首页 > 最新文献

IET Cyber-Physical Systems: Theory and Applications最新文献

英文 中文
Multiple dependence representation of attention graph convolutional network relation extraction model 注意力图卷积网络关系提取模型的多重依赖性表示法
IF 1.7 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-10-04 DOI: 10.1049/cps2.12080
Zhao Liangfu, Xiong Yujie, Gao Yongbin, Yu Wenjun

Dependency analysis can better help neural network to capture semantic features in sentences, so as to extract entity relation. Currently, hard pruning strategies and soft pruning strategies based on dependency tree structure coding have been proposed to balance beneficial additional information and adverse interference in extraction tasks. A new model based on graph convolutional networks, which uses a variety of representations describing dependency trees from different perspectives and combining these representations to obtain a better sentence representation for relation classification is proposed. A newly defined module is added, and this module uses the attention mechanism to capture deeper semantic features from the context representation as the global semantic features of the input text, thus helping the model to capture deeper semantic information at the sentence level for relational extraction tasks. In order to get more information about a given entity pair from the input sentence, the authors also model implicit co-references (references) to entities. This model can extract semantic features related to the relationship between entities from sentences to the maximum extent. The results show that the model in this paper achieves good results on SemEval2010-Task8 and KBP37 datasets.

依赖分析可以更好地帮助神经网络捕捉句子中的语义特征,从而提取实体关系。目前,人们提出了基于依赖树结构编码的硬剪枝策略和软剪枝策略,以平衡提取任务中有益的附加信息和不利的干扰。本文提出了一种基于图卷积网络的新模型,该模型使用多种表征从不同角度描述依存树,并将这些表征结合起来以获得更好的句子表征,用于关系分类。此外,还增加了一个新定义的模块,该模块利用注意力机制从上下文表征中捕捉更深层次的语义特征,作为输入文本的全局语义特征,从而帮助模型在句子层面捕捉更深层次的语义信息,用于关系提取任务。为了从输入句子中获取有关给定实体对的更多信息,作者还建立了实体的隐式共参(引用)模型。该模型可以最大限度地从句子中提取与实体间关系相关的语义特征。结果表明,本文中的模型在 SemEval2010-Task8 和 KBP37 数据集上取得了良好的效果。
{"title":"Multiple dependence representation of attention graph convolutional network relation extraction model","authors":"Zhao Liangfu,&nbsp;Xiong Yujie,&nbsp;Gao Yongbin,&nbsp;Yu Wenjun","doi":"10.1049/cps2.12080","DOIUrl":"10.1049/cps2.12080","url":null,"abstract":"<p>Dependency analysis can better help neural network to capture semantic features in sentences, so as to extract entity relation. Currently, hard pruning strategies and soft pruning strategies based on dependency tree structure coding have been proposed to balance beneficial additional information and adverse interference in extraction tasks. A new model based on graph convolutional networks, which uses a variety of representations describing dependency trees from different perspectives and combining these representations to obtain a better sentence representation for relation classification is proposed. A newly defined module is added, and this module uses the attention mechanism to capture deeper semantic features from the context representation as the global semantic features of the input text, thus helping the model to capture deeper semantic information at the sentence level for relational extraction tasks. In order to get more information about a given entity pair from the input sentence, the authors also model implicit co-references (references) to entities. This model can extract semantic features related to the relationship between entities from sentences to the maximum extent. The results show that the model in this paper achieves good results on SemEval2010-Task8 and KBP37 datasets.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":null,"pages":null},"PeriodicalIF":1.7,"publicationDate":"2023-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12080","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135590945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Selective real-time adversarial perturbations against deep reinforcement learning agents 针对深度强化学习代理的选择性实时对抗扰动
IF 1.5 Q1 Engineering Pub Date : 2023-09-22 DOI: 10.1049/cps2.12065
Hongjin Yao, Yisheng Li, Yunpeng Sun, Zhichao Lian

