首页 > 最新文献

2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)最新文献

英文 中文
Research on the Applications of Data Mining in the Analysis of Vehicle Insurance Industry 数据挖掘在车险行业分析中的应用研究
J. Xiahou, Mengfei Xiao, Xiaojing He, Xu Cui
With the improvement of information system of the insurance industry, the insurance company has accumulated a large number of vehicle insurance data. How to use these vast amounts of data resources more efficiently has become an urgent problem for the insurance industry to be solved, and data mining technology can solve the above problems. In this paper, decision tree algorithm is used for auto insurance business data mining and analysis, build a customer risk analysis model, which effectively reduces the risk of underwriting insurance companies.
随着保险业信息系统的完善,保险公司积累了大量的车险数据。如何更高效地利用这些海量的数据资源,成为保险业亟待解决的问题,而数据挖掘技术可以解决上述问题。本文采用决策树算法对车险业务数据进行挖掘和分析,构建客户风险分析模型,有效降低保险公司承保风险。
{"title":"Research on the Applications of Data Mining in the Analysis of Vehicle Insurance Industry","authors":"J. Xiahou, Mengfei Xiao, Xiaojing He, Xu Cui","doi":"10.1109/IMCEC51613.2021.9482172","DOIUrl":"https://doi.org/10.1109/IMCEC51613.2021.9482172","url":null,"abstract":"With the improvement of information system of the insurance industry, the insurance company has accumulated a large number of vehicle insurance data. How to use these vast amounts of data resources more efficiently has become an urgent problem for the insurance industry to be solved, and data mining technology can solve the above problems. In this paper, decision tree algorithm is used for auto insurance business data mining and analysis, build a customer risk analysis model, which effectively reduces the risk of underwriting insurance companies.","PeriodicalId":240400,"journal":{"name":"2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115632781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Improved YOLO Algorithm for Rotated Object Detection in Remote Sensing Images 一种用于遥感图像旋转目标检测的改进YOLO算法
Shenmin Zhang, Xu Wang, Ping Li, Long Wang, Mingdong Zhu, Haisu Zhang, Zhaowen Zeng
Object detection has a great significance to remote sensing image recognition. Conventional object detection methods by using horizontal bounding box have shown good performance in general images. However, because of looking down perspective of remote sensing images, rotation bounding box is more suitable and precise for object detection. Although rotation bounding box has been researched by some works for remote sensing images, most of them are still two stages. In this paper, by improvement of YOLO architecture, we propose an one-stage object detection method to predict rotation bounding box for remote sensing images. Firstly, in the data preprocessing stage, an image cropping operation is utilized instead of zooming operation to generate suitable input data for network. Meanwhile, in order to avoid an object from being divided, an overlapping band is set during cropping. Secondly, a novel rotation bounding box representation method is introduced, and a corresponding loss function is designed in training process. Experiments on the Dota dataset demonstrate that our method outperforms state-of-the-art rotation objects detection methods, in terms of mAP, our method achieves 73.50%mAP, which is higher than methods based on rotation bounding box by 2.0%.
