首页 > 最新文献

2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)最新文献

英文 中文
Systematic Advancement of Yolo Object Detector For Real-Time Detection of Objects 面向目标实时检测的Yolo目标检测器的系统进展
Ejiyi Chukwuebuka Joseph, O. Bamisile, Nneji Ugochi, Qin Zhen, Ndalahwa Ilakoze, Chikwendu A. Ijeoma
This paper explicates the systematic advancements that were observed from the inception of the YOLO (You Only Look Once) object detector to the most recent version 4. Since its introduction in late 2015, YOLO has recorded tremendous implementation as well as improvements and applications. In this work, a brief survey of the YOLO network is presented considering the introduction that was made to each version that succeeded each preceding version and the advancement on how the model performed with detection. We used the latest version of the network (YOLOv4) to train 50 classes of objects that we considered popular objects for real-time detection. The model trained obtained an mAP of 64.80% @IoU of 0.5 and when deployed for real-time detection, it achieved a 43FPS speed of detection.
本文阐述了从YOLO(你只看一次)目标探测器开始到最近的版本4所观察到的系统进步。自2015年底推出以来,YOLO取得了巨大的实施、改进和应用。在这项工作中,考虑到对继承前一个版本的每个版本的介绍以及模型如何执行检测的进展,对YOLO网络进行了简要的调查。我们使用最新版本的网络(YOLOv4)来训练50类对象,我们认为这些对象是实时检测的常用对象。训练后的模型mAP为64.80% @IoU为0.5,用于实时检测时,检测速度达到43FPS。
{"title":"Systematic Advancement of Yolo Object Detector For Real-Time Detection of Objects","authors":"Ejiyi Chukwuebuka Joseph, O. Bamisile, Nneji Ugochi, Qin Zhen, Ndalahwa Ilakoze, Chikwendu A. Ijeoma","doi":"10.1109/ICCWAMTIP53232.2021.9674163","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674163","url":null,"abstract":"This paper explicates the systematic advancements that were observed from the inception of the YOLO (You Only Look Once) object detector to the most recent version 4. Since its introduction in late 2015, YOLO has recorded tremendous implementation as well as improvements and applications. In this work, a brief survey of the YOLO network is presented considering the introduction that was made to each version that succeeded each preceding version and the advancement on how the model performed with detection. We used the latest version of the network (YOLOv4) to train 50 classes of objects that we considered popular objects for real-time detection. The model trained obtained an mAP of 64.80% @IoU of 0.5 and when deployed for real-time detection, it achieved a 43FPS speed of detection.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121308080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Formal Modeling and Verification of the Sequential Kernel of an Embedded Operating System 嵌入式操作系统顺序内核的形式化建模与验证
Zhang Haitao, Chen Lirong, Luo Lei
A formal computational model is presented for the sequential kernel of an automotive embedded real-time operating system, which provides infrastructural mechanism to support the isolation between applications and the operating system, as well as the isolation between executive entities such as tasks and ISRs (Interrupt Service Routines) in applications. The target embedded system is modeled at the granularity of isolated memory regions and stacks. Tasks, nested ISRs and the preempt-able part of the operating system (i.e. system services) are concurrent entities executing on dedicated memory regions and stacks determined by the sequential kernel. States of these entities can be correctly saved and restored in isolated stacks and in the kernel data structures, such that the control flow changes among them can be correctly made. The implementation correctness theorem of the kernel is established along with the corresponding simulation relationship and implementation invariants. According to the features of the model and the related implementation languages, the kernel is formally verified with the theorem prover Isabelle/HOL.
