首页 > 最新文献

2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)最新文献

英文 中文
Systematic Advancement of Yolo Object Detector For Real-Time Detection of Objects 面向目标实时检测的Yolo目标检测器的系统进展
Ejiyi Chukwuebuka Joseph, O. Bamisile, Nneji Ugochi, Qin Zhen, Ndalahwa Ilakoze, Chikwendu A. Ijeoma
This paper explicates the systematic advancements that were observed from the inception of the YOLO (You Only Look Once) object detector to the most recent version 4. Since its introduction in late 2015, YOLO has recorded tremendous implementation as well as improvements and applications. In this work, a brief survey of the YOLO network is presented considering the introduction that was made to each version that succeeded each preceding version and the advancement on how the model performed with detection. We used the latest version of the network (YOLOv4) to train 50 classes of objects that we considered popular objects for real-time detection. The model trained obtained an mAP of 64.80% @IoU of 0.5 and when deployed for real-time detection, it achieved a 43FPS speed of detection.
本文阐述了从YOLO(你只看一次)目标探测器开始到最近的版本4所观察到的系统进步。自2015年底推出以来,YOLO取得了巨大的实施、改进和应用。在这项工作中,考虑到对继承前一个版本的每个版本的介绍以及模型如何执行检测的进展,对YOLO网络进行了简要的调查。我们使用最新版本的网络(YOLOv4)来训练50类对象,我们认为这些对象是实时检测的常用对象。训练后的模型mAP为64.80% @IoU为0.5,用于实时检测时,检测速度达到43FPS。
{"title":"Systematic Advancement of Yolo Object Detector For Real-Time Detection of Objects","authors":"Ejiyi Chukwuebuka Joseph, O. Bamisile, Nneji Ugochi, Qin Zhen, Ndalahwa Ilakoze, Chikwendu A. Ijeoma","doi":"10.1109/ICCWAMTIP53232.2021.9674163","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674163","url":null,"abstract":"This paper explicates the systematic advancements that were observed from the inception of the YOLO (You Only Look Once) object detector to the most recent version 4. Since its introduction in late 2015, YOLO has recorded tremendous implementation as well as improvements and applications. In this work, a brief survey of the YOLO network is presented considering the introduction that was made to each version that succeeded each preceding version and the advancement on how the model performed with detection. We used the latest version of the network (YOLOv4) to train 50 classes of objects that we considered popular objects for real-time detection. The model trained obtained an mAP of 64.80% @IoU of 0.5 and when deployed for real-time detection, it achieved a 43FPS speed of detection.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121308080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on Design Document Tampering Detection and Location Based on Blockchain Technology 基于区块链技术的设计文档篡改检测与定位研究
Liu Yaning, Wang Juan, Li Liangxiao, Ma Quan, Gong Xuepeng
This paper decomposes the multi-element DXF format design file, extracts the most important layer, block, entity element and the number of entities according to the elements, and constitutes the characteristics of the design file; Then, the extracted features are taken as the underlying leaves, and the Merkel tree based on MD5 algorithm is used to get the tamper proof code. By comparing the tamper resistant code, we can detect whether tampering occurs and locate the tampering location, and store the tamper resistant code and tampering location information on the chain, using the characteristics of the blockchain to ensure that they are not tampered and traceable.
