首页 > 最新文献

2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)最新文献

英文 中文
RF Fingerprint Recognition Based On Spectrum Waterfall Diagram 基于频谱瀑布图的射频指纹识别
Di Liu, Mengjuan Wang, Hao Wang
RF fingerprint technology has received great attention and research due to its security and operability. Early research on radio frequency fingerprints mainly revolved around transient signals, and transient characteristics are currently the most mature research category. With the development of wireless communication technology, the existing radio frequency fingerprint identification technology has gradually been unable to meet practical needs. In recent years, with the rapid development of image recognition technology, some scholars have proposed to apply image recognition technology to RF fingerprint identification, thereby converting radio signal recognition problems into image recognition target detection problems, and making full use of advanced image recognition technology to improve equipment recognition accuracy. This paper proposes to convert the original I/Q signal into a spectrum waterfall diagram and input it into the image recognition model for training and recognition. The experimental results show that this method can effectively improve the accuracy of RF fingerprint recognition.
射频指纹技术以其安全性和可操作性受到了广泛的关注和研究。早期对射频指纹的研究主要围绕瞬态信号展开,瞬态特征是目前研究最成熟的范畴。随着无线通信技术的发展,现有的射频指纹识别技术已经逐渐不能满足实际需要。近年来,随着图像识别技术的快速发展,有学者提出将图像识别技术应用于射频指纹识别,从而将无线电信号识别问题转化为图像识别目标检测问题,充分利用先进的图像识别技术,提高设备识别精度。本文提出将原始I/Q信号转换成频谱瀑布图,输入到图像识别模型中进行训练和识别。实验结果表明,该方法能有效提高射频指纹识别的准确率。
{"title":"RF Fingerprint Recognition Based On Spectrum Waterfall Diagram","authors":"Di Liu, Mengjuan Wang, Hao Wang","doi":"10.1109/ICCWAMTIP53232.2021.9674155","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674155","url":null,"abstract":"RF fingerprint technology has received great attention and research due to its security and operability. Early research on radio frequency fingerprints mainly revolved around transient signals, and transient characteristics are currently the most mature research category. With the development of wireless communication technology, the existing radio frequency fingerprint identification technology has gradually been unable to meet practical needs. In recent years, with the rapid development of image recognition technology, some scholars have proposed to apply image recognition technology to RF fingerprint identification, thereby converting radio signal recognition problems into image recognition target detection problems, and making full use of advanced image recognition technology to improve equipment recognition accuracy. This paper proposes to convert the original I/Q signal into a spectrum waterfall diagram and input it into the image recognition model for training and recognition. The experimental results show that this method can effectively improve the accuracy of RF fingerprint recognition.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131303662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Efficient Access Control Framework For Service-Oriented Architecture of Vehicle 面向服务的车辆结构的高效访问控制框架
Liao Ruikun, Zhang Haitao, Li Yun, Chen Lirong, Zhang Qi
The static interaction method in automobile is difficult to solve the communication requirements of emerging technologies such as Advanced Driving Assistance System (ADAS) and Over-The-Air Technology (OTA). With the development of intelligence, automobiles will occupy an important position in the Internet of Things in the future. Therefore, they need to have the characteristics of openness, connectivity and self-evolution. Further, the design of Service-Oriented Architecture (SOA) is gradually introduced to provide more flexible communication and service call for the Internet of Vehicles. In traditional in-vehicle communication such as the CAN bus, a variety of security and safety mechanisms are adopted to protect the information and functional safety of vehicle. In automotive SOA, potential security threats also need be taken seriously. Aiming at the hidden dangers of unauthorized access in the automobile, we propose an efficient distributed access control architecture. And based on the message dissemination middleware-SOME/IP protocol of automotive SOA, a secure access control protocol-Security Expended SOME/IP (SE-SOME/IP) is designed, which can simultaneously have multiple security mechanisms and provide access control Function. The use of Attribute-Based Access Control and the introduction of Access Vector Cache can greatly shorten the request time of service.
