首页 > 最新文献

AUTOMATIC CONTROL AND COMPUTER SCIENCES最新文献

英文 中文
Financial Digital Images Compression Method Based on Discrete Cosine Transform 基于离散余弦变换的金融数字图像压缩方法
IF 0.6 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2024-11-06 DOI: 10.3103/S014641162470069X
Wenjin Wang, Miaomiao Lu, Xuanling Dai, Ping Jiang

In response to the characteristics of financial image data, this paper proposes an efficient digital image compression scheme. Firstly, discrete cosine transform (DCT) is applied to divide the financial image into DC and AC coefficients. Secondly, based on the characteristics of DCT coefficients, a fuzzy method is employed to categorize DCT subblocks into smooth, texture, and edge classes, enabling distinct quantization strategies. Subsequently, to eliminate spatial and statistical redundancies in financial images, common features and structures are utilized, and a specific scanning approach is employed to optimize the arrangement of important coefficients. Finally, differential prediction and entropy coding are employed for DCT coefficient scanning encoding, enhancing compression efficiency. The objective evaluation metrics of this algorithm are approximately 2 dB higher than existing algorithms at bit rates of 0.25 and 0.5. Even at bit rates of 0.75, 1.5, 2.5, and 3.5, the performance of this method still outperforms the comparative algorithms, demonstrating its capability to efficiently store and transmit massive financial image data, thereby providing robust support for data processing in the financial sector.

针对金融图像数据的特点,本文提出了一种高效的数字图像压缩方案。首先,采用离散余弦变换(DCT)将金融图像分为直流和交流两个系数。其次,根据离散余弦变换系数的特征,采用模糊方法将离散余弦变换子块分为平滑类、纹理类和边缘类,从而实现不同的量化策略。随后,为了消除金融图像中的空间和统计冗余,利用共同特征和结构,并采用特定的扫描方法来优化重要系数的排列。最后,采用差分预测和熵编码进行 DCT 系数扫描编码,提高了压缩效率。在比特率为 0.25 和 0.5 时,该算法的客观评价指标比现有算法高出约 2 dB。即使在比特率为 0.75、1.5、2.5 和 3.5 时,该方法的性能仍优于同类算法,这表明它有能力高效地存储和传输海量金融图像数据,从而为金融领域的数据处理提供强有力的支持。
{"title":"Financial Digital Images Compression Method Based on Discrete Cosine Transform","authors":"Wenjin Wang,&nbsp;Miaomiao Lu,&nbsp;Xuanling Dai,&nbsp;Ping Jiang","doi":"10.3103/S014641162470069X","DOIUrl":"10.3103/S014641162470069X","url":null,"abstract":"<p>In response to the characteristics of financial image data, this paper proposes an efficient digital image compression scheme. Firstly, discrete cosine transform (DCT) is applied to divide the financial image into DC and AC coefficients. Secondly, based on the characteristics of DCT coefficients, a fuzzy method is employed to categorize DCT subblocks into smooth, texture, and edge classes, enabling distinct quantization strategies. Subsequently, to eliminate spatial and statistical redundancies in financial images, common features and structures are utilized, and a specific scanning approach is employed to optimize the arrangement of important coefficients. Finally, differential prediction and entropy coding are employed for DCT coefficient scanning encoding, enhancing compression efficiency. The objective evaluation metrics of this algorithm are approximately 2 dB higher than existing algorithms at bit rates of 0.25 and 0.5. Even at bit rates of 0.75, 1.5, 2.5, and 3.5, the performance of this method still outperforms the comparative algorithms, demonstrating its capability to efficiently store and transmit massive financial image data, thereby providing robust support for data processing in the financial sector.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 5","pages":"592 - 601"},"PeriodicalIF":0.6,"publicationDate":"2024-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142595391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Arabic Optical Character Recognition Approach Based on Levenshtein Distance 基于莱文斯坦距离的新型阿拉伯语光学字符识别方法
IF 0.6 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2024-11-06 DOI: 10.3103/S0146411624700639
Walid Fakhet, Salim El Khediri, Salah Zidi

