首页 > 最新文献

Computer Journal最新文献

英文 中文
Correction to: Automatic Diagnosis of Diabetic Retinopathy from Retinal Abnormalities: Improved Jaya-Based Feature Selection and Recurrent Neural Network 修正:从视网膜异常自动诊断糖尿病视网膜病变:改进的基于jaya的特征选择和循环神经网络
4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-11-03 DOI: 10.1093/comjnl/bxad108
{"title":"Correction to: Automatic Diagnosis of Diabetic Retinopathy from Retinal Abnormalities: Improved Jaya-Based Feature Selection and Recurrent Neural Network","authors":"","doi":"10.1093/comjnl/bxad108","DOIUrl":"https://doi.org/10.1093/comjnl/bxad108","url":null,"abstract":"","PeriodicalId":50641,"journal":{"name":"Computer Journal","volume":"22 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135874909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Eager Term Rewriting For The Fracterm Calculus Of Common Meadows 普通草地分形微积分的急切项改写
4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-11-01 DOI: 10.1093/comjnl/bxad106
Jan A Bergstra, John V Tucker
Abstract Eager equality is a novel semantics for equality in the presence of partial operations. We consider term rewriting for eager equality for arithmetic in which division is a partial operator. We use common meadows which are essentially fields that contain an absorptive element $bot $. The idea is that term rewriting is supposed to be semantics preserving for non-$bot $ terms only. We show soundness and adequacy results for eager term rewriting w.r.t. the class of all common meadows. However, we show that an eager term rewrite system which is complete for common meadows of rational numbers is not easy to obtain, if it exists at all.
急切相等是一种新的语义,用于表示存在部分运算的相等性。考虑了除法为部分运算符的算术渴望等式的项重写。我们使用普通草甸,它本质上是包含吸收元素$bot $的田地。这个想法是,术语重写应该是语义保留非$bot $术语。我们证明了对所有普通草地类的热切项改写的健全性和充分性结果。然而,我们证明了一个对一般有理数完备的渴望项重写系统是不容易获得的,如果它存在的话。
{"title":"Eager Term Rewriting For The Fracterm Calculus Of Common Meadows","authors":"Jan A Bergstra, John V Tucker","doi":"10.1093/comjnl/bxad106","DOIUrl":"https://doi.org/10.1093/comjnl/bxad106","url":null,"abstract":"Abstract Eager equality is a novel semantics for equality in the presence of partial operations. We consider term rewriting for eager equality for arithmetic in which division is a partial operator. We use common meadows which are essentially fields that contain an absorptive element $bot $. The idea is that term rewriting is supposed to be semantics preserving for non-$bot $ terms only. We show soundness and adequacy results for eager term rewriting w.r.t. the class of all common meadows. However, we show that an eager term rewrite system which is complete for common meadows of rational numbers is not easy to obtain, if it exists at all.","PeriodicalId":50641,"journal":{"name":"Computer Journal","volume":"5 5-6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135509759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Leveraging Meta-Learning To Improve Unsupervised Domain Adaptation 利用元学习改进无监督领域适应
4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-11-01 DOI: 10.1093/comjnl/bxad104
Amirfarhad Farhadi, Arash Sharifi
Abstract Unsupervised Domain Adaptation (UDA) techniques in real-world scenarios often encounter limitations due to their reliance on reducing distribution dissimilarity between source and target domains, assuming it leads to effective adaptation. However, they overlook the intricate factors causing domain shifts, including data distribution variations, domain-specific features and nonlinear relationships, thereby hindering robust performance in challenging UDA tasks. The Neuro-Fuzzy Meta-Learning (NF-ML) approach overcomes traditional UDA limitations with its flexible framework that adapts to intricate, nonlinear domain gaps without rigid assumptions. NF-ML enhances domain adaptation by selecting a UDA subset and optimizing their weights via a neuro-fuzzy system, utilizing meta-learning to efficiently adapt models to new domains using previously acquired knowledge. This approach mitigates domain adaptation challenges and bolsters traditional UDA methods’ performance by harnessing the strengths of multiple UDA methods to enhance overall model generalization. The proposed approach shows potential in advancing domain adaptation research by providing a robust and efficient solution for real-world domain shifts. Experiments on three standard image datasets confirm the proposed approach’s superiority over state-of-the-art UDA methods, validating the effectiveness of meta-learning. Remarkably, the Office+Caltech 10, ImageCLEF-DA and combined digit datasets exhibit substantial accuracy gains of 30.9%, 6.8% and 10.9%, respectively, compared with the best-second baseline UDA approach.
