{"title":"Research on video-based character recognition method for train cargo cars","authors":"Mingwei Qi, Rentao Zhao, Fei-Fei Zhang, Zhikang Zhao, Ziming Zhu","doi":"10.1109/IIP57348.2022.00009","DOIUrl":"https://doi.org/10.1109/IIP57348.2022.00009","url":null,"abstract":"After the train reaches the destination station, the actual arriving train number needs to be confirmed to ensure that the arriving vehicle is accurate. The traditional method of obtaining car numbers is by manually transcribing car numbers, which has the disadvantages of large workload, low efficiency and error-prone. Therefore, this paper designs a video-based train carriage character recognition system, and proposes a method of locating and recognizing train carriage characters based on YOLOv5s and CRNN. The four target detection models, SSD, Faster -RCNN, YOLOV5m, and YOLOv5s, are trained until the models converge completely using 10,000 train carriage datasets manually labeled with Labelimg software. The experimental results show that YOLOv5s outperforms the other models in terms of recognition accuracy and recognition efficiency, with YOLOv5s achieving a detection accuracy of 0.99 for the carriage character region and an average detection speed of 31 frames. The average accuracy of the algorithm is 0.96. Finally, the fusion of YOLOv5s and CRNN models results in a stable average frame rate of more than 20 frames for the detection of complete train carriages. The method in this paper can automatically identify the carriage numbers, which can reduce the labor of workers, avoid the errors caused by manual transcription of records, increase the real-time recording, and is of great significance to the development of railroad transportation system.","PeriodicalId":412907,"journal":{"name":"2022 4th International Conference on Intelligent Information Processing (IIP)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128722689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Meng-yuan Zhu, Xin-yu Hong, Zhuo Chen, Jiaxin Zhou, Na Lv
{"title":"Transfer learning-based Traffic Identification for UAV-Assisted IoT","authors":"Meng-yuan Zhu, Xin-yu Hong, Zhuo Chen, Jiaxin Zhou, Na Lv","doi":"10.1109/IIP57348.2022.00013","DOIUrl":"https://doi.org/10.1109/IIP57348.2022.00013","url":null,"abstract":"Traffic datasets are costly and difficult to attain in the UAV-assisted IoT environment, and the time-sensitivity of traffic distribution is high, which makes it difficult for traditional machine learning traffic identification methods to be applied in practice. To address this challenge, we propose a transfer learning-based approach for UAV-assisted IoT traffic identification: TLB-CNN (Transfer Learning Based Convolutional Neural Network). Firstly, the initial model of the convolutional neural network is pretrained based on the source domain-complete IoT dataset, and then the retraining of the convolutional neural network is realized through the layer frozen based fine-tuning learning algorithm on the incomplete dataset in the target domain. The experimental results indicate that our method can effectively ensure the accuracy of traffic recognition under the conditions of limited traffic training samples. Compared with existing few-shot learning methods, the classification performance is significantly improved","PeriodicalId":412907,"journal":{"name":"2022 4th International Conference on Intelligent Information Processing (IIP)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131181522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Qiong-lan Na, Dan Su, Jiaojiao Zhang, Xin Li, Na Xiao
{"title":"Construction of Power Knowledge Graph based on Entity Relation Extraction","authors":"Qiong-lan Na, Dan Su, Jiaojiao Zhang, Xin Li, Na Xiao","doi":"10.1109/IIP57348.2022.00022","DOIUrl":"https://doi.org/10.1109/IIP57348.2022.00022","url":null,"abstract":"In order to integrate the fragmented text data in the power domain and solve the problems of disordered and weak correlation of transmission protocols, an improved BERT model was proposed by combining deep learning and knowledge graph for entity relationship extraction in the power domain. This method uses the BERT model based on a full word mask to generate sentence vectors, word vectors with contextual semantics, and then takes the average value of word vectors to get entity vectors. The sentence vectors and entity vectors are combined by the attention machine. Finally, the combined new vectors are put into a fully layer for sequential labeling and finding the optimal tag to implement the entity extracted object. The experimental results show that the precision, recall value, and F1 score of this method are 90.12%, 85.25%, and 87.56 % respectively when entity extraction is performed on the corpus data set of transmission procedures.","PeriodicalId":412907,"journal":{"name":"2022 4th International Conference on Intelligent Information Processing (IIP)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125692800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fault diagnosis of batch process based on improved time convolution network and efficient channel attention","authors":"X. Liang, L. Guo","doi":"10.1109/iip57348.2022.00033","DOIUrl":"https://doi.org/10.1109/iip57348.2022.00033","url":null,"abstract":"Aiming at the nonlinear and non-gaussian characteristics of batch processes, a fault diagnosis model for batch processes according to the improved time convolution network(TCN) and efficient channel attention(ECA) is proposed. Standardize the 3D data, and then input the standardized data into the model combined with the time convolution network of hybrid dilated convolution and efficient channel attention to extract features. Finally, use the softmax function to output the fault diagnosis tag. The excellence of the proposed model is verified by the simulation of penicillin experimental data and the comparison with the classical depth learning method.","PeriodicalId":412907,"journal":{"name":"2022 4th International Conference on Intelligent Information Processing (IIP)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123981645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yang Li, Qing Hua Liu, Qi Qing Fang, Gen Liu, Ya Min Hu
{"title":"Evaluation of Radar Health Status Based on Fuzzy Comprehensive Evaluation of Cloud Mode","authors":"Yang Li, Qing Hua Liu, Qi Qing Fang, Gen Liu, Ya Min Hu","doi":"10.1109/IIP57348.2022.00027","DOIUrl":"https://doi.org/10.1109/IIP57348.2022.00027","url":null,"abstract":"Health status assessment is the core of radar health management. In this paper, a radar health status index system is established according to national standards and actual conditions, and radar health status levels are divided. The problem uses the trapezoidal cloud model to determine the membership function, which reduces the subjectivity in the evaluation and avoids the problem of too absolute demarcation in the evaluation.","PeriodicalId":412907,"journal":{"name":"2022 4th International Conference on Intelligent Information Processing (IIP)","volume":"207 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115566196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Aggregation Method based on Cosine Distance Filtering","authors":"Degang Wang, Yi Sun, Qi Gao, Fan Yang","doi":"10.1109/iip57348.2022.00031","DOIUrl":"https://doi.org/10.1109/iip57348.2022.00031","url":null,"abstract":"Federated learning provides privacy protection for source data by exchanging model parameters or gradients. However, it still faces the problem of privacy disclosure. For example, membership inference attack aims to identify whether target data sample is used to train machine learning models in federated learning. Active membership inference attack takes advantage of the feature that attackers can participate in model training in federated learning, actively influence the model update to extract more information about the training set, which greatly increases the risk of model privacy disclosure. Aiming at the problem that the existing secure aggregation methods of federated learning cannot resist the active membership inference attack, DeMiaAgg, an aggregation method based on cosine distance filtering, is proposed. The cosine distance is used to quantify the deviation degree between clients’ gradient vector and global model parameter vector, and the malicious gradient vector is excluded from gradients aggregation to defense against the active membership inference attack. Experiments on the Texas 100 and Location30 datasets show that DeMiaAgg method is superior to the current advanced differential privacy and secure aggregation methods, and can reduce the accuracy of active membership inference attack to the level of passive attacks.","PeriodicalId":412907,"journal":{"name":"2022 4th International Conference on Intelligent Information Processing (IIP)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115606202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deep recurrent neural network for ground-penetrating radar signal denoising","authors":"Chongpeng Tian, Mei Hong, Dongying Li, Da Yuan","doi":"10.1109/iip57348.2022.00024","DOIUrl":"https://doi.org/10.1109/iip57348.2022.00024","url":null,"abstract":"The ground-penetrating radar signal is a non-linear, non-smooth signal; the detection process is susceptible to the influence of noise, so the ground-penetrating radar detection capability is reduced. In order to eliminate noise in groundpenetrating radar signals, GPR signal denoising network based on deep recurrent neural networks is proposed in the paper. We use a deep learning approach to use ground-penetrating radar signals as training data and add Gaussian noise during model training so that the network continuously learns the features of GPR signals and noise, and use GPR noise signals on