首页 > 最新文献

Open Computer Science最新文献

英文 中文
Task offloading in mobile edge computing using cost-based discounted optimal stopping 在移动边缘计算中使用基于成本的折现最优停止来卸载任务
IF 1.5 Q2 Computer Science Pub Date : 2024-01-01 DOI: 10.1515/comp-2023-0115
Saleh ALFahad, Qiyuan Wang, C. Anagnostopoulos, Kostas Kolomvatsos
Mobile edge computing (MEC) paradigm has emerged to improve the quality of service & experience of applications deployed in close proximity to end-users. Due to their restricted computational and communication resources, MEC nodes can provide access to a portion of the entire set of services and data gathered. Therefore, there are several obstacles to their management. Keeping track of all the services offered by the MEC nodes is challenging, particularly if their demand rates change over time. Received tasks (such as, analytics queries, classification tasks, and model learning) require services to be invoked in real MEC use-case scenarios, e.g., smart cities. It is not unusual for a node to lack the necessary services or part of them. Undeniably, not all the requested services may be locally available; thus, MEC nodes must deal with the timely and appropriate choice of whether to carry out a service replication (pull action) or tasks offloading (push action) to peer nodes in a MEC environment. In this study, we contribute with a novel time-optimized mechanism based on the optimal stopping theory, which is built on the cost-based decreasing service demand rates evidenced in various service management situations. Our mechanism tries to optimally solve the decision-making dilemma between pull and push action. The experimental findings of our mechanism and its comparative assessment with other methods found in the literature showcase the achieved optimal decisions with respect to certain cost-based objective functions over dynamic service demand rates.
移动边缘计算(MEC)模式的出现是为了提高部署在终端用户附近的应用程序的服务质量和体验。由于计算和通信资源有限,MEC 节点只能提供所收集的全部服务和数据中的一部分。因此,它们的管理存在一些障碍。跟踪 MEC 节点提供的所有服务具有挑战性,尤其是在其需求率随时间变化的情况下。接收的任务(如分析查询、分类任务和模型学习)需要在真实的 MEC 使用场景(如智能城市)中调用服务。节点缺乏必要服务或部分服务的情况并不少见。不可否认,并非所有请求的服务都能在本地获得;因此,在 MEC 环境中,MEC 节点必须及时、适当地选择是向对等节点进行服务复制(拉动作)还是任务卸载(推动作)。在本研究中,我们基于最优停止理论,提出了一种新颖的时间优化机制,该机制建立在各种服务管理情况下所证明的基于成本的服务需求递减率基础之上。我们的机制试图优化解决拉动和推动行动之间的决策困境。我们的机制的实验结果及其与文献中其他方法的比较评估,展示了在动态服务需求率的某些基于成本的目标函数方面所实现的最优决策。
{"title":"Task offloading in mobile edge computing using cost-based discounted optimal stopping","authors":"Saleh ALFahad, Qiyuan Wang, C. Anagnostopoulos, Kostas Kolomvatsos","doi":"10.1515/comp-2023-0115","DOIUrl":"https://doi.org/10.1515/comp-2023-0115","url":null,"abstract":"\u0000 Mobile edge computing (MEC) paradigm has emerged to improve the quality of service & experience of applications deployed in close proximity to end-users. Due to their restricted computational and communication resources, MEC nodes can provide access to a portion of the entire set of services and data gathered. Therefore, there are several obstacles to their management. Keeping track of all the services offered by the MEC nodes is challenging, particularly if their demand rates change over time. Received tasks (such as, analytics queries, classification tasks, and model learning) require services to be invoked in real MEC use-case scenarios, e.g., smart cities. It is not unusual for a node to lack the necessary services or part of them. Undeniably, not all the requested services may be locally available; thus, MEC nodes must deal with the timely and appropriate choice of whether to carry out a service replication (pull action) or tasks offloading (push action) to peer nodes in a MEC environment. In this study, we contribute with a novel time-optimized mechanism based on the optimal stopping theory, which is built on the cost-based decreasing service demand rates evidenced in various service management situations. Our mechanism tries to optimally solve the decision-making dilemma between pull and push action. The experimental findings of our mechanism and its comparative assessment with other methods found in the literature showcase the achieved optimal decisions with respect to certain cost-based objective functions over dynamic service demand rates.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140518709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Bi-GRU-DSA-based social network rumor detection approach 基于 Bi-GRU-DSA 的社交网络谣言检测方法
IF 1.5 Q2 Computer Science Pub Date : 2024-01-01 DOI: 10.1515/comp-2023-0114
Xiang Huang, Yan Liu
In the rumor detection based on crowd intelligence, the crowd behavior is constructed as a graph model or probability mode. The detection of rumors is achieved through the collaborative utilization of data and knowledge. Aiming at the problems of insufficient feature extraction ability and data redundancy of current rumor detection methods based on deep learning model, a social network rumor detection method based on bidirectional gated recurrent unit (Bi-GRU) and double self-attention (DSA) mechanism is suggested. First, a combination of application program interface and third-party crawler approach is used to obtain microblogging data from publicly available fake microblogging information pages, including both rumor and non-rumor information. Second, Bi-GRU is used to capture the tendency of medium- and long-term dependence of data and is flexible enough to deal with variable length input. Finally, the DSA mechanism is introduced to help reduce the redundant information in the dataset, thereby enhancing the model’s efficacy. The results of the experiments indicate that the proposed method outperforms existing advanced methods by at least 0.114, 0.108, 0.064, and 0.085 in terms of accuracy, precision, recall, and F1-scores, respectively. Therefore, the proposed method can significantly enhance the ability of social network rumor detection.
