Pub Date : 2021-04-01DOI: 10.1109/CBFD52659.2021.00061
Zhang Hongqiang, Zeng Bin, Kang Jian
With the development of science and technology, the performance of autonomous underwater vehicles (AUV) has been continuously improved, and its application has become increasingly widespread, playing an important role in the military and civilian fields. AUV can perform underwater environmental reconnaissance, resource exploration, target search, and intelligence collection. In order to efficiently complete reconnaissance and search tasks, AUV resources need to be allocated scientifically and reasonably. Due to the complex underwater environment, the robustness in the search process should be considered for many influencing factors. Considering Using multiple AUVs to search multiple target areas, In this paper, an improved genetic algorithm is used for task allocation, and then the simulated annealing algorithm is used to plan the shortest path with reference to the multiple traveling salesman problem. The two algorithms are improved to improve the convergence speed, and finally use Matlab to simulate Verify the effectiveness of the improved algorithm.
{"title":"Research on AUV Allocation Method Based on Optimization Algorithm","authors":"Zhang Hongqiang, Zeng Bin, Kang Jian","doi":"10.1109/CBFD52659.2021.00061","DOIUrl":"https://doi.org/10.1109/CBFD52659.2021.00061","url":null,"abstract":"With the development of science and technology, the performance of autonomous underwater vehicles (AUV) has been continuously improved, and its application has become increasingly widespread, playing an important role in the military and civilian fields. AUV can perform underwater environmental reconnaissance, resource exploration, target search, and intelligence collection. In order to efficiently complete reconnaissance and search tasks, AUV resources need to be allocated scientifically and reasonably. Due to the complex underwater environment, the robustness in the search process should be considered for many influencing factors. Considering Using multiple AUVs to search multiple target areas, In this paper, an improved genetic algorithm is used for task allocation, and then the simulated annealing algorithm is used to plan the shortest path with reference to the multiple traveling salesman problem. The two algorithms are improved to improve the convergence speed, and finally use Matlab to simulate Verify the effectiveness of the improved algorithm.","PeriodicalId":230625,"journal":{"name":"2021 International Conference on Computer, Blockchain and Financial Development (CBFD)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115152832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-04-01DOI: 10.1109/CBFD52659.2021.00113
Mei Jin, Zhanhai Wang
Money laundering (ML) provides criminals with a way to legalize the proceeds of crime, which brings great harm to the economic development and financial stability of all countries in the world. As the most authoritative organization in the international anti-money laundering (AML) cooperation system in the world, FATF is responsible for formulating AML related standards and conducting mutual evaluations to examine the compliance and effectiveness of member countries’ AML work. However, FATF has not conduct an overall assessment and systematic comparison of the ML risks faced by countries. The Basel Institute for Governance provides standards for quantifying ML risks in various countries, and uses the Basel AML Index to measure ML risks in different countries. This paper demonstrates the relationship between FATF evaluation data and Basel AML Index, respectively confirms the negative correlation between the effectiveness of AML system, technical compliance and the ML risk faced by various countries. On this basis, this study puts forward suggestions for the ML risk faced by the international community.
{"title":"Research on the Relationships Between FATF Assessment Effectiveness, Compliance and Money Laundering Risk","authors":"Mei Jin, Zhanhai Wang","doi":"10.1109/CBFD52659.2021.00113","DOIUrl":"https://doi.org/10.1109/CBFD52659.2021.00113","url":null,"abstract":"Money laundering (ML) provides criminals with a way to legalize the proceeds of crime, which brings great harm to the economic development and financial stability of all countries in the world. As the most authoritative organization in the international anti-money laundering (AML) cooperation system in the world, FATF is responsible for formulating AML related standards and conducting mutual evaluations to examine the compliance and effectiveness of member countries’ AML work. However, FATF has not conduct an overall assessment and systematic comparison of the ML risks faced by countries. The Basel Institute for Governance provides standards for quantifying ML risks in various countries, and uses the Basel AML Index to measure ML risks in different countries. This paper demonstrates the relationship between FATF evaluation data and Basel AML Index, respectively confirms the negative correlation between the effectiveness of AML system, technical compliance and the ML risk faced by various countries. On this basis, this study puts forward suggestions for the ML risk faced by the international community.","PeriodicalId":230625,"journal":{"name":"2021 International Conference on Computer, Blockchain and Financial Development (CBFD)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127085644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the increasing rise and rapid development of blockchain technology, the advantages of decentralized, distributed consensus and secure, tamper-evident and reliable database of blockchain technology will become increasingly prominent. Facing the radio monitoring system that generates massive data in the field of radio monitoring, by using blockchain timestamp, distributed consensus and data encryption, it will effectively solve the problem of centralized system of radio monitoring, reduce the construction cost of radio monitoring system, improve monitoring efficiency and ensure data security.
