Junping He, Zongfeng He, W. Wang, Shenghui Wang, Zhibin Li
{"title":"Visual system design of tower crane based on improved YOLO","authors":"Junping He, Zongfeng He, W. Wang, Shenghui Wang, Zhibin Li","doi":"10.1145/3603781.3603923","DOIUrl":"https://doi.org/10.1145/3603781.3603923","url":null,"abstract":"In view of the defects of the existing tower crane visual system in Cottonwood, this paper proposes a scheme to connect the video camera and PC to local area network through routers, switches, wireless bridges and other devices. The video data real-time transmission is realized by integrating the Web control package of the camera in the upper computer and accessing the monitor screen through IP address. At the same time, in order to solve the problem of narrow scope and big blind area of traditional direct-viewing camera, a new hook detection algorithm based on improved YOLO is proposed and applied to tower crane safety monitoring system, get the ROI of the picture. The P and T parameters of the camera are calculated and the rotation of the spherical camera is controlled to realize intelligent tracking of the hook.","PeriodicalId":391180,"journal":{"name":"Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115041425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research and implementation of network impairment simulation system","authors":"Dongyan Zhang, Yuan-zhi Xu","doi":"10.1145/3603781.3603811","DOIUrl":"https://doi.org/10.1145/3603781.3603811","url":null,"abstract":"Network impairment simulation is designed to simulate different Internet network environments on a local area network(LAN) and provide testing environments for different services under various network conditions (latency, bandwidth limitations, network conflicts, etc.). This verifies the application in a real network environment. In this paper, we implement a system based on the Linux platform which communicate with the Linux kernel through netlink to achieve network damage simulation using the traffic control mechanism in Linux. In this simulation system, it also implements simulation according to certain network loss policies in besides implementing network delay, packet loss, speed limit, repetition, chaos, jitter, etc.. For network delay simulation, we proposed to use sparrow search algorithm-optimized long short-term memory(SSA-LSTM) algorithm to predict future delays using past network delay data. And to perform accurate simulation in the network impairment simulation system based on the results obtained from the prediction, which makes the network impairment simulation about delay more consistent with the real WAN environment. Finally, the experiment verifies the function of the network impairment simulation system.","PeriodicalId":391180,"journal":{"name":"Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127824696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Text Sentiment Analysis Method Based on Support Vector Machine And Long Short-term Memory Network","authors":"Lepeng Wang","doi":"10.1145/3603781.3603796","DOIUrl":"https://doi.org/10.1145/3603781.3603796","url":null,"abstract":"Machine learning is a hot technology today and plays a pivotal role in text sentiment analysis [1]. Text has complex properties such as semantic word order grammar and contextual relationship, so the accuracy of text sentiment analysis faces significant challenges. There are some classic methods in the industry for text sentiment analysis, such as Support Vector Machines (SVM) and Naive Bayes[2]. These methods are strongly related to feature extraction, with high complexity and average performance. With the development of neural network technology, people began to use neural network models for text sentiment analysis, but compared with traditional methods, neural network processing corpus is more accurate, but slower. Therefore, this paper adopts the method of combining classical algorithm model and neural network model for text sentiment analysis, which can improve the processing efficiency without changing the accuracy.","PeriodicalId":391180,"journal":{"name":"Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128545799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhiyi Zhu, Sheng Liu, Jianghai Shuai, Sidan Du, Yang Li
{"title":"3D Associative Embedding: Multi-View 3D Human Pose Estimation in Crowded Scenes","authors":"Zhiyi Zhu, Sheng Liu, Jianghai Shuai, Sidan Du, Yang Li","doi":"10.1145/3603781.3603804","DOIUrl":"https://doi.org/10.1145/3603781.3603804","url":null,"abstract":"Most of the existing multi-view multi-person 3D human pose estimation methods predict the location of each joint of one target person following a top-down paradigm after finding his region. However, these works neglect the interference of others’ joints in the region. When the scene is crowded and the target person is surrounded by others, the information of his joints tends to be disturbed which results in significant errors in 3D results. To overcome this problem, this paper takes advantage of a bottom-up method in 2D pose estimation. We incorporate the Associative Embedding method into 3D pose estimation and propose a Voxel Hourglass Network to predict 3D heatmaps along with 3D tag-maps. As a result, the adverse effects from surrounding persons can be eliminated through the difference between tags. Moreover, we design a three-stage coarse-to-fine framework which can effectively reduce the quantization error. The size of the search space drops at each stage while the resolution increases. We test our method on the CMU Panoptic dataset where it outperforms the related top-down methods.","PeriodicalId":391180,"journal":{"name":"Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121043556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Key Node Recognition Based on Community Discovery","authors":"Xinran Zhu, W. Liu, Zeyu Gu, Zihao Liu","doi":"10.1145/3603781.3603935","DOIUrl":"https://doi.org/10.1145/3603781.3603935","url":null,"abstract":"The network topology is difficult to reflect the service relationship between the device nodes, and cannot provide critical service nodes for DDos attacks. This paper introduces a Key Node recognition algorithm based on community discovery. The algorithm judges the ownership of the service community through the service mapping relationship between network nodes, and finds the key nodes of network services and the subordinate relationship between nodes. The algorithm finds the network core service node through the dual-connected core graph and node mapping degree. Then it expands the community according to the mapping relationship, and divide the boundary nodes into the community. In simulation experiments, the effectiveness of the algorithm is