在基于人群智能的谣言检测中,人群行为被构建为图模型或概率模型。通过数据和知识的协同利用,实现谣言的检测。针对目前基于深度学习模型的谣言检测方法存在的特征提取能力不足、数据冗余等问题,提出了一种基于双向门控循环单元(Bi-GRU)和双重自我关注(DSA)机制的社交网络谣言检测方法。首先,采用应用程序接口和第三方爬虫相结合的方法,从公开的虚假微博信息页面中获取微博数据,包括谣言信息和非谣言信息。其次,利用 Bi-GRU 捕获数据的中长期依赖趋势,并灵活处理不同长度的输入。最后,引入 DSA 机制来帮助减少数据集中的冗余信息,从而提高模型的有效性。实验结果表明,所提出的方法在准确度、精确度、召回率和 F1 分数方面分别比现有的先进方法高出至少 0.114、0.108、0.064 和 0.085。因此,本文提出的方法可以显著提高社交网络谣言的检测能力。
{"title":"A Bi-GRU-DSA-based social network rumor detection approach","authors":"Xiang Huang, Yan Liu","doi":"10.1515/comp-2023-0114","DOIUrl":"https://doi.org/10.1515/comp-2023-0114","url":null,"abstract":"\u0000 In the rumor detection based on crowd intelligence, the crowd behavior is constructed as a graph model or probability mode. The detection of rumors is achieved through the collaborative utilization of data and knowledge. Aiming at the problems of insufficient feature extraction ability and data redundancy of current rumor detection methods based on deep learning model, a social network rumor detection method based on bidirectional gated recurrent unit (Bi-GRU) and double self-attention (DSA) mechanism is suggested. First, a combination of application program interface and third-party crawler approach is used to obtain microblogging data from publicly available fake microblogging information pages, including both rumor and non-rumor information. Second, Bi-GRU is used to capture the tendency of medium- and long-term dependence of data and is flexible enough to deal with variable length input. Finally, the DSA mechanism is introduced to help reduce the redundant information in the dataset, thereby enhancing the model’s efficacy. The results of the experiments indicate that the proposed method outperforms existing advanced methods by at least 0.114, 0.108, 0.064, and 0.085 in terms of accuracy, precision, recall, and F1-scores, respectively. Therefore, the proposed method can significantly enhance the ability of social network rumor detection.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140524011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of artificial intelligence-based style transfer algorithm in animation special effects design 基于人工智能的风格转换算法在动画特效设计中的应用
IF 1.5 Q2 Computer Science Pub Date : 2023-01-01 DOI: 10.1515/comp-2022-0255
Shan Li
Abstract Today, the rapid development of computer technology changes with each passing day. In the computer field, computer animation has rapidly grown from a new thing to a leading industry, and animation has entered the era of three-dimensional animation and computer graphics. This article aims to study the application of artificial intelligence-based style transfer algorithm in animation special effects design. It proposes methods such as adaptive loss function, style transfer process, animation special effect design, etc., and conducts related experiments on the application of style transfer algorithm in animation special effect design in the article. The experimental results show that the style transfer algorithm based on AI can effectively improve the effect of animation special effects. In this survey, more than 80% of the people are satisfied with the animation special effects design based on the style transfer algorithm.
