首页 > 最新文献

網際網路技術學刊最新文献

英文 中文
A Dynamic Model for the Computation of Gesture Types for Image-based Software Agents 为基于图像的软件代理计算手势类型的动态模型
Pub Date : 2023-12-01 DOI: 10.53106/160792642023122407011
Tse-Chuan Hsu Tse-Chuan Hsu, Chih-Hung Chang Tse-Chuan Hsu, William Cheng-Chung Chu Chih-Hung Chang, Shou-Yu Lee William Cheng-Chung Chu, Shih-Yun Huang Shou-Yu Lee
Computer vision technology allows the computer to interact with a human operator to quickly complete the interpretation of events and improve the operational workflow of processing events. As computer vision technology continues to evolve, the cost of the equipment continues to increase. Therefore, the stability of the system can be ensured through the design of the middleware and the calculation of the auxiliary functions of the software agents. At present, the recognition of characters for image processing is based on the technology of image recognition, which can provide a more flexible user experience. However, the dilemma of contactless design lies in the processing and calculation of images, which should reduce the inconvenience caused by delays.This article uses a Raspberry Pi as an example of a computing proxy application. After the visual inspection, the verification operation of the software is carried out. Our system is the detection of hand position and movement, and the detection of hand mark position in reconnaissance. In addition, we simultaneously developed management and remote control events and connected to the remote edge computer. After that, we successfully completed the automatic control and serial application of two different edge computing recognition jobs, and verified the image vision computing based on the Raspberry Pi software agent, which can be used for image vision analysis and control applications.
计算机视觉技术允许计算机与人类操作员进行交互,从而快速完成对事件的解释,并改进处理事件的操作流程。随着计算机视觉技术的不断发展,设备的成本也在不断增加。因此,可以通过中间件的设计和软件代理辅助功能的计算来保证系统的稳定性。目前,图像处理的字符识别是基于图像识别的技术,可以提供更加灵活的用户体验。然而,非接触式设计的困境在于图像的处理和计算,应减少延迟带来的不便。本文以 Raspberry Pi 为例,介绍计算代理应用。在视觉检测之后,进行软件的验证操作。我们的系统是手部位置和移动的检测,以及侦察中手部标记位置的检测。此外,我们还同时开发了管理和远程控制事件,并连接到远程边缘计算机。之后,我们成功完成了两种不同边缘计算识别作业的自动控制和串行应用,并验证了基于树莓派软件代理的图像视觉计算,可用于图像视觉分析和控制应用。
{"title":"A Dynamic Model for the Computation of Gesture Types for Image-based Software Agents","authors":"Tse-Chuan Hsu Tse-Chuan Hsu, Chih-Hung Chang Tse-Chuan Hsu, William Cheng-Chung Chu Chih-Hung Chang, Shou-Yu Lee William Cheng-Chung Chu, Shih-Yun Huang Shou-Yu Lee","doi":"10.53106/160792642023122407011","DOIUrl":"https://doi.org/10.53106/160792642023122407011","url":null,"abstract":"Computer vision technology allows the computer to interact with a human operator to quickly complete the interpretation of events and improve the operational workflow of processing events. As computer vision technology continues to evolve, the cost of the equipment continues to increase. Therefore, the stability of the system can be ensured through the design of the middleware and the calculation of the auxiliary functions of the software agents. At present, the recognition of characters for image processing is based on the technology of image recognition, which can provide a more flexible user experience. However, the dilemma of contactless design lies in the processing and calculation of images, which should reduce the inconvenience caused by delays.This article uses a Raspberry Pi as an example of a computing proxy application. After the visual inspection, the verification operation of the software is carried out. Our system is the detection of hand position and movement, and the detection of hand mark position in reconnaissance. In addition, we simultaneously developed management and remote control events and connected to the remote edge computer. After that, we successfully completed the automatic control and serial application of two different edge computing recognition jobs, and verified the image vision computing based on the Raspberry Pi software agent, which can be used for image vision analysis and control applications.","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"54 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139187806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Impact of Online Reviews Manipulation on Consumer Purchase Decision Based on The Perspective of Consumers’ Perception 基于消费者感知视角的网络评论操纵对消费者购买决策的影响
Pub Date : 2023-12-01 DOI: 10.53106/160792642023122407008
Minjuan Zhong Minjuan Zhong, Han Yang Minjuan Zhong, Keyang Zhong Han Yang, Xilong Qu Keyang Zhong, Zhenjin Li Xilong Qu
Consumers depend on online reviews to influences their purchase decisions. On account of that,many vendors and retailers try to manipulate online reviews to mislead potential consumers to take risky purchase decisions. Many scholars have conducted a lot of research on the impact of online product reviews on consumer behavior and sales. However, the existing work are mainly based on the premise of real product reviews, but few attentions have been paid of fake ones. Based on the recognition results of deceptive reviews, this article explores whether consumers be aware or perceive it when deceptive reviews are flooding the online review system, and further analyze what influence will be imposed on final purchase decision with different perception. The empirical analysis of the questionnaire survey show that in the context of two different perceptions of consumers, deceptive reviews have significant differences in the results of purchase decisions. In addition, research also shows that consumers’ persuasive knowledge plays a moderating role between perceived deception and purchase decision.
