the proceedings contain 173 papers. the topics discussed include: restricted area sign detector using YOLO v5;research on distance teaching course interactive system based on computer algorithm research data;APT detec...
ISBN:
(纸本)9798350323313
the proceedings contain 173 papers. the topics discussed include: restricted area sign detector using YOLO v5;research on distance teaching course interactive system based on computer algorithm research data;APT detection and attack scenario reconstruction based on big data analysis;new image processing: VGG image style transfer with gram matrix style features;trajectory measurement and positioning of underwater vehicle based on monocular stereo vision;the importance of multi feature extraction and fusion for prediction of protein subcellular localization;design and implementation of FPGA-based four-dimensional ultra chaotic system;flocking towards a robust mobile network topology;real time speech recognition method for online complaints from power grid customers based on improved residual network;optimization of parking space detection system based on ZigBee wireless sensor network;and a wire drawing defect detection approach for FDM 3D printing based on machine vision technology.
Foot and mouth disease (FMD) poses a substantial threat to the global cattle industry, as it is a highly contagious viral infection. Timely detection and precise classification of FMD in cattle are essential for effec...
详细信息
Recently, deep graph neural networks have achieved promising performance and become an essential prediction model. However, graph neural networks are susceptible to backdoor attacks during the training process. the le...
详细信息
this paper delves into the burgeoning field of the Internet of things (IoT), focusing on the pivotal role of LoRaWAN (Long Range Wide Area Network) technology in constructing long-range, energy-efficient IoT networks....
详细信息
Withthe rapid development of sensor technology and the proliferation of multi-source data, anomaly detection of multi-source time series data has become more and more important. In the past, anomaly detection methods...
详细信息
ISBN:
(纸本)9789819770007;9789819770014
Withthe rapid development of sensor technology and the proliferation of multi-source data, anomaly detection of multi-source time series data has become more and more important. In the past, anomaly detection methods often deal withthe temporal information and spatial information contained in the data separately, which makes the spatio-temporal information in the data unable to be fully utilized by the model. To this end, this paper proposes a fusion of sensor embedding and temporal representation networks to solve this problem. In addition, we adopt graph neural network to better model multi-source heterogeneous data, and enhance the accuracy of anomaly detection by combining the double loss function of reconstruction loss and prediction loss. this approach not only facilitates the learning of normal behavior patterns from historical data but also enhances the model's predictive capabilities, allowing for more accurate anomaly detection. Experimental results on four multi-source sensor datasets show the superiority of the proposed method compared withthe existing models. Further analysis show that the model enhances the interpretability of anomaly detection through the analysis of anomaly associated sensors.
As urbanization continues to accelerate at a break-neck pace, the need for smart cities has become increasingly pressing. this need is particularly evident in developing countries, such as India, where the rapid pace ...
详细信息
the vital priority of the society is to render helping hand to most fragile category of people such as older individuals, neurogenerative disease affected patients, etc. to lead their normal routine social life being ...
详细信息
Detecting anomalies is important for identifying inefficiencies, errors, or fraud in business processes. Traditional process mining approaches focus on analyzing 'flattened', sequential, event logs based on a ...
详细信息
ISBN:
(纸本)9783031561061;9783031561078
Detecting anomalies is important for identifying inefficiencies, errors, or fraud in business processes. Traditional process mining approaches focus on analyzing 'flattened', sequential, event logs based on a single case notion. However, many real-world process executions exhibit a graph-like structure, where events can be associated with multiple cases. Flattening event logs requires selecting a single case identifier which creates a gap withthe real event data and artificially introduces anomalies in the event logs. Object-centric process mining avoids these limitations by allowing events to be related to different cases. this study proposes a novel framework for anomaly detection in business processes that exploits graph neural networks and the enhanced information offered by object-centric process mining. We first reconstruct and represent the process dependencies of the object-centric event logs as attributed graphs and then employ a graph convolutional autoencoder architecture to detect anomalous events. Our results show that our approach provides promising performance in detecting anomalies at the activity type and attributes level, although it struggles to detect anomalies in the temporal order of events.
3D point cloud processing plays an important role in many emerging applications such as autonomous driving, visual navigation, and virtual reality. It calls for hardware acceleration of multiple key operations, includ...
详细信息
In contemporary developments like Cyber Physical System (CPS) and the Internet of things (IoT), computerized integrated connection is seen as a trend. Some of the unique research issues in CPS include security, confid...
详细信息
暂无评论