2020 IEEE 3rd International Conference on Computer and Communication Engineering Technology (CCET)最新文献

筛选
英文 中文
Mobile Handheld Devices and Embedded in Things Picking System 移动手持设备和嵌入式物品拾取系统
Yuan Haixia, F. Yifan, Qin Xinjing, Huang Guokai
{"title":"Mobile Handheld Devices and Embedded in Things Picking System","authors":"Yuan Haixia, F. Yifan, Qin Xinjing, Huang Guokai","doi":"10.1109/CCET50901.2020.9213136","DOIUrl":"https://doi.org/10.1109/CCET50901.2020.9213136","url":null,"abstract":"Aiming at the detection standards and operation methods of the logistics sorting system, a handheld laser scanner is used to measure the size of the item and the barcode is recognized. Based on the reference and reference similar standards, through a large number of experimental comparisons, a new mobile handheld Equipment and embedded logistics and assembly line sorting system detection standards and operation methods (including logistics transportation modules and logistics sorting modules) fill the gap in this project in China, making the factory assembly line process and logistics sorting process fully optimized , Workers and couriers work more conveniently, and also greatly reduce the man-made damage that occurs during the transportation of goods and products.","PeriodicalId":236862,"journal":{"name":"2020 IEEE 3rd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131761042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Learning in Face Synthesis: A Survey on Deepfakes 人脸合成中的深度学习:深度造假研究综述
Teng Zhang, Lirui Deng, L. Zhang, Xianglei Dang
{"title":"Deep Learning in Face Synthesis: A Survey on Deepfakes","authors":"Teng Zhang, Lirui Deng, L. Zhang, Xianglei Dang","doi":"10.1109/CCET50901.2020.9213159","DOIUrl":"https://doi.org/10.1109/CCET50901.2020.9213159","url":null,"abstract":"Deepfake stemming from the combined words of \"deep learning\" and \"fake\", refers to a type of fake images and video generation technology based on artificial intelligence. In recent years, with the continuous development of deep learning, especially auto-encoders and generative adversarial networks, deepfake has made tremendous progress, resulting in the emergence of some easy-to-use application software in the market, reducing the application difficulty of face-synthesis technology. This paper provides a thorough review of deepfake, introducing its development in the past three years.","PeriodicalId":236862,"journal":{"name":"2020 IEEE 3rd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"331 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133569582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Video-Based Traffic Flow Monitoring Algorithm 基于视频的交通流量监控算法
Yongmei Zhang, Jiarui Zhao, Ying Xiang, Jie Shu
{"title":"Video-Based Traffic Flow Monitoring Algorithm","authors":"Yongmei Zhang, Jiarui Zhao, Ying Xiang, Jie Shu","doi":"10.1109/CCET50901.2020.9213115","DOIUrl":"https://doi.org/10.1109/CCET50901.2020.9213115","url":null,"abstract":"Intelligent traffic is the main trend of urban development at present. In view of the increasing number of vehicles and traffic congestion, this paper presents a video-based traffic flow monitoring algorithm. The proposed algorithm extracts the vehicles using characteristics of the video, detects the moving vehicles and the non-motor vehicles by the pixel sizes and positions. According to the results of vehicle detection, the number of vehicles is analyzed, speed is calculated by moving distance, and combined with traffic flow to judge current road conditions are smooth, general, or congested. This algorithm adopts the three-frame difference method to detect moving vehicles to ensure the real-time performance of the algorithm and displays the number of vehicles, speed information, the number of vehicles per lane in a direct visual way, and vehicles entering the region of interest can be identified. The experiment results show the proposed algorithm can judge the current traffic situations in real-time based on video, and vehicle detection is more accurate.","PeriodicalId":236862,"journal":{"name":"2020 IEEE 3rd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134003227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Emerging Intention Mining Inspired by Semantic Reconstruction 基于语义重构的新兴意图挖掘
Jiahui Shen, Ji Xiang, Lin Zhao, Lei Wang
{"title":"Emerging Intention Mining Inspired by Semantic Reconstruction","authors":"Jiahui Shen, Ji Xiang, Lin Zhao, Lei Wang","doi":"10.1109/CCET50901.2020.9213133","DOIUrl":"https://doi.org/10.1109/CCET50901.2020.9213133","url":null,"abstract":"Emerging intention mining is the process of identifying the inputs that differ in some respect from the training samples. With the development of artificial intelligence, more and more attention has been paid to data mining. Therefore, methods which can efficiently identify the emerging intentions are needed. However, due to the lack of data for emerging intention, training an end-to-end deep network is a cumbersome task. In this paper, we propose an end-to-end architecture for emerging intention mining which inspired by the success of generative adversarial networks and conditional variational autoencoder (CVAE). Our architecture tries understand the underlying concept of the inputs and then