提出了一种汽车嵌入式实时操作系统时序内核的形式化计算模型,该模型提供了支持应用程序与操作系统之间的隔离以及应用程序中执行实体(如任务和中断服务例程)之间的隔离的基础机制。目标嵌入式系统在隔离的内存区域和堆栈的粒度上建模。任务、嵌套isr和操作系统的可抢占部分(即系统服务)是在由顺序内核确定的专用内存区域和堆栈上执行的并发实体。这些实体的状态可以在隔离的堆栈和内核数据结构中正确地保存和恢复,从而可以正确地在它们之间进行控制流更改。建立了核的实现正确性定理,并给出了相应的仿真关系和实现不变量。根据模型的特点和相关的实现语言,用定理证明者Isabelle/HOL对内核进行了形式化验证。
{"title":"Formal Modeling and Verification of the Sequential Kernel of an Embedded Operating System","authors":"Zhang Haitao, Chen Lirong, Luo Lei","doi":"10.1109/ICCWAMTIP53232.2021.9674115","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674115","url":null,"abstract":"A formal computational model is presented for the sequential kernel of an automotive embedded real-time operating system, which provides infrastructural mechanism to support the isolation between applications and the operating system, as well as the isolation between executive entities such as tasks and ISRs (Interrupt Service Routines) in applications. The target embedded system is modeled at the granularity of isolated memory regions and stacks. Tasks, nested ISRs and the preempt-able part of the operating system (i.e. system services) are concurrent entities executing on dedicated memory regions and stacks determined by the sequential kernel. States of these entities can be correctly saved and restored in isolated stacks and in the kernel data structures, such that the control flow changes among them can be correctly made. The implementation correctness theorem of the kernel is established along with the corresponding simulation relationship and implementation invariants. According to the features of the model and the related implementation languages, the kernel is formally verified with the theorem prover Isabelle/HOL.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121177964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Optimization of Intention Detection Based on Metric Learning 基于度量学习的意图检测优化
Liu Di, Kong Xinyue, Yong-Cheul Jun
With the development of machine learning, transfer learning has great development prospect and commercial value compared with the traditional supervised learning. As neural network developed, transfer learning based on metric learning is widely used in the field of Computer Vision and gradually applied to Natural Language Processing. This paper proposes to use BERT encoder and BiLSTM to improve the performance of intention detection especially in classification performance. SMP2017 data set shows that it can effectively improve the accuracy of intention detection when the sample size is small and uneven.
随着机器学习的发展,迁移学习与传统的监督学习相比具有很大的发展前景和商业价值。随着神经网络的发展,基于度量学习的迁移学习在计算机视觉领域得到了广泛的应用,并逐渐应用到自然语言处理领域。本文提出使用BERT编码器和BiLSTM来提高意图检测的性能,特别是在分类性能方面。SMP2017数据集表明,在样本量较小且不均匀的情况下,可以有效提高意图检测的准确率。
{"title":"Optimization of Intention Detection Based on Metric Learning","authors":"Liu Di, Kong Xinyue, Yong-Cheul Jun","doi":"10.1109/ICCWAMTIP53232.2021.9674093","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674093","url":null,"abstract":"With the development of machine learning, transfer learning has great development prospect and commercial value compared with the traditional supervised learning. As neural network developed, transfer learning based on metric learning is widely used in the field of Computer Vision and gradually applied to Natural Language Processing. This paper proposes to use BERT encoder and BiLSTM to improve the performance of intention detection especially in classification performance. SMP2017 data set shows that it can effectively improve the accuracy of intention detection when the sample size is small and uneven.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126687601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research On The Construction of Agricultural Product Quality Maintenance And Quality Traceability System Based On Big Data 基于大数据的农产品质量维护与质量追溯系统构建研究
Yang Yujun, Yang Yimei, Zhouqiong Wang, Xi Hongbo, Li Liyun
The quality and safety of agricultural products has been widely concerned by the whole society in recent years. Therefore, the traceability of agricultural products is a research hotspot of scholars. The quality and safety traceability system of agricultural products is an important method to monitor the quality and safety of agricultural products. The emergence and use of big data help to solve the problems of high cost, scattered information and incomplete industrial chain of quality and safety traceability of agricultural products and improve the efficiency and accuracy of the quality and safety traceability system of agricultural products. There are still some problems in the application of big data, such as weak pertinence. It is necessary to mine and use big data to realize the traceability of agricultural products.
