Information Technology and Control
https://itc.ktu.lt/index.php/ITC
<p>Periodical journal <em>Information Technology and Control / Informacinės technologijos ir valdymas</em> covers a wide field of computer science and control systems related problems. All articles should be prepared considering the requirements of the journal. Please use <a style="font-size: normal; text-decoration: underline;" href="https://itc.ktu.lt/public/journals/13/Guidelines for Preparing a Paper for Information Technology and Control (5).doc.rtf">„Article Template“</a> to prepare your paper properly. Together with your article, please submit a signed <a href="https://itc.ktu.lt/public/journals/13/info/Authors_Guarantee_Form_ITC.DOCX">Author's Guarantee Form</a>.</p>Kaunas University of Technologyen-USInformation Technology and Control 1392-124X<p>Copyright terms are indicated in the Republic of Lithuania Law on Copyright and Related Rights, Articles 4-37.</p>Verification of 3D Electrical Equipment Model Based on Cross-source Point Cloud Registration Using Deep Neural Netwo
https://itc.ktu.lt/index.php/ITC/article/view/37475
<p>With the popularization of digital twin techniques in power substations, assessment and verification of electrical equipment 3D models in digital twins according to as-built LiDAR point clouds become essential for the quality assurance of the designed substation models. However, computing the shape and texture differences between a 3D model and its corresponding point cloud is challenging due to the difficulty in aligning cross-source equipment point clouds with local geometric shape variations. In this paper, we propose a 3D model verification method based on overlap-aware cross-source point cloud registration. The key of the method is an overlap attention-based point cloud registration network with grouped KPConv, attention mechanism, and overlap-weighted circle loss. It improves the registration accuracy against local geometric shape variations between 3D models and LiDAR point clouds. In addition, due to the lack of real-world point cloud samples of electrical equipment, a novel point cloud augmentation method is employed for generating synthetic point clouds for improving the sim-to-real generalization capability of the network. Based on the pose alignment of the 3D model and the corresponding point cloud, a facet-level computing method is proposed for model differentiation and colorization. Experimental results using real-world point clouds of power substation equipment validate the performance of the proposed method.</p>Hai YuZhimin HeLin PengAihua Zhou
Copyright (c) 2024 Information Technology and Control
2024-12-212024-12-2153498399610.5755/j01.itc.53.4.37475Flexible Job Shop Scheduling Optimization with Machine and AGV Integration Based on Improved NSGA-II
https://itc.ktu.lt/index.php/ITC/article/view/37410
<p>Aiming at the problem of integrated scheduling of machines and AGVs in a flexible job shop, this paper constructs a scheduling model with the optimization objectives of minimizing the maximum completion time, minimizing the machine load, and minimizing the total energy consumption. This model is based on a comprehensive consideration of the payload time and no-load time of AGVs between the loading and unloading stations and the machining machines. An improved NSGA-II algorithm is proposed to address this problem. The algorithm adopts a three-level coding structure based on processes, machines, and AGVs, and employs differentiated cross-variation strategies for different levels to enhance its global search capability. A variable domain search algorithm is introduced to boost the local search capability by combining different neighborhood search methods within the three-level coding structure. Additionally, reverse individuals are introduced to improve the elite retention strategy, thereby increasing the diversity of the population. Ultimately, the case test results demonstrate that the improved NSGA-II algorithm exhibits superior performance in solving the flexible job shop scheduling problem involving AGVs, and the effect of the number of AGVs on the scheduling objectives conforms to the law of diminishing marginal utility.</p>Yong LiuTao HuangYong ChenLi LiuTao Guo
Copyright (c) 2024 Information Technology and Control
2024-12-212024-12-21534997101510.5755/j01.itc.53.4.37410Instability Hazard Effect of Mined-out Areas Near the Mining Site by Fusion InSAR and PSO-BP Rock Mechanical Parameter Inversion
https://itc.ktu.lt/index.php/ITC/article/view/37133
<p><span class="TextRun SCXW105031744 BCX0" lang="EN-GB" xml:lang="EN-GB" data-contrast="none"><span class="NormalTextRun SCXW105031744 BCX0" data-ccp-parastyle="Body Text">Exploring the impact characteristics of near the mining activities on goaf and clarifying the disaster effects of instability in the mined-out area are critical research </span><span class="NormalTextRun SpellingErrorV2Themed SCXW105031744 BCX0" data-ccp-parastyle="Body Text">endeavors</span><span class="NormalTextRun SCXW105031744 BCX0" data-ccp-parastyle="Body Text"> essential for effectively managing major risk hazards inherent to underground mining operations. This study integrates SBAS-</span><span class="NormalTextRun SCXW105031744 BCX0" data-ccp-parastyle="Body Text">InSAR</span><span class="NormalTextRun SCXW105031744 BCX0" data-ccp-parastyle="Body Text"> and PSO-BP methodologies for inversely </span><span class="NormalTextRun SpellingErrorV2Themed SCXW105031744 BCX0" data-ccp-parastyle="Body Text">analyzing</span><span class="NormalTextRun SCXW105031744 BCX0" data-ccp-parastyle="Body Text"> rock mechanical parameters in a lead-zinc deposit and applies the inversion results through the FLAC</span></span><span class="TextRun SCXW105031744 BCX0" lang="EN-GB" xml:lang="EN-GB" data-contrast="none"><span class="NormalTextRun Superscript SCXW105031744 BCX0" data-fontsize="10" data-ccp-parastyle="Body Text">3D</span></span><span class="TextRun SCXW105031744 BCX0" lang="EN-GB" xml:lang="EN-GB" data-contrast="none"><span class="NormalTextRun SCXW105031744 BCX0" data-ccp-parastyle="Body Text"> simulation method to the mining site </span><span class="NormalTextRun SCXW105031744 BCX0" data-ccp-parastyle="Body Text">adjacent to</span><span class="NormalTextRun SCXW105031744 BCX0" data-ccp-parastyle="Body Text"> the null zone to study destabilizing disaster effects in the mined-out area under the influence of mining disturbance. The simulation aims to </span><span class="NormalTextRun SpellingErrorV2Themed SCXW105031744 BCX0" data-ccp-parastyle="Body Text">analyze</span><span class="NormalTextRun SCXW105031744 BCX0" data-ccp-parastyle="Body Text"> the evolution process of surrounding rock destruction and instability in empty areas, </span><span class="NormalTextRun SCXW105031744 BCX0" data-ccp-parastyle="Body Text">identify</span><span class="NormalTextRun SCXW105031744 BCX0" data-ccp-parastyle="Body Text"> the primary causes of disaster effects, develop a risk assessment and judgment model, and prevent accidents from occurring. The results of the study show that the integration of SBAS-</span><span class="NormalTextRun SCXW105031744 BCX0" data-ccp-parastyle="Body Text">InSAR</span><span class="NormalTextRun SCXW105031744 BCX0" data-ccp-parastyle="Body Text"> and PSO-BP techniques for inverting rock mechanical parameters has yielded </span><span class="NormalTextRun SpellingErrorV2Themed SCXW105031744 BCX0" data-ccp-parastyle="Body Text">favorable</span><span class="NormalTextRun SCXW105031744 BCX0" data-ccp-parastyle="Body Text"> outcomes in </span><span class="NormalTextRun SpellingErrorV2Themed SCXW105031744 BCX0" data-ccp-parastyle="Body Text">analyzing</span><span class="NormalTextRun