{"title":"Accounts Receivable Financing and Supply Chain Coordination under the Government Subsidy","authors":"Shengying Zhao, Xiangyuan Lu","doi":"10.1109/ICIST52614.2021.9440590","DOIUrl":"https://doi.org/10.1109/ICIST52614.2021.9440590","url":null,"abstract":"With respect to a two-echelon supply chain which comprised of a core manufacturer and a capital-constrained supplier, this paper analyzed the effect of government subsidy to the accounts receivable financing in the context of third-party partial guarantee. Based on the decentralized decision-making model without and with government subsidy, from the perspective of promoting the guarantee coefficient of the third-party guarantee, this paper studied how government subsidy impacts the supply chain coordination. The results show that government subsidy can reduce financing risks and costs, but not the bigger the better. Supplier’s profit, manufacturer’s profit and whole supply chain profit Pareto is also improved. In the range of a reasonable government subsidy coefficient, the higher government subsidy coefficient, the higher supply chain financing efficiency and supply chain coordination. Finally, this paper conducts some numerical experiments to verify the results.","PeriodicalId":371599,"journal":{"name":"2021 11th International Conference on Information Science and Technology (ICIST)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116911753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Continuous-Time Algorithm for Multi-Agent Optimization with Global Coupled Constraints","authors":"Jiaojiao Yan, Jinde Cao, Qingshan Liu","doi":"10.1109/ICIST52614.2021.9440624","DOIUrl":"https://doi.org/10.1109/ICIST52614.2021.9440624","url":null,"abstract":"This paper studies a class of multi-agent optimization problems with coupled equality and inequality constraints, where the objective function is the sum of local functions known only by local agent itself. In addition, the local objective functions and constraint function in the problem are convex, not necessarily smooth, nor necessarily strongly convex or strictly convex. Compared with optimization problems with non-coupled inequality constraints, the optimization problem studied in this paper is a broader category. The continuous-time algorithm for solving the problem is designed using the Karush-Kuhn-Tucker (KKT) condition in the optimization theory, and when the initial point satisfies certain conditions, the convergence of the algorithm is proved by the principle of set-valued LaSalle invariance. Numerical example illustrates the performance of the proposed algorithm.","PeriodicalId":371599,"journal":{"name":"2021 11th International Conference on Information Science and Technology (ICIST)","volume":"527 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124495703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Self-triggered Impulsive Synchronization of Multi-agent Systems with Encrypted Communication*","authors":"Xuegang Tan, Jinde Cao","doi":"10.1109/ICIST52614.2021.9440569","DOIUrl":"https://doi.org/10.1109/ICIST52614.2021.9440569","url":null,"abstract":"This paper discusses the self-triggered impulsive synchronization of multi-agent systems (MASs) with encrypted communication. Using a chaotic encrypted scheme, the sampling data will be encrypted before communicating, and the encrypted data will be decrypted when an agent received these encrypted data from its neighbors and utilized into the event-based impulsive controller to realize the state synchronization of MASs. This scheme has a distinct superiority to solve the privacy protection of agents, and a simulation is given to demonstrate the effectiveness of the obtained results.","PeriodicalId":371599,"journal":{"name":"2021 11th International Conference on Information Science and Technology (ICIST)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126284876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Opinion Targets and Sentiment Terms Extraction based on Self-Attention","authors":"Guoyong Cai, Hongyu Li, Tianlin Lan","doi":"10.1109/ICIST52614.2021.9440579","DOIUrl":"https://doi.org/10.1109/ICIST52614.2021.9440579","url":null,"abstract":"Opinion targets and sentiment terms extraction is a key task in aspect-level sentiment analysis. Existing researches have shown that using the dependency structures of reviews helps to complete the task. In this paper, we present a novel opinion targets and sentiment terms extraction model based on self-attention. The proposed model learns the contextual feature of each token in a review through a LSTM network, and a self-attention mechanism is used to directly capture the relations between any two tokens in a review, thus the global dependencies and internal structure of reviews can be modeled better. Experiments results on two benchmark datasets show that the proposed model achieves a better performance than current state-of-the-art in opinion targets and sentiment terms extraction task.","PeriodicalId":371599,"journal":{"name":"2021 11th International