{"title":"Deep time series missing data from self-attention-based inference model","authors":"Ziyu Li, Weibang Li, Xianyun Wen, Qingxi Lai","doi":"10.1109/ISCTIS58954.2023.10213141","DOIUrl":"https://doi.org/10.1109/ISCTIS58954.2023.10213141","url":null,"abstract":"This study suggests a deep time series missing data inference model based on self-attention, known as AGRU-AE, to fill in the missing data in order to address the issue that data loss influences the impact of data analysis. In order to deal with various missing gaps and achieve the goal of concentrating on highly correlated sequences, the model combines a gated cyclic data unit (GRU) and an autoencoder (AE), adds a self-attention mechanism between the encoder and the decoder, and calculates the relationship weight between the partially generated sequence in the encoder and the partially known sequence in the decoder. The experimental findings demonstrate that the suggested model AGRU-AE, when compared to the conventional approach, can fill and predict the incomplete time series with more accuracy.","PeriodicalId":334790,"journal":{"name":"2023 3rd International Symposium on Computer Technology and Information Science (ISCTIS)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129735012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Named Entity Recognition Method Combining Keyword and Self attention Mechanism","authors":"Qinwu Wang, Huifang Su, Yongwei Wang, Pengcheng Liu, Yifei Wang, Shengnan Zhou","doi":"10.1109/ISCTIS58954.2023.10213054","DOIUrl":"https://doi.org/10.1109/ISCTIS58954.2023.10213054","url":null,"abstract":"As the basis of natural language processing tasks such as information extraction and machine question answering, named entity recognition has important research significance. However, traditional models have less consideration for utilizing the feature information of the text. To address this issue, this paper proposes a named entity recognition model that integrates keyword and self attention mechanism based on the HBT model.The model has made two improvements from the perspective of enhancing the utilization of text's own feature information: one is to introduce keyword feature vectors, and the other is to use multi head self attention mechanism for encoding layer vectors. The experimental results show that the improved model achieves an F1 value of 70.74% on the DuIE2.0 dataset, which is significantly improved compared to the benchmark model.","PeriodicalId":334790,"journal":{"name":"2023 3rd International Symposium on Computer Technology and Information Science (ISCTIS)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128484376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Implementation of SM4 Coprocessor Based on RISC-V","authors":"Shangshou Wang, Lei Wang, Huaili Guo, Zheng Wang","doi":"10.1109/ISCTIS58954.2023.10213118","DOIUrl":"https://doi.org/10.1109/ISCTIS58954.2023.10213118","url":null,"abstract":"A co-processor with SM4 algorithm is designed for information security hazards and the application of RISC-V processor and SM4 algorithm in the security field. The co-processor is designed with a cyclic iterative structure to save resources, while four extension instructions are customized and embedded in the C program using inline assembly to facilitate calls, and the SM4 algorithm is accelerated by hardware and software co-design with independent memory access channels. Finally, the co-processor is described and simulated at the behavioral level by hardware description language, and the co-processor-equipped Hummingbird E203 is deployed on AX7103 FPGA development board for synthesis and analysis. The comprehensive results show that the overall number of encryption and decryption instructions of the SM4 algorithm is reduced by 99.84% and the number of cycles is reduced by 99.62% after adopting the coprocessor, and the proposed design scheme can significantly improve the computing efficiency of the SM4 algorithm.","PeriodicalId":334790,"journal":{"name":"2023 3rd International Symposium on Computer Technology and Information Science (ISCTIS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116522978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fuzzy ISM Application for Designing the Logical Structure of the High-speed Railway Intelligent Dispatching System","authors":"Liu Yang, P. Li, Sai Shao","doi":"10.1109/ISCTIS58954.2023.10213167","DOIUrl":"https://doi.org/10.1109/ISCTIS58954.2023.10213167","url":null,"abstract":"The effective operation of intelligent dispatching system for high-speed railway (HSR) can reduce the heavy task pressure of dispatchers, thus improving the level of railway transportation organization. Since the railway intelligent dispatching system covers dispatching jobs such as driving, planning, locomotive, freight transport, passenger transport, motor train, construction and maintenance, it is necessary to fully consider their correlation when designing the logical structure of the railway intelligent dispatching system. In this paper, the main basic functions and database of railway intelligent dispatching system are extracted from Data Flow Diagram (DFD), and the logical structure of the system is clustered by using