摘要无监督域自适应(UDA)技术在现实场景中往往会遇到局限性,因为它依赖于减少源域和目标域之间的分布不相似性,假设它可以导致有效的自适应。然而,他们忽略了导致领域转移的复杂因素,包括数据分布变化、领域特定特征和非线性关系,从而阻碍了具有挑战性的UDA任务的稳健性能。神经模糊元学习(NF-ML)方法以其灵活的框架克服了传统的UDA限制,该框架可以适应复杂的非线性域间隙,而不需要严格的假设。NF-ML通过选择UDA子集并通过神经模糊系统优化其权重,利用元学习利用先前获得的知识有效地使模型适应新领域,从而增强了领域适应性。该方法通过利用多种UDA方法的优势来增强整体模型泛化,从而减轻了领域自适应的挑战,并增强了传统UDA方法的性能。该方法为现实世界的领域转移提供了一种鲁棒和高效的解决方案,在推进领域适应研究方面具有潜力。在三个标准图像数据集上的实验证实了所提出的方法优于最先进的UDA方法,验证了元学习的有效性。值得注意的是,与最佳第二基线UDA方法相比,Office+Caltech 10、ImageCLEF-DA和组合数字数据集的准确率分别提高了30.9%、6.8%和10.9%。
{"title":"Leveraging Meta-Learning To Improve Unsupervised Domain Adaptation","authors":"Amirfarhad Farhadi, Arash Sharifi","doi":"10.1093/comjnl/bxad104","DOIUrl":"https://doi.org/10.1093/comjnl/bxad104","url":null,"abstract":"Abstract Unsupervised Domain Adaptation (UDA) techniques in real-world scenarios often encounter limitations due to their reliance on reducing distribution dissimilarity between source and target domains, assuming it leads to effective adaptation. However, they overlook the intricate factors causing domain shifts, including data distribution variations, domain-specific features and nonlinear relationships, thereby hindering robust performance in challenging UDA tasks. The Neuro-Fuzzy Meta-Learning (NF-ML) approach overcomes traditional UDA limitations with its flexible framework that adapts to intricate, nonlinear domain gaps without rigid assumptions. NF-ML enhances domain adaptation by selecting a UDA subset and optimizing their weights via a neuro-fuzzy system, utilizing meta-learning to efficiently adapt models to new domains using previously acquired knowledge. This approach mitigates domain adaptation challenges and bolsters traditional UDA methods’ performance by harnessing the strengths of multiple UDA methods to enhance overall model generalization. The proposed approach shows potential in advancing domain adaptation research by providing a robust and efficient solution for real-world domain shifts. Experiments on three standard image datasets confirm the proposed approach’s superiority over state-of-the-art UDA methods, validating the effectiveness of meta-learning. Remarkably, the Office+Caltech 10, ImageCLEF-DA and combined digit datasets exhibit substantial accuracy gains of 30.9%, 6.8% and 10.9%, respectively, compared with the best-second baseline UDA approach.","PeriodicalId":50641,"journal":{"name":"Computer Journal","volume":"89 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135515302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Intrusion Detection Method Based on Attention Mechanism to Improve CNN-BiLSTM Model 基于注意机制改进CNN-BiLSTM模型的入侵检测方法
4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-11-01 DOI: 10.1093/comjnl/bxad105
Dingyu Shou, Chao Li, Zhen Wang, Song Cheng, Xiaobo Hu, Kai Zhang, Mi Wen, Yong Wang
Abstract Security of computer information can be improved with the use of a network intrusion detection system. Since the network environment is becoming more complex, more and more new methods of attacking the network have emerged, making the original intrusion detection methods ineffective. Increased network activity also causes intrusion detection systems to identify errors more frequently. We suggest a new intrusion detection technique in this research that combines a Convolutional Neural Network (CNN) model with a Bi-directional Long Short-term Memory Network (BiLSTM) model for adding attention mechanisms. We distinguish our model from existing methods in three ways. First, we use the NCR-SMOTE algorithm to resample the dataset. Secondly, we use recursive feature elimination method based on extreme random tree to select features. Thirdly, we improve the profitability and accuracy of predictions by adding attention mechanism to CNN-BiLSTM. This experiment uses UNSW-UB15 dataset composed of real traffic, and the accuracy rate of multi-classification is 84.5$%$; the accuracy rate of multi-classification in CSE-IC-IDS2018 dataset reached 98.3$%$.
