cooperative technique enhances the performance by extending the maximum free distance of the overall code. MATLAB simulations proved that the proposed scheme outperforms the sub-optimal cooperation where there is no optimized selection at the relay node.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123836584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Intrusion Detection Technology Based on Embedded Ethernet 基于嵌入式以太网的入侵检测技术研究
Zhou Zihan, Chen Lirong, Zhang Haitao, Z. Fan
With the development of intelligent connected vehicles, in-vehicle Ethernet technologies are more and more commonly applied in automotive industry, such that cybersecurity related problems of in-vehicle Ethernet are becoming more and more obvious and should not be ignored. This paper studies an embedded intrusion detection technology for in-vehicle Ethernet. Based on rule matching a new binary rule format is designed, which can be converted with the current mainstream Snort/Suricata rule set. This technology is applied to our intrusion detection system ETH-IDS, which is a vehicle-oriented embedded Ethernet intrusion detection system and completely compliant with related AUTOSAR specifications. A multi-level comprehensive evaluation model is also proposed in the embedded environment to take the quantitative evaluation for intrusion detection systems. Related experiments are carried out in an automotive embedded environment, and the performance advantages of ETH-IDS are verified compared with Suricata. Meanwhile, the validity of the evaluation model is also verified.
随着智能网联汽车的发展,车载以太网技术在汽车行业的应用越来越普遍,车载以太网的网络安全问题也越来越明显,不容忽视。研究了一种车载以太网的嵌入式入侵检测技术。基于规则匹配,设计了一种新的二进制规则格式,该格式可以与当前主流的Snort/Suricata规则集进行转换。该技术应用于我们的入侵检测系统ETH-IDS,该系统是一款面向车载的嵌入式以太网入侵检测系统,完全符合AUTOSAR相关规范。提出了一种嵌入式环境下的多层次综合评价模型,对入侵检测系统进行定量评价。在汽车嵌入式环境中进行了相关实验,并与Suricata进行了对比,验证了ETH-IDS的性能优势。同时,也验证了评价模型的有效性。
{"title":"Research on Intrusion Detection Technology Based on Embedded Ethernet","authors":"Zhou Zihan, Chen Lirong, Zhang Haitao, Z. Fan","doi":"10.1109/ICCWAMTIP53232.2021.9674069","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674069","url":null,"abstract":"With the development of intelligent connected vehicles, in-vehicle Ethernet technologies are more and more commonly applied in automotive industry, such that cybersecurity related problems of in-vehicle Ethernet are becoming more and more obvious and should not be ignored. This paper studies an embedded intrusion detection technology for in-vehicle Ethernet. Based on rule matching a new binary rule format is designed, which can be converted with the current mainstream Snort/Suricata rule set. This technology is applied to our intrusion detection system ETH-IDS, which is a vehicle-oriented embedded Ethernet intrusion detection system and completely compliant with related AUTOSAR specifications. A multi-level comprehensive evaluation model is also proposed in the embedded environment to take the quantitative evaluation for intrusion detection systems. Related experiments are carried out in an automotive embedded environment, and the performance advantages of ETH-IDS are verified compared with Suricata. Meanwhile, the validity of the evaluation model is also verified.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121392865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Text Mining A Decade Of Focal Development Trends In An African Country 文本挖掘:一个非洲国家十年的重点发展趋势
Opoku-Mensah Nelson, Qin Zhiguang, Gyamfi Enoch Opanin, Danso Juliana Mantebea, Nyame Gabriel
This paper identified the emerging developmental trends of Ghana, an African country, based on online and offline textual, video and audio data sources from 2008 to 2018. In all, about 9,501 text files were collected and where needed, transcribed from these sources and content analyzed by series of text mining processes to bring out the convention for all the combined years. Topic modeling was the main adopted text mining technique. We initiated the topic modeling with the term frequency approach. The results from the mining processes were conceptually presented in relative frequency table and visually summarized as word clouds to map meaningful findings that were logically and humanly understandable. Through this approach, 45 major developmental themes emerged of which education seems to be the most frequently discussed trend in Ghanaian politics and government. In conclusion governments can detect developmental layouts from textual data.
