首页 > 最新文献

2021 IEEE 4th International Conference on Information Systems and Computer Aided Education (ICISCAE)最新文献

英文 中文
Research on Intelligent Manufacturing System Model Based on Programmable Logic Controller 基于可编程控制器的智能制造系统模型研究
Tianshu Li, Chunyan Huo
Modern manufacturing system is a highly decentralized manufacturing system, which consists of many intelligent processing machines, material transportation equipment, robots and various manufacturing resources. With the penetration of internet plus, the deepening of cloud services and the popularization of industrial Internet of Things, PLC (Programmable Logic Controller) should adapt to the demand of intelligent manufacturing from hardware and software. In the intelligent manufacturing process, the production is fully automated and unmanned. Once unreasonable processing technology arrangement occurs, the machine may collide and cause safety accidents. The finite state machine model commonly used in modeling and simulation of manufacturing systems can't deal with complexity and distributed problems, and the functional hierarchy model can only represent data flow, but can't represent control flow, and the description of the system is not accurate enough. In this paper, the digital, networked and intelligent system architecture operation model of intelligent manufacturing system is constructed based on PLC, and the functions of state perception, real-time analysis, independent decision-making and precise execution of intelligent manufacturing system are realized by using the role of big data in intelligent manufacturing system.
现代制造系统是一个高度分散的制造系统,由许多智能加工机械、物料输送设备、机器人和各种制造资源组成。随着互联网+的渗透、云服务的深入和工业物联网的普及,PLC (Programmable Logic Controller)应从硬件和软件两方面适应智能制造的需求。在智能制造过程中,生产是完全自动化和无人化的。一旦发生不合理的加工工艺安排,机器就可能发生碰撞,造成安全事故。制造系统建模与仿真中常用的有限状态机模型不能处理复杂和分布式问题,功能层次模型只能表示数据流,不能表示控制流,对系统的描述不够准确。本文基于PLC构建了智能制造系统数字化、网络化、智能化的系统架构运行模型,利用大数据在智能制造系统中的作用,实现了智能制造系统的状态感知、实时分析、自主决策和精准执行等功能。
{"title":"Research on Intelligent Manufacturing System Model Based on Programmable Logic Controller","authors":"Tianshu Li, Chunyan Huo","doi":"10.1109/ICISCAE52414.2021.9590769","DOIUrl":"https://doi.org/10.1109/ICISCAE52414.2021.9590769","url":null,"abstract":"Modern manufacturing system is a highly decentralized manufacturing system, which consists of many intelligent processing machines, material transportation equipment, robots and various manufacturing resources. With the penetration of internet plus, the deepening of cloud services and the popularization of industrial Internet of Things, PLC (Programmable Logic Controller) should adapt to the demand of intelligent manufacturing from hardware and software. In the intelligent manufacturing process, the production is fully automated and unmanned. Once unreasonable processing technology arrangement occurs, the machine may collide and cause safety accidents. The finite state machine model commonly used in modeling and simulation of manufacturing systems can't deal with complexity and distributed problems, and the functional hierarchy model can only represent data flow, but can't represent control flow, and the description of the system is not accurate enough. In this paper, the digital, networked and intelligent system architecture operation model of intelligent manufacturing system is constructed based on PLC, and the functions of state perception, real-time analysis, independent decision-making and precise execution of intelligent manufacturing system are realized by using the role of big data in intelligent manufacturing system.","PeriodicalId":121049,"journal":{"name":"2021 IEEE 4th International Conference on Information Systems and Computer Aided Education (ICISCAE)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124518196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on the Influence of Dehazing Algorithm on YOLOv3 Target Recognition 消雾算法对YOLOv3目标识别的影响研究
Xiaozheng Zhang, Zhe Jiang, W. Guo, X. Ren
The YOLOv3 target recognition algorithm has a wide range of applications in various fields. Under the haze conditions, the recognition effect of the YOLOv3 algorithm is affected, and its mAP value decreases significantly. To solve this problem, it can be improved by adding a dehazing algorithm before the recognition algorithm. In this paper, three commonly used dehazing algorithms are studied, and they are combined with YOLOv3 algorithm to perform target recognition experiments on hazing images. Solve their mAP values separately and compare them. The results show that all the three dehazing algorithms can improve the target recognition ability, and the Retinex algorithm works best.