摘要采用网络入侵检测系统可以提高计算机信息的安全性。随着网络环境的日益复杂,越来越多新的攻击网络的方法层出不穷,使得原有的入侵检测方法失效。增加的网络活动也导致入侵检测系统更频繁地识别错误。本研究提出了一种新的入侵检测技术,该技术将卷积神经网络(CNN)模型与双向长短期记忆网络(BiLSTM)模型相结合,以增加注意机制。我们从三个方面将我们的模型与现有方法区分开来。首先,我们使用NCR-SMOTE算法对数据集进行重新采样。其次,采用基于极值随机树的递归特征消去方法进行特征选择。第三,我们通过在CNN-BiLSTM中加入注意机制来提高预测的盈利能力和准确性。本实验使用由真实流量组成的UNSW-UB15数据集,多重分类准确率为84.5%;CSE-IC-IDS2018数据集的多分类准确率达到98.3%。
{"title":"An Intrusion Detection Method Based on Attention Mechanism to Improve CNN-BiLSTM Model","authors":"Dingyu Shou, Chao Li, Zhen Wang, Song Cheng, Xiaobo Hu, Kai Zhang, Mi Wen, Yong Wang","doi":"10.1093/comjnl/bxad105","DOIUrl":"https://doi.org/10.1093/comjnl/bxad105","url":null,"abstract":"Abstract Security of computer information can be improved with the use of a network intrusion detection system. Since the network environment is becoming more complex, more and more new methods of attacking the network have emerged, making the original intrusion detection methods ineffective. Increased network activity also causes intrusion detection systems to identify errors more frequently. We suggest a new intrusion detection technique in this research that combines a Convolutional Neural Network (CNN) model with a Bi-directional Long Short-term Memory Network (BiLSTM) model for adding attention mechanisms. We distinguish our model from existing methods in three ways. First, we use the NCR-SMOTE algorithm to resample the dataset. Secondly, we use recursive feature elimination method based on extreme random tree to select features. Thirdly, we improve the profitability and accuracy of predictions by adding attention mechanism to CNN-BiLSTM. This experiment uses UNSW-UB15 dataset composed of real traffic, and the accuracy rate of multi-classification is 84.5$%$; the accuracy rate of multi-classification in CSE-IC-IDS2018 dataset reached 98.3$%$.","PeriodicalId":50641,"journal":{"name":"Computer Journal","volume":"14 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135509913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Auditory Brainstem Response Classification Based On Vision Transformer 基于视觉变换增强听觉脑干反应分类
4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-11-01 DOI: 10.1093/comjnl/bxad107
Hunar Abubakir Ahmed, Jafar Majidpour, Mohammed Hussein Ahmed, Samer Kais Jameel, Amir Majidpour
Abstract A method for testing the health of ear’s peripheral auditory nerve and its connection to the brainstem is called an auditory brainstem response (ABR). Manual quantification of ABR tests by an audiologist is not only costly but also time-consuming and susceptible to errors. Recently in machine learning have prompted a resurgence of research into ABR classification. This study presents an automated ABR recognition model. The initial step in our design process involves collecting a dataset by extracting ABR test images from sample test reports. Subsequently, we employ an elastic distortion approach to generate new images from the originals, effectively expanding the dataset while preserving the fundamental structure and morphology of the original ABR content. Finally, the Vision Transformer method was exploited to train and develop our model. In the testing phase, the incorporation of both the newly generated and original images yields an impressive accuracy rate of 97.83%. This result is noteworthy when benchmarked against the latest research in the field, underscoring the substantial performance enhancement achieved through the utilization of generated data.