基于2008 - 2018年在线和离线文本、视频和音频数据源,本文确定了非洲国家加纳的新兴发展趋势。总共收集了大约9501个文本文件,在需要的地方,从这些来源转录并通过一系列文本挖掘过程对内容进行分析,以得出所有年份的惯例。主题建模是主要采用的文本挖掘技术。我们开始使用术语频率方法进行主题建模。挖掘过程的结果在概念上以相对频率表的形式呈现,并在视觉上总结为词云,以映射逻辑上和人类可理解的有意义的发现。通过这种方法,出现了45个主要的发展主题,其中教育似乎是加纳政治和政府中最常讨论的趋势。总之,政府可以从文本数据中发现发展布局。
{"title":"Text Mining A Decade Of Focal Development Trends In An African Country","authors":"Opoku-Mensah Nelson, Qin Zhiguang, Gyamfi Enoch Opanin, Danso Juliana Mantebea, Nyame Gabriel","doi":"10.1109/ICCWAMTIP53232.2021.9674166","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674166","url":null,"abstract":"This paper identified the emerging developmental trends of Ghana, an African country, based on online and offline textual, video and audio data sources from 2008 to 2018. In all, about 9,501 text files were collected and where needed, transcribed from these sources and content analyzed by series of text mining processes to bring out the convention for all the combined years. Topic modeling was the main adopted text mining technique. We initiated the topic modeling with the term frequency approach. The results from the mining processes were conceptually presented in relative frequency table and visually summarized as word clouds to map meaningful findings that were logically and humanly understandable. Through this approach, 45 major developmental themes emerged of which education seems to be the most frequently discussed trend in Ghanaian politics and government. In conclusion governments can detect developmental layouts from textual data.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115850025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Side-Information for Unsupervised Cluster Ensemble 一种新的无监督聚类集成侧信息
Mustafa R. Kadhim, WEN-HONG Tian, Guangyao Zhou, Tahseen Khan
Many clustering and cluster ensemble models have been proposed recently and have not addressed two concerns; when a single model is executed multiple times on a dataset, it predicts various labels for each data object; however, these various labels have a small correctness ratio due to the randomness in generating values in each implementation. Further, detecting which the correct label from these diverse answers is complicated, specifically when the unsupervised model works on a real-world application and needs to deliver a single correct label to the user. In this work considered these two issues by proposing a novel unsupervised constraints termed Inherited Constraints (IC) that behaves as semi-supervised constraints generation. Moreover, execute the IC needs a cluster model to utilize; thus, we proposed an unsupervised cluster ensemble model by integrating the Density Peaks cluster ensemble framework (DPE) and IC to improve the performance. This model is termed DPEIC. Further, we proposed a model termed Answer Settlements (AS) to detect a single correct label for each data object from the diverse answers obtained by DPEIC after utilized multiple times to consider the most duplicated labels as the correct ones. We compare DPEIC-AS with several state-of-the-arts to validate the strengths of this work. The experimental results indicate that DPEIC-AS outperforms the compared models at a different rate, ranging from 3% to 93%. Also, The AS assisted two state-of-the-arts methods to detect the correct labels with the highest possibilities from diverse answers.
