{"title":"Cointegration identification with metric learning","authors":"Zeyu Xia, Changle Lin","doi":"10.1117/12.2667621","DOIUrl":"https://doi.org/10.1117/12.2667621","url":null,"abstract":"Cointegration is an important topic for time series analysis, especially in finance pair trading and hedging area. Cointegration is a kind of structure in which a linear combination of two (or more) time series is stationary. Traditional way to identify cointegration is to use the OLS estimator, firstly run a regression and secondly run a unit root test on residuals. But such method is easy to lead to ambiguous and unstable result. Therefore, we developed a dimensionality reduction model based on automatically calculated common factors and adopted the Metric Learning method to find a method that can quickly reduce the dimensionality and test the cointegration relationship of stock pairs.","PeriodicalId":345723,"journal":{"name":"Fifth International Conference on Computer Information Science and Artificial Intelligence","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130936335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An improved deep-learning monocular visual SLAM method based on local features","authors":"Rui Yu, Chenhai Long, Guoliang Ma, Jianpo Guo, Lisong Xu, Zhaoli Guo","doi":"10.1117/12.2667711","DOIUrl":"https://doi.org/10.1117/12.2667711","url":null,"abstract":"To improve the tracking performance of the Simultaneous Localization and Mapping (SLAM) system, this paper presents a monocular visual SLAM method based on deep learning second order similarity of local features. The local features are generated into descriptors from patches around key points in a frame using a deep neural network. It is applied to tracking, re-localization, and loop closure module to enhance data association. We also train a visual bag of words model to adapt to the local descriptors. Additionally, we use two adaptive strategies to improve the proposed method, one strategy refines key points detection with illumination intensity, and the other strategy reduces the possibility of tracking lost based on the ratio of outliers’ number in feature matching. We evaluate our method on two public datasets. The experimental results demonstrate the effectiveness of the system and also show that the adaptive strategies can increase tracking performance and improve the robustness in challenging conditions.","PeriodicalId":345723,"journal":{"name":"Fifth International Conference on Computer Information Science and Artificial Intelligence","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134082669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"JSVulExplorer: a JavaScript vulnerability detection model based on transfer learning","authors":"S. Chen, Nan Jiang, Zheng Wu, Zichen Wang","doi":"10.1117/12.2667324","DOIUrl":"https://doi.org/10.1117/12.2667324","url":null,"abstract":"Software vulnerabilities will make the system vulnerable to attack, affect the reliability of the software and cause information leakage, which will have a huge impact on enterprises or individuals. Vulnerabilities are inevitable in software development engineering. Therefore, relying on some methods or tools for continuous vulnerability analysis of code is the solution to minimize software vulnerabilities. We propose a neural network model, JSVulExplorer, for static vulnerability analysis of the dynamic programming language JavaScript. The JSVulExplorer focuses on feature enhancement of data. We use pre-training to learn the semantic similarity between code slices, utilize abstract syntax trees to generate path information, and design positional encoding to use the path information. Based on transfer learning, we combine the pre-trained model with path information to improve vulnerability detection performance. Experiments show that JSVulExplorer has significantly improved precision and recall compared to previous models. It is verified that the dynamic event-based programming language can also use the static analysis method for vulnerability detection.","PeriodicalId":345723,"journal":{"name":"Fifth International Conference on Computer Information Science and Artificial Intelligence","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134083338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Airfoil inverse design based on particle swarm optimization algorithm","authors":"Qinghe Zhao","doi":"10.1117/12.2667289","DOIUrl":"https://doi.org/10.1117/12.2667289","url":null,"abstract":"Particle swarm optimization algorithm has the characteristics of global optimization. The Euler equation with CST airfoil parameterization is used to ensure the generation of smooth airfoil. The airfoil reverse design optimization system is build based on particle swarm optimization algorithm. The design practice shows that the optimization algorithm developed in this paper can greatly improve the efficiency of optimization design and has good practical value in