听觉脑干反应(ABR)是一种检测耳外周听神经健康状况及其与脑干连接的方法。听力学家手工量化ABR测试不仅昂贵,而且耗时且容易出错。最近,机器学习促使ABR分类研究的复苏。本研究提出了一种自动ABR识别模型。我们设计过程的第一步包括通过从样本测试报告中提取ABR测试图像来收集数据集。随后,我们采用弹性变形方法从原始图像中生成新图像,有效地扩展了数据集,同时保留了原始ABR内容的基本结构和形态。最后,利用Vision Transformer方法对模型进行训练和开发。在测试阶段,将新生成的图像和原始图像结合在一起,准确率达到了令人印象深刻的97.83%。当与该领域的最新研究进行基准比较时,这个结果值得注意,它强调了通过利用生成的数据实现的实质性性能增强。
{"title":"Enhancing Auditory Brainstem Response Classification Based On Vision Transformer","authors":"Hunar Abubakir Ahmed, Jafar Majidpour, Mohammed Hussein Ahmed, Samer Kais Jameel, Amir Majidpour","doi":"10.1093/comjnl/bxad107","DOIUrl":"https://doi.org/10.1093/comjnl/bxad107","url":null,"abstract":"Abstract A method for testing the health of ear’s peripheral auditory nerve and its connection to the brainstem is called an auditory brainstem response (ABR). Manual quantification of ABR tests by an audiologist is not only costly but also time-consuming and susceptible to errors. Recently in machine learning have prompted a resurgence of research into ABR classification. This study presents an automated ABR recognition model. The initial step in our design process involves collecting a dataset by extracting ABR test images from sample test reports. Subsequently, we employ an elastic distortion approach to generate new images from the originals, effectively expanding the dataset while preserving the fundamental structure and morphology of the original ABR content. Finally, the Vision Transformer method was exploited to train and develop our model. In the testing phase, the incorporation of both the newly generated and original images yields an impressive accuracy rate of 97.83%. This result is noteworthy when benchmarked against the latest research in the field, underscoring the substantial performance enhancement achieved through the utilization of generated data.","PeriodicalId":50641,"journal":{"name":"Computer Journal","volume":"12 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135510392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Keyframe-guided Video Swin Transformer with Multi-path Excitation for Violence Detection 基于多路径激励的关键帧引导视频Swin变压器暴力检测
4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-10-20 DOI: 10.1093/comjnl/bxad103
Chenghao Li, Xinyan Yang, Gang Liang
Abstract Violence detection is a critical task aimed at identifying violent behavior in video by extracting frames and applying classification models. However, the complexity of video data and the suddenness of violent events present significant hurdles in accurately pinpointing instances of violence, making the extraction of frames that indicate violence a challenging endeavor. Furthermore, designing and applying high-performance models for violence detection remains an open problem. Traditional models embed extracted spatial features from sampled frames directly into a temporal sequence, which ignores the spatio-temporal characteristics of video and limits the ability to express continuous changes between adjacent frames. To address the existing challenges, this paper proposes a novel framework called ACTION-VST. First, a keyframe extraction algorithm is developed to select frames that are most likely to represent violent scenes in videos. To transform visual sequences into spatio-temporal feature maps, a multi-path excitation module is proposed to activate spatio-temporal, channel and motion features. Next, an advanced Video Swin Transformer-based network is employed for both global and local spatio-temporal modeling, which enables comprehensive feature extraction and representation of violence. The proposed method was validated on two large-scale datasets, RLVS and RWF-2000, achieving accuracies of over 98 and 93%, respectively, surpassing the state of the art.
