توضیحاتی در مورد کتاب Advances in Intelligent Information Hiding and Multimedia Signal Processing: Proceeding of the 18th IIH-MSP 2022 Kitakyushu, Japan, Volume 2
نام کتاب : Advances in Intelligent Information Hiding and Multimedia Signal Processing: Proceeding of the 18th IIH-MSP 2022 Kitakyushu, Japan, Volume 2
عنوان ترجمه شده به فارسی : پیشرفت در پنهان کردن اطلاعات هوشمند و پردازش سیگنال چندرسانه ای: ادامه 18 IIH-MSP 2022 Kitakyushu ، ژاپن ، جلد 2
سری : Smart Innovation, Systems and Technologies, 339
نویسندگان : Kazuhiro Kondo, Mong-Fong Horng, Jeng-Shyang Pan, Pei Hu
ناشر : Springer-KES International
سال نشر : 2023
تعداد صفحات : 425
ISBN (شابک) : 9819901049 , 9789819901043
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 12 مگابایت
بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.
فهرست مطالب :
Preface
Contents
About the Editors
1 An Efficient Multilevel Threshold Image Segmentation Approach Based on Rafflesia Optimization Algorithm
1.1 Introduction
1.2 Multilevel Threshold Image Segmentation Problem
1.3 Rafflesia Optimization Algorithm
1.3.1 The Stage of Attracting Insects
1.3.2 The Stage of Swallowing Insects
1.3.3 The Stage of Spreading Seeds
1.4 ROA-Based Segmentation Process
1.5 Simulation
1.5.1 Peak Signal-to-Noise Ratio
1.5.2 Structural Similarity Index Measure
1.5.3 Feature Similarity Index Measurement
1.6 Conclusion
References
2 Distributed Face Biometric with Blockchain Federated Learning
2.1 Introduction
2.1.1 Subject Background and Significance of This Research
2.2 The Proposed Architecture and Algorithm
2.2.1 The Proposed Architecture
2.2.2 Main Algorithm
2.3 Experimental Result and Evaluation
2.3.1 Dataset
2.3.2 Analysis
2.4 Conclusion
References
3 Region Guide Point for Depth Estimation
3.1 Introduction
3.2 Related Work
3.3 The Proposed Method
3.3.1 Overall Network Framework
3.3.2 Global Multi-scale Feature Extraction Network
3.3.3 Loss Function
3.4 Experiment
3.4.1 Experimental Setup
3.4.2 Ablation Experiment
3.4.3 Comparisons with State-of-the-Art Methods
3.5 Conclusion
References
4 Research on PLC Communication Technology in Intelligent Loading Control System
4.1 PLC Introduced
4.1.1 The Advantages of PLC
4.1.2 Application of PLC Communication Technology
4.1.3 PLC Application in Various Fields
4.1.4 Application of PLC in Intelligent Loading Control System
4.2 System Introduction
4.2.1 Overall System
4.2.2 Selection of PLC
4.3 PLC and PC Communication Technology
4.3.1 PLC Communication Module
4.3.2 Read and Write Function of Communication Between PC and PLC
4.3.3 Communication Convention Field Information
4.3.4 Status Change of PLC
4.3.5 PC to PLC Control Program
4.3.6 PLC Communication Program
4.4 Conclusion
References
5 Combined Synchronization for Fractional-Order Chaotic Systems with Time Delay
5.1 Introduction
5.2 Background
5.3 Simulation Results
5.4 Conclusion
References
6 A New Four-Dimensional Discrete Chaotic System Is Used for S-Box Masking
6.1 Introduction
6.2 Discrete Chaotic System
6.2.1 Logistic Map
6.2.2 Tent Map
6.2.3 Henon Map
6.3 New Four-Dimensional Discrete Chaotic System
6.3.1 Construction of Discrete Chaotic Systems
6.3.2 NIST Test
6.3.3 Resource Consumption
6.4 S-Box Masking Scheme
6.5 Correlation Power Analysis
6.6 Conclusion
References
7 A Parallel Gannet Optimization Algorithm with Communication Strategies (PGOA)
7.1 Introduction
7.2 Related Work
7.2.1 Gannet Optimization Algorithm
