首页 > 最新文献

2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)最新文献

英文 中文
A Hardware-Assisted Security Monitoring Method for Jump Instruction and Jump Address in Embedded Systems 嵌入式系统中跳转指令和跳转地址的硬件辅助安全监控方法
Qiang Hao, Dongdong Xu, Zhun Zhang, Jiqing Wang, Tong Le, Jiawei Wang, Jinlei Zhang, Jiakang Liu, Jinhui Ma, Xiang Wang
With the development of embedded systems towards networking and intelligence, the security threats they face are becoming more difficult to prevent. Existing protection methods make it difficult to monitor jump instructions and their target addresses for tampering by attackers at the low hardware implementation overhead and performance overhead. In this paper, a hardware-assisted security monitoring module is designed to monitor the integrity of jump instructions and jump addresses when executing programs. The proposed method has been implemented on the Xilinx Kintex-7 FPGA platform. Experiments show that this method is able to effectively monitor tampering attacks on jump instructions as well as target addresses while the embedded system is executing programs.
随着嵌入式系统向网络化、智能化方向发展,其面临的安全威胁越来越难以防范。现有的保护方法以较低的硬件实现开销和性能开销来监控跳转指令及其目标地址以防止攻击者篡改。本文设计了一个硬件辅助的安全监控模块,用于监控程序执行时跳转指令和跳转地址的完整性。该方法已在Xilinx Kintex-7 FPGA平台上实现。实验表明,该方法能够有效地监控嵌入式系统在执行程序时对跳转指令和目标地址的篡改攻击。
{"title":"A Hardware-Assisted Security Monitoring Method for Jump Instruction and Jump Address in Embedded Systems","authors":"Qiang Hao, Dongdong Xu, Zhun Zhang, Jiqing Wang, Tong Le, Jiawei Wang, Jinlei Zhang, Jiakang Liu, Jinhui Ma, Xiang Wang","doi":"10.1109/ICNISC57059.2022.00049","DOIUrl":"https://doi.org/10.1109/ICNISC57059.2022.00049","url":null,"abstract":"With the development of embedded systems towards networking and intelligence, the security threats they face are becoming more difficult to prevent. Existing protection methods make it difficult to monitor jump instructions and their target addresses for tampering by attackers at the low hardware implementation overhead and performance overhead. In this paper, a hardware-assisted security monitoring module is designed to monitor the integrity of jump instructions and jump addresses when executing programs. The proposed method has been implemented on the Xilinx Kintex-7 FPGA platform. Experiments show that this method is able to effectively monitor tampering attacks on jump instructions as well as target addresses while the embedded system is executing programs.","PeriodicalId":286467,"journal":{"name":"2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125640618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Computer Graphics Technology and Multi-dimensional Spatial Design of Chinese Fonts 计算机图形学技术与汉字字体多维空间设计研究
Lin Liu, J. Yin
The aim of this paper is to study the use of computer graphics technology in the design of Chinese fonts. The two aspects of graphic software and Chinese font design and production, and graphic software and Chinese font multi-dimensional space design are explored to clarify that Chinese font design has moved from static to dynamic, which breaks through the limitations of two-dimensional static of font and realises the multi-dimensional space effect of font polymorphism. Combined with practical cases, we analyse graphic software and its use, 3D art font design methods, explore the use of gloss and material in font design, the combination of graphics and Chinese fonts to produce a sense of dimensionality, and the grid composition of font design with a sense of dimensionality. It is concluded that the multi-dimensional spatial expression of Chinese fonts is inseparable from light, rotation, kinetic, texture, virtual and other means. Clearly, computer graphics technology provides the conditions for the design and creation of Chinese fonts.
