Pub Date : 2022-01-01DOI: 10.1109/APCT55107.2022.00013
XC Cao, L. L. Hua, Y. X. Jiao, C. Zhou
This article introduced the information of an offshore horizontal gas well containing one main wellbore and three branch horizontal wellbores, in which formation data such as lithology, pressure and depth of different formation were included. According to these information data, we calculated wellbore structure and designed three kinds of drilling fluid system suitable for the given wellbores and those in the same developing area.
{"title":"Information Processing and Designing of Gas Well Drilling Fluids","authors":"XC Cao, L. L. Hua, Y. X. Jiao, C. Zhou","doi":"10.1109/APCT55107.2022.00013","DOIUrl":"https://doi.org/10.1109/APCT55107.2022.00013","url":null,"abstract":"This article introduced the information of an offshore horizontal gas well containing one main wellbore and three branch horizontal wellbores, in which formation data such as lithology, pressure and depth of different formation were included. According to these information data, we calculated wellbore structure and designed three kinds of drilling fluid system suitable for the given wellbores and those in the same developing area.","PeriodicalId":237645,"journal":{"name":"2022 Asia-Pacific Computer Technologies Conference (APCT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130548154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1109/APCT55107.2022.00016
Xinyu Chen, Yi Lu, Yunying Chen, Wang Zhao
Mixed reality technology is developed from virtual reality technology and augmented reality technology. It has great significance in the application of medical field, teacher-student interaction training and so on. Existing studies at home and abroad have explored the theory and practice of applying mixed reality technology to autism intervention, which can provide reference for future research in this field. To understand the development and current situation of mixed reality technology's application in autism intervention, this article carries on the Co-word Analysis and uses VOS viewer visualization software to analyze the hot spots and trends of relevant research in the nearly 10 years and explore the research trends, providing references and ideas for future research.
{"title":"Visual analysis of research on the application of mixed reality technology in autism intervention","authors":"Xinyu Chen, Yi Lu, Yunying Chen, Wang Zhao","doi":"10.1109/APCT55107.2022.00016","DOIUrl":"https://doi.org/10.1109/APCT55107.2022.00016","url":null,"abstract":"Mixed reality technology is developed from virtual reality technology and augmented reality technology. It has great significance in the application of medical field, teacher-student interaction training and so on. Existing studies at home and abroad have explored the theory and practice of applying mixed reality technology to autism intervention, which can provide reference for future research in this field. To understand the development and current situation of mixed reality technology's application in autism intervention, this article carries on the Co-word Analysis and uses VOS viewer visualization software to analyze the hot spots and trends of relevant research in the nearly 10 years and explore the research trends, providing references and ideas for future research.","PeriodicalId":237645,"journal":{"name":"2022 Asia-Pacific Computer Technologies Conference (APCT)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133744201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1109/APCT55107.2022.00008
Suthashinikisan Krishnan, Zhou Shuo, D. Wong
Change management is an essential and integral part of an organization in this data-driven era. This article analyzes literature reviews on change management methodologies in several domains. It is also pointed out the application of change management and data governance under big data has great theoretical and practical significance. As an industry with relatively deep application in financial technology, banking has accumulated data for a long time and large volume. A large number of external information is introduced in business management. This includes research on promising practices process and appropriate tools in change management to build a closed-loop control system of banking operations.
{"title":"Change Management and Data Governance","authors":"Suthashinikisan Krishnan, Zhou Shuo, D. Wong","doi":"10.1109/APCT55107.2022.00008","DOIUrl":"https://doi.org/10.1109/APCT55107.2022.00008","url":null,"abstract":"Change management is an essential and integral part of an organization in this data-driven era. This article analyzes literature reviews on change management methodologies in several domains. It is also pointed out the application of change management and data governance under big data has great theoretical and practical significance. As an industry with relatively deep application in financial technology, banking has accumulated data for a long time and large volume. A large number of external information is introduced in business management. This includes research on promising practices process and appropriate tools in change management to build a closed-loop control system of banking operations.","PeriodicalId":237645,"journal":{"name":"2022 Asia-Pacific Computer Technologies Conference (APCT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124090174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1109/APCT55107.2022.00011
Jing Cheng, Xiaocheng Gu
With the wide application of new technologies such as big data and artificial intelligence, more and more traditional industries tend to be intelligent, and the traditional enterprise financial management work is also moving toward the direction of intelligence. MicrosoftPowerBI is a data analysis and visualization tool launched by Microsoft, which can extract data from various data sources, organize and analyze the data, and then generate beautiful charts. This paper introduces the use of MicrosoftPowerBI, a business intelligence analysis tool, to build a real-time analysis model of accounts receivable, which realizes the real-time fetching, analysis and presentation of enterprise accounts receivable and helps to improve the management ability of accounts receivable of related enterprises.
