首页 > 最新文献

2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)最新文献

英文 中文
Defect Detection Method Of LCD Complex Display Screen Combining Feature Matching and Color Correction 结合特征匹配和色彩校正的LCD复杂显示屏缺陷检测方法
Shuai Lingyu, Chen Huaixin, Wang Zhixi
Aiming at the defect detection problem in the complex detection picture of LCD, a defect detection method of complex display picture combining feature matching and color correction is proposed in this paper. Firstly, the image registration method of Speeded Up Robust Features (SURF) and projection transformation is used for high-precision geometric registration between the detected image and the standard image; Secondly, the average brightness of the RGB three channels of the image is calculated respectively, and the image color correction of adaptive histogram matching is proposed. The histogram of the low brightness channel is specified as the histogram of the high brightness channel, and the final registered image pair is obtained. Finally, support vector machine (SVM) is used to classify the residual image to obtain the binary image of defect detection. The experimental results show that the proposed method can detect complex picture display defects under illumination change and geometric distortion, the detection accuracy is 99.43%, and the recall rate is 86.19%; It has engineering application prospect.
针对LCD复杂检测图像中的缺陷检测问题,提出了一种结合特征匹配和色彩校正的复杂显示图像缺陷检测方法。首先,采用加速鲁棒特征(SURF)和投影变换相结合的图像配准方法,对检测图像与标准图像进行高精度几何配准;其次,分别计算图像RGB三通道的平均亮度,提出自适应直方图匹配的图像颜色校正方法;将低亮度通道的直方图指定为高亮度通道的直方图,得到最终的配准图像对。最后,利用支持向量机(SVM)对残差图像进行分类,得到缺陷检测的二值图像。实验结果表明,该方法能够检测出光照变化和几何畸变下的复杂图像显示缺陷,检测准确率为99.43%,召回率为86.19%;具有工程应用前景。
{"title":"Defect Detection Method Of LCD Complex Display Screen Combining Feature Matching and Color Correction","authors":"Shuai Lingyu, Chen Huaixin, Wang Zhixi","doi":"10.1109/ICCWAMTIP53232.2021.9674152","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674152","url":null,"abstract":"Aiming at the defect detection problem in the complex detection picture of LCD, a defect detection method of complex display picture combining feature matching and color correction is proposed in this paper. Firstly, the image registration method of Speeded Up Robust Features (SURF) and projection transformation is used for high-precision geometric registration between the detected image and the standard image; Secondly, the average brightness of the RGB three channels of the image is calculated respectively, and the image color correction of adaptive histogram matching is proposed. The histogram of the low brightness channel is specified as the histogram of the high brightness channel, and the final registered image pair is obtained. Finally, support vector machine (SVM) is used to classify the residual image to obtain the binary image of defect detection. The experimental results show that the proposed method can detect complex picture display defects under illumination change and geometric distortion, the detection accuracy is 99.43%, and the recall rate is 86.19%; It has engineering application prospect.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117096953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Shared Weighted Continuous Wavelet Capsule Network for Electrocardiogram Biometric Identification 共享加权连续小波胶囊网络用于心电图生物特征识别
H. Monday, J. Li, G. Nneji, E. James, Y. B. Leta, Saifun Nahar, A. Haq
In recent times, researchers are showing more interest in the subject of biometric identification, which uses biological traits to confirm a user's identity. Traditional authentication techniques are prone to damage, fraud, and negligence. We investigate a unique biometric based on electrocardiogram (ECG) signals generated from the heart as a biometric security attribute for access control verification. In this research, we propose a shared weighted continuous wavelet capsule network for ECG biometric identification, in which a continuous wavelet transform (CWT) is utilized to convert one-dimensional time-domain ECG signals into scalograms of two-dimensional images to obtain good quality training data. Then, a siamese capsule network framework is utilized to predict the right match or mismatch of ECG query samples using the extracted specific attributes from the scalograms. The dataset utilized in this work is collected from the Physionet MIT-BIH Normal Sinus Rhythm database. Experimental result shows that the proposed approach properly predicted ECG query samples with 99.2% accuracy, which makes our model more robust.
