{"title":"Autonomous driving based on deep neural network","authors":"Zhuo Cheng","doi":"10.1117/12.2668350","DOIUrl":"https://doi.org/10.1117/12.2668350","url":null,"abstract":"Deep learning, the critical part of machine learning, has become influential in different fields, including natural language processing, computational biology, and computer vision. In the last decade, there has been a massive surge in computer vision research since its related application is so promising. Many have proposed various methods to fulfill the automation of driving based on deep learning, but, up until now, there is still a gap between the virtual and reality. This paper focuses on its application in autonomous driving. A new framework is proposed to fill that gap using a deep neural network. Specifically, instead of using the raw images captured by cameras to make decisions, semantic segmentation is applied first to get intermediate products that can better connect virtual and reality. Considering the road landscape needs to be mainly treated, the pre-trained model PSPNet is used to process the original image data. Then this data is provided as input to a deep CNN model for feature extraction and prediction. Compared to the traditional method, a semantic segmentation process is added to help extract useful information within an image and is expected to bring some positive effects.","PeriodicalId":345723,"journal":{"name":"Fifth International Conference on Computer Information Science and Artificial Intelligence","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123866573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adversarial attacks on cross-resolution person re-identification","authors":"Zhikang Song","doi":"10.1117/12.2667907","DOIUrl":"https://doi.org/10.1117/12.2667907","url":null,"abstract":"Person Re-Identification (re-ID) is a task that involves matching individuals captured by various cameras and in various poses. And because of the uncertainty of input image resolution in practice, traditional Person Re-Identification tends to have poor performance. Cross-Resolution Person re-ID is a hot branch of Person re-ID that aims to address the image with a different resolution. Besides, Person re-ID has been applied in lots of fields because of its practicality, including public security systems. Therefore, this poses a challenge to the security of the re-ID model. This paper discusses the results of attacks on PS-HRNet, VGG16, and ResNet networks using the Fast Gradient Sign Method. The experiment result of this paper proves the effectiveness of the Fast Gradient Sign Method on Cross-Resolution Person Re-Identification. It tests the transferable of the adversarial samples generated by the Fast Gradient Sign Method.","PeriodicalId":345723,"journal":{"name":"Fifth International Conference on Computer Information Science and Artificial Intelligence","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127755981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A hybrid optimized multi-population flower pollination algorithm for web service composition problem","authors":"Danni Lv, Lijuan Zhou, Ning Luo","doi":"10.1117/12.2667493","DOIUrl":"https://doi.org/10.1117/12.2667493","url":null,"abstract":"With the rapid development of Service-Oriented Computing (SOC), Web services have become the preferred technology for realizing Service-oriented computing problems and other related goals. How to find a cheap and high-quality Web service composition from a large number of Web services that provide the same function, that is, the research based on Quality of Service (QoS) is the most important problem in the Web service composition optimization model, which is also very important to improve the efficiency of the service composition. In this work, we use the intelligence optimization algorithms to search for the best combination of web services to achieve the functionality of the workflow’s tasks. And we propose a novel approach, called A Hybrid Optimized Multi-Population Flower Pollination Algorithm (AHOMFPA) to solve this problem. Empirical comparisons demonstrate AHOMFPA has advantages over other existing algorithms in efficiency and feasibility.","PeriodicalId":345723,"journal":{"name":"Fifth International Conference on Computer Information Science and Artificial Intelligence","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127834416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent classification and identification of radar jamming signals","authors":"Dongxia Li, Yahui Shi, Yangdong Sun, Bin Zhang","doi":"10.1117/12.2667248","DOIUrl":"https://doi.org/10.1117/12.2667248","url":null,"abstract":"Aiming at the problem of intelligent classification and recognition of radar jamming signals, the convolutional neural network structure is studied. By optimizing the basic network, the normalization layer and activation layer is added to the LENET-5 structure to improve the accuracy of recognition results. The linear frequency modulation signal and amplitude modulation interference, frequency modulation interference, comb spectrum interference, slice reconstruction interference, intermittent sampling and forwarding interference are analyzed. Six signal models are used to generate data sets, and intelligent methods are adopted to realize classification and recognition.","PeriodicalId":345723,"journal":{"name":"Fifth International Conference on Computer Information Science and Artificial Intelligence","volume":"12566 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128971543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dialog history management for end-to-end task-oriented dialog systems","authors":"Shijia Nie, Guanjun Li, Xuesong Zhang, Dawei Zhang, Jianhua Tao, Zhao Lv","doi":"10.1117/12.2667733","DOIUrl":"https://doi.org/10.1117/12.2667733","url":null,"abstract":"End-to-end task-oriented dialogue systems rely heavily on an understanding of the dialog history. This often faces the challenge of inferring which dialog history information is critical to generating responses. In this paper, we address this challenge by leveraging a dialog history manager component that dynamically focuses on dialog history memory. It performs multiple add and forget operations by fusing an enhanced entity representation of dialog history and Knowledge Base (KB) information as queries, remembering entities relevant to responses and filtering out unimportant information. Experimental results on an open task-oriented dialogue dataset show that our model outperforms the baseline system in terms of effectiveness and produces contextually consistent responses.","PeriodicalId":345723,"journal":{"name":"Fifth International Conference on Computer Information Science and Artificial Intelligence","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128528134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study for CT to MRI translation based on cycle-GAN and UNet-GAN","authors":"Y. Lai","doi":"10.1117/12.2668052","DOIUrl":"https://doi.org/10.1117/12.2668052","url":null,"abstract":"MRI and CT are both important medical imaging modalities, but MRI and CT imaging are done in different ways, each with its own advantages and disadvantages. Obtaining both images at the same time can help physicians make better decisions about treatment options. However, due to various limitations, some patients can only obtain one