Recent work has shown that deep reinforcement learning (DRL) is vulnerable to adversarial attacks, so that exploiting vulnerabilities in DRL systems through adversarial attack techniques has become a necessary prerequisite for building robust DRL systems. Compared to traditional deep learning systems, DRL systems are characterised by long sequential decisions rather than one-step decision, so attackers must perform multi-step attacks on them. To successfully attack a DRL system, the number of attacks must be minimised to avoid detecting by the victim agent and to ensure the effectiveness of the attack. Some selective attack methods proposed in recent researches, that is, attacking an agent at partial time steps, are not applicable to real-time attack scenarios, although they can avoid detecting by the victim agent. A real-time selective attack method that is applicable to environments with discrete action spaces is proposed. Firstly, the optimal attack threshold T for performing selective attacks in the environment Env is determined. Then, the observation states corresponding to when the value of the action preference function of the victim agent in multiple eposides exceeds the threshold T are added to the training set according to this threshold. Finally, a universal perturbation is generated based on this training set, and it is used to perform real-time selective attacks on the victim agent. Comparative experiments show that our attack method can perform real-time attacks while maintaining the attack effect and stealthiness.

最近的研究表明,深度强化学习(DRL)很容易受到对抗性攻击,因此通过对抗性攻击技术利用DRL系统中的漏洞已成为构建稳健的DRL系统的必要前提。与传统的深度学习系统相比,DRL 系统的特点是长序列决策而非一步决策,因此攻击者必须对其实施多步骤攻击。要成功攻击 DRL 系统,必须尽量减少攻击次数,以避免被受害代理检测到,并确保攻击的有效性。近期研究中提出的一些选择性攻击方法,即在部分时间步骤攻击一个代理,虽然可以避免被受害代理检测到,但不适用于实时攻击场景。本文提出了一种适用于离散行动空间环境的实时选择性攻击方法。首先,确定在环境 Env 中进行选择性攻击的最佳攻击阈值 T。然后,根据该阈值,将多个外延中受害代理的行动偏好函数值超过阈值 T 时对应的观测状态添加到训练集中。最后,根据该训练集生成通用扰动,并利用它对受害代理进行实时选择性攻击。对比实验表明,我们的攻击方法可以在保持攻击效果和隐蔽性的同时进行实时攻击。
{"title":"Selective real-time adversarial perturbations against deep reinforcement learning agents","authors":"Hongjin Yao,&nbsp;Yisheng Li,&nbsp;Yunpeng Sun,&nbsp;Zhichao Lian","doi":"10.1049/cps2.12065","DOIUrl":"10.1049/cps2.12065","url":null,"abstract":"<p>Recent work has shown that deep reinforcement learning (DRL) is vulnerable to adversarial attacks, so that exploiting vulnerabilities in DRL systems through adversarial attack techniques has become a necessary prerequisite for building robust DRL systems. Compared to traditional deep learning systems, DRL systems are characterised by long sequential decisions rather than one-step decision, so attackers must perform multi-step attacks on them. To successfully attack a DRL system, the number of attacks must be minimised to avoid detecting by the victim agent and to ensure the effectiveness of the attack. Some selective attack methods proposed in recent researches, that is, attacking an agent at partial time steps, are not applicable to real-time attack scenarios, although they can avoid detecting by the victim agent. A real-time selective attack method that is applicable to environments with discrete action spaces is proposed. Firstly, the optimal attack threshold <i>T</i> for performing selective attacks in the environment <i>Env</i> is determined. Then, the observation states corresponding to when the value of the action preference function of the victim agent in multiple eposides exceeds the threshold <i>T</i> are added to the training set according to this threshold. Finally, a universal perturbation is generated based on this training set, and it is used to perform real-time selective attacks on the victim agent. Comparative experiments show that our attack method can perform real-time attacks while maintaining the attack effect and stealthiness.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2023-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12065","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136061808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Feature attention gated context aggregation network for single image dehazing and its application on unmanned aerial vehicle images 用于单一图像去毛刺的特征注意门控上下文聚合网络及其在无人机图像上的应用
IF 1.7 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-20 DOI: 10.1049/cps2.12076
Yongquan Wu, Xuan Zhao, Xinsheng Zhang, Tao Long, Ping Luo

