Proceedings of the 2022 5th International Conference on Artificial Intelligence and Pattern Recognition最新文献

筛选
英文 中文
Integrating Hybrid Features for Document-Level Event Role Extraction Method 集成混合特征的文档级事件角色提取方法
Jingyao Zhang, Tao Xu
{"title":"Integrating Hybrid Features for Document-Level Event Role Extraction Method","authors":"Jingyao Zhang, Tao Xu","doi":"10.1145/3573942.3574051","DOIUrl":"https://doi.org/10.1145/3573942.3574051","url":null,"abstract":"Event extraction is a sub-task of information extraction and is an important part of natural language processing. Depending on the range of features used, event extraction methods are classified as sentence-level or document-level. However, document-level event extraction is more practical for practical tasks. Document-level event extraction is a difficult task, as it requires features to be extracted from a larger amount of text to determine which span of text is the desired event element. However, most methods do not utilize both sentence-level and document-level features. In order to utilize hybrid feature information and fuse it, this paper proposes a document-level event extraction method that integrating hybrid features. The event extraction method is based on Dynamic Multi-Pooling Convolutional Neural Network (DMCNN) and Bi-directional Long Short-Term Memory (BiLSTM), combined with self-attention mechanisms and Conditional Random Field (CRF). We evaluate the model proposed in this paper on the MUC-4 dataset and the experimental results show that our proposed model outperforms previous work.","PeriodicalId":103293,"journal":{"name":"Proceedings of the 2022 5th International Conference on Artificial Intelligence and Pattern Recognition","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115928438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Visual Model Checking Distributed System 分布式系统可视化模型检测
Yiyang Jia, Xinfeng Shu
{"title":"Visual Model Checking Distributed System","authors":"Yiyang Jia, Xinfeng Shu","doi":"10.1145/3573942.3574023","DOIUrl":"https://doi.org/10.1145/3573942.3574023","url":null,"abstract":"In order to ensure the correctness of module interaction between distributed systems in the analysis and design stages, this paper proposes a visual model checking method for distributed systems. The component diagram and sequence diagram are used to visually model the system and describe the interaction between subsystems. The object property specification language was used to annotate the properties of the model, and the properties were extracted and converted into projection temporal logic formulas, and then converted into property non-automata. The sequence diagram model is transformed into a system automaton. Finally, the model checking tool is used to verify whether the model satisfies the system properties. The experimental results show that this method can realize the verification of distributed system and the modeling is more intuitive and convenient.","PeriodicalId":103293,"journal":{"name":"Proceedings of the 2022 5th International Conference on Artificial Intelligence and Pattern Recognition","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131351309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Blockchain Consensus Algorithm for Secure Data Sharing on Industrial Internet Platform 面向工业互联网平台数据安全共享的区块链共识算法研究
Chao Jia, Lili Gao, Min Li
{"title":"Research on Blockchain Consensus Algorithm for Secure Data Sharing on Industrial Internet Platform","authors":"Chao Jia, Lili Gao, Min Li","doi":"10.1145/3573942.3573973","DOIUrl":"https://doi.org/10.1145/3573942.3573973","url":null,"abstract":"The traditional industrial Internet platform adopts a centralized data storage model, and the security sharing of data generated by terminal devices is a major bottleneck that hinders the development of industrial Internet. Along with the geometric growth of terminal data, protecting the security and integrity of data has become the core research area of the Industrial Internet. Blockchain is distributed, open, transparent and tamper-evident, and can provide a reliable underlying service to realize a distributed data security sharing system. Therefore, this paper proposes a blockchain-based data security sharing model for industrial Internet platforms, with a distributed blockchain network as the core to build up a decentralized data security sharing service. Meanwhile, to address the problems of high consensus latency, low throughput and performance, and no support for node dynamic management of the practical Byzantine fault-tolerant (PBFT) algorithm used in blockchain, a simplified consistency protocol and a new node management mechanism are introduced to achieve dynamic management of nodes while reducing the complexity of algorithm communication.","PeriodicalId":103293,"journal":{"name":"Proceedings of the 2022 5th International Conference on Artificial Intelligence and Pattern Recognition","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133474221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MFR Working Mode Recognition Based on CNN-BILSTM-SoftAttention Model 基于CNN-BILSTM-SoftAttention模型的MFR工作模式识别
Jie Yang, Jinghua Tian