摘要暴力检测是一项关键任务,旨在通过提取帧并应用分类模型来识别视频中的暴力行为。然而,视频数据的复杂性和暴力事件的突发性给准确定位暴力事件带来了重大障碍,使得提取表明暴力的帧成为一项具有挑战性的工作。此外,设计和应用高性能的暴力检测模型仍然是一个悬而未决的问题。传统模型将从采样帧中提取的空间特征直接嵌入到时间序列中,忽略了视频的时空特征,限制了表达相邻帧之间连续变化的能力。为了解决现有的挑战,本文提出了一个名为ACTION-VST的新框架。首先,开发了一种关键帧提取算法,以选择最可能代表视频中暴力场景的帧。为了将视觉序列转化为时空特征映射,提出了一种多路径激励模块来激活时空、通道和运动特征。其次,采用一种先进的基于视频旋转变压器的网络进行全局和局部时空建模,从而实现对暴力的全面特征提取和表示。该方法在RLVS和RWF-2000两个大型数据集上进行了验证,准确率分别超过98%和93%,超过了目前的水平。
{"title":"Keyframe-guided Video Swin Transformer with Multi-path Excitation for Violence Detection","authors":"Chenghao Li, Xinyan Yang, Gang Liang","doi":"10.1093/comjnl/bxad103","DOIUrl":"https://doi.org/10.1093/comjnl/bxad103","url":null,"abstract":"Abstract Violence detection is a critical task aimed at identifying violent behavior in video by extracting frames and applying classification models. However, the complexity of video data and the suddenness of violent events present significant hurdles in accurately pinpointing instances of violence, making the extraction of frames that indicate violence a challenging endeavor. Furthermore, designing and applying high-performance models for violence detection remains an open problem. Traditional models embed extracted spatial features from sampled frames directly into a temporal sequence, which ignores the spatio-temporal characteristics of video and limits the ability to express continuous changes between adjacent frames. To address the existing challenges, this paper proposes a novel framework called ACTION-VST. First, a keyframe extraction algorithm is developed to select frames that are most likely to represent violent scenes in videos. To transform visual sequences into spatio-temporal feature maps, a multi-path excitation module is proposed to activate spatio-temporal, channel and motion features. Next, an advanced Video Swin Transformer-based network is employed for both global and local spatio-temporal modeling, which enables comprehensive feature extraction and representation of violence. The proposed method was validated on two large-scale datasets, RLVS and RWF-2000, achieving accuracies of over 98 and 93%, respectively, surpassing the state of the art.","PeriodicalId":50641,"journal":{"name":"Computer Journal","volume":"127 46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135618697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Policy-Based Remote User Authentication From Multi-Biometrics 基于多生物特征的策略远程用户认证
4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-10-19 DOI: 10.1093/comjnl/bxad102
Yangguang Tian, Yingjiu Li, Robert H Deng, Guomin Yang, Nan Li
Abstract In this paper, we introduce the first generic framework of policy-based remote user authentication from multiple biometrics. The proposed framework allows an authorized user to remotely authenticate herself to an authentication server using her multiple biometrics, which enhances both the security and usability of user authentications. The authentication server approves a user’s authentication request if and only if the user’s multiple biometrics satisfies an authentication policy. In particular, the authentication policy can be dynamically updated to satisfy different security and usability requirements in practice. We implement an instantiation of the proposed framework and report its performance under various authentication policies.
