首页 > 最新文献

Recent Advances in Computer Science and Communications最新文献

英文 中文
An Image Recognition Method Based On Dynamic System Synchronization 基于动态系统同步的图像识别方法
Q3 Computer Science Pub Date : 2022-12-01 DOI: 10.2174/2666255816666221201155914
Xiaoran Chen, Wanbo Yu, Xiang Li
At present, image recognition technology first classifies images and outputs category information through the neural network. Then search. Before retrieval, the feature database needs to be established first, and then one-to-one correspondence. This method is tedious, time-consuming and low accuracy.In the field of computer vision research, researchers have given various image recognition methods to be applied in various fields, and made many research achievements. But at present, the accuracy, stability and time efficiency can't meet the needs of practical work. In terms of UAV image recognition, high accuracy and low consumption are required. Previous methods require huge databases, which increases the consumption of UAVs. Taking aerial transmission line images as the research object, this paper proposes a method of image recognition based on chaotic synchronization. Firstly, the image is used as a function to construct a dynamic system, and the function structure and parameters are adjusted to realize chaos synchronization. In this process, different types of images are identified. At the same time, we research this dynamic system characteristics,and realize the mechanism of image recognition. Compared with other methods, the self-built aerial image data set for bird's nest identification, iron frame identification and insulator identification has the characteristics of high identification rate and less calculation time. It is preliminarily proved that the method of synchronous image recognition is practical, and also worthy of further research, verification and analysis. This article is divided into the following sections:
目前,图像识别技术首先通过神经网络对图像进行分类并输出类别信息。然后搜索。在检索前,需要先建立特征库,然后进行一一对应。该方法繁琐,耗时长,准确度低。在计算机视觉研究领域,研究者们给出了各种图像识别方法应用于各个领域,并取得了许多研究成果。但目前,其准确性、稳定性和时效性还不能满足实际工作的需要。在无人机图像识别方面,需要高精度和低功耗。以前的方法需要庞大的数据库,这增加了无人机的消耗。以航空传输线图像为研究对象,提出了一种基于混沌同步的图像识别方法。首先,将图像作为函数构建动态系统,并对函数结构和参数进行调整,实现混沌同步;在这个过程中,识别不同类型的图像。同时,研究了该动态系统的特性,实现了图像识别的机理。与其他方法相比,自建的燕窝识别、铁架识别和绝缘子识别航拍图像数据集具有识别率高、计算时间短的特点。初步证明了同步图像识别方法的实用性,也值得进一步研究、验证和分析。本文分为以下几个部分:
{"title":"An Image Recognition Method Based On Dynamic System Synchronization","authors":"Xiaoran Chen, Wanbo Yu, Xiang Li","doi":"10.2174/2666255816666221201155914","DOIUrl":"https://doi.org/10.2174/2666255816666221201155914","url":null,"abstract":"\u0000\u0000At present, image recognition technology first classifies images and outputs category information through the neural network. Then search. Before retrieval, the feature database needs to be established first, and then one-to-one correspondence. This method is tedious, time-consuming and low accuracy.In the field of computer vision research, researchers have given various image recognition methods to be applied in various fields, and made many research achievements. But at present, the accuracy, stability and time efficiency can't meet the needs of practical work. In terms of UAV image recognition, high accuracy and low consumption are required. Previous methods require huge databases, which increases the consumption of UAVs. Taking aerial transmission line images as the research object, this paper proposes a method of image recognition based on chaotic synchronization. Firstly, the image is used as a function to construct a dynamic system, and the function structure and parameters are adjusted to realize chaos synchronization. In this process, different types of images are identified. At the same time, we research this dynamic system characteristics,and realize the mechanism of image recognition. Compared with other methods, the self-built aerial image data set for bird's nest identification, iron frame identification and insulator identification has the characteristics of high identification rate and less calculation time. It is preliminarily proved that the method of synchronous image recognition is practical, and also worthy of further research, verification and analysis. This article is divided into the following sections:\u0000","PeriodicalId":36514,"journal":{"name":"Recent Advances in Computer Science and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48353330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Threat of Adversarial Attacks within Deep Learning: Survey 深度学习中对抗性攻击的威胁:调查
Q3 Computer Science Pub Date : 2022-11-25 DOI: 10.2174/2666255816666221125155715
Roshni singh, Ataussamad
In today’s era, Deep Learning has become the center of recent ascent in the field of artificial intelligence and its models. There are various Artificial Intelligence models that can be viewed as needing more strength for adversely defined information sources. It also leads to a high potential security concern in the adversarial paradigm; the DNN can also misclassify inputs that appear to expect in the result. DNN can solve complex problems accurately. It is empaneled in the vision research area to learn deep neural models for many tasks involving critical security applications. We have also revisited the contributions of computer vision in adversarial attacks on deep learning and discussed its defenses. Many of the authors have given new ideas in this area, which has evolved significantly since witnessing the first-generation methods. For optimal correctness of various research and authenticity, the focus is on peer-reviewed articles issued in the prestigious sources of computer vision and deep learning. Apart from the literature review, this paper defines some standard technical terms for non-experts in the field. This paper represents the review of the adversarial attacks via various methods and techniques along with their defenses within the deep learning area and future scope. Lastly, we bring out the survey to provide a viewpoint of the research in this Computer Vision area.