{"title":"MFR Working Mode Recognition Based on CNN-BILSTM-SoftAttention Model","authors":"Jie Yang, Jinghua Tian","doi":"10.1145/3573942.3574115","DOIUrl":"https://doi.org/10.1145/3573942.3574115","url":null,"abstract":"Accurate identification of MFR working mode recognition is an essential prerequisite for target threat assessment. To solve the problem of lower recognition rate of radar pulse signals with overlapping parameters, a hybrid recognition model based on CNN-BILSTM-SoftAttention is proposed. Firstly, We utilize the combined CPI parameters to describe pluse stream and capture local characteristics with CNN. Then, the BILSTM Network is used to analyze the timing regularity of radar pulse sequences, and to discover the inter-class rule between different working modes and the intra-class rule of the same working mode. Finally, combined with the attention mechanism model, we can distinguish different working mode by assigning higher weights to parameters with overlapping. Through simulation analysis, the proposed algorithm is compared with SVM, CNN, CNN_LSTM method, the accuracy of model can reach 92.48% in the strong noise environment, increasing by 20%. The results show that the proposed method has better classification ability and higher performance than existing work pattern classification methods.","PeriodicalId":103293,"journal":{"name":"Proceedings of the 2022 5th International Conference on Artificial Intelligence and Pattern Recognition","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133512762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
High Speed Multi-channel Data Cache Design Based on DDR3 SDRAM 基于DDR3 SDRAM的高速多通道数据缓存设计
Xiaofeng Yang, Ancheng Liu, Jinjin Wang
{"title":"High Speed Multi-channel Data Cache Design Based on DDR3 SDRAM","authors":"Xiaofeng Yang, Ancheng Liu, Jinjin Wang","doi":"10.1145/3573942.3573972","DOIUrl":"https://doi.org/10.1145/3573942.3573972","url":null,"abstract":"With the rapid development of microelectronics technology, the amount of data information is becoming larger and larger, and the speed of data processing is becoming higher and higher. In order to meet the needs of today's data cache and solve a series of problems such as unstable data transmission and data loss caused by the common data cache technology due to its small capacity and slow data processing speed, a synchronous dynamic random access memory (DDR3 SDRAM) based data cache design method with high speed and large capacity and multi-channel is proposed to achieve fast and efficient real-time storage of eight-channel video data. Based on Vivado MIG IP core and Kintex-7 FPGA as the control core, asynchronous FIFO with read/write bit width ratio of 8:1 is realized, and the read/write cache control module is designed, and the real-time data is finally cached to the corresponding address of DDR3 SDRAM. Improved DDR3 SDRAM bandwidth utilization. The experimental results show that the system can access 8-channel high speed video data, and the data transmission is stable and reliable. The design is mainly composed of multi-channel data acquisition module, cross-clock domain data processing module, read and write priority arbitration and other modules, with a working frequency of up to 400M Hz. It has been verified that the design can be used for real-time acquisition system of space-borne video storage.","PeriodicalId":103293,"journal":{"name":"Proceedings of the 2022 5th International Conference on Artificial Intelligence and Pattern Recognition","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133593182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Wireless Sensor Networks Based on UAV Auxiliary Energy-Saving Data Collection Algorithms 基于无人机的无线传感器网络辅助节能数据采集算法
Aijing Sun, Yijia Li, Shichang Li
{"title":"Wireless Sensor Networks Based on UAV Auxiliary Energy-Saving Data Collection Algorithms","authors":"Aijing Sun, Yijia Li, Shichang Li","doi":"10.1145/3573942.3573982","DOIUrl":"https://doi.org/10.1145/3573942.3573982","url":null,"abstract":"The selection of wireless sensor networks (WSNs) communication topology and the application of unmanned aerial vehicles (UAV) in data collection are studied in the scenario of being far away from the base station. The topology consists of a set of cluster head nodes that communicate with the UAV. After considering the network energy consumption factors, the optimal number of cluster heads of the network is derived, the network is clustered and the cluster head node is selected. Finally, the cruising path of the drone to collect data from the cluster head is optimized. Simulation results show that the proposed algorithm can effectively save the energy of nodes, prolong network life, and reduce the total distance of the UAV collects data.","PeriodicalId":103293,"journal":{"name":"Proceedings of the 2022 5th International Conference on Artificial Intelligence and Pattern Recognition","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115349427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CBAM-DCE: A Non-Reference Image Correction Algorithm for Uneven Illumination CBAM-DCE:一种非参考图像不均匀光照校正算法
Mengyu Fan, Jinjun Lu, Xianguang Kong, Wei Sun, Wei Sun, Yijun Sun
{"title":"CBAM-DCE: A Non-Reference Image Correction Algorithm for Uneven Illumination","authors":"Mengyu Fan, Jinjun Lu, Xianguang Kong, Wei Sun, Wei Sun, Yijun Sun","doi":"10.1145/3573942.3574098","DOIUrl":"https://doi.org/10.1145/3573942.3574098","url":null,"abstract":"Affected by the change in daytime illumination sequence and by the shooting angle in the complex field environment, the kiwifruit images possess the unfriendly features of uneven illumination, such as local darkness and local brightness. The ill-posed image with uneven illumination will seriously constraint the subsequent image analysis processing. Current deep learning methods have achieved satisfactory results, and a large number of paired images (one is the input image, one is the ground truth image) is required to train the better network performance. However, it is difficult to capture ground truth images of the kiwifruit in the field. Based on this, the paper proposed Convolutional Block Attention Module Deep Curve Estimation (CBAM-DCE) to accomplish a non-reference illumination unevenness correction for field