Arabic handwritten character recognition (AHCR) is the process of automatically identifying and recognizing handwritten Arabic characters. This is a challenging task due to the complexity of the Arabic script, which includes a large number of characters with complex shapes and ligatures. In this paper, we present a novel approach based on Levenshtein distance to recognize Arabic handwritten characters by combining the classification and the postprocessing phases. To train the proposed model, we created an Arabic optical character recognition (OCR) context database divided into multiple text files. Each file in the database belongs to one of five well-defined contexts: sport, economy, religion, politics, and culture. The total number of words in each file is 15 000. The experiment results show that the new method outperforms the state-of-the-art approach. The error rate achieved by using 15 000 words was 1.2%.

阿拉伯语手写字符识别(ACR)是自动识别和识别阿拉伯语手写字符的过程。由于阿拉伯文字的复杂性,其中包括大量具有复杂形状和连字符的字符,因此这是一项具有挑战性的任务。在本文中,我们提出了一种基于莱文斯坦距离的新方法,通过结合分类和后处理阶段来识别阿拉伯语手写字符。为了训练所提出的模型,我们创建了一个阿拉伯语光学字符识别(OCR)上下文数据库,分为多个文本文件。数据库中的每个文件都属于五个明确定义的语境之一:体育、经济、宗教、政治和文化。每个文件的总字数为 15 000 个。实验结果表明,新方法优于最先进的方法。使用 15 000 个单词的错误率为 1.2%。
{"title":"A Novel Arabic Optical Character Recognition Approach Based on Levenshtein Distance","authors":"Walid Fakhet,&nbsp;Salim El Khediri,&nbsp;Salah Zidi","doi":"10.3103/S0146411624700639","DOIUrl":"10.3103/S0146411624700639","url":null,"abstract":"<p>Arabic handwritten character recognition (AHCR) is the process of automatically identifying and recognizing handwritten Arabic characters. This is a challenging task due to the complexity of the Arabic script, which includes a large number of characters with complex shapes and ligatures. In this paper, we present a novel approach based on Levenshtein distance to recognize Arabic handwritten characters by combining the classification and the postprocessing phases. To train the proposed model, we created an Arabic optical character recognition (OCR) context database divided into multiple text files. Each file in the database belongs to one of five well-defined contexts: sport, economy, religion, politics, and culture. The total number of words in each file is 15 000. The experiment results show that the new method outperforms the state-of-the-art approach. The error rate achieved by using 15 000 words was 1.2%.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 5","pages":"519 - 529"},"PeriodicalIF":0.6,"publicationDate":"2024-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142595445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advancing Driver Behavior Recognition: An Intelligent Approach Utilizing ResNet 推进驾驶员行为识别:利用 ResNet 的智能方法
IF 0.6 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2024-11-06 DOI: 10.3103/S0146411624700664
Haiyan Kang, Congming Zhang, Hongling Jiang

In pursuit of enhancing public safety and addressing challenges in driver behavior recognition, an intelligent recognition and detection method of driver behavior based on ResNet (IRDMDB-ResNet) is proposed. The approach aims to identify instances of distracted driving resulting from abnormal behavior. Three models (IRDMDB-1, IRDMDB-2, and IRDMDB-3) are presented to implement this method, which is adapted to a deep learning behavior recognition in driving scenarios. Firstly, this study utilizes two well-tested real datasets: Driver Drowsiness Dataset and The State Farm. These datasets undergo preprocessing to meet the input requirements of the model. Secondly, a lightweight convolutional neural network model has been designed to extract features, aiding the warning system in delivering precise information and minimizing traffic collisions to the maximum extent possible. Finally, the model is evaluated based on the confusion metrics, accuracy, precision, recall, and F1-score criterion. As a result, the IRDMDB-3 model proposed in this paper can recognize and detect driver behavior effectively and stably. And it achieves 99.79% of accuracy in the classification of distracted drivers looking elsewhere in The State Farm dataset. Similarly, the detection at Driver Drowsiness Dataset is 99.68%. This advancement represents a significant improvement in traffic safety, showcasing adaptability to diverse behaviors and remarkable recognition and detection capabilities.