在计算机技术飞速发展的今天,日新月异。在计算机领域,计算机动画从一个新生事物迅速成长为主导产业,动画进入了三维动画和计算机图形时代。本文旨在研究基于人工智能的风格迁移算法在动画特效设计中的应用。本文提出了自适应损失函数、风格转移过程、动画特效设计等方法,并对风格转移算法在动画特效设计中的应用进行了相关实验。实验结果表明,基于AI的风格迁移算法可以有效地提高动画特效的效果。在本次调查中,超过80%的人对基于风格迁移算法的动画特效设计感到满意。
{"title":"Application of artificial intelligence-based style transfer algorithm in animation special effects design","authors":"Shan Li","doi":"10.1515/comp-2022-0255","DOIUrl":"https://doi.org/10.1515/comp-2022-0255","url":null,"abstract":"Abstract Today, the rapid development of computer technology changes with each passing day. In the computer field, computer animation has rapidly grown from a new thing to a leading industry, and animation has entered the era of three-dimensional animation and computer graphics. This article aims to study the application of artificial intelligence-based style transfer algorithm in animation special effects design. It proposes methods such as adaptive loss function, style transfer process, animation special effect design, etc., and conducts related experiments on the application of style transfer algorithm in animation special effect design in the article. The experimental results show that the style transfer algorithm based on AI can effectively improve the effect of animation special effects. In this survey, more than 80% of the people are satisfied with the animation special effects design based on the style transfer algorithm.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45177858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
UAV patrol path planning based on machine vision and multi-sensor fusion 基于机器视觉和多传感器融合的无人机巡逻路径规划
IF 1.5 Q2 Computer Science Pub Date : 2023-01-01 DOI: 10.1515/comp-2022-0276
Xu Chen
Abstract With the rapid development of unmanned aerial vehicle (UAV) technology, there are more and more fields of UAV application. This research mainly discusses the UAV patrol path planning based on machine vision and multi-sensor fusion. This article studies how to apply ultrasonic, a classic ranging sensor, to obstacle avoidance of UAVs. The designed ultrasonic obstacle avoidance system is a complete set of hardware and software systems. The hardware part consists of a forward ultrasonic module and a central signal processing module. Among them, a single-axis stabilization gimbal is designed for the forward ultrasonic module, which decouples the attitude angle of the UAV and the pitch detection angle of the ultrasonic sensor. In the central signal processing module, Kalman filtering is performed on the ultrasonic data in the four directions of front, rear, left, right, and left, and the obstacle avoidance control signal is sent to the flight controller according to the filtered sensor data. At the same time, a human–computer interaction interface is also designed to set various parameters of the obstacle avoidance system. For the route planning method of the tower, the routine steps are used to inspect the tower with a single-circuit line, and the specific targets are the insulator string, the ground wire, and the conductor. In this study, the average statistical result of the straight-line distance of the UAV patrolling 100 m is 99.80 m, and the error is only 0.2%. The fusion obstacle avoidance control method based on machine vision is suitable for the engineering application of UAV perception obstacle avoidance. The obstacle avoidance method adopted in this article can be extended to most flight control platforms, and it is a control method with broad application prospects.
摘要随着无人机技术的飞速发展,无人机的应用领域越来越多。本文主要研究了基于机器视觉和多传感器融合的无人机巡逻路径规划。本文研究了如何将超声波这一经典测距传感器应用于无人机避障。所设计的超声波避障系统是一套完整的硬件和软件系统。硬件部分由正向超声模块和中央信号处理模块组成。其中,前向超声模块设计了单轴稳定框架,实现了无人机姿态角与超声传感器俯仰探测角的解耦。在中央信号处理模块中,对前、后、左、右、左四个方向的超声波数据进行卡尔曼滤波,并根据滤波后的传感器数据向飞行控制器发送避障控制信号。同时,设计了人机交互界面,对避障系统的各项参数进行设置。铁塔线路规划方法采用常规步骤,采用单线检查铁塔,具体检查对象为绝缘子串、地线和导体。在本研究中,无人机巡航100 m直线距离的平均统计结果为99.80 m,误差仅为0.2%。基于机器视觉的融合避障控制方法适合于无人机感知避障的工程应用。本文采用的避障方法可以推广到大多数飞控平台,是一种具有广阔应用前景的控制方法。
{"title":"UAV patrol path planning based on machine vision and multi-sensor fusion","authors":"Xu Chen","doi":"10.1515/comp-2022-0276","DOIUrl":"https://doi.org/10.1515/comp-2022-0276","url":null,"abstract":"Abstract With the rapid development of unmanned aerial vehicle (UAV) technology, there are more and more fields of UAV application. This research mainly discusses the UAV patrol path planning based on machine vision and multi-sensor fusion. This article studies how to apply ultrasonic, a classic ranging sensor, to obstacle avoidance of UAVs. The designed ultrasonic obstacle avoidance system is a complete set of hardware and software systems. The hardware part consists of a forward ultrasonic module and a central signal processing module. Among them, a single-axis stabilization gimbal is designed for the forward ultrasonic module, which decouples the attitude angle of the UAV and the pitch detection angle of the ultrasonic sensor. In the central signal processing module, Kalman filtering is performed on the ultrasonic data in the four directions of front, rear, left, right, and left, and the obstacle avoidance control signal is sent to the flight controller according to the filtered sensor data. At the same time, a human–computer interaction interface is also designed to set various parameters of the obstacle avoidance system. For the route planning method of the tower, the routine steps are used to inspect the tower with a single-circuit line, and the specific targets are the insulator string, the ground wire, and the conductor. In this study, the average statistical result of the straight-line distance of the UAV patrolling 100 m is 99.80 m, and the error is only 0.2%. The fusion obstacle avoidance control method based on machine vision is suitable for the engineering application of UAV perception obstacle avoidance. The obstacle avoidance method adopted in this article can be extended to most flight control platforms, and it is a control method with broad application prospects.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47040047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Zebra-crossing detection based on cascaded Hough transform principle and vanishing point characteristics 基于级联霍夫变换原理和消失点特征的斑马交叉检测