reconstruct them through semantic information. There are two deep networks by Convolutional Neural Networks (CNN). One network works as the semantic information extraction and the other works as the novelty detector. The first network supports the second by enhancing the inlier samples and distorting the outliers. The proposed framework applies to different datasets. The results illustrate that our proposed method learns the target class effectively and is superior to the baseline and state-of-the-art methods.","PeriodicalId":236862,"journal":{"name":"2020 IEEE 3rd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123593717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multiuser Multicarrier Chaotic Differential Communication System Based on Cooperative Model 基于协作模型的多用户多载波混沌差分通信系统
Gong-quan Zhang, Xiao-Hui Li, Xiaoting Chen
{"title":"Multiuser Multicarrier Chaotic Differential Communication System Based on Cooperative Model","authors":"Gong-quan Zhang, Xiao-Hui Li, Xiaoting Chen","doi":"10.1109/CCET50901.2020.9213137","DOIUrl":"https://doi.org/10.1109/CCET50901.2020.9213137","url":null,"abstract":"To improve the antifading and inter-code interference ability of the noncoherent chaotic communication system, a multiuser multicarrier chaotic differential communication system based on a cooperative model is proposed. A single relay of the decode-and-forward type is investigated according to the conventional cooperation protocol. Independent three path Rayleigh channels are considered, and the bit error rate and outage probability are derived and verified via simulations. Numerical and Monte Carlo simulations show that the proposed model can effectively deter fading and inter-code interference effectively.","PeriodicalId":236862,"journal":{"name":"2020 IEEE 3rd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122633998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Painting Style Classification Using Deep Neural Networks 使用深度神经网络的绘画风格分类
V. Kovalev, A. G. Shishkin
{"title":"Painting Style Classification Using Deep Neural Networks","authors":"V. Kovalev, A. G. Shishkin","doi":"10.1109/CCET50901.2020.9213161","DOIUrl":"https://doi.org/10.1109/CCET50901.2020.9213161","url":null,"abstract":"In this paper we describe the problem of painting style classification into five classes: impressionism, realism, expressionism, post-impressionism and romanticism. While most previous approaches relied on image processing and manual feature extraction from painting images, our model based on the ResNet architecture and pre-trained on the ImageNet dataset operates on the raw pixel level. The training has been performed on a large dataset (about 43k images for five class style classification problem). To increase the quality of final model a large number of various augmentations were used: random Affine transform, crop, flip, color jitter (i.e. contrast, hue, saturation), normalization, a scheduler for the optimizer. Finally model weights were pruned which allowed increasing accuracy up to 51.5% and decreasing computation time as well.","PeriodicalId":236862,"journal":{"name":"2020 IEEE 3rd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129691259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Implementation for Geological Environment Sub-node Intelligent Search of Geological Cloud 2.0 地质云2.0地质环境子节点智能搜索的实现
Xiaoxia Ren, Z. Huo, Mengxue Zhou, Yueming Xue, M. Yu
{"title":"Implementation for Geological Environment Sub-node Intelligent Search of Geological Cloud 2.0","authors":"Xiaoxia Ren, Z. Huo, Mengxue Zhou, Yueming Xue, M. Yu","doi":"10.1109/CCET50901.2020.9213147","DOIUrl":"https://doi.org/10.1109/CCET50901.2020.9213147","url":null,"abstract":"The \"Geological Cloud 2.0\" intelligent search system is an engine for fast search of data resources and systems on the cloud. The geological environment sub-node of \"Geological Cloud 2.0\" as one of distributed sub-nodes on the cloud provides data information for intelligent search. In order to serve better the \"Geological Cloud 2.0\" intelligent search, the metadata and exchange format of the geological environment entity database was defined to construct intelligent search indexing. And the metadata content interactive push process was introduced from the geological environment sub-node entity database to \"Geological Cloud 2.0\" intelligent search system. The results show that the geological environmental sub-node search information for Geological Cloud 2.0 intelligent search is synchronized with entity database and has attention, which provides experience for the construction and upgrade of the \"Geological Cloud\" intelligent search in the future.","PeriodicalId":236862,"journal":{"name":"2020 IEEE 3rd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127256837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Service Performance Aware Scheduling Approach in Containerized Cloud 容器云中服务性能感知调度方法
Han Li, Xinhao Wang, S. Gao, Ning Tong
