2021 2nd Asia Conference on Computers and Communications (ACCC)最新文献

筛选
英文 中文
Named Entity Recognition for Chinese Aviation Security Incident Based on BiLSTM and CRF 基于BiLSTM和CRF的中国航空安保事件命名实体识别
2021 2nd Asia Conference on Computers and Communications (ACCC) Pub Date : 2021-09-01 DOI: 10.1109/ACCC54619.2021.00021
Yan Zhao, Hu Liu, Zhen Chen
{"title":"Named Entity Recognition for Chinese Aviation Security Incident Based on BiLSTM and CRF","authors":"Yan Zhao, Hu Liu, Zhen Chen","doi":"10.1109/ACCC54619.2021.00021","DOIUrl":"https://doi.org/10.1109/ACCC54619.2021.00021","url":null,"abstract":"Targeted at the issue of automatic acquisition of aviation security event entities. In this paper, the entity recognition model of aviation security incident based on character vector BiLSTM and CRF is constructed. In order to avoid word segmentation errors, character vectors are used in this paper. The sentence vector is obtained by PV -DM, and then the character vector and sentence vector are fused to make full use of the lexical information in the text. Then input BiLSTM to obtain the context characteristics of the text, and ensure the consistency of the output entity label through CRF. Finally, a data set of aviation security incidents is constructed, and the experimental results show that the proposed method improves the effectiveness of entity identification in the field of aviation security incidents.","PeriodicalId":215546,"journal":{"name":"2021 2nd Asia Conference on Computers and Communications (ACCC)","volume":"170 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133557823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Using Machine Learning Techniques To Plan A Fully Renewable Energy Systems By The End of 2050: Empirical Evidence From Jerusalem District Electricity Company 利用机器学习技术在2050年底前规划一个完全可再生能源系统:来自耶路撒冷地区电力公司的经验证据
2021 2nd Asia Conference on Computers and Communications (ACCC) Pub Date : 2021-09-01 DOI: 10.1109/ACCC54619.2021.00013
Ammar Almasri, Diaa Salman
{"title":"Using Machine Learning Techniques To Plan A Fully Renewable Energy Systems By The End of 2050: Empirical Evidence From Jerusalem District Electricity Company","authors":"Ammar Almasri, Diaa Salman","doi":"10.1109/ACCC54619.2021.00013","DOIUrl":"https://doi.org/10.1109/ACCC54619.2021.00013","url":null,"abstract":"Machine Learning (ML) approach facilitates solving many current issues, such as marketing, telecommunication, health care, sale, and energy issues. ML solves the issue of burning fossil fuels that caused environmental pollution by replacing conventional resources with renewable resources. This study aims to advance the knowledge of transitioning the Palestinian energy system to 100% renewable energy towards 2050 and considering the mostly expected load demand in the period of 2020–2050. The load performance and the share of renewable energy sources for the existed pattern of a given data for the status in Palestine are forecasted by using the Artificial Neural Network method (RNN). Then by using the linear programming method, the needed share of renewables into the grid is designed. The results of analyses show that 100% renewable energy is thinkable to be achieved.","PeriodicalId":215546,"journal":{"name":"2021 2nd Asia Conference on Computers and Communications (ACCC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117084906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Black-Box Universal Adversarial Attack on Text Classifiers 文本分类器的黑盒通用对抗性攻击
2021 2nd Asia Conference on Computers and Communications (ACCC) Pub Date : 2021-09-01 DOI: 10.1109/ACCC54619.2021.00007
Yu Zhang, Kun Shao, Junan Yang, H. Liu
{"title":"Black-Box Universal Adversarial Attack on Text Classifiers","authors":"Yu Zhang, Kun Shao, Junan Yang, H. Liu","doi":"10.1109/ACCC54619.2021.00007","DOIUrl":"https://doi.org/10.1109/ACCC54619.2021.00007","url":null,"abstract":"Adversarial examples reveal the fragility of deep learning models. Recent studies have shown that deep learning models are also vulnerable to universal adversarial perturbations. When the input-agnostic sequence of words concatenated to any input instance in the data set, it fools the model to produce a specific prediction in [9] and [10]. Despite being highly successful, they often need to obtain the gradient information of the target model. However, under more realistic black box conditions, we can only manipulate the input and output of the target model, which brings great difficulties to the search for universal adversarial disturbances. Therefore, to explore whether universal adversarial attacks can be realized under black-box conditions, we study a universal adversarial perturbation search method based on optimization. We conducted exhaustive experiments to prove the effectiveness of our attack model by attacking the Bi-LSTM and BERT models on sentiment classification tasks.","PeriodicalId":215546,"journal":{"name":"2021 2nd Asia Conference on Computers and Communications (ACCC)","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123272241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on a Technical Scheme for Evaluating the Stickiness of Family Group Users 家庭群组用户粘性评价技术方案研究