汽车静态交互方式难以解决先进驾驶辅助系统(ADAS)、空中传输技术(OTA)等新兴技术对通信的要求。随着智能化的发展,未来汽车将在物联网中占据重要地位。因此,它们需要具有开放、互联和自我进化的特点。进一步,逐步引入面向服务的体系结构(SOA)设计,为车联网提供更加灵活的通信和服务调用。在传统的CAN总线等车载通信中,为了保护车辆的信息和功能安全,采用了多种安全保障机制。在汽车SOA中,潜在的安全威胁也需要认真对待。针对汽车中存在的非法访问隐患,提出了一种高效的分布式访问控制体系结构。在汽车SOA的消息传播中间件SOME/IP协议的基础上,设计了一种安全访问控制协议——安全扩展SOME/IP (SE-SOME/IP),该协议可以同时具有多种安全机制并提供访问控制功能。使用基于属性的访问控制和引入访问向量缓存可以大大缩短服务请求时间。
{"title":"An Efficient Access Control Framework For Service-Oriented Architecture of Vehicle","authors":"Liao Ruikun, Zhang Haitao, Li Yun, Chen Lirong, Zhang Qi","doi":"10.1109/ICCWAMTIP53232.2021.9674146","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674146","url":null,"abstract":"The static interaction method in automobile is difficult to solve the communication requirements of emerging technologies such as Advanced Driving Assistance System (ADAS) and Over-The-Air Technology (OTA). With the development of intelligence, automobiles will occupy an important position in the Internet of Things in the future. Therefore, they need to have the characteristics of openness, connectivity and self-evolution. Further, the design of Service-Oriented Architecture (SOA) is gradually introduced to provide more flexible communication and service call for the Internet of Vehicles. In traditional in-vehicle communication such as the CAN bus, a variety of security and safety mechanisms are adopted to protect the information and functional safety of vehicle. In automotive SOA, potential security threats also need be taken seriously. Aiming at the hidden dangers of unauthorized access in the automobile, we propose an efficient distributed access control architecture. And based on the message dissemination middleware-SOME/IP protocol of automotive SOA, a secure access control protocol-Security Expended SOME/IP (SE-SOME/IP) is designed, which can simultaneously have multiple security mechanisms and provide access control Function. The use of Attribute-Based Access Control and the introduction of Access Vector Cache can greatly shorten the request time of service.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115780128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ensemble Method For Net Traffic Classification Based On Deep Learning 基于深度学习的网络流量分类集成方法
Chenyi Qiang, Liqi Ping, Shui Gang, Wei Zi Hui
With the rapid development of computer network technology, the Internet has covered all aspects of social life. Nowadays, network technology is widely used in various social fields such as economy, military, education, etc. It promotes the rapid development of society and economy, and at the same time brings unprecedented challenges. The security of information transmission and interaction in cyberspace takes network traffic as the carrier, and network traffic contains a large amount of valuable information. How to perceive the current network status through the analysis of network traffic, discover network abnormalities in time is of great significance for maintaining network security. With the rapid development of deep learning in the field of artificial intelligence, researchers have tried to transfer deep learning methods that shine in computer vision processing, natural language recognition and other fields to the field of network flow detection. This paper proposes an ensemble model based on a convolutional neural network, which is integrated on the basis of the CNN model, which reduces the deviation of each basic model and improves the accuracy of the network stream classification results. The main tasks of this paper are as follows: (1) Experiments on the basic model and the integrated model were carried out on the USTC-TFC2016 data set. (2) The experimental results show that the ensemble model reduces the deviation of the basic model and improves the classification accuracy.