本文对多元素DXF格式设计文件进行分解,根据元素提取出最重要的层、块、实体元素和实体数量,构成设计文件的特征;然后,将提取的特征作为底层叶子,利用基于MD5算法的默克尔树得到防篡改码。通过比较防篡改代码,我们可以检测是否发生篡改并定位篡改位置,并将防篡改代码和篡改位置信息存储在链上,利用区块链的特性确保其不被篡改和可追溯。
{"title":"Research on Design Document Tampering Detection and Location Based on Blockchain Technology","authors":"Liu Yaning, Wang Juan, Li Liangxiao, Ma Quan, Gong Xuepeng","doi":"10.1109/ICCWAMTIP53232.2021.9674104","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674104","url":null,"abstract":"This paper decomposes the multi-element DXF format design file, extracts the most important layer, block, entity element and the number of entities according to the elements, and constitutes the characteristics of the design file; Then, the extracted features are taken as the underlying leaves, and the Merkel tree based on MD5 algorithm is used to get the tamper proof code. By comparing the tamper resistant code, we can detect whether tampering occurs and locate the tampering location, and store the tamper resistant code and tampering location information on the chain, using the characteristics of the blockchain to ensure that they are not tampered and traceable.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123759100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Box-Covering Fractal Dimension of Complex Network: From the View of Effective Distance 复杂网络的盒覆盖分形维数:基于有效距离的视角
Song Zhengyan
The fractal property of networks, that is, self-similarity, is a basic but important topic in the area of complex networks. In the process of studying the fractal characteristics of complex networks, the topological distance of unweighted networks is often used to represent the network. However, this ignores some local information of the network, such as the contribution of edges to node degrees. It is inconsistent with common sense. Therefore, in this paper, we propose a new algorithm which replace the traditional topological distance with the effective distance to calculate fractal dimension reasonably. Moreover, we apply this algorithm to five real networks, and the experiment results show the effectiveness and correctness of using effective distance instead of topological distance.
网络的分形特性,即自相似性,是复杂网络领域中一个基本而又重要的研究课题。在研究复杂网络的分形特征过程中,经常使用未加权网络的拓扑距离来表示网络。然而,这忽略了网络的一些局部信息,比如边对节点度的贡献。这与常识不符。因此,本文提出了一种新的分形维数计算算法,用有效距离代替传统的拓扑距离来合理地计算分形维数。将该算法应用于5个实际网络,实验结果表明了用有效距离代替拓扑距离的有效性和正确性。
{"title":"Box-Covering Fractal Dimension of Complex Network: From the View of Effective Distance","authors":"Song Zhengyan","doi":"10.1109/ICCWAMTIP53232.2021.9674114","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674114","url":null,"abstract":"The fractal property of networks, that is, self-similarity, is a basic but important topic in the area of complex networks. In the process of studying the fractal characteristics of complex networks, the topological distance of unweighted networks is often used to represent the network. However, this ignores some local information of the network, such as the contribution of edges to node degrees. It is inconsistent with common sense. Therefore, in this paper, we propose a new algorithm which replace the traditional topological distance with the effective distance to calculate fractal dimension reasonably. Moreover, we apply this algorithm to five real networks, and the experiment results show the effectiveness and correctness of using effective distance instead of topological distance.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129633765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Improvement of AFL Based On The Function Call Depth 基于函数调用深度的AFL改进
Tiankai Li, Jian-Pin Li, Xi He
Fuzzing is a technology that can automatically discover the vulnerabilities of the target program. It generates test cases from the seeds and runs the target program, monitors the abnormal behavior of the target program, and then discovers test samples that can trigger the vulnerabilities. As one of the cornerstones of the fuzzing field, American Fuzzy Lop (AFL) has been widely studied by industry and academia because of its high efficiency and strong practicability. After an in-depth study of AFL and its improved version AFLFast, it is found that gray-box fuzzing tools represented by AFL are more concerned with edge coverage and do not use function call depth as one of the indicators. This paper introduces the function call depth as one of the coverage indicators, optimizes the non-deterministic mutation stage of AFL, and developed a demo deepAFL. Experiments are carried out on the LAVA-M test set. The results show that the effectiveness of seeds and the efficiency of fuzzing are improved.