近年来,研究人员对利用生物特征来确认用户身份的生物识别技术表现出了更大的兴趣。传统的身份验证技术容易造成损坏、欺诈和疏忽。我们研究了一种基于心脏产生的心电图(ECG)信号的独特生物特征,作为访问控制验证的生物特征安全属性。在本研究中,我们提出了一种用于心电生物特征识别的共享加权连续小波胶囊网络,该网络利用连续小波变换(CWT)将一维时域心电信号转换为二维图像的尺度图,以获得高质量的训练数据。然后,利用暹罗胶囊网络框架,利用从尺度图中提取的特定属性来预测心电查询样本的正确匹配或不匹配。本研究使用的数据集来自Physionet MIT-BIH正常窦性心律数据库。实验结果表明,该方法对心电查询样本的预测准确率达到99.2%,增强了模型的鲁棒性。
{"title":"Shared Weighted Continuous Wavelet Capsule Network for Electrocardiogram Biometric Identification","authors":"H. Monday, J. Li, G. Nneji, E. James, Y. B. Leta, Saifun Nahar, A. Haq","doi":"10.1109/ICCWAMTIP53232.2021.9674078","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674078","url":null,"abstract":"In recent times, researchers are showing more interest in the subject of biometric identification, which uses biological traits to confirm a user's identity. Traditional authentication techniques are prone to damage, fraud, and negligence. We investigate a unique biometric based on electrocardiogram (ECG) signals generated from the heart as a biometric security attribute for access control verification. In this research, we propose a shared weighted continuous wavelet capsule network for ECG biometric identification, in which a continuous wavelet transform (CWT) is utilized to convert one-dimensional time-domain ECG signals into scalograms of two-dimensional images to obtain good quality training data. Then, a siamese capsule network framework is utilized to predict the right match or mismatch of ECG query samples using the extracted specific attributes from the scalograms. The dataset utilized in this work is collected from the Physionet MIT-BIH Normal Sinus Rhythm database. Experimental result shows that the proposed approach properly predicted ECG query samples with 99.2% accuracy, which makes our model more robust.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126840097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Incremental Learning for Radio Frequency Fingerprint Identification 射频指纹识别的增量学习
Di Liu, Chuan Liu, Maosen Yuan
With the rapid development of Internet of Things technology, wireless communication become an essential part in every field, which also bring about many wireless communication security problems. Traditional solutions to wireless communication security problems are mostly at the software level and protocol level, ignoring the physical characteristics of the device itself. Radio frequency fingerprint (RFF) can distinguish different devices in the physical level. Most of the existing incremental learning based radio frequency fingerprint identification (RFFI) are need a large amount of old data. In this paper, we review lots of RFFI method based on ML, DL or IL, and summarize a generic framework for RFFI, and propose our method to efficiently reduce the needed amount of old data in IL based RFFI, which saves training time and storage space.
随着物联网技术的飞速发展,无线通信成为各个领域必不可少的组成部分,同时也带来了许多无线通信安全问题。传统的无线通信安全问题解决方案大多停留在软件层和协议层,忽略了设备本身的物理特性。射频指纹(RFF)可以在物理层面上区分不同的设备。现有的基于增量学习的射频指纹识别(RFFI)大多需要大量的旧数据。在本文中,我们回顾了大量基于ML、DL和IL的RFFI方法,总结了一个通用的RFFI框架,并提出了我们的方法来有效地减少基于IL的RFFI中所需的旧数据量,从而节省了训练时间和存储空间。
{"title":"Incremental Learning for Radio Frequency Fingerprint Identification","authors":"Di Liu, Chuan Liu, Maosen Yuan","doi":"10.1109/ICCWAMTIP53232.2021.9674117","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674117","url":null,"abstract":"With the rapid development of Internet of Things technology, wireless communication become an essential part in every field, which also bring about many wireless communication security problems. Traditional solutions to wireless communication security problems are mostly at the software level and protocol level, ignoring the physical characteristics of the device itself. Radio frequency fingerprint (RFF) can distinguish different devices in the physical level. Most of the existing incremental learning based radio frequency fingerprint identification (RFFI) are need a large amount of old data. In this paper, we review lots of RFFI method based on ML, DL or IL, and summarize a generic framework for RFFI, and propose our method to efficiently reduce the needed amount of old data in IL based RFFI, which saves training time and storage space.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128230451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Estimation for Remaining Useful Life Based on a Complex Context Aggregation Model 基于复杂上下文聚合模型的剩余使用寿命估计
Zhang Yusen, Zhang Bozhou, Sun Ming
Deep learning is wildly used in remaining useful life estimation of mechanical equipment. However, existing methods couldn't avoid losing useful information during the process of extracting feature. In order to extract rich feature from limited data, we proposed a prognostic model using residual network and dilated convolution to aggregat complex contextual information during training. Furthermore, time-frequency analysis is also utilized in our method to combine useful information in frequency and time domain. Experimental results represented that our method makes better results on remaining useful life estimation over other methods using deep learning.
