Pub Date : 2022-09-01DOI: 10.1109/ICNISC57059.2022.00052
Xing-gan Zhang, Pengpeng Xia
Photovoltaic sound barrier combines solar power generation technology with traditional sound barrier, which can not only reduce noise, but also generate electricity. The calculation results show that the sound absorption and sound insulation performance of high-efficiency photovoltaic sound barrier is superior to that of conventional sound barrier. At the same time, the power generation efficiency of photovoltaic sound barrier can be improved by using double-sided power generation photovoltaic modules. convenient, efficient and safe.TAhis research is of great value to the practical application of photovoltaic sound barrier.
{"title":"Design of High Efficiency Photovoltaic Sound Barrier","authors":"Xing-gan Zhang, Pengpeng Xia","doi":"10.1109/ICNISC57059.2022.00052","DOIUrl":"https://doi.org/10.1109/ICNISC57059.2022.00052","url":null,"abstract":"Photovoltaic sound barrier combines solar power generation technology with traditional sound barrier, which can not only reduce noise, but also generate electricity. The calculation results show that the sound absorption and sound insulation performance of high-efficiency photovoltaic sound barrier is superior to that of conventional sound barrier. At the same time, the power generation efficiency of photovoltaic sound barrier can be improved by using double-sided power generation photovoltaic modules. convenient, efficient and safe.TAhis research is of great value to the practical application of photovoltaic sound barrier.","PeriodicalId":286467,"journal":{"name":"2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113998848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-01DOI: 10.1109/ICNISC57059.2022.00056
Hao Wang, Huajun Gong, Yourong Fan, Xinhua Wang
While the rapid development of multi-rotor UAVs brings wide applications, it also brings harm to social life and personal safety due to problems such as “indiscriminate flying” and “black flying”. Therefore, there is an urgent need to carry out research work on anti-VAV systems. The most critical technology in the countermeasure system is the real-time detection of the target UAV. The traditional YOLOv3 detection algorithm cannot achieve a balance between real-time performance and detection accuracy on airborne embedded devices with limited computing power. Therefore, this paper first improves the end structure of MobileNetV3-Small and replaces the backbone network of the original YOLOv3 with it, which greatly reduces the amount of calculation, but brings about the loss of detection accuracy; Next, an improved receptive field module(RFB+) is added, which strengthens the detection ability of targets in complex backgrounds; Finally, the improved YOLOv3 algorithm is named Air-Borne-YOLOv3. The feasibility and superiority of the improved algorithm are proved by the actual flight test results.
{"title":"Research on UAV Target Detection Algorithm Based on Improved Air-Borne-YOLOv3","authors":"Hao Wang, Huajun Gong, Yourong Fan, Xinhua Wang","doi":"10.1109/ICNISC57059.2022.00056","DOIUrl":"https://doi.org/10.1109/ICNISC57059.2022.00056","url":null,"abstract":"While the rapid development of multi-rotor UAVs brings wide applications, it also brings harm to social life and personal safety due to problems such as “indiscriminate flying” and “black flying”. Therefore, there is an urgent need to carry out research work on anti-VAV systems. The most critical technology in the countermeasure system is the real-time detection of the target UAV. The traditional YOLOv3 detection algorithm cannot achieve a balance between real-time performance and detection accuracy on airborne embedded devices with limited computing power. Therefore, this paper first improves the end structure of MobileNetV3-Small and replaces the backbone network of the original YOLOv3 with it, which greatly reduces the amount of calculation, but brings about the loss of detection accuracy; Next, an improved receptive field module(RFB+) is added, which strengthens the detection ability of targets in complex backgrounds; Finally, the improved YOLOv3 algorithm is named Air-Borne-YOLOv3. The feasibility and superiority of the improved algorithm are proved by the actual flight test results.","PeriodicalId":286467,"journal":{"name":"2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114349577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The quality of images collected outdoors is compromised owing to hazy weather, resulting in contrast reduction and degradation. To solve this problem, a new dehazing algorithm that combines spatial and channel feature maps was proposed. The algorithm comprises of two parts: image dehazing and image enhancement. The first part uses the anti-symmetric nature of the Involution operator and the convolution operator to extract the spatial and channel feature maps of the hazy image completely. This part can restore the dehazed image by combining it with a deformed atmospheric scattering model. In the second part, a contrast-limited adaptive histogram equalization algorithm is used to improve the dehazed image. This process can improve the contrast and brightness of an image and enhance its detailed information. The experiment used the structural similarity index measure(SSIM), peak signal-to-noise ratio(PSNR), and other parameters to compare the algorithm with three other common dehazing algorithms to verify the dehazing effect and robustness of the algorithm. The experimental results show that the proposed algorithm improved the SSIM and PSNR by 4.72% and 15.96% respectively.