{"title":"Design and Application of Real-Time Analysis Model for Accounts Receivable Based on PowerBI","authors":"Jing Cheng, Xiaocheng Gu","doi":"10.1109/APCT55107.2022.00011","DOIUrl":"https://doi.org/10.1109/APCT55107.2022.00011","url":null,"abstract":"With the wide application of new technologies such as big data and artificial intelligence, more and more traditional industries tend to be intelligent, and the traditional enterprise financial management work is also moving toward the direction of intelligence. MicrosoftPowerBI is a data analysis and visualization tool launched by Microsoft, which can extract data from various data sources, organize and analyze the data, and then generate beautiful charts. This paper introduces the use of MicrosoftPowerBI, a business intelligence analysis tool, to build a real-time analysis model of accounts receivable, which realizes the real-time fetching, analysis and presentation of enterprise accounts receivable and helps to improve the management ability of accounts receivable of related enterprises.","PeriodicalId":237645,"journal":{"name":"2022 Asia-Pacific Computer Technologies Conference (APCT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127966861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1109/APCT55107.2022.00022
Weida Qin, Yinhu Wei, Ricai Luo
Matrix eigenvalues have important applications in rice yield, collaborative filtering recommendation algorithm integrating user interests and score differences, so solving matrix eigenvalue algorithm is one of the research hotspots in the algorithm field. Dichotomy is a very important algorithm for solving matrix eigenvalues. Based on the study of solving matrix eigenvalue algorithm by experts and scholars $mathbf{Y}$ class matrix is studied. The matrix has seven pairs of adjacent two paramagnetic submatrixes, and the eigenvalues are not strictly interleaved, that is, the matrix does not meet the key properties of using dichotomy to solve the eigenvalues. By studying and analyzing the principle of sign change of characteristic polynomial sequence of sequential principal submatrix of $mathbf{Y}$ class matrix, the feasible conditions and feasibility of dichotomy algorithm for solving the eigenvalues of Y-type matrix are studied. The numerical experiment uses Python language to design the program to verify the feasibility of the algorithm.
{"title":"Program Design and Implementation of Y Class Matrix Eigenvalue Based on Python Language","authors":"Weida Qin, Yinhu Wei, Ricai Luo","doi":"10.1109/APCT55107.2022.00022","DOIUrl":"https://doi.org/10.1109/APCT55107.2022.00022","url":null,"abstract":"Matrix eigenvalues have important applications in rice yield, collaborative filtering recommendation algorithm integrating user interests and score differences, so solving matrix eigenvalue algorithm is one of the research hotspots in the algorithm field. Dichotomy is a very important algorithm for solving matrix eigenvalues. Based on the study of solving matrix eigenvalue algorithm by experts and scholars $mathbf{Y}$ class matrix is studied. The matrix has seven pairs of adjacent two paramagnetic submatrixes, and the eigenvalues are not strictly interleaved, that is, the matrix does not meet the key properties of using dichotomy to solve the eigenvalues. By studying and analyzing the principle of sign change of characteristic polynomial sequence of sequential principal submatrix of $mathbf{Y}$ class matrix, the feasible conditions and feasibility of dichotomy algorithm for solving the eigenvalues of Y-type matrix are studied. The numerical experiment uses Python language to design the program to verify the feasibility of the algorithm.","PeriodicalId":237645,"journal":{"name":"2022 Asia-Pacific Computer Technologies Conference (APCT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125104878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1109/APCT55107.2022.00012
K. Deniswara, Steven Gunawan, Jonathan Theodore Kesuma, Michael Angelus
The purpose of this research is to understand the auditor's perception of cloud computing utilization in assisting audit procedures based on UTAUT Model with variables Performance expectancy, Effort expectancy, Social influence, Facilitating conditions, and Perceived Trust affect Behavioral intention. This research was conducted by quantitative method by disseminating questionnaires online on 72 samples of external auditor respondents working at the Public Accounting Firm in Jakarta. The analysis method used is PLS-SEM. This study also used moderation variables namely Gender, Age, and Experience. The results found that Performance expectancy, Facilitating conditions, and Perceived Trust influence behavioral intentions. While Effort expectancy and Social influence have no effect.