SCXW105031744 BCX0" data-ccp-parastyle="Body Text"> the destabilizing effect of the gob area near the mining site, and more accurately, it obtained the displacement and stress characteristics of the roof and pillars in the goaf under the mining disturbance as the mining near the empty area progresses. The simulation results </span><span class="NormalTextRun SCXW105031744 BCX0" data-ccp-parastyle="Body Text">demonstrate</span><span class="NormalTextRun SCXW105031744 BCX0" data-ccp-parastyle="Body Text"> that influenced by mining disturbance, the </span><span class="NormalTextRun SCXW105031744 BCX0" data-ccp-parastyle="Body Text">maximum</span><span class="NormalTextRun SCXW105031744 BCX0" data-ccp-parastyle="Body Text"> principal stress of the ore column in the void area significantly increases, primarily appearing as compressive stress. The distribution of the plastic zone </span><span class="NormalTextRun SCXW105031744 BCX0" data-ccp-parastyle="Body Text">indicates</span><span class="NormalTextRun SCXW105031744 BCX0" data-ccp-parastyle="Body Text"> notably that the process of plastic deformation of the ore column leading to damage is primarily due to </span><span class="NormalTextRun SCXW105031744 BCX0" data-ccp-parastyle="Body Text">maximum</span><span class="NormalTextRun SCXW105031744 BCX0" data-ccp-parastyle="Body Text"> shear stress.</span> <span class="NormalTextRun SCXW105031744 BCX0" data-ccp-parastyle="Body Text">Evidently, the</span><span class="NormalTextRun SCXW105031744 BCX0" data-ccp-parastyle="Body Text"> primary reason for the destabilization of the ore column is the concentration of stress resulting from mining disturbance, leading to </span><span class="NormalTextRun SCXW105031744 BCX0" data-ccp-parastyle="Body Text">compression and shear damage.FLAC</span></span><span class="TextRun SCXW105031744 BCX0" lang="EN-GB" xml:lang="EN-GB" data-contrast="none"><span class="NormalTextRun Superscript SCXW105031744 BCX0" data-fontsize="10" data-ccp-parastyle="Body Text">3D</span></span><span class="TextRun SCXW105031744 BCX0" lang="EN-GB" xml:lang="EN-GB" data-contrast="none"><span class="NormalTextRun SCXW105031744 BCX0" data-ccp-parastyle="Body Text"> simulation analysis has conclusively </span><span class="NormalTextRun SCXW105031744 BCX0" data-ccp-parastyle="Body Text">determined</span><span class="NormalTextRun SCXW105031744 BCX0" data-ccp-parastyle="Body Text"> that pressure shear damage to the ore column resulting from undermining disturbance is the main cause of airspace destabilization in mining. The research </span><span class="NormalTextRun SCXW105031744 BCX0" data-ccp-parastyle="Body Text">methodology</span><span class="NormalTextRun SCXW105031744 BCX0" data-ccp-parastyle="Body Text"> and analysis results provide vital theoretical support for the prevention and control measures against destabilization disasters in empty zones near mining sites, holding significant theoretical and practical value.</span></span><span class="EOP SCXW105031744 BCX0" data-ccp-props="{"134245417":false,"201341983":0,"335551550":6,"335551620":6,"335559685":862,"335559737":132,"335559738":131,"335559740":218}"> </span></p>Liwei YuanDi ChenSumin Li GuoLong WangYanlin LiJi PengZhuo Qi
Copyright (c) 2024 Information Technology and Control
2024-12-212024-12-215341016102710.5755/j01.itc.53.4.37133Enhanced Feature Extraction with AL-YOLOv9s Lightweight Model: Application in Key Component Recognition Within Highly Integrated Device Environments
https://itc.ktu.lt/index.php/ITC/article/view/37632
<p>In environments containing highly integrated devices, accurately monitoring the status of circuit breaker lockouts is essential for maintaining the stability of power systems. Traditional detection methods are often inadequate due to complex equipment configurations and severe operational challenges. This paper presents an enhanced detection model, the AL-YOLOv9s, which improves the efficiency and accuracy of detecting circuit breaker lockouts. The AL-YOLOv9s model is based on the advanced YOLOv9s algorithm and incorporates an enhanced efficient multi-scale attention module to boost feature extraction capabilities. It also integrates channel and spatial attention mechanisms to optimize the feature fusion process, thereby improving detection performance. Additionally, the model has been optimized to a size of 4.7M, making it suitable for lightweight field applications without compromising accuracy. Experimental results demonstrate that the AL-YOLOv9s model achieves high standards in accuracy and portability, thus offering an effective and practical solution for lockout detection.</p>Yang WangWei PanLiming WangPeng Zhang
Copyright (c) 2024 Information Technology and Control
2024-12-212024-12-215341028104110.5755/j01.itc.53.4.37632A Study on 3D Human Pose Estimation with a Hybrid Algorithm of Spatio-temporal Semantic Graph Attention and Deep Learning
https://itc.ktu.lt/index.php/ITC/article/view/37243
<p><span class="TextRun SCXW43493837 BCX0" lang="EN-GB" xml:lang="EN-GB" data-contrast="auto"><span class="NormalTextRun SCXW43493837 BCX0" data-ccp-parastyle="Body Text">T</span><span class="NormalTextRun SCXW43493837 BCX0" data-ccp-parastyle="Body Text">his paper introduces a method to enhance 3D human pose estimation accuracy by </span><span class="NormalTextRun SCXW43493837 BCX0" data-ccp-parastyle="Body Text">leveraging</span><span class="NormalTextRun SCXW43493837 BCX0" data-ccp-parastyle="Body Text"> human topological structure and temporal </span><span class="NormalTextRun SCXW43493837 BCX0" data-ccp-parastyle="Body Text">information, addressing inaccuracies due to occlusion and complex poses. It proposes a spatiotemporal Transformer network that aggregates local temporal information to predict 3D poses for video frames, reducing sequence length through cross-step convoluti</span><span class="NormalTextRun SCXW43493837 BCX0" data-ccp-parastyle="Body Text">on. To further handle occlusion and information loss, the paper suggests a spatiotemporal graph attention network that incorporates spatial constraints and graph convolution with an improved adjacency matrix to emphasize local information in pose inference</span><span class="NormalTextRun SCXW43493837 BCX0" data-ccp-parastyle="Body Text">. A temporal convolutional network is also employed to model time, and the network alternates between temporal and spatial attention modules to prevent spatiotemporal information loss. Experiments on Human3.6m and </span><span class="NormalTextRun SpellingErrorV2Themed SCXW43493837 BCX0" data-ccp-parastyle="Body Text">HumanEva</span><span class="NormalTextRun SCXW43493837 BCX0" data-ccp-parastyle="Body Text"> datasets </span><span class="NormalTextRun SCXW43493837 BCX0" data-ccp-parastyle="Body Text">demonstrate</span><span class="NormalTextRun SCXW43493837 BCX0" data-ccp-parastyle="Body Text"> that the pro</span><span class="NormalTextRun SCXW43493837 BCX0" data-ccp-parastyle="Body Text">posed method outperforms other approaches in prediction accuracy.</span></span><span class="EOP SCXW43493837 BCX0" data-ccp-props="{"134245417":false,"201341983":0,"335551550":6,"335551620":6,"335559685":851,"335559737":-34,"335559738":108,"335559740":218}"> </span></p>Shengqing Lin
Copyright (c) 2024 Information Technology and Control
2024-12-212024-12-215341042105910.5755/j01.itc.53.4.37243Integrating Deep Learning into Educational Big Data Analytics for Enhanced Intelligent Learning Platforms
https://itc.ktu.lt/index.php/ITC/article/view/36968