模糊测试是一种能够自动发现目标程序漏洞的技术。它从种子生成测试用例并运行目标程序,监视目标程序的异常行为,然后发现可以触发漏洞的测试样本。作为模糊测量领域的奠基石之一,美国Fuzzy Lop (AFL)以其高效率和较强的实用性得到了工业界和学术界的广泛研究。通过对AFL及其改进版本AFLFast的深入研究,发现以AFL为代表的灰盒模糊工具更关注边缘覆盖率,而没有将函数调用深度作为指标之一。本文引入函数调用深度作为覆盖指标之一,对AFL的不确定性突变阶段进行了优化,并开发了一个deepAFL演示。在LAVA-M试验台上进行了实验。结果表明,该方法提高了种子的有效性和模糊处理的效率。
{"title":"An Improvement of AFL Based On The Function Call Depth","authors":"Tiankai Li, Jian-Pin Li, Xi He","doi":"10.1109/ICCWAMTIP53232.2021.9674138","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674138","url":null,"abstract":"Fuzzing is a technology that can automatically discover the vulnerabilities of the target program. It generates test cases from the seeds and runs the target program, monitors the abnormal behavior of the target program, and then discovers test samples that can trigger the vulnerabilities. As one of the cornerstones of the fuzzing field, American Fuzzy Lop (AFL) has been widely studied by industry and academia because of its high efficiency and strong practicability. After an in-depth study of AFL and its improved version AFLFast, it is found that gray-box fuzzing tools represented by AFL are more concerned with edge coverage and do not use function call depth as one of the indicators. This paper introduces the function call depth as one of the coverage indicators, optimizes the non-deterministic mutation stage of AFL, and developed a demo deepAFL. Experiments are carried out on the LAVA-M test set. The results show that the effectiveness of seeds and the efficiency of fuzzing are improved.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129719713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multimodal Melanoma Detection with Federated Learning 基于联邦学习的多模态黑色素瘤检测
B. L. Y. Agbley, Jianping Li, A. Haq, E. K. Bankas, Sultan Ahmad, Isaac Osei Agyemang, D. Kulevome, Waldiodio David Ndiaye, Bernard M. Cobbinah, Shoistamo Latipova
Melanoma disease analysis is increasingly approached using statistical machine learning techniques, including deep learning. These techniques require large sizes of datasets. However, health institutions are inhibited from sharing their patients' data due to concerns regarding the privacy of subjects. This paper presents a methodology that utilizes Federated Learning (FL) in ensuring the preservation of subjects' privacy during training. We fused two modalities: skin lesion images and their corresponding clinical data. The performance of the global federated model was compared with the results of a Centralized Learning (CL) scenario. The FL model is on-par with the CL model with only 0.39% and 0.73% higher F1-Score and Accuracy performances, respectively, obtained by the CL model. Through extended fine-tuning, the performance difference could be further minimized. Moreover, the FL model was 3.27% more sensitive than the CL model, hence correctly classified more positives than the CL model. Our model also obtained competitive performance when compared with other models from literature. The results indicate the capability of federated learning in effectively learning high predictive models while ensuring no training data is shared among the participating clients.
