Fifth International Conference on Computer Information Science and Artificial Intelligence最新文献

筛选
英文 中文
Research on vehicle tracking technology in expressway cross-monitoring area based on radar and video fusion 基于雷达与视频融合的高速公路交叉监控区域车辆跟踪技术研究
Jianzhen Liu, B. Feng
{"title":"Research on vehicle tracking technology in expressway cross-monitoring area based on radar and video fusion","authors":"Jianzhen Liu, B. Feng","doi":"10.1117/12.2667372","DOIUrl":"https://doi.org/10.1117/12.2667372","url":null,"abstract":"It is an important way to improve expressway monitoring management level to realize continuous real-time tracking and monitoring of abnormal driving vehicles such as overspeed, long time and low speed occupation of overtaking lane, continuous lane change, and dangerous goods transportation vehicles under different cameras. This article through studies the expressway ray regard convergence across monitoring area joint tracking technology, build the camera comprehensive control, camera control balance compensation and the monitoring area based on target motion continuity principle joint track model, such as through the accurate control of radar to detect vehicle more monitor cameras, solves the continuous tracking target vehicle monitoring technical problems. It has been successfully applied in Yanchong expressway, providing more convenient monitoring services for the expressway management department, and providing strong support for the decision-making of the expressway management department, which has high application value.","PeriodicalId":345723,"journal":{"name":"Fifth International Conference on Computer Information Science and Artificial Intelligence","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127197639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Government and enterprise data security sharing method based on differential privacy protection 基于差分隐私保护的政企数据安全共享方法
Xiaomin Xu, Zhenglei Zhu, Jiange Liu, Xin Liu, Qingxuan Guo
{"title":"Government and enterprise data security sharing method based on differential privacy protection","authors":"Xiaomin Xu, Zhenglei Zhu, Jiange Liu, Xin Liu, Qingxuan Guo","doi":"10.1117/12.2668452","DOIUrl":"https://doi.org/10.1117/12.2668452","url":null,"abstract":"The security of government and enterprise data sharing is very important and critical. To increase the number of data sharing, create a more stable transmission and processing environment, and reduce network threats, this paper studies the security sharing method of government and enterprise data based on differential privacy protection. Firstly, the government and enterprise data encryption are described, and the Tendermint differential overlapping interactive sharing nodes are deployed in the preset area. Then, based on this, the interactive differential privacy protection data sharing model is designed, and the threat identification method is used to achieve data security sharing. The experimental results show that compared with the traditional proxy encryption data security sharing test group and the traditional CP-ABE data security sharing test group, the differential privacy protection sharing test group designed in this paper achieves relatively more times of one-way data security sharing, which indicates that the proposed method has a small error and fast speed in the actual data transmission process. The data processing in the region has less restrictive conditions and has practical application value.","PeriodicalId":345723,"journal":{"name":"Fifth International Conference on Computer Information Science and Artificial Intelligence","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124852588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Determining efficient placement of electric vehicles charging stations using integer linear programming 利用整数线性规划确定电动汽车充电站的有效布局
Yuan Ma, Guheng Pan, Jiong Xu
{"title":"Determining efficient placement of electric vehicles charging stations using integer linear programming","authors":"Yuan Ma, Guheng Pan, Jiong Xu","doi":"10.1117/12.2669163","DOIUrl":"https://doi.org/10.1117/12.2669163","url":null,"abstract":"This paper proposes an approach for a company to determine the choice of electric stations for its respective electric vehicles so that it would minimize its cost on this process. This approach can not only be applied in this problem but also can be utilized for other scenarios. The core of this method is using integer linear programming to represent “to choose” or “not to choose”. The result will give the corresponding value so that we could identify the orientation for each car. In the thesis, we abstract the problem into dealing with 5 cars going to 5 stations among 7 stations. One car will go to one of the 7 stations and no more than one car can go to the same station. The input data is achieved by calculating the distance from each station to each car. Programming is embodied in investigation to solve the integer linear programming optimization. The chosen region is formulated into a coordinate. The cost is in proportional to distance between cars and stations, so a cost function is demonstrated. Finally, the formula of cost is the product of a matrix and an unknown matrix. In order to minimize the cost, this unknown matrix which represent the choice for each car can be solved. After getting the result, the situation that one station will have different capacity, which will allow people to have more option available will be analyzed. Further evaluation of this type of problem will be discussed to analyze why the outcome of the program will all be zero and one.","PeriodicalId":345723,"journal":{"name":"Fifth International Conference on Computer Information Science and Artificial Intelligence","volume":"19 811 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122661140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real-time detection of railway cracks based on improved YOLOX-Nano 基于改进YOLOX-Nano的铁路裂缝实时检测