本文的目的是研究计算机图形技术在中文字体设计中的应用。从图形软件与汉字字体设计制作、图形软件与汉字字体多维空间设计两个方面进行探讨,阐明汉字字体设计已经从静态走向动态,突破了字体二维静态的局限,实现了字体多态的多维空间效果。结合实际案例,分析图形软件及其使用,三维艺术字体设计方法,探讨在字体设计中运用光泽度和材质,图形与中文字体的结合产生立体感,以及网格构成字体设计的立体感。总结出汉字字体的多维空间表达离不开光、旋转、动态、质感、虚拟等手段。显然,计算机图形技术为中文字体的设计和创作提供了条件。
{"title":"Research on Computer Graphics Technology and Multi-dimensional Spatial Design of Chinese Fonts","authors":"Lin Liu, J. Yin","doi":"10.1109/ICNISC57059.2022.00162","DOIUrl":"https://doi.org/10.1109/ICNISC57059.2022.00162","url":null,"abstract":"The aim of this paper is to study the use of computer graphics technology in the design of Chinese fonts. The two aspects of graphic software and Chinese font design and production, and graphic software and Chinese font multi-dimensional space design are explored to clarify that Chinese font design has moved from static to dynamic, which breaks through the limitations of two-dimensional static of font and realises the multi-dimensional space effect of font polymorphism. Combined with practical cases, we analyse graphic software and its use, 3D art font design methods, explore the use of gloss and material in font design, the combination of graphics and Chinese fonts to produce a sense of dimensionality, and the grid composition of font design with a sense of dimensionality. It is concluded that the multi-dimensional spatial expression of Chinese fonts is inseparable from light, rotation, kinetic, texture, virtual and other means. Clearly, computer graphics technology provides the conditions for the design and creation of Chinese fonts.","PeriodicalId":286467,"journal":{"name":"2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126860811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Remolding and Thinking of Network Security System in Intelligent Hospital 智慧医院网络安全体系的重塑与思考
Yang Liu, Lei Xu, Jialun Lin
Objective: With the era of Internet + continually evolving, in the network security system that stacks traditional equipment, the reason why it is unable to guard against the escalating security threats is that remedy measures are always taken after the event, and network security is immethodical. Methods: through the reconstruction of the network security system, a framework system consisting of six components, namely, the network security capability system, the planning methodology and tool system, the capability building model, the construction and implementation project library, the network security deployment reference architecture, and the network security operation reference architecture, is constructed, which is a process of “establish something new and in place of the old”. Results: a new generation of network security framework system based on endogenous security is formed, which made network security move from the traditional “dispersedly and partly putting out a fire inside the walls” to “deep integration and endogenous systematization”. Conclusion: It is important to establish ubiquitous network security immunity in the intelligent hospitals system, and truly realize endogenous network security.
目的:随着互联网+时代的不断演进,在传统设备堆叠的网络安全体系中,无法防范不断升级的安全威胁的原因是事后补救措施,网络安全缺乏条理。方法:通过对网络安全体系的重构,构建由网络安全能力体系、规划方法论与工具体系、能力建设模型、构建与实施项目库、网络安全部署参考架构、网络安全运行参考架构六个部分组成的框架体系,这是一个“立新代旧”的过程。结果:形成了基于内生安全的新一代网络安全框架体系,使网络安全从传统的“分散、局部灭火”走向“深度集成、内生系统化”。结论:在智能医院系统中建立无处不在的网络安全免疫,真正实现内生性网络安全至关重要。
{"title":"Remolding and Thinking of Network Security System in Intelligent Hospital","authors":"Yang Liu, Lei Xu, Jialun Lin","doi":"10.1109/ICNISC57059.2022.00026","DOIUrl":"https://doi.org/10.1109/ICNISC57059.2022.00026","url":null,"abstract":"Objective: With the era of Internet + continually evolving, in the network security system that stacks traditional equipment, the reason why it is unable to guard against the escalating security threats is that remedy measures are always taken after the event, and network security is immethodical. Methods: through the reconstruction of the network security system, a framework system consisting of six components, namely, the network security capability system, the planning methodology and tool system, the capability building model, the construction and implementation project library, the network security deployment reference architecture, and the network security operation reference architecture, is constructed, which is a process of “establish something new and in place of the old”. Results: a new generation of network security framework system based on endogenous security is formed, which made network security move from the traditional “dispersedly and partly putting out a fire inside the walls” to “deep integration and endogenous systematization”. Conclusion: It is important to establish ubiquitous network security immunity in the intelligent hospitals system, and truly realize endogenous network security.","PeriodicalId":286467,"journal":{"name":"2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126869358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Array Layout Method of Photovoltaic Panel in Mountain Photovoltaic Power Generation Project Based on BIM 基于BIM的山地光伏发电项目光伏板阵列布置方法研究