{"title":"Analysis of External Auditor's Perception on the Utilization of Cloud Computing in the Financial Statement Audit Process","authors":"K. Deniswara, Steven Gunawan, Jonathan Theodore Kesuma, Michael Angelus","doi":"10.1109/APCT55107.2022.00012","DOIUrl":"https://doi.org/10.1109/APCT55107.2022.00012","url":null,"abstract":"The purpose of this research is to understand the auditor's perception of cloud computing utilization in assisting audit procedures based on UTAUT Model with variables Performance expectancy, Effort expectancy, Social influence, Facilitating conditions, and Perceived Trust affect Behavioral intention. This research was conducted by quantitative method by disseminating questionnaires online on 72 samples of external auditor respondents working at the Public Accounting Firm in Jakarta. The analysis method used is PLS-SEM. This study also used moderation variables namely Gender, Age, and Experience. The results found that Performance expectancy, Facilitating conditions, and Perceived Trust influence behavioral intentions. While Effort expectancy and Social influence have no effect.","PeriodicalId":237645,"journal":{"name":"2022 Asia-Pacific Computer Technologies Conference (APCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129579730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1109/APCT55107.2022.00018
Wei Wang, Lei Sun, Guoyi Zhang, Dan-Ke Hong, Hailong Zhu
Network slice technology can provide end-to-end virtual private networks which are logically isolated for differentiated services on the basis of the same set of network infrastructure equipment. The differentiation of business requirements, the dynamic business requirements, and the complexity of network infrastructure have brought great challenges to the on-demand customization of network slicing, and the release, redistribution of network resources. It is proposed to use the data of each service as a data set to train the sequence prediction model and the Service Level Agreement(SLA) parameter-Virtual Network Function(VNF) mapping model by distributed Artificial Intelligence(AI) to predict the traffic change of each subnet slice and the management of the slice, and then manage each subnet slice in a differentiated and intelligent pattern.
{"title":"Research on Intelligent Management Scheme of Network Slicing","authors":"Wei Wang, Lei Sun, Guoyi Zhang, Dan-Ke Hong, Hailong Zhu","doi":"10.1109/APCT55107.2022.00018","DOIUrl":"https://doi.org/10.1109/APCT55107.2022.00018","url":null,"abstract":"Network slice technology can provide end-to-end virtual private networks which are logically isolated for differentiated services on the basis of the same set of network infrastructure equipment. The differentiation of business requirements, the dynamic business requirements, and the complexity of network infrastructure have brought great challenges to the on-demand customization of network slicing, and the release, redistribution of network resources. It is proposed to use the data of each service as a data set to train the sequence prediction model and the Service Level Agreement(SLA) parameter-Virtual Network Function(VNF) mapping model by distributed Artificial Intelligence(AI) to predict the traffic change of each subnet slice and the management of the slice, and then manage each subnet slice in a differentiated and intelligent pattern.","PeriodicalId":237645,"journal":{"name":"2022 Asia-Pacific Computer Technologies Conference (APCT)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129885515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1109/APCT55107.2022.00019
Yi Lu, Yunyi Chen, Xinyu Chen, Wang Zhao
[purpose/meaning] with the rapid development of artificial intelligence technology, in order to understand the artificial intelligence technology application in the field of autism spectrum disorder intervention, as well as the research focus and research tendency, in this paper, the nearly in accordance with the relevant article retrieval type retrieval of literature analysis, the abstract and key words to analysis of artificial intelligence technology in intervention in autism research direction. [Method/process] Using WOS database as data source, relevant literatures were retrieved by using correlation retrieval method, and the abstract and keywords of literatures were analyzed. [Conclusion] Children are the main group concerned by this application, while simulation robot and virtual reality are the main technologies and applications of artificial intelligence.