为了提高公共安全和应对驾驶员行为识别方面的挑战,本文提出了一种基于 ResNet 的驾驶员行为智能识别和检测方法(IRDMDB-ResNet)。该方法旨在识别异常行为导致的分心驾驶实例。为实现该方法,提出了三个模型(IRDMDB-1、IRDMDB-2 和 IRDMDB-3),该方法适用于驾驶场景中的深度学习行为识别。首先,本研究使用了两个经过充分测试的真实数据集:驾驶员昏昏欲睡数据集》和《州立农场》。这些数据集经过预处理,以满足模型的输入要求。其次,设计了一个轻量级卷积神经网络模型来提取特征,帮助预警系统提供精确信息,最大限度地减少交通碰撞。最后,根据混淆度量、准确度、精确度、召回率和 F1 分数标准对模型进行评估。结果表明,本文提出的 IRDMDB-3 模型能够有效、稳定地识别和检测驾驶员行为。在 The State Farm 数据集中,该模型对分心驾驶员的分类准确率达到了 99.79%。同样,在驾驶员昏昏欲睡数据集上的检测准确率也达到了 99.68%。这一进步代表着交通安全方面的重大改进,展示了对各种行为的适应性以及卓越的识别和检测能力。
{"title":"Advancing Driver Behavior Recognition: An Intelligent Approach Utilizing ResNet","authors":"Haiyan Kang,&nbsp;Congming Zhang,&nbsp;Hongling Jiang","doi":"10.3103/S0146411624700664","DOIUrl":"10.3103/S0146411624700664","url":null,"abstract":"<p>In pursuit of enhancing public safety and addressing challenges in driver behavior recognition, an intelligent recognition and detection method of driver behavior based on ResNet (IRDMDB-ResNet) is proposed. The approach aims to identify instances of distracted driving resulting from abnormal behavior. Three models (IRDMDB-1, IRDMDB-2, and IRDMDB-3) are presented to implement this method, which is adapted to a deep learning behavior recognition in driving scenarios. Firstly, this study utilizes two well-tested real datasets: Driver Drowsiness Dataset and The State Farm. These datasets undergo preprocessing to meet the input requirements of the model. Secondly, a lightweight convolutional neural network model has been designed to extract features, aiding the warning system in delivering precise information and minimizing traffic collisions to the maximum extent possible. Finally, the model is evaluated based on the confusion metrics, accuracy, precision, recall, and F1-score criterion. As a result, the IRDMDB-3 model proposed in this paper can recognize and detect driver behavior effectively and stably. And it achieves 99.79% of accuracy in the classification of distracted drivers looking elsewhere in The State Farm dataset. Similarly, the detection at Driver Drowsiness Dataset is 99.68%. This advancement represents a significant improvement in traffic safety, showcasing adaptability to diverse behaviors and remarkable recognition and detection capabilities.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 5","pages":"555 - 568"},"PeriodicalIF":0.6,"publicationDate":"2024-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142595321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fall Monitoring System Based on Wearable Device and Improved KNN 基于可穿戴设备和改进型 KNN 的跌倒监测系统
IF 0.6 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2024-08-28 DOI: 10.3103/S0146411624700597
Shan Li, Diyuan Tan, Binbin Yao, Zhe Wang

For the elderly, falls can be extremely fatal. However, due to the physical decline of the elderly, it is difficult to avoid falls. Therefore, to the greatest extent feasible lessen the harm that falls on the elderly inflict, so that they can be found in the first time of falls, this study based on wearable devices, proposed a fall monitoring system using an improved K-nearest neighbor algorithm. The improved fuzzy K-nearest neighbor algorithm combined with support vector machine algorithm is applied to improve the efficiency and accuracy of the algorithm, and reduce the false positive rate and false negative rate as much as possible. The suggested model’s average precision in the simulation experiment is 97.5%. The specificity was 97.6%. The sensitivity was 97.5%. The convergence performance is also good, 24 iterations can reach the optimal. In the actual experiment, the average accuracy reached 98.7%; The false alarm rate is only 0.7%; The negative rate was 2.5%; Its performance is superior to other two algorithms. This shows that the proposed method has excellent accuracy, false positive rate and false negative rate in practical application, which has important significance for the health and safety of the elderly.