Mingxun Hu, Zan Li, Xinyang Ye, Lei Shu
Due to the uneven terrain, different orientations and irregular topographical changes in mountain photovoltaic power generation projects, the selection of photovoltaic array layout area, the orientation and inclination of photovoltaic arrays, and the spacing of photovoltaic arrays determine the amount of light received and power generation efficiency of photovoltaic arrays during the design process. Therefore, it is necessary to determine the appropriate layout area, the orientation and inclination of the photovoltaic array, and the spacing between the photovoltaic arrays to ensure that there is no more serious shadow shading phenomenon and to obtain the maximum amount of solar radiation. In order to solve the problem of the arrangement of photovoltaic arrays in mountainous terrain, this paper proposes an automatic arrangement method of photovoltaic panels based on a 3D design environment. In the 3D design environment, the appropriate layout area is selected according to the requirements of the code. The layout of the photovoltaic array is carried out according to the site conditions. In addition, the 3D lighting technology is used to simulate the real sun illumination to check the shadow occlusion of the photovoltaic array, which greatly improves the design efficiency and quality on the basis of visualization.
山地光伏发电项目由于地形不平坦、朝向不同、地形变化不规则,在设计过程中,光伏阵列布局面积的选择、光伏阵列的朝向和倾角、光伏阵列间距等决定了光伏阵列的接收光量和发电效率。因此,有必要确定合适的布局面积、光伏阵列的朝向和倾角以及光伏阵列之间的间距,以确保不会出现更严重的阴影遮挡现象,并获得最大的太阳辐射量。为了解决山地地形中光伏阵列的排列问题,本文提出了一种基于三维设计环境的光伏板自动排列方法。在三维设计环境下,根据规范要求选择合适的布局区域。根据现场条件进行光伏阵列的布置。此外,采用三维照明技术模拟真实的太阳光照,检查光伏阵列的阴影遮挡情况,在可视化的基础上大大提高了设计效率和质量。
{"title":"Research on Array Layout Method of Photovoltaic Panel in Mountain Photovoltaic Power Generation Project Based on BIM","authors":"Mingxun Hu, Zan Li, Xinyang Ye, Lei Shu","doi":"10.1109/ICNISC57059.2022.00185","DOIUrl":"https://doi.org/10.1109/ICNISC57059.2022.00185","url":null,"abstract":"Due to the uneven terrain, different orientations and irregular topographical changes in mountain photovoltaic power generation projects, the selection of photovoltaic array layout area, the orientation and inclination of photovoltaic arrays, and the spacing of photovoltaic arrays determine the amount of light received and power generation efficiency of photovoltaic arrays during the design process. Therefore, it is necessary to determine the appropriate layout area, the orientation and inclination of the photovoltaic array, and the spacing between the photovoltaic arrays to ensure that there is no more serious shadow shading phenomenon and to obtain the maximum amount of solar radiation. In order to solve the problem of the arrangement of photovoltaic arrays in mountainous terrain, this paper proposes an automatic arrangement method of photovoltaic panels based on a 3D design environment. In the 3D design environment, the appropriate layout area is selected according to the requirements of the code. The layout of the photovoltaic array is carried out according to the site conditions. In addition, the 3D lighting technology is used to simulate the real sun illumination to check the shadow occlusion of the photovoltaic array, which greatly improves the design efficiency and quality on the basis of visualization.","PeriodicalId":286467,"journal":{"name":"2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126986845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on the Construction of Virtual Simulation Laboratory for Vehicle Professional Courses from an International Perspective 国际视野下汽车专业课程虚拟仿真实验室建设研究
Wengang Chen, Juan Li, Meitong Chen, Qizheng Li
The virtual simulation laboratory is a process of transforming the one-dimensional text on the original textbook, to the two-dimensional picture projected by PPT, into a lifelike three-dimensional image. Through the multimedia platform, the knowledge and models learned by the students are displayed in front of the students, so that the experiencers can feel a near-real experience on this virtual simulation platform, which can greatly deepen our imagination and understanding of things, let the experience learning is fun. According to the existing situation of experimental teaching in local colleges and universities, this study proposes the establishment of an automobile engine simulation laboratory. On the basis of analyzing the technical implementation status of automobile engine virtual laboratory at home and abroad, comparing the system composition of the traditional laboratory system, synthesizing the current needs, researching and exploring relevant solutions, and finally deciding to conduct a simulation laboratory exploration of the engine, explaining the composition of the virtual laboratory, and understand the utilization and management of laboratories. The basic operations of the virtual laboratory are studied based on real objects and actual operations, and the application of the virtual laboratory is discussed with the engine crankshaft as the research object.