YOLOv3目标识别算法在各个领域有着广泛的应用。在雾霾条件下,YOLOv3算法的识别效果受到影响,mAP值明显下降。为了解决这一问题,可以在识别算法之前加入去雾算法进行改进。本文研究了三种常用的去雾算法,并结合YOLOv3算法对去雾图像进行目标识别实验。分别求解它们的mAP值并进行比较。结果表明,三种去雾算法均能提高目标识别能力,其中以Retinex算法效果最好。
{"title":"Research on the Influence of Dehazing Algorithm on YOLOv3 Target Recognition","authors":"Xiaozheng Zhang, Zhe Jiang, W. Guo, X. Ren","doi":"10.1109/ICISCAE52414.2021.9590809","DOIUrl":"https://doi.org/10.1109/ICISCAE52414.2021.9590809","url":null,"abstract":"The YOLOv3 target recognition algorithm has a wide range of applications in various fields. Under the haze conditions, the recognition effect of the YOLOv3 algorithm is affected, and its mAP value decreases significantly. To solve this problem, it can be improved by adding a dehazing algorithm before the recognition algorithm. In this paper, three commonly used dehazing algorithms are studied, and they are combined with YOLOv3 algorithm to perform target recognition experiments on hazing images. Solve their mAP values separately and compare them. The results show that all the three dehazing algorithms can improve the target recognition ability, and the Retinex algorithm works best.","PeriodicalId":121049,"journal":{"name":"2021 IEEE 4th International Conference on Information Systems and Computer Aided Education (ICISCAE)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123028829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Application of Intelligent System Integration Based on Data Mining Technology 基于数据挖掘技术的智能系统集成应用研究
Rongjian Zhang
Data mining technology can accurately extract useful information from a large amount of information data, and also has the function of removing falsehood and preserving truth, so it has a very important application in intelligent system set. The essential condition of intelligent building is building intelligence, and the core of intelligent building system design is system integration. The main goal of intelligent building system integration is to realize information integration, and data warehouse technology is an effective solution to solve the problem of intelligent building information integration. Data mining technology is used to analyze and process various kinds of massive data and information, so as to realize the conversion from data to information and provide effective support for leaders' decision-making. The new model of building intelligent system integration based on data mining technology proposed in this paper has solved the compatibility and openness problems in the process of building intelligent system integration, and achieved the goal of safe and efficient building intelligent system.
数据挖掘技术能够从大量的信息数据中准确地提取出有用的信息,并且具有去虚和保真的功能,因此在智能系统集中有着非常重要的应用。智能建筑的本质条件是建筑智能化,而智能建筑系统设计的核心是系统集成。智能建筑系统集成的主要目标是实现信息集成,而数据仓库技术是解决智能建筑信息集成问题的有效解决方案。数据挖掘技术是对各类海量数据和信息进行分析和处理,实现数据到信息的转化,为领导者的决策提供有效支持。本文提出的基于数据挖掘技术的楼宇智能系统集成新模型,解决了楼宇智能系统集成过程中的兼容性和开放性问题,实现了楼宇智能系统安全高效的目标。
{"title":"Research on Application of Intelligent System Integration Based on Data Mining Technology","authors":"Rongjian Zhang","doi":"10.1109/ICISCAE52414.2021.9590814","DOIUrl":"https://doi.org/10.1109/ICISCAE52414.2021.9590814","url":null,"abstract":"Data mining technology can accurately extract useful information from a large amount of information data, and also has the function of removing falsehood and preserving truth, so it has a very important application in intelligent system set. The essential condition of intelligent building is building intelligence, and the core of intelligent building system design is system integration. The main goal of intelligent building system integration is to realize information integration, and data warehouse technology is an effective solution to solve the problem of intelligent building information integration. Data mining technology is used to analyze and process various kinds of massive data and information, so as to realize the conversion from data to information and provide effective support for leaders' decision-making. The new model of building intelligent system integration based on data mining technology proposed in this paper has solved the compatibility and openness problems in the process of building intelligent system integration, and achieved the goal of safe and efficient building intelligent system.","PeriodicalId":121049,"journal":{"name":"2021 IEEE 4th International Conference on Information Systems and Computer Aided Education (ICISCAE)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129425690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on algorithm of personal navigation system based on adaptive vector particle filter 基于自适应矢量粒子滤波的个人导航系统算法研究
Shu Xu, Jiayu Liu