随着计算机网络技术的飞速发展,互联网已经覆盖了社会生活的方方面面。如今,网络技术被广泛应用于经济、军事、教育等社会各个领域。它促进了社会经济的快速发展,同时也带来了前所未有的挑战。网络空间信息传输与交互的安全以网络流量为载体,网络流量中蕴含着大量有价值的信息。如何通过对网络流量的分析来感知当前网络状态,及时发现网络异常,对于维护网络安全具有重要意义。随着深度学习在人工智能领域的快速发展,研究人员试图将在计算机视觉处理、自然语言识别等领域大放异彩的深度学习方法转移到网络流量检测领域。本文提出了一种基于卷积神经网络的集成模型,该模型在CNN模型的基础上进行集成,减少了各个基本模型的偏差,提高了网络流分类结果的准确性。本文的主要工作如下:(1)在USTC-TFC2016数据集上进行了基础模型和集成模型的实验。(2)实验结果表明,集成模型减少了基本模型的偏差,提高了分类精度。
{"title":"Ensemble Method For Net Traffic Classification Based On Deep Learning","authors":"Chenyi Qiang, Liqi Ping, Shui Gang, Wei Zi Hui","doi":"10.1109/ICCWAMTIP53232.2021.9674165","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674165","url":null,"abstract":"With the rapid development of computer network technology, the Internet has covered all aspects of social life. Nowadays, network technology is widely used in various social fields such as economy, military, education, etc. It promotes the rapid development of society and economy, and at the same time brings unprecedented challenges. The security of information transmission and interaction in cyberspace takes network traffic as the carrier, and network traffic contains a large amount of valuable information. How to perceive the current network status through the analysis of network traffic, discover network abnormalities in time is of great significance for maintaining network security. With the rapid development of deep learning in the field of artificial intelligence, researchers have tried to transfer deep learning methods that shine in computer vision processing, natural language recognition and other fields to the field of network flow detection. This paper proposes an ensemble model based on a convolutional neural network, which is integrated on the basis of the CNN model, which reduces the deviation of each basic model and improves the accuracy of the network stream classification results. The main tasks of this paper are as follows: (1) Experiments on the basic model and the integrated model were carried out on the USTC-TFC2016 data set. (2) The experimental results show that the ensemble model reduces the deviation of the basic model and improves the classification accuracy.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115904986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implicit Certificate Based Signcryption for a Secure Data Sharing in Clouds 基于隐式证书的云数据安全共享签名加密
Asamoah Kwame Omono, Yu Wang, Qi Xia, Jianbin Gao
Signcryption is a sophisticated cryptographic tool that combines the benefits of digital signature and data encryption in a single step, resulting in reduced computation and storage cost. However, the existing signcryption techniques do not account for a scenario in which a company must escrow an employee's private encryption key so that the corporation does not lose the capacity to decrypt a ciphertext when the employee or user is no longer available. To circumvent the issue of non-repudiation, the private signing key does not need to be escrowed. As a result, this paper presents an implicit certificate-based signcryption technique with private encryption key escrow, which can assist an organization in preventing the loss of private encryption. A certificate, or more broadly, a digital signature, protects users' public encryption and signature keys from man-in-the-middle attacks under our proposed approach.
签名加密是一种复杂的加密工具,它在一个步骤中结合了数字签名和数据加密的优点,从而减少了计算和存储成本。然而,现有的签名加密技术没有考虑到这样一种情况:公司必须托管员工的私有加密密钥,以便在员工或用户不再可用时,公司不会失去解密密文的能力。为了规避不可否认性问题,不需要托管私有签名密钥。因此,本文提出了一种基于隐式证书的私钥托管签名加密技术,可以帮助组织防止私钥加密的丢失。根据我们提出的方法,证书,或者更广泛地说,数字签名,可以保护用户的公共加密和签名密钥免受中间人攻击。
{"title":"Implicit Certificate Based Signcryption for a Secure Data Sharing in Clouds","authors":"Asamoah Kwame Omono, Yu Wang, Qi Xia, Jianbin Gao","doi":"10.1109/ICCWAMTIP53232.2021.9674100","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674100","url":null,"abstract":"Signcryption is a sophisticated cryptographic tool that combines the benefits of digital signature and data encryption in a single step, resulting in reduced computation and storage cost. However, the existing signcryption techniques do not account for a scenario in which a company must escrow an employee's private encryption key so that the corporation does not lose the capacity to decrypt a ciphertext when the employee or user is no longer available. To circumvent the issue of non-repudiation, the private signing key does not need to be escrowed. As a result, this paper presents an implicit certificate-based signcryption technique with private encryption key escrow, which can assist an organization in preventing the loss of private encryption. A certificate, or more broadly, a digital signature, protects users' public encryption and signature keys from man-in-the-middle attacks under our proposed approach.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114804348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Akan-English: Transformer for Low Resource Translation 阿坎英语:低资源翻译的转换器
Emmanuel Agyei, Xiaoling Zhang, S. B. Yussif, B. L. Y. Agbley
Recent years, Neural Machine Translation outperforms the existing traditional-based models for language translation with the use of sequential architecture. However, low resource languages, such as Akan-Twi, lack structured language resources largely due to the limited amount of research geared towards their revival and resuscitation. In an effort to mitigate the issue of low resource language translation from Akan-Twi to English in machine learning, we utilize the low resource parallel corpus for the translation setting of Akan-English. Using our proposed training process and Transformer-based model, we generate augmented corpus which is used to improve the performance of our final translation model. We achieved best BLEU score of 12.96 and 17.57 for the Akan-English and English-Akan, respectively.