7.2.2 Parallel Mechanisms
7.3 Parallel Gannet Optimization Algorithm
7.3.1 Initialization
7.3.2 Update
7.3.3 Communication Strategies
7.4 Complexity Analysis
7.5 Experiments
7.5.1 Pseudo-Code of PGOA
7.5.2 Benchmark Functions
7.5.3 Discussion
7.6 Conclusion
References
8 Adaptive Target Tracking Algorithm Based on Template Updating and Graph-Regularized Saliency
8.1 Introduction
8.2 Framework of Algorithm
8.3 Experiments and Analysis
8.3.1 Experimental Platform and Data
8.3.2 Criteria of Experimental Evaluation
8.3.3 Experimental Results and Analysis
8.4 Conclusion
References
9 Fault Detection Method of Insulator Image Based on Gabor Texture and Convolutional Neural Network
9.1 Introduction
9.2 Related Work
9.2.1 Image Feature Analysis
9.2.2 Image Feature Analysis
9.3 Materials and Methods
9.3.1 Data Acquisition and Data Preprocessing
9.3.2 Proposed Methods
9.3.3 Gabor Texture Analysis
9.3.4 CNN Classification
9.4 Experimental Results and Discussion
9.4.1 Classification and Evaluating
9.4.2 Experimental Comparison
9.5 Conclusions
References
10 RGB-T Target Tracking Based on Saliency with Gray-Level Co-occurrence Matrix and KCF
10.1 Introduction
10.2 Algorithms
10.2.1 LC Saliency Tracking Algorithm
10.2.2 Gray Level Co-occurrence Matrix
10.3 KCF_LC Tracking Algorithm
10.3.1 Coefficient Calculation Based on GLCM
10.3.2 KCF-LC Algorithm Process
10.4 Algorithm Experiment and Analysis
10.5 Conclusion
References
11 An Optimal Power System Multi-objective Environmental-Economic Planning Based on Moth-Flame Optimization
11.1 Introduction
11.2 Related Work
11.2.1 Environmental-Economic Planning Model
11.2.2 Moth-Flame Algorithm
11.3 The EEP Solution by Multi-object MFO Algorithm
11.3.1 Pareto Optimality Approach
11.3.2 The MMFO Algorithm for the EEP Problem
11.4 Experimental Results and Discussion
11.5 Conclusion
References
12 A Power-System Economic Dispatching Based on Enhanced Group Search Optimizer
12.1 Introduction
12.2 Economic Dispatching Model
12.2.1 Traditional Economic Scheduling Model
12.2.2 Economic Dispatching Model Considering the Valve-Point Effect of the Unit
12.2.3 Economic Scheduling Model Considering Multiple Fuels
12.3 Enhanced Group Search Optimization Algorithm
12.3.1 Original Group Search Optimization Algorithm
12.3.2 Enhanced Group Search Optimizer
12.4 Cases Study Analysis
12.5 Conclusion
References
13 Research Review on Security Protection Scheme of Distributed Photovoltaic Grid-Connected Network
13.1 Introduction
13.2 Security Risks of Distributed Photovoltaic Grid-Connected Network
13.3 Security Status of Distributed Photovoltaic Grid-Connected Network
13.3.1 Status of Protection Scheme for Power Fiber Dedicated Line Access
13.3.2 Status of Wireless Access Solution Protection
13.3.3 Status of Network Boundaries and Protection
13.4 Security Protection Principles
13.4.1 Industrial Control Network Security Protection Principles
13.4.2 Principles of Network Security Protection for Distributed Photovoltaic Grid-Connected Networks
13.5 Key Technologies for Network Security Protection of Distributed Photovoltaic Grid-Connected Network
13.5.1 Master Station System Security
13.5.2 Channel Security
13.5.3 Security of Secure Access Area
13.5.4 Station Safety
13.6 Conclusion
References
14 A Method of Constructing Fine-Grained Pose Evaluation Model
14.1 Introduction
14.2 Related Works
14.2.1 Pose Estimation
14.2.2 Datasets
14.2.3 Object Tracking
14.2.4 Motion Capture