虚拟仿真实验室是将原教材上的一维文字,转化为PPT投影的二维图片,变成栩栩如生的三维图像的过程。通过多媒体平台,将学生所学到的知识和模型展示在学生面前,让体验者在这个虚拟的仿真平台上感受近乎真实的体验,这可以大大加深我们对事物的想象和理解,让体验学习变得有趣。根据地方高校实验教学的现状,本研究提出建立汽车发动机仿真实验室。在分析国内外汽车发动机虚拟实验室技术实施现状的基础上,对比传统实验室系统的系统组成,综合当前需求,研究探索相关解决方案,最终决定对发动机进行仿真实验室探索,说明虚拟实验室的组成,了解实验室的利用和管理。基于实物和实际操作,研究了虚拟实验室的基本操作,并以发动机曲轴为研究对象,探讨了虚拟实验室的应用。
{"title":"Research on the Construction of Virtual Simulation Laboratory for Vehicle Professional Courses from an International Perspective","authors":"Wengang Chen, Juan Li, Meitong Chen, Qizheng Li","doi":"10.1109/ICNISC57059.2022.00128","DOIUrl":"https://doi.org/10.1109/ICNISC57059.2022.00128","url":null,"abstract":"The virtual simulation laboratory is a process of transforming the one-dimensional text on the original textbook, to the two-dimensional picture projected by PPT, into a lifelike three-dimensional image. Through the multimedia platform, the knowledge and models learned by the students are displayed in front of the students, so that the experiencers can feel a near-real experience on this virtual simulation platform, which can greatly deepen our imagination and understanding of things, let the experience learning is fun. According to the existing situation of experimental teaching in local colleges and universities, this study proposes the establishment of an automobile engine simulation laboratory. On the basis of analyzing the technical implementation status of automobile engine virtual laboratory at home and abroad, comparing the system composition of the traditional laboratory system, synthesizing the current needs, researching and exploring relevant solutions, and finally deciding to conduct a simulation laboratory exploration of the engine, explaining the composition of the virtual laboratory, and understand the utilization and management of laboratories. The basic operations of the virtual laboratory are studied based on real objects and actual operations, and the application of the virtual laboratory is discussed with the engine crankshaft as the research object.","PeriodicalId":286467,"journal":{"name":"2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125004664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Text Detection and Recognition Method Based on PSENet and CRNN 基于PSENet和CRNN的文本检测与识别方法
Xin He, Yingying He, Xueying Wang, Shaowei Zhang, Xun Sun
Text detection refers to detecting, for a given image, the coordinates of the text regions within it, and text recognition refers to identifying specific characters from the detected text boxes and optimizing the recognition results. In this paper, a text detection and recognition method based on PSENet and CRNN is designed for book name recognition in conjunction with the application scenario of automatic book return in self-service libraries. The PSENet text detection algorithm is used to obtain the text box of the book cover, and the CRNN+CTC text recognition algorithm is used to perform text recognition on the name of the book cover, achieving a better recognition effect.
