Proceedings of the 3rd International Conference on Computer Science and Application Engineering最新文献

筛选
英文 中文
Workflow-based Knowledge Flow Modeling and Research: Combination of Knowledge and Workflow 基于工作流的知识流建模与研究:知识与工作流的结合
Xingzhou Li, Botao Zhang
{"title":"Workflow-based Knowledge Flow Modeling and Research: Combination of Knowledge and Workflow","authors":"Xingzhou Li, Botao Zhang","doi":"10.1145/3331453.3362051","DOIUrl":"https://doi.org/10.1145/3331453.3362051","url":null,"abstract":"On the basis of knowledge flow, knowledge processing and knowledge application are combined to form knowledge flow. According to whether someone participates in the process of knowledge flow, an individual knowledge flow model is proposed. Inter-individual knowledge flow is the fusion of knowledge management and enterprise core business processes that are the most essential driving factors of knowledge management projects. The process of business process implementation is generally completed by the workflow. Its essence is a comprehensive knowledge flow process of knowledge establishment, knowledge classification, knowledge archiving and knowledge query and sharing. Integrating workflow and knowledge flow can better realize knowledge management of the enterprise. The proposed inter-individual knowledge flow model is designed and applied based on the actual business process of a hospital in Wuhan, and realizes the knowledge management in the process of workflow to support the flexible management of knowledge in the general sense.","PeriodicalId":162067,"journal":{"name":"Proceedings of the 3rd International Conference on Computer Science and Application Engineering","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130215738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Open-Category Classification of Hyperspectral Images based on Convolutional Neural Networks 基于卷积神经网络的高光谱图像开放分类
Tingting Huang, Shuang Wang, Geng Zhang, Xueji Wang, Song Liu
{"title":"Open-Category Classification of Hyperspectral Images based on Convolutional Neural Networks","authors":"Tingting Huang, Shuang Wang, Geng Zhang, Xueji Wang, Song Liu","doi":"10.1145/3331453.3362049","DOIUrl":"https://doi.org/10.1145/3331453.3362049","url":null,"abstract":"The application of the hyperspectral image (HSI) classification has become increasingly important in industry, agriculture and military. In recent years, the accuracy of HIS classification has been greatly improved through deep learning based methods. However, most of the deep learning models tend to classify all the samples into categories that exist in the training data. In real-world classification tasks, it is difficult to obtain samples from all categories that exist in the whole hyperspectral image. In this paper, we design a framework based on convolutional neural networks and probability thresholds(CNPT) in order to deal with the open-category classification(OCC) problem. Instead of classifying samples of categories that do not exist in the training process to be any known class, the proposed method mark them as unseen category. We first get samples of unseen class from labeled data. With a lightweight convolutional network that fully uses the spectral-spatial information of HSI, we obtain the probabilities for each seen class for every sample. By adding a threshold to the maximum probabilities, we classify some samples to unseen category. A balanced score called Fue which considers both the recall rate of unseen class and the overall accuracy of seen classes is proposed in this paper, and we use it to select the threshold and evaluate the performance of CNPT. The experimental results show that our proposed algorithm performs well on hyperspectral data, and has generalizability on different datasets.","PeriodicalId":162067,"journal":{"name":"Proceedings of the 3rd International Conference on Computer Science and Application Engineering","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128540744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Building Extraction Using Mask Scoring R-CNN Network 使用掩码评分R-CNN网络的建筑提取
Yiwen Hu, Fenglin Guo
{"title":"Building Extraction Using Mask Scoring R-CNN Network","authors":"Yiwen Hu, Fenglin Guo","doi":"10.1145/3331453.3361644","DOIUrl":"https://doi.org/10.1145/3331453.3361644","url":null,"abstract":"Extracting buildings from high resolution remotely sensed images is very practical, which can be applied to urban modeling and so on. The development of computer vision has become better, and the accuracy of recognition of convolutional neural networks has exceeded the accuracy of recognition of human eyes. In this paper, we used a deep convolutional neural network in remote sensing to achieve building extraction. The method in this paper is not based on semantic segmentation, but instance segmentation, which considered each building as an independent individual to achieve building extraction. The results showed that the proposed method is able to extract buildings with high accuracy.","PeriodicalId":162067,"journal":{"name":"Proceedings of the 3rd International Conference on Computer Science and Application Engineering","volume":"6 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120928445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Design and Implementation of Medium-Range Weather Forecast Operational System 中期天气预报业务系统的设计与实现
Lian-qing Yu, Yong Li, Zhiming Kang