在当今时代,深度学习已成为人工智能及其模型领域最近崛起的中心。有各种各样的人工智能模型可以被视为需要更大的力量来获得负面定义的信息源。它还导致对抗性范式中高度潜在的安全问题;DNN也可能对结果中预期的输入进行错误分类。DNN可以准确地解决复杂问题。在视觉研究领域,它被任命为学习涉及关键安全应用的许多任务的深度神经模型。我们还重新审视了计算机视觉在深度学习对抗性攻击中的贡献,并讨论了其防御机制。许多作者在这一领域提出了新的想法,自第一代方法问世以来,这一领域已经发生了重大变化。为了确保各种研究的最佳正确性和真实性,重点关注在著名的计算机视觉和深度学习来源发表的同行评审文章。除了文献综述外,本文还为该领域的非专家定义了一些标准技术术语。本文综述了通过各种方法和技术进行的对抗性攻击,以及它们在深度学习领域和未来范围内的防御。最后,我们对计算机视觉领域的研究提出了一些看法。
{"title":"Threat of Adversarial Attacks within Deep Learning: Survey","authors":"Roshni singh, Ataussamad","doi":"10.2174/2666255816666221125155715","DOIUrl":"https://doi.org/10.2174/2666255816666221125155715","url":null,"abstract":"\u0000\u0000In today’s era, Deep Learning has become the center of recent ascent in the field of artificial intelligence and its models. There are various Artificial Intelligence models that can be viewed as needing more strength for adversely defined information sources. It also leads to a high potential security concern in the adversarial paradigm; the DNN can also misclassify inputs that appear to expect in the result. DNN can solve complex problems accurately. It is empaneled in the vision research area to learn deep neural models for many tasks involving critical security applications. We have also revisited the contributions of computer vision in adversarial attacks on deep learning and discussed its defenses. Many of the authors have given new ideas in this area, which has evolved significantly since witnessing the first-generation methods. For optimal correctness of various research and authenticity, the focus is on peer-reviewed articles issued in the prestigious sources of computer vision and deep learning. Apart from the literature review, this paper defines some standard technical terms for non-experts in the field. This paper represents the review of the adversarial attacks via various methods and techniques along with their defenses within the deep learning area and future scope. Lastly, we bring out the survey to provide a viewpoint of the research in this Computer Vision area.\u0000","PeriodicalId":36514,"journal":{"name":"Recent Advances in Computer Science and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45067645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Design And Challenges In Energy OptimizingCr-Wireless Sensor Networks 无线传感器网络能量优化的设计与挑战
Q3 Computer Science Pub Date : 2022-11-04 DOI: 10.2174/2666255816666221104115024
Pundru Chandra Shaker Reddy, Y. Sucharitha
The progress of the Cognitive Radio-Wireless Sensor Network is being influenced by advancements in wireless sensor networks (WSNs), which significantly have unique features of cognitive radio technology (CR-WSN). Enhancing the network lifespan of any network requires better utilization of the available spectrum as well as the selection of a good routing mechanism for transmitting informational data to the base station from the sensor node without data conflict.Cognitive radio methods play a significant part in achieving this, and when paired with WSNs, the above-mentioned objectives can be met to a large extent.A unique energy-saving Distance- Based Multi-hop Clustering and Routing (DBMCR) methodology in association with spectrum allocation is proposed as a heterogeneous CR-WSN model. The supplied heterogeneous CR-wireless sensor networks are separated into areas and assigned a different spectrum depending on the distance. Information is sent over a multi-hop connection after dynamic clustering using distance computation.The findings show that the suggested method achieves higher stability and ensures the energy-optimizing CR-WSN. The enhanced scalability can be seen in the First Node Death (FND). Additionally, the improved throughput helps to preserve the residual energy of the network which helps to address the issue of load balancing across nodes.Thus, the result acquired from the above findings shows that the proposed heterogeneous model achieves the enhanced network lifetime and ensures the energy optimizing CR-WSN.
