首页 > 最新文献

Icon最新文献

英文 中文
Research on Optimization Methods for Industrial Model Retrieval 工业模型检索的优化方法研究
Q3 Arts and Humanities Pub Date : 2023-03-01 DOI: 10.1109/ICNLP58431.2023.00083
Wang Peng, Chunhui Hu
In the retrieval process of industrial models, the traditional database retrieval can no longer meet their needs in terms of efficiency and precision because of their multi-source heterogeneous, complex types and large information scale. This paper optimizes the Elasticsearch search engine in three aspects: the underlying index of the search engine, keyword search and sorting algorithm; and verifies the feasibility of the method through experiments.
在工业模型的检索过程中,由于其多源异构、类型复杂、信息规模大,传统的数据库检索方法在效率和精度上已不能满足其需要。本文从三个方面对Elasticsearch搜索引擎进行优化:搜索引擎的底层索引、关键词搜索和排序算法;并通过实验验证了该方法的可行性。
{"title":"Research on Optimization Methods for Industrial Model Retrieval","authors":"Wang Peng, Chunhui Hu","doi":"10.1109/ICNLP58431.2023.00083","DOIUrl":"https://doi.org/10.1109/ICNLP58431.2023.00083","url":null,"abstract":"In the retrieval process of industrial models, the traditional database retrieval can no longer meet their needs in terms of efficiency and precision because of their multi-source heterogeneous, complex types and large information scale. This paper optimizes the Elasticsearch search engine in three aspects: the underlying index of the search engine, keyword search and sorting algorithm; and verifies the feasibility of the method through experiments.","PeriodicalId":53637,"journal":{"name":"Icon","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79758577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Small Object Detection Based on Context Information and Attention Mechanism 基于上下文信息和注意机制的小目标检测
Q3 Arts and Humanities Pub Date : 2023-03-01 DOI: 10.1109/ICNLP58431.2023.00010
Mengyang Cheng, Haibo Ge, Sai Ma, Wenhao He, Yu An, Ting Zhou
In order to solve the problem of missed detection and false detection of small targets in object detection, and to improve the detection precision and recall of small object, this paper proposes a small object detection algorithm that introduces context information and attention mechanism. The algorithm is improved on the Faster RCNN network architecture, and a multilevel feature fusion module is proposed to solve the problem of incomplete extraction of detailed information. The proposed regional attention module solves the interference of background noise and focuses on the target to be detected. At the same time, in order to more effectively meet the characteristics of small target detection, we have improved the anchor box. The method proposed in this paper is verified on DIOR, PASCAL VOC2007 and MS COCO datasets. Experiments show that the algorithm proposed in this paper and the current advanced algorithm have better accuracy and precision in detecting small targets.
为了解决物体检测中小目标的漏检和误检问题,提高小目标的检测精度和召回率,本文提出了一种引入上下文信息和注意机制的小目标检测算法。该算法在Faster RCNN网络架构的基础上进行了改进,提出了多级特征融合模块,解决了细节信息提取不完全的问题。提出的区域关注模块解决了背景噪声的干扰,将注意力集中在待检测目标上。同时,为了更有效地满足小目标检测的特点,我们对锚盒进行了改进。本文提出的方法在DIOR、PASCAL VOC2007和MS COCO数据集上进行了验证。实验表明,本文提出的算法和现有的先进算法在小目标检测中具有更好的准确度和精度。
{"title":"Small Object Detection Based on Context Information and Attention Mechanism","authors":"Mengyang Cheng, Haibo Ge, Sai Ma, Wenhao He, Yu An, Ting Zhou","doi":"10.1109/ICNLP58431.2023.00010","DOIUrl":"https://doi.org/10.1109/ICNLP58431.2023.00010","url":null,"abstract":"In order to solve the problem of missed detection and false detection of small targets in object detection, and to improve the detection precision and recall of small object, this paper proposes a small object detection algorithm that introduces context information and attention mechanism. The algorithm is improved on the Faster RCNN network architecture, and a multilevel feature fusion module is proposed to solve the problem of incomplete extraction of detailed information. The proposed regional attention module solves the interference of background noise and focuses on the target to be detected. At the same time, in order to more effectively meet the characteristics of small target detection, we have improved the anchor box. The method proposed in this paper is verified on DIOR, PASCAL VOC2007 and MS COCO datasets. Experiments show that the algorithm proposed in this paper and the current advanced algorithm have better accuracy and precision in detecting small targets.","PeriodicalId":53637,"journal":{"name":"Icon","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81356683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A fast capture structure for dichotomous DMF pseudocode based on DSP Builder 基于DSP Builder的二分类DMF伪码的快速捕获结构