type of image. Therefore, it is necessary to find a well-performing GAN to transform MRI and CT images. In this paper, the effect of Cycle-GAN with different activation functions is compared, such as LeakyRELU, and different number of layers in MRI-CT conversion. Also, this article compares the effects of Cycle-GAN and UNet-GAN. The results indicate that the Cycle-GAN model using LeakyRELU as the activation function is better than the Cycle-GAN model using RELU as the activation function. Second, the effect of deepening the layers of the GAN model is worse than that of the base model. And the effect of UNet-GAN is similar to that of Cycle-GAN. This is not quite as expected, because Cycle-GAN has one more discriminator than UNet-GAN, and the effect should be better. But the experimental results do not confirm this conclusion.","PeriodicalId":345723,"journal":{"name":"Fifth International Conference on Computer Information Science and Artificial Intelligence","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117067233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Classic Augmentation based Classifier Generative Adversarial Network (CACGAN) for COVID-19 diagnosis","authors":"Haodong Li","doi":"10.1117/12.2668115","DOIUrl":"https://doi.org/10.1117/12.2668115","url":null,"abstract":"Computer-aided diagnosis of COVID-19 from lung medical images has received increasing attention in previous clinical practice and research. However, developing such automatic model is usually challenging due to the requirement of a large amount of data and sufficient computer power. With only 317 training images, this paper presents a Classic Augmentation based Classifier Generative Adversarial Network (CACGAN) for data synthetising. In order to take into account, the feature extraction ability and lightness of the model for lung CT images, the CACGAN network is mainly constructed by convolution blocks. During the training process, each iteration will update the discriminator's network parameters twice and the generator's network parameters once. For the evaluation of CACGAN, this paper organized multiple comparison between each pair from CACGAN synthetic data, classic augmented data, and original data. In this paper, seven classifiers are built, ranging from simple to complex, and are trained for the three sets of data respectively. To control the variable, the three sets of data use the exact same classifier structure and the exact same validation dataset. The result shows the CACGAN successfully learned how to synthesize new lung CT images with specific labels.","PeriodicalId":345723,"journal":{"name":"Fifth International Conference on Computer Information Science and Artificial Intelligence","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117100598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chenxiao Zhou, Lianying Zou, Chuang Liu, Ziwei Song
{"title":"FL-Lightgbm prediction method of unbalanced small sample anti-breast cancer drugs","authors":"Chenxiao Zhou, Lianying Zou, Chuang Liu, Ziwei Song","doi":"10.1117/12.2667385","DOIUrl":"https://doi.org/10.1117/12.2667385","url":null,"abstract":"The problem of small amount data and sample imbalance exists in the machine learning prediction of the molecular properties of anti breast cancer candidate drugs. Proposing a FL-Lightgbm prediction model based on WGAN-GP data enchance model in order to solve this problem. Firstly, WGAN-GP model is used for data enhancement to increase the sample size of the training data set. Considering the small difference between positive and negative samples, the enhanced data of positive and negative samples are generated respectively, and then combined them according to the original order to ensure that the generated data and the original data maintain the same distribution; Then the Focal Loss function is introduced into the Lightgbm model to increase learning ability for unbalanced samples, the model constructed is called FL-Lightgbm prediction model. After the training of the enhanced data set, the proposed model shows excellent prediction accuracy for 178 randomly selected validation samples in the experiment, and its highest accuracy, AUC and F1 values reach 0.882, 0.851 and 0.7272 respectively. In these three indexes, the proposed model has better prediction ability than the original Lightgbm model with over sampling algorithms such as BorderlineSMOTE and ADASYN.","PeriodicalId":345723,"journal":{"name":"Fifth International Conference on Computer Information Science and Artificial Intelligence","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114337570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application analysis of machine learning in cyberspace security research","authors":"Wenzhuo Du, Gerun Wang, Xuanbo Ma, Xintian Yu","doi":"10.1117/12.2668873","DOIUrl":"https://doi.org/10.1117/12.2668873","url":null,"abstract":"With the rapid development of society and the continuous change of the times, my country's Internet technology has achieved great development space. Cloud computing, Internet of Things, etc. have formed the current era of big data. At present, there are a lot of network access points, and the networked devices among them will generate a lot of data, so there are higher requirements for the security of the cyberspace, and it is also a golden opportunity. Traditional cyberspace security research is relatively inefficient in data processing, machine learning has strong adaptability, and strong learning capabilities also ensure the security of cyberspace. Under such a social background, it is necessary to give full play to the role of machine learning. After applying machine learning, it can effectively solve the problems existing in cyberspace security research. Based on this, this paper discusses the application of machine learning in cyberspace security research.","PeriodicalId":345723,"journal":{"name":"Fifth International Conference on Computer Information Science and Artificial Intelligence","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114525037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data collection and talent demand analysis of recruitment website based on principal component analysis","authors":"Jihui Fan, Fengshan Yuan","doi":"10.1117/12.2667708","DOIUrl":"https://doi.org/10.1117/12.2667708","url":null,"abstract":"The talent structure has been flattened, from the pyramid talent structure to the olive talent structure. Jobs are more complicated, industries are upgraded from low-end to high-end, and the situation faced by jobs is more complex. Talent specification compounding, industry understanding, data thinking, programming ability, innovative thinking and comprehensive problem-solving ability. With the rapid development of science and technology, the demand for social talents is constantly changing, and the big data wave is coming,How to match the talent training of the school with the talent demand of the society. This paper uses the crawler technology to obtain data from the recruitment website, through data collection, cleaning, and data preprocessing, and finally carries out data analysis and visual display.","PeriodicalId":345723,"journal":{"name":"Fifth International Conference on Computer Information Science and Artificial Intelligence","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115760246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}