Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things最新文献

筛选
英文 中文
Visual system design of tower crane based on improved YOLO 基于改进YOLO的塔机视觉系统设计
Junping He, Zongfeng He, W. Wang, Shenghui Wang, Zhibin Li
{"title":"Visual system design of tower crane based on improved YOLO","authors":"Junping He, Zongfeng He, W. Wang, Shenghui Wang, Zhibin Li","doi":"10.1145/3603781.3603923","DOIUrl":"https://doi.org/10.1145/3603781.3603923","url":null,"abstract":"In view of the defects of the existing tower crane visual system in Cottonwood, this paper proposes a scheme to connect the video camera and PC to local area network through routers, switches, wireless bridges and other devices. The video data real-time transmission is realized by integrating the Web control package of the camera in the upper computer and accessing the monitor screen through IP address. At the same time, in order to solve the problem of narrow scope and big blind area of traditional direct-viewing camera, a new hook detection algorithm based on improved YOLO is proposed and applied to tower crane safety monitoring system, get the ROI of the picture. The P and T parameters of the camera are calculated and the rotation of the spherical camera is controlled to realize intelligent tracking of the hook.","PeriodicalId":391180,"journal":{"name":"Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115041425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research and implementation of network impairment simulation system 网络损伤仿真系统的研究与实现
Dongyan Zhang, Yuan-zhi Xu
{"title":"Research and implementation of network impairment simulation system","authors":"Dongyan Zhang, Yuan-zhi Xu","doi":"10.1145/3603781.3603811","DOIUrl":"https://doi.org/10.1145/3603781.3603811","url":null,"abstract":"Network impairment simulation is designed to simulate different Internet network environments on a local area network(LAN) and provide testing environments for different services under various network conditions (latency, bandwidth limitations, network conflicts, etc.). This verifies the application in a real network environment. In this paper, we implement a system based on the Linux platform which communicate with the Linux kernel through netlink to achieve network damage simulation using the traffic control mechanism in Linux. In this simulation system, it also implements simulation according to certain network loss policies in besides implementing network delay, packet loss, speed limit, repetition, chaos, jitter, etc.. For network delay simulation, we proposed to use sparrow search algorithm-optimized long short-term memory(SSA-LSTM) algorithm to predict future delays using past network delay data. And to perform accurate simulation in the network impairment simulation system based on the results obtained from the prediction, which makes the network impairment simulation about delay more consistent with the real WAN environment. Finally, the experiment verifies the function of the network impairment simulation system.","PeriodicalId":391180,"journal":{"name":"Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127824696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Text Sentiment Analysis Method Based on Support Vector Machine And Long Short-term Memory Network 基于支持向量机和长短期记忆网络的文本情感分析方法
Lepeng Wang
{"title":"Text Sentiment Analysis Method Based on Support Vector Machine And Long Short-term Memory Network","authors":"Lepeng Wang","doi":"10.1145/3603781.3603796","DOIUrl":"https://doi.org/10.1145/3603781.3603796","url":null,"abstract":"Machine learning is a hot technology today and plays a pivotal role in text sentiment analysis [1]. Text has complex properties such as semantic word order grammar and contextual relationship, so the accuracy of text sentiment analysis faces significant challenges. There are some classic methods in the industry for text sentiment analysis, such as Support Vector Machines (SVM) and Naive Bayes[2]. These methods are strongly related to feature extraction, with high complexity and average performance. With the development of neural network technology, people began to use neural network models for text sentiment analysis, but compared with traditional methods, neural network processing corpus is more accurate, but slower. Therefore, this paper adopts the method of combining classical algorithm model and neural network model for text sentiment analysis, which can improve the processing efficiency without changing the accuracy.","PeriodicalId":391180,"journal":{"name":"Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128545799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
3D Associative Embedding: Multi-View 3D Human Pose Estimation in Crowded Scenes 三维关联嵌入:拥挤场景中的多视图三维人体姿态估计
Zhiyi Zhu, Sheng Liu, Jianghai Shuai, Sidan Du, Yang Li