demonstrated by simulating denial of service attacks, which can provide correlation between node services.","PeriodicalId":391180,"journal":{"name":"Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121160637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An entity relation extraction method based on the fusion of contextual information","authors":"Xiangyang Nie, Zunwang Ke, Wushur Slam","doi":"10.1145/3603781.3603909","DOIUrl":"https://doi.org/10.1145/3603781.3603909","url":null,"abstract":"With the growth of information technology, numerous entity relation extraction methods have developed. However, current studies primarily emphasize effective entity recognition, disregarding the significance of local information about entities in text on relation extraction and only acknowledging the presence of a singular relationship. To address this, a proposed entity relation extraction method based on the fusion of contextual information integrates Bi-RNN to further extract sentence vectors encoded by BERT.The model combining local information about entities with context, facilitating multi-relation classification through a biaffine classifier. Additionally, the model reduces the dimensionality of fused information to capture more effective information. Negative sampling is also introduced to enhance generalization capabilities. The model outperforms existing works in multiple public datasets.","PeriodicalId":391180,"journal":{"name":"Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121351798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cross-layer Bandwidth and Antenna Configuration for Smart Grid under MIMO Transmission","authors":"Yixuan Zhang, Nan Liu, Zhiwen Pan","doi":"10.1145/3603781.3603918","DOIUrl":"https://doi.org/10.1145/3603781.3603918","url":null,"abstract":"This paper studies the statistical observability of the power grid with multiple-input multiple-output (MIMO) transmission while satisfying the QoS requirement, which is characterized by effective capacity. The problem is to maximize the observability of the power grid over all possible bandwidth allocation, antenna configuration, and the QoS exponent for each PMU. To solve the proposed optimization problem, an alternating optimization algorithm is adopted, where, the simulated annealing algorithm is applied to conduct the antenna configuration, and the deep Q-network (DQN) is adopted to conduct bandwidth allocation. Numerical results demonstrate bandwidth and antenna savings of the proposed algorithm compared with equal allocation scheme.","PeriodicalId":391180,"journal":{"name":"Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122014650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Siyi Pan, Aoxiang Sun, Yingmei Xu, Zhuoqian Liang, Yuxia Sun
{"title":"Generation of Adversarial Malware Based on Genetic Algorithm and Instruction Replacement","authors":"Siyi Pan, Aoxiang Sun, Yingmei Xu, Zhuoqian Liang, Yuxia Sun","doi":"10.1145/3603781.3604217","DOIUrl":"https://doi.org/10.1145/3603781.3604217","url":null,"abstract":"With the development of cyberspace security attack and defense, the malware detection model based on machine learning is also facing the threat of adversarial examples. An important way to defend against such threats is to generate effective adversarial examples and then use them to conduct adversarial training on the model. For the end-to-end PE malware detection model, most of the existing generation technologies for adversarial examples adopt the method of inserting dead codes, but the dead codes are easy to be filtered out by preprocessing. A novel adversarial-example generation approach for PE malware, called AGA, is proposed based on a genetic algorithm and equivalent-instruction replacement. The experimental studies show that the AGA approach outperforms the existing generation approach, which is based on a particle-swarm-optimization algorithm, in terms of attack effectiveness and attack-generation efficiency.","PeriodicalId":391180,"journal":{"name":"Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116135793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Sangi, Lokeshwari Anamalamudi, Satish Anamalamudi, Anil Carie, M. Enduri
{"title":"A novel approach to minimize the Black Hole attacks in Vehicular IoT Networks","authors":"A. Sangi, Lokeshwari Anamalamudi, Satish Anamalamudi, Anil Carie, M. Enduri","doi":"10.1145/3603781.3603931","DOIUrl":"https://doi.org/10.1145/3603781.3603931","url":null,"abstract":"Vehicular Ad-hoc IoT Networks (VA-IOT) have gained significant attention due to their ability to enable the distributed data transmission between vehicles to vehicle. However, VA-IOT are susceptible to various security threats, including the Black Hole attack. With Black Hole attacks, an intruder or malicious node attracts the internet traffic by broadcasting fake messages and drops all the received packets, which can significantly impact the network's performance. To mitigate, this paper presents an new mechanism to minimize the Black Hole attack on VANETs by combining two techniques: a trust management system and an intrusion detection system. The proposed approach involves assigning trust values to each vehicle based on their past behavior and routing packets through only trusted nodes. Additionally, an intrusion detection system is used to identify malicious nodes that violate the trust threshold and to take appropriate measures. The performance of the proposed approach is outperformed in terms of achievable end-to-end throughput and minimized network delays.","PeriodicalId":391180,"journal":{"name":"Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126423719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lv-bin Fan, Huaqing Li, Songyang Li, Zhe Li, Lifeng Zheng, Jun Yu Li
{"title":"Distributed Operator-Splitting Algorithm for Seeking GNE Aggregative Game","authors":"Lv-bin Fan, Huaqing Li, Songyang Li, Zhe Li, Lifeng Zheng, Jun Yu Li","doi":"10.1145/3603781.3603831","DOIUrl":"https://doi.org/10.1145/3603781.3603831","url":null,"abstract":"In this paper, we proposes a distributed algorithm to seek the generalized Nash equilibria (GNE) problem. We consider aggregative games with affine coupling constraint. In the game, the agent can only interact with neighboring agents. The cost of each agent depends on some aggregate effect of the actions of all the other agents, without the need for multiple communication between agents. The convergence of the algorithm is carried out by the transformation of consensus subspace and the invariance of aggregative estimation.","PeriodicalId":391180,"journal":{"name":"Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127005278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}