最近提出了许多聚类和聚类集成模型,但没有解决两个问题;当一个模型在一个数据集上多次执行时,它会预测每个数据对象的各种标签;然而,由于在每个实现中生成值的随机性,这些不同的标签具有很小的正确率。此外,从这些不同的答案中检测哪个是正确的标签是复杂的,特别是当无监督模型在实际应用程序中工作并需要向用户提供单个正确的标签时。本文通过提出一种称为继承约束(IC)的新型无监督约束来考虑这两个问题,该约束的行为类似于半监督约束生成。此外,执行集成电路需要一个集群模型来利用;为此,我们提出了一种将密度峰聚类集成框架(DPE)和集成电路(IC)相结合的无监督聚类集成模型来提高性能。这个模型被称为DPEIC。在此基础上,我们提出了一种名为Answer Settlements (AS)的模型,该模型从DPEIC多次使用后得到的不同答案中为每个数据对象检测一个正确的标签,并将重复次数最多的标签视为正确的标签。我们将DPEIC-AS与几种最先进的技术进行比较,以验证这项工作的优势。实验结果表明,DPEIC-AS在不同程度上优于所比较的模型,从3%到93%不等。此外,AS协助两种最先进的方法从不同的答案中检测出可能性最大的正确标签。
{"title":"A Novel Side-Information for Unsupervised Cluster Ensemble","authors":"Mustafa R. Kadhim, WEN-HONG Tian, Guangyao Zhou, Tahseen Khan","doi":"10.1109/ICCWAMTIP53232.2021.9674113","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674113","url":null,"abstract":"Many clustering and cluster ensemble models have been proposed recently and have not addressed two concerns; when a single model is executed multiple times on a dataset, it predicts various labels for each data object; however, these various labels have a small correctness ratio due to the randomness in generating values in each implementation. Further, detecting which the correct label from these diverse answers is complicated, specifically when the unsupervised model works on a real-world application and needs to deliver a single correct label to the user. In this work considered these two issues by proposing a novel unsupervised constraints termed Inherited Constraints (IC) that behaves as semi-supervised constraints generation. Moreover, execute the IC needs a cluster model to utilize; thus, we proposed an unsupervised cluster ensemble model by integrating the Density Peaks cluster ensemble framework (DPE) and IC to improve the performance. This model is termed DPEIC. Further, we proposed a model termed Answer Settlements (AS) to detect a single correct label for each data object from the diverse answers obtained by DPEIC after utilized multiple times to consider the most duplicated labels as the correct ones. We compare DPEIC-AS with several state-of-the-arts to validate the strengths of this work. The experimental results indicate that DPEIC-AS outperforms the compared models at a different rate, ranging from 3% to 93%. Also, The AS assisted two state-of-the-arts methods to detect the correct labels with the highest possibilities from diverse answers.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133830738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SRM-FPN: A Small Target Detection Method Based on FPN Optimized Feature SRM-FPN:基于FPN优化特征的小目标检测方法
Di Liu, Fei Cheng
With the development of network detection models, researchers have achieved good results in general target detection, but there is still no good solution for small target detection in images, especially the feature processing of small targets. At present, the most suitable feature processing method is FPN, but this fusion method will cause the feature redundancy, ambiguity and inaccuracy of small targets, and has little effect on the general large targets, but it will cause great interference and errors in the detection of small targets. For the above problems, this paper improves FPN and proposes a new SRM-FPN feature fusion method. Specifically, SRM is a spatial refinement model that learns the location of future feature points according to the context features between adjacent layers and content, while borrowing the adaptive channel merging method of the attention mechanism to optimize feature fusion. Compared with other methods, the optimized scheme combined with the existing model can effectively improve the detection effect of small targets in the image.
随着网络检测模型的发展,研究人员在一般目标检测方面已经取得了很好的效果,但是对于图像中的小目标检测,特别是小目标的特征处理,目前还没有很好的解决方案。目前,最适合的特征处理方法是FPN,但这种融合方法会造成小目标的特征冗余、模糊和不准确,对一般的大目标影响不大,但对小目标的检测会造成很大的干扰和误差。针对上述问题,本文对FPN进行了改进,提出了一种新的SRM-FPN特征融合方法。具体来说,SRM是一种空间细化模型,根据相邻层和内容之间的上下文特征学习未来特征点的位置,同时借鉴注意机制的自适应信道合并方法对特征融合进行优化。与其他方法相比,结合现有模型的优化方案可以有效提高图像中小目标的检测效果。
{"title":"SRM-FPN: A Small Target Detection Method Based on FPN Optimized Feature","authors":"Di Liu, Fei Cheng","doi":"10.1109/ICCWAMTIP53232.2021.9674107","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674107","url":null,"abstract":"With the development of network detection models, researchers have achieved good results in general target detection, but there is still no good solution for small target detection in images, especially the feature processing of small targets. At present, the most suitable feature processing method is FPN, but this fusion method will cause the feature redundancy, ambiguity and inaccuracy of small targets, and has little effect on the general large targets, but it will cause great interference and errors in the detection of small targets. For the above problems, this paper improves FPN and proposes a new SRM-FPN feature fusion method. Specifically, SRM is a spatial refinement model that learns the location of future feature points according to the context features between adjacent layers and content, while borrowing the adaptive channel merging method of the attention mechanism to optimize feature fusion. Compared with other methods, the optimized scheme combined with the existing model can effectively improve the detection effect of small targets in the image.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134329483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1