文本检测是对给定图像的文本区域坐标进行检测,文本识别是对检测到的文本框中的特定字符进行识别,并对识别结果进行优化。本文结合自助图书馆自动还书的应用场景,设计了一种基于PSENet和CRNN的图书名称文本检测与识别方法。采用PSENet文本检测算法获取图书封面的文本框,采用CRNN+CTC文本识别算法对图书封面名称进行文本识别,取得了较好的识别效果。
{"title":"A Text Detection and Recognition Method Based on PSENet and CRNN","authors":"Xin He, Yingying He, Xueying Wang, Shaowei Zhang, Xun Sun","doi":"10.1109/ICNISC57059.2022.00062","DOIUrl":"https://doi.org/10.1109/ICNISC57059.2022.00062","url":null,"abstract":"Text detection refers to detecting, for a given image, the coordinates of the text regions within it, and text recognition refers to identifying specific characters from the detected text boxes and optimizing the recognition results. In this paper, a text detection and recognition method based on PSENet and CRNN is designed for book name recognition in conjunction with the application scenario of automatic book return in self-service libraries. The PSENet text detection algorithm is used to obtain the text box of the book cover, and the CRNN+CTC text recognition algorithm is used to perform text recognition on the name of the book cover, achieving a better recognition effect.","PeriodicalId":286467,"journal":{"name":"2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122106339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Implementation of Coal Mine Monitoring Networking System Based on Service-Oriented Architecture 基于面向服务架构的煤矿监测联网系统的设计与实现
Yunqi Chen, Jin Xu
Coal is the most important basic energy supporting the development of the national economy, safe production and effective supervision and management are of great significance. Currently, the coal mine safety monitoring system can be monitored locally, but it cannot help the supervision department to realize the remote supervision and centralized supervision. Establishing a corresponding coal mine safety monitoring network system has become a urgent need of coal mine safety supervision. In the paper, we first study the service-oriented architecture(SOA), and describes the windows communication foundation(WCF) technology, the technology is a main way to achieve SOA architecture. Then combined with WCF technology, the function and logic structure of coal mine safety monitoring network system are designed. Finally, the network system of mine monitoring system based on SOA was realized in the background of a mine monitoring system networking project of a company.
煤炭是支撑国民经济发展的最重要的基础能源,安全生产和有效监督管理具有重要意义。目前,煤矿安全监控系统可以就地监控,但无法帮助监管部门实现远程监管和集中监管。建立相应的煤矿安全监测网络系统已成为煤矿安全监管的迫切需要。本文首先研究了面向服务的体系结构(SOA),并描述了windows通信基础(WCF)技术,该技术是实现SOA体系结构的主要途径。然后结合WCF技术,设计了煤矿安全监控网络系统的功能和逻辑结构。最后,以某公司矿山监控系统联网项目为背景,实现了基于SOA的矿山监控系统网络系统。
{"title":"Design and Implementation of Coal Mine Monitoring Networking System Based on Service-Oriented Architecture","authors":"Yunqi Chen, Jin Xu","doi":"10.1109/ICNISC57059.2022.00176","DOIUrl":"https://doi.org/10.1109/ICNISC57059.2022.00176","url":null,"abstract":"Coal is the most important basic energy supporting the development of the national economy, safe production and effective supervision and management are of great significance. Currently, the coal mine safety monitoring system can be monitored locally, but it cannot help the supervision department to realize the remote supervision and centralized supervision. Establishing a corresponding coal mine safety monitoring network system has become a urgent need of coal mine safety supervision. In the paper, we first study the service-oriented architecture(SOA), and describes the windows communication foundation(WCF) technology, the technology is a main way to achieve SOA architecture. Then combined with WCF technology, the function and logic structure of coal mine safety monitoring network system are designed. Finally, the network system of mine monitoring system based on SOA was realized in the background of a mine monitoring system networking project of a company.","PeriodicalId":286467,"journal":{"name":"2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"238 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124620834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Change Detection of Grid Construction Based on Satellite Remote Sensing Images and Siamese Neural Network 基于卫星遥感图像和暹罗神经网络的网格结构变化检测
Bo Wu, Fangrong Zhou, Hui Zhang, Meilin Zhe, G. Wen, Hao Pan, Zhicai Lan, Yao Zhao
Quality monitoring of grid construction process based on satellite remote sensing method can standardize the quality behavior of all parties involved in the engineering construction and related institutions and evaluate the environmental and safety impacts of the grid engineering. Thus, a Siamese-Neural-Network-based approach using 3-channel remote sensing images was proposed to quickly monitor grid construction changes. This approach can localize the changed buildings with the help of previous and post remote sensing images of the interesting regions, classify the changes into increased buildings and decreased buildings, and output the masks reaching pixel-level positioning accuracy. The proposed method was tested and compared with other methods based on 2-channel. It has higher accuracy and better robustness and is suitable for the above-mentioned scenes of changes in grid construction. Through experimental research, it is proved that the use of multi-temporal high-resolution remote sensing data and deep learning methods can not only monitor the overall construction status and progress of the project in a timely manner, realize the monitoring of large-scale passages or site clearance, but also monitor the construction scope in a timely and effective manner. The dynamic changes of the ecological environment and the review and evaluation of the construction workload.
