Icon最新文献

筛选
英文 中文
Research on Optimization Methods for Industrial Model Retrieval 工业模型检索的优化方法研究
Icon Pub Date : 2023-03-01 DOI: 10.1109/ICNLP58431.2023.00083
Wang Peng, Chunhui Hu
{"title":"Research on Optimization Methods for Industrial Model Retrieval","authors":"Wang Peng, Chunhui Hu","doi":"10.1109/ICNLP58431.2023.00083","DOIUrl":"https://doi.org/10.1109/ICNLP58431.2023.00083","url":null,"abstract":"In the retrieval process of industrial models, the traditional database retrieval can no longer meet their needs in terms of efficiency and precision because of their multi-source heterogeneous, complex types and large information scale. This paper optimizes the Elasticsearch search engine in three aspects: the underlying index of the search engine, keyword search and sorting algorithm; and verifies the feasibility of the method through experiments.","PeriodicalId":53637,"journal":{"name":"Icon","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79758577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Small Object Detection Based on Context Information and Attention Mechanism 基于上下文信息和注意机制的小目标检测
Icon Pub Date : 2023-03-01 DOI: 10.1109/ICNLP58431.2023.00010
Mengyang Cheng, Haibo Ge, Sai Ma, Wenhao He, Yu An, Ting Zhou
{"title":"Small Object Detection Based on Context Information and Attention Mechanism","authors":"Mengyang Cheng, Haibo Ge, Sai Ma, Wenhao He, Yu An, Ting Zhou","doi":"10.1109/ICNLP58431.2023.00010","DOIUrl":"https://doi.org/10.1109/ICNLP58431.2023.00010","url":null,"abstract":"In order to solve the problem of missed detection and false detection of small targets in object detection, and to improve the detection precision and recall of small object, this paper proposes a small object detection algorithm that introduces context information and attention mechanism. The algorithm is improved on the Faster RCNN network architecture, and a multilevel feature fusion module is proposed to solve the problem of incomplete extraction of detailed information. The proposed regional attention module solves the interference of background noise and focuses on the target to be detected. At the same time, in order to more effectively meet the characteristics of small target detection, we have improved the anchor box. The method proposed in this paper is verified on DIOR, PASCAL VOC2007 and MS COCO datasets. Experiments show that the algorithm proposed in this paper and the current advanced algorithm have better accuracy and precision in detecting small targets.","PeriodicalId":53637,"journal":{"name":"Icon","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81356683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A fast capture structure for dichotomous DMF pseudocode based on DSP Builder 基于DSP Builder的二分类DMF伪码的快速捕获结构
Icon Pub Date : 2023-03-01 DOI: 10.1109/icnlp58431.2023.00071
Xihai Xie, Biao Hui
{"title":"A fast capture structure for dichotomous DMF pseudocode based on DSP Builder","authors":"Xihai Xie, Biao Hui","doi":"10.1109/icnlp58431.2023.00071","DOIUrl":"https://doi.org/10.1109/icnlp58431.2023.00071","url":null,"abstract":"To address the problem of capturing correlation peak amplitude decay and difficulty in determining the capture threshold when the demodulated signal is synchronously captured by DMF (all-digital matched filter) under the influence of Doppler frequency bias, the dichotomous DMF method is proposed: the pseudo-random sequence is segmented before and after to reduce the integration time of correlation operation, and then reduce the loss of normalized correlation peak under the influence of frequency bias integration decay. Matlab platform simulation verifies the effect of correlation length on the loss of correlation peaks under the frequency bias scenario, and the experimental results show that the dichotomous DMF method is less sensitive to the Doppler frequency bias than the DMF method. In order to reduce the hardware resource overhead of the pseudocode phase search module and to ensure a certain search efficiency, a serial-parallel structure with serial data transmission and parallel operation is adopted, which can search multiple code elements at a time for phase deviation in the pseudocode phase search and improve the capture efficiency.","PeriodicalId":53637,"journal":{"name":"Icon","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85992728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain for Supply Chain Data Security Sharing Consensus Algorithm Design 区块链供应链数据安全共享共识算法设计
Icon Pub Date : 2023-03-01 DOI: 10.1109/ICNLP58431.2023.00084
Boyu Chen, Hongjie Liu, Lei Yin
