Pub Date : 2020-06-01DOI: 10.1109/ICAICA50127.2020.9182458
Wenbo Mei, Zhaohua Long
The WebSocket protocol is part of the HTML5 standard specification. It is a new network communication protocol that provides a full-duplex communication mechanism between the client and the server. The emergence of WebSocket brings good news for real-time web communication, but the corresponding WebSocket vulnerabilities are gradually exposed, among which the Cross Site WebSocket Hijacking is relatively harmful and easy to be ignored. The paper mainly explores the principle of WebScoket's cross-site hijacking vulnerability, and proposes a one-time random token scheme based on mixed encryption to solve the cross-site WebSocket hijacking vulnerability, and finally tests the scheme to verify its effectiveness.
{"title":"Research and Defense of Cross-Site WebSocket Hijacking Vulnerability","authors":"Wenbo Mei, Zhaohua Long","doi":"10.1109/ICAICA50127.2020.9182458","DOIUrl":"https://doi.org/10.1109/ICAICA50127.2020.9182458","url":null,"abstract":"The WebSocket protocol is part of the HTML5 standard specification. It is a new network communication protocol that provides a full-duplex communication mechanism between the client and the server. The emergence of WebSocket brings good news for real-time web communication, but the corresponding WebSocket vulnerabilities are gradually exposed, among which the Cross Site WebSocket Hijacking is relatively harmful and easy to be ignored. The paper mainly explores the principle of WebScoket's cross-site hijacking vulnerability, and proposes a one-time random token scheme based on mixed encryption to solve the cross-site WebSocket hijacking vulnerability, and finally tests the scheme to verify its effectiveness.","PeriodicalId":113564,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133253883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-01DOI: 10.1109/ICAICA50127.2020.9182531
Liang Dongcheng, Li Bin, Wu Qianqian
The optimal design of drug cabinet can effectively improve the storage capacity and drug sorting efficiency, which is of great significance for the design and production of automatic drug sorting system and the modern management of pharmacy. However, there are thousands of types of drug boxes. There are serious space waste and potential safety problems in the traditional drug cabinet. This paper designs a two-stage optimization model for drug cabinet design from the perspective of design for the width and height specifications of the drug storage grooves. The first step is to find the optimal set of drug storage grooves. The second step is to optimize the number of storage tanks of each specification. Then a non-numerical multi-variables genetic algorithm (GA) is designed to solve the proposed model. Finally, through simulation program, we solved an example of specific drug cabinet design requirement to verify the effectiveness of the model.
{"title":"A Two-Stage Optimization Model for Drug Cabinet Design","authors":"Liang Dongcheng, Li Bin, Wu Qianqian","doi":"10.1109/ICAICA50127.2020.9182531","DOIUrl":"https://doi.org/10.1109/ICAICA50127.2020.9182531","url":null,"abstract":"The optimal design of drug cabinet can effectively improve the storage capacity and drug sorting efficiency, which is of great significance for the design and production of automatic drug sorting system and the modern management of pharmacy. However, there are thousands of types of drug boxes. There are serious space waste and potential safety problems in the traditional drug cabinet. This paper designs a two-stage optimization model for drug cabinet design from the perspective of design for the width and height specifications of the drug storage grooves. The first step is to find the optimal set of drug storage grooves. The second step is to optimize the number of storage tanks of each specification. Then a non-numerical multi-variables genetic algorithm (GA) is designed to solve the proposed model. Finally, through simulation program, we solved an example of specific drug cabinet design requirement to verify the effectiveness of the model.","PeriodicalId":113564,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132568094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-01DOI: 10.1109/ICAICA50127.2020.9182609
Xingxiao Cao, Xiangping Wang, Hongbing Wang
It is very important to simplify the relation of vehicle-track coupling model rationally for dynamic analysis of high speed passenger, simplifying the track as a flexible body can better reflect the real wheel/rail relationship. But in fact, researchers tend to simplify the track as a rigid body due to the difficulty of model simplifying and simulation speed. The vehicle-rigid track and vehicle-flexible track coupling dynamic model of high-speed passenger are established respectively by using the multi-body dynamics software UM in this paper. The critical speed, lateral and vertical vibration acceleration, derailment coefficient, and the wheel load reduction rate are simulated. By comparing the simulation results, it shows that if the track is simplified as rigid body, the critical speed and wheel load shedding rate are lower, derailment coefficient, lateral and vertical vibration acceleration are higher than vehicle- flexible track coupled dynamic model. It is suggested that the flexible effect of orbit should be considered in practical calculation.