Q3 Arts and Humanities Pub Date : 2023-03-01 DOI: 10.1109/icnlp58431.2023.00071
Xihai Xie, Biao Hui
To address the problem of capturing correlation peak amplitude decay and difficulty in determining the capture threshold when the demodulated signal is synchronously captured by DMF (all-digital matched filter) under the influence of Doppler frequency bias, the dichotomous DMF method is proposed: the pseudo-random sequence is segmented before and after to reduce the integration time of correlation operation, and then reduce the loss of normalized correlation peak under the influence of frequency bias integration decay. Matlab platform simulation verifies the effect of correlation length on the loss of correlation peaks under the frequency bias scenario, and the experimental results show that the dichotomous DMF method is less sensitive to the Doppler frequency bias than the DMF method. In order to reduce the hardware resource overhead of the pseudocode phase search module and to ensure a certain search efficiency, a serial-parallel structure with serial data transmission and parallel operation is adopted, which can search multiple code elements at a time for phase deviation in the pseudocode phase search and improve the capture efficiency.
为了解决DMF(全数字匹配滤波器)在多普勒频偏影响下同步捕获解调信号时相关峰幅衰减和难以确定捕获阈值的问题,提出了二分DMF方法:对伪随机序列进行前后分割,减少相关运算的积分时间,从而减少归一化相关峰在频率偏置积分衰减影响下的损失。Matlab平台仿真验证了频偏情况下相关长度对相关峰损失的影响,实验结果表明,二分DMF方法对多普勒频偏的敏感性低于DMF方法。为了降低伪码相位搜索模块的硬件资源开销,同时保证一定的搜索效率,采用数据串行传输、并行操作的串并联结构,可以一次搜索多个码元在伪码相位搜索中的相位偏差,提高捕获效率。
{"title":"A fast capture structure for dichotomous DMF pseudocode based on DSP Builder","authors":"Xihai Xie, Biao Hui","doi":"10.1109/icnlp58431.2023.00071","DOIUrl":"https://doi.org/10.1109/icnlp58431.2023.00071","url":null,"abstract":"To address the problem of capturing correlation peak amplitude decay and difficulty in determining the capture threshold when the demodulated signal is synchronously captured by DMF (all-digital matched filter) under the influence of Doppler frequency bias, the dichotomous DMF method is proposed: the pseudo-random sequence is segmented before and after to reduce the integration time of correlation operation, and then reduce the loss of normalized correlation peak under the influence of frequency bias integration decay. Matlab platform simulation verifies the effect of correlation length on the loss of correlation peaks under the frequency bias scenario, and the experimental results show that the dichotomous DMF method is less sensitive to the Doppler frequency bias than the DMF method. In order to reduce the hardware resource overhead of the pseudocode phase search module and to ensure a certain search efficiency, a serial-parallel structure with serial data transmission and parallel operation is adopted, which can search multiple code elements at a time for phase deviation in the pseudocode phase search and improve the capture efficiency.","PeriodicalId":53637,"journal":{"name":"Icon","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85992728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain for Supply Chain Data Security Sharing Consensus Algorithm Design 区块链供应链数据安全共享共识算法设计
Q3 Arts and Humanities Pub Date : 2023-03-01 DOI: 10.1109/ICNLP58431.2023.00084
Boyu Chen, Hongjie Liu, Lei Yin
The centralized data storage mode adopted by the traditional supply chain management system has some problems, such as single point of failure, data privacy disclosure, opaque internal operation of the system and so on, which seriously restricts the information flow and data sharing among enterprises. Blockchain is distributed, open, transparent and tamper proof. It can provide reliable underlying services for the implementation of distributed data security sharing system. Therefore, this paper proposes a blockchain based supply chain quality data security sharing model, which takes the distributed blockchain network as the core to build decentralized data security sharing services. At the same time, the practical Byzantine fault-tolerant (pbft) algorithm used in blockchain has some problems, such as large consensus delay, low throughput, poor performance, and does not support node dynamic management. Combined with the characteristics of supply chain alliance chain, by introducing simplified consistency protocol and new node management mechanism, the communication complexity of the algorithm is reduced and the dynamic management of nodes is realized.