<p>Exploring the field of educational big data analytics and gaining insights into student behaviour and its connection to academic performance is crucial for creating intelligent learning environments. Technological innovations have changed how students learn and reshaped the nature of education. Technological advancements have unquestionably made learning more accessible, faster, and enjoyable for pupils. When deep learning is integrated with learning management systems, intelligent course content may be generated with high accuracy, and no human interaction is required. This study utilises advanced deep learning techniques to analyse the xAPI-Educational Mining Dataset and reveal valuable insights that can significantly improve online learning experiences. The study underscores the crucial importance of parental involvement, emphasising its link to student attendance and overall satisfaction with the educational institution. In addition, the results suggest that students who actively participate in course announcements and utilise resources tend to achieve better academic outcomes, highlighting the significance of resource utilisation in achieving academic success. On the other hand, engaging in conversations seems to have a minimal effect on how students are categorised. Building upon these findings, a novel predictive model is introduced, utilising Long Short-Term Memory (LSTM) networks. This model utilises sequential student interaction data to predict future behaviour and academic outcomes, helping online platforms understand student actions and make informed decisions. This study makes a valuable contribution to developing cutting-edge intelligent learning approaches. It achieves this by utilising the potential of educational big data analytics and deep learning techniques.</p>Min Zhang
Copyright (c) 2024 Information Technology and Control
2024-12-212024-12-215341060107310.5755/j01.itc.53.4.36968Imaging Segmentation of Brain Tumors Based on the Modified U-net Method
https://itc.ktu.lt/index.php/ITC/article/view/37719
<p><span class="TextRun SCXW220567724 BCX0" lang="EN-GB" xml:lang="EN-GB" data-contrast="none"><span class="NormalTextRun SCXW220567724 BCX0" data-ccp-parastyle="Body Text">Brain </span><span class="NormalTextRun SpellingErrorV2Themed SCXW220567724 BCX0" data-ccp-parastyle="Body Text">tumor</span><span class="NormalTextRun SCXW220567724 BCX0" data-ccp-parastyle="Body Text"> segmentation in medical image analysis is a challenging task. Deep learning techniques have recently shown promise in resolving a variety of computer vision problems, such as semantic segmentation and image classification. Brain MRI (magnetic resonance imaging) requires precise brain image segmentation for effective, rapid diagnosis and treatment planning. However, it is quite difficult to manually segment the brain image rapidly and accurately in low-quality, noisy images. This paper proposes a U-Net and combined attention mechanism-based method. This research enhances the segmentation of images of </span><span class="NormalTextRun SpellingErrorV2Themed SCXW220567724 BCX0" data-ccp-parastyle="Body Text">tumors</span><span class="NormalTextRun SCXW220567724 BCX0" data-ccp-parastyle="Body Text"> in the brain using modified U-net. Traditional U-net segmentation techniques are still widely used in the medical field, but they have </span><span class="NormalTextRun SCXW220567724 BCX0" data-ccp-parastyle="Body Text">a number of</span><span class="NormalTextRun SCXW220567724 BCX0" data-ccp-parastyle="Body Text"> limitations when dealing with small targets and fuzzier boundaries. To address this issue, we made the following modifications to U-net: We propose attention mechanisms to </span><span class="NormalTextRun SCXW220567724 BCX0" data-ccp-parastyle="Body Text">assist</span><span class="NormalTextRun SCXW220567724 BCX0" data-ccp-parastyle="Body Text"> the network in concentrating on important regions. The multiscale feature fusion strategy improves the efficacy of network segmentation at various scales. Cross-entropy loss function and data augmentation improve the performance </span><span class="NormalTextRun SCXW220567724 BCX0" data-ccp-parastyle="Body Text">of the network </span><span class="NormalTextRun SCXW220567724 BCX0" data-ccp-parastyle="Body Text">further. Our method was </span><span class="NormalTextRun SCXW220567724 BCX0" data-ccp-parastyle="Body Text">validated</span><span class="NormalTextRun SCXW220567724 BCX0" data-ccp-parastyle="Body Text"> using the Brats2019 dataset. The experimental results </span><span class="NormalTextRun SCXW220567724 BCX0" data-ccp-parastyle="Body Text">demonstrate</span><span class="NormalTextRun SCXW220567724 BCX0" data-ccp-parastyle="Body Text"> that our proposed </span><span class="NormalTextRun SCXW220567724 BCX0" data-ccp-parastyle="Body Text">methodology</span> <span class="NormalTextRun SCXW220567724 BCX0" data-ccp-parastyle="Body Text">exhibits</span><span class="NormalTextRun SCXW220567724 BCX0" data-ccp-parastyle="Body Text"> superior speed and efficiency compared to existing </span><span class="NormalTextRun SCXW220567724 BCX0" data-ccp-parastyle="Body Text">techniques in the context of brain image segmentation. The dice coefficients for the multiple branch TS-U-net model were 0.876, 0.868, and 0.814 in the </span><span class="NormalTextRun SpellingErrorV2Themed SCXW220567724 BCX0" data-ccp-parastyle="Body Text">tumor</span><span class="NormalTextRun SCXW220567724 BCX0" data-ccp-parastyle="Body Text"> subregions of WT, TC, and ET, respectively. This exemplifies the feasibility and potential of our </span><span class="NormalTextRun SCXW220567724 BCX0" data-ccp-parastyle="Body Text">methodology</span><span class="NormalTextRun SCXW220567724 BCX0" data-ccp-parastyle="Body Text"> for the segmentation of medical images.</span></span><span class="EOP SCXW220567724 BCX0" data-ccp-props="{"134245417":false,"201341983":0,"335551550":6,"335551620":6,"335559685":0,"335559738":131,"335559739":0,"335559740":219}"> </span></p>Yajie ZhangHea Choon NgoYifan ZhangNoor Fazilla Abd YusofXiaohan Wang
Copyright (c) 2024 Information Technology and Control
2024-12-212024-12-215341074108710.5755/j01.itc.53.4.37719The Robust Asymmetric Minimum Cost Consensus Models with Interval-type Opinions
https://itc.ktu.lt/index.php/ITC/article/view/37622
<p><span class="TextRun SCXW112670442 BCX0" lang="EN-GB" xml:lang="EN-GB" data-contrast="auto"><span class="NormalTextRun SCXW112670442 BCX0">Existing consensus models primarily rely on precise opinions from decision-makers in a predefined context, neglecting the dynamics of expert opinion adjustments. To address this limitation, we introduce the interval-type opinions and explores the group decision consensus model under asymmetric adjustment cost from an uncertainty perspective. Then, the robust optimization theory is applied to </span><span class="NormalTextRun SpellingErrorV2Themed SCXW112670442 BCX0">adress</span><span class="NormalTextRun SCXW112670442 BCX0"> the uncertainty in adjustment costs of decision-making individuals. The robust asymmetric cost consensus model of interval opinions under three uncertain scenarios is built. Finally, the validity of proposed model is verified by numerical calculations, and a sensitivity analysis and comparative study are performed. The results show that: (1)</span> <span class="NormalTextRun SCXW112670442 BCX0">Utilizing interval opinions can significantly reduce consensus costs when compared to precise opinions; (2) Comprehensively comparing the three proposed robust models, the consensus model with budget asymmetric cost has the best performance.</span></span><span class="EOP SCXW112670442 BCX0" data-ccp-props="{"134245417":false,"335551550":6,"335551620":6}"> </span></p>Zexing DaiZhiming FangGang Zhu
Copyright (c) 2024 Information Technology and Control
2024-12-212024-12-215341088110010.5755/j01.itc.53.4.37622Contour Detection by a Dark-Adaptation Model