目标检测对遥感图像识别具有重要意义。传统的基于水平边界框的目标检测方法在一般图像中表现出良好的检测效果。然而,由于遥感图像是俯视视角,旋转包围框更适合和精确地用于目标检测。虽然对遥感图像的旋转包围盒进行了一些研究,但大多数仍然是两个阶段。本文通过对YOLO体系结构的改进,提出了一种预测遥感图像旋转边界框的单阶段目标检测方法。首先,在数据预处理阶段,利用图像裁剪操作代替放大操作,生成适合网络的输入数据。同时,为了避免物体被分割,在裁剪时设置了重叠带。其次,引入了一种新的旋转包围盒表示方法,并在训练过程中设计了相应的损失函数;在Dota数据集上的实验表明,我们的方法优于目前最先进的旋转物体检测方法,在mAP方面,我们的方法达到了73.50%的mAP,比基于旋转包围盒的方法高出2.0%。
{"title":"An Improved YOLO Algorithm for Rotated Object Detection in Remote Sensing Images","authors":"Shenmin Zhang, Xu Wang, Ping Li, Long Wang, Mingdong Zhu, Haisu Zhang, Zhaowen Zeng","doi":"10.1109/IMCEC51613.2021.9482265","DOIUrl":"https://doi.org/10.1109/IMCEC51613.2021.9482265","url":null,"abstract":"Object detection has a great significance to remote sensing image recognition. Conventional object detection methods by using horizontal bounding box have shown good performance in general images. However, because of looking down perspective of remote sensing images, rotation bounding box is more suitable and precise for object detection. Although rotation bounding box has been researched by some works for remote sensing images, most of them are still two stages. In this paper, by improvement of YOLO architecture, we propose an one-stage object detection method to predict rotation bounding box for remote sensing images. Firstly, in the data preprocessing stage, an image cropping operation is utilized instead of zooming operation to generate suitable input data for network. Meanwhile, in order to avoid an object from being divided, an overlapping band is set during cropping. Secondly, a novel rotation bounding box representation method is introduced, and a corresponding loss function is designed in training process. Experiments on the Dota dataset demonstrate that our method outperforms state-of-the-art rotation objects detection methods, in terms of mAP, our method achieves 73.50%mAP, which is higher than methods based on rotation bounding box by 2.0%.","PeriodicalId":240400,"journal":{"name":"2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116714952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Multi-step breast mass image segmentation method based on MFC-PCNN 基于MFC-PCNN的多步乳腺肿块图像分割方法
Ruifeng Huang, Jing Lian, Caixia Zhang
In order to solve the problem that pulse coupled neural network (PCNN) has low image segmentation accuracy and high computational complexity for image segmentation aspect, this paper proposes a multi-step medical image processing method that combines saliency detection and a modified PCNN model. First, an improved pulse coupled neural network model (MFC-MSPCNN) is proposed based on the FC-MSPCNN model. This method simplifies the related setting parameters, sets a new connection matrix, and improves the attenuation factor α according to the MFC-MSPCNN characteristics. The achieved steps of the method firstly use a GBVS algorithm based on the saliency detection mechanism to obtain the saliency region map of the mass, and then use it as an external input of the MFC-MSPCNN model to accurately segment the breast mass region. The experiments show that our proposed method can accurately segment breast masses and has low computational complexity than other prevalent methods.
针对脉冲耦合神经网络(pulse coupled neural network, PCNN)在图像分割方面精度低、计算量大的问题,提出了一种将显著性检测与改进的PCNN模型相结合的多步医学图像处理方法。首先,在FC-MSPCNN模型的基础上,提出了改进的脉冲耦合神经网络模型(MFC-MSPCNN)。该方法根据MFC-MSPCNN的特性,简化了相关设置参数,设置了新的连接矩阵,提高了衰减因子α。该方法的实现步骤首先使用基于显著性检测机制的GBVS算法获得肿块的显著性区域图,然后将其作为MFC-MSPCNN模型的外部输入,对乳腺肿块区域进行精确分割。实验结果表明,该方法能够准确地分割乳腺肿块,且计算复杂度较其他常用方法低。
{"title":"Multi-step breast mass image segmentation method based on MFC-PCNN","authors":"Ruifeng Huang, Jing Lian, Caixia Zhang","doi":"10.1109/IMCEC51613.2021.9482296","DOIUrl":"https://doi.org/10.1109/IMCEC51613.2021.9482296","url":null,"abstract":"In order to solve the problem that pulse coupled neural network (PCNN) has low image segmentation accuracy and high computational complexity for image segmentation aspect, this paper proposes a multi-step medical image processing method that combines saliency detection and a modified PCNN model. First, an improved pulse coupled neural network model (MFC-MSPCNN) is proposed based on the FC-MSPCNN model. This method simplifies the related setting parameters, sets a new connection matrix, and improves the attenuation factor α according to the MFC-MSPCNN characteristics. The achieved steps of the method firstly use a GBVS algorithm based on the saliency detection mechanism to obtain the saliency region map of the mass, and then use it as an external input of the MFC-MSPCNN model to accurately segment the breast mass region. The experiments show that our proposed method can accurately segment breast masses and has low computational complexity than other prevalent methods.","PeriodicalId":240400,"journal":{"name":"2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117172129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Objective Evaluation of Speech Communication Jamming Effect based on Composite Evaluation 目的基于综合评价的语音通信干扰效果评价
Shuli Dong
In the objective evaluation of speech communication interference effect, a single objective evaluation method has the problem of poor scene adaptability. In some communication scenarios, the correlation is good, while in other communication scenarios, the correlation is poor. To solve this problem, this paper uses multivariate adaptive regression splines method to composite PESQ, MFCC and other objective evaluation methods. Based on complementary design, the objective evaluation methods of improving the scene adaptability is achieved. The experimental data shows that the MARS-based composition evaluation method has better performance than a single objective evaluation method.