As the representative of many information technologies, navigation technology is quietly entering the details of human life. How to adapt to complex environment and fuse multi-sensor information to achieve more accurate positioning has become the key of navigation technology. Facing the requirements of high-precision and reliable positioning technology, aiming at the problems of low positioning accuracy and poor robustness caused by incomplete information of single source positioning technology, this paper focuses on the fusion positioning method of wireless signal, pedestrian dead reckoning (PDR) and map information based on particle filter (PF), and proposes an adaptive vector particle filter algorithm, A personal navigation (PND) system based on adaptive vector particle filter is designed, which can effectively improve the positioning performance. The experimental results show that the navigation results can correctly reflect the changing process of the attitude, speed and position of the pedestrian's foot. The position error of the navigation algorithm is positively correlated with the walking distance and the number of walking steps, and the relative error between the position error and the traveling distance is about 5%.
导航技术作为众多信息技术的代表,正悄然进入人类生活的细节。如何适应复杂的环境,融合多传感器信息,实现更精确的定位已成为导航技术的关键。面对高精度、可靠的定位技术要求,针对单源定位技术信息不完全导致定位精度低、鲁棒性差的问题,重点研究了基于粒子滤波(PF)的无线信号、行人航位推算(PDR)和地图信息的融合定位方法,提出了一种自适应矢量粒子滤波算法。设计了一种基于自适应矢量粒子滤波的个人导航系统,有效地提高了定位性能。实验结果表明,该导航结果能够正确反映行人脚的姿态、速度和位置的变化过程。导航算法的位置误差与行走距离和行走步数呈正相关,位置误差与行走距离的相对误差约为5%。
{"title":"Research on algorithm of personal navigation system based on adaptive vector particle filter","authors":"Shu Xu, Jiayu Liu","doi":"10.1109/ICISCAE52414.2021.9590787","DOIUrl":"https://doi.org/10.1109/ICISCAE52414.2021.9590787","url":null,"abstract":"As the representative of many information technologies, navigation technology is quietly entering the details of human life. How to adapt to complex environment and fuse multi-sensor information to achieve more accurate positioning has become the key of navigation technology. Facing the requirements of high-precision and reliable positioning technology, aiming at the problems of low positioning accuracy and poor robustness caused by incomplete information of single source positioning technology, this paper focuses on the fusion positioning method of wireless signal, pedestrian dead reckoning (PDR) and map information based on particle filter (PF), and proposes an adaptive vector particle filter algorithm, A personal navigation (PND) system based on adaptive vector particle filter is designed, which can effectively improve the positioning performance. The experimental results show that the navigation results can correctly reflect the changing process of the attitude, speed and position of the pedestrian's foot. The position error of the navigation algorithm is positively correlated with the walking distance and the number of walking steps, and the relative error between the position error and the traveling distance is about 5%.","PeriodicalId":121049,"journal":{"name":"2021 IEEE 4th International Conference on Information Systems and Computer Aided Education (ICISCAE)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133681552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on the Construction of Educational Data Quality Model Based on Multiple Constraints Model 基于多约束模型的教育数据质量模型构建研究
Jinming Du
With the development of Internet and information technology, data has become an important asset related to the development prospects of society and all walks of life. At present, there are many quality problems in the use of educational data, which has brought great obstacles to exerting the value of educational data. Only by using scientific statistical methods, obtaining real, objective, comprehensive, scientific and effective basic data, and carrying out systematic and comprehensive analysis on the obtained data, can we give full play to its command and decision-making role. The development of big data and artificial intelligence technology provides new ideas for the analysis and evaluation of educational data quality, and is committed to restoring the overall picture of the education system and promoting the change of regional educational ecology. In this paper, an educational data quality analysis model based on multiple constraint model is proposed, which classifies the data in the database, divides the information in the database into several different categories according to the data characteristics, and establishes a quality management system for educational data in universities, so as to effectively improve the quality of educational data.