{"title":"A Novel Approach for Image Dehazing via Spatial and Channel Feature Fusion","authors":"Duofeng Wang, Yanbo Zhang, Zilun Wan, Fengyang Gu, Mingyue Chen, Yurong Zhou, Yong Zhang, Yi Zhu","doi":"10.1109/ICNISC57059.2022.00070","DOIUrl":"https://doi.org/10.1109/ICNISC57059.2022.00070","url":null,"abstract":"The quality of images collected outdoors is compromised owing to hazy weather, resulting in contrast reduction and degradation. To solve this problem, a new dehazing algorithm that combines spatial and channel feature maps was proposed. The algorithm comprises of two parts: image dehazing and image enhancement. The first part uses the anti-symmetric nature of the Involution operator and the convolution operator to extract the spatial and channel feature maps of the hazy image completely. This part can restore the dehazed image by combining it with a deformed atmospheric scattering model. In the second part, a contrast-limited adaptive histogram equalization algorithm is used to improve the dehazed image. This process can improve the contrast and brightness of an image and enhance its detailed information. The experiment used the structural similarity index measure(SSIM), peak signal-to-noise ratio(PSNR), and other parameters to compare the algorithm with three other common dehazing algorithms to verify the dehazing effect and robustness of the algorithm. The experimental results show that the proposed algorithm improved the SSIM and PSNR by 4.72% and 15.96% respectively.","PeriodicalId":286467,"journal":{"name":"2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121863664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-01DOI: 10.1109/ICNISC57059.2022.00103
Weijun Shan, Chi Zhang, Qing Li, Jun Yu
This paper presents a lightweight countermeasure scheme of SM4 cryptographic algorithm against side channel analysis attacks. SM4 is one of the widely used block ciphers in information computing and data communication. However, as it is usually implemented in cryptographic devices, it is definitely under the threat of side channel analysis attacks. Some schemes of implementations have been provided as the countermeasures against the side channel analysis attacks, which leads to a relatively complicated realization on both cost and performance. This paper proposes a new mask scheme for SM4 implementation with lightweight cost and low performance loss. Experiment results show the effectiveness of the method against the side channel analysis attacks.
{"title":"A Lightweight Countermeasure of SM4 against Side Channel Analysis","authors":"Weijun Shan, Chi Zhang, Qing Li, Jun Yu","doi":"10.1109/ICNISC57059.2022.00103","DOIUrl":"https://doi.org/10.1109/ICNISC57059.2022.00103","url":null,"abstract":"This paper presents a lightweight countermeasure scheme of SM4 cryptographic algorithm against side channel analysis attacks. SM4 is one of the widely used block ciphers in information computing and data communication. However, as it is usually implemented in cryptographic devices, it is definitely under the threat of side channel analysis attacks. Some schemes of implementations have been provided as the countermeasures against the side channel analysis attacks, which leads to a relatively complicated realization on both cost and performance. This paper proposes a new mask scheme for SM4 implementation with lightweight cost and low performance loss. Experiment results show the effectiveness of the method against the side channel analysis attacks.","PeriodicalId":286467,"journal":{"name":"2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126153357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-01DOI: 10.1109/ICNISC57059.2022.00199
Sixiao Zou
With the gradual deepening of economic globalization, the frequency of cross-cultural business cooperation between countries has gradually increased. Whether at the macro or micro level, communication obstacles and economic losses caused by different cultural backgrounds to the economic exchanges of countries are also increasing. This paper selects the economic cooperation data (2014–2021) of 29 countries along the “Belt and Road” that have economic relations with China, uses Hofstede's cultural index to calculate the cultural distance between China and these countries along the route, and uses the extended gravity model to conduct empirical tests, The result shows that cultural distance does have an impact on bilateral economic cooperation, and there are differences due to regional differences.