{"title":"Application prospect of artificial intelligence technology in autism spectrum disorder intervention","authors":"Yi Lu, Yunyi Chen, Xinyu Chen, Wang Zhao","doi":"10.1109/APCT55107.2022.00019","DOIUrl":"https://doi.org/10.1109/APCT55107.2022.00019","url":null,"abstract":"[purpose/meaning] with the rapid development of artificial intelligence technology, in order to understand the artificial intelligence technology application in the field of autism spectrum disorder intervention, as well as the research focus and research tendency, in this paper, the nearly in accordance with the relevant article retrieval type retrieval of literature analysis, the abstract and key words to analysis of artificial intelligence technology in intervention in autism research direction. [Method/process] Using WOS database as data source, relevant literatures were retrieved by using correlation retrieval method, and the abstract and keywords of literatures were analyzed. [Conclusion] Children are the main group concerned by this application, while simulation robot and virtual reality are the main technologies and applications of artificial intelligence.","PeriodicalId":237645,"journal":{"name":"2022 Asia-Pacific Computer Technologies Conference (APCT)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127509199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1109/APCT55107.2022.00021
Yong Xu, Xiaoyu Li, Heng Wang, Xizhi Lv, Yu Peng
The Internet is full of rumor posts, the spread of rumors will have a negative impact on social harmony and stability, affecting the healthy development of network information ecology. The uncertainty, timeliness, subjectivity and other characteristics of rumors make them different from general false network information. Social network rumor detection is a hot issue in the research field of social network and information transmission, which helps to further improve the efficiency and effect of rumor governance and purify the network environment. The social network rumor was defined as a social network transmission and unproven, or has been officially confirmed as false, and in the social network of information, the traditional rumors detection based on characteristics of the research focuses on text messages, publish static flat characteristics of users, the respect such as transmission, ignoring the message transmission evolution reaction of structure and transmission groups. Scholars at home and abroad have carried out many relevant studies on how to improve the efficiency of rumor detection. 138 Chinese literatures and 331 English literatures were retrieved from CNKI and Web of Science databases (retrieval date: August 2, 2021), and irrelevant literatures and news reports were removed, totaling 127 Chinese literatures and 238 English literatures. CiteSpace software was used for bibliometric analysis. By analyzing the publication time of relevant literatures, it is found that rumor detection research ushered in an outbreak period after 2019, and the number of literatures at home and abroad increased significantly. By analyzing the authors and research institutions, it is found that the maximum number of articles published by a single author at home and abroad is no more than three. The overall cooperative relationship between research institutions is not very close, and there are many independent research institutions. Through keyword analysis and existing literature review, it is found that the technologies and methods of rumor detection in recent years mainly involve “deep learning”, “attention mechanism”, “semi-supervised learning” and other technologies. The basic process of rumor detection is to combine the selected content features and social context features effectively, and then use advanced technologies such as Natural Language Processing (NLP), machine learning and deep learning to predict whether the information to be tested is false. With the deepening of the research in this field, the detection method of hybrid model is more and more popular. Rumor detection applications mainly focus on “online rumor”, “social media”, “public opinion monitoring” and other issues. The main research hotspots can be summarized as rumor detection algorithms, characteristics and propagation models, as well as research on different kinds of rumor identification and related tasks. The current research trends are the recognition of rumormonger, feature ex
网络上充斥着谣言帖子,谣言的传播会对社会和谐稳定产生负面影响,影响网络信息生态的健康发展。谣言的不确定性、时效性、主观性等特点使其区别于一般的虚假网络信息。社交网络谣言检测是社交网络和信息传播研究领域的热点问题,有助于进一步提高谣言治理的效率和效果,净化网络环境。社交网络谣言被定义为社交网络传播而未经证实,或已被官方证实为虚假的谣言,而在社交网络的信息中,传统的谣言检测基于特征的研究侧重于文本信息、发布静态扁平的用户特征、传播等方面,忽略了信息传播结构和传播群体的进化反应。国内外学者对如何提高谣言检测效率进行了很多相关的研究。从CNKI和Web of Science数据库中检索到138篇中文文献和331篇英文文献(检索日期:2021年8月2日),剔除不相关文献和新闻报道,共127篇中文文献和238篇英文文献。使用CiteSpace软件进行文献计量学分析。通过分析相关文献的发表时间发现,谣言检测研究在2019年之后迎来爆发期,国内外文献数量显著增加。通过对作者和研究机构的分析,发现单个作者在国内外发表的文章最多不超过3篇。研究机构之间的整体合作关系不是很密切,有很多独立的研究机构。通过关键词分析和现有文献综述,发现近年来谣言检测的技术和方法主要涉及“深度学习”、“注意机制”、“半监督学习”等技术。谣言检测的基本过程是将选定的内容特征与社会语境特征有效结合,然后利用自然语言处理(NLP)、机器学习、深度学习等先进技术来预测待测信息是否为假。随着该领域研究的不断深入,混合模型的检测方法越来越受到人们的欢迎。谣言检测应用主要针对“网络谣言”、“社交媒体”、“舆情监测”等问题。主要的研究热点可以概括为谣言检测算法、特征和传播模型,以及对不同类型谣言识别和相关任务的研究。目前的研究方向是谣言制造者识别、谣言语料库特征提取和多模态谣言识别。
