{"title":"AFF-Net: a masked face recognition network based on attention and feature fusion","authors":"Sirui Li","doi":"10.1117/12.3004369","DOIUrl":"https://doi.org/10.1117/12.3004369","url":null,"abstract":"The context of the COVID-19 pandemic has made an increasing number of people accustomed to wearing masks to avoid getting infected. This phenomenon leads to an urgent demand for face recognition with masks, which poses serious challenge for the accuracy of face recognition. This paper seeks to produce a model called AFF-Net based on an attention mechanism and feature fusion and self-attention to address the masked face recognition by designing four compact modules to achieve the optimization of the network structure to solve the problem of unstable recognition rate and the low model generalization ability. Specifically, we fuse the features of different layers in the improved full connected module to assign weights to the channels, and formulate a specific training strategy to improve the feature learning performance. Experiments on representative datasets indicate that the proposed method can outperform the competing method significantly while maintaining high real-time efficiency of masked face recognition.","PeriodicalId":143265,"journal":{"name":"6th International Conference on Advanced Electronic Materials, Computers and Software Engineering (AEMCSE 2023)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124752292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data-driven fault detection for traction systems of high-speed trains based on segmental autoencoder","authors":"Haotong Lv, Mingyue Zhou","doi":"10.1117/12.3004597","DOIUrl":"https://doi.org/10.1117/12.3004597","url":null,"abstract":"Faults inevitably occur during high-speed train operations and affect the security of the system. In order to improve train reliability, the paper proposes a fault detection (FD) framework for traction systems based on the segmental autoencoder (SAE), and within this framework, the target fault detection work is implemented in combination with a data-driven method base. The main objective of the proposed scheme is to determine the generalized kernel representation based on the knowledge learned from the autoencoder and to complete the construction of a residual generator by means of a special structure to obtain the final FD results. To verify the FD effect of the method on the traction system, the results are verified by a simulation experimental platform to ensure the effectiveness of the method on the target system.","PeriodicalId":143265,"journal":{"name":"6th International Conference on Advanced Electronic Materials, Computers and Software Engineering (AEMCSE 2023)","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114650138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on railway tunnel risk control method based on data minings","authors":"Jing Chen","doi":"10.1117/12.3004917","DOIUrl":"https://doi.org/10.1117/12.3004917","url":null,"abstract":"This paper considers the risk assessment of railway tunnels and proposes a method based on deep learning in the context of artificial intelligence. Specifically, we use convolutional neural networks (CNN) to process and analyze sensor data inside the tunnel, and establish a supervised learning model to predict the health status of the tunnel. We also introduced a Bayesian optimization algorithm to optimize the model's super parameters, and used different evaluation indicators to evaluate the performance of the model. The experimental results show that our method is superior to traditional methods in terms of accuracy, robustness, and interpretability, and can help railway companies better manage tunnel risks.","PeriodicalId":143265,"journal":{"name":"6th International Conference on Advanced Electronic Materials, Computers and Software Engineering (AEMCSE 2023)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128522683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic classification and detection of 12-lead electrocardiogram signal classification with Fourier convolutions","authors":"Siyuan Li, Xuesong Su, Qingyu Yao, Gongwen Chen","doi":"10.1117/12.3004572","DOIUrl":"https://doi.org/10.1117/12.3004572","url":null,"abstract":"In this paper, we propose an Electrocardiogram (ECG) classification model based on FFC (Fast Fourier Convolution) and ResNet. The model utilizes FFC and ResNet for feature extraction and classification. We further improve the network performance and convergence speed through batch normalization and residual concatenation. The experimental results demonstrate that the model exhibits excellent classification performance under different data distributions in the PTB-XL database and trains faster than traditional ResNet models. Additionally, we introduce a new module, FFC-R, and validate its excellent performance in ECG classification tasks. This innovation is expected to provide powerful support for the diagnosis and treatment of heart diseases.","PeriodicalId":143265,"journal":{"name":"6th International Conference on Advanced Electronic Materials, Computers and Software Engineering (AEMCSE 2023)","volume":"12787 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128995576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and implementation of human behavior recognition information management system for financial institution monitoring based on RFID","authors":"Mulan Yang, Xuehan Hou, Lvqing Yang, Runhan Song, W. Qian, Yishu Qiu","doi":"10.1117/12.3004454","DOIUrl":"https://doi.org/10.1117/12.3004454","url":null,"abstract":"Under the tide of economic globalization, the number of trade in financial institutions has increased rapidly, and the demand for supervision of possible criminal acts in financial institutions has consequently increased. Therefore, using computer technology to process monitoring data has become a hot topic of current research. Therefore, this paper designs and implements a human behavior identification information management system framework based on RFID technology, and provides an overall solution from RFID hardware to software to identify and alarm possible abnormal behavior in financial institutions. A replaceable deep learning algorithm is used to identify and alarm various abnormal behaviors. Through real-time Web technology, police officers can view the relevant information of criminals in real time on the web page.","PeriodicalId":143265,"journal":{"name":"6th International Conference on Advanced Electronic Materials, Computers and Software Engineering (AEMCSE 2023)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134048167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Decentralized federated learning privacy protection aggregation","authors":"Cong Hu, Ting Lei, Shuang Wang, Zhen Yao, Pengyuan Wang, T. Zhang","doi":"10.1117/12.3005032","DOIUrl":"https://doi.org/10.1117/12.3005032","url":null,"abstract":"The basic idea of federated learning is to aggregate the local model parameters of all participants to obtain a global model, which is more universal and has better