近年来,神经机器翻译通过使用序列结构,超越了现有的基于传统的语言翻译模型。然而,低资源语言,如阿坎特语,缺乏结构化的语言资源,很大程度上是由于针对其复兴和复苏的研究数量有限。为了缓解机器学习中阿坎-特威语到英语的低资源翻译问题,我们利用低资源并行语料库对阿坎-英语进行翻译设置。利用我们提出的训练过程和基于transformer的模型,我们生成了增强语料库,用于提高最终翻译模型的性能。我们的Akan-English和English-Akan分别获得了12.96分和17.57分的BLEU最高分。
{"title":"Akan-English: Transformer for Low Resource Translation","authors":"Emmanuel Agyei, Xiaoling Zhang, S. B. Yussif, B. L. Y. Agbley","doi":"10.1109/ICCWAMTIP53232.2021.9674076","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674076","url":null,"abstract":"Recent years, Neural Machine Translation outperforms the existing traditional-based models for language translation with the use of sequential architecture. However, low resource languages, such as Akan-Twi, lack structured language resources largely due to the limited amount of research geared towards their revival and resuscitation. In an effort to mitigate the issue of low resource language translation from Akan-Twi to English in machine learning, we utilize the low resource parallel corpus for the translation setting of Akan-English. Using our proposed training process and Transformer-based model, we generate augmented corpus which is used to improve the performance of our final translation model. We achieved best BLEU score of 12.96 and 17.57 for the Akan-English and English-Akan, respectively.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116379990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Method Using Contraction Integral Equation For Inversion Of Two-Dimensional Dielectric Scatterers 利用收缩积分方程反演二维介质散射体的新方法
Xiaoniu Zhang, Zhiqin Zhao
A new method based on Contraction Integral Equation (CIE) is proposed here to solve the highly nonlinear electromagnetic inverse scattering problems with strong noise disturbance. The high-frequency components can be quite sensitive to noise. Since noise is inevitable for a practical ISP, in view of this characteristic, those high-frequency components could easily lead the third round of optimization to converge to a noise-polluted result. Furthermore, when the noise interference is significant, the algorithm cannot even achieve convergence of the iteration. Since the low-frequency components used in these rounds are not sensitive to noise, there is no need to weaken the weight of the data equation mismatch term. Finally, the effectiveness and versatility of the new method is verified through numerical analysis.
