Wearable technology is an intelligent design. Since the introduction of Google Glass in 2012, wearable technology and devices have been a hot research topic in the market and are widely used in various fields such as entertainment, fitness and medical care. Since the introduction of Google Glass in 2012, wearable technology and devices have been a hot topic of research in the market and are widely used in various fields such as entertainment, fitness and medical care. In this paper, we created a visual sports management system in the context of big data, recorded students' sports data, then saved the data in a database to provide easy access to virtual reality clients, and pooled the sports data of each individual as a source of research on group sports patterns, thus promoting the improvement of sports management.
{"title":"The Application of Wearable Devices in Sports in the Context of Big Data","authors":"Lihong Zhang","doi":"10.1145/3575828.3575840","DOIUrl":"https://doi.org/10.1145/3575828.3575840","url":null,"abstract":"Wearable technology is an intelligent design. Since the introduction of Google Glass in 2012, wearable technology and devices have been a hot research topic in the market and are widely used in various fields such as entertainment, fitness and medical care. Since the introduction of Google Glass in 2012, wearable technology and devices have been a hot topic of research in the market and are widely used in various fields such as entertainment, fitness and medical care. In this paper, we created a visual sports management system in the context of big data, recorded students' sports data, then saved the data in a database to provide easy access to virtual reality clients, and pooled the sports data of each individual as a source of research on group sports patterns, thus promoting the improvement of sports management.","PeriodicalId":124910,"journal":{"name":"Proceedings of the 2022 7th International Conference on Systems, Control and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122987566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
After entering the era of metaverse, the breakthrough development of blockchain, high-speed interconnection and VR and other technologies have a certain impact on human production methods and life needs, and also bring a new way of expression and approach to the field of architecture. In this paper, the theory of architectural self-organization is used as the base point to explore the possibility of user-designer co-construction mode in virtual architectural design and construction, mainly analyzing the characteristics of the Internet creation mode and the co-construction system under the architectural self-organization mode, providing inspiration and new ideas for the future design of the metaverse user space immersion experience.
{"title":"Exploration of Architectural Design in the Co-construction Mode of User and Designer in the Metaverse Environment","authors":"Xianglei Ding, Manting Sun, Wenhao Bai, Xin Li","doi":"10.1145/3575828.3575838","DOIUrl":"https://doi.org/10.1145/3575828.3575838","url":null,"abstract":"After entering the era of metaverse, the breakthrough development of blockchain, high-speed interconnection and VR and other technologies have a certain impact on human production methods and life needs, and also bring a new way of expression and approach to the field of architecture. In this paper, the theory of architectural self-organization is used as the base point to explore the possibility of user-designer co-construction mode in virtual architectural design and construction, mainly analyzing the characteristics of the Internet creation mode and the co-construction system under the architectural self-organization mode, providing inspiration and new ideas for the future design of the metaverse user space immersion experience.","PeriodicalId":124910,"journal":{"name":"Proceedings of the 2022 7th International Conference on Systems, Control and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123186979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sun Chao, Yuan Wei, Zhang Zheyang, Lin Shaozheng, E. Mingzhang
Aiming at the problems in traditional time series data association mining, such as huge candidate set space, low mining efficiency, and mining results not meeting the time series requirements, we obtain the key parameters of the operation state of the aerospace TT&C equipment firstly, and uses the temporal association rule mining (TSAR) algorithm based on temporal constraints, establish the candidate set of association rule mining, trim the candidate set space according to temporal constraints, and mine frequent patterns that conform to temporal constraints. Then, the asymmetric J-measure method is used to extract the multi-dimensional association rules with the maximum amount of information. Finally, abnormal detection of aerospace TT&C equipment operation state is realized by mining temporal association rules of key parameters. The experimental results show that, compared with the traditional association rule mining algorithm, TSAR model can effectively mine temporal association rules containing more information, and can also efficiently analyze the abnormal time points of the operation state of aerospace TT&C equipment, providing support for knowledge discovery and anomaly detection of aerospace TT&C equipment.