{"title":"Blockchain for Supply Chain Data Security Sharing Consensus Algorithm Design","authors":"Boyu Chen, Hongjie Liu, Lei Yin","doi":"10.1109/ICNLP58431.2023.00084","DOIUrl":"https://doi.org/10.1109/ICNLP58431.2023.00084","url":null,"abstract":"The centralized data storage mode adopted by the traditional supply chain management system has some problems, such as single point of failure, data privacy disclosure, opaque internal operation of the system and so on, which seriously restricts the information flow and data sharing among enterprises. Blockchain is distributed, open, transparent and tamper proof. It can provide reliable underlying services for the implementation of distributed data security sharing system. Therefore, this paper proposes a blockchain based supply chain quality data security sharing model, which takes the distributed blockchain network as the core to build decentralized data security sharing services. At the same time, the practical Byzantine fault-tolerant (pbft) algorithm used in blockchain has some problems, such as large consensus delay, low throughput, poor performance, and does not support node dynamic management. Combined with the characteristics of supply chain alliance chain, by introducing simplified consistency protocol and new node management mechanism, the communication complexity of the algorithm is reduced and the dynamic management of nodes is realized.","PeriodicalId":53637,"journal":{"name":"Icon","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91146587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application Research of 3D MSVR-DV-Hop Algorithm Based on Node Filtering 基于节点滤波的三维MSVR-DV-Hop算法应用研究
Icon Pub Date : 2023-03-01 DOI: 10.1109/ICNLP58431.2023.00075
Ping Liu, Xiangzhong Zeng, Shihao Gai, Hanning Sun
{"title":"Application Research of 3D MSVR-DV-Hop Algorithm Based on Node Filtering","authors":"Ping Liu, Xiangzhong Zeng, Shihao Gai, Hanning Sun","doi":"10.1109/ICNLP58431.2023.00075","DOIUrl":"https://doi.org/10.1109/ICNLP58431.2023.00075","url":null,"abstract":"Wireless sensor network has been widely used as an important means of perceiving and monitoring the real environment. Node location algorithm is the key supporting technology for the normal operation of wireless sensor network nodes. To achieve higher positioning accuracy and improve the adaptability to the network, a beacon-based MSVR-DV-Hop (Multidimensional Support Vector Regression-DV-Hop) algorithm is proposed in three-dimensional scenes. The three stages of hop acquisition, distance estimation and coordinate calculation in classical DV-Hop algorithm are improved, and simulation experiments and result analysis are carried out in three-dimensional scene. The positioning accuracy of this algorithm is significantly improved compared with other algorithms in three-dimensional scenes, positioning error fluctuations are significantly improved in different anisotropic scenes, and positioning error fluctuations are stable in different anisotropic scenes, which has better adaptability and accuracy. Positioning errors in three-dimensional scenes are reduced by at least 56% compared to the classical three-dimensional DV-Hop algorithm and 12% compared to the LMSVR algorithm.","PeriodicalId":53637,"journal":{"name":"Icon","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87459883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-constraint Coupling Optimization for Salient Object Detection 显著目标检测的多约束耦合优化
Icon Pub Date : 2023-03-01 DOI: 10.1109/ICNLP58431.2023.00012
Zhijie Zhu, Jie Fang, Nan Wang, Jiaqiu Guan
{"title":"Multi-constraint Coupling Optimization for Salient Object Detection","authors":"Zhijie Zhu, Jie Fang, Nan Wang, Jiaqiu Guan","doi":"10.1109/ICNLP58431.2023.00012","DOIUrl":"https://doi.org/10.1109/ICNLP58431.2023.00012","url":null,"abstract":"In this paper, we propose a lightweight salient object detection framework called Multi-Constraint Coupling optimization Network (MCONet) to address the conflict between model scale and inference ability, which can learn more knowledge with fewer parameters through embedding feature priors. Specifically, we build a lightweight encoder as the backbone network to represent the image, and then use two parallel decoders to infer salient mask features and salient edge features respectively. Besides, we fuse the output features of different decoders by a convolutional block attention module (CBAM) module. In addition, we adopt a multi-constraint coupling optimization strategy to increase the soft constraints in the training phase, and improve the prior guidance of the edge to the inference results. Experimental results on 5 public benchmark datasets show that the proposed MCONet can reach comparable even better performance of state-of-the-art lightweight salient object detection models.","PeriodicalId":53637,"journal":{"name":"Icon","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87602711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Personality Analysis of Entrepreneurial Text for Entrepreneurship Education 创业教育中创业文本的个性分析
Icon Pub Date : 2023-03-01 DOI: 10.1109/ICNLP58431.2023.00047
A. Ito, Kotaro Takeda, Shuichi Ishida
{"title":"Personality Analysis of Entrepreneurial Text for Entrepreneurship Education","authors":"A. Ito, Kotaro Takeda, Shuichi Ishida","doi":"10.1109/ICNLP58431.2023.00047","DOIUrl":"https://doi.org/10.1109/ICNLP58431.2023.00047","url":null,"abstract":"In this paper, we analyzed entrepreneurship-related text using the automatic personality trait estimation model to investigate the difference between entrepreneurship-related and other texts. We collected texts from fourteen participants of entre-preneurship-related classes and texts from different domains (impressions of other courses and tweets from Twitter). Next, we developed a personality estimation model using BERT and a feedforward network using Kaggle’s MBTI corpus. As a result of the analysis, we found significant personality differences between the entrepreneur-related and other texts in the judgment-perception dimension.","PeriodicalId":53637,"journal":{"name":"Icon","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74907102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Camouflage target segmentation based on reverse attention and self-interaction fusion 基于反向注意与自交互融合的伪装目标分割
