{"title":"Graph Attention Network Fraud Detection Based On Feature Aggregation","authors":"T. Zhang, Senyu Gao","doi":"10.1109/iip57348.2022.00063","DOIUrl":"https://doi.org/10.1109/iip57348.2022.00063","url":null,"abstract":"With the rapid development of digitalization in the financial industry, fraud detection has become an important task to ensure safe development. In traditional fraud detection tasks, training and prediction are often only based on the dimensional characteristics of a single sample, but with the development of digitization and fraud methods, these methods are often no longer applicable. In addition, there are rich information associations between users themselves, which makes a large social network graph between users. In this regard, based on the Dgraph-Fin dataset, this paper uses the relationship network formed between users to better learn the weights between different edges through feature aggregation and attention mechanism. The experimental results show that compared with the existing baselines Accuracy and validity have been improved.","PeriodicalId":412907,"journal":{"name":"2022 4th International Conference on Intelligent Information Processing (IIP)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125348630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on MPTCP Protocol Based on Erasure Codes","authors":"Yang Song, Yaqi Yuan, Yubin Chen","doi":"10.1109/iip57348.2022.00064","DOIUrl":"https://doi.org/10.1109/iip57348.2022.00064","url":null,"abstract":"Live broadcasting has higher requirements for uplink technology due to the increasing frame rate of video, and the introduction of virtual reality technology makes it challenging for a single link network to match the high speed and big bandwidth data transmission needs of most consumers. To efficiently aggregate bandwidth resources and enhance communication quality, parallel transmission can be realized via the channels of several heterogeneous networks. However, because the linkages in heterogeneous networks are complicated and of varying quality, effective communication cannot be guaranteed in these networks. This research suggests a virtual channel division-based network coding technique for EC(Erasure Codes). The MPTCP (multi-path TCP) communication quality is ensured, and the fault tolerance rate of communication in complicated environments is improved, thanks to the network coding’s high fault tolerance and the virtual channel’s load balancing capabilities. The technique reduces the time by 34%, according to the simulation results in NS3.","PeriodicalId":412907,"journal":{"name":"2022 4th International Conference on Intelligent Information Processing (IIP)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126634262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiaona Kang, Xiqiao Kang, Shaozhen Wang, Jiguo Chai, S. Shen, Mingju Mao
{"title":"IOT Application-Intelligent Tracking Car SPRESENSE-Base","authors":"Xiaona Kang, Xiqiao Kang, Shaozhen Wang, Jiguo Chai, S. Shen, Mingju Mao","doi":"10.1109/iip57348.2022.00080","DOIUrl":"https://doi.org/10.1109/iip57348.2022.00080","url":null,"abstract":"This paper mainly describe the design and implementation of the intelligent tracking car system SPRESENSE-base. The system support sending instructions through image recognition; support sending instructions through intelligent voice control; support intelligently tracking through PID algorithm; support fetching and placing goods through the mechanical arm. This article take this system as example to study how to design and implement the intelligent tracking car system. It works under Linux system.The system use Sony SPRESENSE as the development board, using grayscale sensors for collecting the recognition and adopt PID algorithm to realize intelligent tracking; using the mechanical arm to realize the fetch and place objects. After one year of hard work, this system is completed successful.","PeriodicalId":412907,"journal":{"name":"2022 4th International Conference on Intelligent Information Processing (IIP)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124384015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and development of High voltage power and vacuum system for proton transfer reaction mass spectrometry","authors":"Min Ren, Ji-Wen Chen, Ming Li","doi":"10.1109/IIP57348.2022.00035","DOIUrl":"https://doi.org/10.1109/IIP57348.2022.00035","url":null,"abstract":"Proton transfer reaction mass spectrometry (PTRMS) is a kind of mass spectrometry based on chemical ionization. The ion source and drift tube of PTR-MS are supplied by DC high voltage, and the instrument only run stably in a high vacuum environment. In order to ensure the safe and stable operation of the instrument, this paper designs a power supply and vacuum control system based on LPC1788 chip, and uses CAN bus to realize the communication between the host computer and the main controller. It was applied to PTR-MS developed in laboratory.","PeriodicalId":412907,"journal":{"name":"2022 4th International Conference on Intelligent