{"title":"3D Associative Embedding: Multi-View 3D Human Pose Estimation in Crowded Scenes","authors":"Zhiyi Zhu, Sheng Liu, Jianghai Shuai, Sidan Du, Yang Li","doi":"10.1145/3603781.3603804","DOIUrl":"https://doi.org/10.1145/3603781.3603804","url":null,"abstract":"Most of the existing multi-view multi-person 3D human pose estimation methods predict the location of each joint of one target person following a top-down paradigm after finding his region. However, these works neglect the interference of others’ joints in the region. When the scene is crowded and the target person is surrounded by others, the information of his joints tends to be disturbed which results in significant errors in 3D results. To overcome this problem, this paper takes advantage of a bottom-up method in 2D pose estimation. We incorporate the Associative Embedding method into 3D pose estimation and propose a Voxel Hourglass Network to predict 3D heatmaps along with 3D tag-maps. As a result, the adverse effects from surrounding persons can be eliminated through the difference between tags. Moreover, we design a three-stage coarse-to-fine framework which can effectively reduce the quantization error. The size of the search space drops at each stage while the resolution increases. We test our method on the CMU Panoptic dataset where it outperforms the related top-down methods.","PeriodicalId":391180,"journal":{"name":"Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121043556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Key Node Recognition Based on Community Discovery 基于社区发现的关键节点识别
Xinran Zhu, W. Liu, Zeyu Gu, Zihao Liu
{"title":"Key Node Recognition Based on Community Discovery","authors":"Xinran Zhu, W. Liu, Zeyu Gu, Zihao Liu","doi":"10.1145/3603781.3603935","DOIUrl":"https://doi.org/10.1145/3603781.3603935","url":null,"abstract":"The network topology is difficult to reflect the service relationship between the device nodes, and cannot provide critical service nodes for DDos attacks. This paper introduces a Key Node recognition algorithm based on community discovery. The algorithm judges the ownership of the service community through the service mapping relationship between network nodes, and finds the key nodes of network services and the subordinate relationship between nodes. The algorithm finds the network core service node through the dual-connected core graph and node mapping degree. Then it expands the community according to the mapping relationship, and divide the boundary nodes into the community. In simulation experiments, the effectiveness of the algorithm is demonstrated by simulating denial of service attacks, which can provide correlation between node services.","PeriodicalId":391180,"journal":{"name":"Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121160637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An entity relation extraction method based on the fusion of contextual information 一种基于上下文信息融合的实体关系提取方法
Xiangyang Nie, Zunwang Ke, Wushur Slam
{"title":"An entity relation extraction method based on the fusion of contextual information","authors":"Xiangyang Nie, Zunwang Ke, Wushur Slam","doi":"10.1145/3603781.3603909","DOIUrl":"https://doi.org/10.1145/3603781.3603909","url":null,"abstract":"With the growth of information technology, numerous entity relation extraction methods have developed. However, current studies primarily emphasize effective entity recognition, disregarding the significance of local information about entities in text on relation extraction and only acknowledging the presence of a singular relationship. To address this, a proposed entity relation extraction method based on the fusion of contextual information integrates Bi-RNN to further extract sentence vectors encoded by BERT.The model combining local information about entities with context, facilitating multi-relation classification through a biaffine classifier. Additionally, the model reduces the dimensionality of fused information to capture more effective information. Negative sampling is also introduced to enhance generalization capabilities. The model outperforms existing works in multiple public datasets.","PeriodicalId":391180,"journal":{"name":"Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121351798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cross-layer Bandwidth and Antenna Configuration for Smart Grid under MIMO Transmission MIMO传输下智能电网的跨层带宽和天线配置
Yixuan Zhang, Nan Liu, Zhiwen Pan