认知无线电-无线传感器网络的发展受到无线传感器网络发展的影响,无线传感器网络具有认知无线电技术(CR-WSN)的独特特征。提高任何网络的网络寿命都需要更好地利用可用频谱,并选择一种良好的路由机制,以便在不发生数据冲突的情况下将信息数据从传感器节点传输到基站。认知无线电方法在实现这一目标方面发挥着重要作用,当与无线传感器网络配对时,上述目标可以在很大程度上得到满足。提出了一种与频谱分配相结合的基于距离的多跳聚类路由(DBMCR)方法,作为一种异构CR-WSN模型。所提供的异构cr -无线传感器网络被划分为不同的区域,并根据距离分配不同的频谱。利用距离计算进行动态聚类后,通过多跳连接发送信息。研究结果表明,该方法具有较高的稳定性,保证了CR-WSN的能量优化。增强的可伸缩性可以在第一个节点死亡(FND)中看到。此外,改进的吞吐量有助于保留网络的剩余能量,这有助于解决节点间负载平衡的问题。综上所述,本文提出的异构模型在提高网络生存期的同时,保证了CR-WSN的能量优化。
{"title":"A Design And Challenges In Energy Optimizing\u0000Cr-Wireless Sensor Networks","authors":"Pundru Chandra Shaker Reddy, Y. Sucharitha","doi":"10.2174/2666255816666221104115024","DOIUrl":"https://doi.org/10.2174/2666255816666221104115024","url":null,"abstract":"\u0000\u0000The progress of the Cognitive Radio-Wireless Sensor Network is being influenced by advancements in wireless sensor networks (WSNs), which significantly have unique features of cognitive radio technology (CR-WSN). Enhancing the network lifespan of any network requires better utilization of the available spectrum as well as the selection of a good routing mechanism for transmitting informational data to the base station from the sensor node without data conflict.\u0000\u0000\u0000\u0000Cognitive radio methods play a significant part in achieving this, and when paired with WSNs, the above-mentioned objectives can be met to a large extent.\u0000\u0000\u0000\u0000A unique energy-saving Distance- Based Multi-hop Clustering and Routing (DBMCR) methodology in association with spectrum allocation is proposed as a heterogeneous CR-WSN model. The supplied heterogeneous CR-wireless sensor networks are separated into areas and assigned a different spectrum depending on the distance. Information is sent over a multi-hop connection after dynamic clustering using distance computation.\u0000\u0000\u0000\u0000The findings show that the suggested method achieves higher stability and ensures the energy-optimizing CR-WSN. The enhanced scalability can be seen in the First Node Death (FND). Additionally, the improved throughput helps to preserve the residual energy of the network which helps to address the issue of load balancing across nodes.\u0000\u0000\u0000\u0000Thus, the result acquired from the above findings shows that the proposed heterogeneous model achieves the enhanced network lifetime and ensures the energy optimizing CR-WSN.\u0000","PeriodicalId":36514,"journal":{"name":"Recent Advances in Computer Science and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44973667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Effective COVID-19 CT Image Denoising Method Based on a Deep Convolutional Neural Network 基于深度卷积神经网络的新型冠状病毒CT图像去噪方法
Q3 Computer Science Pub Date : 2022-09-20 DOI: 10.2174/2666255816666220920150916
Xiaojing Fan, Hanyue Liu, Chunsheng Zhang, Zichao Wang, Qingming Lin, Zhanjiang Lan, Mingyang Jiang, Jie Lian, Xueyan Chen
Faced with the global threat posed by SARS-CoV-2 (COVID-19), low-dose Computed tomography (LDCT), as the primary diagnostic tool, is often accompanied by high levels of noise. And this can easily interfere with the radiologist's assessment. Convolutional Neural Networks (CNN), as a method of deep learning, have been shown to have excellent effects in image denoising.Modified convolutional neural network algorithm to train the denoising model. Make the model to extract the highlighted features of the lesion region better and ensure its effectiveness in removing noise from COVID-19 lung CT images, preserving more important detail information of the images and reducing the adverse effects of denoising.We propose a CNN-based deformable convolutional denoising neural network (DCDNet). By combining deformable convolution methods with residual learning on the basis of CNN structure, more image detail features are retained in CT image denoising.According to the noise reduction evaluation index of PSNR, SSIM and RMSE, DCDNet shows excellent denoising performance for COVID-19 CT images. From the visual effect of denoising, DCDNet can effectively remove image noise and preserve more detailed features of lung lesions.The experimental results indicate that the DCDNet-trained model is more suitable for image denoising of COVID-19 than traditional image denoising algorithms under the same training set.
