{"title":"Mobile Handheld Devices and Embedded in Things Picking System","authors":"Yuan Haixia, F. Yifan, Qin Xinjing, Huang Guokai","doi":"10.1109/CCET50901.2020.9213136","DOIUrl":"https://doi.org/10.1109/CCET50901.2020.9213136","url":null,"abstract":"Aiming at the detection standards and operation methods of the logistics sorting system, a handheld laser scanner is used to measure the size of the item and the barcode is recognized. Based on the reference and reference similar standards, through a large number of experimental comparisons, a new mobile handheld Equipment and embedded logistics and assembly line sorting system detection standards and operation methods (including logistics transportation modules and logistics sorting modules) fill the gap in this project in China, making the factory assembly line process and logistics sorting process fully optimized , Workers and couriers work more conveniently, and also greatly reduce the man-made damage that occurs during the transportation of goods and products.","PeriodicalId":236862,"journal":{"name":"2020 IEEE 3rd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131761042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deep Learning in Face Synthesis: A Survey on Deepfakes","authors":"Teng Zhang, Lirui Deng, L. Zhang, Xianglei Dang","doi":"10.1109/CCET50901.2020.9213159","DOIUrl":"https://doi.org/10.1109/CCET50901.2020.9213159","url":null,"abstract":"Deepfake stemming from the combined words of \"deep learning\" and \"fake\", refers to a type of fake images and video generation technology based on artificial intelligence. In recent years, with the continuous development of deep learning, especially auto-encoders and generative adversarial networks, deepfake has made tremendous progress, resulting in the emergence of some easy-to-use application software in the market, reducing the application difficulty of face-synthesis technology. This paper provides a thorough review of deepfake, introducing its development in the past three years.","PeriodicalId":236862,"journal":{"name":"2020 IEEE 3rd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"331 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133569582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Video-Based Traffic Flow Monitoring Algorithm","authors":"Yongmei Zhang, Jiarui Zhao, Ying Xiang, Jie Shu","doi":"10.1109/CCET50901.2020.9213115","DOIUrl":"https://doi.org/10.1109/CCET50901.2020.9213115","url":null,"abstract":"Intelligent traffic is the main trend of urban development at present. In view of the increasing number of vehicles and traffic congestion, this paper presents a video-based traffic flow monitoring algorithm. The proposed algorithm extracts the vehicles using characteristics of the video, detects the moving vehicles and the non-motor vehicles by the pixel sizes and positions. According to the results of vehicle detection, the number of vehicles is analyzed, speed is calculated by moving distance, and combined with traffic flow to judge current road conditions are smooth, general, or congested. This algorithm adopts the three-frame difference method to detect moving vehicles to ensure the real-time performance of the algorithm and displays the number of vehicles, speed information, the number of vehicles per lane in a direct visual way, and vehicles entering the region of interest can be identified. The experiment results show the proposed algorithm can judge the current traffic situations in real-time based on video, and vehicle detection is more accurate.","PeriodicalId":236862,"journal":{"name":"2020 IEEE 3rd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134003227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Emerging Intention Mining Inspired by Semantic Reconstruction","authors":"Jiahui Shen, Ji Xiang, Lin Zhao, Lei Wang","doi":"10.1109/CCET50901.2020.9213133","DOIUrl":"https://doi.org/10.1109/CCET50901.2020.9213133","url":null,"abstract":"Emerging intention mining is the process of identifying the inputs that differ in some respect from the training samples. With the development of artificial intelligence, more and more attention has been paid to data mining. Therefore, methods which can efficiently identify the emerging intentions are needed. However, due to the lack of data for emerging intention, training an end-to-end deep network is a cumbersome task. In this paper, we propose an end-to-end architecture for emerging intention mining which inspired by the success of generative adversarial networks and conditional variational autoencoder (CVAE). Our architecture tries understand the underlying concept of the inputs and then reconstruct them through semantic information. There are two deep networks by Convolutional Neural Networks (CNN). One network works as the semantic information extraction and the other works as the novelty detector. The first network supports the second by enhancing the inlier samples and distorting the outliers. The proposed framework applies to different datasets. The results illustrate that our proposed method learns the target class effectively and is superior to the baseline and state-of-the-art methods.","PeriodicalId":236862,"journal":{"name":"2020 IEEE 3rd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123593717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multiuser Multicarrier Chaotic Differential Communication System Based on Cooperative Model","authors":"Gong-quan Zhang, Xiao-Hui Li, Xiaoting Chen","doi":"10.1109/CCET50901.2020.9213137","DOIUrl":"https://doi.org/10.1109/CCET50901.2020.9213137","url":null,"abstract":"To improve the antifading and inter-code interference ability of the noncoherent chaotic communication system, a multiuser multicarrier chaotic differential communication system based on a cooperative model is proposed. A single relay of the decode-and-forward type is investigated according to the conventional cooperation protocol. Independent three path Rayleigh channels are considered, and the bit error rate and outage probability are derived and verified via simulations. Numerical and Monte Carlo simulations show that the proposed model can effectively deter fading and inter-code interference effectively.","PeriodicalId":236862,"journal":{"name":"2020 IEEE 3rd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122633998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Painting Style Classification Using Deep Neural Networks","authors":"V. Kovalev, A. G. Shishkin","doi":"10.1109/CCET50901.2020.9213161","DOIUrl":"https://doi.org/10.1109/CCET50901.2020.9213161","url":null,"abstract":"In this paper we describe the problem of painting style classification into five classes: impressionism, realism, expressionism, post-impressionism and romanticism. While most previous approaches relied on image processing and manual feature extraction from painting images, our model based on the ResNet architecture and pre-trained on the ImageNet dataset operates on the raw pixel level. The training has been performed on a large dataset (about 43k images for five class style classification problem). To increase the quality of final model a large number of various augmentations were used: random Affine transform, crop, flip, color jitter (i.e. contrast, hue, saturation), normalization, a scheduler for the optimizer. Finally model weights were pruned which allowed increasing accuracy up to 51.5% and decreasing computation time as well.","PeriodicalId":236862,"journal":{"name":"2020 IEEE 3rd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129691259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiaoxia Ren, Z. Huo, Mengxue Zhou, Yueming Xue, M. Yu