在语音通信干扰效果的客观评价中,单一的客观评价方法存在场景适应性差的问题。在某些通信场景中,相关性较好,而在其他通信场景中,相关性较差。为了解决这一问题,本文采用多元自适应回归样条法对PESQ、MFCC等客观评价方法进行组合。基于互补设计,实现了提高场景适应性的客观评价方法。实验数据表明,基于mars的成分评价方法比单一的客观评价方法具有更好的性能。
{"title":"Objective Evaluation of Speech Communication Jamming Effect based on Composite Evaluation","authors":"Shuli Dong","doi":"10.1109/IMCEC51613.2021.9481989","DOIUrl":"https://doi.org/10.1109/IMCEC51613.2021.9481989","url":null,"abstract":"In the objective evaluation of speech communication interference effect, a single objective evaluation method has the problem of poor scene adaptability. In some communication scenarios, the correlation is good, while in other communication scenarios, the correlation is poor. To solve this problem, this paper uses multivariate adaptive regression splines method to composite PESQ, MFCC and other objective evaluation methods. Based on complementary design, the objective evaluation methods of improving the scene adaptability is achieved. The experimental data shows that the MARS-based composition evaluation method has better performance than a single objective evaluation method.","PeriodicalId":240400,"journal":{"name":"2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124924874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The control method for rotating missile with three pieces of steering wings 三片转向翼旋转导弹的控制方法
Juanzhi Lu, Feng Wang, Jun Ma, Zhiqiang Yan, Lin Liu
Due to the limitation of structure, weight and other factors, one rotating missile cannot be controlled by double channels of four pieces of steering wings, and the control effect with the single channel of two pieces of steering wings is dissatisfactory at low speed. In this case, a control method with three pieces of steering wings is proposed. In this paper, the mounting position of the steering wings and the polarity of the angle are defined under the quasi-body system, the control principle of three pieces of steering wings, the control command distribution, the calculation of control force and moment are described in detail. the rationality and validity of the method has been verified by mathematical simulation.
由于结构、重量等因素的限制,不能采用4片转向翼双通道控制一枚旋转导弹,低速时采用2片转向翼单通道控制效果也不理想。针对这种情况,提出了一种三片转向翼的控制方法。本文定义了准体系统下转向翼的安装位置和角度的极性,详细描述了三片转向翼的控制原理、控制指令的分配、控制力和力矩的计算。通过数学仿真验证了该方法的合理性和有效性。
{"title":"The control method for rotating missile with three pieces of steering wings","authors":"Juanzhi Lu, Feng Wang, Jun Ma, Zhiqiang Yan, Lin Liu","doi":"10.1109/IMCEC51613.2021.9482101","DOIUrl":"https://doi.org/10.1109/IMCEC51613.2021.9482101","url":null,"abstract":"Due to the limitation of structure, weight and other factors, one rotating missile cannot be controlled by double channels of four pieces of steering wings, and the control effect with the single channel of two pieces of steering wings is dissatisfactory at low speed. In this case, a control method with three pieces of steering wings is proposed. In this paper, the mounting position of the steering wings and the polarity of the angle are defined under the quasi-body system, the control principle of three pieces of steering wings, the control command distribution, the calculation of control force and moment are described in detail. the rationality and validity of the method has been verified by mathematical simulation.","PeriodicalId":240400,"journal":{"name":"2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124935631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fixed Point and Stability of a Class of Stochastic Dynamic Systems with Markovian Switching 一类具有马尔可夫切换的随机动力系统的不动点与稳定性
Xinwen Zhang
In this paper, we discuss the stability of impulsive neutral stochastic differential dynamic systems with Markovian switching. Some new sufficient conditions proving the stability in mean square of this impulsive neutral stochastic dynamic systems are derived by using of the Banach fixed point technique. Some well-known results are generalized and improved.