随着互联网和信息技术的发展,数据已经成为关系到社会和各行各业发展前景的重要资产。目前,在教育数据的使用中存在着许多质量问题,这给教育数据价值的发挥带来了很大的障碍。只有运用科学的统计方法,获取真实、客观、全面、科学、有效的基础数据,并对获得的数据进行系统、全面的分析,才能充分发挥其指挥决策作用。大数据和人工智能技术的发展为教育数据质量的分析和评估提供了新的思路,致力于还原教育系统的全貌,推动区域教育生态的改变。本文提出了一种基于多约束模型的教育数据质量分析模型,对数据库中的数据进行分类,根据数据特征将数据库中的信息划分为几个不同的类别,建立高校教育数据质量管理体系,从而有效地提高教育数据的质量。
{"title":"Research on the Construction of Educational Data Quality Model Based on Multiple Constraints Model","authors":"Jinming Du","doi":"10.1109/ICISCAE52414.2021.9590700","DOIUrl":"https://doi.org/10.1109/ICISCAE52414.2021.9590700","url":null,"abstract":"With the development of Internet and information technology, data has become an important asset related to the development prospects of society and all walks of life. At present, there are many quality problems in the use of educational data, which has brought great obstacles to exerting the value of educational data. Only by using scientific statistical methods, obtaining real, objective, comprehensive, scientific and effective basic data, and carrying out systematic and comprehensive analysis on the obtained data, can we give full play to its command and decision-making role. The development of big data and artificial intelligence technology provides new ideas for the analysis and evaluation of educational data quality, and is committed to restoring the overall picture of the education system and promoting the change of regional educational ecology. In this paper, an educational data quality analysis model based on multiple constraint model is proposed, which classifies the data in the database, divides the information in the database into several different categories according to the data characteristics, and establishes a quality management system for educational data in universities, so as to effectively improve the quality of educational data.","PeriodicalId":121049,"journal":{"name":"2021 IEEE 4th International Conference on Information Systems and Computer Aided Education (ICISCAE)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133727800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on the Application of Data Encryption Technology in Computer Network Security Based on Machine Learning 基于机器学习的数据加密技术在计算机网络安全中的应用研究
Yufei Song, M. Chu
Nowadays, in the network age, computer security issues have attracted much attention. In order to ensure computer network security, it is necessary to pay attention to improving data encryption technology. Data encryption technology is mainly divided into two types: asymmetric key and symmetric key. Generally, the sender and receiver use different password settings to realize network security. In this paper, a scheme of applying machine learning classification algorithm to homomorphic encrypted data sets is proposed: firstly, the plaintext is preprocessed to ensure that it meets the requirements of homomorphic encryption of data; Then, compare and sort the encrypted data set by protocol. Finally, the classification results are obtained. Combined with machine learning algorithm, the text information hiding convergence is controlled, and the text information hiding algorithm is optimized. Simulation results show that this method can hide text information in a higher depth, and has stronger anti-attack ability, thus improving the security of text information storage.
