2021 5th Asian Conference on Artificial Intelligence Technology (ACAIT)最新文献

筛选
英文 中文
A Comparative Study of Multi-objective Flexible Job-shop Scheduling Problem 多目标柔性作业车间调度问题的比较研究
2021 5th Asian Conference on Artificial Intelligence Technology (ACAIT) Pub Date : 2021-10-29 DOI: 10.1109/acait53529.2021.9731252
Yi Feng, Ya-Tai Lin, Mingliang Wu, Dongsheng Yang, Zhile Yang
{"title":"A Comparative Study of Multi-objective Flexible Job-shop Scheduling Problem","authors":"Yi Feng, Ya-Tai Lin, Mingliang Wu, Dongsheng Yang, Zhile Yang","doi":"10.1109/acait53529.2021.9731252","DOIUrl":"https://doi.org/10.1109/acait53529.2021.9731252","url":null,"abstract":"Flexible job shop scheduling problem (FJSP) has always been a pivotal research content in the manufacture field. However, many studies only focus on the maximum completion time. The growing demand for development urgently needs a FJSP that can cover a variety of optimization goals. As a result, a multi-objective FJSP model is proposed, which includes four optimization objectives: maximum completion time, total energy depletion, delay time and total machine load. For the multi-objective FJSP, three optimization algorithms of NSGA-II, NSGA-III and MOEA/D are used to minimize the maximum completion time, total energy depletion, delay time and total machine load. The superiority and validity of these algorithms are verified by tests.","PeriodicalId":173633,"journal":{"name":"2021 5th Asian Conference on Artificial Intelligence Technology (ACAIT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133151245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Complex Scene Tracking Algorithm Based on Multi-feature Fusion 基于多特征融合的复杂场景跟踪算法
2021 5th Asian Conference on Artificial Intelligence Technology (ACAIT) Pub Date : 2021-10-29 DOI: 10.1109/acait53529.2021.9730889
Jian-Bo Cheng, Hongfei Xiao, Liang Chen, Pengpeng Yan, Yinan Guo
{"title":"Complex Scene Tracking Algorithm Based on Multi-feature Fusion","authors":"Jian-Bo Cheng, Hongfei Xiao, Liang Chen, Pengpeng Yan, Yinan Guo","doi":"10.1109/acait53529.2021.9730889","DOIUrl":"https://doi.org/10.1109/acait53529.2021.9730889","url":null,"abstract":"At present, natural disasters of coalmine in China are still serious, and coalmine safety guarantee capabilities are still relatively low. In recent years, a lot of manpower and material resources have been implemented to upgrade the coalmine monitoring system, but manual operation has limited their applications and effects, the efficiency is low and the error rate is high. The application of computers for intelligent tracking and monitoring of dynamic object can greatly reduce the waste of manpower, improve monitoring efficiency, and provide more reliable and concise safety early warning and system linkage than manual operation. In addition, object tracking can provide information support for behavior understanding, event detection, object classification, its importance is self-evident. The object tracking algorithm has achieved good results in open scenes with rich features and sufficient illumination. However, in confined spaces such as coalmine and tunnels, due to unfavorable factors such as coal dust, lack of illumination, scale changes, and image blur-ring, etc. The stability and robustness of tracking are greatly affected. In this paper, the deep network model is used to extract the depth features of the tracking target, the depth features and the results of the HOG feature location filter are weighted and merged to obtain the final target location. The algorithm has better tracking stability and robustness in the case of insufficient illumination and scarce feature points in coalmines. The dynamic object tracking experiment is carried out on the coalmine monitoring video. The experimental results show that the algorithm is more robust than the comparison algorithm and can meet the needs of object tracking in complex scenes in coalmine.","PeriodicalId":173633,"journal":{"name":"2021 5th Asian Conference on Artificial Intelligence Technology (ACAIT)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122218494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Location estimation method based on circular target by UAV’s monocular 基于圆形目标的无人机单目定位方法
2021 5th Asian Conference on Artificial Intelligence Technology (ACAIT) Pub Date : 2021-10-29 DOI: 10.1109/acait53529.2021.9731175
H. Wang, Xuan Pei, Jiaxin Li, Shijie Zhang, Tianmiao Wang, Taogang Hou