https://itc.ktu.lt/index.php/ITC/article/view/37642
<p><span class="TextRun SCXW258874749 BCX0" lang="EN-GB" xml:lang="EN-GB" data-contrast="auto"><span class="NormalTextRun SCXW258874749 BCX0" data-ccp-parastyle="Body Text">The </span><span class="NormalTextRun SpellingErrorV2Themed SCXW258874749 BCX0" data-ccp-parastyle="Body Text">color</span><span class="NormalTextRun SCXW258874749 BCX0" data-ccp-parastyle="Body Text"> contour detection model used for simulating the cone photoreceptor cell- lateral geniculate nucleus</span> <span class="NormalTextRun SCXW258874749 BCX0" data-ccp-parastyle="Body Text">(LGN) </span><span class="NormalTextRun SCXW258874749 BCX0" data-ccp-parastyle="Body Text">–</span><span class="NormalTextRun SCXW258874749 BCX0" data-ccp-parastyle="Body Text"> primary visual cortex (V1) visual pathway has achieved reliable results. In contrast, the rod photoreceptor cells employ a dark adaptive mechanism, which plays a key role in contour extraction in poorly lit environments. We employ this mechanism to propose a bionic model for contour detection. The proposed model divides the dark adaptation process into several stages and extracts the image information at each stage for </span><span class="NormalTextRun SCXW258874749 BCX0" data-ccp-parastyle="Body Text">subsequent</span><span class="NormalTextRun SCXW258874749 BCX0" data-ccp-parastyle="Body Text"> integration. For evaluation, we applied the proposed dark adaptation model as the front-end processing method of the </span><span class="NormalTextRun SpellingErrorV2Themed SCXW258874749 BCX0" data-ccp-parastyle="Body Text">gray</span><span class="NormalTextRun SCXW258874749 BCX0" data-ccp-parastyle="Body Text"> and </span><span class="NormalTextRun SpellingErrorV2Themed SCXW258874749 BCX0" data-ccp-parastyle="Body Text">color</span><span class="NormalTextRun SCXW258874749 BCX0" data-ccp-parastyle="Body Text"> contour detection model, and performed experimental verification on the </span><span class="NormalTextRun SpellingErrorV2Themed SCXW258874749 BCX0" data-ccp-parastyle="Body Text">RuG</span><span class="NormalTextRun SCXW258874749 BCX0" data-ccp-parastyle="Body Text">, BSDS300/500, and NYUD databases. In comparison with a similar </span><span class="NormalTextRun SCXW258874749 BCX0" data-ccp-parastyle="Body Text">state-of-the-art</span><span class="NormalTextRun SCXW258874749 BCX0" data-ccp-parastyle="Body Text"> model, the detection performance of the proposed model has several advantages; in particular, it extracts contour information more effectively in interior scenes lit with dim </span><span class="NormalTextRun SpellingErrorV2Themed SCXW258874749 BCX0" data-ccp-parastyle="Body Text">colors</span><span class="NormalTextRun SCXW258874749 BCX0" data-ccp-parastyle="Body Text">.</span></span><span class="EOP SCXW258874749 BCX0" data-ccp-props="{"134245417":false,"201341983":0,"335551550":6,"335551620":6,"335559685":861,"335559737":132,"335559738":131,"335559740":218}"> </span></p>Wei ZhouYakun Qiao
Copyright (c) 2024 Information Technology and Control
2024-12-212024-12-215341101111810.5755/j01.itc.53.4.37642Point Cloud Upsampling Network Incorporating Dynamic Graph Convolution and Multi-Head Attention
https://itc.ktu.lt/index.php/ITC/article/view/37310
<p><span class="TextRun SCXW53717806 BCX0" lang="EN-GB" xml:lang="EN-GB" data-contrast="none"><span class="NormalTextRun SCXW53717806 BCX0" data-ccp-parastyle="Body Text">To address the problems that graph convolution uses a fixed graph structure, </span><span class="NormalTextRun SCXW53717806 BCX0" data-ccp-parastyle="Body Text">fails to</span><span class="NormalTextRun SCXW53717806 BCX0" data-ccp-parastyle="Body Text"> capture dynamic or changing graph structure information, and is prone to bias by employing the</span><span class="NormalTextRun SCXW53717806 BCX0" data-ccp-parastyle="Body Text"> same attention. A point-cloud </span><span class="NormalTextRun SpellingErrorV2Themed SCXW53717806 BCX0" data-ccp-parastyle="Body Text">upsampling</span><span class="NormalTextRun SCXW53717806 BCX0" data-ccp-parastyle="Body Text"> network (DGCMSA-PU) incorporating Dynamic Graph Convolutional</span> <span class="NormalTextRun SCXW53717806 BCX0" data-ccp-parastyle="Body Text">(DGCNN) and Multi-head Self-Attention</span> <span class="NormalTextRun SCXW53717806 BCX0" data-ccp-parastyle="Body Text">(MHSA) is designed. DGCNN is utilised for up-sampling and a MHSA mechanism is incorporated to simultaneously fuse in</span><span class="NormalTextRun SCXW53717806 BCX0" data-ccp-parastyle="Body Text">formation from different attention heads. The edge relationships between nodes in the graph data are captured by edge convolution (</span><span class="NormalTextRun SpellingErrorV2Themed SCXW53717806 BCX0" data-ccp-parastyle="Body Text">EdgeConv</span><span class="NormalTextRun SCXW53717806 BCX0" data-ccp-parastyle="Body Text">), and the graph structure is dynamically constructed based on the relationships between nodes. Then the features of </span><span class="NormalTextRun SCXW53717806 BCX0" data-ccp-parastyle="Body Text">the point cloud are extracted by the three attention heads with different weights and different foci. Finally</span><span class="NormalTextRun SCXW53717806 BCX0" data-ccp-parastyle="Body Text">,</span><span class="NormalTextRun SCXW53717806 BCX0" data-ccp-parastyle="Body Text"> an up-down-up structure is used to extend the features and reconstruct the 3D coordinates of the output point cloud. The superiority of DGCMSA-PU </span><span class="NormalTextRun SCXW53717806 BCX0" data-ccp-parastyle="Body Text">in the up-sampling task is verified through experiments comparing it with existing up-sampling networks, and the robustness of the network to noise and varying number of input point clouds, as well as the important role of the Multi Headed Attention module</span><span class="NormalTextRun SCXW53717806 BCX0" data-ccp-parastyle="Body Text"> in the performance improvement of the network, are analysed through robustness and ablation experiments.</span></span><span class="EOP SCXW53717806 BCX0" data-ccp-props="{"134245417":false,"201341983":0,"335551550":6,"335551620":6,"335559685":861,"335559737":132,"335559738":131,"335559740":218}"> </span></p>Xiaoping YangFei ChenZhenhua LiGuanghui Liu
Copyright (c) 2024 Information Technology and Control
2024-12-212024-12-215341119113810.5755/j01.itc.53.4.37310Robust Incentive Mechanism of Federated Learning for Data Quality Uncertainty
https://itc.ktu.lt/index.php/ITC/article/view/34907
<p><span class="TextRun SCXW206297174 BCX0" lang="EN-GB" xml:lang="EN-GB" data-contrast="none"><span class="NormalTextRun SCXW206297174 BCX0" data-ccp-parastyle="Body Text">In order to</span><span class="NormalTextRun SCXW206297174 BCX0" data-ccp-parastyle="Body Text"> make the incentive mechanism more suitable for the actual training situation and improve the efficiency of the model, the robust incentive mechanism of federated leaning is proposed to deal with uncertainty of the data quality.</span> <span class="NormalTextRun SCXW206297174 BCX0" data-ccp-parastyle="Body Text">(1)</span> <span class="NormalTextRun SCXW206297174 BCX0" data-ccp-parastyle="Body Text">Firstly, the incentive mechanism of federated learning is constructed </span><span class="NormalTextRun SCXW206297174 BCX0" data-ccp-parastyle="Body Text">by the use of</span><span class="NormalTextRun SCXW206297174 BCX0" data-ccp-parastyle="Body Text"> Stackelberg game to </span><span class="NormalTextRun SCXW206297174 BCX0" data-ccp-parastyle="Body Text">optimize</span><span class="NormalTextRun SCXW206297174 BCX0" data-ccp-parastyle="Body Text"> the central server and data owner utilities</span><span class="NormalTextRun SCXW206297174 BCX0" data-ccp-parastyle="Body Text">,</span><span class="NormalTextRun SCXW206297174 BCX0" data-ccp-parastyle="Body Text"> respectively.