Showing 50 of 110 papers in AI / CS

Postprint: A Survey on Hyperledger Applications in IoT from a Reconstructed Graph Perspective

Leng Zeqi, Wang Kunhao, Liang Wei, Zheng Yuefeng
2022-05-10 ChinaXiv:chinaxiv-202205.00067

In deploying blockchain-based IoT applications, technical obstacles have emerged, including lack of fine-grained privacy protection, low transaction processing efficiency, high latency, and insufficient flexibility and dynamism. To further advance the popularization and practical deployment of block…

A Survey of Deep Learning-Based Video Action Recognition Techniques: Postprint

Li Chen, He Ming, Wang Yong, Luo Ling, Han Wei
2022-05-10 ChinaXiv:chinaxiv-202205.00068

Action Recognition (AR) represents a research hotspot in the field of computer vision, with extensive application prospects in security surveillance, autonomous driving, production safety, and other domains. First, the connotation and extension of action recognition are analyzed, and the technical c…

Efficient Revocable Identity-Based SM9 Signature Algorithm Postprint

Zhang Boxin, Geng Shengling, Qin Baodong
2022-05-10 ChinaXiv:chinaxiv-202205.00072

SM9-IBS is an identity-based signature algorithm industry standard published by China in 2016. Although identity-based signature algorithms reduce the complexity of system management of user public keys, they suffer from the difficult problem of key revocation. Furthermore, the special structure of …

Postprint: Decision Algorithm for Airport Gate Reallocation Based on Imitation Learning

Xing Zhiwei, Zhang Qianqian, Luo Qian, Chen Zhaoxin
2022-05-10 ChinaXiv:chinaxiv-202205.00074

To address the issue that gate reallocation algorithm results struggle to satisfy the operating habits of different operators, a gate reallocation recommendation algorithm that aligns with the operational habits of actual operational staff is proposed. First, a decision environment space model is co…

Postprint: Real-Time Pricing Strategy Using Reinforcement Learning Considering Load Uncertainty

Jingqi Wang, Gao Yan, Wu Zhiqiang, Li Renjie
2022-05-10 ChinaXiv:chinaxiv-202205.00076

In response to the current challenges of load uncertainty, renewable energy integration, and "dual carbon" objectives in power systems, this paper establishes a real-time pricing model that incorporates load uncertainty and carbon trading within the smart grid context, while fully considering the we…

Knowledge-Aware Propagation Recommendation Algorithm Based on User Latent Interests (Postprint)

Zhang Bo, Zhao Peng, Zhang Jinjin, Zeng Zhaoju, Xiao Xuhao
2022-05-10 ChinaXiv:chinaxiv-202205.00078

Integrating knowledge graphs into recommendation systems can leverage the semantic relationships between entities in knowledge graphs to learn user and item representations. Embedding propagation-based methods utilize the graph structure of knowledge graphs to learn relevant features, but as the pro…

Deep Reinforcement Learning-Based Stochastic Resource-Constrained Multi-Project Dynamic Scheduling Strategy Postprint

Guo Xiaojian, Hu Fangyong
2022-05-10 ChinaXiv:chinaxiv-202205.00080

Currently, research on the Stochastic Duration Distributed Resource-Constrained Multi-Project Scheduling Problem (SDRCMPSP) is scarce, with most studies focusing on static scheduling schemes that cannot adjust and optimize strategies in real-time in response to environmental changes or promptly addr…

<PARA id="1">Postprint: An Implicit Deep Collaborative Recommendation Model Integrating Propositional Logic and Neural Networks</PARA>

Chen Bang, Wu Maonian, Zhu Shaojun, Zheng Bo, Peng Wei
2022-05-10 ChinaXiv:chinaxiv-202205.00081

With the goal of enhancing the cognitive reasoning capability of recommendation algorithm models and overcoming the current limitation where traditional recommendation algorithms heavily rely on data quality, resulting in constrained performance, we propose an implicit deep collaborative recommendat…