黑色素瘤疾病分析越来越多地使用统计机器学习技术,包括深度学习。这些技术需要大量的数据集。然而,由于担心受试者的隐私,卫生机构被禁止分享患者的数据。本文提出了一种利用联邦学习(FL)来保证训练过程中受试者隐私保护的方法。我们融合了两种模式:皮肤病变图像和相应的临床数据。将全局联邦模型的性能与集中式学习(CL)场景的结果进行了比较。FL模型与CL模型相当,但CL模型的F1-Score和准确率分别仅高出0.39%和0.73%。通过扩展的微调,性能差异可以进一步最小化。此外,FL模型比CL模型敏感性高3.27%,因此比CL模型正确分类了更多的阳性结果。与文献中的其他模型相比,我们的模型也具有一定的竞争力。结果表明,联邦学习能够有效地学习高预测模型,同时确保参与的客户端之间不共享训练数据。
{"title":"Multimodal Melanoma Detection with Federated Learning","authors":"B. L. Y. Agbley, Jianping Li, A. Haq, E. K. Bankas, Sultan Ahmad, Isaac Osei Agyemang, D. Kulevome, Waldiodio David Ndiaye, Bernard M. Cobbinah, Shoistamo Latipova","doi":"10.1109/ICCWAMTIP53232.2021.9674116","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674116","url":null,"abstract":"Melanoma disease analysis is increasingly approached using statistical machine learning techniques, including deep learning. These techniques require large sizes of datasets. However, health institutions are inhibited from sharing their patients' data due to concerns regarding the privacy of subjects. This paper presents a methodology that utilizes Federated Learning (FL) in ensuring the preservation of subjects' privacy during training. We fused two modalities: skin lesion images and their corresponding clinical data. The performance of the global federated model was compared with the results of a Centralized Learning (CL) scenario. The FL model is on-par with the CL model with only 0.39% and 0.73% higher F1-Score and Accuracy performances, respectively, obtained by the CL model. Through extended fine-tuning, the performance difference could be further minimized. Moreover, the FL model was 3.27% more sensitive than the CL model, hence correctly classified more positives than the CL model. Our model also obtained competitive performance when compared with other models from literature. The results indicate the capability of federated learning in effectively learning high predictive models while ensuring no training data is shared among the participating clients.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129822238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
A Sovereign PKI for IoT Devices Based on the Blockchain Technology 基于区块链技术的物联网设备主权PKI
I. Obiri, Jingcong Yang, Qi Xia, Jianbin Gao
In the Internet of Things (IoT) environment, public key distribution and device authentication remain the most significant security challenges. To validate the authenticity of the identity of IoT devices, existing solutions depend on Public Key Infrastructure (PKI) backed by Certificate Authorities (CA). CA-based PKI has flaws in terms of a single point of failure and certificate transparency. While some blockchain-based PKI solutions exist, they either have a high storage overhead or require a lot of cryptographic computations in the smart contract, which can exceed the transaction size limit on the blockchain network. Hence, we propose a sovereign PKI for IoT devices based on blockchain technology, in which individual controls and maintains the public and private keys for the IoT devices he or she owns. Public keys are kept in a decentralized key store database (DKSB). The blockchain serves as the ground proof for authenticating identities (public keys) on the DKSB. Cryptographic operations like identity authentication are done off-chain without incurring transaction fees.
在物联网(IoT)环境中,公钥分发和设备认证仍然是最重要的安全挑战。为了验证物联网设备身份的真实性,现有的解决方案依赖于由证书颁发机构(CA)支持的公钥基础设施(PKI)。基于ca的PKI在单点故障和证书透明度方面存在缺陷。虽然存在一些基于区块链的PKI解决方案,但它们要么具有很高的存储开销,要么需要在智能合约中进行大量的加密计算,这可能超过区块链网络上的交易大小限制。因此,我们提出了一个基于区块链技术的物联网设备主权PKI,其中个人控制和维护他或她拥有的物联网设备的公钥和私钥。公钥保存在分散的密钥存储数据库(DKSB)中。区块链作为DKSB上验证身份(公钥)的基础证明。身份认证等加密操作是在链下完成的,不会产生交易费用。
{"title":"A Sovereign PKI for IoT Devices Based on the Blockchain Technology","authors":"I. Obiri, Jingcong Yang, Qi Xia, Jianbin Gao","doi":"10.1109/ICCWAMTIP53232.2021.9674095","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674095","url":null,"abstract":"In the Internet of Things (IoT) environment, public key distribution and device authentication remain the most significant security challenges. To validate the authenticity of the identity of IoT devices, existing solutions depend on Public Key Infrastructure (PKI) backed by Certificate Authorities (CA). CA-based PKI has flaws in terms of a single point of failure and certificate transparency. While some blockchain-based PKI solutions exist, they either have a high storage overhead or require a lot of cryptographic computations in the smart contract, which can exceed the transaction size limit on the blockchain network. Hence, we propose a sovereign PKI for IoT devices based on blockchain technology, in which individual controls and maintains the public and private keys for the IoT devices he or she owns. Public keys are kept in a decentralized key store database (DKSB). The blockchain serves as the ground proof for authenticating identities (public keys) on the DKSB. Cryptographic operations like identity authentication are done off-chain without incurring transaction fees.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130938309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Authenticity Verification Scheme Based On Tee and Blockchain 基于Tee和区块链的真实性验证方案
Mou Jianhua, Zheng Qiaoyan, He Guotian
IoT devices constitute the key infrastructure to support various important IoT applications. To ensure the high reliability of these devices and their generated data, a dual verification framework based on a trusted execution environment and Blockchain was proposed to verify the device identity and data authenticity in this paper. In addition, the security of the framework is also analyzed. The scheme provides a data verification reference for the expansion of the ecological application of the IoT.