{"title":"Design and Implementation of Medium-Range Weather Forecast Operational System","authors":"Lian-qing Yu, Yong Li, Zhiming Kang","doi":"10.1145/3331453.3361674","DOIUrl":"https://doi.org/10.1145/3331453.3361674","url":null,"abstract":"Medium-range weather forecast has been playing an important role in the decision making process of nationwide disaster prevention and mitigation, and assurance of major social activities. Therefore the construction of a medium-range weather forecast platform is the key to improve operation capability and important for decision makers. In response to the demanding requirements of real-time availability and interactive customization of prediction products in current forecast operations, both a desktop client system and web client system have been developed. The two systems share common backend services that offer features including real-time data collection, processing and database management, automatic creation of graphics products, and data statistics calculation. The clients provide a variety of functionalities such as interactive analysis and visualization of atmospheric circulation and observation data, search of history statistical data, etc. Some innovative technologies including organization of ensemble forecast data, concurrent calculation of forecast products, and a united two- and three-dimensional graphics rendering engine are discussed as well. With the application of the platform in daily operations, the abilities of live monitoring, forecast analysis and model output post-processing for disastrous and extreme synoptic processes have been greatly improved thanks to the introduction of brand-new ensemble products and comprehensive customization for data visualization.","PeriodicalId":162067,"journal":{"name":"Proceedings of the 3rd International Conference on Computer Science and Application Engineering","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117053247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fine Granular Multilevel Parallel Algorithm for HEVC Decoding Based on Tilera-GX36 Multi-core Platform 基于Tilera-GX36多核平台的HEVC解码细粒度多级并行算法
Yi Li, D. Hu, Wenxiang Zhang
{"title":"Fine Granular Multilevel Parallel Algorithm for HEVC Decoding Based on Tilera-GX36 Multi-core Platform","authors":"Yi Li, D. Hu, Wenxiang Zhang","doi":"10.1145/3331453.3361646","DOIUrl":"https://doi.org/10.1145/3331453.3361646","url":null,"abstract":"This paper presents a fine granular multilevel parallel algorithm for HEVC decoding, which is focus on two modules: the pixel reconstruction and the in-loop filter (ILF). Firstly, in the pixel reconstruction module, the problem of unbalanced load among decoding threads may occur in parallel decoding algorithm based on CTU rows, like wavefront parallel processing (WPP), because there may be big differences in the processing complexity of CTUs within various CTU rows. In order to solve this issue, we propose a fine granular parallel algorithm based on WPP. Then, a fast fusion ILF algorithm has been presented in the ILF module, which realizes the deep coupling between DBF and SAO by a new CTU-like process unit. Furthermore, the introduction of pipeline parallel technology makes a latency reduction between the two modules. We implement our method on Tilera-GX36 multi-core platform, each task executed by a thread bound to a separate core, which makes full use of the parallel computing performance. The experimental results show that the speedup of our proposed algorithms are 1.2, 1.13 and 1.8 times higher than that of those previous schemes respectively.","PeriodicalId":162067,"journal":{"name":"Proceedings of the 3rd International Conference on Computer Science and Application Engineering","volume":"206 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116195947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Optimized Password Recovery based on GPUs for SM3 Algorithm 基于gpu的SM3算法优化密码恢复
Hao Tian, Yan Li, Yangde Wang, Tang Peng, Shaopei Shi, Weidong Qiu
{"title":"Optimized Password Recovery based on GPUs for SM3 Algorithm","authors":"Hao Tian, Yan Li, Yangde Wang, Tang Peng, Shaopei Shi, Weidong Qiu","doi":"10.1145/3331453.3361632","DOIUrl":"https://doi.org/10.1145/3331453.3361632","url":null,"abstract":"One-way hash algorithms have been widely used in the field of data security. As a state-owned cipher algorithm, the SM3 algorithm has a large number of applications in related fields. In this paper, we propose two optimization methods for SM3 algorithm based on OpenCL platform. The optimization methods are password generation optimization and instruction optimization. By reducing the complexity of the algorithm and reducing the number of instructions, the ultimate goal is to improve performance. Experiments show that the proposed optimization method can effectively improve the performance of the SM3 encryption hash algorithm. The computing performance of a single SM3 is 13958 MB/s on the AMD Radeon R9 200 series graphics card.","PeriodicalId":162067,"journal":{"name":"Proceedings of the 3rd International Conference on Computer Science and Application Engineering","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121792450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Improved Algorithm based on KNN and Random Forest 一种基于KNN和随机森林的改进算法
Jun Liang, Qin Liu, Nuihua Nie, Biqing Zeng, Zanbo Zhang