{"title":"Dynamics Simulation Analysis of High-speed Train Vehicle-track Coupling System Based on UM","authors":"Xingxiao Cao, Xiangping Wang, Hongbing Wang","doi":"10.1109/ICAICA50127.2020.9182609","DOIUrl":"https://doi.org/10.1109/ICAICA50127.2020.9182609","url":null,"abstract":"It is very important to simplify the relation of vehicle-track coupling model rationally for dynamic analysis of high speed passenger, simplifying the track as a flexible body can better reflect the real wheel/rail relationship. But in fact, researchers tend to simplify the track as a rigid body due to the difficulty of model simplifying and simulation speed. The vehicle-rigid track and vehicle-flexible track coupling dynamic model of high-speed passenger are established respectively by using the multi-body dynamics software UM in this paper. The critical speed, lateral and vertical vibration acceleration, derailment coefficient, and the wheel load reduction rate are simulated. By comparing the simulation results, it shows that if the track is simplified as rigid body, the critical speed and wheel load shedding rate are lower, derailment coefficient, lateral and vertical vibration acceleration are higher than vehicle- flexible track coupled dynamic model. It is suggested that the flexible effect of orbit should be considered in practical calculation.","PeriodicalId":113564,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133801501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-01DOI: 10.1109/ICAICA50127.2020.9182495
Xueqiong Wu, Fan Zhang, Lei Chen, Weiyan Zheng
The distribution network of the city is connected to the main network and the power users, The stable operation of the distribution network is related to the stable operation of the whole power system, It is of great practical significance to evaluate the urban distribution network and identify the weak link of the power grid. From the actual situation of the intelligent distribution network, this paper focuses on the intelligent distribution network risk assessment and safety early warning mechanism. From the structural characteristics of intelligent distribution network, equipment running status and environmental factors characteristics, this paper makes use of probability analysis, data mining, information fusion technology and other methods, the risk evaluation index system and the risk index quantification calculation model are established to analyze the potential risks and the extent of damage to the intelligent distribution network.
{"title":"Study on Risk Assessment System of Power Failure in Distribution Network of Large Cities","authors":"Xueqiong Wu, Fan Zhang, Lei Chen, Weiyan Zheng","doi":"10.1109/ICAICA50127.2020.9182495","DOIUrl":"https://doi.org/10.1109/ICAICA50127.2020.9182495","url":null,"abstract":"The distribution network of the city is connected to the main network and the power users, The stable operation of the distribution network is related to the stable operation of the whole power system, It is of great practical significance to evaluate the urban distribution network and identify the weak link of the power grid. From the actual situation of the intelligent distribution network, this paper focuses on the intelligent distribution network risk assessment and safety early warning mechanism. From the structural characteristics of intelligent distribution network, equipment running status and environmental factors characteristics, this paper makes use of probability analysis, data mining, information fusion technology and other methods, the risk evaluation index system and the risk index quantification calculation model are established to analyze the potential risks and the extent of damage to the intelligent distribution network.","PeriodicalId":113564,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA)","volume":"190 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120969114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-01DOI: 10.1109/ICAICA50127.2020.9182676
Xuanzheng Wang, Li Wang, Kang Jian, Can Wang, C. Yue
Visible light communication technology has high security and anti-interference in electromagnetic interference environment. The use of LED devices in optical transmitters has the advantages of low cost and low power consumption, but it is also limited by the low bandwidth of the components. In this context, a PAM-4 VLC transmitter system with pre- and post-equalization using three-color RGB LEDs as light-emitting devices was established. According to the experimental results, the communication system under test using the pre- and post-equalizations can achieve a data transmission rate of 2.9 times and a 2.5 times expanded bandwidth.
