Proceedings of the 4th International Conference on Advanced Information Science and System最新文献

筛选
英文 中文
Research on An Intelligent Fault Diagnosis Method for Rolling Bearing Based on Wavelet Packet and PSO-BP Network Algorithm 基于小波包和PSO-BP网络算法的滚动轴承故障智能诊断方法研究
Shengzhi Yuan, Jiayu Zhang, J. Lai, Haidi Dong
{"title":"Research on An Intelligent Fault Diagnosis Method for Rolling Bearing Based on Wavelet Packet and PSO-BP Network Algorithm","authors":"Shengzhi Yuan, Jiayu Zhang, J. Lai, Haidi Dong","doi":"10.1145/3573834.3574520","DOIUrl":"https://doi.org/10.1145/3573834.3574520","url":null,"abstract":"It was founded that the rolling bearing was the weak link of a platform equipment failure, and it was great significance to research the intelligent fault diagnosis method for the rolling bearing based on monitoring condition of platform equipment.Based on the analysis and study of vibration signals of rolling bearings,an intelligent fault diagnosis method based on wavelet packet and PSO-BP neural network algorithm was proposed in this paper.The frequency band energy features of rolling bearings in platform motor were extracted based on the wavelet packet transform, and the PSO algorithm was used to optimize BP neural network to improve the efficiency of fault pattern recognition. Through simulation it was shown that the method was universal and effective.","PeriodicalId":345434,"journal":{"name":"Proceedings of the 4th International Conference on Advanced Information Science and System","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129437597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Construction and Operation of Rural E-commerce Supply chain 农村电子商务供应链建设与运营研究
Jing Zhang
{"title":"Research on Construction and Operation of Rural E-commerce Supply chain","authors":"Jing Zhang","doi":"10.1145/3573834.3574488","DOIUrl":"https://doi.org/10.1145/3573834.3574488","url":null,"abstract":"Abstract: in the development of information environment, rural areas of e-commerce to achieve urban and rural development of integration, information, supply chain logistics needs to develop. In the era of e- commerce development, supply chain management makes the speed and scope of information sharing, the efficiency of information processing, the mass storage of information, the value of information has been significantly enhanced, especially in rural areas, the circulation system is less developed, it is more necessary to study the local circulation supply chain system and put forward feasible optimization measures. At the same time, supply chain management, as one of the integrated management methods, has been paid more and more attention, especially in the era of e-commerce development, the research on the construction of rural circulation supply chain system is not only for the realization of rural circulation modernization, but also for the promotion of rural economic development, it is of great significance to solve the problems of agriculture, rural areas and farmers in our country, and it also provides an important theoretical basis for the development of rural circulation. Based on the study of rural e-commerce ecological chain and value chain, this paper constructs the rural e-commerce supply chain system, it is of theoretical and practical value to analyze how the rural e-commerce supply chain system with e-commerce service center works more effectively.","PeriodicalId":345434,"journal":{"name":"Proceedings of the 4th International Conference on Advanced Information Science and System","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129485530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improve GAN-based Neural Vocoder using Truncated Pointwise Relativistic Least Square GAN 利用截断点相对最小二乘GAN改进基于GAN的神经声码器
Yanli Li, Congyi Wang
{"title":"Improve GAN-based Neural Vocoder using Truncated Pointwise Relativistic Least Square GAN","authors":"Yanli Li, Congyi Wang","doi":"10.1145/3573834.3574506","DOIUrl":"https://doi.org/10.1145/3573834.3574506","url":null,"abstract":"Neural vocoders are widely utilized in modern text-to-speech (TTS) and voice conversion (VC) systems due to their high generation quality and fast inference speed. Recently, GAN-based neural vocoders have attracted great interest due to their lightweight and parallel structures, which enable them to generate a high-fidelity waveform in a real-time manner. Most existing GAN-based vocoders adopt the Least Square GAN (LSGAN) training framework. In this paper, we analyze the weaknesses of the LSGAN waveform synthesis framework and, inspired by Relativistic GAN, propose a simple yet effective variant of the LSGAN framework, named Truncated Pointwise Relativistic LSGAN (T-PRLSGAN). In this method, we consider the pointwise truism score distribution of real and fake wave segments and combine the Mean Squared error (MSE) loss with the proposed truncated pointwise relative discrepancy loss to increase the difficulty of the generator to fool the discriminator, leading to improved audio generation quality and stability. To demonstrate the effectiveness and generalization ability of our method, subjective and objective experiments have been conducted based on Avocodo, UnivNet, HiFiGAN, ParallelWaveGAN, and MelGAN vocoders, which show a consistent performance boost over those typical LSGAN-based vocoders. Moreover, our T-PRLSGAN can support multiple types of discriminators, i.e. multi-scale wave discriminator(MSD), multi-period discriminator(MPD), and multi-resolution spectrogram discriminator(MRD), without modifying their architecture or inference speed.","PeriodicalId":345434,"journal":{"name":"Proceedings of the 4th International Conference on Advanced Information Science and System","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127138341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Event Recommendation Based on Heterogeneous Social Network Information and Time Information 基于异构社会网络信息和时间信息的事件推荐