传统供应链管理系统采用的集中式数据存储模式存在单点故障、数据隐私泄露、系统内部操作不透明等问题,严重制约了企业间的信息流和数据共享。区块链是分布式、开放、透明、防篡改的。它可以为分布式数据安全共享系统的实现提供可靠的底层服务。因此,本文提出了一种基于区块链的供应链质量数据安全共享模型,该模型以分布式区块链网络为核心,构建去中心化的数据安全共享服务。同时,区块链中实际使用的拜占庭容错(pbft)算法存在共识延迟大、吞吐量低、性能差、不支持节点动态管理等问题。结合供应链联盟链的特点,通过引入简化的一致性协议和新的节点管理机制,降低了算法的通信复杂度,实现了节点的动态管理。
{"title":"Blockchain for Supply Chain Data Security Sharing Consensus Algorithm Design","authors":"Boyu Chen, Hongjie Liu, Lei Yin","doi":"10.1109/ICNLP58431.2023.00084","DOIUrl":"https://doi.org/10.1109/ICNLP58431.2023.00084","url":null,"abstract":"The centralized data storage mode adopted by the traditional supply chain management system has some problems, such as single point of failure, data privacy disclosure, opaque internal operation of the system and so on, which seriously restricts the information flow and data sharing among enterprises. Blockchain is distributed, open, transparent and tamper proof. It can provide reliable underlying services for the implementation of distributed data security sharing system. Therefore, this paper proposes a blockchain based supply chain quality data security sharing model, which takes the distributed blockchain network as the core to build decentralized data security sharing services. At the same time, the practical Byzantine fault-tolerant (pbft) algorithm used in blockchain has some problems, such as large consensus delay, low throughput, poor performance, and does not support node dynamic management. Combined with the characteristics of supply chain alliance chain, by introducing simplified consistency protocol and new node management mechanism, the communication complexity of the algorithm is reduced and the dynamic management of nodes is realized.","PeriodicalId":53637,"journal":{"name":"Icon","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91146587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application Research of 3D MSVR-DV-Hop Algorithm Based on Node Filtering 基于节点滤波的三维MSVR-DV-Hop算法应用研究
Q3 Arts and Humanities Pub Date : 2023-03-01 DOI: 10.1109/ICNLP58431.2023.00075
Ping Liu, Xiangzhong Zeng, Shihao Gai, Hanning Sun
Wireless sensor network has been widely used as an important means of perceiving and monitoring the real environment. Node location algorithm is the key supporting technology for the normal operation of wireless sensor network nodes. To achieve higher positioning accuracy and improve the adaptability to the network, a beacon-based MSVR-DV-Hop (Multidimensional Support Vector Regression-DV-Hop) algorithm is proposed in three-dimensional scenes. The three stages of hop acquisition, distance estimation and coordinate calculation in classical DV-Hop algorithm are improved, and simulation experiments and result analysis are carried out in three-dimensional scene. The positioning accuracy of this algorithm is significantly improved compared with other algorithms in three-dimensional scenes, positioning error fluctuations are significantly improved in different anisotropic scenes, and positioning error fluctuations are stable in different anisotropic scenes, which has better adaptability and accuracy. Positioning errors in three-dimensional scenes are reduced by at least 56% compared to the classical three-dimensional DV-Hop algorithm and 12% compared to the LMSVR algorithm.