Conference on Information Science and Technology (ICIST)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132849051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Hungarian-based Heuristic for Dual-command Storage/Retrieval in Single-machine Flow-rack AS/RS with Determined Locations","authors":"Tingyu Zhang, Zhuxi Chen, Li Li","doi":"10.1109/ICIST52614.2021.9440613","DOIUrl":"https://doi.org/10.1109/ICIST52614.2021.9440613","url":null,"abstract":"The single-machine flow-rack (SMFR) automated storage and retrieval system (AS/RS) has high storage density, high utilization of floor space, low investment cost, and low operation cost. Based on the determined storage and retrieval locations, the generation of dual-command cycle (DC) operation in the SMFR AS/RS can be modeled as an assignment problem, which can be solved by the Hungarian method. Therefore, a novel heuristic, denoted as LSH (Less-Shelves Hungarian), modified from Hungarian is proposed in this paper to generate high performance DC operations in SMFR AS/RS with determined storage and retrieval locations. The aim of the proposing heuristic is to minimize the total travel time of storage and retrieval operations. Simulation experiments are executed to analyze and evaluate the performance of LSH. Experimental results verify that the proposed heuristic has better effectiveness and efficiency than existed heuristic for the same problem.","PeriodicalId":371599,"journal":{"name":"2021 11th International Conference on Information Science and Technology (ICIST)","volume":"1998 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131153392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal Algorithm of Dual-satellite Navigation Information Based on Inertial Assistance","authors":"Wei Ren, Yingjie Wei, Cong Wang","doi":"10.1109/ICIST52614.2021.9440577","DOIUrl":"https://doi.org/10.1109/ICIST52614.2021.9440577","url":null,"abstract":"Aiming at the application scenarios of the Global Navigation Satellite System (GNSS)/Strapdown inertial navigation system (SINS) integrated navigation algorithm for some special aircraft or some vehicles with high reliability requirements, this article selects two or more satellite navigation receivers to ensure satellite navigation For the reliable application of information, a dual-satellite navigation information optimization algorithm based on inertial assistance is designed. This algorithm designs navigation information availability criteria based on inertial information, navigation information tightening protection criteria, and two-way satellite navigation information selection criteria. On the one hand, it makes full use of inertial information, and on the other hand, it fully considers receiver performance indicators. Based on the principle of whoever locates first and use whoever is first, complete the optimal selection of dual-satellite navigation information sources, thereby improving the reliability and redundancy of satellite navigation information. Finally, the effectiveness of the information source selection algorithm is verified by simulation, and the algorithm can be promoted It is applied to the process of selecting the best use of the two information sources of guidance radar and seeker.","PeriodicalId":371599,"journal":{"name":"2021 11th International Conference on Information Science and Technology (ICIST)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133373420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-UAVs Task Assignment Based on Fully Adaptive Cross-Entropy Algorithm","authors":"Xun Zhang, Kehao Wang, Wenfeng Dai","doi":"10.1109/ICIST52614.2021.9440618","DOIUrl":"https://doi.org/10.1109/ICIST52614.2021.9440618","url":null,"abstract":"Multi-UAVs task assignment is regarded as an important problem in the UAV research domain. To assign multi-UAVs tasks efficiently and accurately, a common method of assigning tasks is needed with resource constraints and precedence constraint. Then, we apply fully adaptive cross-entropy (FACE) algorithm to multi-UAVs task assignment, and the resources and the sequence required for three tasks are also taken into account. Through emphasizing the iterative principle of FACE algorithm and utilizing it to handle the multi-UAVs task assignment problem with constraints, the simulations validate that compared with the cross-entropy method and the particle swarm optimization algorithm, the FACE algorithm has fast convergence speed and the strength to solve large-scale allocation problems.","PeriodicalId":371599,"journal":{"name":"2021 11th International Conference on Information Science and Technology (ICIST)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124743870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Parallelization of Fast Monte Carlo Dose Calculation for Radiotherapy Treatment Planning on the ARMv8 Architecture","authors":"Chi Jin, Qinglin Wang, Yang Zhao, Y. Dou","doi":"10.1109/ICIST52614.2021.9440606","DOIUrl":"https://doi.org/10.1109/ICIST52614.2021.9440606","url":null,"abstract":"Monte