提出了一种基于收缩积分方程(CIE)的求解强噪声干扰下的高度非线性电磁逆散射问题的新方法。高频元件对噪声很敏感。由于噪声对于实际的ISP来说是不可避免的,鉴于这一特性,这些高频成分很容易导致第三轮优化收敛到噪声污染的结果。此外,当噪声干扰较大时,算法甚至不能实现迭代的收敛。由于这些回合中使用的低频分量对噪声不敏感,因此不需要削弱数据方程不匹配项的权重。最后,通过数值分析验证了新方法的有效性和通用性。
{"title":"A Novel Method Using Contraction Integral Equation For Inversion Of Two-Dimensional Dielectric Scatterers","authors":"Xiaoniu Zhang, Zhiqin Zhao","doi":"10.1109/ICCWAMTIP53232.2021.9674174","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674174","url":null,"abstract":"A new method based on Contraction Integral Equation (CIE) is proposed here to solve the highly nonlinear electromagnetic inverse scattering problems with strong noise disturbance. The high-frequency components can be quite sensitive to noise. Since noise is inevitable for a practical ISP, in view of this characteristic, those high-frequency components could easily lead the third round of optimization to converge to a noise-polluted result. Furthermore, when the noise interference is significant, the algorithm cannot even achieve convergence of the iteration. Since the low-frequency components used in these rounds are not sensitive to noise, there is no need to weaken the weight of the data equation mismatch term. Finally, the effectiveness and versatility of the new method is verified through numerical analysis.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123430900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study On Efficiency Optimization Strategy Of Central Air-Conditioning System 中央空调系统效率优化策略研究
Yue Zhou, Si Han Du, Yuan Gao, Fei Xiao, Gong Kai, Jian Ping Li
With the rapid development of the central air conditioning technology and wisdom city new concept propulsion, central air conditioning is increasingly used to different occasions, and then the energy loss is also associated with increased, so how to establish good central air-conditioning optimization control strategy become a problem we must solve, this article aims to reduce the wastage of the energy efficiency of air conditioning system. First will be the method of using multiple regression to affect the controlled variable of the dependent variable changes after fitting of uncontrollable variables by calculation of each variable and dependent variable (cooling load and the total power consumption) dimension reduction, the correlation coefficient between combination of selected indicators of than the big, determine all the characteristics of the index of the closely associated with the dependent variable, and multiple regression analysis is used to determine the dependent variable and all related controllable and uncontrollable variables between the final fitting relation, and to remove equipment control parameters of the day's other variable data, using the K - means clustering algorithm to get 5 groups cluster value. Finally, the optimal speed control strategy is obtained by solving the model with genetic algorithm, and the system efficiency is further improved by combining with simulated annealing algorithm.
随着中央空调技术的快速发展和智慧城市新概念的推进,中央空调越来越多地用于不同的场合,随之而来的能量损失也随之增加,因此如何建立良好的中央空调优化控制策略成为我们必须解决的问题,本文旨在减少空调系统能效的浪费。首先将采用多元回归的方法对影响控制变量的因变量变化进行拟合后,对不可控变量通过计算各变量与因变量(冷负荷和总用电量)的降维,将所选指标之间的相关系数组合得比大,确定所有与因变量密切相关的指标特征;并采用多元回归分析确定因变量与所有相关可控、不可控变量之间的最终拟合关系,并去除设备控制参数当天的其他变量数据,采用K -均值聚类算法得到5组聚类值。最后,利用遗传算法求解模型得到最优速度控制策略,并结合模拟退火算法进一步提高系统效率。
{"title":"Study On Efficiency Optimization Strategy Of Central Air-Conditioning System","authors":"Yue Zhou, Si Han Du, Yuan Gao, Fei Xiao, Gong Kai, Jian Ping Li","doi":"10.1109/ICCWAMTIP53232.2021.9673711","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9673711","url":null,"abstract":"With the rapid development of the central air conditioning technology and wisdom city new concept propulsion, central air conditioning is increasingly used to different occasions, and then the energy loss is also associated with increased, so how to establish good central air-conditioning optimization control strategy become a problem we must solve, this article aims to reduce the wastage of the energy efficiency of air conditioning system. First will be the method of using multiple regression to affect the controlled variable of the dependent variable changes after fitting of uncontrollable variables by calculation of each variable and dependent variable (cooling load and the total power consumption) dimension reduction, the correlation coefficient between combination of selected indicators of than the big, determine all the characteristics of the index of the closely associated with the dependent variable, and multiple regression analysis is used to determine the dependent variable and all related controllable and uncontrollable variables between the final fitting relation, and to remove equipment control parameters of the day's other variable data, using the K - means clustering algorithm to get 5 groups cluster value. Finally, the optimal speed control strategy is obtained by solving the model with genetic algorithm, and the system efficiency is further improved by combining with simulated annealing algorithm.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121966015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Search Ranking Technology of Chinese Electronic Medical Record Based on Adarank 基于Adarank的中文电子病案检索排序技术研究
Zhang Ping, Wu Jinfa
Electronic Medical Records (EMR) run through every link in the whole medical activities. How to find the required EMR quickly and accurately has become a difficult point in the process of EMR retrieval. This paper introduces a method to optimize the sorting of search results in Chinese electronic medical record search engine system by using the sorting learning AdaRank retrieval algorithm. In 248 Chinese electronic medical records manually annotated, five sorting learning methods were used for training and testing. Our AdaRank sorting algorithm achieved NDCG@10 of 0.28178, ERR@10 of 0.38038 and MAP@10 of 0.59368. Compared with RankNet, the sorting learning model, LambdaRank, ListNet and LambdaMART, AdaRank methods have better sorting effect.
