"Internet +" is the core feature of the current development of information technology. It has been achieved that the Internet and China's logistics industry recombined profoundly using information and communication technologies and Internet platforms. We can grasp more accurate and comprehensive the relationship between supply and demand through online real-time monitoring of procurement and distribution data, and minimize commodity inventory, reduce operating costs, simultaneously we can open up multiple sales channels, explore actively logistics innovation and development countermeasures in order to create a new model of diversified logistics management.
{"title":"Strategic Deployment of Logistics Management with Diversity Characteristics Based on \"Internet +\" Environment","authors":"Yannan Li, Qian Wang","doi":"10.1145/3284557.3284691","DOIUrl":"https://doi.org/10.1145/3284557.3284691","url":null,"abstract":"\"Internet +\" is the core feature of the current development of information technology. It has been achieved that the Internet and China's logistics industry recombined profoundly using information and communication technologies and Internet platforms. We can grasp more accurate and comprehensive the relationship between supply and demand through online real-time monitoring of procurement and distribution data, and minimize commodity inventory, reduce operating costs, simultaneously we can open up multiple sales channels, explore actively logistics innovation and development countermeasures in order to create a new model of diversified logistics management.","PeriodicalId":272487,"journal":{"name":"Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control","volume":"388 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133941819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. García-Sanz-Calcedo, Gonzalo Moreno, A. G. Gonzélez
In operating theatres, delicate control of room pressurization is required to ensure indoor environmental quality (IEQ). Establishing a differential pressure in the operating theatre with respect to the adjoining rooms allows protection against cross-contamination with the outside. To achieve this, a flow rate of less than the flow rate is mechanically extracted. In this work it evaluates what percentage values of extraction on the impulse are optimal to reach the recommended pressurization values. The results show that it would be appropriate to extract between 92% and 95% of the driven flow rate so that the pressurization value is in the recommended range.
{"title":"Influence of Air Pressure on Unidirectional Flow Operating Theatres: A Study Based on Computational Fluid Dynamics","authors":"J. García-Sanz-Calcedo, Gonzalo Moreno, A. G. Gonzélez","doi":"10.1145/3284557.3284733","DOIUrl":"https://doi.org/10.1145/3284557.3284733","url":null,"abstract":"In operating theatres, delicate control of room pressurization is required to ensure indoor environmental quality (IEQ). Establishing a differential pressure in the operating theatre with respect to the adjoining rooms allows protection against cross-contamination with the outside. To achieve this, a flow rate of less than the flow rate is mechanically extracted. In this work it evaluates what percentage values of extraction on the impulse are optimal to reach the recommended pressurization values. The results show that it would be appropriate to extract between 92% and 95% of the driven flow rate so that the pressurization value is in the recommended range.","PeriodicalId":272487,"journal":{"name":"Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121427256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The global food industry is facing many challenges due to the impact of climate change, ever-changing demands by consumers, and increasing legislative pressures by the government, which have resulted in several drivers for changes. Current large-scale rigid manufacturing systems are increasingly seen as incapable of supporting the underlining requirements for implementation of such changes. In this context, one of the key requirements is the need for improved flexibility and reconfigurability of production facilities, often provided by adoption of Industrial Robots in other manufacturing sectors. However, despite their recent technological advancements, in particular the advent of the 4th industrial revolution (Industry 4.0), and significant reduction in overall implementation cost over the last two decades, the uptake of industrial robots in food processing has been slow. This paper explores the application of industrial robots in food manufacturing, the benefits of their use and the challenges currently hindering their uptake.