无线传感器网络作为感知和监测真实环境的重要手段已经得到了广泛的应用。节点定位算法是无线传感器网络节点正常运行的关键支撑技术。为了实现更高的定位精度和增强对网络的适应性,提出了一种基于信标的多维支持向量回归(MSVR-DV-Hop)算法。对经典DV-Hop算法中的跳数采集、距离估计和坐标计算三个阶段进行了改进,并在三维场景下进行了仿真实验和结果分析。与其他算法相比,该算法在三维场景下的定位精度显著提高,在不同各向异性场景下定位误差波动显著改善,且在不同各向异性场景下定位误差波动稳定,具有较好的适应性和精度。与经典三维DV-Hop算法相比,三维场景中的定位误差至少降低56%,与LMSVR算法相比,定位误差至少降低12%。
{"title":"Application Research of 3D MSVR-DV-Hop Algorithm Based on Node Filtering","authors":"Ping Liu, Xiangzhong Zeng, Shihao Gai, Hanning Sun","doi":"10.1109/ICNLP58431.2023.00075","DOIUrl":"https://doi.org/10.1109/ICNLP58431.2023.00075","url":null,"abstract":"Wireless sensor network has been widely used as an important means of perceiving and monitoring the real environment. Node location algorithm is the key supporting technology for the normal operation of wireless sensor network nodes. To achieve higher positioning accuracy and improve the adaptability to the network, a beacon-based MSVR-DV-Hop (Multidimensional Support Vector Regression-DV-Hop) algorithm is proposed in three-dimensional scenes. The three stages of hop acquisition, distance estimation and coordinate calculation in classical DV-Hop algorithm are improved, and simulation experiments and result analysis are carried out in three-dimensional scene. The positioning accuracy of this algorithm is significantly improved compared with other algorithms in three-dimensional scenes, positioning error fluctuations are significantly improved in different anisotropic scenes, and positioning error fluctuations are stable in different anisotropic scenes, which has better adaptability and accuracy. Positioning errors in three-dimensional scenes are reduced by at least 56% compared to the classical three-dimensional DV-Hop algorithm and 12% compared to the LMSVR algorithm.","PeriodicalId":53637,"journal":{"name":"Icon","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87459883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-constraint Coupling Optimization for Salient Object Detection 显著目标检测的多约束耦合优化
Q3 Arts and Humanities Pub Date : 2023-03-01 DOI: 10.1109/ICNLP58431.2023.00012
Zhijie Zhu, Jie Fang, Nan Wang, Jiaqiu Guan
In this paper, we propose a lightweight salient object detection framework called Multi-Constraint Coupling optimization Network (MCONet) to address the conflict between model scale and inference ability, which can learn more knowledge with fewer parameters through embedding feature priors. Specifically, we build a lightweight encoder as the backbone network to represent the image, and then use two parallel decoders to infer salient mask features and salient edge features respectively. Besides, we fuse the output features of different decoders by a convolutional block attention module (CBAM) module. In addition, we adopt a multi-constraint coupling optimization strategy to increase the soft constraints in the training phase, and improve the prior guidance of the edge to the inference results. Experimental results on 5 public benchmark datasets show that the proposed MCONet can reach comparable even better performance of state-of-the-art lightweight salient object detection models.
