{"title":"Extreme Scenario Generation Based on Adversarial Attack","authors":"Haoxin Ma, Jianming Hu","doi":"10.1145/3487075.3487186","DOIUrl":"https://doi.org/10.1145/3487075.3487186","url":null,"abstract":"The transportation field requires a large number of simulation scenarios for testing. At present, there is relatively little research on the generation of extreme scenarios. In this paper, we give the definition of extreme scenarios, which are prone to problems, and divide them into two categories: the extreme scenarios based on primitive value and the extreme scenarios based on primitive coupling. This paper focuses on the second which considers the coupling effect of different primitives in the scenarios, using the methods of adversarial attack: FGSM, FGSM-target, BIM, ILCM, PGD and strategically-timed attack. Using vehicle agent for test, the first five methods prove the feasibility and effectiveness of extreme scenario generation, and the sixth method simplifies the generation process.","PeriodicalId":354966,"journal":{"name":"Proceedings of the 5th International Conference on Computer Science and Application Engineering","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132639198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lin Wang, Zhengfei Yu, Mengru Wang, Xixi Zhu, Yun Zhou
{"title":"MOOC Dropout Prediction Based on Dynamic Embedding Representation Learning","authors":"Lin Wang, Zhengfei Yu, Mengru Wang, Xixi Zhu, Yun Zhou","doi":"10.1145/3487075.3487141","DOIUrl":"https://doi.org/10.1145/3487075.3487141","url":null,"abstract":"Massive Open Online Courses (MOOCs) received great attentions in recent years. Most MOOCs have huge number of participants, which usually introduce another challenge—the extremely high dropout rate. Thus, people use a large amount of user-item interaction data collected from the MOOC platform to predict the dropout behaviors for further analysis. Dynamic embedding representation learning presents an attractive opportunity to model the dynamic evolution of users and items, where each user (item) can be embedded in a Euclidean space. This article introduces and analyzes the application of the joint dynamic user-item embedding algorithm in the MOOC dropout prediction. The empirical results indicated that the model has low dependence on data volume. Moreover, the model is robust to label-flipping attacks. Therefore, we believe that the model performances under different settings can be used to guide the real-world MOOC dropout prediction.","PeriodicalId":354966,"journal":{"name":"Proceedings of the 5th International Conference on Computer Science and Application Engineering","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122368986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Two Methods to Describe New Shift Registers","authors":"Tao Wu","doi":"10.1145/3487075.3487111","DOIUrl":"https://doi.org/10.1145/3487075.3487111","url":null,"abstract":"Shift registers are typical digital logic structures for integrated circuits and are widely used in hardware descriptions. They can be used as early units before memories and be replaced by them later. In multi-precision shift registers, the control signal has heavy loads, and the critical path appears if the input is complex. In this paper, two techniques for synthesis are proposed to reduce either the critical path or power consumption. The first method divides the shift register into 2 or 3 parts, while the second method applies word-based registers to act as the shift register. Both techniques localize the control signals and reduce the path delay.","PeriodicalId":354966,"journal":{"name":"Proceedings of the 5th International Conference on Computer Science and Application Engineering","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133044549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Vehicle Re-Identification and Tracking Based on Video Segmentation","authors":"Liangru Xiang, Zhijia Yu, Jianming Hu, Yi Zhang","doi":"10.1145/3487075.3487185","DOIUrl":"https://doi.org/10.1145/3487075.3487185","url":null,"abstract":"Traffic object perception based on cameras is one of the foundations of Intelligent Transportation Systems. In traditional computer vision field, we usually take object detection method to detect and track the vehicle objects using bounding boxes with fixed shape, and some efficient methods based on this such as DeepSORT are used for perception. However, under the situation of dense traffic, vehicles could block each other in the viewpoint of the roadside camera, which severely reduce the accuracy of detection and tracking. Aiming to solve this, we propose our detection and tracking method based on partial feature re-identification and mask segmentation. First we apply segmentation method to separate the pixel-level image of each vehicle, then we use the especially trained CNN-based feature extractor to get the key information from the misshapen images, and finally utilize the masks and the features to track the vehicles. We test our method on CityFlow dataset and prove the validity of our method by visible result. We finally discuss the weakness of our framework and putting forward the future improvement direction of the algorithm.","PeriodicalId":354966,"journal":{"name":"Proceedings of the 5th International Conference on Computer Science and Application Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131081198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of High-precision Island WebGIS Based on Cesium","authors":"Qingjun Zhang, D. Hu, Qiang Lin","doi":"10.1145/3487075.3487146","DOIUrl":"https://doi.org/10.1145/3487075.3487146","url":null,"abstract":"In this paper, the design of a high-precision WebGIS system for island application is presented. The system is developed based on Cesium to support 2D, 2.5D and 3D map capabilities, and provide networked comprehensive geographic information service. Concerning the practical requirements for complicated configuration of island surface, improved methods for interpolation correction, data structure optimization, visible analysis and island path planning are introduced to improve system accuracy and performance. The system adopts B/S architecture and modular development ideas for easier access and further updates. The main functional modules of the island WebGIS provide basic operations, including multi-dimensional scene browsing, base map switching, multi-control operation, layer plotting, contour line, intervisibility and terrain factors measurement. Besides, the characteristic functions of key techniques such as profile analysis, viewshed analysis, and island path planning are implemented. The test examples show that the overall functional performance of the system is satisfactory for island 3D GIS service.","PeriodicalId":354966,"journal":{"name":"Proceedings of the 5th International Conference on Computer