近年来,农产品质量安全问题受到全社会的广泛关注。因此,农产品的可追溯性是学者们研究的热点。农产品质量安全追溯体系是监控农产品质量安全的重要手段。大数据的出现和使用,有助于解决农产品质量安全追溯成本高、信息分散、产业链不完整等问题,提高农产品质量安全追溯体系的效率和准确性。大数据的应用还存在针对性不强等问题。要实现农产品的可追溯,需要挖掘和利用大数据。
{"title":"Research On The Construction of Agricultural Product Quality Maintenance And Quality Traceability System Based On Big Data","authors":"Yang Yujun, Yang Yimei, Zhouqiong Wang, Xi Hongbo, Li Liyun","doi":"10.1109/ICCWAMTIP53232.2021.9674175","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674175","url":null,"abstract":"The quality and safety of agricultural products has been widely concerned by the whole society in recent years. Therefore, the traceability of agricultural products is a research hotspot of scholars. The quality and safety traceability system of agricultural products is an important method to monitor the quality and safety of agricultural products. The emergence and use of big data help to solve the problems of high cost, scattered information and incomplete industrial chain of quality and safety traceability of agricultural products and improve the efficiency and accuracy of the quality and safety traceability system of agricultural products. There are still some problems in the application of big data, such as weak pertinence. It is necessary to mine and use big data to realize the traceability of agricultural products.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126788012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Authenticity Verification Scheme Based On Tee and Blockchain 基于Tee和区块链的真实性验证方案
Mou Jianhua, Zheng Qiaoyan, He Guotian
IoT devices constitute the key infrastructure to support various important IoT applications. To ensure the high reliability of these devices and their generated data, a dual verification framework based on a trusted execution environment and Blockchain was proposed to verify the device identity and data authenticity in this paper. In addition, the security of the framework is also analyzed. The scheme provides a data verification reference for the expansion of the ecological application of the IoT.
物联网设备构成了支持各种重要物联网应用的关键基础设施。为了保证这些设备及其生成数据的高可靠性,本文提出了一种基于可信执行环境和区块链的双重验证框架,对设备身份和数据真实性进行验证。此外,还对框架的安全性进行了分析。该方案为物联网生态应用的拓展提供了数据验证参考。
{"title":"Authenticity Verification Scheme Based On Tee and Blockchain","authors":"Mou Jianhua, Zheng Qiaoyan, He Guotian","doi":"10.1109/ICCWAMTIP53232.2021.9673712","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9673712","url":null,"abstract":"IoT devices constitute the key infrastructure to support various important IoT applications. To ensure the high reliability of these devices and their generated data, a dual verification framework based on a trusted execution environment and Blockchain was proposed to verify the device identity and data authenticity in this paper. In addition, the security of the framework is also analyzed. The scheme provides a data verification reference for the expansion of the ecological application of the IoT.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127165938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Design Document Tampering Detection and Location Based on Blockchain Technology 基于区块链技术的设计文档篡改检测与定位研究
Liu Yaning, Wang Juan, Li Liangxiao, Ma Quan, Gong Xuepeng
This paper decomposes the multi-element DXF format design file, extracts the most important layer, block, entity element and the number of entities according to the elements, and constitutes the characteristics of the design file; Then, the extracted features are taken as the underlying leaves, and the Merkel tree based on MD5 algorithm is used to get the tamper proof code. By comparing the tamper resistant code, we can detect whether tampering occurs and locate the tampering location, and store the tamper resistant code and tampering location information on the chain, using the characteristics of the blockchain to ensure that they are not tampered and traceable.