{"title":"A RGB LED PAM-4 Visible Light Communication Transmitter Based on a System Design with Equalization","authors":"Xuanzheng Wang, Li Wang, Kang Jian, Can Wang, C. Yue","doi":"10.1109/ICAICA50127.2020.9182676","DOIUrl":"https://doi.org/10.1109/ICAICA50127.2020.9182676","url":null,"abstract":"Visible light communication technology has high security and anti-interference in electromagnetic interference environment. The use of LED devices in optical transmitters has the advantages of low cost and low power consumption, but it is also limited by the low bandwidth of the components. In this context, a PAM-4 VLC transmitter system with pre- and post-equalization using three-color RGB LEDs as light-emitting devices was established. According to the experimental results, the communication system under test using the pre- and post-equalizations can achieve a data transmission rate of 2.9 times and a 2.5 times expanded bandwidth.","PeriodicalId":113564,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116862686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-01DOI: 10.1109/ICAICA50127.2020.9181875
Ling Cao, Zheyi Wan
The blockchain's cross-chain atomic exchange uses smart contracts to replace trusted third parties, but atomic exchange cannot guarantee the anonymity of transactions, and it will inevitably increase the risk of privacy leakage. Therefore, this paper proposes an atom based on zero-knowledge proof. Improved methods of exchange to ensure the privacy of both parties in a transaction. The anonymous improvement scheme in this article uses the UTXO unconsumed model to add a new anonymous list in the blockchain. When sending assets to smart contracts, zero-knowledge proof is used to provide self-certification of ownership of the asset, and then the transaction is broken down. Only the hash value of the transaction is sent to the node, and the discarded list is used to verify the validity of the transaction, which achieves the effect of storing assets anonymously in the smart contract. At the same time, a smart contract is added when the two parties in the transaction communicate to exchange the contract address of the newly set smart contract between the two parties in the transaction. This can prevent the smart contract address information from being stolen when the two parties in the transaction communicate directly.
{"title":"Anonymous scheme for blockchain atomic swap based on zero-knowledge proof","authors":"Ling Cao, Zheyi Wan","doi":"10.1109/ICAICA50127.2020.9181875","DOIUrl":"https://doi.org/10.1109/ICAICA50127.2020.9181875","url":null,"abstract":"The blockchain's cross-chain atomic exchange uses smart contracts to replace trusted third parties, but atomic exchange cannot guarantee the anonymity of transactions, and it will inevitably increase the risk of privacy leakage. Therefore, this paper proposes an atom based on zero-knowledge proof. Improved methods of exchange to ensure the privacy of both parties in a transaction. The anonymous improvement scheme in this article uses the UTXO unconsumed model to add a new anonymous list in the blockchain. When sending assets to smart contracts, zero-knowledge proof is used to provide self-certification of ownership of the asset, and then the transaction is broken down. Only the hash value of the transaction is sent to the node, and the discarded list is used to verify the validity of the transaction, which achieves the effect of storing assets anonymously in the smart contract. At the same time, a smart contract is added when the two parties in the transaction communicate to exchange the contract address of the newly set smart contract between the two parties in the transaction. This can prevent the smart contract address information from being stolen when the two parties in the transaction communicate directly.","PeriodicalId":113564,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114775646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Internet finance is advantageous to improve financial market competition, enhance capital allocation efficiency and decrease financial service costs. Moreover it makes up the deficiencies of the traditional finance on the aspects of satisfaction of the wider populations on financial demands, enhancement of financial inclusiveness and improvement of financial service efficiency. However Internet finance is also a double-edged sword. As a new pattern and new mode in the financial field, the prevailing laws, policies and regulatory systems can not completely cover the risk vulnerabilities of internet finance. This paper adopted the fuzzy analytic hierarchy process and five quantitative representative influential factors to compare the risk. According to the empirical analysis, the first higher risk in the current internet finance of China is credit risk; following which, the risks are the business risk, legal risk and operational risk; therefore it is very necessary to launch effective regulation and supervision on the risks of Chinese internet finance from multiple aspects, such as credit system, laws and regulations, regulatory systems so as to promote the mutual development of internet finance and traditional finance; this is the core issue of Chinese internet finance development.