{"title":"A Service Performance Aware Scheduling Approach in Containerized Cloud","authors":"Han Li, Xinhao Wang, S. Gao, Ning Tong","doi":"10.1109/CCET50901.2020.9213084","DOIUrl":"https://doi.org/10.1109/CCET50901.2020.9213084","url":null,"abstract":"Due to the dynamic and uncertainty of users' demand for services, the resources that services depend on and the relationship between services, ensuring service performance has become a basic requirement of container cloud. There are many factors that affect service performance. Besides taking basic resources for carrying services into consideration, we also considered the delay between services caused by the relationship between services as a factor to ensure service performance, designed a container cloud dynamic monitoring framework for service performance, and proposed a service scheduling method at runtime. The design of framework can monitor service performance from two aspect of basic resources and service performance. The proposed method transforms the performance-based service scheduling problem into a planning problem that is constrained by the usage of basic resources and the delay between services. Furthermore, the proposed method generates the optimal service scheduling scheme effectively through particle swarm optimization algorithm. Compared with K8s scheduling method, the feasibility and effectiveness of this method were verified. Experimental results showed that this method could reduce the delay between services while ensuring the resource utilization and balance of the container cloud environment, so that effectively guarantee the service performance.","PeriodicalId":236862,"journal":{"name":"2020 IEEE 3rd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"63 1-4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132655359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Water Level Monitoring and Evacuation Guideline Using Ant Colony Optimization on Mobile Application 移动应用中基于蚁群优化的水位监测与疏散指南
W. Kimpan, Sirawich Kasetvetin, C. Kimpan
{"title":"Water Level Monitoring and Evacuation Guideline Using Ant Colony Optimization on Mobile Application","authors":"W. Kimpan, Sirawich Kasetvetin, C. Kimpan","doi":"10.1109/CCET50901.2020.9213154","DOIUrl":"https://doi.org/10.1109/CCET50901.2020.9213154","url":null,"abstract":"The most natural disasters that have happened in Thailand are storm and flood problems. The people who live near water sources have no warning about the overflowing of water nearby, so they cannot evacuate or get help in time. Thus, there is always a high risk of losing properties or lives. In order to alleviate the losses, this paper proposes water level monitoring on Android application from Internet of Things devices and the guideline for evacuation by applying Ant Colony Optimization which is inspired by the real ant colony. Internet of Things devices are used to monitor the water levels in community for the user who lives near the water sources or near the places which have high risk of flooding. The Hydrostatic level sensors are placed in the water basin near the community to measure the height of the water which can also be observed in real time from mobile application. When the height of the water reaches the critical value that was set in the application, it sends notifications to the user. Moreover, Line bot is used to let the user knows the potential risks from rising water levels. At the critical level, the user needs to evacuate to a safe place located nearby. The application will guide the user to follow the direction to the most safety destination. In case of many people are already evacuated in one place and it reached the maximum amount of limitation, the application will change the recommendation direction to other places nearby using Ant Colony Optimization algorithm for making decisions.","PeriodicalId":236862,"journal":{"name":"2020 IEEE 3rd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"54 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133531972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network Encrypted Traffic Classification Based on Secondary Voting Enhanced Random Forest 基于二次投票增强随机森林的网络加密流量分类
Gaofeng Lv, Rongjia Yang, Yupeng Wang, Z. Tang
{"title":"Network Encrypted Traffic Classification Based on Secondary Voting Enhanced Random Forest","authors":"Gaofeng Lv, Rongjia Yang, Yupeng Wang, Z. Tang","doi":"10.1109/CCET50901.2020.9213165","DOIUrl":"https://doi.org/10.1109/CCET50901.2020.9213165","url":null,"abstract":"Nowadays, traffic classification plays a significant role in network behavior analysis, network planning, network anomaly detection and network traffic model construction. Since the Internet is indubitably moving towards the era of encryption, making traffic classification more and more challenging. In this paper, a novel classification model based on random forest is proposed, and public data set named ISCX VPN-NonVPN is adopted for validation. Compared with the general random forest, the classification process is divided into two parts: two-group test and secondary voting. The accuracy of prediction can be improved by secondary voting. Results prove that our method can achieve averagely 5% higher precision than comparison methods which includes the decision tree method, KNN and general random forest.","PeriodicalId":236862,"journal":{"name":"2020 IEEE 3rd International Conference on Computer and Communication Engineering Technology (CCET)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134549934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信