物联网设备构成了支持各种重要物联网应用的关键基础设施。为了保证这些设备及其生成数据的高可靠性,本文提出了一种基于可信执行环境和区块链的双重验证框架,对设备身份和数据真实性进行验证。此外,还对框架的安全性进行了分析。该方案为物联网生态应用的拓展提供了数据验证参考。
{"title":"Authenticity Verification Scheme Based On Tee and Blockchain","authors":"Mou Jianhua, Zheng Qiaoyan, He Guotian","doi":"10.1109/ICCWAMTIP53232.2021.9673712","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9673712","url":null,"abstract":"IoT devices constitute the key infrastructure to support various important IoT applications. To ensure the high reliability of these devices and their generated data, a dual verification framework based on a trusted execution environment and Blockchain was proposed to verify the device identity and data authenticity in this paper. In addition, the security of the framework is also analyzed. The scheme provides a data verification reference for the expansion of the ecological application of the IoT.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127165938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimization of Intention Detection Based on Metric Learning 基于度量学习的意图检测优化
Liu Di, Kong Xinyue, Yong-Cheul Jun
With the development of machine learning, transfer learning has great development prospect and commercial value compared with the traditional supervised learning. As neural network developed, transfer learning based on metric learning is widely used in the field of Computer Vision and gradually applied to Natural Language Processing. This paper proposes to use BERT encoder and BiLSTM to improve the performance of intention detection especially in classification performance. SMP2017 data set shows that it can effectively improve the accuracy of intention detection when the sample size is small and uneven.
随着机器学习的发展,迁移学习与传统的监督学习相比具有很大的发展前景和商业价值。随着神经网络的发展,基于度量学习的迁移学习在计算机视觉领域得到了广泛的应用,并逐渐应用到自然语言处理领域。本文提出使用BERT编码器和BiLSTM来提高意图检测的性能,特别是在分类性能方面。SMP2017数据集表明,在样本量较小且不均匀的情况下,可以有效提高意图检测的准确率。
{"title":"Optimization of Intention Detection Based on Metric Learning","authors":"Liu Di, Kong Xinyue, Yong-Cheul Jun","doi":"10.1109/ICCWAMTIP53232.2021.9674093","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674093","url":null,"abstract":"With the development of machine learning, transfer learning has great development prospect and commercial value compared with the traditional supervised learning. As neural network developed, transfer learning based on metric learning is widely used in the field of Computer Vision and gradually applied to Natural Language Processing. This paper proposes to use BERT encoder and BiLSTM to improve the performance of intention detection especially in classification performance. SMP2017 data set shows that it can effectively improve the accuracy of intention detection when the sample size is small and uneven.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126687601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research On The Construction of Agricultural Product Quality Maintenance And Quality Traceability System Based On Big Data 基于大数据的农产品质量维护与质量追溯系统构建研究
Yang Yujun, Yang Yimei, Zhouqiong Wang, Xi Hongbo, Li Liyun
The quality and safety of agricultural products has been widely concerned by the whole society in recent years. Therefore, the traceability of agricultural products is a research hotspot of scholars. The quality and safety traceability system of agricultural products is an important method to monitor the quality and safety of agricultural products. The emergence and use of big data help to solve the problems of high cost, scattered information and incomplete industrial chain of quality and safety traceability of agricultural products and improve the efficiency and accuracy of the quality and safety traceability system of agricultural products. There are still some problems in the application of big data, such as weak pertinence. It is necessary to mine and use big data to realize the traceability of agricultural products.