如今,在网络时代,计算机安全问题引起了人们的广泛关注。为了保证计算机网络的安全,有必要重视改进数据加密技术。数据加密技术主要分为两种:非对称密钥和对称密钥。通常,发送方和接收方使用不同的密码设置来实现网络安全。本文提出了一种将机器学习分类算法应用于同态加密数据集的方案:首先对明文进行预处理,使其满足数据同态加密的要求;然后,按协议对加密后的数据集进行比较和排序。最后,得到分类结果。结合机器学习算法,控制文本信息隐藏收敛性,优化文本信息隐藏算法。仿真结果表明,该方法可以将文本信息隐藏在更高的深度,具有更强的抗攻击能力,从而提高了文本信息存储的安全性。
{"title":"Research on the Application of Data Encryption Technology in Computer Network Security Based on Machine Learning","authors":"Yufei Song, M. Chu","doi":"10.1109/ICISCAE52414.2021.9590794","DOIUrl":"https://doi.org/10.1109/ICISCAE52414.2021.9590794","url":null,"abstract":"Nowadays, in the network age, computer security issues have attracted much attention. In order to ensure computer network security, it is necessary to pay attention to improving data encryption technology. Data encryption technology is mainly divided into two types: asymmetric key and symmetric key. Generally, the sender and receiver use different password settings to realize network security. In this paper, a scheme of applying machine learning classification algorithm to homomorphic encrypted data sets is proposed: firstly, the plaintext is preprocessed to ensure that it meets the requirements of homomorphic encryption of data; Then, compare and sort the encrypted data set by protocol. Finally, the classification results are obtained. Combined with machine learning algorithm, the text information hiding convergence is controlled, and the text information hiding algorithm is optimized. Simulation results show that this method can hide text information in a higher depth, and has stronger anti-attack ability, thus improving the security of text information storage.","PeriodicalId":121049,"journal":{"name":"2021 IEEE 4th International Conference on Information Systems and Computer Aided Education (ICISCAE)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124661486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design of the Information Security System Based on the Encryption Mechanism 基于加密机制的信息安全系统设计
Shih Pan, Zhixuan Xiao
In the context of the accelerating process of information technology in the international society, information security has become the focus of attention of the whole society. How to ensure communication security in the application of information communication has become the main direction of research and exploration. Therefore, on the basis of understanding the good cryptographic system, this paper analyzes how to design the practical information security system for the two commonly used cryptographic algorithms.
在国际社会信息化进程不断加快的背景下,信息安全已成为全社会关注的焦点。在信息通信应用中如何保证通信安全已成为研究和探索的主要方向。因此,本文在了解好的密码系统的基础上,分析了如何针对两种常用的密码算法设计实用的信息安全系统。
{"title":"Design of the Information Security System Based on the Encryption Mechanism","authors":"Shih Pan, Zhixuan Xiao","doi":"10.1109/ICISCAE52414.2021.9590763","DOIUrl":"https://doi.org/10.1109/ICISCAE52414.2021.9590763","url":null,"abstract":"In the context of the accelerating process of information technology in the international society, information security has become the focus of attention of the whole society. How to ensure communication security in the application of information communication has become the main direction of research and exploration. Therefore, on the basis of understanding the good cryptographic system, this paper analyzes how to design the practical information security system for the two commonly used cryptographic algorithms.","PeriodicalId":121049,"journal":{"name":"2021 IEEE 4th International Conference on Information Systems and Computer Aided Education (ICISCAE)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127421301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Multimodal Human Behavior Recognition Based on Double Flow Network 基于双流网络的多模态人类行为识别研究
Xiao Bao
How to use computer vision technology to automatically identify and analyze human behavior in video has become a research hotspot. In traditional behavior recognition methods, features need to be extracted manually, and the recognition effect of features largely depends on the experience of feature designers. This paper takes the dual-stream convolutional neural network as the basic theory, and uses the TSN (Temporal Segment Networks) model as the basic framework to analyze the shortcomings and shortcomings of the single-stream network and the original dual-stream network. A multi-modal human behavior recognition model based on dual-stream network is proposed. In order to extract video-level features effectively, this model adopts two attention mechanisms, which are used to learn image frame features and video-level feature transfer. Then, CNN is used to extract global motion features, and finally, it is fused with spatio-temporal features. The fusion feature is evaluated on the public data set, and the results show that the two features are complementary, and their fusion makes the features more expressive, and the recognition result on the public data set is greatly improved compared with the single spatio-temporal feature.