消费者依赖在线评论来影响他们的购买决策。因此,许多供应商和零售商试图操纵在线评论,误导潜在消费者做出冒险的购买决策。许多学者对在线产品评论对消费者行为和销售的影响进行了大量研究。然而,现有的研究工作主要以真实的产品评论为前提,很少关注虚假评论。本文基于对欺骗性评论的识别结果,探讨当欺骗性评论充斥在线评论系统时,消费者是否意识到或感知到,并进一步分析不同感知对最终购买决策的影响。问卷调查的实证分析表明,在消费者两种不同感知的情况下,欺骗性评论对购买决策结果的影响存在显著差异。此外,研究还表明,消费者的说服知识在感知欺骗与购买决策之间起着调节作用。
{"title":"The Impact of Online Reviews Manipulation on Consumer Purchase Decision Based on The Perspective of Consumers’ Perception","authors":"Minjuan Zhong Minjuan Zhong, Han Yang Minjuan Zhong, Keyang Zhong Han Yang, Xilong Qu Keyang Zhong, Zhenjin Li Xilong Qu","doi":"10.53106/160792642023122407008","DOIUrl":"https://doi.org/10.53106/160792642023122407008","url":null,"abstract":"Consumers depend on online reviews to influences their purchase decisions. On account of that,many vendors and retailers try to manipulate online reviews to mislead potential consumers to take risky purchase decisions. Many scholars have conducted a lot of research on the impact of online product reviews on consumer behavior and sales. However, the existing work are mainly based on the premise of real product reviews, but few attentions have been paid of fake ones. Based on the recognition results of deceptive reviews, this article explores whether consumers be aware or perceive it when deceptive reviews are flooding the online review system, and further analyze what influence will be imposed on final purchase decision with different perception. The empirical analysis of the questionnaire survey show that in the context of two different perceptions of consumers, deceptive reviews have significant differences in the results of purchase decisions. In addition, research also shows that consumers’ persuasive knowledge plays a moderating role between perceived deception and purchase decision.","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"87 3-4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139189769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Geolocation-based UAV-assisted Caching Strategies in Vehicular Networks 车载网络中基于地理定位的无人机辅助缓存策略
Pub Date : 2023-12-01 DOI: 10.53106/160792642023122407007
Ting Gong Ting Gong, Qi Zhu Ting Gong
{"title":"Geolocation-based UAV-assisted Caching Strategies in Vehicular Networks","authors":"Ting Gong Ting Gong, Qi Zhu Ting Gong","doi":"10.53106/160792642023122407007","DOIUrl":"https://doi.org/10.53106/160792642023122407007","url":null,"abstract":"<jats:p> </jats:p>","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"20 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139191952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Cloud-Based Assessment of Arterial Stiffness Through Contour Analysis of A Photoplethysmography 基于云技术的动脉僵硬度评估--通过照相血压计的轮廓分析实现
Pub Date : 2023-12-01 DOI: 10.53106/160792642023122407006
Wen-Li Lee Wen-Li Lee, Koyin Chang Wen-Li Lee, Ying-Chen Chi Koyin Chang, Wen-Shou Chou Ying-Chen Chi, Chen-Long Wu Wen-Shou Chou
Cardiovascular diseases (CVDs) are the leading cause of mortality globally. To effectively prevent CVDs, a variety of techniques have been employed to evaluate the mechanical properties of arteries, among which, aortic stiffness measured by aortic pulse wave velocity (PWV) has been proven to be an independent predictor of CVDs. However, the traditional way to measure PWV is complex and time consuming. Recent studies suggest the digital volume pulse (DVP) waveform to be an effective non-invasive method to obtain PWV. In this study, we present a cloud computing system that analyzes and calculates the relevant indices of arterial stiffness after receiving the measured DVP signals. The result of the analysis can be retrieved online for the user to view or download for further analysis. With this technique, arterial Stiffness Index (SI) for population can be obtained easily and inexpensively. This will help health authorities to do mass screening at population level and, hence, establish references of arterial SI for different cohorts by age, gender, ethnicity, and diseases.