Single-image dehazing is a highly challenging ill-posed task in the field of computer vision. To address this, a new image dehazing model with feature attention, named feature attention gated context aggregation network (FAGCA-Net), is proposed to tackle the issues of incomplete or over-dehazing caused by the original model's inability to handle non-uniform haze density distributions. A feature attention module that combines channel attention and spatial attention is introduced. Additionally, the authors propose a new extended attention convolutional block, which not only addresses the grid artefacts caused by the extended convolution but also provides added flexibility in handling different types of feature information. At the same time, in addition to the input image itself, incorporating the dark channel and edge channel of the image as the final input of the model is helpful for the model learning process. To demonstrate the robustness of the new model, it is applied to two completely different dehazing datasets, and it achieves significant dehazing performance improvement over the original model. Finally, to verify the effectiveness of the model in practical production processes, the authors apply it as an image preprocessing step to a set of UAV (Unmanned Aerial Vehicle) images of foreign objects. The result shows that the UAV images after being processed by FAGCA-Net for haze removal have a better impact on subsequent usage.

单幅图像去毛刺是计算机视觉领域一项极具挑战性的难题。为了解决这个问题,我们提出了一种新的带有特征注意的图像去毛刺模型,命名为特征注意门控上下文聚合网络(FAGCA-Net),以解决由于原始模型无法处理非均匀雾密度分布而导致的不完全去毛刺或过度去毛刺问题。作者还引入了一个结合了通道注意力和空间注意力的特征注意力模块。此外,作者还提出了一种新的扩展注意力卷积块,不仅解决了扩展卷积造成的网格伪影问题,还为处理不同类型的特征信息提供了更大的灵活性。同时,除了输入图像本身,将图像的暗色通道和边缘通道作为模型的最终输入也有助于模型的学习过程。为了证明新模型的鲁棒性,我们将其应用于两个完全不同的去毛刺数据集,结果发现新模型的去毛刺性能明显优于原始模型。最后,为了验证该模型在实际生产过程中的有效性,作者将其作为图像预处理步骤,应用于一组异物的无人机(UAV)图像。结果表明,经过 FAGCA-Net 除雾处理后的无人机图像对后续使用有更好的影响。
{"title":"Feature attention gated context aggregation network for single image dehazing and its application on unmanned aerial vehicle images","authors":"Yongquan Wu,&nbsp;Xuan Zhao,&nbsp;Xinsheng Zhang,&nbsp;Tao Long,&nbsp;Ping Luo","doi":"10.1049/cps2.12076","DOIUrl":"10.1049/cps2.12076","url":null,"abstract":"<p>Single-image dehazing is a highly challenging ill-posed task in the field of computer vision. To address this, a new image dehazing model with feature attention, named feature attention gated context aggregation network (FAGCA-Net), is proposed to tackle the issues of incomplete or over-dehazing caused by the original model's inability to handle non-uniform haze density distributions. A feature attention module that combines channel attention and spatial attention is introduced. Additionally, the authors propose a new extended attention convolutional block, which not only addresses the grid artefacts caused by the extended convolution but also provides added flexibility in handling different types of feature information. At the same time, in addition to the input image itself, incorporating the dark channel and edge channel of the image as the final input of the model is helpful for the model learning process. To demonstrate the robustness of the new model, it is applied to two completely different dehazing datasets, and it achieves significant dehazing performance improvement over the original model. Finally, to verify the effectiveness of the model in practical production processes, the authors apply it as an image preprocessing step to a set of UAV (Unmanned Aerial Vehicle) images of foreign objects. The result shows that the UAV images after being processed by FAGCA-Net for haze removal have a better impact on subsequent usage.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":null,"pages":null},"PeriodicalIF":1.7,"publicationDate":"2023-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12076","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136375950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Feature selection algorithm for substation main equipment defect text mining based on natural language processing 基于自然语言处理的变电站主设备缺陷文本挖掘特征选择算法
IF 1.7 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-20 DOI: 10.1049/cps2.12079
Xiaoqing Mai, Tianhu Zhang, Changwu Hu, Yan Zhang

The dimension of relevant text feature space and feature weight of substation main equipment defect information is high, so it is difficult to accurately select mining features. The Natural Language Processing (NLP) medium and short-term neural network model is used to realise the defect information text feature word segmentation in the log. After extracting the text features of defect information of main substation equipment with high categories to form the feature space; the TF-IDF algorithm is designed to calculate the importance weight of text keywords, judge the criticality of defect information text feature vocabulary, accurately locate defect information text features, and realise defect information text feature mining. Experiments show that the algorithm has high precision for specific word segmentation of massive substation main equipment log information.