{"title":"An Improved Algorithm based on KNN and Random Forest","authors":"Jun Liang, Qin Liu, Nuihua Nie, Biqing Zeng, Zanbo Zhang","doi":"10.1145/3331453.3360963","DOIUrl":"https://doi.org/10.1145/3331453.3360963","url":null,"abstract":"This paper gives an improved algorithm called RFDKNN based on an enhanced KNN (K-Nearest Neighbor) and random forest. First, RFDKNN sorts features based on importance through Gini index and a random forest algorithm. Then it deletes some unimportant features based on this sort in a certain proportion r. Finally, it uses an enhanced KNN algorithm dynamically selecting the optimal nearest neighbor number and distance function to make the distance between two samples closer to true value. Experiments are carried out on the 20 data sets from UCI Machine Learning repository. The results show that compared with other r values, RFDKNN of r=0.7 can obtain a relatively satisfactory classification accuracy. Compared with Naive Bayes, Adaboost, Random Forest, RRSB, W-KNN, dwh-FNN and LI-KNN, RFDKNN has higher classification accuracy on most data sets, especially on large data sets such as Pendigits and Letter.","PeriodicalId":162067,"journal":{"name":"Proceedings of the 3rd International Conference on Computer Science and Application Engineering","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126180304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Location Privacy Protection Scheme Based on Hybrid Encryption 一种基于混合加密的位置隐私保护方案
Li Li, Zhengjuan Lv, Xiaohong Tong, Run-hua Shi
{"title":"A Location Privacy Protection Scheme Based on Hybrid Encryption","authors":"Li Li, Zhengjuan Lv, Xiaohong Tong, Run-hua Shi","doi":"10.1145/3331453.3361312","DOIUrl":"https://doi.org/10.1145/3331453.3361312","url":null,"abstract":"Based on hybrid encryption algorithms, this paper presents a novel location privacy protection scheme with the aid of the cloud server. The scheme can effectively protect both the location privacy of the query user and the data privacy of the data service provider in location-based services. Using cloud servers and hybrid encryption algorithms (i.e., AES and Paillier homomorphic encryption), the proposed scheme can greatly reduce the storage cost, and the communication cost of the data service provider.","PeriodicalId":162067,"journal":{"name":"Proceedings of the 3rd International Conference on Computer Science and Application Engineering","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125837266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fine-grained Construction of Semantic Technology Network for Technology Evolution Analysis 面向技术演化分析的语义技术网络的细粒度构建
Xiaoman Li, Hongyan Song, Xuefu Zhang, Qian Xu
{"title":"Fine-grained Construction of Semantic Technology Network for Technology Evolution Analysis","authors":"Xiaoman Li, Hongyan Song, Xuefu Zhang, Qian Xu","doi":"10.1145/3331453.3361638","DOIUrl":"https://doi.org/10.1145/3331453.3361638","url":null,"abstract":"As a basic tool for technology evolution analysis, technology network can visualize the relationship among technologies in different patents. However, the current constructions of technology network only represent common technical information, and cannot reflect different types of technical information. We propose a new approach to construct a fine-grained technology network and display technical information from multiple perspectives. Based on the Subject-Action-Object (SAO) structures extracted from patent documents, we first classify the technical information, and then investigate the semantic relationship among different types of technical information. Based on that, single-type and multi-type technology networks are constructed, which can demonstrate different types of technical information and make the technology evolution analysis easier and more reliable. Finally, taking the Nano-fertilizer patents as a data source, we construct a fine-grained construction of technology network, which might help identify fundamental and emerging technologies in the Nano-fertilizer field.","PeriodicalId":162067,"journal":{"name":"Proceedings of the 3rd International Conference on Computer Science and Application Engineering","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126991321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Novel Process Mining Algorithm to Discover Non-free Choice Construct from Event Logs 一种从事件日志中发现非自由选择结构的过程挖掘算法
Jinjin Yuan, Chenchen Duan, Qingjie Wei
{"title":"A Novel Process Mining Algorithm to Discover Non-free Choice Construct from Event Logs","authors":"Jinjin Yuan, Chenchen Duan, Qingjie Wei","doi":"10.1145/3331453.3360956","DOIUrl":"https://doi.org/10.1145/3331453.3360956","url":null,"abstract":"It is always a challenge in the field of process mining to mine the non-free choice construct combining choice and synchronization from the event log. To solve this problem, we propose an improved process mining algorithms based on the genetic process mining. In this paper, we present a new definition of the ordering relations that can determine long distance dependency, which can build the initial population more biasedly, and prepare sufficient high quality individuals for subsequent evolutionary calculations. Then we can reduce the search space and avoid the existence of inferior individual. Mining results are validated by fitness, precision and generalization. Experimental results show that the improved algorithm is better than the existing algorithm for mining non-free choice construct. These improvements make the mining of process model more accurately reflecting the business processes.","PeriodicalId":162067,"journal":{"name":"Proceedings of the 3rd International Conference on Computer Science and Application Engineering","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132051441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信