2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)最新文献

筛选
英文 中文
Self-attention-based Group Recommendation 基于自我关注的群体推荐
Xiaoping Yang, Yuliang Shi
{"title":"Self-attention-based Group Recommendation","authors":"Xiaoping Yang, Yuliang Shi","doi":"10.1109/ITNEC48623.2020.9085011","DOIUrl":"https://doi.org/10.1109/ITNEC48623.2020.9085011","url":null,"abstract":"With the advent of the era of big data, the traditional recommendation system mainly for a single user, but with the society and the rapid development of e-commerce, more and more people participate in activities together, in the form of multiple users and groups of recommendation system recommended service object by a single user extensions for group members, has become a hot topic in the current society. In view of the low accuracy rate of group recommendation and the inconsistent fusion strategy among group members, the traditional solution method is matrix decomposition. MF USES a simple and fixed inner product to estimate the complex user-project interaction in low-dimensional potential space, which will cause the problem of limitation. Therefore, a group recommendation algorithm combining self-attention and NCF to solve the problem of group preference fusion is proposed. We use neural network to learn the group recommendation of fusion strategy through self-attention, and further integrate the user-project interaction improvement group recommendation through NCF model. The self-attention mechanism provided in this paper was verified on qunar and CAMRA2011 data sets. Compared with other common fusion strategies, the overall average performance of the proposed mechanism in NDCG and HR was improved.","PeriodicalId":235524,"journal":{"name":"2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114432618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Multi-objective optimization configuration of electric energy storage capacity of electric propulsion ship 电力推进船舶储能容量多目标优化配置
S. Pang, Yejin Lin, Guoqiang Liu, Dongping Ren
{"title":"Multi-objective optimization configuration of electric energy storage capacity of electric propulsion ship","authors":"S. Pang, Yejin Lin, Guoqiang Liu, Dongping Ren","doi":"10.1109/ITNEC48623.2020.9084691","DOIUrl":"https://doi.org/10.1109/ITNEC48623.2020.9084691","url":null,"abstract":"In order to make the operation of all-electric propulsion ship more stable and efficient, a lithium battery energy storage system (ESS) is adopted to join the ship microgrid to meet the sudden change of load. In this paper, the lithium battery capacity optimization calculation method is designed. The main purpose of this method is to calculate the most cost-effective lithium battery parameters while achieving the optimal economic operating point of the generator set. Establish appropriate objective functions and constraints, and use Matlab software for programming calculations. The simulation of the method is verified by an electric propulsion ship as an example.","PeriodicalId":235524,"journal":{"name":"2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114500935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Blockchain-based Security Approach Architecture for the Internet of Things 基于区块链的物联网安全方法架构
Han Zhang, Weimin Lang, Chengming Liu, Bingpeng Zhang
{"title":"A Blockchain-based Security Approach Architecture for the Internet of Things","authors":"Han Zhang, Weimin Lang, Chengming Liu, Bingpeng Zhang","doi":"10.1109/ITNEC48623.2020.9084997","DOIUrl":"https://doi.org/10.1109/ITNEC48623.2020.9084997","url":null,"abstract":"With the rapid development of Internet of things technology, IoT security problems are increasingly prominent. Blockchain is a new application model of distributed data storage, point-to-point transmission, consensus mechanism, encryption algorithm and other computer technologies, which provides a new solution to solve the security problems of IoT. This paper envisages a blockchain-based security approach architecture for IoT, which aims to construct a space of mutual trust between devices for reliable data transmission.","PeriodicalId":235524,"journal":{"name":"2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116620710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Research on Allocation of Transmission Fixed Cost by Cooperate Game Theory 基于合作博弈论的输电固定成本分配研究
Q. Tong, Dapeng Zhou