摘要 对于老年人来说,跌倒是极其致命的。然而,由于老年人身体机能下降,很难避免跌倒。因此,为了在可行的情况下最大程度地减轻跌倒对老年人造成的伤害,使他们能在跌倒的第一时间被发现,本研究基于可穿戴设备,提出了一种使用改进的 K 近邻算法的跌倒监测系统。将改进的模糊 K 近邻算法与支持向量机算法相结合,提高了算法的效率和准确性,尽可能地降低了假阳性率和假阴性率。在模拟实验中,建议模型的平均精确度为 97.5%。特异性为 97.6%。灵敏度为 97.5%。收敛性能也很好,迭代 24 次即可达到最优。在实际实验中,平均准确率达到 98.7%;误报率仅为 0.7%;负值率为 2.5%;其性能优于其他两种算法。由此可见,所提出的方法在实际应用中具有极佳的准确率、误报率和假阴性率,对老年人的健康和安全具有重要意义。
{"title":"Fall Monitoring System Based on Wearable Device and Improved KNN","authors":"Shan Li,&nbsp;Diyuan Tan,&nbsp;Binbin Yao,&nbsp;Zhe Wang","doi":"10.3103/S0146411624700597","DOIUrl":"10.3103/S0146411624700597","url":null,"abstract":"<p>For the elderly, falls can be extremely fatal. However, due to the physical decline of the elderly, it is difficult to avoid falls. Therefore, to the greatest extent feasible lessen the harm that falls on the elderly inflict, so that they can be found in the first time of falls, this study based on wearable devices, proposed a fall monitoring system using an improved K-nearest neighbor algorithm. The improved fuzzy K-nearest neighbor algorithm combined with support vector machine algorithm is applied to improve the efficiency and accuracy of the algorithm, and reduce the false positive rate and false negative rate as much as possible. The suggested model’s average precision in the simulation experiment is 97.5%. The specificity was 97.6%. The sensitivity was 97.5%. The convergence performance is also good, 24 iterations can reach the optimal. In the actual experiment, the average accuracy reached 98.7%; The false alarm rate is only 0.7%; The negative rate was 2.5%; Its performance is superior to other two algorithms. This shows that the proposed method has excellent accuracy, false positive rate and false negative rate in practical application, which has important significance for the health and safety of the elderly.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 4","pages":"366 - 378"},"PeriodicalIF":0.6,"publicationDate":"2024-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142200303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RF Source Localization Method Based on a Single-Anchor and Map Using Reflection in an Improved Particle Filter 基于单锚定和地图的射频源定位方法,在改进粒子滤波器中使用反射法
IF 0.6 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2024-08-28 DOI: 10.3103/S0146411624700500
Saeid Haidari,  Alireza Hosseinpour

This paper presents a new method of localizing radio frequency (RF) source in non-line of sight (NLOS) using data collected using the anchor and map. The measurable observation in the unmanned aerial vehicle (UAV) is assumed to be the received signal strength indicator (RSSI), and a method is presented based on the RSSI observation of the reflected signal sent from the anchor to estimate the location of the reflecting obstacle, which is a two-step method for map estimation and localization. It is also assumed that the map of the obstacle location is also available; the location of the reflective obstacle can be obtained using the map with an error. And finally, by combining this data in a weighted and improved particle filter for the optimal use of the number of particles in a wide area, the location of the unknown RF source is estimated more accurately. It was revealed that the proposed method improved localization and had good precision.