心血管疾病(CVDs)是导致全球死亡的主要原因。为了有效预防心血管疾病,人们采用了多种技术来评估动脉的机械特性,其中,用主动脉脉搏波速度(PWV)测量主动脉僵化已被证明是心血管疾病的独立预测指标。然而,测量脉搏波速度的传统方法既复杂又耗时。最近的研究表明,数字容积脉搏(DVP)波形是获取脉搏波速度的有效无创方法。在这项研究中,我们提出了一种云计算系统,它能在接收到测量到的 DVP 信号后分析和计算动脉僵化的相关指数。分析结果可在线检索,供用户查看或下载作进一步分析。有了这项技术,就能以低廉的成本轻松获得人群的动脉僵化指数(SI)。这将有助于卫生部门在人群中进行大规模筛查,从而为不同年龄、性别、种族和疾病的人群建立动脉僵化指数参考值。
{"title":"A Cloud-Based Assessment of Arterial Stiffness Through Contour Analysis of A Photoplethysmography","authors":"Wen-Li Lee Wen-Li Lee, Koyin Chang Wen-Li Lee, Ying-Chen Chi Koyin Chang, Wen-Shou Chou Ying-Chen Chi, Chen-Long Wu Wen-Shou Chou","doi":"10.53106/160792642023122407006","DOIUrl":"https://doi.org/10.53106/160792642023122407006","url":null,"abstract":"Cardiovascular diseases (CVDs) are the leading cause of mortality globally. To effectively prevent CVDs, a variety of techniques have been employed to evaluate the mechanical properties of arteries, among which, aortic stiffness measured by aortic pulse wave velocity (PWV) has been proven to be an independent predictor of CVDs. However, the traditional way to measure PWV is complex and time consuming. Recent studies suggest the digital volume pulse (DVP) waveform to be an effective non-invasive method to obtain PWV. In this study, we present a cloud computing system that analyzes and calculates the relevant indices of arterial stiffness after receiving the measured DVP signals. The result of the analysis can be retrieved online for the user to view or download for further analysis. With this technique, arterial Stiffness Index (SI) for population can be obtained easily and inexpensively. This will help health authorities to do mass screening at population level and, hence, establish references of arterial SI for different cohorts by age, gender, ethnicity, and diseases.","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"11 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139192071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Small Convolutional Neural Network Trainer Designed through Transfer Learning in Dessert Classification 在甜点分类中通过迁移学习设计小型卷积神经网络训练器
Pub Date : 2023-12-01 DOI: 10.53106/160792642023122407009
Hua-Ching Chen Hua-Ching Chen, Hsuan-Ming Feng Hua-Ching Chen
This paper established a Convolutional Neural Network (CNN) with the concept of transfer learning, and combined the main feature analysis calculation and clustering algorithm to further demonstrate the superiority of the proposed small CNN trainer in the identification of traditional Kinmen desserts. Food dessert identification methods directly use skin texture, color, shape, and other features as the basis. This paper effectively extracted image features of an object by the small CNN trainer and classified the featured dataset into the right food categories. It was able to complete classification quickly and also achieved high-precision classification results. Different types of Kinmen desserts were identified through a multi-layer training cycle. A total of 100 training images for each of the 10 food categories and each image size is converted into a smaller training data set by capturing the important features through the CNN trainer. Then, the main features were generated and the dimensions of each food image data were reduced again by using the t-Distributed Stochastic Neighbor Embedding (t-SNE) or Principal Component Analysis (PCA) methods. An individually K-means or k-nearest neighbors (KNN) algorithms efficiently completed the grouping results and in the classified image restoration. The experimental results compared the classifications after the learning cycle of different trainers and showed that the highest accuracy that the appropriated CNN trainer of the proposed methology obtained was up to 99% with a minimum executing time of about 99.37 seconds.