Icon Pub Date : 2023-03-01 DOI: 10.1109/ICNLP58431.2023.00015
Haibo Ge, Wenhao He, Yu An, Haodong Feng, Jiajun Geng, Chaofeng Huang
{"title":"Camouflage target segmentation based on reverse attention and self-interaction fusion","authors":"Haibo Ge, Wenhao He, Yu An, Haodong Feng, Jiajun Geng, Chaofeng Huang","doi":"10.1109/ICNLP58431.2023.00015","DOIUrl":"https://doi.org/10.1109/ICNLP58431.2023.00015","url":null,"abstract":"Camouflage Target Segmentation (COS) aims to segment targets hidden in complex environment. When the existing COS algorithm fuses multi-level features, it ignores the expression and positioning of the edge features of the camouflage target, and pays more attention to the influence of the fusion of features on the segmentation performance. Therefore, a COS algorithm based on disguised target segmentation based on reverse attention and self-interaction fusion is proposed. First, multi-scale features are extracted through the backbone network; Then, in order to improve the expression ability of edge features, the features extracted by the backbone network are enhanced using a network composed of a reverse attention module (RAM); Finally, the self-interaction fusion module (SIM) drives the features of different scales to achieve layer-by-layer fusion, while suppressing noise interference and obtaining more accurate target information. Experimental results show that on the three commonly used natural camouflage datasets of CHAMELEON, CAMO and CODIOK, the model shows better segmentation effect than other typical models.","PeriodicalId":53637,"journal":{"name":"Icon","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75630534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EE-GCN: A Graph Convolutional Network based Intrusion Detection Method for IIoT 基于图卷积网络的工业物联网入侵检测方法
Icon Pub Date : 2023-03-01 DOI: 10.1109/ICNLP58431.2023.00068
Peng Xu, Guangyue Lu, Yuxin Li, Cai Xu
{"title":"EE-GCN: A Graph Convolutional Network based Intrusion Detection Method for IIoT","authors":"Peng Xu, Guangyue Lu, Yuxin Li, Cai Xu","doi":"10.1109/ICNLP58431.2023.00068","DOIUrl":"https://doi.org/10.1109/ICNLP58431.2023.00068","url":null,"abstract":"Intrusion detection in the Industrial Internet of Things (IIoT) is a challenge for the network security protection. Graph neural network (GNN) is employed to improve the network security by virtue of efficiently constructing a message passing function. However, existing intrusion detection methods based on GNN do not fully exploit the information of original data which results in the poor intrusion detection performance. In this paper, we propose an Exploiting Edge feature based on Graph Convolutional Network (EE-GCN), which can capture both the edge features of the network traffic link as well as the relationship between device nodes. In addition, we construct a two-layer GCN network to extract the edge features. Finally, two benchmark datasets (NF-BoT-IoT and NF-ToN-IoT) in Network Intrusion Detection System (NIDS) are used to evaluate the performance of the proposed method. The results show that the method proposed in this paper outperforms other methods.","PeriodicalId":53637,"journal":{"name":"Icon","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81109430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resource Management Algorithm for Slicing Function in 5G Network Slicing 5G网络切片切片功能的资源管理算法
Icon Pub Date : 2023-03-01 DOI: 10.1109/ICNLP58431.2023.00073
Jiawen Guo, Guohui Zhu, Dingyuan Zhang, Chenglin Xu
{"title":"Resource Management Algorithm for Slicing Function in 5G Network Slicing","authors":"Jiawen Guo, Guohui Zhu, Dingyuan Zhang, Chenglin Xu","doi":"10.1109/ICNLP58431.2023.00073","DOIUrl":"https://doi.org/10.1109/ICNLP58431.2023.00073","url":null,"abstract":"In the case that multiple service types of slices are jointly carried on core network, a Resource Management Algorithms Oriented to Slicing Functions (RMOSF) is proposed for the processing efficiency of slice requests and the resource allocation of the substrate network. First, the incoming slice requests are input into the admission control module, and the pre-accepted slice requests are screened out through the deep reinforcement learning algorithm; secondly, the pre-accepted slice requests are brought into the resource allocation module, and slices with different type are brought into the corresponding constrained optimization problems for solution; finally, when the substrate physical network resources are sufficient, the slices are mapped to start their life cycle. The simulation results show that the algorithm effectively improves slice profit and request acceptance rate, and also improves resource utilization.","PeriodicalId":53637,"journal":{"name":"Icon","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79302251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信