{"title":"Research on Risk Assessment and Control of Internet Finance in China","authors":"Shu-Rong Yan, Yin Liao, De-Hua Liu, Weihong Li, Li-Na Wang, Lin-Hua Peng, Xiaoxiao Tian, M. Tian, Hongli Huang","doi":"10.1109/ICAICA50127.2020.9181894","DOIUrl":"https://doi.org/10.1109/ICAICA50127.2020.9181894","url":null,"abstract":"Internet finance is advantageous to improve financial market competition, enhance capital allocation efficiency and decrease financial service costs. Moreover it makes up the deficiencies of the traditional finance on the aspects of satisfaction of the wider populations on financial demands, enhancement of financial inclusiveness and improvement of financial service efficiency. However Internet finance is also a double-edged sword. As a new pattern and new mode in the financial field, the prevailing laws, policies and regulatory systems can not completely cover the risk vulnerabilities of internet finance. This paper adopted the fuzzy analytic hierarchy process and five quantitative representative influential factors to compare the risk. According to the empirical analysis, the first higher risk in the current internet finance of China is credit risk; following which, the risks are the business risk, legal risk and operational risk; therefore it is very necessary to launch effective regulation and supervision on the risks of Chinese internet finance from multiple aspects, such as credit system, laws and regulations, regulatory systems so as to promote the mutual development of internet finance and traditional finance; this is the core issue of Chinese internet finance development.","PeriodicalId":113564,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116744921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-01DOI: 10.1109/ICAICA50127.2020.9182627
Beibei Wang, Xue Yuan, Bo Li
In engineering, manufacturing, electronic industry, transportation and other industries, a large number of paper drawings have been accumulated. These paper drawings are an important resource accumulation of the companies. Paper drawings have some disadvantages, such as inconvenient to save, unable to establish database to realize resource reuse and so on. Therefore, this paper proposes a new algorithm of unattended drawing computerization and database intelligent establishment. Firstly, the position of the key text area is located according to the deep learning object detection algorithm, then the text lines in the text area are detected and the text is recognized. Finally, the database is established according to the recognition results. The experimental results show that the average accuracy of the proposed algorithm is 98.6%. Compared with the existing drawing retrieval algorithm, the algorithm uses deep learning object detection algorithm to initially locate the text area. It can further improve the accuracy of drawing information extraction, and realize the unattended paper drawing computerization and intelligent establishment of database.