本文提出了一种轻量级的显著目标检测框架——多约束耦合优化网络(MCONet),解决了模型规模与推理能力之间的冲突,通过嵌入特征先验,可以用更少的参数学习到更多的知识。具体而言,我们构建了一个轻量级编码器作为骨干网络来表示图像,然后使用两个并行解码器分别推断出显著掩模特征和显著边缘特征。此外,我们利用卷积块注意模块(CBAM)融合不同解码器的输出特征。此外,我们采用多约束耦合优化策略,在训练阶段增加软约束,提高边缘对推理结果的先验指导。在5个公共基准数据集上的实验结果表明,所提出的MCONet可以达到与最先进的轻量级显著目标检测模型相当甚至更好的性能。
{"title":"Multi-constraint Coupling Optimization for Salient Object Detection","authors":"Zhijie Zhu, Jie Fang, Nan Wang, Jiaqiu Guan","doi":"10.1109/ICNLP58431.2023.00012","DOIUrl":"https://doi.org/10.1109/ICNLP58431.2023.00012","url":null,"abstract":"In this paper, we propose a lightweight salient object detection framework called Multi-Constraint Coupling optimization Network (MCONet) to address the conflict between model scale and inference ability, which can learn more knowledge with fewer parameters through embedding feature priors. Specifically, we build a lightweight encoder as the backbone network to represent the image, and then use two parallel decoders to infer salient mask features and salient edge features respectively. Besides, we fuse the output features of different decoders by a convolutional block attention module (CBAM) module. In addition, we adopt a multi-constraint coupling optimization strategy to increase the soft constraints in the training phase, and improve the prior guidance of the edge to the inference results. Experimental results on 5 public benchmark datasets show that the proposed MCONet can reach comparable even better performance of state-of-the-art lightweight salient object detection models.","PeriodicalId":53637,"journal":{"name":"Icon","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87602711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Personality Analysis of Entrepreneurial Text for Entrepreneurship Education 创业教育中创业文本的个性分析
Q3 Arts and Humanities Pub Date : 2023-03-01 DOI: 10.1109/ICNLP58431.2023.00047
A. Ito, Kotaro Takeda, Shuichi Ishida
In this paper, we analyzed entrepreneurship-related text using the automatic personality trait estimation model to investigate the difference between entrepreneurship-related and other texts. We collected texts from fourteen participants of entre-preneurship-related classes and texts from different domains (impressions of other courses and tweets from Twitter). Next, we developed a personality estimation model using BERT and a feedforward network using Kaggle’s MBTI corpus. As a result of the analysis, we found significant personality differences between the entrepreneur-related and other texts in the judgment-perception dimension.
本文采用自动人格特质估计模型对创业相关文本进行分析,探讨创业相关文本与其他文本的差异。我们收集了14名创业相关课程参与者的文本和来自不同领域的文本(其他课程的印象和Twitter上的推文)。接下来,我们利用BERT和Kaggle的MBTI语料库建立了一个人格估计模型和一个前馈网络。分析结果表明,创业相关文本与其他文本在判断知觉维度上存在显著的人格差异。
{"title":"Personality Analysis of Entrepreneurial Text for Entrepreneurship Education","authors":"A. Ito, Kotaro Takeda, Shuichi Ishida","doi":"10.1109/ICNLP58431.2023.00047","DOIUrl":"https://doi.org/10.1109/ICNLP58431.2023.00047","url":null,"abstract":"In this paper, we analyzed entrepreneurship-related text using the automatic personality trait estimation model to investigate the difference between entrepreneurship-related and other texts. We collected texts from fourteen participants of entre-preneurship-related classes and texts from different domains (impressions of other courses and tweets from Twitter). Next, we developed a personality estimation model using BERT and a feedforward network using Kaggle’s MBTI corpus. As a result of the analysis, we found significant personality differences between the entrepreneur-related and other texts in the judgment-perception dimension.","PeriodicalId":53637,"journal":{"name":"Icon","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74907102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Camouflage target segmentation based on reverse attention and self-interaction fusion 基于反向注意与自交互融合的伪装目标分割
Q3 Arts and Humanities Pub Date : 2023-03-01 DOI: 10.1109/ICNLP58431.2023.00015
Haibo Ge, Wenhao He, Yu An, Haodong Feng, Jiajun Geng, Chaofeng Huang
Camouflage Target Segmentation (COS) aims to segment targets hidden in complex environment. When the existing COS algorithm fuses multi-level features, it ignores the expression and positioning of the edge features of the camouflage target, and pays more attention to the influence of the fusion of features on the segmentation performance. Therefore, a COS algorithm based on disguised target segmentation based on reverse attention and self-interaction fusion is proposed. First, multi-scale features are extracted through the backbone network; Then, in order to improve the expression ability of edge features, the features extracted by the backbone network are enhanced using a network composed of a reverse attention module (RAM); Finally, the self-interaction fusion module (SIM) drives the features of different scales to achieve layer-by-layer fusion, while suppressing noise interference and obtaining more accurate target information. Experimental results show that on the three commonly used natural camouflage datasets of CHAMELEON, CAMO and CODIOK, the model shows better segmentation effect than other typical models.