fuzzy Interpretive Structure Model (fuzzy ISM) method. After that, the basic functions are further divided, which can reduce the complexity of system design, the difficulty of system development and the running cost, and improve the system efficiency.","PeriodicalId":334790,"journal":{"name":"2023 3rd International Symposium on Computer Technology and Information Science (ISCTIS)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127248454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Iterative Refinement via Adaptive Subproblem Generation Algorithm (ASGA) for Anytime Multi-Agent Path Finding","authors":"Mengtian Li, Yingcen Xiang, Fanying Zhou, Chengshuo Zhai","doi":"10.1109/ISCTIS58954.2023.10213139","DOIUrl":"https://doi.org/10.1109/ISCTIS58954.2023.10213139","url":null,"abstract":"Multi-Agent Path Finding (MAPF) is the problem of finding a set of conflict-free paths from a starting location to a goal for multiple agents. Since MAPF is NP-hard, the optimal algorithm takes a long time to solve and is severely limited by the scale of the problem. The suboptimal algorithm is faster, but usually finds a low-quality solution. It is a feasible solution to use the suboptimal algorithm to quickly obtain the initial solution, and then iteratively refine the sub-problem. The key is how to select the agent subset. There are still many limitations in the current research on MAPF iterative refinement and subset selection rules. In view of the deficiencies of the existing MAPF iterative refinement scheme, this paper proposes corresponding improvement schemes:1) An adaptive sub-problem generation algorithm (ASGA) is proposed, which improves the defects of each member rule and eliminates the disadvantages of contingency and insufficiency in the combination rules of fixed order. 2) A global supervision mechanism (GSM) is proposed to solve the problem of repeated inspection of the same agent, which leads to the failure of sub-problem generation and misjudgment of the performance of the rules. 3) Using the ASGA algorithm, an anytime MAPF iterative refinement framework is proposed. Experimental results show that our algorithm outperforms other similar algorithms in refinement efficiency, solution quality improvement and scalability.","PeriodicalId":334790,"journal":{"name":"2023 3rd International Symposium on Computer Technology and Information Science (ISCTIS)","volume":"539 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127954899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research and Implementation of UAV Partial Discharge Detection Technology Based on Acoustic Array","authors":"Zhezhou Li, Zhuolei Chen, Wenbin Wu, Bojian Chen, Tengfei Han, Renshu Wang","doi":"10.1109/ISCTIS58954.2023.10213181","DOIUrl":"https://doi.org/10.1109/ISCTIS58954.2023.10213181","url":null,"abstract":"With the increasing number of transmission line towers, traditional partial discharge detection methods cannot meet the needs of fast and accurate inspection. Infrared detection methods cannot identify early defects with not clear temperature rise, and ultraviolet detection methods are expensive and have high false alarms. Therefore, this article proposes to use UAV equipped with acoustic array to achieve rapid and accurate large-scale partial discharge defect inspection. The main contributions of this article are as follows: 1. Analyzing the noise characteristics of UAV. 2. Filter out noise from both hardware and software levels. 3. Studying Sound source localization algorithm. 4. Integrating the above results and developing a set of partial discharge detection device suitable for DJI M300 UAV. In order to verify our results, we conducted on-site testing on a 10kV transmission line, and the results showed that the development results can identify and accurately locate partial discharge defects on the tower, which can not be verified from infrared camera.","PeriodicalId":334790,"journal":{"name":"2023 3rd International Symposium on Computer Technology and Information Science (ISCTIS)","volume":"97 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128001964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lina Li, G. Liu, Qinghe Yu, Cheng Luo, XinHang Li, Nianfeng Li
{"title":"Adaptive Propagation Model of Network Hotspot Events Based on SEIR","authors":"Lina Li, G. Liu, Qinghe Yu, Cheng Luo, XinHang Li, Nianfeng Li","doi":"10.1109/ISCTIS58954.2023.10213158","DOIUrl":"https://doi.org/10.1109/ISCTIS58954.2023.10213158","url":null,"abstract":"Internet hotspot events spread quickly and have a significant influence on the Internet, becoming the focus of monitoring public opinion. Due to the gradual fermentation of these events, the scope of transmission, the number of participants, and the event's influence constantly change. Therefore, a propagation model with fixed parameters cannot accurately describe the propagation law of hotspot events. To address these issues, this paper proposes an adaptive SEIR propagation model, called SEIR-A, which incorporates a dynamic infection rate. This model enhances the traditional SEIR model by considering susceptible, latent, infected, and cured individuals. Furthermore, it combines the model with the data assimilation method