本文介绍了基于策略的多生物特征远程用户认证的第一个通用框架。提出的框架允许授权用户使用其多种生物特征向身份验证服务器进行远程身份验证,从而增强了用户身份验证的安全性和可用性。当且仅当用户的多个生物特征满足身份验证策略时,身份验证服务器批准用户的身份验证请求。特别是,认证策略可以动态更新,以满足实践中不同的安全性和可用性需求。我们实现了所提出框架的实例化,并报告了其在各种身份验证策略下的性能。
{"title":"Policy-Based Remote User Authentication From Multi-Biometrics","authors":"Yangguang Tian, Yingjiu Li, Robert H Deng, Guomin Yang, Nan Li","doi":"10.1093/comjnl/bxad102","DOIUrl":"https://doi.org/10.1093/comjnl/bxad102","url":null,"abstract":"Abstract In this paper, we introduce the first generic framework of policy-based remote user authentication from multiple biometrics. The proposed framework allows an authorized user to remotely authenticate herself to an authentication server using her multiple biometrics, which enhances both the security and usability of user authentications. The authentication server approves a user’s authentication request if and only if the user’s multiple biometrics satisfies an authentication policy. In particular, the authentication policy can be dynamically updated to satisfy different security and usability requirements in practice. We implement an instantiation of the proposed framework and report its performance under various authentication policies.","PeriodicalId":50641,"journal":{"name":"Computer Journal","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135781642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Underwater Wireless Sensor Network-Based Delaunay Triangulation (UWSN-DT) Algorithm for Sonar Map Fusion 基于水下无线传感器网络的Delaunay三角剖分(UWSN-DT)声纳地图融合算法
4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-10-11 DOI: 10.1093/comjnl/bxad094
Xin Yuan, Ning Li, Xiaobo Gong, Changli Yu, Xiaoteng Zhou, José-Fernán Martínez Ortega
Abstract Robust and fast image recognition and matching is an important task in the underwater domain. The primary focus of this work is on extracting subsea features with sonar sensor for further Autonomous Underwater Vehicle navigation, such as the robotic localization and landmark mapping applications. With the assistance of high-resolution underwater features in the Side Scan Sonar (SSS) images, an efficient feature detector and descriptor, Speeded Up Robust Feature, is employed to seabed sonar image fusion task. In order to solve the nonlinear intensity difference problem in SSS images, the main novelty of this work is the proposed Underwater Wireless Sensor Network-based Delaunay Triangulation (UWSN-DT) algorithm for improving the performances of sonar map fusion accuracy with low computational complexity, in which the wireless nodes are considered as underwater feature points, since nodes could provide sufficiently useful information for the underwater map fusion, such as the location. In the simulated experiments, it shows that the presented UWSN-DT approach works efficiently and robustly, especially for the subsea environments where there are few distinguishable feature points.
鲁棒、快速的图像识别与匹配是水下领域的一项重要任务。这项工作的主要重点是利用声呐传感器提取海底特征,用于进一步的自主水下航行器导航,如机器人定位和地标测绘应用。利用侧面扫描声呐图像中的高分辨率水下特征,将一种高效的特征检测器和描述符——加速鲁棒特征应用于海底声呐图像融合任务。为了解决SSS图像中的非线性强度差问题,本文的主要新颖之处在于提出了基于水下无线传感器网络的Delaunay三角测量(UWSN-DT)算法,该算法将无线节点视为水下特征点,因为节点可以为水下地图融合提供足够有用的信息,例如位置。该算法以较低的计算复杂度提高了声纳地图融合精度。仿真实验表明,所提出的UWSN-DT方法有效且鲁棒性好,尤其适用于特征点难以区分的海底环境。
{"title":"Underwater Wireless Sensor Network-Based Delaunay Triangulation (UWSN-DT) Algorithm for Sonar Map Fusion","authors":"Xin Yuan, Ning Li, Xiaobo Gong, Changli Yu, Xiaoteng Zhou, José-Fernán Martínez Ortega","doi":"10.1093/comjnl/bxad094","DOIUrl":"https://doi.org/10.1093/comjnl/bxad094","url":null,"abstract":"Abstract Robust and fast image recognition and matching is an important task in the underwater domain. The primary focus of this work is on extracting subsea features with sonar sensor for further Autonomous Underwater Vehicle navigation, such as the robotic localization and landmark mapping applications. With the assistance of high-resolution underwater features in the Side Scan Sonar (SSS) images, an efficient feature detector and descriptor, Speeded Up Robust Feature, is employed to seabed sonar image fusion task. In order to solve the nonlinear intensity difference problem in SSS images, the main novelty of this work is the proposed Underwater Wireless Sensor Network-based Delaunay Triangulation (UWSN-DT) algorithm for improving the performances of sonar map fusion accuracy with low computational complexity, in which the wireless nodes are considered as underwater feature points, since nodes could provide sufficiently useful information for the underwater map fusion, such as the location. In the simulated experiments, it shows that the presented UWSN-DT approach works efficiently and robustly, especially for the subsea environments where there are few distinguishable feature points.","PeriodicalId":50641,"journal":{"name":"Computer Journal","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136213850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Similarity Regression Of Functions In Different Compiled Forms With Neural Attentions On Dual Control-Flow Graphs 不同编译形式函数的相似回归及对偶控制流图的神经关注
4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-10-11 DOI: 10.1093/comjnl/bxad095
Yun Zhang, Yuling Liu, Ge Cheng, Jie Wang
Abstract Detecting if two functions in different compiled forms are similar has a wide range of applications in software security. We present a method that leverages both semantic and structural features of functions, learned by a neural-net model on the underlying control-flow graphs (CFGs). In particular, we devise a neural function-similarity regressor (NFSR) with attentions on dual CFGs. We train and evaluate NFSR on a dataset consisting of nearly 4 million functions from over 14 900 binary files. Experiments show that NFSR is superior to the SOTA models of SAFE, Gemini and GMN, especially for binary functions with large CFGs. An ablation study shows that attention on dual CFGs plays a significant role in detecting function similarities.