{"title":"Challenges for Industrial Robot Applications in Food Manufacturing","authors":"Farah Bader, S. Rahimifard","doi":"10.1145/3284557.3284723","DOIUrl":"https://doi.org/10.1145/3284557.3284723","url":null,"abstract":"The global food industry is facing many challenges due to the impact of climate change, ever-changing demands by consumers, and increasing legislative pressures by the government, which have resulted in several drivers for changes. Current large-scale rigid manufacturing systems are increasingly seen as incapable of supporting the underlining requirements for implementation of such changes. In this context, one of the key requirements is the need for improved flexibility and reconfigurability of production facilities, often provided by adoption of Industrial Robots in other manufacturing sectors. However, despite their recent technological advancements, in particular the advent of the 4th industrial revolution (Industry 4.0), and significant reduction in overall implementation cost over the last two decades, the uptake of industrial robots in food processing has been slow. This paper explores the application of industrial robots in food manufacturing, the benefits of their use and the challenges currently hindering their uptake.","PeriodicalId":272487,"journal":{"name":"Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133564348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the field of flow visualization, the optimization of algorithms and the improvement of visual effects have always been the focus of researchers, in recent years many research and improvement algorithms for evaluating visualization quality have been proposed. However, in the process of algorithm implementation and quality evaluation, ambiguity of flow field direction and unclear description of vector field direction and size are often encountered, in order to solve this problem, an attempt is made to apply the theory of human visual perception to the evaluation of visualization results and the improvement of visualization effects, and on the basis of research by simulation of cyclone data, the two-dimensional line integral convolution algorithm for vector field visualization is studied.
{"title":"Visualization of Vector Field using Line Integral Convolution based on Visual Perception","authors":"Ying Ma, Yingyan Guo","doi":"10.1145/3284557.3284709","DOIUrl":"https://doi.org/10.1145/3284557.3284709","url":null,"abstract":"In the field of flow visualization, the optimization of algorithms and the improvement of visual effects have always been the focus of researchers, in recent years many research and improvement algorithms for evaluating visualization quality have been proposed. However, in the process of algorithm implementation and quality evaluation, ambiguity of flow field direction and unclear description of vector field direction and size are often encountered, in order to solve this problem, an attempt is made to apply the theory of human visual perception to the evaluation of visualization results and the improvement of visualization effects, and on the basis of research by simulation of cyclone data, the two-dimensional line integral convolution algorithm for vector field visualization is studied.","PeriodicalId":272487,"journal":{"name":"Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130210668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In full swing for a few years, Internet of Things (IoT) has affected many different sectors, including the automobile sector. IoT refers to the ability of physical object (such as a Vehicles) to communicate with a virtual object (such as a network of several vehicles). A question therefore arises: what impact will IoT have on the automotive world in the short term? From driving assistance to the improvement of autonomous Vehicles, via vehicle-to-vehicle communication, discover all that the Internet of Things could change in the automotive world. The problem is to study the availability, the reliability and the robustness of the communications between the agents of The Internet of Vehicles (IoVs). The dynamic nature of this kind of network presents communications constraints, namely frequent disconnections that can be an obstacle for the execution of applications in a vehicle. Indeed, some vehicles are sometimes isolated without the possibility of transmission and reception for an indefinite period of time. This situation affects the quality of service offered by IoV and therefore its usefulness. This paper first gives the impact of selecting Gytar parameters and performance comparison between GyTAR, and IGRP.
{"title":"Greedy Traffic Aware Routing Protocol Implementation in the Context of Internet of Vehicles","authors":"Belghachi Mohammed, Feham Mohamed","doi":"10.1145/3284557.3284698","DOIUrl":"https://doi.org/10.1145/3284557.3284698","url":null,"abstract":"In full swing for a few years, Internet of Things (IoT) has affected many different sectors, including the automobile sector. IoT refers to the ability of physical object (such as a Vehicles) to communicate with a virtual object (such as a network of several vehicles). A question therefore arises: what impact will IoT have on the automotive world in the short term? From driving assistance to the improvement of autonomous Vehicles, via vehicle-to-vehicle communication, discover all that the Internet of Things could change in the automotive world. The problem is to study the availability, the reliability and the robustness of the communications between the agents of The Internet of Vehicles (IoVs). The dynamic nature of this kind of network presents communications constraints, namely frequent disconnections that can be an obstacle for the execution of applications in a vehicle. Indeed, some vehicles are sometimes isolated without the possibility of transmission and reception for an indefinite period of time. This situation affects the quality of service offered by IoV and therefore its usefulness. This paper first gives the impact of selecting Gytar parameters and performance comparison between GyTAR, and IGRP.","PeriodicalId":272487,"journal":{"name":"Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122684604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper describes a 3D copier using liquid/solid phase change. 3D printer becomes common in recent years. Although various structures can be created by using 3D printer, it requires sophisticated technical skills such as 2D or 3D CAD design. It is difficult for general people to design desired structures by using CAD software. A 3D copier using low-melting alloy is proposed to solve the problem. The proposed 3D copier can sense the shape of the desired structure and memorize its shape to copy it. We can use it as a casting mold to copy the desired structure. We confirmed that the proposed 3D copier could copy various structures easily and fast through the experiments.