{"title":"Analysis of Blockchain Technology and its Application in the Field of Radio Monitoring","authors":"Xiaoying Ma, Meiying Wei, Xiaoli Li, Xiaofei Zhang","doi":"10.1109/CBFD52659.2021.00097","DOIUrl":"https://doi.org/10.1109/CBFD52659.2021.00097","url":null,"abstract":"With the increasing rise and rapid development of blockchain technology, the advantages of decentralized, distributed consensus and secure, tamper-evident and reliable database of blockchain technology will become increasingly prominent. Facing the radio monitoring system that generates massive data in the field of radio monitoring, by using blockchain timestamp, distributed consensus and data encryption, it will effectively solve the problem of centralized system of radio monitoring, reduce the construction cost of radio monitoring system, improve monitoring efficiency and ensure data security.","PeriodicalId":230625,"journal":{"name":"2021 International Conference on Computer, Blockchain and Financial Development (CBFD)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123757294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-04-01DOI: 10.1109/CBFD52659.2021.00018
Hongye Wang, Changzhen Hao, B. Li
The water environment is currently facing many problems, and video surveillance technology can prevent many behaviors that damage the water environment, such as overfishing. This paper proposes an improved water area illegal intrusion detection algorithm based on yolov3 algorithm. By introducing a network structure combining residual network and dense network to replace the original residual network of yolo algorithm, it solves the problem of yolov3 algorithm for large targets identify problems with poor results. The algorithm is also verified on the public data Pascal Voc and Data set of illegal water invasion behavior. Compared with the similar one-stage target detection algorithm SSD512 and the original YOLOv3, The map value on the Pascal Voc data set has increased by 4.2% and 0.9% . The map value on Data set of illegal water invasion behavior has increased by 6.4% and 3%, which is a good improvement.
{"title":"A water area illegal intrusion detection algorithm based on yolov3 algorithm modification with higher detection accuracy","authors":"Hongye Wang, Changzhen Hao, B. Li","doi":"10.1109/CBFD52659.2021.00018","DOIUrl":"https://doi.org/10.1109/CBFD52659.2021.00018","url":null,"abstract":"The water environment is currently facing many problems, and video surveillance technology can prevent many behaviors that damage the water environment, such as overfishing. This paper proposes an improved water area illegal intrusion detection algorithm based on yolov3 algorithm. By introducing a network structure combining residual network and dense network to replace the original residual network of yolo algorithm, it solves the problem of yolov3 algorithm for large targets identify problems with poor results. The algorithm is also verified on the public data Pascal Voc and Data set of illegal water invasion behavior. Compared with the similar one-stage target detection algorithm SSD512 and the original YOLOv3, The map value on the Pascal Voc data set has increased by 4.2% and 0.9% . The map value on Data set of illegal water invasion behavior has increased by 6.4% and 3%, which is a good improvement.","PeriodicalId":230625,"journal":{"name":"2021 International Conference on Computer, Blockchain and Financial Development (CBFD)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122313986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-04-01DOI: 10.1109/CBFD52659.2021.00025
Xiang-lin Pan, Xingzhi Lin
The true validity of the results of the evaluation of the quality of teaching depends on scientifically feasible, reasonable and reliable evaluation methods. In order to improve the accuracy and reliability of interdisciplinary teaching evaluation, we conduct teaching evaluation based on the understanding of "interdisciplinary". A combined nuclear function is constructed on the principle of machine learning algorithm, and a parametric optimization method is established to improve the algorithm. A new model is constructed for interdisciplinary teaching quality evaluation on the new machine learning algorithm RVM (Relevance Vector Machine), and it can be analyzed from the application of interdisciplinary teaching evaluation system. The experimental results show that the machine learning-based interdisciplinary teaching evaluation RVM model has high accuracy and good reliability.
{"title":"Research on Interdisciplinary Teaching Evaluation Model Based on Machine Learning","authors":"Xiang-lin Pan, Xingzhi Lin","doi":"10.1109/CBFD52659.2021.00025","DOIUrl":"https://doi.org/10.1109/CBFD52659.2021.00025","url":null,"abstract":"The true validity of the results of the evaluation of the quality of teaching depends on scientifically feasible, reasonable and reliable evaluation methods. In order to improve the accuracy and reliability of interdisciplinary teaching evaluation, we conduct teaching evaluation based on the understanding of \"interdisciplinary\". A combined nuclear function is constructed on the principle of machine learning algorithm, and a parametric optimization method is established to improve the algorithm. A new model is constructed for interdisciplinary teaching quality evaluation on the new machine learning algorithm RVM (Relevance Vector Machine), and it can be analyzed from the application of interdisciplinary teaching evaluation system. The experimental results show that the machine learning-based interdisciplinary teaching evaluation RVM model has high accuracy and good reliability.","PeriodicalId":230625,"journal":{"name":"2021 International Conference on Computer, Blockchain and Financial Development (CBFD)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130417580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-04-01DOI: 10.1109/CBFD52659.2021.00099
Zongyun Xie, Rongmin Li
With the rapid development of computer technology, real estate has also entered the information age. Real estate uses information technology to search and store data and information. This will not only help companies grasp market opportunities, but also determine precise customer positioning. By formulating a marketing strategy, we can combine traditional advantages with advanced Internet technology, which can increase the sales rate of real estate and create a competitive advantage for the company.