近年来,农产品质量安全问题受到全社会的广泛关注。因此,农产品的可追溯性是学者们研究的热点。农产品质量安全追溯体系是监控农产品质量安全的重要手段。大数据的出现和使用,有助于解决农产品质量安全追溯成本高、信息分散、产业链不完整等问题,提高农产品质量安全追溯体系的效率和准确性。大数据的应用还存在针对性不强等问题。要实现农产品的可追溯,需要挖掘和利用大数据。
{"title":"Research On The Construction of Agricultural Product Quality Maintenance And Quality Traceability System Based On Big Data","authors":"Yang Yujun, Yang Yimei, Zhouqiong Wang, Xi Hongbo, Li Liyun","doi":"10.1109/ICCWAMTIP53232.2021.9674175","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674175","url":null,"abstract":"The quality and safety of agricultural products has been widely concerned by the whole society in recent years. Therefore, the traceability of agricultural products is a research hotspot of scholars. The quality and safety traceability system of agricultural products is an important method to monitor the quality and safety of agricultural products. The emergence and use of big data help to solve the problems of high cost, scattered information and incomplete industrial chain of quality and safety traceability of agricultural products and improve the efficiency and accuracy of the quality and safety traceability system of agricultural products. There are still some problems in the application of big data, such as weak pertinence. It is necessary to mine and use big data to realize the traceability of agricultural products.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126788012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint Modulation and Coding Recognition Using Deep Learning 基于深度学习的联合调制和编码识别
Wang Jiao, Liao Jianqing
Blind identification of modulation and channel coding parameters is a very important research topic in civil-military communication systems. The traditional algorithm is mainly implemented in the way of hierarchical recognition, that is, modulation recognition of the signal first, then demodulation of the signal, and finally coding type recognition and parameter estimation of the demodulated information stream, so as to realize the joint recognition of modulation and coding. In this paper, we propose a deep learning (DL)-based joint recognition algorithm for modulation and coding, which can achieve the recognition of modulation type and coding parameters simultaneously without using additional demodulation algorithms. Simulation results show that the proposed method performs well for the recognition of various modulation and coding types under high signal-to-noise ratio (SNR) conditions.
调制和信道编码参数的盲识别是军民通信系统中一个非常重要的研究课题。传统算法主要采用分层识别的方式实现,即先对信号进行调制识别,然后对信号进行解调,最后对解调后的信息流进行编码类型识别和参数估计,从而实现调制和编码的联合识别。本文提出了一种基于深度学习的调制和编码联合识别算法,该算法可以在不使用额外解调算法的情况下同时实现调制类型和编码参数的识别。仿真结果表明,在高信噪比条件下,该方法能够很好地识别各种调制和编码类型。
{"title":"Joint Modulation and Coding Recognition Using Deep Learning","authors":"Wang Jiao, Liao Jianqing","doi":"10.1109/ICCWAMTIP53232.2021.9674061","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674061","url":null,"abstract":"Blind identification of modulation and channel coding parameters is a very important research topic in civil-military communication systems. The traditional algorithm is mainly implemented in the way of hierarchical recognition, that is, modulation recognition of the signal first, then demodulation of the signal, and finally coding type recognition and parameter estimation of the demodulated information stream, so as to realize the joint recognition of modulation and coding. In this paper, we propose a deep learning (DL)-based joint recognition algorithm for modulation and coding, which can achieve the recognition of modulation type and coding parameters simultaneously without using additional demodulation algorithms. Simulation results show that the proposed method performs well for the recognition of various modulation and coding types under high signal-to-noise ratio (SNR) conditions.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"14 16","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114060502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1