深度学习被广泛应用于机械设备的剩余使用寿命估计。然而,现有的方法在提取特征的过程中难免会丢失有用的信息。为了从有限的数据中提取丰富的特征,我们提出了一种基于残差网络和扩展卷积的预测模型,在训练过程中对复杂的上下文信息进行聚合。此外,我们的方法还利用时频分析来结合频域和时域的有用信息。实验结果表明,该方法在剩余使用寿命估计上优于其他深度学习方法。
{"title":"Estimation for Remaining Useful Life Based on a Complex Context Aggregation Model","authors":"Zhang Yusen, Zhang Bozhou, Sun Ming","doi":"10.1109/ICCWAMTIP53232.2021.9674108","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674108","url":null,"abstract":"Deep learning is wildly used in remaining useful life estimation of mechanical equipment. However, existing methods couldn't avoid losing useful information during the process of extracting feature. In order to extract rich feature from limited data, we proposed a prognostic model using residual network and dilated convolution to aggregat complex contextual information during training. Furthermore, time-frequency analysis is also utilized in our method to combine useful information in frequency and time domain. Experimental results represented that our method makes better results on remaining useful life estimation over other methods using deep learning.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"460 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132971438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Construction of TTPS From APT Reports Using Bert 利用Bert从APT报告构建TTPS
Li Zongxun, Li Yujun, Zhang Haojie, Li Juan
With the ongoing usage of networks, the number of Advanced Persistent Threat (APT) attacks has grown in recent years. When compared to real-time APT attack detection, analyzing APT reports enables faster dissemination of cyber threat intelligence (CTI) and identification of APT attacks. Thus, this paper proposes a model for automatically extracting threat actions and generating Tactics, Techniques and Procedures (TTPs) from APT reports. The model analyzes the semantics of APT reports and extracts threat actions automatically based on BERT-BiLSTM-CRF that can accurately capture the semantics of sentences. A sentence containing a threat action is fed into the trained model, and the model marks the threat action contained in the sentence. Then, we leverage existing knowledge to build a cyber threat ontology, obtain complete attack information by mapping threat actions to the ontology, and generate high-level Indicators of Compromise (IOC) and generate TTPs. Threat actions are mapped to this ontology to construct TTPs. In comparison to traditional approaches, our method achieves an average of 96% precision on the test dataset.
近年来,随着网络的不断使用,高级持续性威胁(APT)攻击的数量不断增加。与实时APT攻击检测相比,分析APT报告可以更快地传播网络威胁情报,更快地识别APT攻击。因此,本文提出了一种从APT报告中自动提取威胁动作并生成战术、技术和程序(TTPs)的模型。该模型对APT报告的语义进行分析,并基于BERT-BiLSTM-CRF自动提取威胁动作,该模型能够准确捕获句子的语义。将包含威胁动作的句子输入训练好的模型,模型标记句子中包含的威胁动作。然后,我们利用现有知识构建网络威胁本体,通过将威胁动作映射到本体,获得完整的攻击信息,并生成高级妥协指标(IOC)和生成https。将威胁动作映射到该本体以构建https。与传统方法相比,我们的方法在测试数据集上平均达到96%的精度。
{"title":"Construction of TTPS From APT Reports Using Bert","authors":"Li Zongxun, Li Yujun, Zhang Haojie, Li Juan","doi":"10.1109/ICCWAMTIP53232.2021.9674158","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674158","url":null,"abstract":"With the ongoing usage of networks, the number of Advanced Persistent Threat (APT) attacks has grown in recent years. When compared to real-time APT attack detection, analyzing APT reports enables faster dissemination of cyber threat intelligence (CTI) and identification of APT attacks. Thus, this paper proposes a model for automatically extracting threat actions and generating Tactics, Techniques and Procedures (TTPs) from APT reports. The model analyzes the semantics of APT reports and extracts threat actions automatically based on BERT-BiLSTM-CRF that can accurately capture the semantics of sentences. A sentence containing a threat action is fed into the trained model, and the model marks the threat action contained in the sentence. Then, we leverage existing knowledge to build a cyber threat ontology, obtain complete attack information by mapping threat actions to the ontology, and generate high-level Indicators of Compromise (IOC) and generate TTPs. Threat actions are mapped to this ontology to construct TTPs. In comparison to traditional approaches, our method achieves an average of 96% precision on the test dataset.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124438836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Glove CNN-Bilstm Sentiment Classification 一个手套CNN-Bilstm情感分类
Peter Atandoh, Z. Feng, D. Adu-Gyamfi, H. Leka, Paul H. Atandoh
Reviewing products online has become an increasingly popular way for consumers to voice their opinions and feelings about a product or service. Analyzing this Big data of online reviews would help to discern and extract useful facts and information that could provide a competitive and economic advantage to merchants and other organizations that are interested. Text classification organizes documents according to a variety of predefined categories. In other to solve the aforementioned problems, we employed Glove embeddings for our review sentiment analysis. We further integrate this embedding layer into a deep convolutional neural network (CNN)-bidirectional LSTM model. We further train our model on the IMDB and movie review dataset to extract the polarity as positive or negative and subsequently compare our model with other state-of- the-art models. The aforementioned experiments validate the efficacy and superiority of our proposed approach.