本文建立了具有迁移学习概念的卷积神经网络(CNN),并结合主要特征分析计算和聚类算法,进一步证明了所提出的小型 CNN 训练器在金门传统甜点识别中的优越性。食品甜点识别方法直接以表皮纹理、颜色、形状等特征为基础。本文利用小型 CNN 训练器有效地提取了对象的图像特征,并将特征数据集划分为正确的食品类别。它不仅能快速完成分类,还能获得高精度的分类结果。通过多层训练循环,识别了不同类型的金门甜点。通过 CNN 训练器捕捉重要特征,将 10 个食品类别中每个类别和每个图像大小的共 100 张训练图像转换为较小的训练数据集。然后,利用 t 分布随机邻域嵌入(t-SNE)或主成分分析(PCA)方法生成主要特征,并再次降低每种食物图像数据的维度。单独的 K-means 或 K-nearest neighbors (KNN) 算法有效地完成了分组结果和分类图像的还原。实验结果比较了不同训练器学习周期后的分类结果,结果表明,建议方法学中的适当 CNN 训练器获得的最高准确率高达 99%,执行时间最短约为 99.37 秒。
{"title":"Small Convolutional Neural Network Trainer Designed through Transfer Learning in Dessert Classification","authors":"Hua-Ching Chen Hua-Ching Chen, Hsuan-Ming Feng Hua-Ching Chen","doi":"10.53106/160792642023122407009","DOIUrl":"https://doi.org/10.53106/160792642023122407009","url":null,"abstract":"This paper established a Convolutional Neural Network (CNN) with the concept of transfer learning, and combined the main feature analysis calculation and clustering algorithm to further demonstrate the superiority of the proposed small CNN trainer in the identification of traditional Kinmen desserts. Food dessert identification methods directly use skin texture, color, shape, and other features as the basis. This paper effectively extracted image features of an object by the small CNN trainer and classified the featured dataset into the right food categories. It was able to complete classification quickly and also achieved high-precision classification results. Different types of Kinmen desserts were identified through a multi-layer training cycle. A total of 100 training images for each of the 10 food categories and each image size is converted into a smaller training data set by capturing the important features through the CNN trainer. Then, the main features were generated and the dimensions of each food image data were reduced again by using the t-Distributed Stochastic Neighbor Embedding (t-SNE) or Principal Component Analysis (PCA) methods. An individually K-means or k-nearest neighbors (KNN) algorithms efficiently completed the grouping results and in the classified image restoration. The experimental results compared the classifications after the learning cycle of different trainers and showed that the highest accuracy that the appropriated CNN trainer of the proposed methology obtained was up to 99% with a minimum executing time of about 99.37 seconds.","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"11 11","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139189720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Constraints-based and One-time Modification Redactable Blockchain 基于约束和一次性修改的可重构区块链
Pub Date : 2023-12-01 DOI: 10.53106/160792642023122407005
Chunli Wang Chunli Wang, Yuling Chen Chunli Wang, Wensheng Jia Yuling Chen
Immutability enables the blockchain to store data permanently, which is considered to be the most essential property to protect the security of blockchain technology. However, illegal content stored on the blockchain cannot be modified either. "The right to be forgotten" stipulates that the data subject has the right to request the data controller to delete personal data about him, and the controller is obliged to delete the personal data in a timely manner in such circumstances. Therefore, redactable blockchains are proposed to solve the aforementioned problems. The redactable blockchain relaxes the immutability of blockchains in a controlled manner. However, a participant who is granted the privilege to modify the blockchain, he/she may add inappropriate or malicious modifications to the content of historical blocks. In this article, we introduce a redactable blockchain where transaction owners restrict what editors can rewrite in transactions. When posting an editable transaction, the transaction owner indicates what can be edited and what cannot be edited in order to restrict a transaction modifier from making malicious changes to the content of the transaction. The modifier’s changes to the transaction are then validated by the validator and any malicious changes that do not meet the requirements will fail to be validated. To counteract collusive attacks between modifiers and validators, they will be held accountable and penalized.