讨论了具有马尔可夫切换的脉冲中立型随机微分动力系统的稳定性问题。利用Banach不动点技术,给出了该脉冲中立型随机动力系统均方稳定性的几个新的充分条件。对一些著名的结果进行了推广和改进。
{"title":"Fixed Point and Stability of a Class of Stochastic Dynamic Systems with Markovian Switching","authors":"Xinwen Zhang","doi":"10.1109/IMCEC51613.2021.9482051","DOIUrl":"https://doi.org/10.1109/IMCEC51613.2021.9482051","url":null,"abstract":"In this paper, we discuss the stability of impulsive neutral stochastic differential dynamic systems with Markovian switching. Some new sufficient conditions proving the stability in mean square of this impulsive neutral stochastic dynamic systems are derived by using of the Banach fixed point technique. Some well-known results are generalized and improved.","PeriodicalId":240400,"journal":{"name":"2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124977505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Time-frequency Feature Fusion Method based on Dynamic Gesture Identity Authentication 基于动态手势身份认证的时频特征融合方法研究
Wang Yanna
In this paper, three kinds of time-frequency feature fusion methods based on dynamic gesture sensor are analyzed. First, the time-domain feature of sensor data is extracted; second, the cepstrum feature, the power spectrum feature of Fourier Transform (FT) and the wavelet transform (WT) feature of gesture data are extracted and trained using SVM classifier model. The influence of feature extraction methods based on the fusion of time-domain features and three frequency-domain features on dynamic gesture authentication is compared, the experimental results show that the fusion of time domain features and frequency domain features of wavelet transform with fewer feature points has the best effect, which improves the accuracy of gesture authentication, So the method is worth promoting.
本文分析了三种基于动态手势传感器的时频特征融合方法。首先,提取传感器数据的时域特征;其次,利用SVM分类器模型提取手势数据的倒谱特征、傅立叶变换(FT)功率谱特征和小波变换(WT)特征并进行训练;比较了基于时域特征和三个频域特征融合的特征提取方法对动态手势认证的影响,实验结果表明,特征点较少的小波变换的时域特征和频域特征融合效果最好,提高了手势认证的精度,值得推广。
{"title":"Research on Time-frequency Feature Fusion Method based on Dynamic Gesture Identity Authentication","authors":"Wang Yanna","doi":"10.1109/IMCEC51613.2021.9482350","DOIUrl":"https://doi.org/10.1109/IMCEC51613.2021.9482350","url":null,"abstract":"In this paper, three kinds of time-frequency feature fusion methods based on dynamic gesture sensor are analyzed. First, the time-domain feature of sensor data is extracted; second, the cepstrum feature, the power spectrum feature of Fourier Transform (FT) and the wavelet transform (WT) feature of gesture data are extracted and trained using SVM classifier model. The influence of feature extraction methods based on the fusion of time-domain features and three frequency-domain features on dynamic gesture authentication is compared, the experimental results show that the fusion of time domain features and frequency domain features of wavelet transform with fewer feature points has the best effect, which improves the accuracy of gesture authentication, So the method is worth promoting.","PeriodicalId":240400,"journal":{"name":"2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115090696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Key Technology of Industrial Network Boundary Protection based on Endogenous Security 基于内生安全的工业网络边界防护关键技术研究
Fei Yu, Qiang Wei, Yangyang Geng, Yunchao Wang
Industrial network boundary protection equipment faces threats from attackers when protecting the industrial control system network. The similarity and static characteristics caused by large-scale and long-term deployment determine that it could only defend against known attacks but could not deal with unknown APT threats, which leads to the breakthrough of one defense line is equivalent to the breakthrough of all defense lines and may bring challenges to industrial production safety. This paper proposes a mimic defense model of industrial isolation gateway based on endogenous security. With the dynamic scheduling mechanism to transform the attack surface, the gateway selects multiple heterogeneous filter executors to process the same packet simultaneously. By comparing the processing results of each executor, anomaly detection is carried out to realize the dynamic defense of the industrial isolation gateway. The experimental results show that the industrial isolation gateway based on mimic architecture can significantly increase the difficulty of backdoor utilization, such as paralysis, rule tampering, and information theft, and effectively defend the industrial control system from the threats caused by the backdoors and vulnerabilities of the isolation gateway while exerting the normal boundary protection function.