2021 2nd Asia Conference on Computers and Communications (ACCC) Pub Date : 2021-09-01 DOI: 10.1109/ACCC54619.2021.00012
Yinchao Cheng, Zhihong Zhou, Ye Guo, Zhongxian Xu, Lin Lin
{"title":"Research on a Technical Scheme for Evaluating the Stickiness of Family Group Users","authors":"Yinchao Cheng, Zhihong Zhou, Ye Guo, Zhongxian Xu, Lin Lin","doi":"10.1109/ACCC54619.2021.00012","DOIUrl":"https://doi.org/10.1109/ACCC54619.2021.00012","url":null,"abstract":"Customer stickiness is the core of stock customers operations of corporate. The stickiness of different customers is different. It is necessary for companies to evaluate and analyze customer stickiness in order to adopt different service and marketing strategies to enable the company to obtain stable operating benefits. For telecommunications companies, the market growth brought about by the demographic dividend has reached its peak, the companies have entered the stage of stock operation, and the competition among the industry is fierce. Therefore, there is an urgent need for customer's stickiness evaluation and refined operation. However, the research on the stickiness of family group customers, one of the important customers in the telecommunications industry, is currently in a blank state. How to use scientific methods to evaluate the stickiness of family group customers, explore the factors of customer stickiness, and formulate differentiated service strategies for group customers to increase customer stickiness is very important. In order to solve the above problems, this paper proposes a method for evaluating and analyzing family group customer stickiness. This method recognizes the family members through multi-source data, and designs the family group customer stickiness evaluation system (IEB) and builds a family group customer value evaluation model based on the consumption characteristics, business order and integration. At the same time, it formulates marketing strategies for different stickiness levels, development of personalized marketing and customer operations for family businesses. Finally, the experimental results show that the family group customer stickiness evaluation method proposed in this paper has a good application effect on the household market customer operation.","PeriodicalId":215546,"journal":{"name":"2021 2nd Asia Conference on Computers and Communications (ACCC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129713124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Applicability of Manually Crafted Convolutional Neural Network for Classification of Mild Cognitive Impairment 人工卷积神经网络在轻度认知障碍分类中的适用性
2021 2nd Asia Conference on Computers and Communications (ACCC) Pub Date : 2021-09-01 DOI: 10.1109/ACCC54619.2021.00028
Harsh Bhasin, R. Agrawal, For Alzheimer's Disease
{"title":"Applicability of Manually Crafted Convolutional Neural Network for Classification of Mild Cognitive Impairment","authors":"Harsh Bhasin, R. Agrawal, For Alzheimer's Disease","doi":"10.1109/ACCC54619.2021.00028","DOIUrl":"https://doi.org/10.1109/ACCC54619.2021.00028","url":null,"abstract":"Mild Cognitive Impairment (MCI) is considered as a formative stage of dementia and therefore its diagnosis can significantly assist in providing apposite treatment to the patients to impediment its headway towards dementia. In this paper, a Deep Learning approach is proposed for the classification of MCI-Converts and MCI-Non Converts, using the Structural Magnetic Resonance Imaging data. It investigates the effect of the variation in the number of filters, and the size of the filter on the performance of the model. Furthermore, the features are extracted using the penultimate layer of the proposed architecture. The Fisher Discriminant Ratio is used for the selection of features and the Support Vector Machine for the classification. The results are also compared to those obtained using the Softmax Layer. The proposed pipeline is able to extort germane features, thus improving the classification accuracy. The empirical studies exhibit the supremacy of the proposed method over the existing ones, in terms of accuracy. Consequently, the proposed technique may prove useful in the effectual diagnosis of MCI.","PeriodicalId":215546,"journal":{"name":"2021 2nd Asia Conference on Computers and Communications (ACCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129805319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Deterministic Polynomial Public Key Algorithm over a Prime Galois Field GF(p) 素数伽罗瓦域GF(p)上的确定性多项式公钥算法
2021 2nd Asia Conference on Computers and Communications (ACCC) Pub Date : 2021-09-01 DOI: 10.1109/ACCC54619.2021.00020
Randy Kuang