伪装目标分割(COS)的目的是对隐藏在复杂环境中的目标进行分割。现有的COS算法在融合多层次特征时,忽略了伪装目标边缘特征的表达和定位,更关注特征融合对分割性能的影响。为此,提出了一种基于反向注意和自交互融合的伪装目标分割COS算法。首先,通过骨干网提取多尺度特征;然后,为了提高边缘特征的表达能力,使用由反向注意模块(RAM)组成的网络对骨干网络提取的特征进行增强;最后,自交互融合模块(SIM)驱动不同尺度的特征实现逐层融合,同时抑制噪声干扰,获得更准确的目标信息。实验结果表明,在变色龙、CAMO和CODIOK三种常用的自然伪装数据集上,该模型比其他典型模型具有更好的分割效果。
{"title":"Camouflage target segmentation based on reverse attention and self-interaction fusion","authors":"Haibo Ge, Wenhao He, Yu An, Haodong Feng, Jiajun Geng, Chaofeng Huang","doi":"10.1109/ICNLP58431.2023.00015","DOIUrl":"https://doi.org/10.1109/ICNLP58431.2023.00015","url":null,"abstract":"Camouflage Target Segmentation (COS) aims to segment targets hidden in complex environment. When the existing COS algorithm fuses multi-level features, it ignores the expression and positioning of the edge features of the camouflage target, and pays more attention to the influence of the fusion of features on the segmentation performance. Therefore, a COS algorithm based on disguised target segmentation based on reverse attention and self-interaction fusion is proposed. First, multi-scale features are extracted through the backbone network; Then, in order to improve the expression ability of edge features, the features extracted by the backbone network are enhanced using a network composed of a reverse attention module (RAM); Finally, the self-interaction fusion module (SIM) drives the features of different scales to achieve layer-by-layer fusion, while suppressing noise interference and obtaining more accurate target information. Experimental results show that on the three commonly used natural camouflage datasets of CHAMELEON, CAMO and CODIOK, the model shows better segmentation effect than other typical models.","PeriodicalId":53637,"journal":{"name":"Icon","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75630534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EE-GCN: A Graph Convolutional Network based Intrusion Detection Method for IIoT 基于图卷积网络的工业物联网入侵检测方法
Q3 Arts and Humanities Pub Date : 2023-03-01 DOI: 10.1109/ICNLP58431.2023.00068
Peng Xu, Guangyue Lu, Yuxin Li, Cai Xu
Intrusion detection in the Industrial Internet of Things (IIoT) is a challenge for the network security protection. Graph neural network (GNN) is employed to improve the network security by virtue of efficiently constructing a message passing function. However, existing intrusion detection methods based on GNN do not fully exploit the information of original data which results in the poor intrusion detection performance. In this paper, we propose an Exploiting Edge feature based on Graph Convolutional Network (EE-GCN), which can capture both the edge features of the network traffic link as well as the relationship between device nodes. In addition, we construct a two-layer GCN network to extract the edge features. Finally, two benchmark datasets (NF-BoT-IoT and NF-ToN-IoT) in Network Intrusion Detection System (NIDS) are used to evaluate the performance of the proposed method. The results show that the method proposed in this paper outperforms other methods.