不变性使区块链能够永久存储数据,这被认为是保护区块链技术安全的最基本属性。但是,存储在区块链上的非法内容也不能被修改。"被遗忘权 "规定,数据主体有权要求数据控制者删除其个人数据,在这种情况下,控制者有义务及时删除个人数据。因此,提出了可编辑区块链来解决上述问题。可编辑区块链以可控的方式放宽了区块链的不可更改性。但是,被授予修改区块链权限的参与者可能会对历史区块的内容添加不恰当或恶意的修改。在本文中,我们介绍了一种可编辑区块链,在这种区块链中,交易所有者限制编辑者在交易中可以改写的内容。在发布可编辑交易时,交易所有者会指明哪些可以编辑,哪些不可以编辑,以限制交易修改者对交易内容进行恶意修改。然后,验证器会验证修改者对事务的修改,任何不符合要求的恶意修改都将无法通过验证。为了抵制修改者和验证者之间的串通攻击,他们将被追究责任并受到惩罚。
{"title":"Constraints-based and One-time Modification Redactable Blockchain","authors":"Chunli Wang Chunli Wang, Yuling Chen Chunli Wang, Wensheng Jia Yuling Chen","doi":"10.53106/160792642023122407005","DOIUrl":"https://doi.org/10.53106/160792642023122407005","url":null,"abstract":"Immutability enables the blockchain to store data permanently, which is considered to be the most essential property to protect the security of blockchain technology. However, illegal content stored on the blockchain cannot be modified either. \"The right to be forgotten\" stipulates that the data subject has the right to request the data controller to delete personal data about him, and the controller is obliged to delete the personal data in a timely manner in such circumstances. Therefore, redactable blockchains are proposed to solve the aforementioned problems. The redactable blockchain relaxes the immutability of blockchains in a controlled manner. However, a participant who is granted the privilege to modify the blockchain, he/she may add inappropriate or malicious modifications to the content of historical blocks. In this article, we introduce a redactable blockchain where transaction owners restrict what editors can rewrite in transactions. When posting an editable transaction, the transaction owner indicates what can be edited and what cannot be edited in order to restrict a transaction modifier from making malicious changes to the content of the transaction. The modifier’s changes to the transaction are then validated by the validator and any malicious changes that do not meet the requirements will fail to be validated. To counteract collusive attacks between modifiers and validators, they will be held accountable and penalized.","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"37 22","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139195022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Improved YOLOv5 Model to Detect Volume for Logs in Log Farms 使用改进的 YOLOv5 模型检测日志农场中日志的体积
Pub Date : 2023-12-01 DOI: 10.53106/160792642023122407002
Xianqi Deng Xianqi Deng, Jianping Liu Xianqi Deng, Cheng Peng Jianping Liu, Yingfei Wang Cheng Peng
In this paper, we propose a new computer vision model called SE-YOLOv5-SPD for counting the number of log ends in large wood piles in log farms. This task traditionally requires a lot of manpower and previous computer vision methods struggle to detect logs in low pixels and small objects in images. Our model is based on the YOLOv5 model and incorporates the Squeeze-and-Excitation Networks (SENet) attention module and SPD-Conv (Space-to-Depth Convolution) module to improve accuracy. We also compare the performance of the SE attention module and SPD-Conv module to the CBAM attention module and Focus module using the SE-YOLOv5-SPD model. Results show that the SE-YOLOv5-SPD model can achieve excellent results of 0.652 in mAP50:95, 0.912 in mAP50, 0.968 in Precision, and 0.864 in Recall in a low-resolution environment with interference, which is significantly better than other models. Our findings indicate that the SE-YOLOv5-SPD model is a promising solution for counting the number of log ends in wood piles.
