No abstract available.
Proceeding Downloads
Virtual Human Talking-Head Generation
Abstract: Virtual humans created by computers using deep learning technology are being used widely in a variety of fields, including personal assistance, intelligent customer service, and online education. Human-computer interaction systems integrate ...
Hierarchical Monte Carlo Tree Search for Latent Skill Planning
Monte Carlo Tree Search (MCTS) continues to confront the issue of exponential complexity growth in certain tasks when the planning horizon is excessively long, causing the trajectory’s past to grow exponentially. Our study presents Hierarchical MCTS ...
Speech image data mining algorithm based on multimodal decision fusion
This paper proposes a data mining algorithm based on multimodal decision fusion, which is mainly used to solve the correlation relationship of multi-level and multi-level multimodal data, the algorithm combines the methods of statistics, queueing study, ...
Optimized model analysis of blockchain PoW procotol under long delay attack
Abstract:Proof of work(POW) is one of the most widely used consensus method of bitcoin. In some chains, because of the large number of users, the huge amount of information interaction data, equipment hardware failure or malicious attacks on some nodes ...
ADCapsNet: An Efficient and Robust Capsule Network Model for Anomaly Detection
With the rapid development of the industrial internet of things(IIoT), the anomalies will cause significant damage to the ordinary operation of the industry. Anomaly detection work has increasingly become a hot spot. Although many related kinds of ...
Customer Service Hot event Discovery Based on Dynamic Dialogue Embedding
Frequent customer service conversations focus on hot topics of communication users, and automatic hot topic discovery is critical to improving user experience. Traditionally, Customer service relies on operator to write traffic summaries. It leads to ...
MergeTree: a Tree Model with Merged Nodes for Threat Induction
Threat tree model can clearly organize threat induction information and thus is widely used for risk analysis in software assurance. Threat tree will grow to complicated structures, e.g., the number of nodes and branches, when the threat information ...
Heart Sound Classification Algorithm Based on Sub-band Statistics and Time-frequency Fusion Features
The clinically acquired heart sound signals always have inevitable noise, and the statistical features of these noises are different from heart sounds, so a heart sound classification algorithm based on sub-band statistics and time-frequency fusion ...
Garment Metaverse: Parametric Digital Human and Dynamic Scene Try-on
As a new concept, the metaverse has been widely concerned by the industry, academia, media and the public. Many domestic and foreign companies have also set up in the field of the metaverse. The traditional 2D and 3D virtual fitting has not achieved ...
Multi-dimensional analysis of urban shrinkage problem in Liaoning Province based on multi-index system, grey correlation analysis and BP neural network with particle swarm optimization
The rapid development of urbanization in modern China is accompanied by the increasingly serious problem of urban shrinkage. To provide an effective analytical model for the urban shrinkage problem, this paper takes Liaoning Province, which is one of ...
Helmet wear detection based on YOLOV5
Safety helmet wearing detection is an important safety inspection task with widespread applications in industries, construction, and transportation. Traditional safety helmet wearing detection methods typically use feature-based classifiers such as SVM ...
An Intrusion Detection Model With Attention and BiLSTM-DNN
Abstract—At present, machine learning and deep learning are often used for network traffic intrusion detection. In order to solve the problem of unfocused feature extraction in these methods and improve the accuracy of network intrusion detection, this ...
Deep Reinforcement Learning with Copy-oriented Context Awareness and Weighted Rewards for Abstractive Summarization
This paper presents a deep context-aware model with a copy mechanism based on reinforcement learning for abstractive text summarization. Our model is optimized using weighted ROUGEs as global prediction-based rewards and the self-critical policy ...
An autoencoder-based fast online clustering algorithm for evolving data stream
In the era of Big Data, more and more IoT devices are generating huge amounts of high-dimensional, real-time and dynamic data streams. As a result, there is a growing interest in how to cluster this data effectively and efficiently. Although a number ...
Estimation of Distribution Algorithm with Discrete Hopfield Neural Network for GRAN3SAT Analysis
The Discrete Hopfield Neural Network introduces a G-Type Random 3 Satisfiability logic structure, which can improve the flexibility of the logic structure and meet the requirements of all combinatorial problems. Usually, Exhaustive Search (ES) is ...
