{"title":"An Improved Hard Thresholding Pursuit Algorithm for Compressive Sensing","authors":"Qingliu Li, D. Ren, Yuan Luo","doi":"10.1109/ICCECE58074.2023.10135420","DOIUrl":"https://doi.org/10.1109/ICCECE58074.2023.10135420","url":null,"abstract":"The tail- ℓ1 minimization model greatly improves the sparse signal recovery ability compared with ℓ1 minimization model. However, solving the tail- ℓ1 minimization problem requires high computational cost and a lot of time. The hard thresholding pursuit (HTP) technology is attractive due to its computational efficiency in practice. Inspired by the HTP technology, the HTP technology is considered to be an efficient technique to solve the tail- ℓ1 minimization problem. This paper introduces an improved HTP technology, namely tail-HTP. The tail-HTP technology retains the computational simplicity of the HTP technology and greatly improves the efficiency of solving the tail- ℓ1 minimization problem. In addition, the tail-HTP technology also improves the sparse signal recovery ability of the HTP technology. The experimental results verify the high efficiency and superior sparse signal recovery ability of the tail-HTP technology.","PeriodicalId":120030,"journal":{"name":"2023 3rd International Conference on Consumer Electronics and Computer Engineering (ICCECE)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125134716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on human pose estimation based on channel and spatial attention","authors":"Yilong Liu","doi":"10.1109/ICCECE58074.2023.10135500","DOIUrl":"https://doi.org/10.1109/ICCECE58074.2023.10135500","url":null,"abstract":"Accurate pose estimation is crucial for understanding human behavior in images or videos. Given an RGB image, we want to be able to accurately locate some important keypoints on the body. Understanding human pose and body structure is important for high-level tasks such as human-computer interaction. Human pose estimation usually has problems such as low discrimination between human body and background, and human pose estimation based on HRnet network does not make full use of important feature information. To solve these problems, a human pose estimation method MCSA-hrnet (Multi-scale Channel and Spatial Attention) based on multi-scale channel and spatial attention is improved by using channel attention mechanism and spatial attention mechanism. Starting from the channel domain and spatial domain, MCSA-HRnet integrates the multi-level attention mechanism into the high-resolution network structure, and designs the channel attention block and spatial attention block. This enables the network to focus on the regions of the image that are highly associated with the human body and not on other regions. MCSA-HRnet uses 1×1 convolutions for information extraction in the core part of the ca block (channel attention block) and parallel $boldsymbol{3mathrm{x}3}$ and $boldsymbol{5mathrm{x}5}$ convolutions in the sa block (spatial attention block). Different sizes of parallel convolutions can derive spatial attention maps of different scales, which makes the ability of the network to distinguish human features from background features more significant. Thus, the human body region and its key points can be accurately located. The improved method is verified on COCO keypoint dataset, and the results show that MCSA-HRnet can effectively improve the accuracy of human pose estimation joint point localization.","PeriodicalId":120030,"journal":{"name":"2023 3rd International Conference on Consumer Electronics and Computer Engineering (ICCECE)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121920262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Graph Convolutional Extreme Learning Machine Autoencoder for Graph Embedding","authors":"Xinyi Lin, Xiaoyun Chen, Yanming Lin","doi":"10.1109/ICCECE58074.2023.10135334","DOIUrl":"https://doi.org/10.1109/ICCECE58074.2023.10135334","url":null,"abstract":"The purpose of graph embedding is to encode the known node features and topological information of graph into low-dimensional embeddings for further downstream learning tasks. Graph autoencoders can aggregate graph topology and node features, but it is highly dependent on the gradient descent optimizer with a large iterative learning time, and susceptible to local optimal solutions. Thus, we propose Graph Convolutional Extreme Learning Machine Autoencoder. To address the limitation that the extreme learning machine autoencoder cannot use topological information, the graph convolution operation is introduced between the input layer and the hidden layer to improve the representation ability of the graph embedding obtained. Experiments of link prediction and node classification on 5 real datasets show that our method is effective.","PeriodicalId":120030,"journal":{"name":"2023 3rd International Conference on Consumer Electronics and Computer Engineering (ICCECE)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122473482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ViT-R50 GAN: Vision Transformers Hybrid Model based Generative Adversarial Networks for Image Generation","authors":"Y. Huang","doi":"10.1109/ICCECE58074.2023.10135253","DOIUrl":"https://doi.org/10.1109/ICCECE58074.2023.10135253","url":null,"abstract":"In recent years, the tremendous potential of GAN in image generation has been demonstrated. Transformer derived from the NLP field is also gradually applied in computer vision, and Vision Transformer performs well in image classification problems. In this