在本文中,我们提出了一种名为 SE-YOLOv5-SPD 的新型计算机视觉模型,用于计算原木农场大型木材堆中的原木端头数量。这项任务传统上需要大量人力,而且以前的计算机视觉方法很难检测到图像中低像素和小物体中的原木。我们的模型以 YOLOv5 模型为基础,加入了挤压-激发网络(SENet)注意力模块和 SPD-Conv(空间-深度卷积)模块,以提高准确性。我们还比较了 SE 注意力模块和 SPD-Conv 模块与使用 SE-YOLOv5-SPD 模型的 CBAM 注意力模块和 Focus 模块的性能。结果表明,在有干扰的低分辨率环境中,SE-YOLOv5-SPD 模型的 mAP50:95 为 0.652,mAP50 为 0.912,精确度为 0.968,召回率为 0.864,明显优于其他模型。我们的研究结果表明,SE-YOLOv5-SPD 模型是计算木材堆中原木末端数量的一种很有前途的解决方案。
{"title":"Using Improved YOLOv5 Model to Detect Volume for Logs in Log Farms","authors":"Xianqi Deng Xianqi Deng, Jianping Liu Xianqi Deng, Cheng Peng Jianping Liu, Yingfei Wang Cheng Peng","doi":"10.53106/160792642023122407002","DOIUrl":"https://doi.org/10.53106/160792642023122407002","url":null,"abstract":"In this paper, we propose a new computer vision model called SE-YOLOv5-SPD for counting the number of log ends in large wood piles in log farms. This task traditionally requires a lot of manpower and previous computer vision methods struggle to detect logs in low pixels and small objects in images. Our model is based on the YOLOv5 model and incorporates the Squeeze-and-Excitation Networks (SENet) attention module and SPD-Conv (Space-to-Depth Convolution) module to improve accuracy. We also compare the performance of the SE attention module and SPD-Conv module to the CBAM attention module and Focus module using the SE-YOLOv5-SPD model. Results show that the SE-YOLOv5-SPD model can achieve excellent results of 0.652 in mAP50:95, 0.912 in mAP50, 0.968 in Precision, and 0.864 in Recall in a low-resolution environment with interference, which is significantly better than other models. Our findings indicate that the SE-YOLOv5-SPD model is a promising solution for counting the number of log ends in wood piles.","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"42 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139188659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Martial Art Learning Optimization: A Novel Metaheuristic Algorithm for Night Image Enhancement 武术学习优化:用于夜间图像增强的新型元搜索算法
Pub Date : 2023-12-01 DOI: 10.53106/160792642023122407003
Jeng-Shyang Pan Jeng-Shyang Pan, Ling Li Jeng-Shyang Pan, Shu-Chuan Chu Ling Li, Kuo-Kun Tseng Shu-Chuan Chu, Hisham A. Shehadeh Kuo-Kun Tseng
This paper proposes a human behavior-based optimization algorithm, Martial Arts Learning Optimization (MALO), for optimization problems in continuous spaces. The algorithm simulates the process of characters in martial arts learning so as to apply it to optimization problems. Characters in martial arts stories usually go through multiple stages of learning martial arts, such as self-study and leader teaching. Multiple learning stages of characters are modeled in this paper, utilizing the wisdom of the characters learning martial arts in the novel, enabling the optimization process. To verify and analyze the performance of the proposed algorithm, the algorithm is numerically tested on 30 benchmark functions, and it is found that its performance was better than the state-of-the-art nine algorithms. In addition, the algorithm is also used to solve the problem of nighttime image brightness enhancement. Compared with other image enhancement methods, the proposed MALO algorithm has superior results in both visual effects and quantitative image quality assessments.