14.2.5 Data Optimization
14.3 Materials and Methods
14.3.1 Camera Calibration
14.3.2 2D Pose Estimation
14.3.3 3D Pose Reconstruction
14.3.4 Smooth Filtering
14.4 Results and Discussion
14.4.1 Experiment Data Description
14.4.2 Experiment Results Analysis
14.5 Conclusions
References
15 Research on Meteorological Public Opinion Combining Domain Keywords and LinearSVC
15.1 Introduction
15.2 Related Works
15.3 Meteorological Public Opinion Analysis Method
15.3.1 Model Framework
15.3.2 Domain Keyword Extraction Through Vectorization
15.3.3 Build a Classifier
15.3.4 LinearSVC
15.4 Experiments
15.4.1 Experimental Data Set
15.4.2 Design
15.4.3 Experimental Results and Analysis
15.5 Conclusions
References
16 Study on Dynamic Evaluation of Limiting Factors of High-Speed Railway Station Operation Efficiency
16.1 Introduction
16.2 Construction of Evaluation Index System
16.3 Comprehensive Evaluation Method for High-Speed Railway Station
16.3.1 Determination of Index Weight by Entropy Method
16.3.2 Evaluation Model Based on Gray Correlation Analysis
16.4 Dynamic Analysis Case of Limiting Factors of High Speed Railway Station Transportation Efficiency
16.5 Conclusion
References
17 A Novel Algorithm for Video Frame Prediction Based on Convolutional Neural Network
17.1 Induction
17.2 Model
17.3 Experiment
17.3.1 Dataset
17.3.2 Comparison and Analysis of Experimental Results
17.4 Conclusion
References
18 GVFNet: Graph-Voxel Fusion Network for 3D Object Detection
18.1 Introduction
18.2 Graph-Voxel Fusion Network
18.3 The Component of GVFNet
18.3.1 Pseudo-voxel
18.3.2 Graph Formation
18.3.3 Feature Extraction
18.3.4 Space Alignment Module
18.4 Experiments
18.4.1 Loss Function
18.4.2 Implementation Details
18.4.3 Results on KITTI Dataset
18.4.4 Ablation Study
18.5 Conclusion
References
19 Relation Extraction Model Based on Global Pointer and Potential Relation Embedding
19.1 Introduction
19.2 Related Work
19.3 Methodology
19.3.1 Input Layer
19.3.2 Potential Relation Prediction
19.3.3 Global Pointer
19.3.4 Loss Function
19.4 Experiment
19.4.1 Datasets and Evaluation Metrics
19.4.2 Baseline
19.4.3 Implementation Details
19.4.4 Results and Discussion
19.5 Conclusion and Future Work
References
20 ECG Heartbeat Segmentation with Bidirectional LSTM Deep Learning Neural Network
20.1 Introduction
20.2 Materials and Methods
20.2.1 Dataset Description
20.2.2 Data Loading
20.2.3 Data Processing
20.2.4 Model Architecture
20.3 Discussion and Problem
20.4 Conclusion
References
21 Representing Scenes as Compositional Generative Neural Feature Fields Based on GIRAFFE for 3D Reconstruction of Classroom Scenes
21.1 Introduction
21.2 Related Work
21.3 Method
21.3.1 Generating Neural Feature Fields
21.3.2 Scene Rendering
21.3.3 Training Builder
21.4 Experiment
21.5 Conclusions
References
22 Pipe Attitude Recognition and Control System Based on Machine Vision
22.1 Introduction
22.2 System Overall Structure
22.3 System Design
22.3.1 System Hardware Design
22.3.2 System Software Design
22.4 Function Realization
22.4.1 Hardware Function Realization
22.4.2 Software Function Realization
22.5 System Test and Analysis
22.5.1 Data Set Description
22.5.2 Optimal Similarity Parameter Estimation
22.5.3 System Performance Test
22.6 Conclusion
References
23 Short-Term Forecast Based on Generalized Maximum Correntropy Criterion and Kernel Extreme Learning Machine
23.1 Introduction
23.2 Preliminary