工业物联网(IIoT)中的入侵检测是对网络安全防护的挑战。利用图神经网络(GNN)高效地构造消息传递函数,提高了网络的安全性。然而,现有的基于GNN的入侵检测方法没有充分利用原始数据的信息,导致入侵检测性能较差。在本文中,我们提出了一种基于图卷积网络(EE-GCN)的边缘挖掘特征,它既可以捕获网络流量链路的边缘特征,也可以捕获设备节点之间的关系。此外,我们构建了一个双层GCN网络来提取边缘特征。最后,利用网络入侵检测系统(NIDS)中的两个基准数据集(NF-BoT-IoT和NF-ToN-IoT)来评估所提方法的性能。结果表明,本文提出的方法优于其他方法。
{"title":"EE-GCN: A Graph Convolutional Network based Intrusion Detection Method for IIoT","authors":"Peng Xu, Guangyue Lu, Yuxin Li, Cai Xu","doi":"10.1109/ICNLP58431.2023.00068","DOIUrl":"https://doi.org/10.1109/ICNLP58431.2023.00068","url":null,"abstract":"Intrusion detection in the Industrial Internet of Things (IIoT) is a challenge for the network security protection. Graph neural network (GNN) is employed to improve the network security by virtue of efficiently constructing a message passing function. However, existing intrusion detection methods based on GNN do not fully exploit the information of original data which results in the poor intrusion detection performance. In this paper, we propose an Exploiting Edge feature based on Graph Convolutional Network (EE-GCN), which can capture both the edge features of the network traffic link as well as the relationship between device nodes. In addition, we construct a two-layer GCN network to extract the edge features. Finally, two benchmark datasets (NF-BoT-IoT and NF-ToN-IoT) in Network Intrusion Detection System (NIDS) are used to evaluate the performance of the proposed method. The results show that the method proposed in this paper outperforms other methods.","PeriodicalId":53637,"journal":{"name":"Icon","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81109430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resource Management Algorithm for Slicing Function in 5G Network Slicing 5G网络切片切片功能的资源管理算法
Q3 Arts and Humanities Pub Date : 2023-03-01 DOI: 10.1109/ICNLP58431.2023.00073
Jiawen Guo, Guohui Zhu, Dingyuan Zhang, Chenglin Xu
In the case that multiple service types of slices are jointly carried on core network, a Resource Management Algorithms Oriented to Slicing Functions (RMOSF) is proposed for the processing efficiency of slice requests and the resource allocation of the substrate network. First, the incoming slice requests are input into the admission control module, and the pre-accepted slice requests are screened out through the deep reinforcement learning algorithm; secondly, the pre-accepted slice requests are brought into the resource allocation module, and slices with different type are brought into the corresponding constrained optimization problems for solution; finally, when the substrate physical network resources are sufficient, the slices are mapped to start their life cycle. The simulation results show that the algorithm effectively improves slice profit and request acceptance rate, and also improves resource utilization.
针对在核心网络上共同进行多种业务类型切片的情况,提出了面向切片功能的资源管理算法(RMOSF),以提高切片请求的处理效率和底层网络的资源分配。首先,将传入的切片请求输入到接纳控制模块,通过深度强化学习算法筛选出预接受的切片请求;其次,将预接受的切片请求引入资源分配模块,将不同类型的切片纳入相应的约束优化问题求解;最后,当衬底物理网络资源足够时,将映射片以开始它们的生命周期。仿真结果表明,该算法有效地提高了切片利润和请求接受率,提高了资源利用率。
{"title":"Resource Management Algorithm for Slicing Function in 5G Network Slicing","authors":"Jiawen Guo, Guohui Zhu, Dingyuan Zhang, Chenglin Xu","doi":"10.1109/ICNLP58431.2023.00073","DOIUrl":"https://doi.org/10.1109/ICNLP58431.2023.00073","url":null,"abstract":"In the case that multiple service types of slices are jointly carried on core network, a Resource Management Algorithms Oriented to Slicing Functions (RMOSF) is proposed for the processing efficiency of slice requests and the resource allocation of the substrate network. First, the incoming slice requests are input into the admission control module, and the pre-accepted slice requests are screened out through the deep reinforcement learning algorithm; secondly, the pre-accepted slice requests are brought into the resource allocation module, and slices with different type are brought into the corresponding constrained optimization problems for solution; finally, when the substrate physical network resources are sufficient, the slices are mapped to start their life cycle. The simulation results show that the algorithm effectively improves slice profit and request acceptance rate, and also improves resource utilization.","PeriodicalId":53637,"journal":{"name":"Icon","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79302251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Icon
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1