IF 1.5 Q2 Computer Science Pub Date : 2023-01-01 DOI: 10.1515/comp-2022-0260
Chen Zhu, Dong-yuan Ge, Xi-fan Yao, Wenjiang Xiang, Jian Li, Yong-Xiang Li
Abstract In this study, a zebra-crossing detection method based on cascaded Hough transform (CHT) and vanishing point (VP) characteristics is proposed. In this method, the principle of detecting straight lines in the parallel coordinate system is applied to zebra-crossing detection. Each edge point of the image obtained by edge detection is represented in the parallel coordinate system to find the VP. Using the VP coordinate as the judgment condition, those straight lines that do not pass through the VP but meet the straight-line condition are excluded to obtain the straight lines passing through both sides of the zebra crossing, and finally fit the edge points on the straight line, and get the zebra-crossing fitting line segment. Experiments show that CHT has obvious advantages in detection accuracy and speed compared with the Hough transform. At the same time, VPs can be used to eliminate interference segments, which provide support for the accuracy of zebra-crossing detection. This method can get zebra-crossing location information without using region of interest extraction, which also provides a reference method for road detection in some specific cases.
摘要本文提出了一种基于级联霍夫变换(CHT)和消失点(VP)特性的斑马线检测方法。该方法将平行坐标系直线检测原理应用于斑马线检测。通过边缘检测获得的图像的每个边缘点在平行坐标系中表示,以找到VP。以VP坐标为判断条件,排除那些不通过VP但满足直线条件的直线,得到通过斑马线两侧的直线,最后拟合直线上的边缘点,得到斑马线拟合线段。实验表明,与霍夫变换相比,CHT在检测精度和速度上具有明显优势。同时,VP可以用于消除干扰段,这为斑马线检测的准确性提供了支持。该方法可以在不使用感兴趣区域提取的情况下获得斑马线位置信息,也为某些特定情况下的道路检测提供了参考方法。
{"title":"Zebra-crossing detection based on cascaded Hough transform principle and vanishing point characteristics","authors":"Chen Zhu, Dong-yuan Ge, Xi-fan Yao, Wenjiang Xiang, Jian Li, Yong-Xiang Li","doi":"10.1515/comp-2022-0260","DOIUrl":"https://doi.org/10.1515/comp-2022-0260","url":null,"abstract":"Abstract In this study, a zebra-crossing detection method based on cascaded Hough transform (CHT) and vanishing point (VP) characteristics is proposed. In this method, the principle of detecting straight lines in the parallel coordinate system is applied to zebra-crossing detection. Each edge point of the image obtained by edge detection is represented in the parallel coordinate system to find the VP. Using the VP coordinate as the judgment condition, those straight lines that do not pass through the VP but meet the straight-line condition are excluded to obtain the straight lines passing through both sides of the zebra crossing, and finally fit the edge points on the straight line, and get the zebra-crossing fitting line segment. Experiments show that CHT has obvious advantages in detection accuracy and speed compared with the Hough transform. At the same time, VPs can be used to eliminate interference segments, which provide support for the accuracy of zebra-crossing detection. This method can get zebra-crossing location information without using region of interest extraction, which also provides a reference method for road detection in some specific cases.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46117175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent cluster construction of internet financial security protection system in banking industry 银行业互联网金融安全保护体系的智能集群构建
IF 1.5 Q2 Computer Science Pub Date : 2023-01-01 DOI: 10.1515/comp-2022-0268
Yanzhao Wang
Abstract As the rapid advancement of information security company is developing quickly and the technology including big information, big computer, large cloud, and artificial intelligence are being widely used, network security has entered a new era. While ushering in huge development opportunities, it also faces severe tests. Network security is a major issue related to the comprehensive realization of a well-off society and national security, and has risen to the national strategic level. The current financial industry network security construction mainly focuses on team, process construction, and the research and development of individual tools and equipment. It lacks system research and implementation guidelines for defense technology construction based on industry IT characteristics. At the same time, there is also a lack of objective and unified measurement and evaluation standards for enterprise security defense capabilities, which restricts the improvement of cybersecurity capabilities in the financial industry to a certain extent. In terms of actual combat exercises, in various actual combat exercises over the years, the technical architecture of the bank’s network security defense has withstood the test of high-intensity confrontation. The defense process achieved zero deductions, and stood out among the participating defending teams through traceability and countermeasures, which effectively improved the network security large-scale group operations and security protection capabilities. The effectiveness of the technical architecture design is verified in actual combat, which shows that the control of the bank’s internet financial security protection system is effective. With digital computing, all banking transactions are fully automatically implemented and the bank’s clientele is systematically self-managed. It predicts that using this system, the speed can be increased by 98% and the accuracy can be increased by 12%.
