{"title":"Automatic Recognition and Segmentation of Composite User Stories Based on Semantic Analysis","authors":"Yufeng Ma, Yajie Dou, Mengru Wang, Yitong Wang, Miao Jiang, Yanjing Lu","doi":"10.1145/3487075.3487089","DOIUrl":"https://doi.org/10.1145/3487075.3487089","url":null,"abstract":"User stories are often used in agile development to express user needs. Accurate and rapid understanding of user stories is critical to product development. One of the major obstacles to accurate and efficient story understanding is the ambiguity of story statement caused by the existence of compound user stories. Therefore, the understanding of user stories is crucial to product development. One aspect that hinders the efficiency of story understanding is compound user stories, especially in Chinese, so identifying compound stories in the early stages of development is a major goal of this article. This paper proposes a method for identifying and segmenting compound stories based on semantic analysis, which includes analyzing the structural and semantic features of compound stories, building a feature dictionary, and automatically recognizing compound stories based on HanLP. This paper takes the user story of a game live broadcast system as an example, and the research proves that the method proposed in this paper can well identify common compound user stories.","PeriodicalId":354966,"journal":{"name":"Proceedings of the 5th International Conference on Computer Science and Application Engineering","volume":"28 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133384325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"HDBFuzzer–Target-oriented Hybrid Directed Binary Fuzzer","authors":"Yingchao Yu, Xiaojun Qin, Shuitao Gan","doi":"10.1145/3487075.3487124","DOIUrl":"https://doi.org/10.1145/3487075.3487124","url":null,"abstract":"In this paper, we propose a target-oriented hybrid directed binary fuzzer (HDBFuzzer) to solve the vulnerability confirmation problem based on binary code similarity comparison. HDBFuzzer combines macro function level direction fuzzing and micro path-constraint directed solving. For some branches with simple or loose constraints, it still uses directed mutation of the directed fuzzing to penetrate while for some really hard-to-penetrate constraints, it resorts to guided concolic execution. At the same time, in order to improve the efficiency of constraint solving, we propose a constraint solving method based on “path abstraction”, which approximates the solution space by the linear expression and generates effective input utilizing the highly-effective sampling method towards the linear space. Then, under the guidance by the directed greybox fuzzing, HDBFuzzer can generate input that can quickly reach the vulnerable code region and finally crash the program under the test to confirm the vulnerability hidden in the binary program. We evaluate HDBFuzzer against AFLGo-B and QSYM on LAVA-M dataset and ten real-world programs, and the results show that HDBFuzzer is superior to AFLGo-B and QSYM on the bug discovery, bug reproduction and target reaching capabilities.","PeriodicalId":354966,"journal":{"name":"Proceedings of the 5th International Conference on Computer Science and Application Engineering","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129212866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Forecasting Port Container Throughput with Deep Learning Approach","authors":"Fuxin Jiang, Gang Xie, Shouyang Wang","doi":"10.1145/3487075.3487173","DOIUrl":"https://doi.org/10.1145/3487075.3487173","url":null,"abstract":"Due to the international transfer of manufacturing industry, the change of trade policy and frequent irregular events in the global trade, it becomes more difficult to predict port container throughput accurately. In order to improve the predictive accuracy, we develop a bidirectional long short-term memory network model to forecast the throughput. Using the data of port in Qingdao, this study investigates for the first time how to use the deep learning approach to predict port container throughput. The empirical results show that the proposed model can achieve highest average predictive accuracy, which indicates that the approach is effective in the increasingly complex trade situation.","PeriodicalId":354966,"journal":{"name":"Proceedings of the 5th International Conference on Computer Science and Application Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129293268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FCOSMask: Fully Convolutional One-Stage Face Mask Wearing Detection Based on MobileNetV3","authors":"Yang Yu, Jie Lu, Chao Huang, Bo Xiao","doi":"10.1145/3487075.3487078","DOIUrl":"https://doi.org/10.1145/3487075.3487078","url":null,"abstract":"Wearing masks correctly in public is one major self-prevention method against the worldwide Coronavirus disease 2019 (COVID-19). This paper proposes FCOSMask, a fully convolutional one-stage face mask wearing detector based on the lightweight network, for emergency epidemic control and long-term epidemic prevention work. MobileNetV3 is applied as the backbone network to reduce computational overhead. Thus, complex calculation related to anchor boxes is avoided in the anchor-free method, and Complete Intersection over Union (CIoU) loss is selected as the bounding box regression loss function to speed up model convergence. Experiments show that compared to other anchor-based methods, detection speed of FCOSMask is improved around 3 to 4 times on self-established datasets and mean average precision (mAP) achieves 92.4%, which meets the accuracy and real-time requirements of the face mask wearing detection task in most public areas. Finally, a Web-based face mask wearing system is developed that can support public epidemic prevention and control management.","PeriodicalId":354966,"journal":{"name":"Proceedings of the 5th International Conference on Computer Science and Application Engineering","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131919254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Remaining Useful Life Prediction of Equipment Based on XGBoost","authors":"Zhiyang Jia, Zhibo Xiao, Yijin Shi","doi":"10.1145/3487075.3487134","DOIUrl":"https://doi.org/10.1145/3487075.3487134","url":null,"abstract":"Remaining Useful Life (RUL) prediction is an essential task in the practice of predictive maintenance which aims at repairing equipment before it fails based on data received about it from sensors. Our simulation experiments use the Turbofan engine degradation dataset CMAPSS Data, which gained historical data to predict the remaining useful life and does not require participants to consider the underlying physical factors. RUL prediction is performed by machine learning methods including Decision Tree (DT), Random Forest (RF), Support Vector Regression (SVR), and XGBoost after data pre-processing and feature selection. XGboost is a kind of ensemble learning algorithm that can generate a series of weak learners by continuous training and then