Xiaofan Zhao, Wenming Ma
{"title":"Event Recommendation Based on Heterogeneous Social Network Information and Time Information","authors":"Xiaofan Zhao, Wenming Ma","doi":"10.1145/3573834.3574514","DOIUrl":"https://doi.org/10.1145/3573834.3574514","url":null,"abstract":"In recent years, event-based social networks have developed rapidly, and event recommendation has attracted more and more attention. At present, for event recommendation, it is centered on the event, and aims to help users get the events which they are interested in from a large number of events. However, compared with traditional recommendation problems, event recommendation has many challenges. First of all, there is no obvious explicit rating of users’ response to events, but implicit feedback. Secondly, the recommendation of events has heterogeneous social network relations. At the same time, most users participate in few events, which leads to a very serious data sparsity problem. In order to address these challenges and improve the effectiveness of event recommendation, this paper proposes an event recommendation model that integrates users’ online and offline heterogeneous social network information and time information. The model uses Bayesian personalized ranking as the framework to process the implicit feedback information of users and events, and simultaneously combines online and offline social network information and time information to model together to improve the accuracy of recommendation. Experimental results based on real data sets show that the performance of the proposed model is better than other methods.","PeriodicalId":345434,"journal":{"name":"Proceedings of the 4th International Conference on Advanced Information Science and System","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125317573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TRAPPER:Learning with Weak Supervision for Threat Intelligence Entity Recognition 基于弱监督的威胁情报实体识别学习
Yaru Yang, Zhi Liu, Jiaxing Song
{"title":"TRAPPER:Learning with Weak Supervision for Threat Intelligence Entity Recognition","authors":"Yaru Yang, Zhi Liu, Jiaxing Song","doi":"10.1145/3573834.3574526","DOIUrl":"https://doi.org/10.1145/3573834.3574526","url":null,"abstract":"The emergence of threat intelligence provides more foundation for tracing the source of network attacks, but it also necessitates a significant amount of manual analysis. Although data-driven automatic information extraction can effectively reduce labor consumption, it is limited by a lack of labeled data in the field of threat intelligence. To overcome this limitation, we propose TRAPPER, a threat entity recognition framework that can infer real threat entities from unlabeled threat sentences, avoiding the difficult labeling work. TRAPPER relies on label functions and three components, label aggregator, label predictor, and label expander, which guides the model with weak supervision and uses transfer knowledge as an aid. The label functions permit us to inject expert knowledge into the label aggregator to generate the inputs needed by the label predictor. It enables the label predictor to learn to recognize threat entities. The label expander combines the multi-source noisy label information with the transferred entity recognition semantic knowledge to further expand the entities. Throughout the process, the components promote each other by learning from each other. Comparative experiments on three threat intelligence-related datasets show that our method can effectively identify threat entities and achieve a maximum F1 score improvement of 6.3% over the best baseline.","PeriodicalId":345434,"journal":{"name":"Proceedings of the 4th International Conference on Advanced Information Science and System","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129196807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rearch on AI industry prediction based on Markov model 基于马尔可夫模型的人工智能产业预测研究
Lin Lu, Jian Zhang
{"title":"Rearch on AI industry prediction based on Markov model","authors":"Lin Lu, Jian Zhang","doi":"10.1145/3573834.3574473","DOIUrl":"https://doi.org/10.1145/3573834.3574473","url":null,"abstract":"Artificial intelligence has become the core driving force of a new round of industrial transformation, and scientific and accurate artificial intelligence industry development prediction is of great strategic significance for improving the quality of industrial development and future industrial chain development planning. Taking the development of artificial intelligence industry in Tianjin as an example, the future development trend of artificial intelligence industry is predicted and analyzed by the quantitative comparison and analysis of Markov linear programming mathematical model. Using variable substitution method, the quadratic programming model is transformed into a linear programming model, which not only has mature solution software, but also can be solved analytically, which is more convenient and reliable. The Markov property programming model reduces the time, simplifies the complexity, reduces the difficulty of model solving, and the prediction accuracy value is high, with the average error value accounting for 2.96%, 2.07%, and 5.03%. Finally, combined with the artificial intelligence refinement industry, the countermeasures to cultivate and accelerate the development of artificial intelligence industry in Tianjin are discussed from three levels: basic industry support, technology industry innovation and application industry expansion.","PeriodicalId":345434,"journal":{"name":"Proceedings of the 4th International Conference on Advanced Information Science and System","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117175049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trip Itinerary Generation with 2-Opt Algorithm 基于2-Opt算法的行程生成