网上评论产品已经成为消费者表达他们对产品或服务的意见和感受的一种越来越流行的方式。分析这些在线评论的大数据将有助于辨别和提取有用的事实和信息,这些事实和信息可以为感兴趣的商家和其他组织提供竞争和经济优势。文本分类根据各种预定义的类别组织文档。为了解决上述问题,我们使用手套嵌入来进行评论情感分析。我们进一步将该嵌入层集成到深度卷积神经网络(CNN)-双向LSTM模型中。我们在IMDB和电影评论数据集上进一步训练我们的模型,以提取极性为正或负,随后将我们的模型与其他最先进的模型进行比较。上述实验验证了该方法的有效性和优越性。
{"title":"A Glove CNN-Bilstm Sentiment Classification","authors":"Peter Atandoh, Z. Feng, D. Adu-Gyamfi, H. Leka, Paul H. Atandoh","doi":"10.1109/ICCWAMTIP53232.2021.9674171","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674171","url":null,"abstract":"Reviewing products online has become an increasingly popular way for consumers to voice their opinions and feelings about a product or service. Analyzing this Big data of online reviews would help to discern and extract useful facts and information that could provide a competitive and economic advantage to merchants and other organizations that are interested. Text classification organizes documents according to a variety of predefined categories. In other to solve the aforementioned problems, we employed Glove embeddings for our review sentiment analysis. We further integrate this embedding layer into a deep convolutional neural network (CNN)-bidirectional LSTM model. We further train our model on the IMDB and movie review dataset to extract the polarity as positive or negative and subsequently compare our model with other state-of- the-art models. The aforementioned experiments validate the efficacy and superiority of our proposed approach.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123659619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Intelligent Phishing Url Detection: A Solution Based On Deep Learning Framework 基于深度学习框架的网络钓鱼Url智能检测解决方案
Muhammad Hassaan Farooq Butt, J. Li, Tehreem Saboor, M. Arslan, Muhammad Adnan Farooq Butt
On the Internet, every different day, kinds of attacks are deployed on innocent users. Among all, phishing is the most severe attack in which users lose their credentials or private information and their financial status quickly. The attacker uses their credibility or sensitive information to harm the target or victim. The attacker is clever and uses different strategies to fetch user-sensitive information. The existing techniques fail to overcome these issues to some extent. This work focuses on discovering the essential features that help to differentiate the legitimate and illegitimate URLs. We applied a deep learning technique on the benchmark datasets to identify the pattern of phishing URLs. We used gradient boosted decision trees algorithm to train our model and applied the regular deeply connected neural network layers in various sequences and Adam optimizer. The most found patterns will help the system to detect phishing URLs and avoid phishing. We consider the accuracy, Ff-score, and Root Mean Square Error (RMSE) as our evaluation metrics for model evaluation. The results show that the trained model can achieve an approximately 92% accuracy and 94% f-score.