Dual-Branch Upsampling Domain Adaptation Network for Unsupervised Segmentation (Postprint)

Han Zonghuan, Liu Mingguo, Li Shen, Chen Lijia, Tian Min, Lan Tianxiang, Liang Qian
2022-05-10 ChinaXiv:chinaxiv-202205.00083

In industrial applications, fully supervised semantic segmentation for surface imprinted character images incurs high dataset annotation costs for enterprises. To address this issue, we propose a dual-branch feature fusion domain adaptation segmentation method (Dual-branch Feature Fusion Domain Adap…

Postprint: Joint Side and Main Path Decoding Feature Learning Method for Multiple Description Coding Image Enhancement

Zhao Lijun, Cao Congying, ZHANG Jinjing, Bai Huihui, Zhao Yao, Wang Anhong
2022-05-10 ChinaXiv:chinaxiv-202205.00084

We propose a multi-description coding image enhancement method based on joint side and central decoding feature learning, which simultaneously considers both side decoding image enhancement and central decoding image enhancement, thereby enabling better network training through joint optimization of…

Postprint: Comparative Sentence Processing in Attention-Based Sentiment Analysis

Zhang Rong, Liu Yuan, Li Yang
2022-05-10 ChinaXiv:chinaxiv-202205.00093

Aspect-level sentiment analysis aims to determine the sentiment polarity toward specific aspects in reviews; however, few studies have investigated the impact of complex sentences on sentiment classification. Based on this, we propose an aspect-level sentiment analysis model based on BERT and a self…

Time-Varying Analysis of Investor Sentiment, Stock Market Liquidity, and Volatility: Based on Deep Learning BERT Model and TVP-VAR Model

Zhang Chenrui, Wu Xinyi, Deng Hailu, Zhang Huiwei, Zhang Chenrui
2022-05-10 ChinaXiv:chinaxiv-202205.00034

Based on comment data from Eastmoney.com's Shenzhen Component Index stock forum between January 1, 2018 and December 31, 2019, this study extracts investor sentiment embedded therein using a deep learning BERT model, and employs a TVP-VAR model to investigate the time-varying dynamic relationships a…

A Survey of Subword Tokenization Methods in Neural Natural Language Processing

Liu Qun, Liu Qun
2022-05-04 ChinaXiv:chinaxiv-202205.00015

This paper presents a comprehensive survey of subword tokenization methods in neural network-based natural language processing. It first elaborates on the out-of-vocabulary (OOV) problem stemming from closed vocabulary limitations in such approaches, and introduces three prevalent methods for addres…

Fast detection method for Baggage pallet based on multi-layer

Qijun Luo, Zheng Li, Qingji Gao, Zheng Li
2022-04-18 ChinaXiv:chinaxiv-202204.00127

In self-service baggage check-in and sorting for civil aviation, automatically detecting whether pallets are added to self-dropped baggage is an essential function; however, the pallets are largely obscured by the embedded baggage, which poses a challenging problem. To address this issue, a fast det…

Construction and Application of Citation Linkages Between Papers and Citing Literature: Solving the Bottleneck Problem in Citation Analysis

Wang Lixue, Wang Lixue
2022-04-15 ChinaXiv:chinaxiv-202204.00139

[Purpose/Significance] Researchers require citation linkages that identify the cited papers referenced by citing documents; however, the commonly downloaded data only contains the references listed in citing documents. Only by establishing a mapping between reference entries and cited papers can cit…

Layout-Guided Multi-Object Scene Novel View Synthesis Network: Postprint

Gao Xiaotian, Zhang Qian, Lü Fan, Hu Fuyuan, Hu Fuyuan
2022-04-07 ChinaXiv:chinaxiv-202204.00031

The novel view synthesis task refers to generating novel-view images of a scene from multiple reference images. However, in multi-object scenes, inter-object occlusion leads to incomplete acquisition of object information, resulting in artifacts and misalignment issues in the generated novel-view sc…