kiwifruit images. A deep learning network model is used to estimate the image-specific curve for image enhancement, and a non-reference loss function is applied to evaluate the image enhancement effect. Compared with seven related enhancement algorithms, the presented algorithm shakes off uneven illumination or normal-light image pairs for training. Five different public datasets and our Kiwifruit dataset were used in the experiments. Experiments demonstrate that our proposed CBAM-DCE is superior to other state-of-the-art algorithms for enhancing natural images under different lighting conditions.","PeriodicalId":103293,"journal":{"name":"Proceedings of the 2022 5th International Conference on Artificial Intelligence and Pattern Recognition","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124313876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Image Encryption Algorithm Based on Hyperchaotic and Two Times of Scrambling Diffusion 基于超混沌和二次置乱扩散的高效图像加密算法
Wei Bu, Shu-cui Xie
{"title":"An Efficient Image Encryption Algorithm Based on Hyperchaotic and Two Times of Scrambling Diffusion","authors":"Wei Bu, Shu-cui Xie","doi":"10.1145/3573942.3574063","DOIUrl":"https://doi.org/10.1145/3573942.3574063","url":null,"abstract":"An image encryption algorithm based on hyperchaotic system is proposed to satisfy the security of image information transmission, the encryption algorithm consists of two times of scrambling and diffusion. The relation between plaintext and key is constructed to generate plaintext related chaotic sequence. Two rounds of scrambling operation are performed to make the pixel positions of the image are sufficiently scrambled, and two-way diffusion is carried out after scrambling, in this way, the value of any one pixel can affect other pixel values as much as possible. The information entropy, histogram distribution, adjacent pixel correlation, plaintext sensitivity, key sensitivity and key space are analyzed. As show by simulation results, our algorithm has good encryption effect and high security.","PeriodicalId":103293,"journal":{"name":"Proceedings of the 2022 5th International Conference on Artificial Intelligence and Pattern Recognition","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115988147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NMT Sentence Granularity Similarity Calculation Method Based on Improved Cosine Distance 基于改进余弦距离的NMT句子粒度相似度计算方法
Shuyan Wang, Jingjing Ma
{"title":"NMT Sentence Granularity Similarity Calculation Method Based on Improved Cosine Distance","authors":"Shuyan Wang, Jingjing Ma","doi":"10.1145/3573942.3574021","DOIUrl":"https://doi.org/10.1145/3573942.3574021","url":null,"abstract":"Aiming at the problem of semantic lack of sentence similarity calculation in the process of metamorphosis test of neural machine translation system, an NMT sentence granularity similarity calculation method based on improved Cosine Distance is proposed. Text vectors are constructed through the improved TF-IDF weights, and the combination of Edit Distance and Jaccard similarity coefficient is used as a suppressor for cosine similarity. Experiments on neural machine translation systems such as Alibaba Translation and Baidu Translation on the UM-Corpus dataset show that, compared with the method based on Edit Distance, this method improves the Pearson correlation coefficient and Spearman correlation coefficient of the reference translation method by 20.5% and 12%, respectively. And this method is closer to the BLEU and METEOR evaluation results based on the reference translation, the evaluation accuracy is higher.","PeriodicalId":103293,"journal":{"name":"Proceedings of the 2022 5th International Conference on Artificial Intelligence and Pattern Recognition","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116016347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prompt and Contrastive Learning for Few-shot Sentiment Classification 基于提示和对比学习的少镜头情感分类
Fei Wang, Long Chen, Xiaohua Huang, Cai Xu, Wei Zhao, Ziyu Guan, Guangyue Lu
{"title":"Prompt and Contrastive Learning for Few-shot Sentiment Classification","authors":"Fei Wang, Long Chen, Xiaohua Huang, Cai Xu, Wei Zhao, Ziyu Guan, Guangyue Lu","doi":"10.1145/3573942.3573969","DOIUrl":"https://doi.org/10.1145/3573942.3573969","url":null,"abstract":"Sentiment classification is a hot topic in the field of natural language processing. Currently, state-of-the-art classification models follow two steps: pre-training a large language model on upstream tasks, and then using human-labeled data to fine-tune a task-related model. However, there is a large gap between the upstream tasks of the pre-trained model and the downstream tasks being performed, resulting in the need for more labeled data to achieve excellent performance. Manually annotating data is expensive. In this paper, we propose a few-shot sentiment classification method based on Prompt and Contrastive Learning (PCL), which can significantly improve the performance of large-scale pre-trained language models in low-data and high-data regimes. Prompt learning aims to alleviate the gap between upstream and downstream tasks, and the contrastive learning is designed to capture the inter-class and intra-class distribution patterns of labeled data. Thanks to the integration of the two strategies, PCL markedly exceeds baselines with low resources. Extensive experiments on three datasets show that our method has outstanding performance in the few-shot settings.","PeriodicalId":103293,"journal":{"name":"Proceedings of the 2022 5th International Conference on Artificial Intelligence and Pattern Recognition","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117112159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信