基于卫星遥感方法的网格建设过程质量监测,可以规范工程建设各方和相关机构的质量行为,评价网格工程的环境和安全影响。为此,提出了一种基于siamese -神经网络的三通道遥感图像快速监测网格结构变化的方法。该方法可以利用感兴趣区域的前后遥感影像对变化的建筑物进行定位,将变化的建筑物分为增加的建筑物和减少的建筑物,并输出达到像素级定位精度的掩模。对该方法进行了测试,并与其他基于双通道的方法进行了比较。它具有更高的精度和更好的鲁棒性,适用于上述网格结构变化的场景。通过实验研究证明,利用多时相高分辨率遥感数据和深度学习方法,不仅可以及时监测工程的整体施工状态和进度,实现对大型通道或场地清场的监测,还可以及时有效地监测施工范围。生态环境的动态变化与建设工作量的评审与评价。
{"title":"Change Detection of Grid Construction Based on Satellite Remote Sensing Images and Siamese Neural Network","authors":"Bo Wu, Fangrong Zhou, Hui Zhang, Meilin Zhe, G. Wen, Hao Pan, Zhicai Lan, Yao Zhao","doi":"10.1109/ICNISC57059.2022.00078","DOIUrl":"https://doi.org/10.1109/ICNISC57059.2022.00078","url":null,"abstract":"Quality monitoring of grid construction process based on satellite remote sensing method can standardize the quality behavior of all parties involved in the engineering construction and related institutions and evaluate the environmental and safety impacts of the grid engineering. Thus, a Siamese-Neural-Network-based approach using 3-channel remote sensing images was proposed to quickly monitor grid construction changes. This approach can localize the changed buildings with the help of previous and post remote sensing images of the interesting regions, classify the changes into increased buildings and decreased buildings, and output the masks reaching pixel-level positioning accuracy. The proposed method was tested and compared with other methods based on 2-channel. It has higher accuracy and better robustness and is suitable for the above-mentioned scenes of changes in grid construction. Through experimental research, it is proved that the use of multi-temporal high-resolution remote sensing data and deep learning methods can not only monitor the overall construction status and progress of the project in a timely manner, realize the monitoring of large-scale passages or site clearance, but also monitor the construction scope in a timely and effective manner. The dynamic changes of the ecological environment and the review and evaluation of the construction workload.","PeriodicalId":286467,"journal":{"name":"2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116560885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on the Innovation of Tourism Marketing Mode under the Background of Big Data Era 大数据时代背景下旅游营销模式创新研究
Yinghui Wu, Ranran Guo
As the information technology has developed and popularized significantly, the era of big data has come quietly. Accompanying it is the unstoppable innovation of tourism marketing model, which is a completely new development trend. Currently, the needs of tourists are characterized by personalization and diversification, and tourism marketing innovation has attracted the extreme attention of the tourism industry, which is one of the trends in the development of the tourism industry. Accordingly, this paper summarizes the development status of tourism marketing in the era of big data in the context of the era of big data, analyzes the challenges that tourism marketing model innovation in the era of big data urgently needs to deal with, and finally provides some feasible suggestions for realizing the innovation of tourism marketing model in the era of big data.