本文针对连续空间中的优化问题,提出了一种基于人类行为的优化算法--武术学习优化(MALO)。该算法模拟武侠小说中人物的习武过程,从而将其应用于优化问题。武侠小说中的人物通常会经历自学和领教等多个学武阶段。本文利用小说中人物学习武功的智慧,对人物的多个学习阶段进行建模,从而实现优化过程。为了验证和分析所提算法的性能,该算法在 30 个基准函数上进行了数值测试,发现其性能优于最先进的 9 种算法。此外,该算法还被用于解决夜间图像亮度增强问题。与其他图像增强方法相比,所提出的 MALO 算法在视觉效果和定量图像质量评估方面都具有更优越的效果。
{"title":"Martial Art Learning Optimization: A Novel Metaheuristic Algorithm for Night Image Enhancement","authors":"Jeng-Shyang Pan Jeng-Shyang Pan, Ling Li Jeng-Shyang Pan, Shu-Chuan Chu Ling Li, Kuo-Kun Tseng Shu-Chuan Chu, Hisham A. Shehadeh Kuo-Kun Tseng","doi":"10.53106/160792642023122407003","DOIUrl":"https://doi.org/10.53106/160792642023122407003","url":null,"abstract":"This paper proposes a human behavior-based optimization algorithm, Martial Arts Learning Optimization (MALO), for optimization problems in continuous spaces. The algorithm simulates the process of characters in martial arts learning so as to apply it to optimization problems. Characters in martial arts stories usually go through multiple stages of learning martial arts, such as self-study and leader teaching. Multiple learning stages of characters are modeled in this paper, utilizing the wisdom of the characters learning martial arts in the novel, enabling the optimization process. To verify and analyze the performance of the proposed algorithm, the algorithm is numerically tested on 30 benchmark functions, and it is found that its performance was better than the state-of-the-art nine algorithms. In addition, the algorithm is also used to solve the problem of nighttime image brightness enhancement. Compared with other image enhancement methods, the proposed MALO algorithm has superior results in both visual effects and quantitative image quality assessments.","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"245 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139193052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TA-Sum: The Extractive Summarization Research Based on Topic Information TA-Sum:基于主题信息的提取式总结研究
Pub Date : 2023-12-01 DOI: 10.53106/160792642023122407010
Fang Xie Fang Xie, Hao Li Fang Xie, Beiye Zhang Hao Li, Jianan He Beiye Zhang, Xincong Zhong Jianan He
Text summarization is divided into extractive summarization and abstractive summarization. The extractive summarization technology aims to extract some main phrases and sentences from the original text to form a short summary for people to read quickly. However, extractive summarization is faced with problems such as poor sentence coherence and incomplete information, which makes it difficult to screen out important sentences from the source text. DNN (Deep Neural Network) is widely used for text summarization task. This paper proposes a TA-Sum model based on the neural topic model. Introducing the topic information can help people understand the relevant main content of source text quickly. We obtain the topic information using the neural topic model and implement the attention mechanism to fuse the topic information with the text representation, which improves the semantic integrity and completeness of the summary. The experimental results on the large-scale English data sets CNN/Daily mail are improved by 0.37%, 0.11%, and 0.17% respectively compared with BertSum, which demonstrates the effectiveness of our method.
文本摘要分为提取式摘要和抽象式摘要。提取式摘要技术旨在从原文中提取一些主要短语和句子,形成简短的摘要供人们快速阅读。然而,抽取式摘要面临着句子连贯性差、信息不完整等问题,难以从源文本中筛选出重要句子。深度神经网络(DNN)被广泛应用于文本摘要任务。本文提出了一种基于神经主题模型的 TA-Sum 模型。引入主题信息可以帮助人们快速理解源文本的相关主要内容。我们利用神经主题模型获取主题信息,并实施关注机制将主题信息与文本表示融合,从而提高了摘要的语义完整性和完备性。在大规模英文数据集 CNN/Daily mail 上的实验结果与 BertSum 相比分别提高了 0.37%、0.11% 和 0.17%,这证明了我们方法的有效性。
{"title":"TA-Sum: The Extractive Summarization Research Based on Topic Information","authors":"Fang Xie Fang Xie, Hao Li Fang Xie, Beiye Zhang Hao Li, Jianan He Beiye Zhang, Xincong Zhong Jianan He","doi":"10.53106/160792642023122407010","DOIUrl":"https://doi.org/10.53106/160792642023122407010","url":null,"abstract":"Text summarization is divided into extractive summarization and abstractive summarization. The extractive summarization technology aims to extract some main phrases and sentences from the original text to form a short summary for people to read quickly. However, extractive summarization is faced with problems such as poor sentence coherence and incomplete information, which makes it difficult to screen out important sentences from the source text. DNN (Deep Neural Network) is widely used for text summarization task. This paper proposes a TA-Sum