Science and Application Engineering","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121383332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Co-Evolutionary Hybrid ACO for Solving Traveling Salesman Problem","authors":"R. Wang, Shangce Gao","doi":"10.1145/3487075.3487077","DOIUrl":"https://doi.org/10.1145/3487075.3487077","url":null,"abstract":"Ant Colony Optimization (ACO) is an approximate method proposed recently. Many ACO based approaches and hybrid methods have been proposed for solving the traveling salesman problem (TSP); However, the balance between intensification and diversification is also difficult to solve. In this paper, we propose a co-evolutionary hybrid method (CEACO-GA) by adopting multiple colonies which perform ACO or GA algorithms, and a co-evolutionary strategy among colonies which is to enhance the interaction among colonies by communication between ACO and GA colonies, thereby to control the population diversity. The number of colonies that perform GA operations is used to adjust the balance between intensification and diversification. The CEACO-GA is tested on various problem instances in the TSPLIB standard library, and the results of numerical calculation show that the the CEACO-GA has more outstanding performance comparing to other algorithms.","PeriodicalId":354966,"journal":{"name":"Proceedings of the 5th International Conference on Computer Science and Application Engineering","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115927396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detect Darknet URL Based on Artificial Neural Network","authors":"Jie Xu, Ao Ju","doi":"10.1145/3487075.3487132","DOIUrl":"https://doi.org/10.1145/3487075.3487132","url":null,"abstract":"Darknet is a network that transmits data on the Internet through anonymous network technology and protects the relationship between the two sides of communication from being leaked. Because the IP addresses of both sides of the communication cannot be traced on the darknet, the identity of the user cannot be determined. The darknet is used by criminals to engage in criminal activities. This paper studies the URL address of the darknet, proposes an algorithm for darknet URL recognition using artificial neural network. The algorithm transforms URL into a fixed length vector, and then uses it as a part of the input data of artificial neural network for learning and classification. Experiments show that the proposed algorithm has high accuracy, can accurately identify the darknet URL through multiple iterations under different attribute accuracy. Experimental results show that the proposed algorithm can achieve 99.3% detection accuracy.","PeriodicalId":354966,"journal":{"name":"Proceedings of the 5th International Conference on Computer Science and Application Engineering","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116464958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Junyuan Shen, H. Ding, Xiguo Ren, Shumin Ge, Yimin Wang, Tengfei Wang
{"title":"Design of Safety Analog Voltage Acquisition Module","authors":"Junyuan Shen, H. Ding, Xiguo Ren, Shumin Ge, Yimin Wang, Tengfei Wang","doi":"10.1145/3487075.3487117","DOIUrl":"https://doi.org/10.1145/3487075.3487117","url":null,"abstract":"Based on the demand of trackside control unit about analog voltage safety acquisition, a safety analog voltage acquisition module is designed in this paper. it is implemented by using the method of heterogeneous hardware design and two out of two software design. The module realizes the safety acquisition of single ended and differential voltage signals within the specified frequency range for the first time. It has the characteristics of miniaturization and lightweight. It is suitable for application scenarios with safety acquisition requirements in the field of rail transit.","PeriodicalId":354966,"journal":{"name":"Proceedings of the 5th International Conference on Computer Science and Application Engineering","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116611516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Dynamic Predictive VM Resource Scaling Strategy in Satellite-Ground Computing Networks","authors":"Siyan Pan, Suzhi Cao, Lei Yan, Houpeng Wang","doi":"10.1145/3487075.3487145","DOIUrl":"https://doi.org/10.1145/3487075.3487145","url":null,"abstract":"Combining satellite-ground network with the edge computing, an emerging research direction is to use low-orbit satellites as edge nodes to provide computing services for ground users and space missions. Due to the motion of satellites around the earth, the ground region covered by the satellite changes constantly over time, and the service traffic also changes accordingly. Therefore, the method of running a constant computing resource will lead to insufficient service capacity or high energy consumption. In this paper, we proposed a two-step dynamic resource management strategy SRTMS, which makes use of the certainty of satellite orbit and historical service data to predict the business traffic of future service region and dynamically scale the amount of in-orbit virtual computing resources. Through the strategy, energy consumption is reduced by 73% compared to the traditional mode in which all resources are operated at full capacity, saving resources that can be used for other payloads.","PeriodicalId":354966,"journal":{"name":"Proceedings of the 5th International Conference on Computer Science and Application Engineering","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128610964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research and Application on Text Classification Model Based on Keywords","authors":"Kuncheng Li, Chunmei Fan","doi":"10.1145/3487075.3487159","DOIUrl":"https://doi.org/10.1145/3487075.3487159","url":null,"abstract":"Text classification is the process of assigning predefined labels to text by its content. It is a common task of Natural Language Processing (NLP). The traditional way for text classification is machine learning and its effect is greatly depended on the amount and accuracy of the training data set which is difficult to obtain in most cases. The job of building the training data set is inefficient and expensive [1]. This has motivated a research word to break this barrier, with a method using keywords instead to complete text classification. In this work, we explore the usage of label-keywords pairs (each label has a set of keywords) for assigning text documents to one or more categories automatically even without the training data set, obtaining results comparable to those systems that classify the text manually.","PeriodicalId":354966,"journal":{"name":"Proceedings of the 5th International Conference on Computer Science and Application Engineering","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123103766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}