paper, we design a ViT-based GAN architecture for image generation. We found that the Transformer-based generator did not perform well due to using the same attention matrix for each channel. To overcome this problem, we increased the number of heads to generate more attention matrices. And this part is named enhanced multi-head attention, replacing multi-head attention in Transformer. Secondly, our discriminator uses a hybrid model of ResNet50 and ViT, where ResNet50 works on feature extraction making the discriminator perform better. Experiments show that our architecture performs well on image generation tasks.","PeriodicalId":120030,"journal":{"name":"2023 3rd International Conference on Consumer Electronics and Computer Engineering (ICCECE)","volume":"235 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122951082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Meijiao Wang, Chen Xu, Xiaoqiang Ji, Xiaoting Kan, Sun Qi
{"title":"Design of system for parkinson's hand tremor evaluating based on machine learning","authors":"Meijiao Wang, Chen Xu, Xiaoqiang Ji, Xiaoting Kan, Sun Qi","doi":"10.1109/ICCECE58074.2023.10135312","DOIUrl":"https://doi.org/10.1109/ICCECE58074.2023.10135312","url":null,"abstract":"About 70% of Parkinson's disease patients have the initial symptoms of tremors at the end of upper limbs in the clinic, which seriously affects the normal work and life of patients. The severity of Parkinson's disease patients is evaluated clinically by doctors based on their experience, lacking objective evaluation criteria. It is particularly important to study an objective and fast tremor assessment method to assist doctors in the diagnosis and treatment of Parkinson's disease. In this paper, a recognition system of Parkinson's patients' hand function tremor based on machine learning is designed. Firstly, the acceleration sensor is used to collect the hand tremor signal, and then the median and band-pass filters are used to remove the noise. Next, the time-domain and frequency-domain characteristics of the tremors signal are extracted. Finally, BP neural network algorithm is used to classify the tremor degree into three categories. 12 volunteers were selected to carry out the system function experiment, and the results show that the system can achieve the classification of hand tremors, with an accuracy rate of 84.5%. The Parkinson's patient's hand tremor evaluation system designed in this paper has the advantages of low cost, small size, comfortable wearing, and high accuracy. It can assist clinical rehabilitation training and help doctors formulate scientific and reasonable rehabilitation training programs.","PeriodicalId":120030,"journal":{"name":"2023 3rd International Conference on Consumer Electronics and Computer Engineering (ICCECE)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129580981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Safety Evaluation of Yangtze River Embankment Based on Fuzzy Neural Network","authors":"Dadong Zhu, Maoping Li, Hongping Zhou, Gang Zhao","doi":"10.1109/ICCECE58074.2023.10135298","DOIUrl":"https://doi.org/10.1109/ICCECE58074.2023.10135298","url":null,"abstract":"The Yangtze River embankment project is a critical barrier to ensuring the safety of the Yangtze River channel, and it is necessary to strengthen the safety monitoring of the embankment project. Embankment safety is influenced by various factors, while the influence weight of each factor is difficult to determine, and the expert scoring method and other methods are highly subjective and mainly rely on empirical judgment. Based on machine learning theory, this paper constructs an embankment safety evaluation method based on T-S model neural network. The model primarily consists of four layers of structure. (1) the input layer, this paper selects six types of evaluation factors as input parameters; (2) the fuzzification layer; (3) the fuzzy inference layer, matching the fuzzy rules and calculating the connection weights using the concatenation algorithm; (4) output layer, outputting the embankment safety coefficient value by inverse normalization and defuzzification. This paper selected three specific experimental areas in the river core of the Nanjing section of the Yangtze River as the research objects, used the data to conduct safety evaluation tests, and compared them with the actual operation of the embankment. The experimental results show that the safety level of the embankment calculated by the design method is consistent with the existing safety state of the embankment.","PeriodicalId":120030,"journal":{"name":"2023 3rd International Conference on Consumer Electronics and Computer Engineering (ICCECE)","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133914596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimization Methods for Real-time Volumetric Cloud Simulation","authors":"Shuiping Zhang, Guanxing Yuan, Bi Wang","doi":"10.1109/ICCECE58074.2023.10135300","DOIUrl":"https://doi.org/10.1109/ICCECE58074.2023.10135300","url":null,"abstract":"Addressing the issue of insufficient realism and real-time property of the existing volume cloud simulation, a multi-noise rendering method for simulation optimization is proposed. First of all, in terms of cloud modeling, the Perlin/Worley noise modeling is used to increase cloud diversity; then, Curl noise is also introduced to achieve cloud irregularity. Secondly, with respect to illumination of volume cloud, the dual Henyey-Greenstein phase function is selected for the approximate simulation of Mie