{"title":"Location estimation method based on circular target by UAV’s monocular","authors":"H. Wang, Xuan Pei, Jiaxin Li, Shijie Zhang, Tianmiao Wang, Taogang Hou","doi":"10.1109/acait53529.2021.9731175","DOIUrl":"https://doi.org/10.1109/acait53529.2021.9731175","url":null,"abstract":"In order to solve the difficulties in location estimation of practical applications such as real-time tracking and formation coordination in large space, large-scale scene, we proposes a method for location estimation based on monocular vision and circular markers whose diameter is known on the UAV platform.We analyzed the circular center offset in the perspective projection, and gave the correct formula for the center offset. Then the effectiveness of circle center estimation algorithms and location estimation is verified by fixed camera with different tilt angle $theta$ and monocular on UAV. We used the monocular vision based on the UAV to achieve the location estimation with an accuracy of 3.0cm.","PeriodicalId":173633,"journal":{"name":"2021 5th Asian Conference on Artificial Intelligence Technology (ACAIT)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125701562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
TDNN:A Tensor Decomposition Adversarial Defense Method Based on Neural Network 基于神经网络的张量分解对抗防御方法
2021 5th Asian Conference on Artificial Intelligence Technology (ACAIT) Pub Date : 2021-10-29 DOI: 10.1109/acait53529.2021.9731274
Wei He, Bingbing Song, Ruxin Wang, Wenyu Peng, Shenghong He, Wei Zhou
{"title":"TDNN:A Tensor Decomposition Adversarial Defense Method Based on Neural Network","authors":"Wei He, Bingbing Song, Ruxin Wang, Wenyu Peng, Shenghong He, Wei Zhou","doi":"10.1109/acait53529.2021.9731274","DOIUrl":"https://doi.org/10.1109/acait53529.2021.9731274","url":null,"abstract":"In recent years, neural networks have shown strong performance on various tasks. However, neural networks show the vulnerability to carefully designed noise of adversarial examples. Through research, it is found that the neural networks usually have good robustness to common noise, but almost no resistance to carefully designed imperceptible perturbations noise of adversarial examples. To solve this problem, related works have proposed to transform the noise of the adversarial sample into random ordinary noise, which greatly protects the model from adversarial attack. To solve this problem, we propose an adversarial defense method based on tensor decomposition, which use tensor decomposition technology to decompose and reconstruct the image, and retain the main features of the image and remove the perturbation of adversarial examples. Based on traditional tensor decomposition method, we further propose the tensor decomposition of neural networks method (TDNN). Compared with traditional tensor decomposition, TDNN has better defense effect and lower running time. Beside TDNN can be combined with existing defense methods and does not require extra changes for model. Through Rigorous experiments show that TDNN can remove carefully added perturbation and greatly improve the robustness of the model.","PeriodicalId":173633,"journal":{"name":"2021 5th Asian Conference on Artificial Intelligence Technology (ACAIT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123863130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Dual fusion paired environmental background and face region for face anti-spoofing 基于环境背景和人脸区域双融合的人脸防欺骗算法
2021 5th Asian Conference on Artificial Intelligence Technology (ACAIT) Pub Date : 2021-10-29 DOI: 10.1109/acait53529.2021.9731173
Xin Huang, Qin Huang, Nan Zhang
{"title":"Dual fusion paired environmental background and face region for face anti-spoofing","authors":"Xin Huang, Qin Huang, Nan Zhang","doi":"10.1109/acait53529.2021.9731173","DOIUrl":"https://doi.org/10.1109/acait53529.2021.9731173","url":null,"abstract":"Face anti-spoofing is a key phase in the face recognition process, where threats come from various deception attacks. Previously, traditional methods and deep supervised learning methods were shown to be effective in face anti-spoofing, but most previous work only focused on a single application scenario, ignoring the importance of face anti-spoofing methods for generalization ability across different applications scenarios. As a result, we propose a new face anti-spoofing method based on misleading attack information found in the face area and maybe in the environmental backdrop. The convolutional neural network extracts deception attack information from the global picture, while the local feature descriptor extracts deception attack information from the face area. The dual-cue fusion method efficiently mitigates detector performance loss caused by changes in the detection backdrop. We conduct several trials using CelebA-Spoof, WMCA, and 3DMAD datasets to demonstrate the efficiency of our technique. The findings reveal that our solution is capable of dealing with the majority of assaults and has a high degree of generality for various application scenarios.","PeriodicalId":173633,"journal":{"name":"2021 5th Asian Conference on Artificial Intelligence Technology (ACAIT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129931337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Sliding Mode Tracking Control Method for Double Pendulum Crane Systems With Variable Rope Length 变绳长双摆起重机滑模跟踪控制方法