摘要检测不同编译形式的两个函数是否相似在软件安全中有着广泛的应用。我们提出了一种利用函数的语义和结构特征的方法,通过在底层控制流图(cfg)上的神经网络模型学习。特别地,我们设计了一个神经功能相似回归器(NFSR),关注双CFGs。我们在一个数据集上训练和评估NFSR,该数据集由来自14900多个二进制文件的近400万个函数组成。实验表明,NFSR模型优于SAFE、Gemini和GMN的SOTA模型,特别是对于具有较大CFGs的二元函数。一项消融研究表明,对双CFGs的关注在检测功能相似性方面起着重要作用。
{"title":"Similarity Regression Of Functions In Different Compiled Forms With Neural Attentions On Dual Control-Flow Graphs","authors":"Yun Zhang, Yuling Liu, Ge Cheng, Jie Wang","doi":"10.1093/comjnl/bxad095","DOIUrl":"https://doi.org/10.1093/comjnl/bxad095","url":null,"abstract":"Abstract Detecting if two functions in different compiled forms are similar has a wide range of applications in software security. We present a method that leverages both semantic and structural features of functions, learned by a neural-net model on the underlying control-flow graphs (CFGs). In particular, we devise a neural function-similarity regressor (NFSR) with attentions on dual CFGs. We train and evaluate NFSR on a dataset consisting of nearly 4 million functions from over 14 900 binary files. Experiments show that NFSR is superior to the SOTA models of SAFE, Gemini and GMN, especially for binary functions with large CFGs. An ablation study shows that attention on dual CFGs plays a significant role in detecting function similarities.","PeriodicalId":50641,"journal":{"name":"Computer Journal","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136213519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exact Short Products From Truncated Multipliers 截断乘数的精确短乘积
4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-10-11 DOI: 10.1093/comjnl/bxad077
Daniel Lemire
Abstract We sometimes need to compute the most significant digits of the product of small integers with a multiplier requiring much storage, e.g. a large integer (e.g. $5^{100}$) or an irrational number ($pi $). We only need to access the most significant digits of the multiplier—as long as the integers are sufficiently small. We provide an efficient algorithm to compute the range of integers given a truncated multiplier and a desired number of digits.
我们有时需要计算需要大量存储空间的小整数乘积的最高有效位数,例如大整数(例如$5^{100}$)或无理数($pi $)。只要整数足够小,我们只需要访问乘数的最高有效位数。我们提供了一种有效的算法来计算给定截断乘数和所需位数的整数范围。
{"title":"Exact Short Products From Truncated Multipliers","authors":"Daniel Lemire","doi":"10.1093/comjnl/bxad077","DOIUrl":"https://doi.org/10.1093/comjnl/bxad077","url":null,"abstract":"Abstract We sometimes need to compute the most significant digits of the product of small integers with a multiplier requiring much storage, e.g. a large integer (e.g. $5^{100}$) or an irrational number ($pi $). We only need to access the most significant digits of the multiplier—as long as the integers are sufficiently small. We provide an efficient algorithm to compute the range of integers given a truncated multiplier and a desired number of digits.","PeriodicalId":50641,"journal":{"name":"Computer Journal","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136213548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer Journal
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1