变电站主设备缺陷信息的相关文本特征空间维度和特征权重较高,难以准确选择挖掘特征。采用自然语言处理(NLP)中短期神经网络模型实现日志中缺陷信息文本特征词的分割。在提取分类较多的主变设备缺陷信息文本特征形成特征空间后,设计 TF-IDF 算法计算文本关键词的重要性权重,判断缺陷信息文本特征词汇的关键性,准确定位缺陷信息文本特征,实现缺陷信息文本特征挖掘。实验表明,该算法对海量变电站主设备日志信息的特定词分割具有较高的精度。
{"title":"Feature selection algorithm for substation main equipment defect text mining based on natural language processing","authors":"Xiaoqing Mai,&nbsp;Tianhu Zhang,&nbsp;Changwu Hu,&nbsp;Yan Zhang","doi":"10.1049/cps2.12079","DOIUrl":"10.1049/cps2.12079","url":null,"abstract":"<p>The dimension of relevant text feature space and feature weight of substation main equipment defect information is high, so it is difficult to accurately select mining features. The Natural Language Processing (NLP) medium and short-term neural network model is used to realise the defect information text feature word segmentation in the log. After extracting the text features of defect information of main substation equipment with high categories to form the feature space; the TF-IDF algorithm is designed to calculate the importance weight of text keywords, judge the criticality of defect information text feature vocabulary, accurately locate defect information text features, and realise defect information text feature mining. Experiments show that the algorithm has high precision for specific word segmentation of massive substation main equipment log information.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":null,"pages":null},"PeriodicalIF":1.7,"publicationDate":"2023-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12079","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136312991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting covert channel attacks on cyber-physical systems 检测对网络物理系统的隐蔽通道攻击
IF 1.7 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-20 DOI: 10.1049/cps2.12078
Hongwei Li, Danai Chasaki

Cyberattacks on cyber-physical systems (CPS) have the potential to cause widespread disruption and affect the safety of millions of people. Machine learning can be an effective tool for detecting attacks on CPS, including the most stealthy types of attacks, known as covert channel attacks. In this study, the authors describe a novel hierarchical ensemble architecture for detecting covert channel attacks in CPS. Our proposed approach uses a combination of TCP payload entropy and network flows for feature engineering. Our approach achieves high detection performance, shortens the model training duration, and shows promise for effective detection of covert channel communications. This novel architecture closely mirrors the CPS attack stages in real-life, providing flexibility and adaptability in detecting new types of attacks.

对网络物理系统(CPS)的网络攻击有可能造成大范围的破坏,影响数百万人的安全。机器学习可以成为检测 CPS 攻击的有效工具,其中包括最隐蔽的攻击类型,即隐蔽通道攻击。在这项研究中,作者描述了一种用于检测 CPS 中隐蔽信道攻击的新型分层集合架构。我们提出的方法结合使用 TCP 有效载荷熵和网络流来进行特征工程。我们的方法实现了较高的检测性能,缩短了模型训练时间,并显示出有效检测隐蔽信道通信的前景。这种新颖的架构密切反映了现实生活中的 CPS 攻击阶段,为检测新型攻击提供了灵活性和适应性。
{"title":"Detecting covert channel attacks on cyber-physical systems","authors":"Hongwei Li,&nbsp;Danai Chasaki","doi":"10.1049/cps2.12078","DOIUrl":"10.1049/cps2.12078","url":null,"abstract":"<p>Cyberattacks on cyber-physical systems (CPS) have the potential to cause widespread disruption and affect the safety of millions of people. Machine learning can be an effective tool for detecting attacks on CPS, including the most stealthy types of attacks, known as covert channel attacks. In this study, the authors describe a novel hierarchical ensemble architecture for detecting covert channel attacks in CPS. Our proposed approach uses a combination of TCP payload entropy and network flows for feature engineering. Our approach achieves high detection performance, shortens the model training duration, and shows promise for effective detection of covert channel communications. This novel architecture closely mirrors the CPS attack stages in real-life, providing flexibility and adaptability in detecting new types of attacks.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":null,"pages":null},"PeriodicalIF":1.7,"publicationDate":"2023-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12078","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136308695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A swin transformer based bird nest detection approach with unmanned aerial vehicle images for power distribution and pole towers 基于无人机图像的配电和杆塔鸟巢检测方法
IF 1.5 Q1 Engineering Pub Date : 2023-09-19 DOI: 10.1049/cps2.12073
Yue Meng, Yu Song, Yuquan Chen, Xin Zhang, Mei Wu, Biao Du