随着信息技术的显著发展和普及,大数据时代悄然来临。与之相伴的是旅游营销模式不可阻挡的创新,这是一个全新的发展趋势。当前,旅游者的需求呈现出个性化、多样化的特点,旅游营销创新引起了旅游行业的高度重视,是旅游行业发展的趋势之一。据此,本文在大数据时代背景下,总结了大数据时代旅游营销的发展现状,分析了大数据时代旅游营销模式创新急需应对的挑战,最后为实现大数据时代旅游营销模式创新提供了一些可行的建议。
{"title":"Research on the Innovation of Tourism Marketing Mode under the Background of Big Data Era","authors":"Yinghui Wu, Ranran Guo","doi":"10.1109/ICNISC57059.2022.00083","DOIUrl":"https://doi.org/10.1109/ICNISC57059.2022.00083","url":null,"abstract":"As the information technology has developed and popularized significantly, the era of big data has come quietly. Accompanying it is the unstoppable innovation of tourism marketing model, which is a completely new development trend. Currently, the needs of tourists are characterized by personalization and diversification, and tourism marketing innovation has attracted the extreme attention of the tourism industry, which is one of the trends in the development of the tourism industry. Accordingly, this paper summarizes the development status of tourism marketing in the era of big data in the context of the era of big data, analyzes the challenges that tourism marketing model innovation in the era of big data urgently needs to deal with, and finally provides some feasible suggestions for realizing the innovation of tourism marketing model in the era of big data.","PeriodicalId":286467,"journal":{"name":"2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"149 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130816750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of a Radiosonde Based on the WSN Technology 基于无线传感器网络技术的探空仪设计
Duo Peng, Chengqun Niu
In light of high power consumption, lofty communication cost, low data accuracy and other problems with existing radiosondes, a high-altitude data acquisition system was designed based on the WSM technology. For circuit design, the system utilized the STM32 chips as the control core and a low power sensor module to fulfill environmental data acquisition and geological location monitoring; the LoRa technology was employed to transmit data to the upper monitoring layer, whereby the upper computer administrator performed online monitoring of high-altitude meteorological data. For software design, the TDMA slot allocation protocol was improved to increase data transmission reliability and a dynamically weighted average fusion algorithm was applied to conduct a fusion experiment on data. The connectivity, reliability and operability of the system were validated in the experiment, which is of a positive significance for space weather data acquisition in China.
针对现有探空仪存在的功耗高、通信成本高、数据精度低等问题,设计了一种基于WSM技术的高空数据采集系统。在电路设计上,采用STM32芯片作为控制核心,采用低功耗传感器模块实现环境数据采集和地质定位监测;采用LoRa技术将数据传输到上层监控层,由上层计算机管理员对高空气象数据进行在线监控。在软件设计上,改进了TDMA分槽协议,提高了数据传输的可靠性,并采用动态加权平均融合算法对数据进行融合实验。实验验证了系统的连通性、可靠性和可操作性,对中国空间气象数据采集具有积极意义。
{"title":"Design of a Radiosonde Based on the WSN Technology","authors":"Duo Peng, Chengqun Niu","doi":"10.1109/ICNISC57059.2022.00011","DOIUrl":"https://doi.org/10.1109/ICNISC57059.2022.00011","url":null,"abstract":"In light of high power consumption, lofty communication cost, low data accuracy and other problems with existing radiosondes, a high-altitude data acquisition system was designed based on the WSM technology. For circuit design, the system utilized the STM32 chips as the control core and a low power sensor module to fulfill environmental data acquisition and geological location monitoring; the LoRa technology was employed to transmit data to the upper monitoring layer, whereby the upper computer administrator performed online monitoring of high-altitude meteorological data. For software design, the TDMA slot allocation protocol was improved to increase data transmission reliability and a dynamically weighted average fusion algorithm was applied to conduct a fusion experiment on data. The connectivity, reliability and operability of the system were validated in the experiment, which is of a positive significance for space weather data acquisition in China.","PeriodicalId":286467,"journal":{"name":"2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131141181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 8th Annual International Conference on Network and Information Systems for Computers (ICNISC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1