performance. However, existing federated learning has the problem of a unique model, where all participants train their local models based on the same global model. However, in different real-world scenarios, data often has different features and distributions, and there is no universal model suitable for learning data from multiple scenarios. Therefore, existing federated learning technologies cannot achieve optimal performance in multiple scenarios. To solve this problem, this paper proposes a decentralized federated learning model where each participant independently selects other models similar to their local models and aggregates them to obtain a specialized model applicable to the local scenario. The model aggregates the parameters based on their similarity with the local model. Models with higher similarity will have a greater weight in the aggregation process. The parameter aggregation is not performed at the central server but at each participant's local device. Through this mechanism, the proposed model achieves specialization of local models for participants and improves performance in different scenarios.","PeriodicalId":143265,"journal":{"name":"6th International Conference on Advanced Electronic Materials, Computers and Software Engineering (AEMCSE 2023)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130072401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Impact analysis of bug localization accuracy oriented to bug report","authors":"Yaqiang Zhao, Xiaozhuo Li, Qing Tian, Wei Deng, Ying Li, Ying Zhang, Jianbin Song","doi":"10.1117/12.3004582","DOIUrl":"https://doi.org/10.1117/12.3004582","url":null,"abstract":"The study of bug report-oriented program error location has the characteristics of strong pertinence and low cost, which is an important direction in the current research on program error location. This type of research takes bug reports and source code as input sources, and establishes a mapping relationship between the two through semantic mapping strategies to locate program errors. In the fine-grained program error location scenario, there is a problem that the location accuracy is greatly reduced. Existing empirical studies analyze the difference in location accuracy from two aspects: input source data noise and semantic mapping strategy selection, but most studies take the established location tools and methods as the evaluation object, the evaluation data type is single, and there is a lack of fine-grained analysis of constructing key variables. In order to evaluate the influence of key variables of location method on location accuracy, this paper decouples the location method through pseudo-siamese network, measures the sensitivity of location accuracy by counting the gain of location accuracy under different input source data types, and adds input source data types and a variety of semantic mapping strategies, Based on the evaluation of 23808 bug reports and corresponding source code data in 7 open source projects published on JIRA, this paper provides a more detailed empirical basis for additional data type selection and weight allocation, combined learning of multiple data types and different semantic mapping strategies in fine-grained program error location.","PeriodicalId":143265,"journal":{"name":"6th International Conference on Advanced Electronic Materials, Computers and Software Engineering (AEMCSE 2023)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132818851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shuang Zhong, B. Zhong, Hedan Liu, Jianxin Ye, Mengzhen Xu
{"title":"UAV formation method based on triposition positioning model","authors":"Shuang Zhong, B. Zhong, Hedan Liu, Jianxin Ye, Mengzhen Xu","doi":"10.1117/12.3004617","DOIUrl":"https://doi.org/10.1117/12.3004617","url":null,"abstract":"With the development of technology, UAV formation gradually appears in people's view. During the formation process, the UAV can obtain height information through its own perception, thus, the UAV formation problem is downscaled and the UAV is localised. In this paper, the position coordinates of the UAV are obtained through the Triposition positioning algorithm, using geometric relations, after which the UAV is distributed on a circle by adjusting the edges, and later the UAV is adjusted to the ideal position by adjusting the angle. The experimental results ultimately show that the algorithm is robust under large angular errors and can be better combined to become a signal localisation system in larger UAV formations, thus maintaining the operational capability and stability of communication transmissions in large UAV formations.","PeriodicalId":143265,"journal":{"name":"6th International Conference on Advanced Electronic Materials, Computers and Software Engineering (AEMCSE 2023)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117236612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SQLite embedded database in data chain devices","authors":"Yikun Wu, Haini Luo, Yu Liu","doi":"10.1117/12.3004802","DOIUrl":"https://doi.org/10.1117/12.3004802","url":null,"abstract":"As a carrier for data processing and transmission, the traditional data management methods can no longer effectively meet the requirements of high reliability and device performance. In this paper, we analyze the features and advantages of SQLite embedded database and propose the use of SQLite to manage data in embedded systems. The development process is described from various aspects such as creation, porting, compilation and verification of SQLite database, and the method of applying it to embedded system development is realized, which can be implemented into engineering practice.","PeriodicalId":143265,"journal":{"name":"6th International Conference on Advanced Electronic Materials, Computers and Software Engineering (AEMCSE 2023)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124008883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"GCN-based table-to-text generation research","authors":"Zeyu Yang, Hongzhi Yu","doi":"10.1117/12.3004569","DOIUrl":"https://doi.org/10.1117/12.3004569","url":null,"abstract":"Table-to-text generation is an important area of text generation, and the process of structured table-to-text generation faces problems such as the \"illusion\" of over-understanding table data, and the problem of selecting and ordering the content of the generated text from table data. In this paper, we present some important model mechanisms in the history of its development and a new outlook on the future development of table-to-text generation and possible technical routes. A two-stage encoder-decoder approach is analyzed as to why it is superior to its predecessors, and a new outlook is proposed for implementing table-to-text generation tasks based on graph convolutional neural networks.","PeriodicalId":143265,"journal":{"name":"6th International Conference on Advanced Electronic Materials, Computers and Software Engineering (AEMCSE 2023)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127991755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}