{"title":"A Deterministic Polynomial Public Key Algorithm over a Prime Galois Field GF(p)","authors":"Randy Kuang","doi":"10.1109/ACCC54619.2021.00020","DOIUrl":"https://doi.org/10.1109/ACCC54619.2021.00020","url":null,"abstract":"The ancient Vieta's formulas reveal the relationships between coefficients of an nth-degree polynomial and its roots. It is surprisingly found that there exists a hidden secret for a potential public key exchange: decoupling the product of all roots or constant term from summations of root products or coefficients of a polynomial to establish a keypair. The proposed deterministic polynomial public key algorithm or DPPK is built on the fact that a polynomial cannot be factorized without its constant term. DPPK allows the keypair generator to combine a base polynomial, eliminable during the decryption, with two solvable polynomials and creates two entangled polynomials. Two coefficient vectors of the entangled polynomials form a public key, and their constant terms, together with the two solvable polynomials, form the private key. By only publishing coefficients of polynomials without their constant terms, we greatly restrict polynomial factoring techniques for the private key extraction. We demonstrate that the time complexity, in terms of field operations, of the private key extraction from the known public key is a super-exponential difficulty O(p2) for classical attacks and an exponential difficulty O(p) for quantum attacks, respectively, in comparison with the low sub-exponential complexity for the PQC algorithms. The best-known deterministic complexity of the polynomial factoring problem for the secret key extraction from intercepted ciphertexts is O(npl/2) for classical attacks and O(pl/2) for quantum attacks, respectively, at the same complexity level as Grover's search algorithm. Performance comparisons with the PQC finalists for keypair generations, encryptions, and decryptions are presented.","PeriodicalId":215546,"journal":{"name":"2021 2nd Asia Conference on Computers and Communications (ACCC)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133716829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
New Automatic EEG Epileptic Seizure Detection Approach Using Sliding Discrete Fourier Transform and Machine Learning Techniques 基于滑动离散傅里叶变换和机器学习技术的脑电图癫痫发作自动检测新方法
2021 2nd Asia Conference on Computers and Communications (ACCC) Pub Date : 2021-09-01 DOI: 10.1109/ACCC54619.2021.00011
A. S. Abdulhussien, A. Abdulsadda, Ali Al Farawn
{"title":"New Automatic EEG Epileptic Seizure Detection Approach Using Sliding Discrete Fourier Transform and Machine Learning Techniques","authors":"A. S. Abdulhussien, A. Abdulsadda, Ali Al Farawn","doi":"10.1109/ACCC54619.2021.00011","DOIUrl":"https://doi.org/10.1109/ACCC54619.2021.00011","url":null,"abstract":"Automatic seizure detection is important for fast detection because the expert denoted and searching for seizures in the long signal takes time. The most common way to detect seizures automatically is to use an electroencephalogram (EEG). In this study, sliding discrete Fourier transform (SDFT) is applied for conversion to a frequency domain by using a simple IIR structure with other fourteen features extracted from the EEG database of Bonn University. These fifteen features used as input to classifier for seizure detection, a two-classifier feedforward neural network (FFNN) and an adaptive network-based fuzzy inference system (ANFIS) used. The results appear that the highest accuracy is 99.74% with FFNN and 99.67 ANFIS. Also, when measuring the feature importance in classification for each feature extraction method and compare the results, the SDFT has more importance than other features used in this study for the classification.","PeriodicalId":215546,"journal":{"name":"2021 2nd Asia Conference on Computers and Communications (ACCC)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133824599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Second-Hand Car Trading Framework Based on Blockchain in Cloud Service Environment 云服务环境下基于区块链的二手车交易框架
2021 2nd Asia Conference on Computers and Communications (ACCC) Pub Date : 2021-09-01 DOI: 10.1109/ACCC54619.2021.00026
Yimin Yu, Chuanjia Yao, Yi Zhang, Rong Jiang