23.2.1 Generalized Maximum Correntropy Criterion
23.2.2 Kernel Extreme Learning Machine
23.3 Proposed Methodlogy
23.3.1 Data Preprocessing
23.3.2 Data Clustering
23.3.3 Load Forecasting Based on KELM
23.4 Experimental Result
23.5 Conclusion
References
24 A Document Management System with Multi-biometric Watermarking for Educational Purpose
24.1 Introduction
24.2 Related Work
24.3 Proposed Architecture and Algorithm
24.3.1 Proposed Architecture
24.3.2 Improved LSB Algorithm
24.3.3 The Magic Matrix
24.4 Educational Purpose Application
24.5 Experimental Result and Evaluation
24.6 Conclusion
References
25 Radar Waveform Gaming Configurable Framework Based on Deep Reinforcement Learning
25.1 Introduction
25.2 Background
25.2.1 Frequency Agile Radar
25.2.2 Reinforcement Learning
25.3 Unified Framework
25.3.1 Framework
25.3.2 Framework Formulation
25.4 Framework Simulation Results
25.4.1 Simulation Environment Construction
25.4.2 Parameter Setting
25.4.3 Simulation Results
25.5 Conclusion
References
26 Super Resolution of Unpaired MR Images Based on Domain Migration
26.1 Introduction
26.2 Proposed Model and Framework
26.2.1 Review of Super-Resolution Theory
26.2.2 Proposed Solution
26.3 Experiments
26.3.1 Experiments Setup
26.3.2 Experiments on fastMRI Dataset
26.4 Conclusion
References
27 Optical Stealth Algorithm Under Photoelectric Countermeasures and Its Effectiveness Evaluation
27.1 Instruction
27.2 Visible Light and Infrared Optical Stealth Algorithm
27.2.1 Using Fuzzy C-Means Clustering Algorithm for Digital Camouflage
27.2.2 Improved Digital Camouflage Algorithm
27.3 Evaluation Index Design of Optical Stealth Performance
27.4 Experiment Evaluation
27.4.1 Data Set Introduction
27.4.2 Experimental Environment Configuration
27.4.3 Analysis of Experimental Results
27.5 Conclusion
References
28 Brainwave Analysis of the Correlation Between Listening to the Rain/Water Sounds and Reducing Human-Perceived Temperature
28.1 Introduction
28.2 Background and Related Work
28.2.1 Classification of Brainwaves
28.2.2 Musical Frequencies
28.2.3 Rain and Water Sounds
28.2.4 Correlation Between Music and Relaxation
28.3 Method
28.4 Design of the Experiments
28.4.1 Experimental Scheme
28.4.2 Experimental Procedure
28.5 Result and Analysis
28.5.1 Data Preprocessing
28.5.2 Correlation Between Questionnaire Results and Brainwaves
28.5.3 Discrete-Time Fourier Transform (DTFT)
28.5.4 Result
28.6 Conclusion
References
29 Detection of Unknown DDoS Attack Using Modified Dynamic High-Resolution Network
29.1 Introduction
29.2 Related Work
29.2.1 IDS Based on Machine Learning and Deep Learning
29.2.2 Open Set Recognition
29.2.3 Unknown DDoS Detection
29.3 Materials and Methods
29.3.1 SLCPL
29.3.2 Reconstruction Loss
29.3.3 Unknown Identification Module
29.3.4 Incremental Learning
29.4 Experiment Results and Discussion
29.4.1 Dataset
29.4.2 Framework
29.4.3 Unknown Attack Detection and Analysis
29.5 Conclusions
References
30 A Saliva Fern Recognition with Image Tone Equalization and Detection Method
30.1 Introduction
30.2 Literature Review
30.2.1 Tone Equalization
30.2.2 Median Filter
30.2.3 Edge Detection
30.3 A Saliva Fern Recognition with Image Tone Equalization and Detection Method
30.3.1 Scenario
30.3.2 Recognition of Saliva Fern Edge
30.3.3 Image Tone Equalization
30.4 Experimental Results and Analysis
30.4.1 Experiment Setup
30.4.2 Experimental Procedure
30.4.3 Data Analysis