摘要 本文提出了一种利用锚和地图收集的数据在非视线(NLOS)范围内定位射频(RF)源的新方法。假定无人飞行器(UAV)中的可测量观测值为接收信号强度指示器(RSSI),并提出了一种基于锚发出的反射信号的 RSSI 观测值来估算反射障碍物位置的方法,这是一种分两步进行地图估算和定位的方法。同时假定障碍物位置的地图也是可用的;反射障碍物的位置可以利用有误差的地图获得。最后,通过将这些数据结合到加权和改进的粒子滤波器中,优化使用大范围内的粒子数量,从而更准确地估计出未知射频源的位置。结果表明,所提出的方法改进了定位,并具有良好的精度。
{"title":"RF Source Localization Method Based on a Single-Anchor and Map Using Reflection in an Improved Particle Filter","authors":"Saeid Haidari,&nbsp; Alireza Hosseinpour","doi":"10.3103/S0146411624700500","DOIUrl":"10.3103/S0146411624700500","url":null,"abstract":"<p>This paper presents a new method of localizing radio frequency (RF) source in non-line of sight (NLOS) using data collected using the anchor and map. The measurable observation in the unmanned aerial vehicle (UAV) is assumed to be the received signal strength indicator (RSSI), and a method is presented based on the RSSI observation of the reflected signal sent from the anchor to estimate the location of the reflecting obstacle, which is a two-step method for map estimation and localization. It is also assumed that the map of the obstacle location is also available; the location of the reflective obstacle can be obtained using the map with an error. And finally, by combining this data in a weighted and improved particle filter for the optimal use of the number of particles in a wide area, the location of the unknown RF source is estimated more accurately. It was revealed that the proposed method improved localization and had good precision.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 4","pages":"379 - 391"},"PeriodicalIF":0.6,"publicationDate":"2024-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142200304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fire Risk Monitoring of Tamarix chinensis Forest Based on Infrared Remote Sensing Technology 基于红外遥感技术的柽柳林火险监测
IF 0.6 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2024-08-28 DOI: 10.3103/S0146411624700482
Jin Wang, Ruiting Liu, Liming Liu, Xiaoxiang Cheng, Feiyong Chen, Xue Shen

In this study, the Tamarix chinensis forest in Changyi national marine ecological special protected area in Shandong province, China, was researched for forest fire monitoring based on thermal infrared remote sensing technology. We summarized the commonly monitoring methods for forest fire point based on remote sensing technology into two types: fixed threshold method (including its deformation model and extension model) and adjacent pixel analysis method (also known as background pixel correlation method). And we analyzed the advantages and disadvantages of these two methods. The BT (brightness temperature) data inverted from the remote sensing images of IRS sensor (HJ 1B satellite) and TIRS sensor (Landsat-8 satellite) indicated that there not had enough thermal radiation to form a fire point during the above phases in the protected zone. The research results and methods also confirmed that thermal infrared remote sensing technology can be used for forest fire monitoring and identification of macro forest fire point.

摘要 本研究以山东省昌邑国家级海洋生态特别保护区内的柽柳林为研究对象,开展了基于热红外遥感技术的林火监测研究。我们将基于遥感技术的林火点常用监测方法归纳为两类:固定阈值法(包括其变形模型和扩展模型)和相邻像素分析法(又称背景像素相关法)。并分析了这两种方法的优缺点。从 IRS 传感器(HJ 1B 号卫星)和 TIRS 传感器(Landsat-8 号卫星)的遥感图像反演的 BT(亮度温度)数据表明,在上述阶段,保护区内没有足够的热辐射形成火点。研究结果和方法也证实了热红外遥感技术可用于林火监测和宏观林火点的识别。
{"title":"Fire Risk Monitoring of Tamarix chinensis Forest Based on Infrared Remote Sensing Technology","authors":"Jin Wang,&nbsp;Ruiting Liu,&nbsp;Liming Liu,&nbsp;Xiaoxiang Cheng,&nbsp;Feiyong Chen,&nbsp;Xue Shen","doi":"10.3103/S0146411624700482","DOIUrl":"10.3103/S0146411624700482","url":null,"abstract":"<p>In this study, the <i>Tamarix</i> <i>chinensis</i> forest in Changyi national marine ecological special protected area in Shandong province, China, was researched for forest fire monitoring based on thermal infrared remote sensing technology. We summarized the commonly monitoring methods for forest fire point based on remote sensing technology into two types: fixed threshold method (including its deformation model and extension model) and adjacent pixel analysis method (also known as background pixel correlation method). And we analyzed the advantages and disadvantages of these two methods. The BT (brightness temperature) data inverted from the remote sensing images of IRS sensor (HJ 1B satellite) and TIRS sensor (Landsat-8 satellite) indicated that there not had enough thermal radiation to form a fire point during the above phases in the protected zone. The research results and methods also confirmed that thermal infrared remote sensing technology can be used for forest fire monitoring and identification of macro forest fire point.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 4","pages":"359 - 365"},"PeriodicalIF":0.6,"publicationDate":"2024-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142200302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Binocular Vision Image Calibration Method Based on Canny Operator 基于 Canny 运算器的双眼视觉图像校准方法研究
IF 0.6 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2024-08-28 DOI: 10.3103/S0146411624700585
Lei Yan