{"title":"Second-Hand Car Trading Framework Based on Blockchain in Cloud Service Environment","authors":"Yimin Yu, Chuanjia Yao, Yi Zhang, Rong Jiang","doi":"10.1109/ACCC54619.2021.00026","DOIUrl":"https://doi.org/10.1109/ACCC54619.2021.00026","url":null,"abstract":"At present, the world economy is in recession, especially under the impact of the Covid-19 epidemic, China's economy has also been greatly impacted. In this context, the disposable personal income of residents has also declined to varying degrees. More and more people choose economical life. If they can buy a used car in good condition at a good price, they are less likely to buy a brand new one. Under such a consumption concept, China's demand for second-hand cars is increasing. However, although China's second-hand car industry has developed for more than 30 years and the market scale has gradually expanded, there are still many problems behind the prosperity of the second-hand car market. These problems have existed for a long time, leading to a lot of disputes, unhappiness, disappointment, and even threats to the lives of consumers. These long-term problems also affect the virtuous circle of the second-hand car market, and hinder the healthy development of China's economy to a certain extent. In the past, research work mainly focused on the role of new policies, relevant laws and vehicle management and traffic management functions, this paper introduces the blockchain technology, which has the advantages of non tampering, transparency and traceability. This paper attempts to use blockchain technology as an auxiliary means to solve the long-standing problems in the used car market. This paper proposes a framework of used car trading based on blockchain in cloud service environment, and explains the working principle of the framework. Finally, the future research work is prospected.","PeriodicalId":215546,"journal":{"name":"2021 2nd Asia Conference on Computers and Communications (ACCC)","volume":"406 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134192546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Research on the Unified Capability Structure System of Software Engineering Undergraduate Talents 软件工程本科人才统一能力结构体系研究
2021 2nd Asia Conference on Computers and Communications (ACCC) Pub Date : 2021-09-01 DOI: 10.1109/ACCC54619.2021.00010
Da Shi, Xi Yu, Lei Mou, J. Gui
{"title":"Research on the Unified Capability Structure System of Software Engineering Undergraduate Talents","authors":"Da Shi, Xi Yu, Lei Mou, J. Gui","doi":"10.1109/ACCC54619.2021.00010","DOIUrl":"https://doi.org/10.1109/ACCC54619.2021.00010","url":null,"abstract":"With the rapid development of the digital era, the society needs to optimize the training program of software talents according to the changes of market demand. But in reality, the ability evaluation system of software talents is quite different in enterprise recruitment, industry standards, engineering certification and talent training programs of colleges and universities, which makes it difficult for colleges and universities to quickly and accurately evaluate the ability differences of software talents when making talent training programs. This paper deeply studies the international standards of software talents' knowledge domain, the engineering certification of software specialty and the similarities and differences of software talents' ability evaluation system in the employment market, explores and establishes a unified knowledge and ability system of software talents, and further establishes a unified knowledge (ability) structure model of software talents, so as to lay a good foundation for the optimization of software talents training program in Colleges and universities, So that colleges and universities can further improve the quality of software undergraduate training, better meet the needs of the market.","PeriodicalId":215546,"journal":{"name":"2021 2nd Asia Conference on Computers and Communications (ACCC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115056329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of Smart Contract Technology in the Construction of Digital Resource Knowledge Management Platform 智能合约技术在数字资源知识管理平台建设中的应用
2021 2nd Asia Conference on Computers and Communications (ACCC) Pub Date : 2021-09-01 DOI: 10.1109/ACCC54619.2021.00023
Jianjun Sun
{"title":"Application of Smart Contract Technology in the Construction of Digital Resource Knowledge Management Platform","authors":"Jianjun Sun","doi":"10.1109/ACCC54619.2021.00023","DOIUrl":"https://doi.org/10.1109/ACCC54619.2021.00023","url":null,"abstract":"The development of internet platforms has made network resources increasingly abundant, and the protection and dissemination of knowledge of digital resources has become an important topic for the development of new technologies. This article combines the security, decentralization and other characteristics of blockchain technology, integrates smart contract technology into digital resource knowledge management, and proposes a digital resource knowledge management smart contract platform. This article experiments on the platform's environment and operations to demonstrate the availability and innovation of digital platforms. The platform proposed by the article provides technical support for building digital resource knowledge management resources and knowledge protection and sharing.","PeriodicalId":215546,"journal":{"name":"2021 2nd Asia Conference on Computers and Communications (ACCC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122474722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信