摘要随着信息安全公司的快速发展,包括大信息、大计算机、大云和人工智能在内的技术得到广泛应用,网络安全进入了一个新的时代。在迎来巨大发展机遇的同时,也面临严峻考验。网络安全是关系全面实现小康社会和国家安全的重大问题,已上升到国家战略高度。当前金融行业的网络安全建设主要集中在团队建设、流程建设、个人工具设备研发等方面。缺乏基于行业It特点的国防技术建设的系统研究和实施指南。同时,企业安全防御能力也缺乏客观统一的衡量和评估标准,这在一定程度上制约了金融业网络安全能力的提升。在实战演练方面,在历年的各项实战演练中,该行网络安全防御的技术架构经受住了高强度对抗的考验。防御过程实现了零扣减,并通过溯源和应对措施在参与防御团队中脱颖而出,有效提升了网络安全大规模群体作战和安全防护能力。该技术架构设计的有效性在实战中得到了验证,表明对银行互联网金融安全保护系统的控制是有效的。有了数字计算,所有银行交易都可以完全自动实现,银行客户也可以系统地自我管理。预测使用该系统,速度可提高98%,精度可提高12%。
{"title":"Intelligent cluster construction of internet financial security protection system in banking industry","authors":"Yanzhao Wang","doi":"10.1515/comp-2022-0268","DOIUrl":"https://doi.org/10.1515/comp-2022-0268","url":null,"abstract":"Abstract As the rapid advancement of information security company is developing quickly and the technology including big information, big computer, large cloud, and artificial intelligence are being widely used, network security has entered a new era. While ushering in huge development opportunities, it also faces severe tests. Network security is a major issue related to the comprehensive realization of a well-off society and national security, and has risen to the national strategic level. The current financial industry network security construction mainly focuses on team, process construction, and the research and development of individual tools and equipment. It lacks system research and implementation guidelines for defense technology construction based on industry IT characteristics. At the same time, there is also a lack of objective and unified measurement and evaluation standards for enterprise security defense capabilities, which restricts the improvement of cybersecurity capabilities in the financial industry to a certain extent. In terms of actual combat exercises, in various actual combat exercises over the years, the technical architecture of the bank’s network security defense has withstood the test of high-intensity confrontation. The defense process achieved zero deductions, and stood out among the participating defending teams through traceability and countermeasures, which effectively improved the network security large-scale group operations and security protection capabilities. The effectiveness of the technical architecture design is verified in actual combat, which shows that the control of the bank’s internet financial security protection system is effective. With digital computing, all banking transactions are fully automatically implemented and the bank’s clientele is systematically self-managed. It predicts that using this system, the speed can be increased by 98% and the accuracy can be increased by 12%.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43515390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of SSD network algorithm in panoramic video image vehicle detection system SSD网络算法在全景视频图像车辆检测系统中的应用
IF 1.5 Q2 Computer Science Pub Date : 2023-01-01 DOI: 10.1515/comp-2022-0270
Tao Jiang
Abstract Due to the popularity of high-performance cameras and the development of computer video pattern recognition technology, intelligent video monitoring technology is widely used in all aspects of social life. It mainly includes the following: industrial control system uses video monitoring technology for remote monitoring and comprehensive monitoring; in addition, intelligent video monitoring technology is also widely used in the agricultural field, for example, farm administrators can view the activities of animals in real time through smart phones, and agricultural experts can predict future weather changes according to the growth of crops. In the implementation of intelligent monitoring system, automatic detection of vehicles in images is an important topic. The construction of China’s Intelligent Transportation System started late, especially in video traffic detection. Although there are many related studies on video traffic detection algorithms, these algorithms usually only analyze and process information from a single sensor. This article describes the application of the single-shot detector (SSD) network algorithm in a panoramic video image vehicle detection system. The purpose of this article is to investigate the effectiveness of the SSD network algorithm in a panoramic video image vehicle detection system. The experimental results show that the detection accuracy of a single convolutional neural network (CNN) algorithm is only 0.7554, the recall rate is 0.9052, and the comprehensive detection accuracy is 0.8235. The detection accuracy of SSD network algorithm is 0.8720, recall rate is 0.9397, and the comprehensive detection accuracy is 0.9046, which is higher than that of single CNN algorithm. Thus, the proposed SSD network algorithm is compared with a single convolution network algorithm. It is more suitable for vehicle detection, and it plays an important role in panoramic video image vehicle detection.