{"title":"Research on Abnormal Detection Algorithm of Aerospace TT&C Equipment-Based on Temporal Association Rules","authors":"Sun Chao, Yuan Wei, Zhang Zheyang, Lin Shaozheng, E. Mingzhang","doi":"10.1145/3575828.3575833","DOIUrl":"https://doi.org/10.1145/3575828.3575833","url":null,"abstract":"Aiming at the problems in traditional time series data association mining, such as huge candidate set space, low mining efficiency, and mining results not meeting the time series requirements, we obtain the key parameters of the operation state of the aerospace TT&C equipment firstly, and uses the temporal association rule mining (TSAR) algorithm based on temporal constraints, establish the candidate set of association rule mining, trim the candidate set space according to temporal constraints, and mine frequent patterns that conform to temporal constraints. Then, the asymmetric J-measure method is used to extract the multi-dimensional association rules with the maximum amount of information. Finally, abnormal detection of aerospace TT&C equipment operation state is realized by mining temporal association rules of key parameters. The experimental results show that, compared with the traditional association rule mining algorithm, TSAR model can effectively mine temporal association rules containing more information, and can also efficiently analyze the abnormal time points of the operation state of aerospace TT&C equipment, providing support for knowledge discovery and anomaly detection of aerospace TT&C equipment.","PeriodicalId":124910,"journal":{"name":"Proceedings of the 2022 7th International Conference on Systems, Control and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115101633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract. The objective of this research is to develop the Numerical Integral Equation (NIE) methods for approximating the Average Run Length (ARL) on Extended Exponentially Weighted Moving Average control chart (Extended EWMA) for the first order moving average process under exponential white noise. Also, this research compares the performance of Extended EWMA and EWMA of NIE method using the Gaussian rule, Midpoint rule, Simpson's rule and Trapezoidal rule. The results from this research shown that the performance of Extended EWMA control chart is superior to EWMA control chart for all shift size of change. Additionally, the approximation of NIE methods to obtain the ARL by Midpoint rule takes intervals time (CPU) less than other methods.
{"title":"An Approximation of Average Run Length on Extended EWMA Control Chart for the Moving Average Process","authors":"Phunsa Mongkoltawat, Y. Areepong, S. Sukparungsee","doi":"10.1145/3575828.3575836","DOIUrl":"https://doi.org/10.1145/3575828.3575836","url":null,"abstract":"Abstract. The objective of this research is to develop the Numerical Integral Equation (NIE) methods for approximating the Average Run Length (ARL) on Extended Exponentially Weighted Moving Average control chart (Extended EWMA) for the first order moving average process under exponential white noise. Also, this research compares the performance of Extended EWMA and EWMA of NIE method using the Gaussian rule, Midpoint rule, Simpson's rule and Trapezoidal rule. The results from this research shown that the performance of Extended EWMA control chart is superior to EWMA control chart for all shift size of change. Additionally, the approximation of NIE methods to obtain the ARL by Midpoint rule takes intervals time (CPU) less than other methods.","PeriodicalId":124910,"journal":{"name":"Proceedings of the 2022 7th International Conference on Systems, Control and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130572814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In 2019, S. Saranya and M. Vigneshwaran introduced the concepts of neutrosophic sets, neutrosophicsets, neutrosophic neutrosophic neutrosophic and neutrosophic of a set in neutrosophic topological spaces, and presented some properties of these sets. In this paper, we introduce neutrosophic space and space using neutrosophic sets and sets in neutrosophic topological spaces. We investigate their several basic properties and characterizations in neutrosophic topological spaces.
{"title":"Neutrosophic b*gα-Regular and Neutrosophic b*gα-Normal Topological Spaces","authors":"Raja Mohammad Latif","doi":"10.1145/3575828.3575837","DOIUrl":"https://doi.org/10.1145/3575828.3575837","url":null,"abstract":"In 2019, S. Saranya and M. Vigneshwaran introduced the concepts of neutrosophic sets, neutrosophicsets, neutrosophic neutrosophic neutrosophic and neutrosophic of a set in neutrosophic topological spaces, and presented some properties of these sets. In this paper, we introduce neutrosophic space and space using neutrosophic sets and sets in neutrosophic topological spaces. We investigate their several basic properties and characterizations in neutrosophic topological spaces.","PeriodicalId":124910,"journal":{"name":"Proceedings of the 2022 7th International Conference on Systems, Control and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122256820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Under the background of digital transformation of power grid, how to tap the value of digital technology to enable power grid infrastructure management business has become the focus of current power grid construction business digitalization. This paper analyzes the characteristics of digital technology represented by mobile applications, combines the requirements of power grid infrastructure field operations, deeply studies the application direction of digital technology and power grid infrastructure business, builds a mobile platform for infrastructure field operations, conducts relevant analysis from the perspectives of site construction and construction management, and standardizes the project site management processes such as daily management, safe operation, and construction supervision management, The design method of system component layering is adopted to complete the system function development. The system gives full play to the advantages of digital technology, comprehensively improves the power grid infrastructure site operation management ability, and effectively promotes the digital transformation of power grid construction.