面对严重急性呼吸系统综合征冠状病毒2型(新冠肺炎)造成的全球威胁,低剂量计算机断层扫描(LDCT)作为主要诊断工具,通常伴随着高水平的噪音。这很容易干扰放射科医生的评估。卷积神经网络(CNN)作为一种深度学习方法,已被证明在图像去噪方面具有良好的效果。改进卷积神经网络算法训练去噪模型。使模型更好地提取病变区域的突出特征,确保其在去除新冠肺炎肺部CT图像噪声方面的有效性,保留图像更重要的细节信息,减少去噪的不利影响。我们提出了一种基于CNN的可变形卷积去噪神经网络(DCDNet)。通过将可变形卷积方法与基于CNN结构的残差学习相结合,在CT图像去噪中保留了更多的图像细节特征。根据PSNR、SSIM和RMSE的降噪评价指标,DCDNet对新冠肺炎CT图像显示出良好的去噪性能。从去噪的视觉效果来看,DCDNet可以有效地去除图像噪声,保留肺部病变更详细的特征。实验结果表明,在相同的训练集下,DCDNet训练模型比传统的图像去噪算法更适合于新冠肺炎的图像去噪声。
{"title":"An Effective COVID-19 CT Image Denoising Method Based on a Deep Convolutional Neural Network","authors":"Xiaojing Fan, Hanyue Liu, Chunsheng Zhang, Zichao Wang, Qingming Lin, Zhanjiang Lan, Mingyang Jiang, Jie Lian, Xueyan Chen","doi":"10.2174/2666255816666220920150916","DOIUrl":"https://doi.org/10.2174/2666255816666220920150916","url":null,"abstract":"\u0000\u0000Faced with the global threat posed by SARS-CoV-2 (COVID-19), low-dose Computed tomography (LDCT), as the primary diagnostic tool, is often accompanied by high levels of noise. And this can easily interfere with the radiologist's assessment. Convolutional Neural Networks (CNN), as a method of deep learning, have been shown to have excellent effects in image denoising.\u0000\u0000\u0000\u0000Modified convolutional neural network algorithm to train the denoising model. Make the model to extract the highlighted features of the lesion region better and ensure its effectiveness in removing noise from COVID-19 lung CT images, preserving more important detail information of the images and reducing the adverse effects of denoising.\u0000\u0000\u0000\u0000We propose a CNN-based deformable convolutional denoising neural network (DCDNet). By combining deformable convolution methods with residual learning on the basis of CNN structure, more image detail features are retained in CT image denoising.\u0000\u0000\u0000\u0000According to the noise reduction evaluation index of PSNR, SSIM and RMSE, DCDNet shows excellent denoising performance for COVID-19 CT images. From the visual effect of denoising, DCDNet can effectively remove image noise and preserve more detailed features of lung lesions.\u0000\u0000\u0000\u0000The experimental results indicate that the DCDNet-trained model is more suitable for image denoising of COVID-19 than traditional image denoising algorithms under the same training set.\u0000","PeriodicalId":36514,"journal":{"name":"Recent Advances in Computer Science and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42043447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
YARN Schedulers for Hadoop MapReduce Jobs: Design Goals, Issues and Taxonomy Hadoop MapReduce作业的YARN调度器:设计目标、问题和分类
Q3 Computer Science Pub Date : 2022-08-31 DOI: 10.2174/2666255816666220831125012
Gnanendra Kotikam, S. Lokesh
Big Data processing is a demanding task, and several big data processing frameworks have emerged during recent decades. The performance of these frameworks greatly dependent on resource management models.YARN is one of such models which acts as a resource management layer and provides computational resources for execution engines (Spark, MapReduce, storm, etc.) through its schedulers. The most important aspect of resource management is job scheduling.In this paper, we first present the design goal of YARN real-life schedulers (FIFO, Capacity, and Fair) for the MapReduce engine. Later, we discuss the scheduling issues of the Hadoop MapReduce cluster.Many efforts have been carried out in the literature to address issues of data locality, heterogeneity, straggling, skew mitigation, stragglers and fairness in Hadoop MapReduce scheduling. Lastly, we present the taxonomy of different scheduling algorithms available in the literature based on some factors like environment, scope, approach, objective and addressed issues.