engineering.","PeriodicalId":345723,"journal":{"name":"Fifth International Conference on Computer Information Science and Artificial Intelligence","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134455395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A reinforcement learning-based network load balancing mechanism","authors":"Jiawei Wang","doi":"10.1117/12.2667915","DOIUrl":"https://doi.org/10.1117/12.2667915","url":null,"abstract":"With the exponential growth of cloud computing demands, load balancing gradually becomes the infrastructure of high concurrency applications. The increased demand makes load balancing the cornerstone of large-scale systems’ stability and efficiency. Due to the diversity of modern client-server architecture, irregular fluctuations in cluster system resource allocation gradually become significant. The existing load balancing algorithms are rule-based, leading to a gap between operational and practical scenarios. The phenomenon causes noticeable tribulations in cluster resource utilization optimization. This research proposes a reinforcement learning-based load balancing model optimization approach. This paper modelled the load balancing problem as a Markov Decision Process and implemented the conjecture with the Q-learning algorithm. This paper performs a load balancer that can efficiently utilize the resources in the cluster system by observing the association between the packet body and node resource utilization rate in the cluster system. The experiment demonstrated that the author’s mechanism substantially improves the average cluster system resource utilization efficiency and reduces the Round-Trip Time performance in real network environments","PeriodicalId":345723,"journal":{"name":"Fifth International Conference on Computer Information Science and Artificial Intelligence","volume":" 454","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131977357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yunjing Zhang, Jiaxu Sun, Hengbin Liu, Shaoqing Shi, Qiufeng Wang
{"title":"A high performance bitcoin trading strategy prediction model","authors":"Yunjing Zhang, Jiaxu Sun, Hengbin Liu, Shaoqing Shi, Qiufeng Wang","doi":"10.1117/12.2667409","DOIUrl":"https://doi.org/10.1117/12.2667409","url":null,"abstract":"First released as open source in 2009 by the pseudonym Satoshi Nakamoto, Bitcoin is the longest running and best known cryptocurrency. Bitcoin's transaction history is characterised by openness and transparency, and Bitcoin has become an important part of financial transactions. Therefore, it is increasingly important to be able to make accurate predictions about the development of the Bitcoin market. In this study, we construct a prediction model for bitcoin trading strategies based on the LightGBM algorithm, and show that our model has an accuracy of over 95.1%. The results show that our model achieves an accuracy of over 95.1% and has a higher performance compared to popular machine learning models.","PeriodicalId":345723,"journal":{"name":"Fifth International Conference on Computer Information Science and Artificial Intelligence","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130151175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Maize pests identification based on improved YOLOv4-Tiny","authors":"Haiying Lin, Yuyue Zhang, Yukun Zhang, Dexue Zhang","doi":"10.1117/12.2667932","DOIUrl":"https://doi.org/10.1117/12.2667932","url":null,"abstract":"Agricultural pest identification occupies a key position in agricultural economy and development. The accurate identification of pests is the premise of agricultural pest control. In recent years, image processing technology and deep learning technology have rapidly developed. Some researches have been applied to the field of insect recognition. Thus, some insect recognition deep learning models with good recognition accuracy and speed have been established. However, there is still much room for improvement when they were applied to the insect monitoring system deployed in the field. Considering the target recognition accuracy and speed, this paper selects the target detection algorithm YOLOv4-Tiny as the base model for insect recognition. The major advances are the attention mechanism and Spatial Pyramidal Pooling (SPP) structure as shown in: applying Convolutional Block Attention Module (CBAM) reduce computation and number of parameters; adopting SPP structure multi-scale pooling of input feature layers which increases the perceptual field and improves the robustness of the model. The experimental results show that the improved YOLOv4-Tiny model can significantly enhance the insect recognition accuracy.","PeriodicalId":345723,"journal":{"name":"Fifth International Conference on Computer Information Science and Artificial Intelligence","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132719578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A fault detection method for AUV based on