model based on the neural topic model. Introducing the topic information can help people understand the relevant main content of source text quickly. We obtain the topic information using the neural topic model and implement the attention mechanism to fuse the topic information with the text representation, which improves the semantic integrity and completeness of the summary. The experimental results on the large-scale English data sets CNN/Daily mail are improved by 0.37%, 0.11%, and 0.17% respectively compared with BertSum, which demonstrates the effectiveness of our method.","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"21 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139194706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimize the Performance of the Neural Network by using a Mini Dataset Processing Method 使用小型数据集处理方法优化神经网络性能
Pub Date : 2023-11-01 DOI: 10.53106/160792642023112406005
Jingliang Chen Jingliang Chen, Chenchen Wu Jingliang Chen, Shuisheng Chen Chenchen Wu, Yi Zhu Shuisheng Chen, Bin Li Yi Zhu
In the case of traditional methods such as network models and algorithms are highly open source and highly bound to hardware, data processing has become an important method to optimize the performance of neural networks. In this paper, we combine traditional data processing methods and propose a method based on the mini dataset which is strictly randomly divided within the training process; and takes the calculation results of the cross-entropy loss function as the measurement standard, by comparing the mini dataset, screening, and processing to optimize the deep neural network. Using this method, each iteration training can obtain a relatively optimal result, and the optimization effects of each time are integrated to optimize the results of each epoch. Finally, in order to verify the effectiveness and applicability of this data processing method, experiments are carried out on MNIST, HAGRID, and CIFAR-10 datasets to compare the effects of using this method and not using this method under different hyper-parameters, and finally, the effectiveness of this data processing method is verified. Finally, we summarize the advantages and limitations of this method and look forward to the future improvement direction of this method.
在网络模型和算法等传统方法高度开源、与硬件高度绑定的情况下,数据处理成为优化神经网络性能的重要方法。本文结合传统的数据处理方法,提出了一种基于小数据集的方法,即在训练过程中严格随机划分小数据集,并以交叉熵损失函数的计算结果为衡量标准,通过对小数据集的比较、筛选、处理来优化深度神经网络。利用这种方法,每次迭代训练都能得到相对最优的结果,并综合每次的优化效果,对每个epoch的结果进行优化。最后,为了验证这种数据处理方法的有效性和适用性,我们在 MNIST、HAGRID 和 CIFAR-10 数据集上进行了实验,比较了在不同超参数下使用这种方法和不使用这种方法的效果,最终验证了这种数据处理方法的有效性。最后,我们总结了该方法的优点和局限性,并展望了该方法未来的改进方向。
{"title":"Optimize the Performance of the Neural Network by using a Mini Dataset Processing Method","authors":"Jingliang Chen Jingliang Chen, Chenchen Wu Jingliang Chen, Shuisheng Chen Chenchen Wu, Yi Zhu Shuisheng Chen, Bin Li Yi Zhu","doi":"10.53106/160792642023112406005","DOIUrl":"https://doi.org/10.53106/160792642023112406005","url":null,"abstract":"In the case of traditional methods such as network models and algorithms are highly open source and highly bound to hardware, data processing has become an important method to optimize the performance of neural networks. In this paper, we combine traditional data processing methods and propose a method based on the mini dataset which is strictly randomly divided within the training process; and takes the calculation results of the cross-entropy loss function as the measurement standard, by comparing the mini dataset, screening, and processing to optimize the deep neural network. Using this method, each iteration training can obtain a relatively optimal result, and the optimization effects of each time are integrated to optimize the results of each epoch. Finally, in order to verify the effectiveness and applicability of this data processing method, experiments are carried out on MNIST, HAGRID, and CIFAR-10 datasets to compare the effects of using this method and not using this method under different hyper-parameters, and finally, the effectiveness of this data processing method is verified. Finally, we summarize the advantages and limitations of this method and look forward to the future improvement direction of this method.","PeriodicalId":442331,"journal":{"name":"網際網路技術學刊","volume":"17 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139295794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
網際網路技術學刊
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1