{"title":"3D Copier Using Liquid/Solid Phase Change","authors":"Mitsuharu Matsumoto","doi":"10.1145/3284557.3284711","DOIUrl":"https://doi.org/10.1145/3284557.3284711","url":null,"abstract":"This paper describes a 3D copier using liquid/solid phase change. 3D printer becomes common in recent years. Although various structures can be created by using 3D printer, it requires sophisticated technical skills such as 2D or 3D CAD design. It is difficult for general people to design desired structures by using CAD software. A 3D copier using low-melting alloy is proposed to solve the problem. The proposed 3D copier can sense the shape of the desired structure and memorize its shape to copy it. We can use it as a casting mold to copy the desired structure. We confirmed that the proposed 3D copier could copy various structures easily and fast through the experiments.","PeriodicalId":272487,"journal":{"name":"Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132072680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the development of Internet, there are more and more text data appear, the companies face the challenge to organize the content and the users feel confused about what is useful content for them. If the text data can be classified will make a contribution to solve the problem. It has been a long time, text classification work is done by human beings, like editors. So text classification become a hot topic in nature language processing field, especially for Chinese text classification. Sentiment classification just need to classify two classes, but there are more situations where we need to do multi classification. Such as the news editors have to give an article tags manually. There are several ways to solve the text classification problem: (1) Naive Bayes algorithm (2) support vector machine algorithm (3) neural network (4) k nearest neighbors (5) decision tree [1][2][3][4][5]. Naive Bayes applies Bayes' theorem with strong(naive) independence assumptions between the features. This paper proposes to use Naive Bayes to finish a Chinese news text multi classification with nine classes.
{"title":"Chinese News Text Multi Classification Based on Naive Bayes Algorithm","authors":"Fei Wang, Xin Deng, Lunqing Hou","doi":"10.1145/3284557.3284704","DOIUrl":"https://doi.org/10.1145/3284557.3284704","url":null,"abstract":"With the development of Internet, there are more and more text data appear, the companies face the challenge to organize the content and the users feel confused about what is useful content for them. If the text data can be classified will make a contribution to solve the problem. It has been a long time, text classification work is done by human beings, like editors. So text classification become a hot topic in nature language processing field, especially for Chinese text classification. Sentiment classification just need to classify two classes, but there are more situations where we need to do multi classification. Such as the news editors have to give an article tags manually. There are several ways to solve the text classification problem: (1) Naive Bayes algorithm (2) support vector machine algorithm (3) neural network (4) k nearest neighbors (5) decision tree [1][2][3][4][5]. Naive Bayes applies Bayes' theorem with strong(naive) independence assumptions between the features. This paper proposes to use Naive Bayes to finish a Chinese news text multi classification with nine classes.","PeriodicalId":272487,"journal":{"name":"Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121468332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Due to the rapid development in the technology, embedded systems have an effective part in controlling and managing variety of hardware and software systems. These systems plan to solve problems that make embedded systems become more complex than before. The majority of embedded systems are currently intended to be more interactive with the environment and process data in real-time in order to fulfil requirements that recruited for. Thus, this requires a high speed of processing data to produce an output. Hence multicore processors are usually employed in embedded system design. To ensure that embedded systems as processing units work perfectly to finish a task with expecting the Worst-Case Execution Time (WCET). A considerable number of researches have been done to handle cache memory organization for multicore processor units in real-time embedded systems. To this end, this paper presents a study of cache management techniques in real-time embedded systems.