{"title":"Drawing Computerization and Intelligent Database Building Algorithm","authors":"Beibei Wang, Xue Yuan, Bo Li","doi":"10.1109/ICAICA50127.2020.9182627","DOIUrl":"https://doi.org/10.1109/ICAICA50127.2020.9182627","url":null,"abstract":"In engineering, manufacturing, electronic industry, transportation and other industries, a large number of paper drawings have been accumulated. These paper drawings are an important resource accumulation of the companies. Paper drawings have some disadvantages, such as inconvenient to save, unable to establish database to realize resource reuse and so on. Therefore, this paper proposes a new algorithm of unattended drawing computerization and database intelligent establishment. Firstly, the position of the key text area is located according to the deep learning object detection algorithm, then the text lines in the text area are detected and the text is recognized. Finally, the database is established according to the recognition results. The experimental results show that the average accuracy of the proposed algorithm is 98.6%. Compared with the existing drawing retrieval algorithm, the algorithm uses deep learning object detection algorithm to initially locate the text area. It can further improve the accuracy of drawing information extraction, and realize the unattended paper drawing computerization and intelligent establishment of database.","PeriodicalId":113564,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123870782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-01DOI: 10.1109/ICAICA50127.2020.9181873
Wenchun Zhang, Hongyang Fan
This paper proposes a deep learning change detection method that uses the isolated forest algorithm to optimize the change detection results. Use the improved change vector analysis algorithm and gray level co-occurrence matrix algorithm to obtain the image spectrum and texture difference characteristics, select samples and train the deep confidence network model to detect the image change area; introduce the isolated forest algorithm to optimize the model detection result and get the change detection map. In the experiments based on the WHU Building Dataset, the accuracy and recall of the deep learning change detection results optimized by the method improved by 22.83% and 2.79%, respectively, and the false alarm rate and missed detection rate decreased by 36.88% and 2.79%, indicating that this article The method can effectively improve the accuracy of deep learning change detection, and has certain generalization value.
{"title":"Application of Isolated Forest Algorithm in Deep Learning Change Detection of High Resolution Remote Sensing Image","authors":"Wenchun Zhang, Hongyang Fan","doi":"10.1109/ICAICA50127.2020.9181873","DOIUrl":"https://doi.org/10.1109/ICAICA50127.2020.9181873","url":null,"abstract":"This paper proposes a deep learning change detection method that uses the isolated forest algorithm to optimize the change detection results. Use the improved change vector analysis algorithm and gray level co-occurrence matrix algorithm to obtain the image spectrum and texture difference characteristics, select samples and train the deep confidence network model to detect the image change area; introduce the isolated forest algorithm to optimize the model detection result and get the change detection map. In the experiments based on the WHU Building Dataset, the accuracy and recall of the deep learning change detection results optimized by the method improved by 22.83% and 2.79%, respectively, and the false alarm rate and missed detection rate decreased by 36.88% and 2.79%, indicating that this article The method can effectively improve the accuracy of deep learning change detection, and has certain generalization value.","PeriodicalId":113564,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124480733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-01DOI: 10.1109/ICAICA50127.2020.9182587
Yu Ying, Sun Yue
Visual data mining uses data or knowledge visualization technology to discover hidden and useful knowledge from large data sets. It integrates two disciplines, data mining and data visualization, and integrates with computer graphics, multimedia systems, human-machine interface and other disciplines. Closely related, the purpose is to explain and evaluate the data to be mined and the results of the mining task in an intuitive and effective way. This thesis combines visualization technology and data mining technology to design a visual communication webpage design method based on multi-source data integration. The Deep Web crawler is used to retrieve the visual communication website. It uses crawling methods to filter URLs and crawl useful pages. The experimental results show that the intelligent power distribution management webpage designed by this method runs well, has high visualization performance and information mining quality, and has a good visual communication effect.
{"title":"Application of Data Mining Combined Visualization Technology in Visual Communication","authors":"Yu Ying, Sun Yue","doi":"10.1109/ICAICA50127.2020.9182587","DOIUrl":"https://doi.org/10.1109/ICAICA50127.2020.9182587","url":null,"abstract":"Visual data mining uses data or knowledge visualization technology to discover hidden and useful knowledge from large data sets. It integrates two disciplines, data mining and data visualization, and integrates with computer graphics, multimedia systems, human-machine interface and other disciplines. Closely related, the purpose is to explain and evaluate the data to be mined and the results of the mining task in an intuitive and effective way. This thesis combines visualization technology and data mining technology to design a visual communication webpage design method based on multi-source data integration. The Deep Web crawler is used to retrieve the visual communication website. It uses crawling methods to filter URLs and crawl useful pages. The experimental results show that the intelligent power distribution management webpage designed by this method runs well, has high visualization performance and information mining quality, and has a good visual communication effect.","PeriodicalId":113564,"journal":{"name":"2020 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124864000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}