</span> <span class="NormalTextRun SCXW206297174 BCX0" data-ccp-parastyle="Body Text">(2) Secondly, the uncertainty of data quality of the data owners is present by two robust uncertainty sets, and the corresponding incentive mechanism of the robust Stackelberg game is given. (3)</span> <span class="NormalTextRun SCXW206297174 BCX0" data-ccp-parastyle="Body Text">Thirdly, the existence of equilibrium solution of the game is </span><span class="NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW206297174 BCX0" data-ccp-parastyle="Body Text">proved</span><span class="NormalTextRun SCXW206297174 BCX0" data-ccp-parastyle="Body Text"> and the equilibrium solution of the whole game is derived. (4) Finally, the feasibility and robustness of the model are verified, and in the comparative experiments, the central server can select the </span><span class="NormalTextRun SCXW206297174 BCX0" data-ccp-parastyle="Body Text">optimal</span><span class="NormalTextRun SCXW206297174 BCX0" data-ccp-parastyle="Body Text"> combination of perturbation ratio and uncertainty level according to the preference for uncertainty risk to obtain the </span><span class="NormalTextRun SCXW206297174 BCX0" data-ccp-parastyle="Body Text">optimal</span><span class="NormalTextRun SCXW206297174 BCX0" data-ccp-parastyle="Body Text"> incentive mechanism.</span> <span class="NormalTextRun SCXW206297174 BCX0" data-ccp-parastyle="Body Text">The incentive mechanism designed in this article not only considers the uncertainty in actual </span><span class="NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW206297174 BCX0" data-ccp-parastyle="Body Text">training, but</span><span class="NormalTextRun SCXW206297174 BCX0" data-ccp-parastyle="Body Text"> also has a good incentive effect on model training under different risk preferences.</span></span><span class="EOP SCXW206297174 BCX0" data-ccp-props="{"201341983":0,"335551550":6,"335551620":6,"335559685":861,"335559737":132,"335559738":131,"335559740":218}"> </span></p>Chao WangBingze LiYang Yang
Copyright (c) 2024 Information Technology and Control
2024-12-212024-12-215341139115110.5755/j01.itc.53.4.34907Smartphone-Based Psychological Sensing: A Large-Scale Study on the Impact of Extreme Isolation
https://itc.ktu.lt/index.php/ITC/article/view/36565
<p><span class="TextRun SCXW220091018 BCX0" lang="EN-GB" xml:lang="EN-GB" data-contrast="none"><span class="NormalTextRun SCXW220091018 BCX0" data-ccp-parastyle="Body Text">The COVID-19 pandemic and associated isolation measures have </span><span class="NormalTextRun SCXW220091018 BCX0" data-ccp-parastyle="Body Text">greatly impacted</span><span class="NormalTextRun SCXW220091018 BCX0" data-ccp-parastyle="Body Text"> mental health, especially among students. </span><span class="NormalTextRun SCXW220091018 BCX0" data-ccp-parastyle="Body Text">Previous</span><span class="NormalTextRun SCXW220091018 BCX0" data-ccp-parastyle="Body Text"> attempts at using mobile sensors to </span><span class="NormalTextRun SpellingErrorV2Themed SCXW220091018 BCX0" data-ccp-parastyle="Body Text">analyze</span><span class="NormalTextRun SCXW220091018 BCX0" data-ccp-parastyle="Body Text"> users' emotional states faced barriers includi</span><span class="NormalTextRun SCXW220091018 BCX0" data-ccp-parastyle="Body Text">ng insufficient data and limited modalities. This study aims to address these limitations and derive insights on psychological changes under extreme isolation. We collected a large-scale multivariate dataset from 725 undergraduate students during the compl</span><span class="NormalTextRun SCXW220091018 BCX0" data-ccp-parastyle="Body Text">ete COVID-19 campus lockdown period. To our knowledge, this is the largest dataset on this population during an extended isolated period. Features were engineered from mobile sensor data to capture modalities including physical activity, sleep patterns, an</span><span class="NormalTextRun SCXW220091018 BCX0" data-ccp-parastyle="Body Text">d social interaction. Additionally, self-reported assessments related to mental health conditions were compiled. This rich dataset was </span><span class="NormalTextRun SCXW220091018 BCX0" data-ccp-parastyle="Body Text">leveraged</span><span class="NormalTextRun SCXW220091018 BCX0" data-ccp-parastyle="Body Text"> to develop a machine learning model based on autoencoders to detect emotional states. Comprehensive experiments</span> <span class="NormalTextRun SCXW220091018 BCX0" data-ccp-parastyle="Body Text">indicate</span><span class="NormalTextRun SCXW220091018 BCX0" data-ccp-parastyle="Body Text"> the model can accurately predict mental health changes using mobile sensor data. Our work has unique contributions in collecting large-scale isolated data, engineering informative modalities for </span><span class="NormalTextRun SpellingErrorV2Themed SCXW220091018 BCX0" data-ccp-parastyle="Body Text">modeling</span><span class="NormalTextRun SCXW220091018 BCX0" data-ccp-parastyle="Body Text"> mental health, and providing a validated d</span><span class="NormalTextRun SCXW220091018 BCX0" data-ccp-parastyle="Body Text">etection method. This can support rapid screening and intervention for mental health crises, especially those </span><span class="NormalTextRun SCXW220091018 BCX0" data-ccp-parastyle="Body Text">emerging</span><span class="NormalTextRun SCXW220091018 BCX0" data-ccp-parastyle="Body Text"> from extreme events. The dataset and models open promising directions for big data analytics in mobile health and psychological research.</span></span><span class="EOP SCXW220091018 BCX0" data-ccp-props="{"134245417":false,"201341983":0,"335551550":6,"335551620":6,"335559685":861,"335559737":132,"335559738":131,"335559740":218}"> </span></p>Zhaohui YuanYuqing CaoZhong Chen
Copyright (c) 2024 Information Technology and Control
2024-12-212024-12-215341152116810.5755/j01.itc.53.4.36565Green Rural Modern Architectural Design Based on Pose Recognition Algorithm of Thermal Discomfort
https://itc.ktu.lt/index.php/ITC/article/view/37391
<p>To reduce the energy waste of modern rural buildings caused by over-cold or over-heat supply, this paper presents a method to realize energy-saving design of modern green rural buildings by using thermal decomposition location recognition algorithm. Based on the key points of the human skeleton, the pose recognition framework is constructed, and the deep learning network is combined to detect the human thermal disturbance posture. Furthermore, an end-to-end thermal inauthentic pose recognition algorithm is proposed to establish a green intelligent building energy minimization model considering thermal comfort range. The results show that the recognition rate of 1D convolution +LSTM model is 100%, and the optimal accuracy of 16 frames of image sequence with decoder module is 92.052%. Compared to traditional algorithms, the method can save up to 10% of the total energy cost and reduce the total temperature deviation. This study is of great significance for intelligent control of indoor thermal environment and improvement of energy utilization efficiency.</p>Xiaomei Gao
Copyright (c) 2024 Information Technology and Control
2024-12-212024-12-215341169118710.5755/j01.itc.53.4.37391MS-UNet: A Novel Multi-scale U-shaped Network for COVID-19 CT Image Segmentation
https://itc.ktu.lt/index.php/ITC/article/view/35745