{"title":"A Study of Cache Management Mechanisms for Real-Time Embedded Systems","authors":"M. Dohan, Michael Opoku Agyeman","doi":"10.1145/3284557.3284559","DOIUrl":"https://doi.org/10.1145/3284557.3284559","url":null,"abstract":"Due to the rapid development in the technology, embedded systems have an effective part in controlling and managing variety of hardware and software systems. These systems plan to solve problems that make embedded systems become more complex than before. The majority of embedded systems are currently intended to be more interactive with the environment and process data in real-time in order to fulfil requirements that recruited for. Thus, this requires a high speed of processing data to produce an output. Hence multicore processors are usually employed in embedded system design. To ensure that embedded systems as processing units work perfectly to finish a task with expecting the Worst-Case Execution Time (WCET). A considerable number of researches have been done to handle cache memory organization for multicore processor units in real-time embedded systems. To this end, this paper presents a study of cache management techniques in real-time embedded systems.","PeriodicalId":272487,"journal":{"name":"Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130716059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Tjahyadi, Samuel Lukas, Steven Albert, D. Krisnadi
In this paper, design and implementation of automated scoring of multiple-choice test using template matching technique is reported. In the proposed method an Android based smart-phone is used to identify the presence of X-mark in the answer sheet, instead of identify which circle in the answer sheet is blackened as usually do in the widely known solution using Optical Mark Reader (OMR). Cost and practicality wise, the usage of smart-phone compared to OMR is expected to increase the accessibility to automated scoring of multiple-choice test. Furthermore, the identification of X-mark opens the possibility for students to change their answer easier by making corrected X-mark and then placing a new X-mark in another blank square compared to wipe a blackened circle and filling a new circle. Four main stages are involved in the implementation, namely image preparation stage, blank squares position determination stage, X-mark detection stage, and evaluation stage. After those stages are implemented, tests are conducted to find the best distance and angle of the smart phone to the answer sheet in taking the answer sheet's images, and to evaluate the accuracy in identifying right answers and gives valid scoring. The success rate of recogntion the answer is at least 99%.
{"title":"Automated Scoring of Multiple-Choice Test Using Template Matching Technique","authors":"H. Tjahyadi, Samuel Lukas, Steven Albert, D. Krisnadi","doi":"10.1145/3284557.3284702","DOIUrl":"https://doi.org/10.1145/3284557.3284702","url":null,"abstract":"In this paper, design and implementation of automated scoring of multiple-choice test using template matching technique is reported. In the proposed method an Android based smart-phone is used to identify the presence of X-mark in the answer sheet, instead of identify which circle in the answer sheet is blackened as usually do in the widely known solution using Optical Mark Reader (OMR). Cost and practicality wise, the usage of smart-phone compared to OMR is expected to increase the accessibility to automated scoring of multiple-choice test. Furthermore, the identification of X-mark opens the possibility for students to change their answer easier by making corrected X-mark and then placing a new X-mark in another blank square compared to wipe a blackened circle and filling a new circle. Four main stages are involved in the implementation, namely image preparation stage, blank squares position determination stage, X-mark detection stage, and evaluation stage. After those stages are implemented, tests are conducted to find the best distance and angle of the smart phone to the answer sheet in taking the answer sheet's images, and to evaluate the accuracy in identifying right answers and gives valid scoring. The success rate of recogntion the answer is at least 99%.","PeriodicalId":272487,"journal":{"name":"Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127985435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Internet-of-things (IoT) holds a lot of benefits to our lives by removing menial tasks and improving efficiency of everyday objects. You are trusting your personal data and device control to the manufactures and you may not be aware of how much risk your putting your privacy at by sending your data over the internet. The internet-of-things may not be as secure as you think when the devices used are constrained by a lot of variables which attackers can exploit to gain access to your data / device and anything they connected to and as the internet-of-things is all about connecting devices together one weak point can be all it takes to gain full access. In this paper we have a look at the current advances in IoT security and the most efficient methods to protect IoT devices.
{"title":"A Study of the Advances in IoT Security","authors":"A. Dean, Michael Opoku Agyeman","doi":"10.1145/3284557.3284560","DOIUrl":"https://doi.org/10.1145/3284557.3284560","url":null,"abstract":"The Internet-of-things (IoT) holds a lot of benefits to our lives by removing menial tasks and improving efficiency of everyday objects. You are trusting your personal data and device control to the manufactures and you may not be aware of how much risk your putting your privacy at by sending your data over the internet. The internet-of-things may not be as secure as you think when the devices used are constrained by a lot of variables which attackers can exploit to gain access to your data / device and anything they connected to and as the internet-of-things is all about connecting devices together one weak point can be all it takes to gain full access. In this paper we have a look at the current advances in IoT security and the most efficient methods to protect IoT devices.","PeriodicalId":272487,"journal":{"name":"Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control","volume":"584 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134339312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}