to capture the trend of hot topics. Experimental testing demonstrates that the model effectively describes the propagation trend of four network hotspot events from Weibo, thus proving its accuracy and applicability.","PeriodicalId":334790,"journal":{"name":"2023 3rd International Symposium on Computer Technology and Information Science (ISCTIS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128948432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Meta-Reinforcement Learning-based Vehicle Task Offloading in Internet of Vehicles (IoV)","authors":"Liyuan Wei, Yang Yang, Xiaogao Jia, Caixing Shao","doi":"10.1109/ISCTIS58954.2023.10213055","DOIUrl":"https://doi.org/10.1109/ISCTIS58954.2023.10213055","url":null,"abstract":"With the advent of the 5G era, the Internet of Things (IoT) has been rapidly developing. As a crucial component of the IoT, the Internet of Vehicles (IoV) faces a significant amount of computational tasks. However, the limited computing capability of individual vehicles alone is insufficient to handle these tasks. Therefore, it becomes necessary to offload some of the computational tasks to edge computing services. In this paper, vehicles in IoV are used as the research object, and the edge computing servers deployed at the roadside constitute the IoV edge computing offload network. We propose the Meta-Reinforcement Learning-based Vehicle Task Offloading (MRLVTO) algorithm, aiming to optimize the computational latency of the tasks. Our proposed algorithm demonstrates significant improvement in reducing latency compared to other offloading algorithms.","PeriodicalId":334790,"journal":{"name":"2023 3rd International Symposium on Computer Technology and Information Science (ISCTIS)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127406129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Nimsuk, Nichakorn Thumpaiboon, Wilasinee Phuangsri
{"title":"Offline Handwriting Recognition of Thai Characters Using Multiple Deep Neural Networks","authors":"N. Nimsuk, Nichakorn Thumpaiboon, Wilasinee Phuangsri","doi":"10.1109/ISCTIS58954.2023.10213205","DOIUrl":"https://doi.org/10.1109/ISCTIS58954.2023.10213205","url":null,"abstract":"Handwritten character recognition is a challenge task in many languages. However, languages have their own characteristics. In Thai language, although it is always written from left to right in horizontal direction, the character alignment can be up to four levels in a vertical direction, which is different from several languages such as Chinese, English, Japanese, etc. This work proposed a method for offline handwritten recognition in Thai language based on transfer learning. In this work, we used VGGNet-16 as a pretrained network. The system contains two separate networks for recognizing the characters at base level and the remaining levels which are segmented from a word. Although the character spacing in a word still must be kept enough due to the problems of the segmentation of overlapping characters and the ambiguity of some combinations of adjacent characters in Thai scripts. The proposed method performed quite high accuracies in Thai handwritten recognition.","PeriodicalId":334790,"journal":{"name":"2023 3rd International Symposium on Computer Technology and Information Science (ISCTIS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130764538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Generating Talking Facial Videos Driven by Speech Using 3D Model and Motion Model","authors":"Fei Pan, Dejun Wang, Zonghua Hu, LongYang Yu","doi":"10.1109/ISCTIS58954.2023.10213134","DOIUrl":"https://doi.org/10.1109/ISCTIS58954.2023.10213134","url":null,"abstract":"Facial expression is one of the most important features of a face. In previous works on generating talking facial videos driven by speech without additional driving information, existing models struggled to directly learn the mapping from speech to facial features, resulting in poor quality of generated facial expressions. In this paper, we propose a method for generating speech-driven facial videos using 3D models and motion capture. This method demonstrates good performance in terms of model robustness, adaptation to large head poses, and improvement of fine-grained facial expression details. We learn features from speech, reconstruct the face by fitting 3DMM coefficients using speech, and employ a motion-captured based generative adversarial network to ensure clear facial texture details in the generated faces. On the publicly available dataset VoxCeleb2, our method achieves scores of 31.22 in PSNR, 0.89 in SSIM, 19.4 in FID, and 1.96 in F_LMD, outperforming other methods. On the MEAD dataset, our method achieves scores of 30.65 in PSNR, 0.68 in SSIM, 20.5 in FID, 2.36 in SyncNet, and 2.45 in F_LMD, outperforming other methods. Experimental results demonstrate that our method effectively enhances the model robustness for speech-driven facial video generation without additional driving information.","PeriodicalId":334790,"journal":{"name":"2023 3rd International Symposium on Computer Technology and Information Science (ISCTIS)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116677239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}