{"title":"Research on Mobile Platform for Field Operation of Power Grid Infrastructure under the Digital Transformation of Power Grid","authors":"Zhen Wang, Yongxue Fan, Lei Ding, Yu Yang","doi":"10.1145/3575828.3575839","DOIUrl":"https://doi.org/10.1145/3575828.3575839","url":null,"abstract":"Under the background of digital transformation of power grid, how to tap the value of digital technology to enable power grid infrastructure management business has become the focus of current power grid construction business digitalization. This paper analyzes the characteristics of digital technology represented by mobile applications, combines the requirements of power grid infrastructure field operations, deeply studies the application direction of digital technology and power grid infrastructure business, builds a mobile platform for infrastructure field operations, conducts relevant analysis from the perspectives of site construction and construction management, and standardizes the project site management processes such as daily management, safe operation, and construction supervision management, The design method of system component layering is adopted to complete the system function development. The system gives full play to the advantages of digital technology, comprehensively improves the power grid infrastructure site operation management ability, and effectively promotes the digital transformation of power grid construction.","PeriodicalId":124910,"journal":{"name":"Proceedings of the 2022 7th International Conference on Systems, Control and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124231660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Python is characterized by a relatively easy-to-learn syntax, a large number of standard libraries and third-party database support, and good compatibility. It has been applied to theoretical research, practical cases, and also has the advantage of a wide variety of toolsets. Python has penetrated into scientific computing, big data processing, data analysis and other professions and fields. In this paper, we requested and downloaded ERA5 reanalysis data by script, and read ERA5 reanalysis data grid point data by Python Xarray toolkit, processed data time dimension and space dimension to read meteorological data into formatted array, and used Metpy to calculate meteorological equation on data. After that, the meteorological and marine data of a high impact sea fog process from February 9th to 14th, 2020 were analyzed and projected onto the map and plotted by Matplotlib and Cartopy, and the product batch 2D mapping was efficiently parallel optimized to study the formation mechanism of sea fog in Liaodong Bay and improve the forecast and warning level of sea fog.
{"title":"Application of Data Analysis by Python Technology in a Sea Fog Process","authors":"Chenyu Zhang, Bingyu Liu, Haoye Liu, Chengyu Yan","doi":"10.1145/3575828.3575832","DOIUrl":"https://doi.org/10.1145/3575828.3575832","url":null,"abstract":"Python is characterized by a relatively easy-to-learn syntax, a large number of standard libraries and third-party database support, and good compatibility. It has been applied to theoretical research, practical cases, and also has the advantage of a wide variety of toolsets. Python has penetrated into scientific computing, big data processing, data analysis and other professions and fields. In this paper, we requested and downloaded ERA5 reanalysis data by script, and read ERA5 reanalysis data grid point data by Python Xarray toolkit, processed data time dimension and space dimension to read meteorological data into formatted array, and used Metpy to calculate meteorological equation on data. After that, the meteorological and marine data of a high impact sea fog process from February 9th to 14th, 2020 were analyzed and projected onto the map and plotted by Matplotlib and Cartopy, and the product batch 2D mapping was efficiently parallel optimized to study the formation mechanism of sea fog in Liaodong Bay and improve the forecast and warning level of sea fog.","PeriodicalId":124910,"journal":{"name":"Proceedings of the 2022 7th International Conference on Systems, Control and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115889349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, the problem of particle spacing in geometric space is analyzed geometrically. Only for this problem, the "Grid theorem" is proposed in the geometric space. According to the theorem, the plane geometric graph is drawn on two adjacent particles in the geometric, and the two particles are planned in the graph. The diagonal bisector of each diagonal is drawn on the basis of the plane geometric diagram, and the diagonal center point is obtained. Furthermore, a direction of the same diagonal center point is taken as the secondary center point according to the subdivision line. Then, a feasible rule expression is obtained by summarizing and analyzing the results of the respective spacing, and the calculation and evaluation of this rule expression are extended.