本文对多元素DXF格式设计文件进行分解,根据元素提取出最重要的层、块、实体元素和实体数量,构成设计文件的特征;然后,将提取的特征作为底层叶子,利用基于MD5算法的默克尔树得到防篡改码。通过比较防篡改代码,我们可以检测是否发生篡改并定位篡改位置,并将防篡改代码和篡改位置信息存储在链上,利用区块链的特性确保其不被篡改和可追溯。
{"title":"Research on Design Document Tampering Detection and Location Based on Blockchain Technology","authors":"Liu Yaning, Wang Juan, Li Liangxiao, Ma Quan, Gong Xuepeng","doi":"10.1109/ICCWAMTIP53232.2021.9674104","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674104","url":null,"abstract":"This paper decomposes the multi-element DXF format design file, extracts the most important layer, block, entity element and the number of entities according to the elements, and constitutes the characteristics of the design file; Then, the extracted features are taken as the underlying leaves, and the Merkel tree based on MD5 algorithm is used to get the tamper proof code. By comparing the tamper resistant code, we can detect whether tampering occurs and locate the tampering location, and store the tamper resistant code and tampering location information on the chain, using the characteristics of the blockchain to ensure that they are not tampered and traceable.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123759100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Variable Population Evolutionary Algorithm Based on Pyramid Model for Shared Bus Scheduling Problem 基于金字塔模型的变种群进化算法求解共享公交调度问题
H. Tiantian, Su Sheng
With the advent of the era of sharing economy, shared travel mode has gradually entered the public's vision and attracted the public's attention and favor. The long-distance between different locations and the difficulty of route planning not only increase the difficulty of people sharing travel to a certain extent but also make the shared bus scheduling problem become a very hot topic. Aiming at this problem, this paper proposes a variable population evolution algorithm based on the pyramid model (PME). Firstly, due to the slow convergence speed of traditional evolutionary algorithms, the concept of variable population evolution and the random selection of weighted genes are introduced to generate a chromosome. Secondly, the crossover operation in the genetic algorithm is improved by crossing all chromosomes with excellent genes. In addition, the PME algorithm proposed in this paper can accurately predict the specific number of vehicles required for dispatch on the next day, and it can also realize the sharing of all vehicles when the route in the specified range is unknown. Experimental data show that the proposed method achieves better performance.
随着共享经济时代的到来,共享出行模式逐渐进入大众视野,受到大众的关注和青睐。不同地点之间的距离和路线规划的难度在一定程度上增加了人们共享出行的难度,也使共享公交调度问题成为一个非常热门的话题。针对这一问题,提出了一种基于金字塔模型(PME)的变种群进化算法。首先,针对传统进化算法收敛速度慢的问题,引入变种群进化的概念和加权基因的随机选择来生成染色体;其次,改进了遗传算法的交叉操作,使所有染色体都具有优秀的基因。此外,本文提出的PME算法可以准确预测第二天调度所需车辆的具体数量,也可以实现指定范围内路线未知时所有车辆的共享。实验数据表明,该方法取得了较好的性能。
{"title":"A Variable Population Evolutionary Algorithm Based on Pyramid Model for Shared Bus Scheduling Problem","authors":"H. Tiantian, Su Sheng","doi":"10.1109/ICCWAMTIP53232.2021.9674136","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674136","url":null,"abstract":"With the advent of the era of sharing economy, shared travel mode has gradually entered the public's vision and attracted the public's attention and favor. The long-distance between different locations and the difficulty of route planning not only increase the difficulty of people sharing travel to a certain extent but also make the shared bus scheduling problem become a very hot topic. Aiming at this problem, this paper proposes a variable population evolution algorithm based on the pyramid model (PME). Firstly, due to the slow convergence speed of traditional evolutionary algorithms, the concept of variable population evolution and the random selection of weighted genes are introduced to generate a chromosome. Secondly, the crossover operation in the genetic algorithm is improved by crossing all chromosomes with excellent genes. In addition, the PME algorithm proposed in this paper can accurately predict the specific number of vehicles required for dispatch on the next day, and it can also realize the sharing of all vehicles when the route in the specified range is unknown. Experimental data show that the proposed method achieves better performance.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133668576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Learning Based Image Recognition In Animal Husbandry 基于深度学习的畜牧业图像识别
Yan Qi, Cheng Baiyang, Luo Lan
Deep learning technology is an important new force in the emerging science and technology revolution and the revolution of the animal husbandry industry, and plays a crucial role in the process of being digitization, informatization and wisdom of the animal husbandry industry in China. The application of deep learning-based image recognition in the livestock industry provides a new solution to the problems of disease prevention, precise identification and biosafety prevention and control at the farming side, and will become a powerful booster to promote the livestock industry towards modernization. The use of convolutional neural network after extracting a feature to complete the link according to the type of feature classification, then complete the data pre-processing, and using super pixel-based image segmentation and SIFT algorithm to complete image segmentation and image feature extraction, and finally through the convolutional neural network and support vector machine to complete the classification and prediction of animal action, driving the overall management level of the livestock industry to improve, and become an effective way to promote the development of intelligent animal husbandry.