{"title":"A Survey of State of the Art on Rumor Detection in Social Network","authors":"Yong Xu, Xiaoyu Li, Heng Wang, Xizhi Lv, Yu Peng","doi":"10.1109/APCT55107.2022.00021","DOIUrl":"https://doi.org/10.1109/APCT55107.2022.00021","url":null,"abstract":"The Internet is full of rumor posts, the spread of rumors will have a negative impact on social harmony and stability, affecting the healthy development of network information ecology. The uncertainty, timeliness, subjectivity and other characteristics of rumors make them different from general false network information. Social network rumor detection is a hot issue in the research field of social network and information transmission, which helps to further improve the efficiency and effect of rumor governance and purify the network environment. The social network rumor was defined as a social network transmission and unproven, or has been officially confirmed as false, and in the social network of information, the traditional rumors detection based on characteristics of the research focuses on text messages, publish static flat characteristics of users, the respect such as transmission, ignoring the message transmission evolution reaction of structure and transmission groups. Scholars at home and abroad have carried out many relevant studies on how to improve the efficiency of rumor detection. 138 Chinese literatures and 331 English literatures were retrieved from CNKI and Web of Science databases (retrieval date: August 2, 2021), and irrelevant literatures and news reports were removed, totaling 127 Chinese literatures and 238 English literatures. CiteSpace software was used for bibliometric analysis. By analyzing the publication time of relevant literatures, it is found that rumor detection research ushered in an outbreak period after 2019, and the number of literatures at home and abroad increased significantly. By analyzing the authors and research institutions, it is found that the maximum number of articles published by a single author at home and abroad is no more than three. The overall cooperative relationship between research institutions is not very close, and there are many independent research institutions. Through keyword analysis and existing literature review, it is found that the technologies and methods of rumor detection in recent years mainly involve “deep learning”, “attention mechanism”, “semi-supervised learning” and other technologies. The basic process of rumor detection is to combine the selected content features and social context features effectively, and then use advanced technologies such as Natural Language Processing (NLP), machine learning and deep learning to predict whether the information to be tested is false. With the deepening of the research in this field, the detection method of hybrid model is more and more popular. Rumor detection applications mainly focus on “online rumor”, “social media”, “public opinion monitoring” and other issues. The main research hotspots can be summarized as rumor detection algorithms, characteristics and propagation models, as well as research on different kinds of rumor identification and related tasks. The current research trends are the recognition of rumormonger, feature ex","PeriodicalId":237645,"journal":{"name":"2022 Asia-Pacific Computer Technologies Conference (APCT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133936886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1109/APCT55107.2022.00010
C. Chen, J. Liu, G. Huang, Y. Li
Analysis of parameter uncertainty in distributed watershed model is a worldwide challenge. In this study, The Differential Evolution Adaptive Metropolis (DREAM) technique is developed to analyse the uncertainty of Soil and Water Assessment Tool (SWAT) model parameters. SWAT is used for providing the basic hydrologic simulation, DREAM algorithm is employed to approximate the posterior distributions of model parameters with Bayesian inference. DREAM is then used to capture the uncertainty and implications of parameters in the Naryn River Basin (in Central Asia). The posterior distribution of parameters is obtained. Results shows that: (i) the posterior sampling results of DREAM algorithm are satisfactory; (ii) concentrated precipitation during rainy season generates more runoff; (iii) more precipitation exists in the form of snowfall.
{"title":"Characterization of Parameter Uncertainty in SWAT Model using MCMC Bayesian Framework: The Case of Naryn River Basin","authors":"C. Chen, J. Liu, G. Huang, Y. Li","doi":"10.1109/APCT55107.2022.00010","DOIUrl":"https://doi.org/10.1109/APCT55107.2022.00010","url":null,"abstract":"Analysis of parameter uncertainty in distributed watershed model is a worldwide challenge. In this study, The Differential Evolution Adaptive Metropolis (DREAM) technique is developed to analyse the uncertainty of Soil and Water Assessment Tool (SWAT) model parameters. SWAT is used for providing the basic hydrologic simulation, DREAM algorithm is employed to approximate the posterior distributions of model parameters with Bayesian inference. DREAM is then used to capture the uncertainty and implications of parameters in the Naryn River Basin (in Central Asia). The posterior distribution of parameters is obtained. Results shows that: (i) the posterior sampling results of DREAM algorithm are satisfactory; (ii) concentrated precipitation during rainy season generates more runoff; (iii) more precipitation exists in the form of snowfall.","PeriodicalId":237645,"journal":{"name":"2022 Asia-Pacific Computer Technologies Conference (APCT)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116289364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}