电子病历(EMR)贯穿于整个医疗活动的各个环节。如何快速准确地找到所需的电子病历已成为电子病历检索过程中的一个难点。介绍了一种利用排序学习AdaRank检索算法优化中文电子病历搜索引擎系统搜索结果排序的方法。对248份人工标注的中文电子病案,采用5种分类学习方法进行培训和测试。我们的AdaRank排序算法实现了NDCG@10的0.28178,ERR@10的0.38038,MAP@10的0.59368。与排序学习模型RankNet、LambdaRank、ListNet和LambdaMART相比,AdaRank方法具有更好的排序效果。
{"title":"Research on Search Ranking Technology of Chinese Electronic Medical Record Based on Adarank","authors":"Zhang Ping, Wu Jinfa","doi":"10.1109/ICCWAMTIP53232.2021.9674101","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674101","url":null,"abstract":"Electronic Medical Records (EMR) run through every link in the whole medical activities. How to find the required EMR quickly and accurately has become a difficult point in the process of EMR retrieval. This paper introduces a method to optimize the sorting of search results in Chinese electronic medical record search engine system by using the sorting learning AdaRank retrieval algorithm. In 248 Chinese electronic medical records manually annotated, five sorting learning methods were used for training and testing. Our AdaRank sorting algorithm achieved NDCG@10 of 0.28178, ERR@10 of 0.38038 and MAP@10 of 0.59368. Compared with RankNet, the sorting learning model, LambdaRank, ListNet and LambdaMART, AdaRank methods have better sorting effect.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122082833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Text Detection of a Chinese Long and Dense Text Dataset 中文长密文本数据集的文本检测
Huiyu Xiong
In daily life, it is important to interpret information correctly from different types of texts. After applying the neural network to object detection, a breakthrough has been made in natural scene text detection. However, only a few research has focused on dense, long segments of Chinese text. Moreover, there are hardly any datasets that include Chinese text boxes with large gap in aspect ratio and short interval. Considering these, we propose a Network to Detect Chinese Long text (DCLnet) and a Chinese Long and Dense text Dataset (CLD). It can not only accurately detect long and dense Chinese text, but also predict text in arbitrary directions using rotated quadrilateral shapes. In this method, we have improved AdvancedEAST model. The feature extraction part selects Resnet50, one of the latest networks. Additionally, reduce-redundancy module is added before the prediction stage to reduce redundant computations. We conduct several experiments on datasets including ICDAR2015 and CLD. Through comparative analysis, the detection accuracy of the algorithm for long and dense Chinese text is obviously better than the previous methods. It achieves a competitive F-score of 0.761 on CLD dataset.