2021 5th Asian Conference on Artificial Intelligence Technology (ACAIT) Pub Date : 2021-10-29 DOI: 10.1109/acait53529.2021.9731285
He Chen, Xinya Yao
{"title":"A Sliding Mode Tracking Control Method for Double Pendulum Crane Systems With Variable Rope Length","authors":"He Chen, Xinya Yao","doi":"10.1109/acait53529.2021.9731285","DOIUrl":"https://doi.org/10.1109/acait53529.2021.9731285","url":null,"abstract":"Crane systems are usually applied to achieve transportation for heavy payloads in many industrial fields. When the transported cargo cannot be regard as a mass point or the hook mass needs to be considered, the crane system is a double pendulum system, which will bring much more difficulty in design suitable control methods. Considering this fact, we propose a sliding mode tracking method for double pendulum cranes with variable rope length, which achieves accurate trolley and payload hoisting/lowering positioning by properly tracking the pre-planned reference trajectories. The important swing suppression for both payload’s and hook’s swing angles is also ensured simultaneously. Finally, some simulations are included to better verify our method.","PeriodicalId":173633,"journal":{"name":"2021 5th Asian Conference on Artificial Intelligence Technology (ACAIT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128873665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Zero-Watermarking Algorithm for Medical Images Based on Nonsubsampled Contourlet Transform and Double Singular Value Decomposition 基于非下采样Contourlet变换和双奇异值分解的医学图像零水印算法
2021 5th Asian Conference on Artificial Intelligence Technology (ACAIT) Pub Date : 2021-10-29 DOI: 10.1109/acait53529.2021.9731179
Tongyuan Huang, Jia Xu, Yuling Yang, Shixin Tu, B. Han
{"title":"Zero-Watermarking Algorithm for Medical Images Based on Nonsubsampled Contourlet Transform and Double Singular Value Decomposition","authors":"Tongyuan Huang, Jia Xu, Yuling Yang, Shixin Tu, B. Han","doi":"10.1109/acait53529.2021.9731179","DOIUrl":"https://doi.org/10.1109/acait53529.2021.9731179","url":null,"abstract":"The privacy and security of medical images in storage and transmission are enormous challenges. In this paper, we propose a novel multi-algorithm fusion of medical image robust zero-watermarking algorithm based on the nonsubsampled contourlet transform (NSCT), double singular value decomposition (DSVD), and multi-level discrete cosine transform (MDCT). The NSCT of the original medical image obtains low-frequency domain information, blocks the low-frequency domain information and uses the MDCT to obtain the coefficient matrix of the low-frequency direction sub-bands, and then uses the DSVD to construct the feature vector. At the same time, the watermarking is encrypted using Logistic Map to ensure the security of the original watermarking information under the chaotic system. In the watermarking embedding and extraction phase, zero-watermarking technology is used to ensure the integrity of medical images. Experimental results show that the proposed algorithm can extract watermarking information effectively and accurately with fast calculation speed and high precision, and it has good invisibility and strong robustness for both common attacks and geometric attacks.","PeriodicalId":173633,"journal":{"name":"2021 5th Asian Conference on Artificial Intelligence Technology (ACAIT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129163707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on BIM intelligent management technology of wharf construction schedule based on Improved Genetic Algorithm 基于改进遗传算法的码头施工进度BIM智能管理技术研究
2021 5th Asian Conference on Artificial Intelligence Technology (ACAIT) Pub Date : 2021-10-29 DOI: 10.1109/acait53529.2021.9731118
Y. Jia, Haifeng Wang