由于高性能摄像机的普及和计算机视频模式识别技术的发展,智能视频监控技术被广泛应用于社会生活的各个方面。主要包括:工业控制系统采用视频监控技术进行远程监控和综合监控;此外,智能视频监控技术也被广泛应用于农业领域,例如,农场管理员可以通过智能手机实时查看动物的活动情况,农业专家可以根据农作物的生长情况预测未来的天气变化。在智能监控系统的实施中,车辆图像的自动检测是一个重要的课题。中国智能交通系统的建设起步较晚,尤其是在视频交通检测方面。虽然有很多视频流量检测算法的相关研究,但这些算法通常只分析和处理来自单个传感器的信息。本文介绍了单镜头检测器(SSD)网络算法在全景视频图像车辆检测系统中的应用。本文的目的是研究SSD网络算法在全景视频图像车辆检测系统中的有效性。实验结果表明,单个卷积神经网络(CNN)算法的检测准确率仅为0.7554,召回率为0.9052,综合检测准确率为0.8235。SSD网络算法的检测准确率为0.8720,召回率为0.9397,综合检测准确率为0.9046,高于单一CNN算法。因此,将所提出的SSD网络算法与单一卷积网络算法进行了比较。它更适合于车辆检测,在全景视频图像车辆检测中起着重要的作用。
{"title":"Application of SSD network algorithm in panoramic video image vehicle detection system","authors":"Tao Jiang","doi":"10.1515/comp-2022-0270","DOIUrl":"https://doi.org/10.1515/comp-2022-0270","url":null,"abstract":"Abstract Due to the popularity of high-performance cameras and the development of computer video pattern recognition technology, intelligent video monitoring technology is widely used in all aspects of social life. It mainly includes the following: industrial control system uses video monitoring technology for remote monitoring and comprehensive monitoring; in addition, intelligent video monitoring technology is also widely used in the agricultural field, for example, farm administrators can view the activities of animals in real time through smart phones, and agricultural experts can predict future weather changes according to the growth of crops. In the implementation of intelligent monitoring system, automatic detection of vehicles in images is an important topic. The construction of China’s Intelligent Transportation System started late, especially in video traffic detection. Although there are many related studies on video traffic detection algorithms, these algorithms usually only analyze and process information from a single sensor. This article describes the application of the single-shot detector (SSD) network algorithm in a panoramic video image vehicle detection system. The purpose of this article is to investigate the effectiveness of the SSD network algorithm in a panoramic video image vehicle detection system. The experimental results show that the detection accuracy of a single convolutional neural network (CNN) algorithm is only 0.7554, the recall rate is 0.9052, and the comprehensive detection accuracy is 0.8235. The detection accuracy of SSD network algorithm is 0.8720, recall rate is 0.9397, and the comprehensive detection accuracy is 0.9046, which is higher than that of single CNN algorithm. Thus, the proposed SSD network algorithm is compared with a single convolution network algorithm. It is more suitable for vehicle detection, and it plays an important role in panoramic video image vehicle detection.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41813414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SMACS: A framework for formal verification of complex adaptive systems SMACS:复杂自适应系统形式化验证的框架
IF 1.5 Q2 Computer Science Pub Date : 2023-01-01 DOI: 10.1515/comp-2022-0275
Muhammad Ilyas Fakhir, Syed Asad Raza Kazmi, Awais Qasim, A. Ishaq
Abstract Self-adaptive systems (SASs) have the capability to evaluate and change their behavior according to changes occurring in the environment. Research in this field is being held since mid-60, and over the last decade, the importance of self-adaptivity is being increased. In the proposed research, colored petri nets (CPN) formal language is being used to model self-adaptive multiagent system. CPN is increasingly used to model self-adaptive complex concurrent systems due to its flexible formal specification and formal verification behavior. CPN being visually more expressive than simple, Petri Nets enable diverse modeling approaches and provides a richer framework for such a complex formalism. The main goal of this research is to apply self-adaptive multi-agent concurrent system (SMACS) for complex architectures. In our previous research, the SMACS framework is proposed and verified through traffic monitoring system. All agents of SMACS are also known as intelligent agents due to their self-adaptation behavior. Due to decentralized approach in this framework, each agent will intelligently adapt its behavior in the environment and send updates to other agents. In this research, we are choosing smart computer lab (SCL) as a case study. For internal structure of each agent modal, μ mu -calculus will be used, and then a model checker TAPAs: a tool for the analysis of process algebras will be applied to verify these properties. CPN-based state space analysis will also be done to verify the behavioral properties of the model. The general objective of the proposed system is to maximize the utility generated over some predetermined time horizon.