30.5 Conclusions
References
31 Data Augmentation Based on Topic Relevance to Enhance Text Classification in Scarcity of Training Data
31.1 Introduction
31.2 Related Work
31.2.1 Natural Language Processing
31.2.2 Bidirectional Encoder Representations from Transformers (BERT)
31.2.3 Keyword Extraction Techniques
31.3 Data Augmentation Based on Topic Relevance
31.3.1 Application Scenario
31.3.2 Data Preprocessing
31.3.3 Data Augmentation
31.4 Experiment and Effectiveness Evaluation
31.4.1 Experimental Purpose
31.4.2 Experimental Process
31.4.3 Experimental Results and Analysis
31.5 Conclusion
References
32 Dam Control System’s Cybersecurity Testbed
32.1 Introduction
32.2 Background and Related Work
32.2.1 Industrial Control System Architecture
32.2.2 Offensive on Industrial Control System
32.2.3 Critical Infrastructure Cybersecurity Testbed
32.3 Dam Control System’s Cybersecurity Testbed Architecture
32.4 Experimental Results and Testbed Evaluations
32.5 Conclusion
References
33 Multiple-Threshold Erasable Mining Under the Tightest Constraint
33.1 Introduction
33.2 Related Works
33.2.1 Erasable Itemset Mining
33.2.2 Multiple Threshold Mining
33.3 Problem Description
33.4 The Proposed Algorithm Under the Tightest Constraint
33.5 Experiments
33.6 Conclusion and Future Work
References
34 Computational Intelligence and AI-FML Experience Model for Pre-university Student Learning and Practice
34.1 Introduction
34.2 Computational Intelligence and AI-FML Experience Model
34.2.1 CI&AI-FML Human and Machine Co-learning Model
34.2.2 CI&AI-FML Experience with AI-FML Robot and AI-FML MoonCar
34.3 CI&AI-FML Metaverse for Pre-university Student Practice
34.3.1 CI&AI-FML Learning Content for Pre-university Student Experience
34.3.2 CI&AI-FML Experience and Learning Model for Pre-university Student Practice
34.4 Experimental Results
34.4.1 IEEE WCCI 2022 Competition Demonstration
34.4.2 AI-FML-LT Assembly and Learning @ 2022 IEEE CIS Summer School
34.5 Conclusions
References
35 Spoken Dialogue System Development Without Speech Recognition Towards Language Revitalization
35.1 Introduction
35.2 Related Work
35.2.1 Retrieval-Based Spoken Dialogue Systems
35.2.2 Query-by-Example Spoken Term Detection
35.3 Spoken Dialogue System Without Speech Recognizer/Synthesizer
35.3.1 Overview of the Proposed System
35.3.2 Nonlinear Matching Between Speech Feature Sequences
35.4 Experiment
35.4.1 Material
35.4.2 Word-Based Result
35.4.3 Feature Extraction
35.4.4 Results
35.4.5 Discussion
35.5 Conclusion
References
36 Effect of Data Size and Machine Translation on the Accuracy of Automatic Personality Classification
36.1 Introduction
36.2 Related Work
36.2.1 Personality Traits
36.2.2 Personality Recognition from Text
36.3 Effect of Data Size and Classifiers
36.3.1 Dataset and Preprocessing
36.3.2 Classifiers
36.3.3 Results
36.4 Use of Machine-Translated Data
36.4.1 Preparing Machine-Translated Data
36.4.2 Classification Result
36.5 Conclusion
References
37 Psychoacoustic Study of Japanese Mimetics for Food Textures
37.1 Introduction
37.2 Experiment 1
37.3 Experiment 2
37.4 General Discussion
References
38 Prediction of Engagement from Facial Expressions: Effect of Dynamic Factors
38.1 Introduction
38.2 Methods
38.2.1 Data Collection
38.2.2 Response Time Prediction
38.3 Result
38.3.1 Response Time Prediction
38.3.2 Feature Importance
38.4 Discussion
38.5 Conclusion
References
Author Index