在互联网上,每天都有针对无辜用户的各种攻击。其中,网络钓鱼是最严重的攻击,在这种攻击中,用户会迅速丢失他们的凭据或私人信息以及他们的财务状况。攻击者利用他们的信誉或敏感信息来伤害目标或受害者。攻击者很聪明,使用不同的策略来获取用户敏感信息。现有的技术在一定程度上无法克服这些问题。这项工作的重点是发现有助于区分合法和非法url的基本特征。我们在基准数据集上应用了深度学习技术来识别网络钓鱼url的模式。我们使用梯度增强决策树算法来训练我们的模型,并在各种序列中应用规则深度连接神经网络层和Adam优化器。发现最多的模式将有助于系统检测网络钓鱼url并避免网络钓鱼。我们考虑准确性、Ff-score和均方根误差(RMSE)作为模型评估的评估指标。结果表明,训练后的模型可以达到约92%的准确率和94%的f-score。
{"title":"Intelligent Phishing Url Detection: A Solution Based On Deep Learning Framework","authors":"Muhammad Hassaan Farooq Butt, J. Li, Tehreem Saboor, M. Arslan, Muhammad Adnan Farooq Butt","doi":"10.1109/ICCWAMTIP53232.2021.9674162","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674162","url":null,"abstract":"On the Internet, every different day, kinds of attacks are deployed on innocent users. Among all, phishing is the most severe attack in which users lose their credentials or private information and their financial status quickly. The attacker uses their credibility or sensitive information to harm the target or victim. The attacker is clever and uses different strategies to fetch user-sensitive information. The existing techniques fail to overcome these issues to some extent. This work focuses on discovering the essential features that help to differentiate the legitimate and illegitimate URLs. We applied a deep learning technique on the benchmark datasets to identify the pattern of phishing URLs. We used gradient boosted decision trees algorithm to train our model and applied the regular deeply connected neural network layers in various sequences and Adam optimizer. The most found patterns will help the system to detect phishing URLs and avoid phishing. We consider the accuracy, Ff-score, and Root Mean Square Error (RMSE) as our evaluation metrics for model evaluation. The results show that the trained model can achieve an approximately 92% accuracy and 94% f-score.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127191361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Deep Learning Based Matrix Factorization For Collaborative Filtering 基于深度学习的矩阵分解协同过滤
Abebe Tegene, Qiao Liu, S. Muhammed, H. Leka
Collaborative Filtering based on matrix factorization (MF) has shown tremendous success in the field recommender system. However, MF has difficulty in handling sparsity and scalability. These resulted in low quality of recommendations. In this regard, deep learning has shown immense success in different application areas including recommender systems. To address the limitations, we incorporate deep learning architecture to matrix factorization and develop a novel mode. The core idea of the method is to map users and items input vector to two well-structured deep neural network architectures separately for factorization. Then, we incorporate inner product to the output layers of the network to predict the rating scores. The use of this structure significantly improve the quality of recommendation. The experimental result on real data sets shows that our proposed model outperformed state of the art methods.
基于矩阵分解的协同过滤在现场推荐系统中取得了巨大的成功。然而,MF在处理稀疏性和可扩展性方面存在困难。这导致了低质量的推荐。在这方面,深度学习在包括推荐系统在内的不同应用领域取得了巨大的成功。为了解决这些局限性,我们将深度学习架构结合到矩阵分解中,并开发了一种新的模式。该方法的核心思想是将用户和项目输入向量分别映射到两个结构良好的深度神经网络体系结构中进行分解。然后,我们将内积结合到网络的输出层中来预测评级分数。使用这种结构可以显著提高推荐质量。在实际数据集上的实验结果表明,我们提出的模型优于目前的方法。
{"title":"Deep Learning Based Matrix Factorization For Collaborative Filtering","authors":"Abebe Tegene, Qiao Liu, S. Muhammed, H. Leka","doi":"10.1109/ICCWAMTIP53232.2021.9674157","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674157","url":null,"abstract":"Collaborative Filtering based on matrix factorization (MF) has shown tremendous success in the field recommender system. However, MF has difficulty in handling sparsity and scalability. These resulted in low quality of recommendations. In this regard, deep learning has shown immense success in different application areas including recommender systems. To address the limitations, we incorporate deep learning architecture to matrix factorization and develop a novel mode. The core idea of the method is to map users and items input vector to two well-structured deep neural network architectures separately for factorization. Then, we incorporate inner product to the output layers of the network to predict the rating scores. The use of this structure significantly improve the quality of recommendation. The experimental result on real data sets shows that our proposed model outperformed state of the art methods.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127207732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research and Analysis Of Extraction and Recognition INS Criptions of Bronzebased On Improved K-Means and Convo Lutional Neural Network 基于改进k均值和卷积神经网络的青铜INS文字提取与识别研究与分析
L. Wei, Guo Xue, Yu Lin, L. Yi
The natural language processing of Bronze inscriptions is the pivotal step to the study of the historical use of Bronze inscriptions, and the recognition of Bronze inscription words relics is the most important part. Due to its long history and complex font, the difficulty of recognition is increased a lot. At present, convolutional neural network has been widely used in the field of photo recognition, but it has few application in the field of Bronze inscriptions recognition. This paper proposes a method of Bronze inscriptions' extract and recognition based on improved k-means and convolutional neural network, using the improved k-means algorithm to extract characters, which makes preparations for the recognition of convolutional neural network. Experiments has shown that the improved method has significantly improved the accuracy and speed of Bronze inscriptions recognition, and it is also considerably helpful to the Bronze inscriptions research.