摘要自适应系统(SAS)具有根据环境中发生的变化来评估和改变其行为的能力。自60年代中期以来,这一领域的研究一直在进行,在过去的十年里,自我适应的重要性正在增加。在所提出的研究中,有色petri网(CPN)形式语言被用于自适应多智能体系统的建模。CPN由于其灵活的形式化规范和形式化验证行为,越来越多地被用于对自适应复杂并发系统进行建模。CPN在视觉上比简单的更具表现力,Petri网实现了多种建模方法,并为这种复杂的形式主义提供了更丰富的框架。本研究的主要目标是将自适应多智能体并发系统(SMACS)应用于复杂体系结构。在我们之前的研究中,SMACS框架是通过交通监控系统提出并验证的。SMACS的所有代理由于其自适应行为也被称为智能代理。由于该框架中的去中心化方法,每个代理都将智能地调整其在环境中的行为,并向其他代理发送更新。在本研究中,我们选择智能计算机实验室(SCL)作为案例研究。对于每个代理模态的内部结构,将使用μμ演算,然后应用模型检查器TAPAs:一种用于分析过程代数的工具来验证这些性质。还将进行基于CPN的状态空间分析,以验证模型的行为特性。所提出的系统的总体目标是使在某个预定时间范围内产生的效用最大化。
{"title":"SMACS: A framework for formal verification of complex adaptive systems","authors":"Muhammad Ilyas Fakhir, Syed Asad Raza Kazmi, Awais Qasim, A. Ishaq","doi":"10.1515/comp-2022-0275","DOIUrl":"https://doi.org/10.1515/comp-2022-0275","url":null,"abstract":"Abstract Self-adaptive systems (SASs) have the capability to evaluate and change their behavior according to changes occurring in the environment. Research in this field is being held since mid-60, and over the last decade, the importance of self-adaptivity is being increased. In the proposed research, colored petri nets (CPN) formal language is being used to model self-adaptive multiagent system. CPN is increasingly used to model self-adaptive complex concurrent systems due to its flexible formal specification and formal verification behavior. CPN being visually more expressive than simple, Petri Nets enable diverse modeling approaches and provides a richer framework for such a complex formalism. The main goal of this research is to apply self-adaptive multi-agent concurrent system (SMACS) for complex architectures. In our previous research, the SMACS framework is proposed and verified through traffic monitoring system. All agents of SMACS are also known as intelligent agents due to their self-adaptation behavior. Due to decentralized approach in this framework, each agent will intelligently adapt its behavior in the environment and send updates to other agents. In this research, we are choosing smart computer lab (SCL) as a case study. For internal structure of each agent modal, μ mu -calculus will be used, and then a model checker TAPAs: a tool for the analysis of process algebras will be applied to verify these properties. CPN-based state space analysis will also be done to verify the behavioral properties of the model. The general objective of the proposed system is to maximize the utility generated over some predetermined time horizon.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42980501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Big data technology for computer intrusion detection 计算机入侵检测的大数据技术
IF 1.5 Q2 Computer Science Pub Date : 2023-01-01 DOI: 10.1515/comp-2022-0267
Ying Chen
Abstract In order to improve the ability of computer network intrusion detection, the big data technology for computer intrusion detection was studied. This research uses big data technology to build a network intrusion detection model, using clustering algorithms, classification algorithms, and association rule algorithms in data mining to automatically identify the attack patterns in the network and quickly learn and extract the characteristics of network attacks. The experimental results show that the recognition effect of the classification algorithm is obviously better than that of the clustering algorithm and the association rule. With the increase in the proportion of abnormal commands, the accuracy rate can still be maintained at 90%. As a compromise between the classification algorithm and the clustering algorithm, the accuracy rate of the association rule algorithm is basically maintained at more than 75%. It is proved that the big data technology oriented to computer intrusion detection can effectively improve the detection ability of computer network intrusion.