{"title":"Research on the Impact of China's Economic Cooperation with the “Belt and Road” Countries from a Cross-Cultural Perspective","authors":"Sixiao Zou","doi":"10.1109/ICNISC57059.2022.00199","DOIUrl":"https://doi.org/10.1109/ICNISC57059.2022.00199","url":null,"abstract":"With the gradual deepening of economic globalization, the frequency of cross-cultural business cooperation between countries has gradually increased. Whether at the macro or micro level, communication obstacles and economic losses caused by different cultural backgrounds to the economic exchanges of countries are also increasing. This paper selects the economic cooperation data (2014–2021) of 29 countries along the “Belt and Road” that have economic relations with China, uses Hofstede's cultural index to calculate the cultural distance between China and these countries along the route, and uses the extended gravity model to conduct empirical tests, The result shows that cultural distance does have an impact on bilateral economic cooperation, and there are differences due to regional differences.","PeriodicalId":286467,"journal":{"name":"2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123647954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-01DOI: 10.1109/ICNISC57059.2022.00118
Zhixiao Wang, Wenyao Yan, Zhuochun Li, Min Huang, Qinyuan Fan, Xin Wang
Domestic violence (DV) is getting more and more attention due to the critical trouble and danger that pose great challenge to human rights and health. The popularity of various social medias can help these victims to share their experiences and obtain more possible support from numerous open communities. However, it is not only inefficient but also laborious and time-consuming to manually access and browse through a great deal of available posts on the Internet and social media space. Therefore, considering the advantages of Deep Learning (DL) technology in Natural Language Processing, adopting DL as an efficient strategy for automatic recognition and evaluation of DV victims is in the urgent requirements. This paper takes social media Facebook posts about domestic violence as the research object and uses Word2Vec to build word vector model. The paper uses Bi-LSTM+self-Attention deep learning models to accomplish DV crisis recognition task and compares it with CNN, RNN and LSTM. The assessment of experimental results show that the accuracy of CNN and LSTM are both above 90% which is better than RNN; And the accuracy of Bi-LSTM is the highest after using the Attention mechanism. The research results of this article will provide reference and help for public DVCS to rescue DV victims.
{"title":"Domestic Violence Crisis Recognition Method based on Bi-LSTM+Attention","authors":"Zhixiao Wang, Wenyao Yan, Zhuochun Li, Min Huang, Qinyuan Fan, Xin Wang","doi":"10.1109/ICNISC57059.2022.00118","DOIUrl":"https://doi.org/10.1109/ICNISC57059.2022.00118","url":null,"abstract":"Domestic violence (DV) is getting more and more attention due to the critical trouble and danger that pose great challenge to human rights and health. The popularity of various social medias can help these victims to share their experiences and obtain more possible support from numerous open communities. However, it is not only inefficient but also laborious and time-consuming to manually access and browse through a great deal of available posts on the Internet and social media space. Therefore, considering the advantages of Deep Learning (DL) technology in Natural Language Processing, adopting DL as an efficient strategy for automatic recognition and evaluation of DV victims is in the urgent requirements. This paper takes social media Facebook posts about domestic violence as the research object and uses Word2Vec to build word vector model. The paper uses Bi-LSTM+self-Attention deep learning models to accomplish DV crisis recognition task and compares it with CNN, RNN and LSTM. The assessment of experimental results show that the accuracy of CNN and LSTM are both above 90% which is better than RNN; And the accuracy of Bi-LSTM is the highest after using the Attention mechanism. The research results of this article will provide reference and help for public DVCS to rescue DV victims.","PeriodicalId":286467,"journal":{"name":"2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122982913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-01DOI: 10.1109/ICNISC57059.2022.00164
Zhihui Yi, Han Zhang, Chao Xu, Qingquan Jiang
In order to actively respond to the national optimization of the business environment, fully integrate the responsibilities of the original land resources, planning and other departments, promoting the overall high-quality development of the regional digital economy by means of information technology has become a current priority. However, the natural resources sector has existing problems such as data islands, scattered business, and longtime consumption. Taking Guangxin District, Shangrao City as an example, this paper proposes to construct the integrated information platform of natural resources in the county area by utilizing advanced technologies such as multi-user concurrent access, long-term transaction processing, and integrated data model-driven database building technology, comprehensively enhance the informatization level and open-sharing ability of grassroots units, and improve the level of refinement and intelligence of management, which has certain reference significance for the construction work in other similar areas.
{"title":"Design and Implementation of County-level Natural Resource Integration Information Platform in Guangxin District of Shangrao City","authors":"Zhihui Yi, Han Zhang, Chao Xu, Qingquan Jiang","doi":"10.1109/ICNISC57059.2022.00164","DOIUrl":"https://doi.org/10.1109/ICNISC57059.2022.00164","url":null,"abstract":"In order to actively respond to the national optimization of the business environment, fully integrate the responsibilities of the original land resources, planning and other departments, promoting the overall high-quality development of the regional digital economy by means of information technology has become a current priority. However, the natural resources sector has existing problems such as data islands, scattered business, and longtime consumption. Taking Guangxin District, Shangrao City as an example, this paper proposes to construct the integrated information platform of natural resources in the county area by utilizing advanced technologies such as multi-user concurrent access, long-term transaction processing, and integrated data model-driven database building technology, comprehensively enhance the informatization level and open-sharing ability of grassroots units, and improve the level of refinement and intelligence of management, which has certain reference significance for the construction work in other similar areas.","PeriodicalId":286467,"journal":{"name":"2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128922680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-01DOI: 10.1109/ICNISC57059.2022.00104
Hui Chang
In recent years, cloud services in the Internet field has been a hot topic, after several years of explosive technology development and several years of market precipitation, the cloud platform finally achieved universal unification in 2017, and Kubernetes (often referred to as k8s), an open source container cluster management system from Google Cloud Platform, has become the de facto standard in the industry. Google, Amazon, IBM, Microsoft, Alibaba, Tencent, Huawei and a series of well-known Internet manufacturers at home and abroad have built their own cloud services and cloud platforms. This article discusses the differences and advantages of cloud services compared with traditional services.