青铜器文字的自然语言处理是研究青铜器文字历史使用的关键步骤,而青铜器文字遗迹的识别是其中最重要的部分。由于其历史悠久,字体复杂,大大增加了识别的难度。目前,卷积神经网络在照片识别领域得到了广泛的应用,但在青铜铭文识别领域的应用却很少。本文提出了一种基于改进k-means和卷积神经网络的青铜器铭文提取与识别方法,利用改进k-means算法提取文字,为卷积神经网络的识别做准备。实验表明,改进后的方法显著提高了青铜器铭文识别的准确率和速度,对青铜器铭文研究也有很大的帮助。
{"title":"Research and Analysis Of Extraction and Recognition INS Criptions of Bronzebased On Improved K-Means and Convo Lutional Neural Network","authors":"L. Wei, Guo Xue, Yu Lin, L. Yi","doi":"10.1109/ICCWAMTIP53232.2021.9674164","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674164","url":null,"abstract":"The natural language processing of Bronze inscriptions is the pivotal step to the study of the historical use of Bronze inscriptions, and the recognition of Bronze inscription words relics is the most important part. Due to its long history and complex font, the difficulty of recognition is increased a lot. At present, convolutional neural network has been widely used in the field of photo recognition, but it has few application in the field of Bronze inscriptions recognition. This paper proposes a method of Bronze inscriptions' extract and recognition based on improved k-means and convolutional neural network, using the improved k-means algorithm to extract characters, which makes preparations for the recognition of convolutional neural network. Experiments has shown that the improved method has significantly improved the accuracy and speed of Bronze inscriptions recognition, and it is also considerably helpful to the Bronze inscriptions research.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114858365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
6G, LIFI and WIFI Wireless Systems: Challenges, Development and Prospects 6G, LIFI和WIFI无线系统:挑战,发展和前景
Chang Zeyu
While 5G is being deployed commercially worldwide, scientists have carried out research for 6G as well as WIFI 6G bands, and LIFI are also tested. Both advantages and disadvantages of these three wireless communication methods are focused and the respective application scenarios are described as well as the difficulties and challenges to be overcome. An integrated network system of space and earth is proposed to provide users with ubiquitous wireless network connection. Technologies and challenges required by three communication methods are sorted out and the way they can be combined and applied are analyzed through extensive research and analysis.
虽然5G正在全球范围内进行商业部署,但科学家们已经对6G和WIFI 6G频段进行了研究,LIFI也在进行测试。重点介绍了这三种无线通信方式的优缺点,描述了各自的应用场景以及需要克服的困难和挑战。提出了一种空间与地球一体化网络系统,为用户提供无处不在的无线网络连接。通过广泛的研究和分析,梳理了三种通信方式所需要的技术和挑战,并分析了三种通信方式的组合和应用方式。
{"title":"6G, LIFI and WIFI Wireless Systems: Challenges, Development and Prospects","authors":"Chang Zeyu","doi":"10.1109/ICCWAMTIP53232.2021.9674090","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674090","url":null,"abstract":"While 5G is being deployed commercially worldwide, scientists have carried out research for 6G as well as WIFI 6G bands, and LIFI are also tested. Both advantages and disadvantages of these three wireless communication methods are focused and the respective application scenarios are described as well as the difficulties and challenges to be overcome. An integrated network system of space and earth is proposed to provide users with ubiquitous wireless network connection. Technologies and challenges required by three communication methods are sorted out and the way they can be combined and applied are analyzed through extensive research and analysis.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130183822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1