Postprint: Salient Object Detection with Deep Reuse of Multi-Scale Features

Zhou Zhiping, Fan Bin, fir, Xu Wencheng
2022-04-07 ChinaXiv:chinaxiv-202204.00036

To address the limitations of conventional salient object detection methods in detecting multiple salient objects at different scales, we propose a salient object detection algorithm based on deep reuse of multi-scale features. The network model consists of vertically stacked bidirectional dense fea…

Postprint: Deep Reinforcement Learning Traffic Signal Control with State Prediction

Tang Muyao, Zhou Dake, Li Tao
2022-04-07 ChinaXiv:chinaxiv-202204.00039

Deep Reinforcement Learning (DRL) can be widely applied in the field of urban traffic signal control; however, in existing research, the vast majority of DRL agents utilize only the current traffic state for decision-making, resulting in limited control effectiveness under conditions of significant …

A Survey of GAN-based Hand-drawn Sketch Image Translation (Postprint)

Wang Jianxin, Shi Yingjie, Liu Hao, Huang Haiqiao, Du Fang
2022-04-07 ChinaXiv:chinaxiv-202204.00040

Hand-drawn sketch image translation is a challenging research topic in computer vision, with significant application value in artistic design and e-commerce. Currently, GAN-based hand-drawn sketch image translation remains in its infancy. This article analyzes the challenging issues confronting sket…

Postprint: Mobile Crowdsensing Task Allocation Method Based on Data Redundancy Control

He Xingyu, Zhao Dan, Yang Guisong, Jin Ziri, Yangkailong Qin, Wang Qipei
2022-04-07 ChinaXiv:chinaxiv-202204.00042

In mobile crowdsensing systems, tasks exhibit spatiotemporal coverage overlap, which may lead to redundant data collection and consequently cause data redundancy issues. To address this, we propose a task allocation method that can simultaneously control both intra-task and inter-task data redundanc…

A Survey on Relay-Assisted Computation Offloading Methods in Mobile Edge Computing: Postprint

Chen Che, Zheng Yifeng, Yang Jingmin, Xie Lingfu, Wenjie Zhang
2022-04-07 ChinaXiv:chinaxiv-202204.00044

To address the challenges of next-generation networks in coverage, deployment cost, and capacity, Mobile Edge Computing (MEC) often necessitates the assistance of relay nodes to execute computation-intensive and delay-sensitive tasks. This paper first introduces the fundamental architecture of relay…

Research on Multi-Intersection Signal Control Optimization Based on Deep Reinforcement Learning (Postprint)

Zhao Chun, Dong Xiaoming, Ren Yiying
2022-04-07 ChinaXiv:chinaxiv-202204.00045

Emerging intelligent transportation systems hold significant promise for improving traffic flow, optimizing fuel efficiency, reducing delays, and enhancing overall driving experience. Currently, traffic congestion constitutes an extremely serious challenge for humanity, particularly severe at urban …

An Improved Cuckoo Search Algorithm for the Dual Resource Constrained Flexible Job Shop Scheduling Problem (postprint)

Luo Haojia, Pan Dazhi
2022-04-07 ChinaXiv:chinaxiv-202204.00047

For the Dual-Resource Constrained Flexible Job Shop Scheduling Problem (DRCFJSP), a Cuckoo Algorithm with an improved decoding scheme is proposed to optimize the makespan. Since DRCFJSP requires consideration of both machine allocation and worker processing status, the traditional decoding method is…

Graph Attention Network-Based Recommendation of Issue Resolution Participants in Open Source Communities: Postprint

Zhao Haiyan, Xia Wenzhong, Cao Jian, Chen Qingkui
2022-04-07 ChinaXiv:chinaxiv-202204.00049

In open source communities, the promptness and quality of responses to developers' issues critically determine community vitality. Therefore, identifying and recommending appropriate problem solvers for newly submitted issues facilitates community development. This paper proposes a problem solver re…