scattering, thus overcoming such a shortcoming of the single Henyey-Greenstein phase function as later phase scattering while enhancing the realism and real-time efficiency of illumination. In the end, the improved Raymarching is adopted for rendering, with variable step size and early jump-out to enhance rendering efficiency. According to analysis of the experimental results, the method proposed herein can effectively simulate the effect of volume clouds and guarantee the real-time performance of the system.","PeriodicalId":120030,"journal":{"name":"2023 3rd International Conference on Consumer Electronics and Computer Engineering (ICCECE)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116692365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Direct ellipse fitting by minimizing the L0 algebraic distance","authors":"Gang Zhou, Zhenghui Hu, Xiaolei Chen, Qingjie Liu","doi":"10.1109/ICCECE58074.2023.10135531","DOIUrl":"https://doi.org/10.1109/ICCECE58074.2023.10135531","url":null,"abstract":"Given a set of 2D scattering points from an edge detection operator, the aim of ellipse fitting is to construct an elliptic equation that best fit the observations. For the data collected often contain noisy, uncertainty, and incompleteness which constitutes a considerable challenge for all algorithms. To address this issue, a method of direct ellipse fitting by minimizing the L0 algebraic distance is presented. Unlike its L2 counterparts that assumed the fitting error follows a Gaussian distribution, our method tried to model the outliers using the L0 norm of the algebraic distance between the ideal elliptic equation and its fitting data. In addition, an efficient numerical algorithm based on alternating optimization strategy with half-quadratic splitting is developed to solve the resulting L0 minimization problem and a detailed research of the selection of algorithm parameters is carried out benefit from which it does not suffer from the convergence issues due to poor initialization, which is an open question encountered in all iterative based approaches. Numerical experiments suggest that the proposed method achieves a very high precision and reliability to various bias especially for Non-Gaussian artifacts as well as easy to implement.","PeriodicalId":120030,"journal":{"name":"2023 3rd International Conference on Consumer Electronics and Computer Engineering (ICCECE)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132292682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Risk assessment method of power marketing operation based on convolutional neural network","authors":"Jingyi Liu, Jiawei Qi, Kun Wang, Zheng Liu","doi":"10.1109/ICCECE58074.2023.10135259","DOIUrl":"https://doi.org/10.1109/ICCECE58074.2023.10135259","url":null,"abstract":"With the abolition of the sales price of China's industrial and commercial catalog, the competition in the power purchase market of industrial and commercial users is becoming increasingly stimulated. In order to solve the problem of difficult and low accuracy of power marketing operation risk assessment for industrial and commercial users, a power marketing operation risk assessment method based on convolutional neural network is proposed. Firstly, the neighbor propagation clustering method is used to analyze the clustering of industrial and commercial users, and the evaluation characteristics of industrial and commercial users are obtained. On this basis, the set of electric power marketing operation evaluation indicators is constructed. Secondly, the convolutional neural network is used to adjust the weight of the evaluation index, and the power marketing operation risk of industrial and commercial users is evaluated. Finally, the accuracy of the method was 96.37% when applied in a city. The application results show that the proposed method can effectively evaluate the risks of industrial and commercial power marketing.","PeriodicalId":120030,"journal":{"name":"2023 3rd International Conference on Consumer Electronics and Computer Engineering (ICCECE)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133179535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Tamper-proof Research Based on Digital Culture Museums","authors":"Jiale Li, Jingbing Wu, Hanxi Wang","doi":"10.1109/ICCECE58074.2023.10135291","DOIUrl":"https://doi.org/10.1109/ICCECE58074.2023.10135291","url":null,"abstract":"This paper first briefly introduces digital culture museums and the three modules of digital culture museums; then proposes that due to the rapid development of image processing technology, many image-processing-related software can easily modify digital information such as images and videos, and there are also some unscrupulous media that maliciously tamper with images in order to gain attention and clicks; then Finally, a set of anti-tampering research of digital culture museums based on hash algorithm for checking digital culture museum resource files and using difference value hashing method for querying and tracing digital culture museum images is constructed to facilitate people's verification of digital culture museums that claim to originate from digital culture museums, supplemented by micro-copyright authorization and tracking system of digital culture museum websites. resources for verification.","PeriodicalId":120030,"journal":{"name":"2023 3rd International Conference on Consumer Electronics and Computer Engineering (ICCECE)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133339291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}