<p>The U-Net network has its own powerful capabilities in medical image segmentation tasks, yet still it is a challenging task to make U-Net accurately segment the infected lesions of COVID-19 CT images because these lesion areas are usually irregular in shape, various in size, and blurry in boundaries. In this paper, a novel multiscale U-shaped network based on U-Net for accurate segmentation of lesion regions in COVID-19 CT images is proposed. First, we generate two auxiliary scale features (f<sub>i</sub><sup>0.5</sup>, f<sub>i</sub><sup>1.5</sup>) based on the main scale feature (f<sub>i</sub><sup>1.0</sup>) through zoom strategy. Secondly, we design the Scale Integration Module (SIM), which is capable of filtering and aggregating scale-specific features and can fully exploit multi-scale semantic information. Thirdly, the hierarchical mixed module (HMM) has successfully substituted for the down-up aggregation process of the U-Net network, which further enhances the mixed scale features. On the dataset COVID-19-CT829, compared with the recent COVID-19 segmentation model, hiformer, the Dice, Sen and F-measure of our network have increased by 2.24%, 2.83%, 3.14%, respectively; on the dataset COVID-19-CT100, the Dice, Sen and F-measure of our network have increased by 2.91%, 3.72%, 2.42%, respectively. Moreover, we have validated the generalizability and portability of our network on other medical datasets (Polyp segmentation dataset: CVC-612 and kvasir), and our network has also achieved superior results of COVID-19 CT image segmentation.</p>Shangwang LiuFeiyan SiXiufang Tang Tongbo Cai
Copyright (c) 2024 Information Technology and Control
2024-12-212024-12-215341188120310.5755/j01.itc.53.4.35745PMF-YOLOv8: Enhanced Ship Detection Model in Remote Sensing Images
https://itc.ktu.lt/index.php/ITC/article/view/37003
<p><span class="NormalTextRun SCXW240868932 BCX0" data-ccp-parastyle="Body Text">Satellite remote sensing technology plays a pivotal role in ship monitoring at sea, with ship detection by artificial intelligence becoming the primary means. However, due to the intricate marine environment and the similarity between classes of remote sensing ships, the detection of remote sensing ships still faces significant challenges. Existing detection models tend to overlook the loss of fine-grained features of remote sensing ships during the deepening of the network. To address this issue, we proposed an enhanced Pyramid for Multi-Scale Feature Fusion (PMF) to optimize the YOLOv8 algorithm. After incorporating a fusion of shallow-level features into the neck </span><span class="NormalTextRun SCXW240868932 BCX0" data-ccp-parastyle="Body Text">portion</span><span class="NormalTextRun SCXW240868932 BCX0" data-ccp-parastyle="Body Text"> of YOLOv8, an adaptive spatial feature fusion approach coupled with a path aggregation network was employed to process the output features of the backbone network. This integration enhances the learning of fine-grained features and addresses the issue of feature loss, a common challenge in existing networks. Furthermore, to enhance feature extraction, we introduced an enhanced R-C2f module. Finally, Inner-</span><span class="NormalTextRun SpellingErrorV2Themed SCXW240868932 BCX0" data-ccp-parastyle="Body Text">MPDIoU</span><span class="NormalTextRun SCXW240868932 BCX0" data-ccp-parastyle="Body Text"> was employed as the bounding box loss to address the issue of missed detections that may arise in the context of dense remote sensing ships. Experiments were conducted on FGSC-T, a dataset </span><span class="NormalTextRun SCXW240868932 BCX0" data-ccp-parastyle="Body Text">comprising</span><span class="NormalTextRun SCXW240868932 BCX0" data-ccp-parastyle="Body Text"> 22 classes of ships, to assess the efficacy and viability of the algorithm. In comparison to the original YOLOv8, the mAP50, mAP50-95, </span><span class="NormalTextRun SCXW240868932 BCX0" data-ccp-parastyle="Body Text">R</span><span class="NormalTextRun SCXW240868932 BCX0" data-ccp-parastyle="Body Text">ecall, and </span><span class="NormalTextRun SCXW240868932 BCX0" data-ccp-parastyle="Body Text">Precision</span><span class="NormalTextRun SCXW240868932 BCX0" data-ccp-parastyle="Body Text"> increased by 3.7%, 4.1%, 5.7%, and 2.5%, respectively. Furthermore, the detection speed of PMF-YOLOv8 can reach 74 fps, which meets the requirements for real-time detection of remote sensing ships.</span></p>Dan ChenHongdong ZhaoYanqi LiZhitian ZhangKe Zhang
Copyright (c) 2024 Information Technology and Control
2024-12-212024-12-215341204122010.5755/j01.itc.53.4.37003Deep Learning-Based Trajectory Tracking Method for Intelligently Network-Connected Driverless Vehicles in Narrow Areas
https://itc.ktu.lt/index.php/ITC/article/view/36947
<p><span class="TextRun SCXW186217938 BCX0" lang="EN-GB" xml:lang="EN-GB" data-contrast="auto"><span class="NormalTextRun SCXW186217938 BCX0" data-ccp-parastyle="Body Text">Driverless vehicles are the development direction of intelligent transportation. In recent years,</span><span class="NormalTextRun SCXW186217938 BCX0" data-ccp-parastyle="Body Text"> the rapid development of driv</span><span class="NormalTextRun SCXW186217938 BCX0" data-ccp-parastyle="Body Text">erless transportation technology, especially the practical performance of intelligently network-connected driverless vehicles has improved rapidly. However, due to problems with traffic planning, many roads are still relatively narrow. When an intelligentl</span><span class="NormalTextRun SCXW186217938 BCX0" data-ccp-parastyle="Body Text">y networked driverless car moves in a narrow area, the lack of precision in trajectory tracking can easily cause traffic accidents due to small trajectory changes.</span> <span class="NormalTextRun SCXW186217938 BCX0" data-ccp-parastyle="Body Text">In this paper, for the driving characteristics of intelligently networked driverless vehicle</span><span class="NormalTextRun SCXW186217938 BCX0" data-ccp-parastyle="Body Text">s in narrow areas, an improved Faster R-CNN target detection network is proposed that introduces a deep residual network ResNet-50</span><span class="NormalTextRun SCXW186217938 BCX0" data-ccp-parastyle="Body Text">, a dual attention mechanism CBAM, </span><span class="NormalTextRun SCXW186217938 BCX0" data-ccp-parastyle="Body Text">and an ROI-Pooling to estimate the position information of driverless vehicles in the video</span><span class="NormalTextRun SCXW186217938 BCX0" data-ccp-parastyle="Body Text"> of the traffic scene. Based on the target detection results of driverless vehicles and the appearance characteristics of vehicles, </span><span class="NormalTextRun SCXW186217938 BCX0" data-ccp-parastyle="Body Text">the novel </span><span class="NormalTextRun SpellingErrorV2Themed SCXW186217938 BCX0" data-ccp-parastyle="Body Text">DeepSORT</span><span class="NormalTextRun SCXW186217938 BCX0" data-ccp-parastyle="Body Text"> vehicle tracking algorithm improved by </span><span class="NormalTextRun SpellingErrorV2Themed SCXW186217938 BCX0" data-ccp-parastyle="Body Text">OSNet</span><span class="NormalTextRun SCXW186217938 BCX0" data-ccp-parastyle="Body Text"> full-scale network and complete intersection over union (</span><span class="NormalTextRun SCXW186217938 BCX0" data-ccp-parastyle="Body Text">CIo</span><span class="NormalTextRun SCXW186217938 BCX0" data-ccp-parastyle="Body Text">U</span><span class="NormalTextRun SCXW186217938 BCX0" data-ccp-parastyle="Body Text">), </span><span class="NormalTextRun SCXW186217938 BCX0" data-ccp-parastyle="Body Text">is employed to derive a vehicle trajectory within a single camera on a real road. The UA-DETRAC dataset in real scenarios is selected to run experiments, </span><span class="NormalTextRun SCXW186217938 BCX0" data-ccp-parastyle="Body Text">and the results </span><span class="NormalTextRun SCXW186217938 BCX0" data-ccp-parastyle="Body Text">demonstrate</span><span class="NormalTextRun