工业网络边界防护设备在保护工控系统网络的同时,面临着来自攻击者的威胁。大规模和长期部署所带来的相似性和静态特性,决定了它只能防御已知的攻击,而无法应对未知的APT威胁,这就导致突破一条防线相当于突破了所有防线,可能会给工业生产安全带来挑战。提出了一种基于内生性安全的工业隔离网关模拟防御模型。网关通过动态调度机制转换攻击面,选择多个异构过滤执行器同时处理同一数据包。通过比较各执行器的处理结果,进行异常检测,实现对工业隔离网关的动态防御。实验结果表明,基于模拟架构的工业隔离网关能够显著提高后门瘫痪、规则篡改、信息盗窃等利用难度,在发挥正常边界保护功能的同时,有效防御工业控制系统免受隔离网关后门和漏洞带来的威胁。
{"title":"Research on Key Technology of Industrial Network Boundary Protection based on Endogenous Security","authors":"Fei Yu, Qiang Wei, Yangyang Geng, Yunchao Wang","doi":"10.1109/IMCEC51613.2021.9482240","DOIUrl":"https://doi.org/10.1109/IMCEC51613.2021.9482240","url":null,"abstract":"Industrial network boundary protection equipment faces threats from attackers when protecting the industrial control system network. The similarity and static characteristics caused by large-scale and long-term deployment determine that it could only defend against known attacks but could not deal with unknown APT threats, which leads to the breakthrough of one defense line is equivalent to the breakthrough of all defense lines and may bring challenges to industrial production safety. This paper proposes a mimic defense model of industrial isolation gateway based on endogenous security. With the dynamic scheduling mechanism to transform the attack surface, the gateway selects multiple heterogeneous filter executors to process the same packet simultaneously. By comparing the processing results of each executor, anomaly detection is carried out to realize the dynamic defense of the industrial isolation gateway. The experimental results show that the industrial isolation gateway based on mimic architecture can significantly increase the difficulty of backdoor utilization, such as paralysis, rule tampering, and information theft, and effectively defend the industrial control system from the threats caused by the backdoors and vulnerabilities of the isolation gateway while exerting the normal boundary protection function.","PeriodicalId":240400,"journal":{"name":"2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115249963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research and Construction of the Evaluation Technology System of Intelligent Analysis and Decision Software 智能分析决策软件评价技术体系的研究与构建
Lei Zhang, Wenqiang Li, Bo Xu
Intelligent analysis and decision software is a computer software system established by using artificial intelligence, especially the principle and technology of expert system. According to the particularity of intelligent analysis and decision software, the evaluation technology system of intelligent analysis and decision software is constructed to provide reference for the evaluation project of intelligent analysis and decision software. Intelligent analysis and decision software evaluation technology system includes: test purpose, quality model, test content, test method and technology, test strategy, test environment, test personnel, test process, test document, etc. The system covers all the factors involved in the quality evaluation of intelligent analysis and decision software, and makes contributions to ensure the quality of intelligent analysis and decision software.