{"title":"Research on Allocation of Transmission Fixed Cost by Cooperate Game Theory","authors":"Q. Tong, Dapeng Zhou","doi":"10.1109/ITNEC48623.2020.9084990","DOIUrl":"https://doi.org/10.1109/ITNEC48623.2020.9084990","url":null,"abstract":"Under the liberalized power market environment, the traditional transmission fixed cost allocation method is difficult to deal with the benefit relationship between power grids and users from the economic perspective. Cooperate game is a mathematical method that can coordinate the economic benefit relationship between users, and is beneficial to realize the optimal allocation of transmission resources. Based on the analysis of traditional cost allocation methods, this paper further systematically expounded the advantages of allocate transmission fixed cost by cooperate game algorithm, and analyzed in detail various cooperate game models, game algorithms and their characteristics of transmission fixed cost allocation.","PeriodicalId":235524,"journal":{"name":"2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116825527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generating Functional Responses Based on Interpretable Variable Space 基于可解释变量空间生成功能响应
H.-P. Shen, Bin Wu
{"title":"Generating Functional Responses Based on Interpretable Variable Space","authors":"H.-P. Shen, Bin Wu","doi":"10.1109/ITNEC48623.2020.9084670","DOIUrl":"https://doi.org/10.1109/ITNEC48623.2020.9084670","url":null,"abstract":"How to generate responses with different sentence functions is the most challenging task in the area of dialogue systems. Conventional Sequence-to-Sequence (Seq2seq) model cannot generate sentences with different functions based on the same context by using beam search. In this paper, we design a new model to solve this problem. Our model combines an Autoencoder (AE) with a Seq2seq model by sharing the same decoder. It encodes posts and responses into different space variables and restructures the responses respectively. Besides, we introduce a latent variable to extract sentence function and Triplet loss to make variable space interpretable. The results show that our model has the ability to generate different sentences based on the target functional factor and reach a high degree of fluency and diversity in responses.","PeriodicalId":235524,"journal":{"name":"2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117294600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Waveform Design of Cognitive Radar Based on Maximum SINR and MI 基于最大SINR和MI的认知雷达波形设计
Qingpei Yang, C. Shang, Jian Dong
{"title":"Waveform Design of Cognitive Radar Based on Maximum SINR and MI","authors":"Qingpei Yang, C. Shang, Jian Dong","doi":"10.1109/ITNEC48623.2020.9084764","DOIUrl":"https://doi.org/10.1109/ITNEC48623.2020.9084764","url":null,"abstract":"In real battlefield, the prior information of radar target is not easy to obtain. The waveform based on the prior information of radar target can not meet the needs of detection and parameter estimation. This paper considers the optimal waveform design method under different task energy constraints. In order to improve the detection performance of radar system, the signal-to-interference-to-noise ratio (SINR) of known and random extended targets can be maximized; in order to improve the performance of parameter estimation, the mutual information (MI) between radar echo and spectrum response of random targets can be maximized, and the optimal waveform design and simulation are carried out.","PeriodicalId":235524,"journal":{"name":"2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129410270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research and Realization of Home Region Authentication Server Resolution Mechanism 本域认证服务器解析机制的研究与实现
Chao Ouyang, Xuan Jia
{"title":"Research and Realization of Home Region Authentication Server Resolution Mechanism","authors":"Chao Ouyang, Xuan Jia","doi":"10.1109/ITNEC48623.2020.9085101","DOIUrl":"https://doi.org/10.1109/ITNEC48623.2020.9085101","url":null,"abstract":"Because of the overloading of IP address semantics, the development of the Internet has encountered many challenges. As a new type of network, Identifier-Based Network separates identity information and location information in order to solve those problems. In Identifier-Based Networks, terminal access authentication requires assistance from the Home Region Authentication Server (HRAS). However, there are many problems in the existing resolution scheme. Therefore, this article proposes a novel resolution mechanism, through designing storage mechanism, communication process and matching algorithm, finally solve the problem of registration and resolution for HRAS address in Identifier-Based Network. At last, the main function is simulated and tested according to the design scheme, and the test results are in accordance with the expected analysis and processing results.","PeriodicalId":235524,"journal":{"name":"2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128214549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of FPGA-based Laser Light Source Control Module for Continuous Variable Quantum Key Distribution 基于fpga的连续可变量子密钥分配激光光源控制模块设计