深度学习技术是新兴科技革命和畜牧业革命的重要新生力量,在中国畜牧业走向数字化、信息化、智慧化的过程中发挥着至关重要的作用。基于深度学习的图像识别在畜牧业中的应用,为养殖业的疾病预防、精准识别和生物安全防控问题提供了新的解决方案,将成为推动畜牧业走向现代化的有力助推器。利用卷积神经网络在提取一个特征后根据特征类型完成链接分类,然后完成数据预处理,并利用基于超像素的图像分割和SIFT算法完成图像分割和图像特征提取,最后通过卷积神经网络和支持向量机完成动物动作的分类和预测。带动畜牧业整体管理水平的提高,成为推动智能化畜牧业发展的有效途径。
{"title":"Deep Learning Based Image Recognition In Animal Husbandry","authors":"Yan Qi, Cheng Baiyang, Luo Lan","doi":"10.1109/ICCWAMTIP53232.2021.9674177","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674177","url":null,"abstract":"Deep learning technology is an important new force in the emerging science and technology revolution and the revolution of the animal husbandry industry, and plays a crucial role in the process of being digitization, informatization and wisdom of the animal husbandry industry in China. The application of deep learning-based image recognition in the livestock industry provides a new solution to the problems of disease prevention, precise identification and biosafety prevention and control at the farming side, and will become a powerful booster to promote the livestock industry towards modernization. The use of convolutional neural network after extracting a feature to complete the link according to the type of feature classification, then complete the data pre-processing, and using super pixel-based image segmentation and SIFT algorithm to complete image segmentation and image feature extraction, and finally through the convolutional neural network and support vector machine to complete the classification and prediction of animal action, driving the overall management level of the livestock industry to improve, and become an effective way to promote the development of intelligent animal husbandry.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116892325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Privacy Protection Mechanism For Health Big Data Based On Xml 基于Xml的健康大数据隐私保护机制
Yang Yimei, Yang Yujun, Zhouyi Wang, Xi Hongbo, Li Wei
With the deepening application of big data technology in the field of health care, the potential risks such as personal privacy and security that may be brought by the collection, analysis and sharing of health data cannot be ignored. How to ensure the safety of health big data and conduct reasonable and compliant analysis and utilization of health big data is an urgent problem to be solved at present. Based on the characteristics of health big data, this paper focuses on the privacy connotation of health big data, puts forward the privacy protection framework of health big data around the privacy protection needs of various stakeholders in the life cycle of health big data, and combs the privacy protection technology system currently available in the field of health care, In order to provide support for each application link of health big data, a set of health data desensitization method based on XML is studied and designed. This method can dynamically add data desensitization strategy, meet the different needs of hospitals for medical record privacy data protection under different application scenarios, and promote the standardized and orderly development of health big data.