Carlo (MC) simulation plays a key role in radiotherapy. Since the simulation time of the MC program cannot fully meet the clinical requirements, we use the ARM-based FT-2000+ multi-core processor for parallelization, which provides an effective solution for accelerating MC dose calculation. In this paper, we implement and verify FT-DPM, which is an OpenMP-based MC Dose Planning Method on FT-2000+. FT-DPM utilizes the parallelism of MC simulation and the advantage of ARM architecture to achieve the parallelization on ARM architecture. Meanwhile, we optimize the original DPM program in terms of memory allocation, data structure and data type. The experiments show that, compared with the original DPM code, FT-DPM obtains very accurate results and reaches the maximum speedups of 155.94 times for the electron case. The parallel program based on FT-2000+ only takes 44.1 seconds to simulate the particle transport of 100 million times, showing good clinical application potential. In addition, the speedup and efficiency of FT-DPM running on different core counts are also discussed.","PeriodicalId":371599,"journal":{"name":"2021 11th International Conference on Information Science and Technology (ICIST)","volume":"23 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124876008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reversible data hiding method in encrypted images using secret sharing and Huffman coding","authors":"Shuang Yi, Juan Zhou, Zhongyun Hua, Yong Xiang","doi":"10.1109/ICIST52614.2021.9440649","DOIUrl":"https://doi.org/10.1109/ICIST52614.2021.9440649","url":null,"abstract":"Early works on reversible data hiding in encrypted images (RDHEI) usually generate only one encrypted image from the original image, if the encrypted image is lost or maliciously damaged by an attacker, all information about the original image will be lost. Thus, storing images in distributed servers is an effective solution. Therefore, this paper proposes an RDHEI method using (k, n)-threshold secret sharing. It is not a traditional secret sharing technique, but takes its principles and ideas. In this algorithm, we combine the image encryption and sharing process to generate n shares and send them to the cloud for storage. It maintains the advantage of (k, n)-threshold secret sharing technique that only at least k shares can successfully recover the original image while less than k shares cannot. In addition, the size of each share is smaller than the original image, so that it can save storage spaces. By Huffman coding the pixel difference in the encrypted image block, secret data are embedded into these shares. It is a full reversible method that data extraction and image recovery are performed separately and losslessly. Simulation results, comparisons and security analysis are demonstrated to show superior performances of the proposed algorithm.","PeriodicalId":371599,"journal":{"name":"2021 11th International Conference on Information Science and Technology (ICIST)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125237939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ye Li, Xiaoyu Luo, Shaoqi Hou, Chao Li, Guangqiang Yin
{"title":"End-to-end Network Embedding Unsupervised Key Frame Extraction for Video-based Person Re-identification","authors":"Ye Li, Xiaoyu Luo, Shaoqi Hou, Chao Li, Guangqiang Yin","doi":"10.1109/ICIST52614.2021.9440586","DOIUrl":"https://doi.org/10.1109/ICIST52614.2021.9440586","url":null,"abstract":"At present, regarding the task of video-based person re-identification, the input sequences have subtle differences and large redundancies because there are not enough effective interventions in the extraction of frame sequences. Although some studies have mentioned that key frame should be extracted first, they have not jointed the key frame extraction and the person re-identification. Consequently, it is difficult to evaluate whether the extracted key frames are effective for person re-identification. In this paper, we introduce an End-to-end Network Embedding Unsupervised Key Frame Extraction (EKEN) to address the above problems. First, we design a key frame extraction module and train it using pseudo labels generated by hierarchical clustering to extract key frames. Second, we embed the key frame extraction module into the person re-identification task. The results of the key frame extraction and the pedestrian re-recognition are fed back to each other in time. The instant feedback promotes the synchronization optimization of these two modules. The mAP achieved by our method in the MARS dataset is improved by 0.7%, 2.9%, 2.1% and 2.3% over the methods based on Random, Evenly, Cluster and Frame difference, respectively. Particularly, our method is more fit for the real-world application comparing to existing methods.","PeriodicalId":371599,"journal":{"name":"2021 11th International Conference on Information Science and Technology (ICIST)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115925816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}