如何利用计算机视觉技术对视频中的人类行为进行自动识别和分析已成为研究热点。在传统的行为识别方法中,特征需要人工提取,特征的识别效果很大程度上取决于特征设计者的经验。本文以双流卷积神经网络为基础理论,以TSN (Temporal Segment Networks)模型为基本框架,分析了单流网络和原有双流网络的缺点和不足。提出了一种基于双流网络的多模态人体行为识别模型。为了有效地提取视频级特征,该模型采用了两种注意机制,分别用于学习图像帧特征和转移视频级特征。然后利用CNN提取全局运动特征,最后与时空特征融合。在公共数据集上对融合特征进行了评价,结果表明,两种特征是互补的,它们的融合使特征更具表现力,在公共数据集上的识别结果比单一时空特征有了很大的提高。
{"title":"Research on Multimodal Human Behavior Recognition Based on Double Flow Network","authors":"Xiao Bao","doi":"10.1109/ICISCAE52414.2021.9590666","DOIUrl":"https://doi.org/10.1109/ICISCAE52414.2021.9590666","url":null,"abstract":"How to use computer vision technology to automatically identify and analyze human behavior in video has become a research hotspot. In traditional behavior recognition methods, features need to be extracted manually, and the recognition effect of features largely depends on the experience of feature designers. This paper takes the dual-stream convolutional neural network as the basic theory, and uses the TSN (Temporal Segment Networks) model as the basic framework to analyze the shortcomings and shortcomings of the single-stream network and the original dual-stream network. A multi-modal human behavior recognition model based on dual-stream network is proposed. In order to extract video-level features effectively, this model adopts two attention mechanisms, which are used to learn image frame features and video-level feature transfer. Then, CNN is used to extract global motion features, and finally, it is fused with spatio-temporal features. The fusion feature is evaluated on the public data set, and the results show that the two features are complementary, and their fusion makes the features more expressive, and the recognition result on the public data set is greatly improved compared with the single spatio-temporal feature.","PeriodicalId":121049,"journal":{"name":"2021 IEEE 4th International Conference on Information Systems and Computer Aided Education (ICISCAE)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115616492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Unstructured Mega Data Analysis Algorithm of Communication Network Based on Feature Fusion 基于特征融合的通信网络非结构化大数据分析算法研究
Gang Chen
In communication network mega data, unstructured data is characterized by large scale, diversity and timeliness. Traditional unstructured processing methods have been difficult to meet the data processing needs. Complex data sets and large data orders in modern mega data require professional analysis tools to realize analysis. Information fusion is a multi-source information processing technology, which can optimize and synthesize redundant information from multiple sensors in space and time, and obtain more accurate and complete values than single information source, and obtain the consistent description of the measured object. In order to effectively solve the problem of unstructured data model of communication network mega data, this paper proposes an algorithm for unstructured data analysis of communication network based on feature fusion, and analyzes the key problems in the process of unstructured data feature modeling, such as the storage of original data and feature data, the selection of feature space, information query and data visualization.