In this paper, on the basis of in-depth research on the key technology of binocular vision measurement; a set of multidimension online measurement system for image recognition is built. Canny operator is used as a tool to detect the contour features of parts, and the Canny operator is accelerated and improved from the aspects of mathematical reasoning and Gaussian pyramid. A synchronous external trigger circuit for a binocular camera and light source was designed. Finally, the improved algorithms in various aspects of visual measurement in this paper are applied to the measurement system. The experimental results show that the online measurement system has the advantages of high measurement accuracy and small repeatability errors.

摘要 本文在深入研究双目视觉测量关键技术的基础上,构建了一套用于图像识别的多维度在线测量系统。以Canny算子作为检测零件轮廓特征的工具,从数学推理和高斯金字塔等方面对Canny算子进行了加速和改进。设计了双目摄像头和光源的同步外部触发电路。最后,将本文在视觉测量各方面的改进算法应用到测量系统中。实验结果表明,在线测量系统具有测量精度高、重复性误差小等优点。
{"title":"Research on Binocular Vision Image Calibration Method Based on Canny Operator","authors":"Lei Yan","doi":"10.3103/S0146411624700585","DOIUrl":"10.3103/S0146411624700585","url":null,"abstract":"<p>In this paper, on the basis of in-depth research on the key technology of binocular vision measurement; a set of multidimension online measurement system for image recognition is built. Canny operator is used as a tool to detect the contour features of parts, and the Canny operator is accelerated and improved from the aspects of mathematical reasoning and Gaussian pyramid. A synchronous external trigger circuit for a binocular camera and light source was designed. Finally, the improved algorithms in various aspects of visual measurement in this paper are applied to the measurement system. The experimental results show that the online measurement system has the advantages of high measurement accuracy and small repeatability errors.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 4","pages":"472 - 480"},"PeriodicalIF":0.6,"publicationDate":"2024-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142200123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Facial Expression Recognition Based on Multiscale Features and Attention Mechanism 基于多尺度特征和注意力机制的面部表情识别
IF 0.6 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2024-08-28 DOI: 10.3103/S0146411624700548
Lisha Yao

Facial features extracted from deep convolutional networks are susceptible to background, individual identity and other factors. It interferes with facial expression recognition when mixed with useless features. Considering that different scale features have rich semantic and texture information respectively, this paper takes VGG-16 as the basic network structure and combines multiscale features to obtain richer feature information. In addition, the input feature map elements are enhanced or suppressed by the attention module in order to extract salient features more accurately. The proposed method was validated on two commonly used expression data sets CK+ and RAF-DB, and the recognition rates were 98.77 and 82.83%, respectively. Experimental results show the superiority of this method.