combine these weak learners to become a strong learner. Experimental results reveal that the performance of XGBoost based model is effective in such dataset comparing with the traditional machine learning models.","PeriodicalId":354966,"journal":{"name":"Proceedings of the 5th International Conference on Computer Science and Application Engineering","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123210905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enriching Attributes from Knowledge Graph for Fine-grained Text-to-Image Synthesis","authors":"Yonghua Zhu, Ning Ge, Jieyu Huang, Yunwen Zhu, Binghui Zheng, Wenjun Zhang","doi":"10.1145/3487075.3487155","DOIUrl":"https://doi.org/10.1145/3487075.3487155","url":null,"abstract":"In this paper, we propose an Attribute-Rich Generative Adversarial Network (AttRiGAN) for text-to-image synthesis, which enriches the simple text description by associating knowledge graph and embedding it in the synthesis task in the form of an attribute matrix. Higher fine-grained images can be synthesized with AttRiGAN, and the synthesized sample are more similar to the objects that exist in the real world, since they are driven by attributes which are enriched from the knowledge graph. The experiments conducted on two widely-used fine-grained image datasets show that our AttRiGAN allows a significant improvement in fine-grained text-to-image synthesis.","PeriodicalId":354966,"journal":{"name":"Proceedings of the 5th International Conference on Computer Science and Application Engineering","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115829270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Prespecified-Time Control of Complex Networks Coupled with Nonlinear Dynamical Systems","authors":"Juan Chen, Xinru Li, Ganbin Shen","doi":"10.1145/3487075.3487113","DOIUrl":"https://doi.org/10.1145/3487075.3487113","url":null,"abstract":"The control of complex networks is a hot-spot topic in the field of complex networks. Based on Lyapunov function and matrix theory, a control scheme for complex networks coupled with nonlinear dynamical systems is presented here. Different from the existing finite-time control strategies, the settling time of our proposed scheme does not depend on initial values or the control parameters of the system, and can be given arbitrarily. In addition, the scheme is applicable to both directed and undirected networks, and connectivity is not required. Finally, two simulations are provided to confirm the feasibility of our theoretical result.","PeriodicalId":354966,"journal":{"name":"Proceedings of the 5th International Conference on Computer Science and Application Engineering","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124820623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effective Indoor Fire Detection with Channel Shuffle Module","authors":"Hao Ge, Yichao Cao, Xiaobo Lu","doi":"10.1145/3487075.3487125","DOIUrl":"https://doi.org/10.1145/3487075.3487125","url":null,"abstract":"In recent years, methods based on computer vision and deep learning become the mainstream approaches in fire detection. However, the expensive computation cost of 3D convolutional neutral network (CNN) is unbearable and it is difficult for them to capture the fire regions of videos in time. In this paper, we design a module named channel shuffle module (CSM) based on 2D CNN to keep the balance between computation cost and accuracy. By fusing RGB frame and differential frame, CSM improves the ability of 2D CNN in temporal information extraction which much less cost than methods based on 3D CNN. Four different structures of CSM are proposed and we choose the best one by experiment results. Also, experiments prove that the performances of TSN and TSM are improved with CSM in sequence classification. The accuracy of TSM with CSM is 99.2045%, false positive rate reaches 0.7890% and false negative rate reaches 0.4530%, which demonstrates the efficiency of CSM in temporal feature modeling.","PeriodicalId":354966,"journal":{"name":"Proceedings of the 5th International Conference on Computer Science and Application Engineering","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121645310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multimodal Emotion Recognition with Factorized Bilinear Pooling and Adversarial Learning","authors":"Haotian Miao, Yifei Zhang, Daling Wang, Shi Feng","doi":"10.1145/3487075.3487164","DOIUrl":"https://doi.org/10.1145/3487075.3487164","url":null,"abstract":"With the fast development of social networks, the massive growth of the number of multimodal data such as images and texts allows people have higher demands for information processing from an emotional perspective. Emotion recognition requires a higher ability for the computer to simulate high-level visual perception understanding. However, existing methods often focus on the single-modality investigation. In this work, we propose a multimodal model based on factorized bilinear pooling (FBP) and adversarial learning for emotion recognition. In our model, a multimodal feature fusion network is proposed to encode the inter-modality features under the guidance of the FBP to help the visual and textual feature representation learn from each other interactively. Beyond that, we propose an adversarial network by introducing two discriminative classification tasks, emotion recognition and multimodal fusion prediction. Our entire method can be implemented end-to-end by using a deep neural network framework. Experimental results indicate that our proposed model achieves competitive performance on the extended FI dataset. Progressive results prove the ability of our model for emotion recognition against other single- and multi-modality works respectively.","PeriodicalId":354966,"journal":{"name":"Proceedings of the 5th International Conference on Computer Science and Application Engineering","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125187049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A 6G Oriented High-Throughput Satellite Communication Demodulation Method","authors":"Zhijie Mao, Guangen Wu, Lin Zhou","doi":"10.1145/3487075.3487140","DOIUrl":"https://doi.org/10.1145/3487075.3487140","url":null,"abstract":"The integration of satellite communication system and 6G wireless system forms an ubiquitous and real global communication system, and the satellite communication capacity and data throughput will increase rapidly. A 6G oriented high-throughput satellite communication modulation and demodulation method is proposed. The method is not only suitable for MAPSK modulation and demodulation in nonlinear networks, moreover, the reliability and throughput of information transmission are improved. And the effectiveness of this method is verified by computer simulation.","PeriodicalId":354966,"journal":{"name":"Proceedings of the 5th International Conference on Computer Science and Application Engineering","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125516010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}