在通信网络大数据中,非结构化数据具有规模大、多样性和时效性等特点。传统的非结构化处理方法已经难以满足数据处理的需要。现代大数据中的复杂数据集和大数据订单需要专业的分析工具来实现分析。信息融合是一种多源信息处理技术,它可以对多个传感器在空间和时间上的冗余信息进行优化和综合,获得比单一信息源更准确和完整的值,并获得对被测物体的一致描述。为了有效解决通信网络大数据的非结构化数据建模问题,本文提出了一种基于特征融合的通信网络非结构化数据分析算法,分析了非结构化数据特征建模过程中的关键问题,如原始数据和特征数据的存储、特征空间的选择、信息查询和数据可视化等。
{"title":"Research on Unstructured Mega Data Analysis Algorithm of Communication Network Based on Feature Fusion","authors":"Gang Chen","doi":"10.1109/ICISCAE52414.2021.9590813","DOIUrl":"https://doi.org/10.1109/ICISCAE52414.2021.9590813","url":null,"abstract":"In communication network mega data, unstructured data is characterized by large scale, diversity and timeliness. Traditional unstructured processing methods have been difficult to meet the data processing needs. Complex data sets and large data orders in modern mega data require professional analysis tools to realize analysis. Information fusion is a multi-source information processing technology, which can optimize and synthesize redundant information from multiple sensors in space and time, and obtain more accurate and complete values than single information source, and obtain the consistent description of the measured object. In order to effectively solve the problem of unstructured data model of communication network mega data, this paper proposes an algorithm for unstructured data analysis of communication network based on feature fusion, and analyzes the key problems in the process of unstructured data feature modeling, such as the storage of original data and feature data, the selection of feature space, information query and data visualization.","PeriodicalId":121049,"journal":{"name":"2021 IEEE 4th International Conference on Information Systems and Computer Aided Education (ICISCAE)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123578565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Data security management of logistics network based on blockchain technology 基于区块链技术的物流网络数据安全管理
WeiSheng Wen, Jun Ma, Shuqin Liu
The logistics network is composed of lines and nodes. The traditional logistics is too centralized, so it is necessary to try “decentralization” to reduce the management difficulty and operational risk. This paper proposes a security data management method based on blockchain to manage distributed logistics network system. Through IOT technology, the warehouse will be connected by tagging individual items and operating hardware to improve the transparency and localization of all assets. The client of IOT node encrypts the logistics transaction data and uploads it to the blockchain to ensure the privacy and unforgeability of the logistics information, so that the encrypted data can be decrypted by the system nodes and uploaded to the blockchain through the logistics network. According to the experiment of school enterprise cooperation enterprise, this is a sharing framework with high security and high availability.
物流网络由线路和节点组成。传统物流过于集中,有必要尝试“去中心化”,以降低管理难度和经营风险。提出了一种基于区块链的分布式物流网络系统安全数据管理方法。通过物联网技术,仓库将通过标记单个物品和操作硬件连接起来,以提高所有资产的透明度和本地化。物联网节点的客户端对物流交易数据进行加密并上传到区块链,保证物流信息的保密性和不可伪造性,使加密后的数据可以被系统节点解密,并通过物流网络上传到区块链。根据校企合作企业的实验,这是一个具有高安全性和高可用性的共享框架。
{"title":"Data security management of logistics network based on blockchain technology","authors":"WeiSheng Wen, Jun Ma, Shuqin Liu","doi":"10.1109/ICISCAE52414.2021.9590784","DOIUrl":"https://doi.org/10.1109/ICISCAE52414.2021.9590784","url":null,"abstract":"The logistics network is composed of lines and nodes. The traditional logistics is too centralized, so it is necessary to try “decentralization” to reduce the management difficulty and operational risk. This paper proposes a security data management method based on blockchain to manage distributed logistics network system. Through IOT technology, the warehouse will be connected by tagging individual items and operating hardware to improve the transparency and localization of all assets. The client of IOT node encrypts the logistics transaction data and uploads it to the blockchain to ensure the privacy and unforgeability of the logistics information, so that the encrypted data can be decrypted by the system nodes and uploaded to the blockchain through the logistics network. According to the experiment of school enterprise cooperation enterprise, this is a sharing framework with high security and high availability.","PeriodicalId":121049,"journal":{"name":"2021 IEEE 4th International Conference on Information Systems and Computer Aided Education (ICISCAE)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123085465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2021 IEEE 4th International Conference on Information Systems and Computer Aided Education (ICISCAE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1