Sijie Zhang, H. Liang
{"title":"Design of FPGA-based Laser Light Source Control Module for Continuous Variable Quantum Key Distribution","authors":"Sijie Zhang, H. Liang","doi":"10.1109/itnec48623.2020.9084721","DOIUrl":"https://doi.org/10.1109/itnec48623.2020.9084721","url":null,"abstract":"Compared with discrete variable quantum key distribution, the Continuous Variable Quantum Key Distribution (CVQKD) system has the advantages of simple equipment, low technical difficulty, and high channel capacity, in addition to unconditional security and detectability for wiretapping. In this paper, the laser light source control system realizes the control and adjustment functions of the photon quantum state, which was encoded with information. In order to generate the synchronous optical pulse signals, the Field Programmable Gate Array (FPGA), multi-channel Digital to Analog Converter (DAC), and micro power Analog to Digital Converter (ADC) were used to control the synchronous optical laser. The control of multiple amplitude modulators and phase modulators is achieved based on the FPGA and high-speed DAC. At present, the electronics performance test of the laser light source control system has been completed, and the results show that the requirements of the CVQKD system index are met.","PeriodicalId":235524,"journal":{"name":"2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129019473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Effective Approach of Named Entity Recognition for Cyber Threat Intelligence 面向网络威胁情报的命名实体识别方法
Han Wu, Xiaoyong Li, Yali Gao
{"title":"An Effective Approach of Named Entity Recognition for Cyber Threat Intelligence","authors":"Han Wu, Xiaoyong Li, Yali Gao","doi":"10.1109/ITNEC48623.2020.9085102","DOIUrl":"https://doi.org/10.1109/ITNEC48623.2020.9085102","url":null,"abstract":"Traditional methods of domain named entity recognition (NER) rely on manually-defined feature templates and domain experience. Aiming at domain NER task of unstructured cyber threat intelligence (CTI), this paper proposed an approach based on BiLSTM-CRF model and domain dictionary matching correction. This approach utilizes bi-directional Long Short-Term Memory (BiLSTM) to automatically capture features of context, Conditional Random Fields (CRF) to learn label constraint rule, and an ontology-based domain dictionary for matching correction. Due to the lack of available domain dataset, this paper adopts the pre-processed unstructured CTI text as dataset for domain NER experiment. The experimental results show that the proposed approach reaches 85% in F1 score, and can significantly reduce reliance on manually-defined features.","PeriodicalId":235524,"journal":{"name":"2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129131641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Considering Self-media Influence Network Rumor Propagation Model and Control Strategy 考虑自媒体影响的网络谣言传播模型及控制策略
Jiayang Li, Bowei Song, C. Luo, Baoning Zhang, Shengchuang Wang, Gang Wu
{"title":"Considering Self-media Influence Network Rumor Propagation Model and Control Strategy","authors":"Jiayang Li, Bowei Song, C. Luo, Baoning Zhang, Shengchuang Wang, Gang Wu","doi":"10.1109/ITNEC48623.2020.9084775","DOIUrl":"https://doi.org/10.1109/ITNEC48623.2020.9084775","url":null,"abstract":"Network rumors strongly interfere with the spread of Internet information. Especially with the emergence of self-media, it is more common for real and false information to exist simultaneously in the network. In this paper, a rumor communication system with self-media is established, named SHLR. In this model, rumour-mongers are divided into high speed and low speed. The numerical analysis of the system is provided by studying the equilibrium point and stability. Furthermore, the balance of SHLR model is validated by real data. Simulation results show that the self-media will expand the scope and influence of rumors. Finally, government control strategies are given such as releasing the authoritative notice at the first time to avoid the generation and spread of rumors.","PeriodicalId":235524,"journal":{"name":"2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123867956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信