{"title":"Cross-layer Bandwidth and Antenna Configuration for Smart Grid under MIMO Transmission","authors":"Yixuan Zhang, Nan Liu, Zhiwen Pan","doi":"10.1145/3603781.3603918","DOIUrl":"https://doi.org/10.1145/3603781.3603918","url":null,"abstract":"This paper studies the statistical observability of the power grid with multiple-input multiple-output (MIMO) transmission while satisfying the QoS requirement, which is characterized by effective capacity. The problem is to maximize the observability of the power grid over all possible bandwidth allocation, antenna configuration, and the QoS exponent for each PMU. To solve the proposed optimization problem, an alternating optimization algorithm is adopted, where, the simulated annealing algorithm is applied to conduct the antenna configuration, and the deep Q-network (DQN) is adopted to conduct bandwidth allocation. Numerical results demonstrate bandwidth and antenna savings of the proposed algorithm compared with equal allocation scheme.","PeriodicalId":391180,"journal":{"name":"Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122014650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generation of Adversarial Malware Based on Genetic Algorithm and Instruction Replacement 基于遗传算法和指令替换的对抗恶意软件生成
Siyi Pan, Aoxiang Sun, Yingmei Xu, Zhuoqian Liang, Yuxia Sun
{"title":"Generation of Adversarial Malware Based on Genetic Algorithm and Instruction Replacement","authors":"Siyi Pan, Aoxiang Sun, Yingmei Xu, Zhuoqian Liang, Yuxia Sun","doi":"10.1145/3603781.3604217","DOIUrl":"https://doi.org/10.1145/3603781.3604217","url":null,"abstract":"With the development of cyberspace security attack and defense, the malware detection model based on machine learning is also facing the threat of adversarial examples. An important way to defend against such threats is to generate effective adversarial examples and then use them to conduct adversarial training on the model. For the end-to-end PE malware detection model, most of the existing generation technologies for adversarial examples adopt the method of inserting dead codes, but the dead codes are easy to be filtered out by preprocessing. A novel adversarial-example generation approach for PE malware, called AGA, is proposed based on a genetic algorithm and equivalent-instruction replacement. The experimental studies show that the AGA approach outperforms the existing generation approach, which is based on a particle-swarm-optimization algorithm, in terms of attack effectiveness and attack-generation efficiency.","PeriodicalId":391180,"journal":{"name":"Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116135793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel approach to minimize the Black Hole attacks in Vehicular IoT Networks 最小化车辆物联网网络黑洞攻击的新方法
A. Sangi, Lokeshwari Anamalamudi, Satish Anamalamudi, Anil Carie, M. Enduri
{"title":"A novel approach to minimize the Black Hole attacks in Vehicular IoT Networks","authors":"A. Sangi, Lokeshwari Anamalamudi, Satish Anamalamudi, Anil Carie, M. Enduri","doi":"10.1145/3603781.3603931","DOIUrl":"https://doi.org/10.1145/3603781.3603931","url":null,"abstract":"Vehicular Ad-hoc IoT Networks (VA-IOT) have gained significant attention due to their ability to enable the distributed data transmission between vehicles to vehicle. However, VA-IOT are susceptible to various security threats, including the Black Hole attack. With Black Hole attacks, an intruder or malicious node attracts the internet traffic by broadcasting fake messages and drops all the received packets, which can significantly impact the network's performance. To mitigate, this paper presents an new mechanism to minimize the Black Hole attack on VANETs by combining two techniques: a trust management system and an intrusion detection system. The proposed approach involves assigning trust values to each vehicle based on their past behavior and routing packets through only trusted nodes. Additionally, an intrusion detection system is used to identify malicious nodes that violate the trust threshold and to take appropriate measures. The performance of the proposed approach is outperformed in terms of achievable end-to-end throughput and minimized network delays.","PeriodicalId":391180,"journal":{"name":"Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126423719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed Operator-Splitting Algorithm for Seeking GNE Aggregative Game 求解GNE聚集博弈的分布式算子分割算法
Lv-bin Fan, Huaqing Li, Songyang Li, Zhe Li, Lifeng Zheng, Jun Yu Li
{"title":"Distributed Operator-Splitting Algorithm for Seeking GNE Aggregative Game","authors":"Lv-bin Fan, Huaqing Li, Songyang Li, Zhe Li, Lifeng Zheng, Jun Yu Li","doi":"10.1145/3603781.3603831","DOIUrl":"https://doi.org/10.1145/3603781.3603831","url":null,"abstract":"In this paper, we proposes a distributed algorithm to seek the generalized Nash equilibria (GNE) problem. We consider aggregative games with affine coupling constraint. In the game, the agent can only interact with neighboring agents. The cost of each agent depends on some aggregate effect of the actions of all the other agents, without the need for multiple communication between agents. The convergence of the algorithm is carried out by the transformation of consensus subspace and the invariance of aggregative estimation.","PeriodicalId":391180,"journal":{"name":"Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127005278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信