{"title":"The Differences and Advantages between Cloud Services and Traditional Services","authors":"Hui Chang","doi":"10.1109/ICNISC57059.2022.00104","DOIUrl":"https://doi.org/10.1109/ICNISC57059.2022.00104","url":null,"abstract":"In recent years, cloud services in the Internet field has been a hot topic, after several years of explosive technology development and several years of market precipitation, the cloud platform finally achieved universal unification in 2017, and Kubernetes (often referred to as k8s), an open source container cluster management system from Google Cloud Platform, has become the de facto standard in the industry. Google, Amazon, IBM, Microsoft, Alibaba, Tencent, Huawei and a series of well-known Internet manufacturers at home and abroad have built their own cloud services and cloud platforms. This article discusses the differences and advantages of cloud services compared with traditional services.","PeriodicalId":286467,"journal":{"name":"2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115996743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-01DOI: 10.1109/ICNISC57059.2022.00050
Lunzheng Tan, Rui Ding
To understand a scene, a machine not only has to learn to recognize individual object instances, but also pair them up and recognize visual relationships between them. Human-object interaction (HOI) recognition is one of the fundamental tasks in understanding the visual world. In this paper, we address the task of understanding and recognizing HOI in videos, and represent HOI as the doublet of . This paper proposes a two-stream network model that fuses multiple features. Since appearance information (the appearance features of instances), spatial information (the distance between each key part of the human body and the interacting object), and motion information (optical flow) in the video are all essential cues for recognizing HOI, our model uses two streams to fuse the information to complete the HOI recognition task. We valid the effectiveness of the model by conducting experiments on two recently proposed public video datasets (Charades and CAD-120 datasets), and perform ablation experiments to show the effect of components.
{"title":"Recognition of Human-object Interaction in Video through a Two-stream Network Integrating Multiple Features","authors":"Lunzheng Tan, Rui Ding","doi":"10.1109/ICNISC57059.2022.00050","DOIUrl":"https://doi.org/10.1109/ICNISC57059.2022.00050","url":null,"abstract":"To understand a scene, a machine not only has to learn to recognize individual object instances, but also pair them up and recognize visual relationships between them. Human-object interaction (HOI) recognition is one of the fundamental tasks in understanding the visual world. In this paper, we address the task of understanding and recognizing HOI in videos, and represent HOI as the doublet of . This paper proposes a two-stream network model that fuses multiple features. Since appearance information (the appearance features of instances), spatial information (the distance between each key part of the human body and the interacting object), and motion information (optical flow) in the video are all essential cues for recognizing HOI, our model uses two streams to fuse the information to complete the HOI recognition task. We valid the effectiveness of the model by conducting experiments on two recently proposed public video datasets (Charades and CAD-120 datasets), and perform ablation experiments to show the effect of components.","PeriodicalId":286467,"journal":{"name":"2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116055053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Time-consuming, labor-intensive, poor real-time performance, and similar problems of artificial station inspection need to be solved. Here, an AR inspection system is proposed to replace manual inspection to effectively monitor the working status of equipment and improve the design method of intelligent inspection systems, which are used to monitor onsite environmental conditions. This proposed method uses a panoramic camera to capture onsite audio and video data, collects a variety of sensor data, and integrates these two types of data in real time. The method can provide intelligent anomaly detection and alarm functions and push audio and video streams to the office terminal through RTMP protocol, indicating great convenience for patrol inspection.
{"title":"Design and Implementation of an AR Inspection System for an Unmanned Gas Transmission Station","authors":"Weibin Wang, Hongqiang Dang, Lixiao Xie, Zengzhan Zhang, Kai Li, Xiaoli Huo, Hanying Li, Cuicui Zhang, Kaiyuan Guan, Yuanwei Lin, Yang Zhang","doi":"10.1109/ICNISC57059.2022.00064","DOIUrl":"https://doi.org/10.1109/ICNISC57059.2022.00064","url":null,"abstract":"Time-consuming, labor-intensive, poor real-time performance, and similar problems of artificial station inspection need to be solved. Here, an AR inspection system is proposed to replace manual inspection to effectively monitor the working status of equipment and improve the design method of intelligent inspection systems, which are used to monitor onsite environmental conditions. This proposed method uses a panoramic camera to capture onsite audio and video data, collects a variety of sensor data, and integrates these two types of data in real time. The method can provide intelligent anomaly detection and alarm functions and push audio and video streams to the office terminal through RTMP protocol, indicating great convenience for patrol inspection.","PeriodicalId":286467,"journal":{"name":"2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116065962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}