Postprint of Short-Term Demand Forecasting Model for Public Bicycles Considering Variable Environmental Factors

Qiao Jian, Chen Shaobo, He Mengying
2022-04-07 ChinaXiv:chinaxiv-202204.00053

Existing short-term demand forecasting models for public bicycles have neglected the nature differences in how various environmental factors influence user demand, as well as the temporal dependencies of variable environmental factors. This paper distinguishes environmental factors into invariant fa…

An Improved Warning Propagation Algorithm for Solving Max-SAT Problems (Postprint)

Wu Yuxiang, Wang Xiaofeng, Ding Hongsheng, Yu Zhuo
2022-04-07 ChinaXiv:chinaxiv-202204.00054

Max-SAT is the optimization version of the SAT problem, with the objective of finding a variable assignment that maximizes the number of satisfied clauses in a given clause set. This problem is typically NP-hard. With the in-depth development of big data and artificial intelligence, existing algorit…

Postprint: Dynamic Cooperative Coverage Optimization Algorithm for UAVs Based on Trajectory Prediction in the Internet of Vehicles

Wu Zhuang, Tang Lun, Pu Hao, Wang Zhiping, Chen Qianbin
2022-04-07 ChinaXiv:chinaxiv-202204.00055

To address issues such as base station coverage holes and local traffic overload in urban vehicular networks, this paper proposes a dynamic pre-deployment scheme based on vehicle trajectory prediction information. First, to train a unified Seq2Seq-GRU trajectory prediction model, multiple UAVs equip…

A Vigilance Estimation Method Based on EEG Differential Entropy Postprint

Chen Wan, Cai Yanping, Li Aihua, Myrica rubra branch, Jiang Ke
2022-04-07 ChinaXiv:chinaxiv-202204.00056

To improve the real-time estimation accuracy of human vigilance, a real-time vigilance estimation method based on differential entropy (DE), improved moving average, and bidirectional two-dimensional principal component analysis (TD-2DPCA) is proposed. First, the total frequency band is decomposed i…

Hybrid Auto-Scaling of Microservices Based on Load Prediction (Postprint)

Song Chenghao, Jiang Lingyun
2022-04-07 ChinaXiv:chinaxiv-202204.00057

Given that edge clouds lack more powerful computational processing capabilities compared to central clouds, they are susceptible to unnecessary scaling jitter or insufficient resource processing capability when handling dynamic workloads. This paper therefore conducts experimental evaluations on mic…

Adaptive Capsule Network for Few-Shot Relation Extraction (Postprint)

Xiaoming Zhang, Dou Quansheng, Chen Shuzhen, Huanling Tang
2022-04-07 ChinaXiv:chinaxiv-202204.00058

Few-shot relation extraction is a prominent research problem in natural language processing, which aims to train relation extraction models with low-cost annotated data. The currently widely-used prototype networks suffer from issues of inaccurate and incomplete class prototype representation. To ad…

A Study on the Greedy Repair Strategy for Particle Swarm Optimization in the Discounted {0-1} Knapsack Problem (Postprint)

Dai Zuhua, Zhou Bin, Long Yujing, Wang Zongquan
2022-04-07 ChinaXiv:chinaxiv-202204.00059

When swarm intelligence heuristic algorithms solve the Discounted {0-1} Knapsack Problem (D{0-1}KP), some repair and optimization strategy is required to transform abnormal encoding individuals into encoding individuals that satisfy the solution constraints, in order to improve solution efficiency a…

Traffic Flow Forecasting Based on Adaptive Gated Graph Neural Network: Postprint

Wang Yang, Zheng Jin, Ying Liu, Li Ping
2022-04-07 ChinaXiv:chinaxiv-202204.00062