摘要 从深度卷积网络中提取的面部特征容易受到背景、个人身份和其他因素的影响。如果混入无用的特征,就会干扰面部表情识别。考虑到不同尺度的特征分别具有丰富的语义和纹理信息,本文以 VGG-16 为基本网络结构,结合多尺度特征来获取更丰富的特征信息。此外,输入的特征图元素会被注意力模块增强或抑制,以便更准确地提取突出特征。所提出的方法在两个常用的表达数据集 CK+ 和 RAF-DB 上进行了验证,识别率分别为 98.77% 和 82.83%。实验结果表明了该方法的优越性。
{"title":"Facial Expression Recognition Based on Multiscale Features and Attention Mechanism","authors":"Lisha Yao","doi":"10.3103/S0146411624700548","DOIUrl":"10.3103/S0146411624700548","url":null,"abstract":"<p>Facial features extracted from deep convolutional networks are susceptible to background, individual identity and other factors. It interferes with facial expression recognition when mixed with useless features. Considering that different scale features have rich semantic and texture information respectively, this paper takes VGG-16 as the basic network structure and combines multiscale features to obtain richer feature information. In addition, the input feature map elements are enhanced or suppressed by the attention module in order to extract salient features more accurately. The proposed method was validated on two commonly used expression data sets CK+ and RAF-DB, and the recognition rates were 98.77 and 82.83%, respectively. Experimental results show the superiority of this method.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 4","pages":"429 - 440"},"PeriodicalIF":0.6,"publicationDate":"2024-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142200307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Building a Production-Ready Keyword Detection System on a Real-World Audio 在真实世界音频上构建可用于生产的关键词检测系统
IF 0.6 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2024-08-28 DOI: 10.3103/S0146411624700561
Eugene Zhmakin,  Grach Mkrtchian

This paper deals with the problem of creating a keyword spotting (KWS) system with real-world audio data. The paper describes the different methods used to build KWS systems, deep learning models such as convolutional neural networks (CNN), transformers, etc. The paper also discusses the mainstream dataset for training and testing KWS models, Google Speech Commands. We conduct experiments on Google Speech Commands dataset and propose our method of creating a KWS dataset and that helps neural networks achieve better results in training on relatively small amounts of data. We also introduce an idea of a hybrid KWS inference system architecture that uses voice detection and light-weight speech recognition framework in attempt to boost its computational performance and accuracy. We conclude by noting that KWS is an important challenge in the field of speech recognition, and suggest that their method can be used to improve the performance of KWS systems in the circumstances of low amounts of training data. We also note that future research could focus on bettering the process of evaluating the models and improving the overall performance of KWS systems.

摘要 本文论述了利用真实世界的音频数据创建关键词定位(KWS)系统的问题。本文介绍了用于构建 KWS 系统的不同方法、深度学习模型(如卷积神经网络 (CNN))、变换器等。本文还讨论了用于训练和测试 KWS 模型的主流数据集--Google Speech Commands。我们在谷歌语音命令数据集上进行了实验,并提出了我们创建 KWS 数据集的方法,该方法有助于神经网络在相对较少的数据量上取得更好的训练效果。我们还介绍了混合 KWS 推理系统架构的想法,该架构使用语音检测和轻量级语音识别框架,试图提高其计算性能和准确性。最后,我们指出 KWS 是语音识别领域的一个重要挑战,并建议在训练数据量较少的情况下,可以使用他们的方法来提高 KWS 系统的性能。我们还指出,未来的研究可以侧重于改进评估模型的过程和提高 KWS 系统的整体性能。
{"title":"Building a Production-Ready Keyword Detection System on a Real-World Audio","authors":"Eugene Zhmakin,&nbsp; Grach Mkrtchian","doi":"10.3103/S0146411624700561","DOIUrl":"10.3103/S0146411624700561","url":null,"abstract":"<p>This paper deals with the problem of creating a keyword spotting (KWS) system with real-world audio data. The paper describes the different methods used to build KWS systems, deep learning models such as convolutional neural networks (CNN), transformers, etc. The paper also discusses the mainstream dataset for training and testing KWS models, Google Speech Commands. We conduct experiments on Google Speech Commands dataset and propose our method of creating a KWS dataset and that helps neural networks achieve better results in training on relatively small amounts of data. We also introduce an idea of a hybrid KWS inference system architecture that uses voice detection and light-weight speech recognition framework in attempt to boost its computational performance and accuracy. We conclude by noting that KWS is an important challenge in the field of speech recognition, and suggest that their method can be used to improve the performance of KWS systems in the circumstances of low amounts of training data. We also note that future research could focus on bettering the process of evaluating the models and improving the overall performance of KWS systems.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 4","pages":"454 - 458"},"PeriodicalIF":0.6,"publicationDate":"2024-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142200308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Research on Genetic Algorithm-Based Task Scheduling in Cloud-Fog Computing Systems 基于遗传算法的云雾计算系统任务调度研究
IF 0.6 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2024-08-28 DOI: 10.3103/S0146411624700512
Wang Hao, Li Hui, Song Duanzheng, Zhu Jintao