SCXW186217938 BCX0" data-ccp-parastyle="Body Text"> that the proposed target detection and tracking algorithms perform </span><span class="NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW186217938 BCX0" data-ccp-parastyle="Body Text">wel</span><span class="NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW186217938 BCX0" data-ccp-parastyle="Body Text">l, </span><span class="NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW186217938 BCX0" data-ccp-parastyle="Body Text">and</span><span class="NormalTextRun SCXW186217938 BCX0" data-ccp-parastyle="Body Text"> effectively realize target detection and trajectory tracking of intelligently internet-connected driverless vehicles in narrow areas, which can help realize the further performance enhancement. The improved </span><span class="NormalTextRun SpellingErrorV2Themed SCXW186217938 BCX0" data-ccp-parastyle="Body Text">DeepSORT</span><span class="NormalTextRun SCXW186217938 BCX0" data-ccp-parastyle="Body Text"> achieves an impressive MOTA of 96</span><span class="NormalTextRun SCXW186217938 BCX0" data-ccp-parastyle="Body Text">.1% and </span><span class="NormalTextRun SCXW186217938 BCX0" data-ccp-parastyle="Body Text">MOTP of 0.115.</span></span><span class="EOP SCXW186217938 BCX0" data-ccp-props="{"134245417":false,"201341983":0,"335551550":6,"335551620":6,"335559685":861,"335559737":132,"335559738":131,"335559740":218}"> </span></p>YaJun HanByung Cheul Kim HaiChao Xu
Copyright (c) 2024 Information Technology and Control
2024-12-212024-12-215341221123510.5755/j01.itc.53.4.36947Internet Finance Non-stationary Time Series Prediction Algorithm Based on Deep Learning
https://itc.ktu.lt/index.php/ITC/article/view/37053
<p><span class="TextRun SCXW235935350 BCX0" lang="EN-GB" xml:lang="EN-GB" data-contrast="auto"><span class="NormalTextRun SCXW235935350 BCX0" data-ccp-parastyle="Body Text">Inaccurate prediction results of financial time series will lead to wrong investment decisions. Therefore, a prediction algorithm for Internet financial non-stationary time series based on deep learning is proposed. EMD (empirical mode decomposition) method is used to divide the collected historical Internet financial non-stationary time series information into high-frequency and low-frequency </span><span class="NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW235935350 BCX0" data-ccp-parastyle="Body Text">parts, and</span><span class="NormalTextRun SCXW235935350 BCX0" data-ccp-parastyle="Body Text"> remove the noise in the decomposed high-frequency components to obtain the financial non-stationary time series without noise</span><span class="NormalTextRun SCXW235935350 BCX0" data-ccp-parastyle="Body Text">. </span><span class="NormalTextRun SCXW235935350 BCX0" data-ccp-parastyle="Body Text">The knowledge map method is used to mine the transaction characteristics and market characteristics of Internet finance from the financial non-stationary time series without noise, and the two are fused as the input of the improved CNN (convolutional neural network) prediction model. The prediction results of Internet financial time series are obtained through CNN. The experimental results show that after setting the CNN parameters, the predicted results are consistent with the actual market trends. </span><span class="NormalTextRun SCXW235935350 BCX0" data-ccp-parastyle="Body Text">T</span><span class="NormalTextRun SCXW235935350 BCX0" data-ccp-parastyle="Body Text">he highest RSE of the predicted result is 0.551, The highest RAE is 0.443, which is relatively low, </span><span class="NormalTextRun SCXW235935350 BCX0" data-ccp-parastyle="Body Text">t</span><span class="NormalTextRun SCXW235935350 BCX0" data-ccp-parastyle="Body Text">he CORR value is 0.864, which is relatively high, indicating that the relative square root error, relative absolute error, and relevant empirical coefficients of the prediction results are all good, making it a highly applicable algorithm.</span></span><span class="EOP SCXW235935350 BCX0" data-ccp-props="{"134245417":false,"201341983":0,"335551550":6,"335551620":6,"335559685":861,"335559737":132,"335559738":131,"335559740":218}"> </span></p>Yangyi Li
Copyright (c) 2024 Information Technology and Control
2024-12-212024-12-215341236125010.5755/j01.itc.53.4.37053A Survey on Privacy Attacks and Defenses in Graph Neural Networks
https://itc.ktu.lt/index.php/ITC/article/view/37737
<p><span class="TextRun SCXW191769664 BCX0" lang="EN-GB" xml:lang="EN-GB" data-contrast="auto"><span class="NormalTextRun SCXW191769664 BCX0" data-ccp-parastyle="Body Text">Graph neural networks (GNNs) have </span><span class="NormalTextRun SCXW191769664 BCX0" data-ccp-parastyle="Body Text">emerged</span><span class="NormalTextRun SCXW191769664 BCX0" data-ccp-parastyle="Body Text"> as a powerful tool in the field of graph machine learning, </span><span class="NormalTextRun SCXW191769664 BCX0" data-ccp-parastyle="Body Text">demonstrating</span><span class="NormalTextRun SCXW191769664 BCX0" data-ccp-parastyle="Body Text"> by a </span><span class="NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW191769664 BCX0" data-ccp-parastyle="Body Text">various practical applications</span><span class="NormalTextRun SCXW191769664 BCX0" data-ccp-parastyle="Body Text">. However, the complex nature </span><span class="NormalTextRun SCXW191769664 BCX0" data-ccp-parastyle="Body Text">of graph structures</span><span class="NormalTextRun SCXW191769664 BCX0" data-ccp-parastyle="Body Text"> and their expanding use across different scenarios prese</span><span class="NormalTextRun SCXW191769664 BCX0" data-ccp-parastyle="Body Text">nt challenges for GNNs in terms of privacy protection. While there have been studies dedicated to addressing the privacy leakage problem of GNNs, many issues </span><span class="NormalTextRun SCXW191769664 BCX0" data-ccp-parastyle="Body Text">remain</span><span class="NormalTextRun SCXW191769664 BCX0" data-ccp-parastyle="Body Text"> unresolved. This survey aims to provide a comprehensive understanding of the scientific cha</span><span class="NormalTextRun SCXW191769664 BCX0" data-ccp-parastyle="Body Text">llenges in the field of privacy-preserving GNNs. The survey begins with a succinct review of recent research on graph data privacy, followed by an analysis of the current methods for GNNs privacy attacks. Subsequently, the survey categorizes and explores t</span><span class="NormalTextRun SCXW191769664 BCX0" data-ccp-parastyle="Body Text">he limitations, evaluation standards, and privacy </span><span class="NormalTextRun SpellingErrorV2Themed SCXW191769664 BCX0" data-ccp-parastyle="Body Text">defense</span><span class="NormalTextRun SCXW191769664 BCX0" data-ccp-parastyle="Body Text"> technologies for GNNs, with a focus on data anonymization, differential privacy, graph-based federated learning, and methods based on adversarial learning. Additionally, the survey also summarizes s</span><span class="NormalTextRun SCXW191769664 BCX0" data-ccp-parastyle="Body Text">ome widely used datasets in GNNs privacy attacks and </span><span class="NormalTextRun SpellingErrorV2Themed SCXW191769664 BCX0" data-ccp-parastyle="Body Text">defenses</span><span class="NormalTextRun SCXW191769664 BCX0" data-ccp-parastyle="Body Text">. Finally, we </span><span class="NormalTextRun SCXW191769664 BCX0" data-ccp-parastyle="Body Text">identify</span><span class="NormalTextRun SCXW191769664 BCX0" data-ccp-parastyle="Body Text"> several open challenges and </span><span class="NormalTextRun SCXW191769664 BCX0" data-ccp-parastyle="Body Text">possible directions</span><span class="NormalTextRun SCXW191769664 BCX0" data-ccp-parastyle="Body Text"> for future research.</span></span><span class="EOP SCXW191769664 BCX0" data-ccp-props="{"134245417":false,"201341983":0,"335551550":6,"335551620":6,"335559685":861,"335559737":132,"335559738":131,"335559740":218}"> </span></p>Lanhua LuoWang RenHuasheng HuangFengling Wang