Chong Du, X. Zao, Xiaoliang Wu
{"title":"Real-time detection of railway cracks based on improved YOLOX-Nano","authors":"Chong Du, X. Zao, Xiaoliang Wu","doi":"10.1117/12.2667626","DOIUrl":"https://doi.org/10.1117/12.2667626","url":null,"abstract":"Cracks in the rails will lead to great safety hazards in railway transportation. Aiming at the problems of low detection accuracy and inconspicuous part of cracks in crack detection, an improved model based on YOLOX-Nano is proposed. The SA-NET lightweight combined attention mechanism is added to the model to generate a feature map with channel attention and spatial attention, which strengthens the model's attention to target features and location information. Secondly, use Alpha-CIoU Loss to replace IoU Loss to increase the accuracy of the model's prediction box. The comparison experiment was carried out on the self-built data set, and the mAP of the improved YOLOX-Nano model reached 77.58%, the detection speed reached 42.2FPS, and the calculation amount and parameter amount of the model were only 0.508G and 3.5MB respectively, and the overall performance was better than other models.","PeriodicalId":345723,"journal":{"name":"Fifth International Conference on Computer Information Science and Artificial Intelligence","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121537925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on LSTM multi-factor quantitative stock selection strategy based on attention mechanism 基于注意机制的LSTM多因素定量选股策略研究
Zezhong Li
{"title":"Research on LSTM multi-factor quantitative stock selection strategy based on attention mechanism","authors":"Zezhong Li","doi":"10.1117/12.2668783","DOIUrl":"https://doi.org/10.1117/12.2668783","url":null,"abstract":"In this paper, monthly frequency multi-factor data on valuation, momentum, turnover rate and technology of A-share listed companies in Shanghai and Shenzhen markets from January 2012 to July 2022 are selected and input to LSTM and LSTM model with fused attention mechanism respectively for training after data pre-processing. The sector-neutral layered-portfolios and the sector-neutral stock selection portfolios were constructed based on the model output, respectively. In the model evaluation section, it is confirmed that the Attention-LSTM model outperforms the LSTM model in predicting stock ups and downs. The single-factor layered back test under monthly position adjustment and stock selection strategy back test confirmed that the Attention-LSTM model significantly outperformed the LSTM model in terms of annualized return, sharpe ratio, and maximum retracement, and also significantly outperformed the CSI 300 and CSI 500.","PeriodicalId":345723,"journal":{"name":"Fifth International Conference on Computer Information Science and Artificial Intelligence","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122112397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blind image super-resolution reconstruction based on dual regression network 基于对偶回归网络的图像超分辨率盲重建
Hongpeng Tian, ShengZhou Jiang
{"title":"Blind image super-resolution reconstruction based on dual regression network","authors":"Hongpeng Tian, ShengZhou Jiang","doi":"10.1117/12.2667901","DOIUrl":"https://doi.org/10.1117/12.2667901","url":null,"abstract":"Existing deep learning-based Super Resolution (SR) reconstruction algorithms achieve remarkable performance on images with known degradation. Most of the degradation models exists problems in self-adaptations when facing with the deviation of the degradation model of the image of the real scene, and the effect is not good. Therefore, this paper proposes a blind image super-resolution reconstruction algorithm based on dual regression, which aims to solve the problem of poor performance of super-resolution networks in real scenes. Firstly, the closed-loop network is used to constrain the mapping space, and the optimal reconstruction function is found to improve the network reconstruction performance. Secondly, the attention mechanism is adopted into the residual block of feature extraction to expand the receptive field of the feature map, improve the reuse of features, and strengthen the reconstruction of high-frequency information. Finally, the frequency-domain blur kernel map estimates the down sampling kernel and reconstructs the low-resolution image, adaptively extracts the feature expression, enhances the ability to restore texture details, and reconstructs the real-world image better.","PeriodicalId":345723,"journal":{"name":"Fifth International Conference on Computer Information Science and Artificial Intelligence","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130601094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Wild animal recognition based on effective-class-balanced softmax loss 基于有效类平衡软最大损失的野生动物识别
Wen Chen, Qianzhou Cai, Jin Hou, Jindong Zhang, Bochuan Zheng