multi-scale spatiotemporal feature fusion","authors":"Shaoxuan Xia, Xiaofeng Zhou, H. Shi, Shuai Li","doi":"10.1117/12.2667304","DOIUrl":"https://doi.org/10.1117/12.2667304","url":null,"abstract":"Autonomous Underwater Vehicles (AUVs) are important equipment for ocean development and exploration. To ensure the task implementation of AUV, faults shall be detected in time. We propose a fault detection method based on Multiscale Spatiotemporal Feature fusion (MSF) for the time-varying characteristics and multiple correlation characteristics of AUV monitoring data. First, we apply a variety of sampling and data processing methods to generate monitoring windows with different scales along the time axis. Then, a composite feature extraction method is proposed to obtain temporal and spatial features simultaneously, and a feature pyramid of temporal and spatial information is formed. We use Bidirectional Long Short-Term Memory (BiLSTM) to obtain the time-series characteristics of a single monitoring variable, and Convolutional Neural Networks (CNN) to obtain the implicit spatial relationship characteristics among multiple monitoring variables. Next, we use an adaptive feature fusion method to solve the inconsistency in different feature scales, which can adaptively suppress the possible conflict information of different scale features. Finally, we use a fully connected network to detect the fault of the fused features. The fault detection experiment of Haizhe AUV shows the effectiveness and superiority of the proposed method.","PeriodicalId":345723,"journal":{"name":"Fifth International Conference on Computer Information Science and Artificial Intelligence","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132893340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shenyang Deng, Yuanchi Suo, Shicong Liu, Xin Ma, Hao Chen, Xiaoqi Liao, Jianjun Zhang, Wing W. Y. Ng
{"title":"MFCSA-CAT: a multimodal fusion method for cancer survival analysis based on cross-attention transformer","authors":"Shenyang Deng, Yuanchi Suo, Shicong Liu, Xin Ma, Hao Chen, Xiaoqi Liao, Jianjun Zhang, Wing W. Y. Ng","doi":"10.1117/12.2668986","DOIUrl":"https://doi.org/10.1117/12.2668986","url":null,"abstract":"Cancer diagnosis, prognosis, and therapeutic response predictions are based on data from various modalities, such as histology slides and molecular profiles from genomic data. In cancer clinical treatment, the technology of intelligent diagnosis for cancer patients has become an essential research domain with the rapid growth of various pathological data. In this work, we propose a multimodal fusion method for cancer survival analysis based on Cross-Attention Transformer. Compared to similar bimodal work, our work greatly reduces the number of parameters in the feature fusion model (our fusion model has 7625 parameters), and achieves the State-of-the-Art effect (81.85%) in bimodal cancer survival analysis task with histology images and genomic features data of Glioma cancer from TCGA database. (Previous bimodal Sota work in this task is Kronecker Product which achieves 81.40% with 170130 parameters)In addition, our experiments show that Cross-Attention can not only increase the correlation between the two modalities but also offer a better bimodal feature representation for the final fusion.","PeriodicalId":345723,"journal":{"name":"Fifth International Conference on Computer Information Science and Artificial Intelligence","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124655519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hybrid forecasting model in used car price forecasting based on stochastic algorithm","authors":"Lili Xu, Cong Tian, Linhui Liu","doi":"10.1117/12.2667745","DOIUrl":"https://doi.org/10.1117/12.2667745","url":null,"abstract":"With the quiet change of people's consumption habits, the used car market has been unprecedentedly prosperous and developed. However, the current second-hand car market does not have a unified price evaluation standard, which leads to frequent occurrences of wanton price listings and excessively low or high transaction prices, which create great obstacles to the transaction process and seriously affect the health and order of the second-hand car market development. This paper selects 13 index variables that affect the price of used cars and analyzes the correlation between each index and the current price of used cars. Through the random forest prediction model, GBDT prediction model and SVM prediction model proposed in this paper, the used car prices are predicted and compared. It is hoped that the research in this paper will have important significance for promoting the standardization of car pricing in the used car market.","PeriodicalId":345723,"journal":{"name":"Fifth International Conference on Computer Information Science and Artificial Intelligence","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125486659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}