{"title":"Research on the Basic Logic and System of Real Estate Digital Marketing Professional Group Based on Information Technology","authors":"Zongyun Xie, Rongmin Li","doi":"10.1109/CBFD52659.2021.00099","DOIUrl":"https://doi.org/10.1109/CBFD52659.2021.00099","url":null,"abstract":"With the rapid development of computer technology, real estate has also entered the information age. Real estate uses information technology to search and store data and information. This will not only help companies grasp market opportunities, but also determine precise customer positioning. By formulating a marketing strategy, we can combine traditional advantages with advanced Internet technology, which can increase the sales rate of real estate and create a competitive advantage for the company.","PeriodicalId":230625,"journal":{"name":"2021 International Conference on Computer, Blockchain and Financial Development (CBFD)","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121537653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-04-01DOI: 10.1109/CBFD52659.2021.00039
Wei Wang, Guiying Wei, Xiaonan Gao, Huixia He
Facing the problem of match between the label and the text content of the current inquiry letter, this paper proposes a content-aware topic recognition of inquiry letter model. Firstly, the text data of the inquiry letter of Shanghai Stock Exchange are collected, and the text content features are extracted by using word vectorization (TF-IDF). The t-SNE dimension reduction algorithm is used to reduce the text vector data to 2-dimensional space, and then the K-means algorithm is used to cluster the inquiry feature data, and the inquiry letter are labeled according to the clustering results. Finally, the deep forest classification algorithm is used to train and classify the inquiry letter data. The application results show that the recall, precision and F-measure of the content-aware topic recognition based on the inquiry letter contents are improved compared with the traditional methods, which indicates that the proposed method based on the inquiry letter content is effective.
{"title":"Content-aware Topic Recognition of Inquiry Letter","authors":"Wei Wang, Guiying Wei, Xiaonan Gao, Huixia He","doi":"10.1109/CBFD52659.2021.00039","DOIUrl":"https://doi.org/10.1109/CBFD52659.2021.00039","url":null,"abstract":"Facing the problem of match between the label and the text content of the current inquiry letter, this paper proposes a content-aware topic recognition of inquiry letter model. Firstly, the text data of the inquiry letter of Shanghai Stock Exchange are collected, and the text content features are extracted by using word vectorization (TF-IDF). The t-SNE dimension reduction algorithm is used to reduce the text vector data to 2-dimensional space, and then the K-means algorithm is used to cluster the inquiry feature data, and the inquiry letter are labeled according to the clustering results. Finally, the deep forest classification algorithm is used to train and classify the inquiry letter data. The application results show that the recall, precision and F-measure of the content-aware topic recognition based on the inquiry letter contents are improved compared with the traditional methods, which indicates that the proposed method based on the inquiry letter content is effective.","PeriodicalId":230625,"journal":{"name":"2021 International Conference on Computer, Blockchain and Financial Development (CBFD)","volume":"362 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115904444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-04-01DOI: 10.1109/CBFD52659.2021.00096
Ruiwei Wang, Haocheng Zhang
This paper mainly studies the traffic supply chain management mode based on economic management virtual system. After the design and implementation of the system, the system will be tested in the intranet of IT department. According to the demand of green level evaluation of green supply chain, this paper evaluates it by grade. The construction of judgment matrix is to determine the relative importance of the two elements and give a certain value by comparing the elements in each level element set. In this paper, according to the survey results, the arithmetic average method is used for operation processing, and a secondary index is established after decomposition. The experimental data show that the weights of service quality, market competition environment, platform characteristics and supporting environment are 0.4335, 0.3049, 0.1615 and 0.1001, respectively. The results show that the traffic supply chain management mode can improve the management level and customer satisfaction of enterprises, reduce the operation cost and improve the work efficiency.