大数据处理是一项要求很高的任务,近几十年来出现了几种大数据处理框架。这些框架的性能在很大程度上依赖于资源管理模型。YARN就是这样一个模型,它作为一个资源管理层,通过它的调度程序为执行引擎(Spark, MapReduce, storm等)提供计算资源。资源管理最重要的方面是作业调度。在本文中,我们首先提出了MapReduce引擎的YARN现实调度程序(FIFO, Capacity和Fair)的设计目标。稍后,我们将讨论Hadoop MapReduce集群的调度问题。文献中已经进行了许多努力来解决Hadoop MapReduce调度中的数据局部性、异构性、散列、倾斜缓解、散列和公平性问题。最后,我们根据环境、范围、方法、目标和解决问题等因素对文献中不同的调度算法进行了分类。
{"title":"YARN Schedulers for Hadoop MapReduce Jobs: Design Goals, Issues and Taxonomy","authors":"Gnanendra Kotikam, S. Lokesh","doi":"10.2174/2666255816666220831125012","DOIUrl":"https://doi.org/10.2174/2666255816666220831125012","url":null,"abstract":"\u0000\u0000Big Data processing is a demanding task, and several big data processing frameworks have emerged during recent decades. The performance of these frameworks greatly dependent on resource management models.\u0000\u0000\u0000\u0000YARN is one of such models which acts as a resource management layer and provides computational resources for execution engines (Spark, MapReduce, storm, etc.) through its schedulers. The most important aspect of resource management is job scheduling.\u0000\u0000\u0000\u0000In this paper, we first present the design goal of YARN real-life schedulers (FIFO, Capacity, and Fair) for the MapReduce engine. Later, we discuss the scheduling issues of the Hadoop MapReduce cluster.\u0000\u0000\u0000\u0000Many efforts have been carried out in the literature to address issues of data locality, heterogeneity, straggling, skew mitigation, stragglers and fairness in Hadoop MapReduce scheduling. Lastly, we present the taxonomy of different scheduling algorithms available in the literature based on some factors like environment, scope, approach, objective and addressed issues.\u0000","PeriodicalId":36514,"journal":{"name":"Recent Advances in Computer Science and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44349255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Retrieval Method for Spatiotemporal Information of Chorography Based on Deep Learning 基于深度学习的地理时空信息检索方法
Q3 Computer Science Pub Date : 2022-08-29 DOI: 10.2174/2666255816666220829103359
Shuliang Huan
On the retrieval of spatiotemporal information of chorography (STIC), one of the most important topics is how to quickly pinpoint the desired STIC text out of the massive chorography databases. Domestically, there are not diverse means to retrieve the spatiotemporal information from chorography database. Emerging techniques like data mining, artificial intelligence (AI), and natural language processing (NLP) should be introduced into the informatization of chorography.This study intends to devise an information retrieval method for STIC based on deep learning, and fully demonstrates its feasibility.Firstly, the authors explained the flow for retrieving and analyzing the data features of STIC texts, and established a deep hash model for STIC texts. Next, the data matching flow was defined for STIC texts, the learned hash code was adopted as the memory address of STIC texts, and the hash Hamming distance of the text information was computed through linear search, thereby completing the task of STIC retrieval.Our STIC text feature extraction model learned better STIC text features than the contrastive method. It learned many hash features, and differentiated between different information well, when there were many hash bits.In addition, our hash algorithm achieved the best retrieval accuracy among various methods. Finally, the hash features acquired by our algorithm can accelerate the retrieval speed of STIC texts. These experimental results demonstrate the effectiveness of the proposed model and algorithm.