Face Anti-spoofing Method Based on Deep Supervision
Although face recognition technology is extensively used, it is vulnerable to various face spoofing attacks, such as photo and video attacks. Face anti-spoofing is a crucial step in the face recognition process and is particularly important for the ...
Genetic algorithm in hopfield neural network with probabilistic 2 satisfiability
Genetic Algorithm (GA) is to convert the problem-solving process into a process similar to the chromosomal changes in biological evolution using the mathematical method and computer simulation operation. This meta-heuristic algorithm has been ...
Construction of Scene Library System for Commercial Vehicle Products Based on Multidimensional Terminal
Scene-based product design is an effective way to improve user experience, and static scene library is an important basis for commercial vehicle product planners to carry out their design and planning. This paper explores the characteristics of ...
Research on Epidemic Big Data Monitoring and Application of Ship Berthing Based on Knowledge Graph-Community Detection
The COVID-19 epidemic has been raging overseas for more than three years, and inbound goods and people have become the main risk points of the domestic epidemic. As the main window for China to exchange materials and personnel with foreign countries, ...
Early warning of corporate financial crisis based on sentiment analysis and AutoML
Establishing an early warning model for corporate financial crises is important for managing risks and ensuring the continued stability of the capital market. A financial crisis early warning indicator system for listed companies was constructed, which ...
Graph representation learning and software homology matching based A study of JAVA code vulnerability detection techniques
In nowadays using different tools and apps is a basic need of people's behavior in life, but the security issues arising from the existence of source code plagiarism among tools and apps are likely to bring huge losses to companies and even countries, ...
PhyGNNet: Solving spatiotemporal PDEs with Physics-informed Graph Neural Network
Partial differential equations (PDEs) are a common means of describing physical processes. Solving PDEs can obtain simulated results of physical evolution. Currently, the mainstream neural network method is to minimize the loss of PDEs thus ...
Multi-strategy Improved Multi-objective Harris Hawk Optimization Algorithm with Elite Opposition-based Learning
Abstract: To make up for the deficiencies of the Harris hawk optimization algorithm (HHO) in solving multi-objective optimization problems with low algorithm accuracy, slow rate of convergence, and easily fall into the trap of local optima, a multi-...
Elastic Detection Mechanism Aimed at Hybrid DDoS Attack
In Distributed Denial of Service(DDoS) attack, the attacker uses a remotely controlled botnet to attack the target server at the same time to prevent legitimate users from obtaining information services. Previous studies focused on the detection of ...
Detecting Arbitrary-oriented Objects in Remote Sensing Imagery with Segmentation-Aware Mask
Arbitrary-Oriented object detection in remote sensing images is a hot topic in recent years. Currently, most arbitrary-oriented object detectors adopt the oriented bounding box (OBB) to represent targets in remote sensing imagery. However, OBB ...
A Review of Routing Optimization Techniques for Quality of Service Assurance in Software-Defined Networks
The traditional military communication network is based on IP architecture, which has the problems of rigid architecture and challenging quality of service guarantee. The rapid development of various new applications has put differentiated demands on ...
TIRec: Transformer-based Invoice Text Recognition
A novel invoice text recognition model is proposed. In the past few years, researchers have explored text recognition methods with RNN-like structures to model semantic information. However, RNN-based approaches have some obvious drawbacks, such as the ...
Two-channel Conformance Test Analysis of S-band Dual-polarization Radar
The consistency of the dual-channel radar plays a crucial role in the performance of the dual-polarization radar. In theory, the performance of the two channels is required to be completely consistent, but it cannot be completely consistent due to the ...
Feature selection based on improved principal component analysis
Abstract: The filtered feature selection method has low computational complexity and less time, and is widely used in feature selection, but the filtered method only considers the importance of features for label classification and ignores the ...
Index Terms
- Proceedings of the 2023 2nd Asia Conference on Algorithms, Computing and Machine Learning
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
CACML '23 | 241 | 93 | 39% |
Overall | 241 | 93 | 39% |