Traffic flow prediction constitutes a crucial component of intelligent transportation systems. Due to the complexity of traffic data, long-term and accurate traffic flow prediction has consistently remained one of the most challenging tasks in time series forecasting. In recent years, researchers ha…

Cross-Domain Recommendation Based on Graph Generative Process Postprint

Cai Ruichu, Wu Fengzhu, Li Zijian
2022-04-07 ChinaXiv:chinaxiv-202204.00063

Recommendation systems have found extensive applications across diverse domains, profoundly influencing daily life. Training an effective recommendation system typically requires vast amounts of "user-item" interaction data; however, data obtained in practice is often extremely sparse, frequently le…

A Picat Method for Optimized Computation of Slater Voting Winners (Postprint)

AO Huan, Wang Yisong, Feng Renyan, Deng Zhouhui, Tong Tianle
2022-04-07 ChinaXiv:chinaxiv-202204.00065

Slater voting rule is a tournament-based voting rule that primarily constructs an acyclic tournament, finds one with minimal difference from the original tournament, and selects the winner from it. For the NP-hard Slater voting algorithm, a Picat method for optimized solving of the Slater problem ba…

Postprint: Achieving Location Privacy Protection through Local Differential Privacy under K-Anonymity

Liu Zhenpeng, Miao Dewei, Liu Qiannan, Li Ruilin, Li Xiaofei
2022-04-07 ChinaXiv:chinaxiv-202204.00066

To address the issue of attackers exploiting background knowledge and other information to launch attacks during user location privacy protection, this paper proposes a location privacy protection method for mobile terminals. The scheme leverages k-anonymity and local differential privacy techniques…

Postprint of Adversarial Training Method for Graph Convolutional Neural Networks Based on Non-Robust Features

Chengqi, Zhu Hongliang, Xin Yang
2022-04-07 ChinaXiv:chinaxiv-202204.00067

Graph Convolutional Networks (GCNs) can extract effective information from graph data through graph convolutions, but they are vulnerable to adversarial attacks that degrade model performance. While adversarial training can enhance neural network robustness, the discrete nature of graph structures a…

Transformer-Based Multi-Branch Single Image Deraining Method Postprint

Tan Fuxiang, Qian Yurong, Kong Yuting, Zhang Hao, Zhou Daxin, Fan Yingying, Chen Long
2022-04-07 ChinaXiv:chinaxiv-202204.00073

Rain streaks severely degrade the quality of captured images, affecting subsequent computer vision tasks. To improve the quality of rainy images, we propose a Transformer-based single image deraining algorithm. First, the algorithm obtains a large receptive field through a transformer with a windowi…

Postprint: P4-Based Consistency Verification of SDN Control-Data Plane Flow Rules

Xia Jiqiang, Cui Pengshuai, Li Ziyong, Lan Julong
2022-04-07 ChinaXiv:chinaxiv-202204.00074

To address the problem of inconsistency between control-plane and data-plane flow rules caused by hardware/software failures and misconfigurations in the SDN data plane, we propose a P4-based consistency verification mechanism for SDN control-data plane flow rules (P4CV, P4-based Consistency Verific…

Lattice-Based Identity-Based Accountable Proxy Re-Encryption Scheme Postprint

Meng Hui, Ren Lina, Li Ying
2022-04-07 ChinaXiv:chinaxiv-202204.00075

To address issues such as key abuse and digital certificate management in existing lattice-based proxy re-encryption schemes, we introduce an accountability mechanism and propose a novel identity-based accountable proxy re-encryption scheme. This scheme employs user identity ID to compute and genera…

A Vertical Handoff Algorithm Based on Mobile User Location Prediction (Postprint)

Meng Lei, Tang Xin, Xu Yanyan
2022-04-07 ChinaXiv:chinaxiv-202204.00080

To address the issue that existing vertical handover algorithms in heterogeneous wireless network environments struggle to achieve seamless handover for mobile users accessing networks and fail to provide stable communication services, a vertical handover algorithm based on mobile user location pred…