智能分析决策软件是利用人工智能,特别是专家系统的原理和技术建立起来的计算机软件系统。根据智能分析决策软件的特殊性,构建智能分析决策软件评价技术体系,为智能分析决策软件评价项目提供参考。智能分析决策软件评价技术体系包括:测试目的、质量模型、测试内容、测试方法与技术、测试策略、测试环境、测试人员、测试过程、测试文档等。该系统涵盖了智能分析决策软件质量评价所涉及的所有因素,为保证智能分析决策软件的质量做出了贡献。
{"title":"Research and Construction of the Evaluation Technology System of Intelligent Analysis and Decision Software","authors":"Lei Zhang, Wenqiang Li, Bo Xu","doi":"10.1109/IMCEC51613.2021.9482066","DOIUrl":"https://doi.org/10.1109/IMCEC51613.2021.9482066","url":null,"abstract":"Intelligent analysis and decision software is a computer software system established by using artificial intelligence, especially the principle and technology of expert system. According to the particularity of intelligent analysis and decision software, the evaluation technology system of intelligent analysis and decision software is constructed to provide reference for the evaluation project of intelligent analysis and decision software. Intelligent analysis and decision software evaluation technology system includes: test purpose, quality model, test content, test method and technology, test strategy, test environment, test personnel, test process, test document, etc. The system covers all the factors involved in the quality evaluation of intelligent analysis and decision software, and makes contributions to ensure the quality of intelligent analysis and decision software.","PeriodicalId":240400,"journal":{"name":"2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116378262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A secure blockchain-based housing rental platform 基于区块链的安全住房租赁平台
Rong Yu, Zhenqi Wang, Conghui Zhang, Shaopeng Guan
In the housing rental market, some intermediaries often publish malicious rental prices or provide false housing information, taking advantage of the asymmetry and opacity of the rental market, to harm the interests of tenants. Blockchain has the characteristics of decentralization, immutability, and trustworthiness, which can well address the problems faced in the housing rental market. In this paper, we establish a secure transaction platform for housing rental based on blockchain. First of all, we replace the trusted third party in the traditional house rental platform using the blockchain technology to reduce the trust cost of the platform. Then, we adopt an identity access mechanism based on zero-knowledge proof to ensure the identity legality of users in the housing rental platform. Finally, homomorphic encryption algorithms are employed to protect the private information of users in the process of housing transactions. The evaluation results show that the proposed scheme can well solve the drawbacks of the traditional housing rental platform and ensure the safety of transactions between the rental parties on the platform.
在住房租赁市场中,一些中介机构往往利用租赁市场的不对称和不透明,恶意发布租金价格或提供虚假的住房信息,损害租客的利益。区块链具有去中心化、不变性、可信赖等特点,可以很好地解决住房租赁市场面临的问题。在本文中,我们建立了一个基于区块链的房屋租赁安全交易平台。首先,我们用区块链技术取代传统房屋租赁平台中的可信第三方,降低平台的信任成本。然后,我们采用基于零知识证明的身份访问机制,保证了房屋租赁平台用户的身份合法性。最后,采用同态加密算法对房屋交易过程中的用户隐私信息进行保护。评价结果表明,所提出的方案能够很好地解决传统房屋租赁平台的弊端,保证租赁方在平台上交易的安全性。
{"title":"A secure blockchain-based housing rental platform","authors":"Rong Yu, Zhenqi Wang, Conghui Zhang, Shaopeng Guan","doi":"10.1109/IMCEC51613.2021.9482058","DOIUrl":"https://doi.org/10.1109/IMCEC51613.2021.9482058","url":null,"abstract":"In the housing rental market, some intermediaries often publish malicious rental prices or provide false housing information, taking advantage of the asymmetry and opacity of the rental market, to harm the interests of tenants. Blockchain has the characteristics of decentralization, immutability, and trustworthiness, which can well address the problems faced in the housing rental market. In this paper, we establish a secure transaction platform for housing rental based on blockchain. First of all, we replace the trusted third party in the traditional house rental platform using the blockchain technology to reduce the trust cost of the platform. Then, we adopt an identity access mechanism based on zero-knowledge proof to ensure the identity legality of users in the housing rental platform. Finally, homomorphic encryption algorithms are employed to protect the private information of users in the process of housing transactions. The evaluation results show that the proposed scheme can well solve the drawbacks of the traditional housing rental platform and ensure the safety of transactions between the rental parties on the platform.","PeriodicalId":240400,"journal":{"name":"2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122533248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1