Copyright (c) 2024 Information Technology and Control
2024-12-212024-12-215341251127810.5755/j01.itc.53.4.37737Image Denoising Using Adaptive Weighted Low-Rank Matrix Recovery
https://itc.ktu.lt/index.php/ITC/article/view/38367
<p><span class="TextRun SCXW206241423 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="NormalTextRun SCXW206241423 BCX0" data-ccp-parastyle="Body Text">This paper introduces a new image denoising method using adaptive weighted low-rank matrix recovery to tackle the challenges of separating low-rank information from noise a</span><span class="NormalTextRun SCXW206241423 BCX0" data-ccp-parastyle="Body Text">nd improving performance affected by empirical hyperparameters. We start by using image nonlocal similarity to build a low-rank denoising model, then apply the </span><span class="NormalTextRun SpellingErrorV2Themed SCXW206241423 BCX0" data-ccp-parastyle="Body Text">Gerschgorin</span><span class="NormalTextRun SCXW206241423 BCX0" data-ccp-parastyle="Body Text"> theory to precisely </span><span class="NormalTextRun SCXW206241423 BCX0" data-ccp-parastyle="Body Text">determine</span><span class="NormalTextRun SCXW206241423 BCX0" data-ccp-parastyle="Body Text"> the rank of the low</span> <span class="NormalTextRun SCXW206241423 BCX0" data-ccp-parastyle="Body Text">-rank matrix. With this rank estima</span><span class="NormalTextRun SCXW206241423 BCX0" data-ccp-parastyle="Body Text">tion, we use adaptive weighting along with singular value decomposition and weighted </span><span class="NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW206241423 BCX0" data-ccp-parastyle="Body Text">soft-thresholding</span><span class="NormalTextRun SCXW206241423 BCX0" data-ccp-parastyle="Body Text"> to solve the denoising model, resulting in the denoised image. Experiments show our algorithm surpasses traditional denoising methods in average PSNR and</span><span class="NormalTextRun SCXW206241423 BCX0" data-ccp-parastyle="Body Text"> SSIM.</span><span class="NormalTextRun SCXW206241423 BCX0" data-ccp-parastyle="Body Text"> Specifically, for images contaminated with high-intensity noise (with a variance of 100), our algorithm achieves average PSNR and SSIM values of 24.66dB and 0.7267, respectively. </span><span class="NormalTextRun SCXW206241423 BCX0" data-ccp-parastyle="Body Text">Additionally, our algorithm </span><span class="NormalTextRun SCXW206241423 BCX0" data-ccp-parastyle="Body Text">exhibits</span><span class="NormalTextRun SCXW206241423 BCX0" data-ccp-parastyle="Body Text"> superior performance in denoising</span><span class="NormalTextRun SCXW206241423 BCX0" data-ccp-parastyle="Body Text"> images with real noise and is also applicable to color image denoising.</span></span><span class="EOP SCXW206241423 BCX0" data-ccp-props="{"134245417":false,"201341983":0,"335551550":6,"335551620":6,"335559737":132,"335559738":131,"335559740":218}"> </span></p>Yujuan WangYun GuoPing Wang
Copyright (c) 2024 Information Technology and Control
2024-12-212024-12-215341279129010.5755/j01.itc.53.4.38367Fish Catch Sorting and Detection Model Improved Based on YOLOv8 Model
https://itc.ktu.lt/index.php/ITC/article/view/38761
<p><span class="TextRun SCXW250952705 BCX0" lang="EN-GB" xml:lang="EN-GB" data-contrast="none"><span class="NormalTextRun SCXW250952705 BCX0" data-ccp-parastyle="Body Text">The primary </span><span class="NormalTextRun SCXW250952705 BCX0" data-ccp-parastyle="Body Text">challenge in trawl fishing lies in its limited selectivity, resulting in highly diverse fish catches with severe mixed-species issues. The catches from trawl fishing require manual sorting, leading to low w</span></span><span class="TextRun SCXW250952705 BCX0" lang="EN-GB" xml:lang="EN-GB" data-contrast="auto"><span class="NormalTextRun SCXW250952705 BCX0" data-ccp-parastyle="Body Text">ork efficiency and high </span><span class="NormalTextRun SpellingErrorV2Themed SCXW250952705 BCX0" data-ccp-parastyle="Body Text">labor</span><span class="NormalTextRun SCXW250952705 BCX0" data-ccp-parastyle="Body Text"> demands. </span><span class="NormalTextRun SCXW250952705 BCX0" data-ccp-parastyle="Body Text">In </span><span class="NormalTextRun SCXW250952705 BCX0" data-ccp-parastyle="Body Text">order to</span><span class="NormalTextRun SCXW250952705 BCX0" data-ccp-parastyle="Body Text"> tackle this issue, the present study introduces an enhanced version of the DWR module by utilizing </span><span class="NormalTextRun SpellingErrorV2Themed SCXW250952705 BCX0" data-ccp-parastyle="Body Text">DilatedReparamBlock</span><span class="NormalTextRun SCXW250952705 BCX0" data-ccp-parastyle="Body Text"> convolution, introducing a novel dilated convolution module. This module is integrated into the YOLOv8 model, enhancing its </span><span class="NormalTextRun SCXW250952705 BCX0" data-ccp-parastyle="Body Text">capa</span><span class="NormalTextRun SCXW250952705 BCX0" data-ccp-parastyle="Body Text">city</span><span class="NormalTextRun SCXW250952705 BCX0" data-ccp-parastyle="Body Text"> to capture features from the enlarged receptive field in the upper network layers. Furthermore, a new attention mechanism based on a multi-branch structure with the CA attention mechanism is incorporated into the YOLOv8 model. This attention mechanism</span><span class="NormalTextRun SCXW250952705 BCX0" data-ccp-parastyle="Body Text"> fully extracts image features, enhances feature representation, strengthens the generation of offsets and sampling weights, and improves the accuracy of target recognition. Lightweight improvements to the detection head are achieved </span><span class="NormalTextRun SCXW250952705 BCX0" data-ccp-parastyle="Body Text">through the use of</span><span class="NormalTextRun SCXW250952705 BCX0" data-ccp-parastyle="Body Text"> sha</span><span class="NormalTextRun SCXW250952705 BCX0" data-ccp-parastyle="Body Text">red convolutions, </span><span class="NormalTextRun SCXW250952705 BCX0" data-ccp-parastyle="Body Text">ultimately resulting</span><span class="NormalTextRun SCXW250952705 BCX0" data-ccp-parastyle="Body Text"> in a significant reduction in the number of model parameters. Our empirical findings </span><span class="NormalTextRun SCXW250952705 BCX0" data-ccp-parastyle="Body Text">indicate</span><span class="NormalTextRun SCXW250952705 BCX0" data-ccp-parastyle="Body Text"> that the refined model </span><span class="NormalTextRun SCXW250952705 BCX0" data-ccp-parastyle="Body Text">exhibits</span><span class="NormalTextRun SCXW250952705 BCX0" data-ccp-parastyle="Body Text"> a 2.2% enhancement in mAP@0.5 when benchmarked against the </span><span class="NormalTextRun SCXW250952705 BCX0" data-ccp-parastyle="Body Text">initial</span><span class="NormalTextRun SCXW250952705 BCX0" data-ccp-parastyle="Body Text"> Y</span></span><span class="TextRun SCXW250952705 BCX0" lang="EN-GB" xml:lang="EN-GB" data-contrast="none"><span class="NormalTextRun SCXW250952705 BCX0" data-ccp-parastyle="Body Text">OLOv8 model, Offering a</span><span class="NormalTextRun SCXW250952705 BCX0" data-ccp-parastyle="Body Text"> significant reference for the advancement of an effective embedded system for fish sorting.</span></span><span class="EOP SCXW250952705 BCX0" data-ccp-props="{"134245417":false,"201341983":0,"335551550":6,"335551620":6,"335559685":840,"335559737":132,"335559738":131,"335559739":0,"335559740":218}"> </span></p>Ping YangTiange ShiYoudong YuanHanbing Jiang
Copyright (c) 2024 Information Technology and Control
2024-12-212024-12-215341291131010.5755/j01.itc.53.4.38761