The authors propose a novel object detection algorithm for identifying bird nests in medium voltage power line aerial images, which is crucial for ensuring the safe operation of the power grid. The algorithm utilises an improved Swin Transformer as the main feature extraction network of Fast R-CNN, further enhanced with a channel attention and modified binary self-attention mechanism to improve the feature representation ability. The proposed algorithm is evaluated on a newly constructed image dataset of medium voltage transmission lines containing bird nests, which are annotated and classified. Experimental results show that the proposed algorithm achieves satisfied accuracy and robustness in recognising bird nests compared to traditional algorithms.

作者提出了一种新型物体检测算法,用于识别中压电力线航空图像中的鸟巢,这对确保电网的安全运行至关重要。该算法利用改进的 Swin Transformer 作为快速 R-CNN 的主要特征提取网络,并进一步增强了通道注意和改进的二进制自注意机制,以提高特征表示能力。我们在一个新构建的包含鸟巢的中压输电线路图像数据集上对所提出的算法进行了评估,并对其进行了注释和分类。实验结果表明,与传统算法相比,所提出的算法在识别鸟巢方面达到了令人满意的准确性和鲁棒性。
{"title":"A swin transformer based bird nest detection approach with unmanned aerial vehicle images for power distribution and pole towers","authors":"Yue Meng,&nbsp;Yu Song,&nbsp;Yuquan Chen,&nbsp;Xin Zhang,&nbsp;Mei Wu,&nbsp;Biao Du","doi":"10.1049/cps2.12073","DOIUrl":"10.1049/cps2.12073","url":null,"abstract":"<p>The authors propose a novel object detection algorithm for identifying bird nests in medium voltage power line aerial images, which is crucial for ensuring the safe operation of the power grid. The algorithm utilises an improved Swin Transformer as the main feature extraction network of Fast R-CNN, further enhanced with a channel attention and modified binary self-attention mechanism to improve the feature representation ability. The proposed algorithm is evaluated on a newly constructed image dataset of medium voltage transmission lines containing bird nests, which are annotated and classified. Experimental results show that the proposed algorithm achieves satisfied accuracy and robustness in recognising bird nests compared to traditional algorithms.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2023-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12073","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135107852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unsafe behaviour detection with the improved YOLOv5 model 使用改进的 YOLOv5 模型检测不安全行为
IF 1.5 Q1 Engineering Pub Date : 2023-09-15 DOI: 10.1049/cps2.12070
Li Ying, Zhao Lei, Geng Junwei, Hu Jinhui, Ma Lei, Zhao Zilong

In industrial environments, workers should wear workwear for safety considerations. For the same reason, smoking is also prohibited. Due to the supervision of monitoring devices, workers have reduced smoking behaviours and started wearing workwear. To meet the requirements for detecting these behaviours in real-time monitoring videos with high speed and accuracy, the authors proposed an improved YOLOv5 model with the Triplet Attention mechanism. This mechanism strengthens the connection between channel and spatial dimensions, focuses the network on important parts, and improves feature extraction. Compared to the original YOLOv5 model, the addition of the mechanism increases the parameters by only 0.04%. The recall rate of the YOLOv5 model is enhanced while its prediction speed is maintained with only a minimal increase in parameters. Experiment results show that, compared to the original model, the improved YOLOv5 has a recall rate of 78.8%, 91%, and 89.3% for detecting smoking behaviour, not wearing helmets, and inappropriate workwear, respectively.