{"title":"Research on BIM intelligent management technology of wharf construction schedule based on Improved Genetic Algorithm","authors":"Y. Jia, Haifeng Wang","doi":"10.1109/acait53529.2021.9731118","DOIUrl":"https://doi.org/10.1109/acait53529.2021.9731118","url":null,"abstract":"It was inevitable for the construction industry to develop the project management in an information and intelligence way. This time, the construction information model of the dock project was built with the help of BIM technology and genetic calculation, and the intelligent management of the construction progress was carried out based on it. Through the analysis of the targets in the progress plan, the math relationship between the best targets was obtained, and the BIM construction progress plan based on the genetic calculation was also improved. Through the simulation analysis of a dock in Tianjin, it could be seen that with the construction information model, the intelligent management of the construction progress of the dock could realize the dynamic tracking and control of the construction progress, and it was also conducive to the overall control of the construction progress.","PeriodicalId":173633,"journal":{"name":"2021 5th Asian Conference on Artificial Intelligence Technology (ACAIT)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127783568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of MSPRN Target Recognition Algorithm for Vehicle Automatic Driving 车辆自动驾驶中MSPRN目标识别算法的设计
2021 5th Asian Conference on Artificial Intelligence Technology (ACAIT) Pub Date : 2021-10-29 DOI: 10.1109/acait53529.2021.9731257
Min Yang
{"title":"Design of MSPRN Target Recognition Algorithm for Vehicle Automatic Driving","authors":"Min Yang","doi":"10.1109/acait53529.2021.9731257","DOIUrl":"https://doi.org/10.1109/acait53529.2021.9731257","url":null,"abstract":"Vehicle automatic driving technology can effectively improve the safety performance of vehicle driving. This research is to meet the needs of vehicle automatic driving, and propose a target recognition algorithm with better performance. According to the existing research, the algorithm is optimized and improved based on the traditional Faster R-CNN algorithm, and a network target recognition algorithm based on Multi Strategy Regional candidate box is proposed to optimize the anchor box. Through the comparative analysis of recognition and recall rate between traditional R-CNN algorithm and MSPRN algorithm, it can be seen that MSPRN algorithm has better algorithm performance and is suitable for target detection and recognition in vehicle automatic driving.","PeriodicalId":173633,"journal":{"name":"2021 5th Asian Conference on Artificial Intelligence Technology (ACAIT)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117229833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Regional growth inpainting strategy for depth image 深度图像的区域增长绘制策略
2021 5th Asian Conference on Artificial Intelligence Technology (ACAIT) Pub Date : 2021-10-29 DOI: 10.1109/acait53529.2021.9731273
Zhengyang Chen, G. Chen, Zaizuo Tang, Bo Hu
{"title":"Regional growth inpainting strategy for depth image","authors":"Zhengyang Chen, G. Chen, Zaizuo Tang, Bo Hu","doi":"10.1109/acait53529.2021.9731273","DOIUrl":"https://doi.org/10.1109/acait53529.2021.9731273","url":null,"abstract":"The depth images acquired from depth sensors have inherent problems, such as missing depth values and noisy boundaries. In this paper, an inpainting strategy for depth image based on regional growth criterion is proposed. In terms of image inpainting sequence, based on Criminisi priority method, a new calculating method of confidence item is defined and the improved priority is used to weight the confidence items and data items. Compared with the inpainting results of Joint bilateral filter (JBF), JBFC (JBF based on Criminisi priority), and JBFW (JBF based on weighted pixel priority), the inpainting sequence and texture extension determined by weighted pixel priority are better. In terms of image inpainting field, Under the guidance of the weighted pixel priority, the adaptive neighborhood of the pixel to be inpainted is defined by region growth criterion which have higher similarity with the pixel to be inpainted than by traditional neighborhood. Experimental results show that the neighborhood constructed by region growth criterion is accurate and effective. Generally, the regional growth inpainting strategy can obtain higher inpainting accuracy while keeping the boundary information","PeriodicalId":173633,"journal":{"name":"2021 5th Asian Conference on Artificial Intelligence Technology (ACAIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132415771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信