在地方志时空信息检索中,如何从海量的地方志数据库中快速定位出所需的STIC文本是最重要的课题之一。在国内,从地方志数据库中检索时空信息的方法并不多样。应将数据挖掘、人工智能和自然语言处理等新兴技术引入地方志的信息化。本研究旨在设计一种基于深度学习的STIC信息检索方法,并充分证明其可行性。首先,作者解释了检索和分析STIC文本数据特征的流程,并建立了STIC文本的深度哈希模型。接下来,为STIC文本定义了数据匹配流程,采用学习到的哈希码作为STIC文本的存储地址,并通过线性搜索计算文本信息的哈希-汉明距离,从而完成STIC检索任务。我们的STIC文本特征提取模型比对比方法学习了更好的STIC文字特征。它学习了许多哈希特征,并在有许多哈希位的情况下很好地区分了不同的信息。此外,我们的哈希算法在各种方法中取得了最好的检索精度。最后,我们的算法获得的哈希特征可以加快STIC文本的检索速度。这些实验结果证明了所提出的模型和算法的有效性。
{"title":"A Retrieval Method for Spatiotemporal Information of Chorography Based on Deep Learning","authors":"Shuliang Huan","doi":"10.2174/2666255816666220829103359","DOIUrl":"https://doi.org/10.2174/2666255816666220829103359","url":null,"abstract":"\u0000\u0000On the retrieval of spatiotemporal information of chorography (STIC), one of the most important topics is how to quickly pinpoint the desired STIC text out of the massive chorography databases. Domestically, there are not diverse means to retrieve the spatiotemporal information from chorography database. Emerging techniques like data mining, artificial intelligence (AI), and natural language processing (NLP) should be introduced into the informatization of chorography.\u0000\u0000\u0000\u0000This study intends to devise an information retrieval method for STIC based on deep learning, and fully demonstrates its feasibility.\u0000\u0000\u0000\u0000Firstly, the authors explained the flow for retrieving and analyzing the data features of STIC texts, and established a deep hash model for STIC texts. Next, the data matching flow was defined for STIC texts, the learned hash code was adopted as the memory address of STIC texts, and the hash Hamming distance of the text information was computed through linear search, thereby completing the task of STIC retrieval.\u0000\u0000\u0000\u0000Our STIC text feature extraction model learned better STIC text features than the contrastive method. It learned many hash features, and differentiated between different information well, when there were many hash bits.\u0000\u0000\u0000\u0000In addition, our hash algorithm achieved the best retrieval accuracy among various methods. Finally, the hash features acquired by our algorithm can accelerate the retrieval speed of STIC texts. These experimental results demonstrate the effectiveness of the proposed model and algorithm.\u0000","PeriodicalId":36514,"journal":{"name":"Recent Advances in Computer Science and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47014983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Literature review on devlopment of feature selection and learning mechanism for fuzzy rule based system 基于模糊规则的系统特征选择与学习机制研究进展综述
Q3 Computer Science Pub Date : 2022-08-23 DOI: 10.2174/2666255816666220823163913
Ankur Kumar, Avinash Kaur
This research is being conducted to study fuzzy system with improved rule base. Rule base is an important part of any fuzzy inference system designed. Rules of a fuzzy system depend on the number of features selected. Selecting an optimized number of features is called feature selection. All features (parameters) play an important role in the input to the system, but they have a different impact on the system performance. Some features do not even have a positive impact of classifier on multiple classes. Reduced features, depending on the objective to be achieved require fewer training rules, Thereby, improving the accuracy of the system. Learning is an important mechanism to automate fuzzy systems. The overall purpose of the research is to design a general fuzzy expert system with improvements in the relationship between interpretability and accuracy by improving the feature selection and learning mechanism processes through nature-inspired techniques or innovating new methodologies for the same.
本研究是为了研究具有改进规则库的模糊系统。规则库是任何设计的模糊推理系统的重要组成部分。模糊系统的规则取决于所选特征的数量。选择优化数量的特征称为特征选择。所有特征(参数)在系统输入中都起着重要作用,但它们对系统性能的影响不同。有些特性甚至没有分类器对多个类产生积极影响。减少了特征,根据要达到的目标需要更少的训练规则,从而提高了系统的准确性。学习是实现模糊系统自动化的重要机制。本研究的总体目的是通过自然启发的技术改进特征选择和学习机制过程,或为此创新新的方法,设计一个通用模糊专家系统,改善可解释性和准确性之间的关系。
{"title":"Literature review on devlopment of feature selection and learning mechanism for fuzzy rule based system","authors":"Ankur Kumar, Avinash Kaur","doi":"10.2174/2666255816666220823163913","DOIUrl":"https://doi.org/10.2174/2666255816666220823163913","url":null,"abstract":"\u0000\u0000This research is being conducted to study fuzzy system with improved rule base. Rule base is an important part of any fuzzy inference system designed. Rules of a fuzzy system depend on the number of features selected. Selecting an optimized number of features is called feature selection. All features (parameters) play an important role in the input to the system, but they have a different impact on the system performance. Some features do not even have a positive impact of classifier on multiple classes. Reduced features, depending on the objective to be achieved require fewer training rules, Thereby, improving the accuracy of the system. Learning is an important mechanism to automate fuzzy systems. The overall purpose of the research is to design a general fuzzy expert system with improvements in the relationship between interpretability and accuracy by improving the feature selection and learning mechanism processes through nature-inspired techniques or innovating new methodologies for the same.\u0000","PeriodicalId":36514,"journal":{"name":"Recent Advances in Computer Science and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41506531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assessment of various scheduling and load balancing algorithms in integrated cloud-fog environment 综合云雾环境下各种调度和负载均衡算法的评估
Q3 Computer Science Pub Date : 2022-08-19 DOI: 10.2174/2666255816666220819124133
Jyotsna, P. Nand
It is required to design a suitable scheduling algorithm that enhances the timely execution of goals such as load distribution, cost monitoring, and minimal time lag to react, increased security awareness, optimized energy usage, dependability, and so on. In order to attain these criteria, a variety of scheduling strategies based on hybrid, heuristic, and meta-heuristic techniques are under consideration.IoT devices and a variety of network resources make up the integrated cloud-fog environment. Every fog node has devices that release or request resources. A good scheduling algorithm is required in order to maintain the requests for resources made by various IoT devices.This research focuses on analysis of numerous scheduling challenges and techniques employed in a cloud-fog context. This work evaluates and analyses the most important fog computing scheduling algorithms.The survey of simulation tools used by the researchers is done. From the compared results, the highest percentage in the literature has 60% of scheduling algorithm which is related to task scheduling and 37% of the researchers have used iFogSim simulation tool for the implementation of the proposed algorithm defined in their research paper.The findings in the paper provide a roadmap of the proposed efficient scheduling algorithms and can help researches to develop and choose algorithms close to their case studies.