在工业环境中,出于安全考虑,工人应穿工作服。出于同样的原因,也禁止吸烟。在监控设备的监督下,工人们减少了吸烟行为,并开始穿戴工作服。为了满足在实时监控视频中高速、准确地检测这些行为的要求,作者提出了一种具有三重注意机制的改进型 YOLOv5 模型。该机制加强了通道和空间维度之间的联系,使网络聚焦于重要部分,并改进了特征提取。与最初的 YOLOv5 模型相比,加入该机制后参数只增加了 0.04%。YOLOv5 模型的召回率得到了提高,同时其预测速度也得到了保持,而参数的增加却微乎其微。实验结果表明,与原始模型相比,改进后的 YOLOv5 在检测吸烟行为、不戴头盔和不合适工作服方面的召回率分别为 78.8%、91% 和 89.3%。
{"title":"Unsafe behaviour detection with the improved YOLOv5 model","authors":"Li Ying,&nbsp;Zhao Lei,&nbsp;Geng Junwei,&nbsp;Hu Jinhui,&nbsp;Ma Lei,&nbsp;Zhao Zilong","doi":"10.1049/cps2.12070","DOIUrl":"10.1049/cps2.12070","url":null,"abstract":"<p>In industrial environments, workers should wear workwear for safety considerations. For the same reason, smoking is also prohibited. Due to the supervision of monitoring devices, workers have reduced smoking behaviours and started wearing workwear. To meet the requirements for detecting these behaviours in real-time monitoring videos with high speed and accuracy, the authors proposed an improved YOLOv5 model with the Triplet Attention mechanism. This mechanism strengthens the connection between channel and spatial dimensions, focuses the network on important parts, and improves feature extraction. Compared to the original YOLOv5 model, the addition of the mechanism increases the parameters by only 0.04%. The recall rate of the YOLOv5 model is enhanced while its prediction speed is maintained with only a minimal increase in parameters. Experiment results show that, compared to the original model, the improved YOLOv5 has a recall rate of 78.8%, 91%, and 89.3% for detecting smoking behaviour, not wearing helmets, and inappropriate workwear, respectively.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2023-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12070","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135438294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A multilevel segmentation method of asymmetric semantics based on deep learning 基于深度学习的非对称语义多级分割方法
IF 1.5 Q1 Engineering Pub Date : 2023-09-15 DOI: 10.1049/cps2.12075
Angxin Liu, Yongbiao Yang

An asymmetric semantic multi-level segmentation method based on depth learning is proposed in order to improve the precision and effect of semantic segmentation. A ‘content tree’ structure and an adjacency matrix are constructed to represent the parent-child relationship between each image sub region in a complete image. Through multiple combinations of spatial attention mechanism and channel attention mechanism, the similarity semantic features of the target object can be selectively aggregated, so as to enhance its feature expression and avoid the impact of significant objects. The asymmetric semantic segmentation model asymmetric pyramid feature convolutional network (APFCN) is constructed, and the path feature extraction and parameter adjustment are realised through APFCN. On the basis of APFCN network, a full convolution network is introduced for end-to-end image semantic segmentation. Combining the advantages of convolution network in extracting image features and the advantages of short-term and short-term memory network in solving long-term dependence, an end-to-end hybrid depth network is constructed for image semantic multi-level segmentation. The experimental results show that the mean intersection over Union value and mean pixel accuracy value are higher than that of the literature method, both of which are increased by more than 3%, and the segmentation effect is good.