Information Processing (IIP)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123667348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Siamese Network Fusion Time-Frequency Domain Features for Mental Workload Level Identification","authors":"Jiaqing Yan, Danyun Li, Jinzhao Deng, Hongya Wang, Zhou Long, Wenhao Sun, Weiqi Xue, Qingqi Zhou, Gengchen Liu","doi":"10.1109/iip57348.2022.00007","DOIUrl":"https://doi.org/10.1109/iip57348.2022.00007","url":null,"abstract":"Mental workload level can reflect subjects’ personal ability. In addition, continuous high level of mental workload can reduce subjects’ performance level, so it is necessary to detect subjects’ mental workload level in the time. In this paper, we propose a CNN model for time-frequency analysis based on Siamese networks (Siamese-EEGNet), in which the original Electroencephalogram (EEG) signal and the Power Spectral Density (PSD) of the signal are used as model inputs, and the features of the signal are extracted layer by layer through convolutional layers. Using P3 as a measure, the model is pretrained on a large volume data set using transfer learning, and successfully transfer to a smaller volume data set with mental workload level by fine-tuning the model parameters. SiameseEEGNet is able to consider both time domain and frequency domain information in the data, which is suitable for EEG structure characteristics. In practical completion, it can detect the mental workload level of subjects, measure their individual ability and improve their performance level.","PeriodicalId":412907,"journal":{"name":"2022 4th International Conference on Intelligent Information Processing (IIP)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122694141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Harmonic and Interharmonic Detection and Analysis of Neural Network Power System Based on Big Data","authors":"Weixin Livi, Xia Pan, Xiaolei Zhang, Bingde Duan","doi":"10.1109/iip57348.2022.00065","DOIUrl":"https://doi.org/10.1109/iip57348.2022.00065","url":null,"abstract":"Aiming at the low measurement accuracy and poor time lag of traditional power system harmonic and interharmonic detection methods, a new power harmonic detection method is proposed, namely, the neural network power system harmonic detection analysis based on big data. It combines wavelet transform with artificial neural network, uses wavelet transform to extract the characteristic components in the signal. And then separates and extracts the different frequency band signals, and then uses the corresponding artificial neural network to analyze and identify the extracted frequency band signals to obtain each Harmonic type, amplitude and phase parameters in the hierarchy. The final simulation experiment shows that this research proposes to combine wavelet transform with artificial neural network to give full play to the time and frequency locality advantages of wavelet transform, as well as the advantages of artificial neural network self-adaptability and model maximum value advantages, which are effective for periodic changes and interference in electric power. It has strong tracking performance and recognition ability, which further shows that the power harmonic detection method proposed in this study is feasible and effective.","PeriodicalId":412907,"journal":{"name":"2022 4th International Conference on Intelligent Information Processing (IIP)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125217131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Object detection algorithm based on fusion of spatial information","authors":"Youbing Hu","doi":"10.1109/iip57348.2022.00060","DOIUrl":"https://doi.org/10.1109/iip57348.2022.00060","url":null,"abstract":"Aiming at the problem that the small target size is small and the feature extraction is difficult, which leads to the poor detection effect of small target, this paper proposes a target detection algorithm based on the fusion of spatial information. Firstly, this paper takes the single-stage target detection algorithm yolov5 as the basic model, and adds a spatial information detection network module to solve the problem that the features of small targets are gradually reduced or completely lost in down-sample, so as to retain more spatial information in the low-level network. Secondly, in the feature fusion part, multiscale feature fusion module is used to fuse high-level semantic information and low-level spatial information, so as to locate small targets more accurately. Finally, the fusion features are used for the detection task to improve the accuracy of small target detection. The experimental results show that the Mean Average Precision (mAP) value detected on the COCO test set reaches 42%, which proves the effectiveness of the algorithm for small target detection.","PeriodicalId":412907,"journal":{"name":"2022 4th International Conference on Intelligent Information Processing (IIP)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131425482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on