{"title":"Implementation for Geological Environment Sub-node Intelligent Search of Geological Cloud 2.0","authors":"Xiaoxia Ren, Z. Huo, Mengxue Zhou, Yueming Xue, M. Yu","doi":"10.1109/CCET50901.2020.9213147","DOIUrl":"https://doi.org/10.1109/CCET50901.2020.9213147","url":null,"abstract":"The \"Geological Cloud 2.0\" intelligent search system is an engine for fast search of data resources and systems on the cloud. The geological environment sub-node of \"Geological Cloud 2.0\" as one of distributed sub-nodes on the cloud provides data information for intelligent search. In order to serve better the \"Geological Cloud 2.0\" intelligent search, the metadata and exchange format of the geological environment entity database was defined to construct intelligent search indexing. And the metadata content interactive push process was introduced from the geological environment sub-node entity database to \"Geological Cloud 2.0\" intelligent search system. The results show that the geological environmental sub-node search information for Geological Cloud 2.0 intelligent search is synchronized with entity database and has attention, which provides experience for the construction and upgrade of the \"Geological Cloud\" intelligent search in the future.","PeriodicalId":236862,"journal":{"name":"2020 IEEE 3rd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127256837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Service Performance Aware Scheduling Approach in Containerized Cloud","authors":"Han Li, Xinhao Wang, S. Gao, Ning Tong","doi":"10.1109/CCET50901.2020.9213084","DOIUrl":"https://doi.org/10.1109/CCET50901.2020.9213084","url":null,"abstract":"Due to the dynamic and uncertainty of users' demand for services, the resources that services depend on and the relationship between services, ensuring service performance has become a basic requirement of container cloud. There are many factors that affect service performance. Besides taking basic resources for carrying services into consideration, we also considered the delay between services caused by the relationship between services as a factor to ensure service performance, designed a container cloud dynamic monitoring framework for service performance, and proposed a service scheduling method at runtime. The design of framework can monitor service performance from two aspect of basic resources and service performance. The proposed method transforms the performance-based service scheduling problem into a planning problem that is constrained by the usage of basic resources and the delay between services. Furthermore, the proposed method generates the optimal service scheduling scheme effectively through particle swarm optimization algorithm. Compared with K8s scheduling method, the feasibility and effectiveness of this method were verified. Experimental results showed that this method could reduce the delay between services while ensuring the resource utilization and balance of the container cloud environment, so that effectively guarantee the service performance.","PeriodicalId":236862,"journal":{"name":"2020 IEEE 3rd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"63 1-4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132655359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Water Level Monitoring and Evacuation Guideline Using Ant Colony Optimization on Mobile Application","authors":"W. Kimpan, Sirawich Kasetvetin, C. Kimpan","doi":"10.1109/CCET50901.2020.9213154","DOIUrl":"https://doi.org/10.1109/CCET50901.2020.9213154","url":null,"abstract":"The most natural disasters that have happened in Thailand are storm and flood problems. The people who live near water sources have no warning about the overflowing of water nearby, so they cannot evacuate or get help in time. Thus, there is always a high risk of losing properties or lives. In order to alleviate the losses, this paper proposes water level monitoring on Android application from Internet of Things devices and the guideline for evacuation by applying Ant Colony Optimization which is inspired by the real ant colony. Internet of Things devices are used to monitor the water levels in community for the user who lives near the water sources or near the places which have high risk of flooding. The Hydrostatic level sensors are placed in the water basin near the community to measure the height of the water which can also be observed in real time from mobile application. When the height of the water reaches the critical value that was set in the application, it sends notifications to the user. Moreover, Line bot is used to let the user knows the potential risks from rising water levels. At the critical level, the user needs to evacuate to a safe place located nearby. The application will guide the user to follow the direction to the most safety destination. In case of many people are already evacuated in one place and it reached the maximum amount of limitation, the application will change the recommendation direction to other places nearby using Ant Colony Optimization algorithm for making decisions.","PeriodicalId":236862,"journal":{"name":"2020 IEEE 3rd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"54 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133531972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Network Encrypted Traffic Classification Based on Secondary Voting Enhanced Random Forest","authors":"Gaofeng Lv, Rongjia Yang, Yupeng Wang, Z. Tang","doi":"10.1109/CCET50901.2020.9213165","DOIUrl":"https://doi.org/10.1109/CCET50901.2020.9213165","url":null,"abstract":"Nowadays, traffic classification plays a significant role in network behavior analysis, network planning, network anomaly detection and network traffic model construction. Since the Internet is indubitably moving towards the era of encryption, making traffic classification more and more challenging. In this paper, a novel classification model based on random forest is proposed, and public data set named ISCX VPN-NonVPN is adopted for validation. Compared with the general random forest, the classification process is divided into two parts: two-group test and secondary voting. The accuracy of prediction can be improved by secondary voting. Results prove that our method can achieve averagely 5% higher precision than comparison methods which includes the decision tree method, KNN and general random forest.","PeriodicalId":236862,"journal":{"name":"2020 IEEE 3rd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134549934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}