需要设计一种合适的调度算法,以增强目标的及时执行,如负载分配、成本监控、最小的反应时间滞后、提高安全意识、优化能源使用、可靠性等。为了达到这些标准,各种基于混合、启发式、,以及元启发式技术正在考虑之中。物联网设备和各种网络资源组成了一体化的云雾环境。每个雾节点都有释放或请求资源的设备。需要一个良好的调度算法来维持各种物联网设备对资源的请求。本研究的重点是分析云雾环境中使用的众多调度挑战和技术。本文对最重要的雾计算调度算法进行了评估和分析。对研究人员使用的模拟工具进行了调查。从比较结果来看,文献中比例最高的是60%的调度算法与任务调度有关,37%的研究人员使用iFogSim模拟工具来实现他们的研究论文中定义的算法。本文的研究结果为所提出的高效调度算法提供了路线图,并有助于研究人员开发和选择与其案例研究接近的算法。
{"title":"Assessment of various scheduling and load balancing algorithms in integrated cloud-fog environment","authors":"Jyotsna, P. Nand","doi":"10.2174/2666255816666220819124133","DOIUrl":"https://doi.org/10.2174/2666255816666220819124133","url":null,"abstract":"\u0000\u0000It is required to design a suitable scheduling algorithm that enhances the timely execution of goals such as load distribution, cost monitoring, and minimal time lag to react, increased security awareness, optimized energy usage, dependability, and so on. In order to attain these criteria, a variety of scheduling strategies based on hybrid, heuristic, and meta-heuristic techniques are under consideration.\u0000\u0000\u0000\u0000IoT devices and a variety of network resources make up the integrated cloud-fog environment. Every fog node has devices that release or request resources. A good scheduling algorithm is required in order to maintain the requests for resources made by various IoT devices.\u0000\u0000\u0000\u0000This research focuses on analysis of numerous scheduling challenges and techniques employed in a cloud-fog context. This work evaluates and analyses the most important fog computing scheduling algorithms.\u0000\u0000\u0000\u0000The survey of simulation tools used by the researchers is done. From the compared results, the highest percentage in the literature has 60% of scheduling algorithm which is related to task scheduling and 37% of the researchers have used iFogSim simulation tool for the implementation of the proposed algorithm defined in their research paper.\u0000\u0000\u0000\u0000The findings in the paper provide a roadmap of the proposed efficient scheduling algorithms and can help researches to develop and choose algorithms close to their case studies.\u0000","PeriodicalId":36514,"journal":{"name":"Recent Advances in Computer Science and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45366445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secure Virtual Machine Live Migration using Advanced Metric Encryption 使用高级度量加密的安全虚拟机实时迁移
Q3 Computer Science Pub Date : 2022-08-15 DOI: 10.2174/2666255816666220815145203
R. Saravanaguru, Gokul Geetha Narayanan
Cloud is based on the underlying technology of virtualization. Here, the physical servers are divided into multiple virtual servers. Through the technology of virtualization, each virtual server contains virtual machines. Live virtual machine migration is expected to be with the aim of having migration time and inactive time with minimal duration. Various machine-learning approaches have been investigated and identified research gaps to enhance the security features during the migration process. Moreover, a secure virtual machine live migration is proposed using Advanced Metric Encryption (AME). Considering the duration of live migration in data centers as well as ensuring the security aspects, the proposed model has been tested and evaluated.