摘要为了提高计算机网络入侵检测的能力,研究了计算机入侵检测的大数据技术。本研究利用大数据技术构建网络入侵检测模型,利用数据挖掘中的聚类算法、分类算法和关联规则算法,自动识别网络中的攻击模式,快速学习和提取网络攻击特征。实验结果表明,分类算法的识别效果明显优于聚类算法和关联规则。随着异常命令比例的增加,准确率仍然可以保持在90%。作为分类算法和聚类算法的折衷,关联规则算法的准确率基本保持在75%以上。实践证明,面向计算机入侵检测的大数据技术可以有效提高计算机网络入侵的检测能力。
{"title":"Big data technology for computer intrusion detection","authors":"Ying Chen","doi":"10.1515/comp-2022-0267","DOIUrl":"https://doi.org/10.1515/comp-2022-0267","url":null,"abstract":"Abstract In order to improve the ability of computer network intrusion detection, the big data technology for computer intrusion detection was studied. This research uses big data technology to build a network intrusion detection model, using clustering algorithms, classification algorithms, and association rule algorithms in data mining to automatically identify the attack patterns in the network and quickly learn and extract the characteristics of network attacks. The experimental results show that the recognition effect of the classification algorithm is obviously better than that of the clustering algorithm and the association rule. With the increase in the proportion of abnormal commands, the accuracy rate can still be maintained at 90%. As a compromise between the classification algorithm and the clustering algorithm, the accuracy rate of the association rule algorithm is basically maintained at more than 75%. It is proved that the big data technology oriented to computer intrusion detection can effectively improve the detection ability of computer network intrusion.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42349087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Artificial intelligence-based public safety data resource management in smart cities 基于人工智能的智慧城市公共安全数据资源管理
IF 1.5 Q2 Computer Science Pub Date : 2023-01-01 DOI: 10.1515/comp-2022-0271
Hang Zhao
Abstract With the development of urbanization, urban public safety is becoming more and more important. Urban public safety is not only the foundation of urban development, but also the basic guarantee for the stability of citizens’ lives. In the context of today’s artificial intelligence (AI), the concept of smart cities is constantly being practiced. Urban public safety has also ushered in some new problems and challenges. To this end, this article aimed to use AI technology to build an efficient public safety data resource management system in a smart city environment. A major goal of AI research was to enable machines to perform complex tasks that normally require human intelligence. In this article, a data resource management system was constructed according to the city security system and risk data sources, and the data processing method of neural network (NN) was adopted. Factors affecting urban public safety were processed as indicator data. In this article, the feedforward back-propagation neural network (BPNN) was used to predict the index data in real time, which has realized the management functions of risk monitoring and early warning of public safety data indicators. The BPNN model was used to test the urban risk early warning capability of the constructed system. BPNN is a multi-layer feed-forward NN trained according to the error back-propagation algorithm, which is one of the most widely used NN models. The results showed that the average prediction accuracy of the BPNN model for indicator prediction was about 89%, which was 16.1% higher than that of the traditional NN model. The average risk warning accuracy rate of the BPNN model was 90.3%, which was 16.5% higher than that of the traditional NN model. This shows that the BPNN model using AI technology in this article can more efficiently and accurately carry out early warning of risk and management of urban public safety.
摘要随着城市化的发展,城市公共安全显得越来越重要。城市公共安全是城市发展的基础,也是市民生活稳定的基本保障。在今天的人工智能(AI)背景下,智慧城市的概念正在不断实践。城市公共安全也迎来了一些新的问题和挑战。为此,本文旨在利用人工智能技术构建一个智能城市环境中高效的公共安全数据资源管理系统。人工智能研究的一个主要目标是使机器能够执行通常需要人类智能的复杂任务。本文根据城市安全系统和风险数据源,采用神经网络的数据处理方法,构建了一个数据资源管理系统。将影响城市公共安全的因素作为指标数据进行处理。本文采用前馈-反向传播神经网络(BPNN)对指标数据进行实时预测,实现了公共安全数据指标的风险监测和预警管理功能。利用BPNN模型对所构建系统的城市风险预警能力进行了测试。BPNN是根据误差反向传播算法训练的多层前馈神经网络,是应用最广泛的神经网络模型之一。结果表明,BPNN模型用于指标预测的平均预测准确率约为89%,比传统的NN模型高出16.1%。BPNN模型的平均风险预警准确率为90.3%,比传统NN模型高16.5%。这表明,本文中使用人工智能技术的BPNN模型可以更高效、更准确地进行城市公共安全风险预警和管理。
{"title":"Artificial intelligence-based public safety data resource management in smart cities","authors":"Hang Zhao","doi":"10.1515/comp-2022-0271","DOIUrl":"https://doi.org/10.1515/comp-2022-0271","url":null,"abstract":"Abstract With the development of urbanization, urban public safety is becoming more and more important. Urban public safety is not only the foundation of urban development, but also the basic guarantee for the stability of citizens’ lives. In the context of today’s artificial intelligence (AI), the concept of smart cities is constantly being practiced. Urban public safety has also ushered in some new problems and challenges. To this end, this article aimed to use AI technology to build an efficient public safety data resource management system in a smart city environment. A major goal of AI research was to enable machines to perform complex tasks that normally require human intelligence. In this article, a data resource management system was constructed according to the city security system and risk data sources, and the data processing method of neural network (NN) was adopted. Factors affecting urban public safety were processed as indicator data. In this article, the feedforward back-propagation neural network (BPNN) was used to predict the index data in real time, which has realized the management functions of risk monitoring and early warning of public safety data indicators. The BPNN model was used to test the urban risk early warning capability of the constructed system. BPNN is a multi-layer feed-forward NN trained according to the error back-propagation algorithm, which is one of the most widely used NN models. The results showed that the average prediction accuracy of the BPNN model for indicator prediction was about 89%, which was 16.1% higher than that of the traditional NN model. The average risk warning accuracy rate of the BPNN model was 90.3%, which was 16.5% higher than that of the traditional NN model. This shows that the BPNN model using AI technology in this article can more efficiently and accurately carry out early warning of risk and management of urban public safety.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41631848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Open Computer Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1