{"title":"Transportation Supply Chain Management Mode Based on Economic Management Virtual System","authors":"Ruiwei Wang, Haocheng Zhang","doi":"10.1109/CBFD52659.2021.00096","DOIUrl":"https://doi.org/10.1109/CBFD52659.2021.00096","url":null,"abstract":"This paper mainly studies the traffic supply chain management mode based on economic management virtual system. After the design and implementation of the system, the system will be tested in the intranet of IT department. According to the demand of green level evaluation of green supply chain, this paper evaluates it by grade. The construction of judgment matrix is to determine the relative importance of the two elements and give a certain value by comparing the elements in each level element set. In this paper, according to the survey results, the arithmetic average method is used for operation processing, and a secondary index is established after decomposition. The experimental data show that the weights of service quality, market competition environment, platform characteristics and supporting environment are 0.4335, 0.3049, 0.1615 and 0.1001, respectively. The results show that the traffic supply chain management mode can improve the management level and customer satisfaction of enterprises, reduce the operation cost and improve the work efficiency.","PeriodicalId":230625,"journal":{"name":"2021 International Conference on Computer, Blockchain and Financial Development (CBFD)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115939369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-04-01DOI: 10.1109/CBFD52659.2021.00063
A. Junejo, Xiang Li
Hundreds of millions of people around the world suffer from viral infections every year. However, some of them have neither vaccine nor effective treatment during and after viral infection. Such as pneumonia, severe acute respiratory syndrome type 2 (SARS -2), HIV infection and Hepatitis-C virus. These viral diseases also directly and indirectly cause cardiovascular disease (CVD). Recently, the Deep Neural Network (DNN)-assisted molecular interaction (information) (MI) transceiver (transmitter Tx, and receiver Rx) design was brought to the fore to break the issues of traditional molecular information (MI) inside and outside human body. In this paper, we use DNN based approach to design and implement a new transceiver (Tx/Rx). We investigate DNN-assisted MI- Tx/Rx , multilayer perception DNN auto-encoder (MLP-AE), and convolutional neural network auto-encoder (CNN-AE), respectively. We apply an MLP-AE and CNN-AE to simultaneously accomplish the task of modulation, demodulation, and equalization as a point-to-point scheme.
{"title":"A systematic Analysis: Molecular Information in viral Disease using Deep Learning Auto Encoder","authors":"A. Junejo, Xiang Li","doi":"10.1109/CBFD52659.2021.00063","DOIUrl":"https://doi.org/10.1109/CBFD52659.2021.00063","url":null,"abstract":"Hundreds of millions of people around the world suffer from viral infections every year. However, some of them have neither vaccine nor effective treatment during and after viral infection. Such as pneumonia, severe acute respiratory syndrome type 2 (SARS -2), HIV infection and Hepatitis-C virus. These viral diseases also directly and indirectly cause cardiovascular disease (CVD). Recently, the Deep Neural Network (DNN)-assisted molecular interaction (information) (MI) transceiver (transmitter Tx, and receiver Rx) design was brought to the fore to break the issues of traditional molecular information (MI) inside and outside human body. In this paper, we use DNN based approach to design and implement a new transceiver (Tx/Rx). We investigate DNN-assisted MI- Tx/Rx , multilayer perception DNN auto-encoder (MLP-AE), and convolutional neural network auto-encoder (CNN-AE), respectively. We apply an MLP-AE and CNN-AE to simultaneously accomplish the task of modulation, demodulation, and equalization as a point-to-point scheme.","PeriodicalId":230625,"journal":{"name":"2021 International Conference on Computer, Blockchain and Financial Development (CBFD)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114322172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-04-01DOI: 10.1109/CBFD52659.2021.00068
Yu Miao
Big data technology is one of the important technologies brought by the development of Internet. Block chain technology is also Internet database technology, which asset data in a decentralized way which make data more secure, and realize the new credit in the data age. Therefore, the emergence of block chain makes it possible for the higher level application of big data, establishes a powerful and reliable database, and solves the problems of security and privacy disclosure in simple big data applications. As a result, the application of big data technology in block chain computer has been carried forward and developed, and has shown its advantages in many industries.
{"title":"Application of Big Data Technology in Block chain Computing","authors":"Yu Miao","doi":"10.1109/CBFD52659.2021.00068","DOIUrl":"https://doi.org/10.1109/CBFD52659.2021.00068","url":null,"abstract":"Big data technology is one of the important technologies brought by the development of Internet. Block chain technology is also Internet database technology, which asset data in a decentralized way which make data more secure, and realize the new credit in the data age. Therefore, the emergence of block chain makes it possible for the higher level application of big data, establishes a powerful and reliable database, and solves the problems of security and privacy disclosure in simple big data applications. As a result, the application of big data technology in block chain computer has been carried forward and developed, and has shown its advantages in many industries.","PeriodicalId":230625,"journal":{"name":"2021 International Conference on Computer, Blockchain and Financial Development (CBFD)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123654951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}