云是基于虚拟化的底层技术。这里,物理服务器被划分为多个虚拟服务器。通过虚拟化技术,每个虚拟服务器都包含虚拟机。实时虚拟机迁移的目的是使迁移时间和非活动时间的持续时间最小。已经对各种机器学习方法进行了调查,并确定了在迁移过程中增强安全特性的研究空白。此外,提出了一种使用高级度量加密(AME)的安全虚拟机实时迁移。考虑到数据中心实时迁移的持续时间以及确保安全方面,对所提出的模型进行了测试和评估。
{"title":"Secure Virtual Machine Live Migration using Advanced Metric Encryption","authors":"R. Saravanaguru, Gokul Geetha Narayanan","doi":"10.2174/2666255816666220815145203","DOIUrl":"https://doi.org/10.2174/2666255816666220815145203","url":null,"abstract":"\u0000\u0000Cloud is based on the underlying technology of virtualization. Here, the physical servers are divided into multiple virtual servers. Through the technology of virtualization, each virtual server contains virtual machines. Live virtual machine migration is expected to be with the aim of having migration time and inactive time with minimal duration. Various machine-learning approaches have been investigated and identified research gaps to enhance the security features during the migration process. Moreover, a secure virtual machine live migration is proposed using Advanced Metric Encryption (AME). Considering the duration of live migration in data centers as well as ensuring the security aspects, the proposed model has been tested and evaluated.\u0000","PeriodicalId":36514,"journal":{"name":"Recent Advances in Computer Science and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42574143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparison Of Soft Computing And Optimization Techniques In Classification Of Ecg Signal 心电信号分类的软计算与优化技术比较
Q3 Computer Science Pub Date : 2022-08-04 DOI: 10.2174/2666255816666220804161549
P. Mathur, Pooja, K. Veer
Electrocardiogram (ECG) is a visual representation of the heartbeat that can be used to detect cardiac problems. It helps in detection of normal or abnormal state of heart diseases. So, it’s difficult to detect the cardio logical status by naked eyes. So, features extraction from ECG signal is crucial to recognise heart disorders. After selecting significant features, classification can be done by machine learning (ML), and deep learning (DL). Most of the methods utilised to classify the electrocardiogram are based on 1-D electrocardiogram data. These methods focus on extracting the attributes wavelength and time of each waveform as an input but these algorithms behave different during selecting classification technique. Various ECG construal algorithms based on signal processing approaches have been planned in recent years. Few studies shows how optimisation techniques are helpful for feature selection and classification with ML and DL. This works compares the studies based on ML and DL. It also depicts how optimisation methods increases the accuracy, sensitivity and specificity of data.
心电图(ECG)是可用于检测心脏问题的心跳的视觉表示。它有助于检测心脏病的正常或异常状态。因此,用肉眼很难检测到心功能状态。因此,从心电信号中提取特征对于识别心脏疾病至关重要。在选择了重要特征后,可以通过机器学习(ML)和深度学习(DL)进行分类。用于对心电图进行分类的大多数方法是基于一维心电图数据的。这些方法侧重于提取每个波形的属性波长和时间作为输入,但这些算法在选择分类技术时表现不同。近年来,已经计划了基于信号处理方法的各种ECG构造算法。很少有研究表明优化技术如何有助于ML和DL的特征选择和分类。本工作比较了基于ML和DL的研究。它还描述了优化方法如何提高数据的准确性、敏感性和特异性。
{"title":"Comparison Of Soft Computing And Optimization Techniques In Classification Of Ecg Signal","authors":"P. Mathur, Pooja, K. Veer","doi":"10.2174/2666255816666220804161549","DOIUrl":"https://doi.org/10.2174/2666255816666220804161549","url":null,"abstract":"\u0000\u0000Electrocardiogram (ECG) is a visual representation of the heartbeat that can be used to detect cardiac problems. It helps in detection of normal or abnormal state of heart diseases. So, it’s difficult to detect the cardio logical status by naked eyes. So, features extraction from ECG signal is crucial to recognise heart disorders. After selecting significant features, classification can be done by machine learning (ML), and deep learning (DL). Most of the methods utilised to classify the electrocardiogram are based on 1-D electrocardiogram data. These methods focus on extracting the attributes wavelength and time of each waveform as an input but these algorithms behave different during selecting classification technique. Various ECG construal algorithms based on signal processing approaches have been planned in recent years. Few studies shows how optimisation techniques are helpful for feature selection and classification with ML and DL. This works compares the studies based on ML and DL. It also depicts how optimisation methods increases the accuracy, sensitivity and specificity of data.\u0000","PeriodicalId":36514,"journal":{"name":"Recent Advances in Computer Science and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45875112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Recent Advances in Computer Science and Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1