Omar Challaf, Sook-Ling Chua, Lee Kien Foo
{"title":"Trip Itinerary Generation with 2-Opt Algorithm","authors":"Omar Challaf, Sook-Ling Chua, Lee Kien Foo","doi":"10.1145/3573834.3573907","DOIUrl":"https://doi.org/10.1145/3573834.3573907","url":null,"abstract":"Advances in digital technologies and communications are impacting how people travel. However, there are still lacking of personalised digital-based tools to support people in trip planning. Although there are a number of widely used trip planner applications, these applications may not be effective in generating trip itinerary as they do not take into account of user trip preferences and the total travel time to spend. In this paper, we proposed a heuristic search algorithm based on 2-opt to generate trip itinerary. A proof of concept mobile application for trip planning is developed to demonstrate the validity of our method.","PeriodicalId":345434,"journal":{"name":"Proceedings of the 4th International Conference on Advanced Information Science and System","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132510735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
HIL-DDoS: A DDoS Attack Simulation System Based on Hardware-In-the-Loop 基于硬件在环的DDoS攻击仿真系统
Leigang Sun, Jin Zhang
{"title":"HIL-DDoS: A DDoS Attack Simulation System Based on Hardware-In-the-Loop","authors":"Leigang Sun, Jin Zhang","doi":"10.1145/3573834.3574530","DOIUrl":"https://doi.org/10.1145/3573834.3574530","url":null,"abstract":"Aiming at the authenticity and credibility of DDoS attacks in the current network simulation environment, a Hardware-In-the-Loop DDoS attack simulation system is proposed, the key problems such as virtual-real conversion interface, routing control and congestion control strategy in the process of system construction are solved. Simulation results show that the HIL-DDoS attack simulation system effectively improves the authenticity and credibility of DDoS attack simulation, and can provide a useful reference for network security simulation research.","PeriodicalId":345434,"journal":{"name":"Proceedings of the 4th International Conference on Advanced Information Science and System","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132251583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Capsule Network with Inception Structure for Image Classification 基于初始结构的胶囊网络图像分类
Chen Zhao
{"title":"Capsule Network with Inception Structure for Image Classification","authors":"Chen Zhao","doi":"10.1145/3573834.3574507","DOIUrl":"https://doi.org/10.1145/3573834.3574507","url":null,"abstract":"Convolutional Neural Networks (CNNs) are popular in deep learning, especially in computer vision. But CNNs are poor at extracting spatial information, such as position and direction of entities in an image. A recently proposed model called Capsule network could effectively learn the spatial relations among entities, but it has weak feature extraction ability. The inception structure could extract multi-scale features. So this paper modifies the inception-v1 structure and adds it into Capsule network to strengthen the feature extraction ability. In the modified inception-v1, the max pooling branch is removed to reduce the loss of feature information. And Batch Normalization (BN) layer is added after each convolution to accelerate convergence and reduce over fitting. To organize categories information, a fully connected layer is added after digit Capsules. This paper conducted experiment on two public datasets, and the results show that the proposed model outperforms the original model in accuracy.","PeriodicalId":345434,"journal":{"name":"Proceedings of the 4th International Conference on Advanced Information Science and System","volume":"363 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134428948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Gushing Resolvers: Measuring Open Resolvers’ Recursive Behavior 喷涌解析器:测量开放解析器的递归行为
Chengxi Xu, Yunyi Zhang, Fan Shi, Huimin Ma, Wanmeng Ding, Hong Shan
{"title":"Gushing Resolvers: Measuring Open Resolvers’ Recursive Behavior","authors":"Chengxi Xu, Yunyi Zhang, Fan Shi, Huimin Ma, Wanmeng Ding, Hong Shan","doi":"10.1145/3573834.3574533","DOIUrl":"https://doi.org/10.1145/3573834.3574533","url":null,"abstract":"Open resolvers can be easily exploited by malicious actors to launch DDoS attacks against important services on the Internet, which has aroused much concern in the Internet community. Researchers have studied extensively the population, structure, and malicious behavior of open resolvers, while little has been done to reveal how open resolvers respond to non-recursion queries. In this paper, we conduct an Internet-wide measurement on the recursive behavior of open resolvers. We discover that more than 1 million gushing resolvers in the wild are more enthusiastic than needed to respond to non-recursive queries, either triggering a new recursive resolution process or replying with cached records. Furthermore, we discuss possible security implications posed by the massive gushing resolvers. Specifically, we show that gushing resolvers are prone to be targets of ranking manipulation attacks if they happen to be the data collection points of top lists. At last, we put forward suggestions for resolver operators to improve such a situation.","PeriodicalId":345434,"journal":{"name":"Proceedings of the 4th International Conference on Advanced Information Science and System","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127912276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信