随着大数据技术在医疗卫生领域应用的不断深入,健康数据的采集、分析和共享可能带来的个人隐私、安全等潜在风险不容忽视。如何保障健康大数据的安全,对健康大数据进行合理合规的分析和利用,是当前急需解决的问题。本文基于健康大数据的特点,聚焦健康大数据的隐私内涵,围绕健康大数据生命周期中各利益相关方的隐私保护需求,提出了健康大数据的隐私保护框架,并梳理了目前健康医疗领域可用的隐私保护技术体系,以期为健康大数据的各个应用环节提供支撑。研究并设计了一套基于XML的健康数据脱敏方法。该方法可以动态添加数据脱敏策略,满足不同应用场景下医院对病历隐私数据保护的不同需求,促进健康大数据的规范有序发展。
{"title":"A Privacy Protection Mechanism For Health Big Data Based On Xml","authors":"Yang Yimei, Yang Yujun, Zhouyi Wang, Xi Hongbo, Li Wei","doi":"10.1109/ICCWAMTIP53232.2021.9674143","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674143","url":null,"abstract":"With the deepening application of big data technology in the field of health care, the potential risks such as personal privacy and security that may be brought by the collection, analysis and sharing of health data cannot be ignored. How to ensure the safety of health big data and conduct reasonable and compliant analysis and utilization of health big data is an urgent problem to be solved at present. Based on the characteristics of health big data, this paper focuses on the privacy connotation of health big data, puts forward the privacy protection framework of health big data around the privacy protection needs of various stakeholders in the life cycle of health big data, and combs the privacy protection technology system currently available in the field of health care, In order to provide support for each application link of health big data, a set of health data desensitization method based on XML is studied and designed. This method can dynamically add data desensitization strategy, meet the different needs of hospitals for medical record privacy data protection under different application scenarios, and promote the standardized and orderly development of health big data.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134532065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint Modulation and Coding Recognition Using Deep Learning 基于深度学习的联合调制和编码识别
Wang Jiao, Liao Jianqing
Blind identification of modulation and channel coding parameters is a very important research topic in civil-military communication systems. The traditional algorithm is mainly implemented in the way of hierarchical recognition, that is, modulation recognition of the signal first, then demodulation of the signal, and finally coding type recognition and parameter estimation of the demodulated information stream, so as to realize the joint recognition of modulation and coding. In this paper, we propose a deep learning (DL)-based joint recognition algorithm for modulation and coding, which can achieve the recognition of modulation type and coding parameters simultaneously without using additional demodulation algorithms. Simulation results show that the proposed method performs well for the recognition of various modulation and coding types under high signal-to-noise ratio (SNR) conditions.
调制和信道编码参数的盲识别是军民通信系统中一个非常重要的研究课题。传统算法主要采用分层识别的方式实现,即先对信号进行调制识别,然后对信号进行解调,最后对解调后的信息流进行编码类型识别和参数估计,从而实现调制和编码的联合识别。本文提出了一种基于深度学习的调制和编码联合识别算法,该算法可以在不使用额外解调算法的情况下同时实现调制类型和编码参数的识别。仿真结果表明,在高信噪比条件下,该方法能够很好地识别各种调制和编码类型。
{"title":"Joint Modulation and Coding Recognition Using Deep Learning","authors":"Wang Jiao, Liao Jianqing","doi":"10.1109/ICCWAMTIP53232.2021.9674061","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674061","url":null,"abstract":"Blind identification of modulation and channel coding parameters is a very important research topic in civil-military communication systems. The traditional algorithm is mainly implemented in the way of hierarchical recognition, that is, modulation recognition of the signal first, then demodulation of the signal, and finally coding type recognition and parameter estimation of the demodulated information stream, so as to realize the joint recognition of modulation and coding. In this paper, we propose a deep learning (DL)-based joint recognition algorithm for modulation and coding, which can achieve the recognition of modulation type and coding parameters simultaneously without using additional demodulation algorithms. Simulation results show that the proposed method performs well for the recognition of various modulation and coding types under high signal-to-noise ratio (SNR) conditions.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"14 16","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114060502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1