在日常生活中,从不同类型的文本中正确解读信息是很重要的。将神经网络应用于目标检测后,在自然场景文本检测方面取得了突破。然而,只有少数研究集中在密集,长段的中文文本。此外,几乎没有包含宽高比大、间隔短的中文文本框的数据集。考虑到这些,我们提出了一个中文长文本检测网络(DCLnet)和一个中文长密集文本数据集(CLD)。它不仅可以准确地检测长而密集的中文文本,而且可以利用旋转的四边形形状在任意方向上预测文本。在这种方法中,我们改进了AdvancedEAST模型。特征提取部分选择了最新的网络之一Resnet50。在预测阶段之前增加了reduce-redundancy模块,减少冗余计算。我们在ICDAR2015和CLD数据集上进行了多次实验。通过对比分析,该算法对长而密集的中文文本的检测精度明显优于以往的方法。它在CLD数据集上获得了0.761的竞争f值。
{"title":"Text Detection of a Chinese Long and Dense Text Dataset","authors":"Huiyu Xiong","doi":"10.1109/ICCWAMTIP53232.2021.9674110","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674110","url":null,"abstract":"In daily life, it is important to interpret information correctly from different types of texts. After applying the neural network to object detection, a breakthrough has been made in natural scene text detection. However, only a few research has focused on dense, long segments of Chinese text. Moreover, there are hardly any datasets that include Chinese text boxes with large gap in aspect ratio and short interval. Considering these, we propose a Network to Detect Chinese Long text (DCLnet) and a Chinese Long and Dense text Dataset (CLD). It can not only accurately detect long and dense Chinese text, but also predict text in arbitrary directions using rotated quadrilateral shapes. In this method, we have improved AdvancedEAST model. The feature extraction part selects Resnet50, one of the latest networks. Additionally, reduce-redundancy module is added before the prediction stage to reduce redundant computations. We conduct several experiments on datasets including ICDAR2015 and CLD. Through comparative analysis, the detection accuracy of the algorithm for long and dense Chinese text is obviously better than the previous methods. It achieves a competitive F-score of 0.761 on CLD dataset.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125026679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secrecy Capacity Analysis of FDA Relaying Swipt System with Power Splitting Protocol 基于功率分割协议的FDA中继刷卡系统保密能力分析
Jian Jiangwei, H. Bang, Wang Wen-Qin
In this paper, we study the secrecy capacity for frequency diverse array relaying and simultaneous wireless information and power transfer jointed communication system under the power splitting protocol. The decode-and-forward strategy and direction modulation technique are jointly utilized for relaying to forward signals. We derive closed-form expressions for the ergodic secrecy capacity of the system. Moreover, the impacts of frequency diverse array parameters on the system security performances are also analyzed. The numerical results show that the system security performance under power splitting protocol outperforms time splitting protocol. Meanwhile, the frequency diverse array relaying achieves better security performance than traditional phased-array relaying.
本文研究了功率分割协议下的分频阵列中继和同步无线信息与功率传输联合通信系统的保密能力。将译码转发策略和方向调制技术联合用于中继转发信号。导出了系统遍历保密能力的封闭表达式。此外,还分析了变频阵列参数对系统安全性能的影响。数值结果表明,功率分割协议下的系统安全性能优于时间分割协议。与传统的相控阵继电器相比,变频阵列继电器具有更好的安全性能。
{"title":"Secrecy Capacity Analysis of FDA Relaying Swipt System with Power Splitting Protocol","authors":"Jian Jiangwei, H. Bang, Wang Wen-Qin","doi":"10.1109/ICCWAMTIP53232.2021.9674060","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674060","url":null,"abstract":"In this paper, we study the secrecy capacity for frequency diverse array relaying and simultaneous wireless information and power transfer jointed communication system under the power splitting protocol. The decode-and-forward strategy and direction modulation technique are jointly utilized for relaying to forward signals. We derive closed-form expressions for the ergodic secrecy capacity of the system. Moreover, the impacts of frequency diverse array parameters on the system security performances are also analyzed. The numerical results show that the system security performance under power splitting protocol outperforms time splitting protocol. Meanwhile, the frequency diverse array relaying achieves better security performance than traditional phased-array relaying.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128659074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1