In recent years, the proliferating of IoT (Internet of things)-originated applications have generated huge amounts of data, which has put enormous pressure on infrastructures such as the network cloud. In this regard, scholars have proposed an architectural model for “cloud-fog” computing, where one of the obstacles to fog computing is how to allocate computing resources to minimize network resources. A heuristic-based TDCC (Time, distance, cost and computing-power) algorithm is proposed to optimize the task scheduling problem in this heterogeneous system for genetic algorithm-based “cloud-fog” computing, including execution time, operational cost, distance and total computing power resources. The algorithm uses evolutionary genetic algorithms as a research tool to combine the advantages of cloud computing, fog computing and genetic algorithms to achieve a balance between latency, cost, link length and computing power. In the hybrid computing task scheduling, this algorithm has a better balance than TCaS algorithm which only considers a single metric; this algorithm has a better adaptation value than traditional MPSO algorithm by 2.61%, BLA algorithm by 6.92% and RR algorithm by 33.39%, respectively. The algorithm is also flexible enough to match the user’s needs for high performance distance-cost-computing power, enhancing the effectiveness of the system.

摘要 近年来,由物联网(IoT)引发的应用层出不穷,产生了海量数据,给网络云等基础设施带来了巨大压力。为此,学者们提出了 "云-雾 "计算的架构模型,其中雾计算的障碍之一就是如何分配计算资源,使网络资源最小化。针对基于遗传算法的 "云-雾 "计算,提出了一种基于启发式的TDCC(时间、距离、成本和计算能力)算法,用于优化该异构系统中的任务调度问题,包括执行时间、运行成本、距离和总计算能力资源。该算法以进化遗传算法为研究工具,结合云计算、雾计算和遗传算法的优势,实现了延迟、成本、链路长度和计算能力之间的平衡。在混合计算任务调度中,该算法比只考虑单一指标的TCaS算法具有更好的平衡性;该算法的适应值分别比传统的MPSO算法好2.61%、BLA算法好6.92%、RR算法好33.39%。该算法还能灵活匹配用户对高性能距离-成本-计算能力的需求,提高了系统的有效性。
{"title":"A Research on Genetic Algorithm-Based Task Scheduling in Cloud-Fog Computing Systems","authors":"Wang Hao,&nbsp;Li Hui,&nbsp;Song Duanzheng,&nbsp;Zhu Jintao","doi":"10.3103/S0146411624700512","DOIUrl":"10.3103/S0146411624700512","url":null,"abstract":"<p>In recent years, the proliferating of IoT (Internet of things)-originated applications have generated huge amounts of data, which has put enormous pressure on infrastructures such as the network cloud. In this regard, scholars have proposed an architectural model for “cloud-fog” computing, where one of the obstacles to fog computing is how to allocate computing resources to minimize network resources. A heuristic-based TDCC (Time, distance, cost and computing-power) algorithm is proposed to optimize the task scheduling problem in this heterogeneous system for genetic algorithm-based “cloud-fog” computing, including execution time, operational cost, distance and total computing power resources. The algorithm uses evolutionary genetic algorithms as a research tool to combine the advantages of cloud computing, fog computing and genetic algorithms to achieve a balance between latency, cost, link length and computing power. In the hybrid computing task scheduling, this algorithm has a better balance than TCaS algorithm which only considers a single metric; this algorithm has a better adaptation value than traditional MPSO algorithm by 2.61%, BLA algorithm by 6.92% and RR algorithm by 33.39%, respectively. The algorithm is also flexible enough to match the user’s needs for high performance distance-cost-computing power, enhancing the effectiveness of the system.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 4","pages":"392 - 407"},"PeriodicalIF":0.6,"publicationDate":"2024-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142200305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
AUTOMATIC CONTROL AND COMPUTER SCIENCES
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1