{"title":"Wild animal recognition based on effective-class-balanced softmax loss","authors":"Wen Chen, Qianzhou Cai, Jin Hou, Jindong Zhang, Bochuan Zheng","doi":"10.1117/12.2667361","DOIUrl":"https://doi.org/10.1117/12.2667361","url":null,"abstract":"Wild animal recognition is important for wild animal protection. Because the number of different wild animals is different in the wild. The wild animal image dataset collected in field by using camera trap is a typical long tail dataset. This paper proposes an Effective-Class-Balanced Softmax Loss (ECBSL) to solve the long tail problem of self-built wild animal dataset. Firstly, a new cross entropy loss function is obtained by using pointwise mutual information instead of conditional probability for modeling. Then the improved effective number of samples calculation method is used to approximately calculate the prior probability distribution of different animal species. Finally, the effectiveness of ECBSL is proved by experiments. Experiments on the self-built wild animal dataset show that the proposed method improves the recognition accuracy of the tail classes and the whole dataset. The comparison experiments with other methods show that the proposed method is superior to other methods.","PeriodicalId":345723,"journal":{"name":"Fifth International Conference on Computer Information Science and Artificial Intelligence","volume":"14 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120864916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Taxi destination prediction based on LSTM with tree memory module 基于树形记忆模块LSTM的出租车目的地预测
Dan Song, Yadong Li, Meng-Yun Zhang, Ting Zhang
{"title":"Taxi destination prediction based on LSTM with tree memory module","authors":"Dan Song, Yadong Li, Meng-Yun Zhang, Ting Zhang","doi":"10.1117/12.2667488","DOIUrl":"https://doi.org/10.1117/12.2667488","url":null,"abstract":"Taxi destination prediction can grasp the flow direction of the taxi, facilitate the taxi dispatches. There has always been a long-term dependency problem in taxi trajectory prediction. Although LSTM can solve the long-term dependency problem to a certain extent, it does not have a good ability to deal with the deep correlation between long trajectory sequences. To address the above problem, we propose a taxi destination prediction method based on LSTM with Tree Memory Module (TMM-LSTM). TMM-LSTM stores the state of the input trajectory through an external memory structure. It uses a tree structure to process more historical information and better deal with the long-term relationship between trajectory points. TMM-LSTM can better solve the long-term dependency problem in the taxi trajectory sequence. Experiments demonstrate that the average error distance is 6% lower than traditional LSTM model.","PeriodicalId":345723,"journal":{"name":"Fifth International Conference on Computer Information Science and Artificial Intelligence","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123093476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on the main elements of mimic platforms 模拟平台主要组成部分的研究
Bo Zhang, Zesheng Xi, Yu-Na Wang, Chuan He
{"title":"Research on the main elements of mimic platforms","authors":"Bo Zhang, Zesheng Xi, Yu-Na Wang, Chuan He","doi":"10.1117/12.2667434","DOIUrl":"https://doi.org/10.1117/12.2667434","url":null,"abstract":"Cyber Mimic Defense (CMD) is a new generation of active defense technology after firewall, intrusion and other traditional defense technology. It aims to deal with uncertain threats in the network environment with visual uncertainty. This paper briefly introduces the architecture and principle of CMD and defines four main elements of the current simulation platform: system architecture, heterogeneous policy, scheduling policy and voting policy. Combined with examples, the four elements are respectively summarized. The system architecture is divided into C mode and D mode, and the heterogeneous strategy includes implementation mode, implementation method and synchronization mode. Scheduling policies are classified into offline policies and online policies. Voting policies include voting algorithms, voting levels, and delay control.","PeriodicalId":345723,"journal":{"name":"Fifth International Conference on Computer Information Science and Artificial Intelligence","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115077599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-site air quality prediction based on graph convolutional neural network-bi-directional LSTM model 基于图卷积神经网络双向LSTM模型的多站点空气质量预测
Lalao Gao, MingChao Liao, Di Zhang
{"title":"Multi-site air quality prediction based on graph convolutional neural network-bi-directional LSTM model","authors":"Lalao Gao, MingChao Liao, Di Zhang","doi":"10.1117/12.2667705","DOIUrl":"https://doi.org/10.1117/12.2667705","url":null,"abstract":"To address the current problem of single-site prediction and inadequate extraction of spatial features for PM2.5 hourly concentration prediction, a graphical convolutional neural network (GCN) is proposed to obtain the spatial correlation between PM2.5 monitoring stations in Beijing by considering the features of time series in time and space, and assign weights according to the distance between stations to abstract into an undirected topological map. The missing data sequences are complemented by using a long and short-term memory network to extract temporal features on the time-series dataset, which are normalized and then fused with the components extracted by the GCN to make predictions. The experimental results show that GCN-BiLSTM has higher prediction accuracy and better results than single RNN, LSTM, and BiLSTM algorithms.","PeriodicalId":345723,"journal":{"name":"Fifth International Conference on Computer Information Science and Artificial Intelligence","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125740697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信