the named entity recognition method implementation for food safety","authors":"Qi Wang, Yuntao Shi, J. Li, Shuqin Li, Meng Zhou","doi":"10.1109/iip57348.2022.00011","DOIUrl":"https://doi.org/10.1109/iip57348.2022.00011","url":null,"abstract":"In order to improve the relevance and efficiency of food safety supervision, a food safety knowledge database and a named entity recognition (NER) model that can extract food safety entities such as poison, disease, and symptom has been constructed. First, the key content of ‘‘Food Safety Accident Determination and Prevention Control’’ was identified, and 8265 valid statements were obtained. It then used data cleaning and sequence marking to obtain the dataset, dividing the dataset into training, validation and test sets in the ratio of 8:1:1. The Chinese food-safety domain NER model was constructed by introducing a bidirectional encoder representation from transformers (BERT) as a vector embedding model based on a bi-directional long short-term memory (BiLSTM) combined with a conditional random field (CRF). The BERT-BiLSTM-CRF model achieved 96.96% accuracy, 83.87% precision, 87.14% recall and an F1 value of 85.48, with low model error and high accuracy, and successfully extracted eight types of entities: poison, disease, host, category, source, symptom, disinfection method and drug. The NER model for food safety based on the BERT-BiLSTM-CRF has high accuracy and can establish an exclusive knowledge base for food safety, which helps improve food safety supervision efficiency.","PeriodicalId":412907,"journal":{"name":"2022 4th International Conference on Intelligent Information Processing (IIP)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131584762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-subject information interaction and one-way hash chain authentication method for V2G application in Internet of Vehicles","authors":"Jian Zhang, Lei Li, Weidong Liu, Xiaohui Li","doi":"10.1109/iip57348.2022.00034","DOIUrl":"https://doi.org/10.1109/iip57348.2022.00034","url":null,"abstract":"Internet of Vehicles consists of a three-layer architecture of electric vehicles, charging piles, and a grid dispatch management control center. Therefore, V2G presents multi-level, multi-agent and frequent information interaction, which requires a highly secure and lightweight identity authentication method. Based on the characteristics of Internet of Vehicles, this paper designs a multi-subject information interaction and one-way hash chain authentication method, it includes one-way hash chain and key distribution update strategy. The operation experiment of multiple electric vehicles and charging piles shows that the algorithm proposed in this paper can meet the V2G ID authentication requirements of Internet of Vehicles, and has the advantages of lightweight and low consumption. It is of great significance to improve the security protection level of Internet of Vehicles V2G.","PeriodicalId":412907,"journal":{"name":"2022 4th International Conference on Intelligent Information Processing (IIP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131667637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhiwen Yu, Shiming Li, Wenjie Zheng, Ruifeng Zhao, Aibeiduo Li
{"title":"A Secure Access Algorithm of Terminal Equipment based on Cryptography and Blockchain Applied in New Type of Power System","authors":"Zhiwen Yu, Shiming Li, Wenjie Zheng, Ruifeng Zhao, Aibeiduo Li","doi":"10.1109/IIP57348.2022.00052","DOIUrl":"https://doi.org/10.1109/IIP57348.2022.00052","url":null,"abstract":"The new type of power system needs a large number of distributed power sources. Power electronic devices and flexible loads are connected to the power grid. The security and reliability of equipment access directly affect the stable operation of the power system. The traditional centralized device access management mode is no longer applicable, because the terminal devices are diverse and widely distributed, and the applications of each terminal are complex, so the authentication and access efficiency based on centralized device access management is limited. Therefore, it is urgent to study the distributed identity authentication and trusted access technology of devices. In order to solve the problems of poor compatibility and weak anti attack ability of centralized access management in the process of device identity authentication, this paper proposes a distributed terminal device identity authentication method based on cryptography and blockchain, and designs the detailed process of certificate issuance and identity authentication. Finally, the proposed mechanism is tested, and the results show that the proposed distributed authentication mechanism can resist a variety of malicious attacks, and has certain advantages in computing and storage costs.","PeriodicalId":412907,"journal":{"name":"2022 4th International Conference on Intelligent Information Processing (IIP)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123129005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}