the test set to verify the denoising effect of the network. Experiments demonstrate that recurrent neural networks can significantly improve the signal-tonoise ratio of noisy signals and maintain the original waveform of ground-penetrating radar signals.","PeriodicalId":412907,"journal":{"name":"2022 4th International Conference on Intelligent Information Processing (IIP)","volume":"308 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116257493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Deep Fusion Network for Violence Recognition","authors":"Zhimin Song, Wuwei Zhang, Dongyue Chen","doi":"10.1109/iip57348.2022.00029","DOIUrl":"https://doi.org/10.1109/iip57348.2022.00029","url":null,"abstract":"With the rise of smart city construction, the importance of violence recognition based on surveillance video is increasingly prominent. For the violence in a surveillance video, it is challenging to define specific violent behavior, and the number of participants engaging in violence is unknown while the involvement of each participant is different. Undoubtedly, these barriers are unfavorable for the consistency of the video frame and video clip labels. In this paper, we propose a new framework of violence recognition: a frame selection strategy based on local differential brightness is designed for the accurate selection of violence frames; meanwhile, a deep fusion network P-VFN is designed, targeting to avoid the mismatch between frames and video labels; finally, various motion image detection algorithms are compared to explore the substitutability of the optical flow method, which aims to better the unsatisfactory real-time performance of current optical flow calculation. Experimental results on three challenging benchmark datasets demonstrate that the proposed approach outperforms many state- of-the-art violence recognition models. Furthermore, to compensate for the lack of the current public dataset in the real surveillance scene, we use real surveillance cameras to capture and produce a largescale real violence dataset, which also attributes to a better performance.","PeriodicalId":412907,"journal":{"name":"2022 4th International Conference on Intelligent Information Processing (IIP)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127148890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yanan Tu, Y. Wu, Yixuan Li, P. Zhang, Zhijun Guo, Yakun Yin
{"title":"Longitudinal and transverse trajectory tracking of unmanned vehicle based on dual PID and LQR","authors":"Yanan Tu, Y. Wu, Yixuan Li, P. Zhang, Zhijun Guo, Yakun Yin","doi":"10.1109/iip57348.2022.00081","DOIUrl":"https://doi.org/10.1109/iip57348.2022.00081","url":null,"abstract":"The vehicle longitudinal dynamics model is established based on the vehicle two degree of freedom model. Use the vehicle longitudinal control logic based on throttle and brake control. Compared with single PID control logic, double PID can realize the longitudinal position and speed tracking control at the same time. In lateral control, discrete LQR is used to track the trajectory laterally. The throttle brake controller is constructed based on the throttle and brake, which together constitute the longitudinal motion controller. A throttle brake switching logic is designed to make the control more reasonable. The effectiveness of longitudinal double PID and lateral LQR controllers for trajectory tracking control is verified by simulation. The results show that the designed controller and switching logic can meet the requirements of high accuracy and smoothness.","PeriodicalId":412907,"journal":{"name":"2022 4th International Conference on Intelligent Information Processing (IIP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131253170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robust Value Class Data based Block Data Storage","authors":"Fei Liang, Xiuli Huang, Peng Gao, Xianzhou Gao","doi":"10.1109/iip57348.2022.00089","DOIUrl":"https://doi.org/10.1109/iip57348.2022.00089","url":null,"abstract":"With the successful application of blockchain systems such as Bitcoin and Ether, blockchain technology has received widespread attention from industry and academia. However, due to its distributed architecture and redundant data storage, blockchain is not compatible with traditional storage solutions and has problems such as low query efficiency, inflexible data storage, limited block storage capacity and poor scalability. In this regard, we propose a blockchain architecture based on keyvalue database, including blockchain-based state data management, blockchain-based index data management and blockchain-based metadata storage, which has significant you in practical projects.","PeriodicalId":412907,"journal":{"name":"2022 4th International Conference on Intelligent Information Processing (IIP)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134463170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}