为了提高语义分割的精度和效果,本文提出了一种基于深度学习的非对称语义多层次分割方法。通过构建 "内容树 "结构和邻接矩阵来表示完整图像中每个图像子区域之间的父子关系。通过空间关注机制和通道关注机制的多重组合,可以有选择地聚合目标对象的相似性语义特征,从而增强其特征表达,避免重要对象的影响。构建非对称语义分割模型非对称金字塔特征卷积网络(APFCN),并通过APFCN实现路径特征提取和参数调整。在 APFCN 网络的基础上,引入全卷积网络进行端到端的图像语义分割。结合卷积网络在提取图像特征方面的优势和短时与短时记忆网络在解决长期依赖性方面的优势,构建了端到端混合深度网络,用于图像语义多层次分割。实验结果表明,平均交集过联合值和平均像素精度值均高于文献方法,均提高了 3% 以上,分割效果良好。
{"title":"A multilevel segmentation method of asymmetric semantics based on deep learning","authors":"Angxin Liu,&nbsp;Yongbiao Yang","doi":"10.1049/cps2.12075","DOIUrl":"10.1049/cps2.12075","url":null,"abstract":"<p>An asymmetric semantic multi-level segmentation method based on depth learning is proposed in order to improve the precision and effect of semantic segmentation. A ‘content tree’ structure and an adjacency matrix are constructed to represent the parent-child relationship between each image sub region in a complete image. Through multiple combinations of spatial attention mechanism and channel attention mechanism, the similarity semantic features of the target object can be selectively aggregated, so as to enhance its feature expression and avoid the impact of significant objects. The asymmetric semantic segmentation model asymmetric pyramid feature convolutional network (APFCN) is constructed, and the path feature extraction and parameter adjustment are realised through APFCN. On the basis of APFCN network, a full convolution network is introduced for end-to-end image semantic segmentation. Combining the advantages of convolution network in extracting image features and the advantages of short-term and short-term memory network in solving long-term dependence, an end-to-end hybrid depth network is constructed for image semantic multi-level segmentation. The experimental results show that the mean intersection over Union value and mean pixel accuracy value are higher than that of the literature method, both of which are increased by more than 3%, and the segmentation effect is good.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2023-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12075","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135437827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A review of design frameworks for human-cyber-physical systems moving from industry 4 to 5 从工业 4 到工业 5 的人-网络-物理系统设计框架综述
IF 1.5 Q1 Engineering Pub Date : 2023-09-14 DOI: 10.1049/cps2.12077
Katherine van-Lopik, Steven Hayward, Rebecca Grant, Laura McGirr, Paul Goodall, Yan Jin, Mark Price, Andrew A. West, Paul P. Conway

Within the Industry 4.0 landscape, humans collaborate with cyber and physical elements to form human-cyber-physical systems (HCPS). These environments are increasingly complex and challenging workspaces due to increasing levels of automation and data availability. An effective system design requires suitable frameworks that consider human activities and needs whilst supporting overall system efficacy. Although several reviews of frameworks for technology were identified, none of these focused on the human in the system (moving towards Industry 5). The critical literature review presented provides a summary of HCPS frameworks, maps the considerations for a human in HCPS, and provides insight for future framework and system development. The challenges, recommendations, and areas for further research are discussed.

在工业 4.0 环境中,人类与网络和物理元素协作,形成人类-网络-物理系统(HCPS)。由于自动化水平和数据可用性不断提高,这些环境成为日益复杂和具有挑战性的工作场所。有效的系统设计需要合适的框架,既要考虑人类的活动和需求,又要支持系统的整体功效。虽然我们发现了一些关于技术框架的综述,但这些综述都没有关注系统中的人(转向工业 5)。所提交的关键文献综述概述了 HCPS 框架,描绘了 HCPS 中人的考虑因素,并为未来的框架和系统开发提供了见解。此外,还讨论了进一步研究的挑战、建议和领域。
{"title":"A review of design frameworks for human-cyber-physical systems moving from industry 4 to 5","authors":"Katherine van-Lopik,&nbsp;Steven Hayward,&nbsp;Rebecca Grant,&nbsp;Laura McGirr,&nbsp;Paul Goodall,&nbsp;Yan Jin,&nbsp;Mark Price,&nbsp;Andrew A. West,&nbsp;Paul P. Conway","doi":"10.1049/cps2.12077","DOIUrl":"10.1049/cps2.12077","url":null,"abstract":"<p>Within the Industry 4.0 landscape, humans collaborate with cyber and physical elements to form human-cyber-physical systems (HCPS). These environments are increasingly complex and challenging workspaces due to increasing levels of automation and data availability. An effective system design requires suitable frameworks that consider human activities and needs whilst supporting overall system efficacy. Although several reviews of frameworks for technology were identified, none of these focused on the human in the system (moving towards Industry 5). The critical literature review presented provides a summary of HCPS frameworks, maps the considerations for a human in HCPS, and provides insight for future framework and system development. The challenges, recommendations, and areas for further research are discussed.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2023-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12077","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134971012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SwarmAd: A decentralised content management system SwarmAd:分散式内容管理系统
IF 1.5 Q1 Engineering Pub Date : 2023-08-09 DOI: 10.1049/cps2.12071
Tommaso Baldo, Mauro Migliardi