{"title":"Grid theorem: Expression Derived from Quadratic Division of Grid of Geometric Space by Diagonal Central Logic","authors":"Guo-zhao Wang","doi":"10.1145/3575828.3575835","DOIUrl":"https://doi.org/10.1145/3575828.3575835","url":null,"abstract":"In this paper, the problem of particle spacing in geometric space is analyzed geometrically. Only for this problem, the \"Grid theorem\" is proposed in the geometric space. According to the theorem, the plane geometric graph is drawn on two adjacent particles in the geometric, and the two particles are planned in the graph. The diagonal bisector of each diagonal is drawn on the basis of the plane geometric diagram, and the diagonal center point is obtained. Furthermore, a direction of the same diagonal center point is taken as the secondary center point according to the subdivision line. Then, a feasible rule expression is obtained by summarizing and analyzing the results of the respective spacing, and the calculation and evaluation of this rule expression are extended.","PeriodicalId":124910,"journal":{"name":"Proceedings of the 2022 7th International Conference on Systems, Control and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122644917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Thanks to the skyscraping development of hardware and software technologies, the data solutions have become an urgent trend to deal with vast amount of data, especially in biomedical research, human genome and healthcare systems. The healthcare research has always demanded close association with biomedical data to produce personalized medicine and deliver suitable cure and treatments. Nevertheless, coping with huge amount of information from biomedical data requires bulky solutions. In the light of data science, the solution for this issue can change from a theoretical approach to a data-driven approach. Database stores a huge amount of information and particular sets of data can be accessed via queries which are written in specific interface language. In order to manage this amount of data, database optimization is implemented to maximize the speed and efficiency with data retrieval or reduce database system response time. Query optimization is one of the major functionalities in database management systems. The purpose of the query optimization is to determine the most efficient and effective way to execute a particular query by considering several query plans. In this article, genetic algorithm (GA) strategy is utilized for biomedical database systems to execute the query plan. Genetic algorithms are extensively using to solve constrained and unconstrained optimization problems. Based on three main types of rules of GA such as selection, crossover and mutation, the querying can be optimized for solving database problem.
{"title":"Database Querying Optimization via Genetic Algorithm for Biomedical Research","authors":"Nguyen Thanh Huong, Le Minh Hoang","doi":"10.1145/3575828.3575830","DOIUrl":"https://doi.org/10.1145/3575828.3575830","url":null,"abstract":"Thanks to the skyscraping development of hardware and software technologies, the data solutions have become an urgent trend to deal with vast amount of data, especially in biomedical research, human genome and healthcare systems. The healthcare research has always demanded close association with biomedical data to produce personalized medicine and deliver suitable cure and treatments. Nevertheless, coping with huge amount of information from biomedical data requires bulky solutions. In the light of data science, the solution for this issue can change from a theoretical approach to a data-driven approach. Database stores a huge amount of information and particular sets of data can be accessed via queries which are written in specific interface language. In order to manage this amount of data, database optimization is implemented to maximize the speed and efficiency with data retrieval or reduce database system response time. Query optimization is one of the major functionalities in database management systems. The purpose of the query optimization is to determine the most efficient and effective way to execute a particular query by considering several query plans. In this article, genetic algorithm (GA) strategy is utilized for biomedical database systems to execute the query plan. Genetic algorithms are extensively using to solve constrained and unconstrained optimization problems. Based on three main types of rules of GA such as selection, crossover and mutation, the querying can be optimized for solving database problem.","PeriodicalId":124910,"journal":{"name":"Proceedings of the 2022 7th International Conference on Systems, Control and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127975838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Facing the Internet information transmission of WAN or LAN, it is difficult to ensure the security and stability of data transmission after key encryption by using traditional one-way password encryption and two-way stream password encryption. Therefore, a hybrid encryption algorithm of RSA, DES and BASE64 developed based on python language is proposed, and the encryption and decryption scheme of information transmission between network client and client, client and server is set up, including the encryption and decryption implementation of digital certificate accuracy, server registration, user login and communication, file transmission, password modification and log processing, etc., to improve the encryption and decryption security level of data file transmission and log processing, and to maximize the protection of network instant messaging Security and stability.
{"title":"Implementation Analysis of Encryption and Decryption Algorithm Based on python Language","authors":"Kai Xiao","doi":"10.1145/3575828.3575829","DOIUrl":"https://doi.org/10.1145/3575828.3575829","url":null,"abstract":"Facing the Internet information transmission of WAN or LAN, it is difficult to ensure the security and stability of data transmission after key encryption by using traditional one-way password encryption and two-way stream password encryption. Therefore, a hybrid encryption algorithm of RSA, DES and BASE64 developed based on python language is proposed, and the encryption and decryption scheme of information transmission between network client and client, client and server is set up, including the encryption and decryption implementation of digital certificate accuracy, server registration, user login and communication, file transmission, password modification and log processing, etc., to improve the encryption and decryption security level of data file transmission and log processing, and to maximize the protection of network instant messaging Security and stability.","PeriodicalId":124910,"journal":{"name":"Proceedings of the 2022 7th International Conference on Systems, Control and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132877654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}