Online presence is becoming an important part of everyday's life and online communities may represent a significant source of engagement for the elderlies. Nevertheless, many may struggle to be online due to a lack of expertise, and a decentralised architecture may provide a solution by removing intermediaries, such as a webmaster, while not requiring expensive cloud solutions. However, issues concerning accessibility, security, and user experience have to be tackled. The paper focuses mainly on three issues: providing a human-readable domain, moderating content, and creating a reward system based on user reputation. An architecture is proposed based on Ethereum and Swarm. Smart contracts provide an automated set of rules to handle enterprise registration, content creation, and decision-making process, while Swarm serves both as distributed storage and the web host. Besides, in combination with Ethereum Name Service, Swarm provides a secure, distributed, and human-readable point of access to the web interface. The paper also describes an innovative two-token system where one token is meant to be a trustworthy reputation metre and the other is a spendable coin to get rewards. The final result is a fully decentralised, authenticated and moderated platform where users can aggregate and share their content presentations on the Internet.

上网正在成为日常生活的重要组成部分,而网络社区可能是老年人参与的重要来源。然而,许多人可能由于缺乏专业知识而难以上网,而分散式架构可以提供一种解决方案,它可以消除中间人(如网站管理员),同时又不需要昂贵的云解决方案。然而,还必须解决有关可访问性、安全性和用户体验的问题。本文主要关注三个问题:提供一个人类可读的域,对内容进行管理,以及创建一个基于用户声誉的奖励系统。本文提出了一种基于以太坊和 Swarm 的架构。智能合约提供了一套自动规则来处理企业注册、内容创建和决策过程,而 Swarm 既是分布式存储,也是网络主机。此外,结合以太坊名称服务,Swarm 提供了一个安全、分布式和人类可读的网络界面访问点。论文还描述了一个创新的双令牌系统,其中一个令牌是一个值得信赖的声誉度量器,另一个是一个可消费的硬币,用于获得奖励。最终的结果是一个完全去中心化、经过认证和管理的平台,用户可以在这个平台上聚合和分享他们在互联网上的内容展示。
{"title":"SwarmAd: A decentralised content management system","authors":"Tommaso Baldo,&nbsp;Mauro Migliardi","doi":"10.1049/cps2.12071","DOIUrl":"10.1049/cps2.12071","url":null,"abstract":"<p>Online presence is becoming an important part of everyday's life and online communities may represent a significant source of engagement for the elderlies. Nevertheless, many may struggle to be online due to a lack of expertise, and a decentralised architecture may provide a solution by removing intermediaries, such as a webmaster, while not requiring expensive cloud solutions. However, issues concerning accessibility, security, and user experience have to be tackled. The paper focuses mainly on three issues: providing a human-readable domain, moderating content, and creating a reward system based on user reputation. An architecture is proposed based on Ethereum and Swarm. Smart contracts provide an automated set of rules to handle enterprise registration, content creation, and decision-making process, while Swarm serves both as distributed storage and the web host. Besides, in combination with Ethereum Name Service, Swarm provides a secure, distributed, and human-readable point of access to the web interface. The paper also describes an innovative two-token system where one token is meant to be a trustworthy reputation metre and the other is a spendable coin to get rewards. The final result is a fully decentralised, authenticated and moderated platform where users can aggregate and share their content presentations on the Internet.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2023-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12071","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81441781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IET Cyber-Physical Systems: Theory and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1